Sunday 29 April 2012

HOW TO CONNECT TWO COMPUTER USING LAN CABLE

SHARE HUGE AMOUNT OF DATA WITH IN SECONDS , CONNECT TWO COMPUTER USING LAN cable

Today i am going to tell you how to connect two computer using LAN cable. This is very useful if you don`t know ho to connect computers using LAN. Some times we want to transfer some huge amount of data between two computers then we have to use LAN cable and by using this you can easily transfer huge amount of data. Here i am describe step by step with snapshot. This is very useful when you want transfer huge amount of data between pcs and for gaming purpose.







LAN Cable or cross-over cable




Steps 1: This is compulsory step.


In order to start the connection, you’ll have to assign different IP address for both computers. To change the IP address of your computers for the LAN connection, you should make changes in the LAN adapter settings.
  • Open Control panel from the start menu and click on Network and Internet and click on Network and Sharing center.
  • From the left sidebar, click on Change adapter settings.














  • Under the Network connections window select the appropriate icon for your LAN adapter and right-click on it, then choose Properties.

  • A Local Area Connection Properties box appears.

  • Under the Network tab select Internet Protocol Version 4 (TCP/IPv4) and click on the Properties button.
  • Now set the addresses as mentioned below in each computer and click OK.
At the first computer ( say, Computer 1):
IP address:       192.168.0.1
Subnet mask:  255.255.255.0
At the second computer ( say, Computer 2):
IP address:       192.168.0.2
Subnet mask:  255.255.255.0





Step 2.  you can use this step or step third. I recommend you to skip this step and use third step

Now, connect one end of the cable into the Ethernet port of Computer 1 and the other end with the same of the Computer 2 and apply the following steps in both the computers.
  • Right-click on Computer from the start menu and select Properties.
  • The system properties Control Panel window opens as shown below.

  • Click on Change settings and the System properties dialog box appears. under the Computer Name tab, click on on the Change button to assign a WORKGROUP. Assign the same workgroup name for both computers otherwise it won’t work.

Restart each computer. It does not matter which computer you restart first. After starting both the computer, double-click on the Computer icon at the start menu and then click on Network from the left side of the explorer window.
In the computer 1, you should see an icon denoting your second computer’s name under the Network window. Similarly, you can see that the first computer has been appeared under the Network window of your second computer.

If they do not appear, you should get a message prompting to turn on Network Discovery and file Sharing. Click that security pop-up and select “make the network a private network”. In case, you may have to restart your computers.

Once you see the other computer in your Network computer window, just double click on it. If the other computer is password protected, you will have to enter the exact user name and password of that computer to get access of the shared folder.
If you want to share some files or folder of a computer with the other computer on the network, right-click on that and select Share with > Homegroup. Even you can share a total drive by right-clicking on it.




Step 3:

you can download ip messenger and install this on both the computer. It is very useful and easy way to transfer files using 'Ipmeg'.
On ipmeg then it will show other computer also and you have many option like chating, file transfer , folder transfer etc.

hack youtube

YouTube is the largest video-sharing website on which users can upload, share, and view videos. When you subscribe to someone, you are constantly updated on which of your favorites (the people you subscribe to) has uploaded a new video. That way, you don't have to constantly search for their username, you just have a convenient list of the tubers you like the best. But there are users that are paying for great promotion on their videos on YouTube, and they are getting a lot of subscriber, which in fact they don't deserve to have it. So here i will show you how to lower someone's subscription count on YouTube. It's very simple method, but totally worth it.


First, you have to subscribe to them. Next, enter this code into the address bar: the code

That's it. Have fun!

HOW TO HACK AN EMAIL ID

How to Hack E-Mail Account Passwords Using Trojans and Keyloggers


How to Hack Email Account Passwords Using ProRat?


1. First of all Download ProRat. Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro".

2. Open up the program. You should see the following:


3. Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".


4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.


5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:


6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.


7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.


8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.

9. After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.


12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.


13. The image below shows the message that the victim would get on his screen if the hacker chose to message him.


14. Below is an image of the victims task bar after the hacker clicks on Hide Start Button.


15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.


As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.

HOW TO HACK SCHOOL NETWORK

Because of the frequency this question has been asked on this blog, i have decided to create a document for this question. This tutorial is for those newbies out there, wanting to "hack" their school. I'm gonna start by saying, if your going to hack the school, theres a high probability your get caught, and don't do anything dumb like deleting the network. Its lame, and you will get flamed for doing it. This hack will allow you to take control of the PC's at school. Lets start:

How to take control of the PC's at school:

Here are the steps;
  1. Preparing The Virus
  2. Setting Up The Virus
  3. Controlling The PC

Obviously, if you gonna take control over your school PC you need a virus. You have 2 methods:
  1. The virus I made which is harmless and you won't even notice it was executed.
  2. Dropping a Trojan on the school PC.
Method 1

What you need:
  • Pen Drive (You can buy one, or you just use yours)
  • Brain (You can't buy this)

Now, open notepad and copy/paste this code: the code

Save the file as something.bat (you can change something to whatever you want). In "Save as type:" choose "All Files".


I strongly recommend you not to change the rdport and tnport configuration. The rdport will open the remote desktop default port, and the tnport will open the telnet's client default port.

You can change the username, password and the rport (randomn port you choose to be opened)

At ipconfig /all >> C:\attach.txt you must change C:/ by your pen drive letter.

Save it and remove your pen drive.

Take your pen drive to school and run the bat file. Don't forget the pc you runned it in cause you might need it.

When you get home go to your pc and try to telnet them or remote desktop the PC.

Method 2:

In this method we will use a Trojan to control the school PC.

Here is a tutorial about how to create a Trojan: ProRat Trojan

Now just create a server (there is an explanation in the tutorial above), bind it and put it into your pen drive. Make sure you leave your PC turned on.

Then go to your school and drop the trojan.

Other way to do this is to give your trojan to a friend and tell him to stay in school. When you arrive home, send him a SMS and tell him to drop the trojan. This way you could even see if it worked.

After this you can probably do whatever you want with the PC.

BOOST YOU Wi-Fi STRENGTH

AnyTone Wi-Fi Booster (Wi-fi Repeater) PA-400 

 

this tool can increase wi-fi 


A Wi-fi Booster that is also called wifi repeater or range extender is used to broaden the range of Wi-Fi network. While installation, you just need to place the wifi booster between the router and then put the modem’s antenna on it.
A wifi repeater works by receiving the wi-fi signal from a router and then amplifies and rebroadcast it around locally. With a wifi repeater computers and printers that located out of the original range of access point can access the extended wi-fi network. Wifi repeater effectively doubles the coverage area of your existing wi-fi network, extend your network to the far end of your home or office and that’s why make your life easier with good wi-fi excess.
This small and light device for symbolic sum can save your business and nerves, allowing you ro stay connected all the time with higher possibilities.
wifi booster
wi-fi amplifier
wifi repeater

Technical characteristics:

Indoor coverage: 150 m2
Frequency Range: 2.4 - 2.5 GHz
Up-link Gain: 12 dB
Down-link Gain: 15 dB
Power supply: 110V - 220V AC
Working Temperature: -45 to +80 C
Humidity: 5-95%
Size(mm): 90x50x20
Weight: 0.3 kg

Package:

  • Wifi Booster
  • Antenna
  • Adapter for SMA/TNC
  • Power supply,
  • Manual

HOW TO HIDE IP ADDRESS

Whenever you surf the Web, you leave yourself open to being snooped upon by web sites. They can track your online travels, know what operating system and browser you’re running, find out your machine name, uncover the last sites you’ve visited, examine your history list, delve into your cache, examine your IP address and use that to learn basic information about you such as your geographic location, and more. To a great extent, your Internet life is an open book when you visit.

Sites use a variety of techniques to gather and collate this information, but the two most basic are examining your IP address and placing cookies on your PC. Matching your IP address with your cookies makes it easier for them to create personal profiles.

Hide The IP is a Software which masks your true IP address to protect your anonymity while surfing the Web. On the other hand Hackers can use this software to hide their identity and not get caught. It is beneficial for all and i recommend that every PC should have this software installed.

By hiding your IP you will prevent receiving spam from marketers which know your interests by tracking your IP when browsing websites. You can use web based e-mail to send anonymous e-mail.

We found this application to function simply and effectively: click the lock icon, and within seconds the program has found and acquired a false IP for you. Your real and current IP addresses are displayed in the application window.

Hide The IP Top Features:
Hide IP Address

One click to completely hide your IP address. Others will see the hidden IP address which masking your real IP, and protecting your privacy.

Select Your Physical Location

You decide which country to be indicated as your origin by simply choosing from a country list. We have hundreds, hourly updated IP addresses available for use.

Anonymous Surfing

You are protected from hackers who will be tricked by your new IP address instead of your real. They will never be able to find any information about you by tracing the masked IP.

Send Anonymous Emails

Hide your IP in E-mail headers. Be protected while sending emails from Yahoo!, Hotmail, GMail. Upgrading to Platinum Service add-on will protect you in Outlook!

Bypass Website Country Restrictions

Surf anonymously websites restricted for your country. Surf in forums on which you were banned.

Supports Internet Explorer, Firefox, Google Chrome, Safari, Opera.

Saturday 28 April 2012

HOW TO USE COMPUTER WITHOUT A MOUSE SIMPLE EASY OUTSTANDINDING TRICKS

Use Keyboard as Mouse [How To]

If your mouse is not working and you don't wish to wait till you get a new mouse, you would definitely like to know how you can use your keyboard as your mouse. It is easy to use your mouse as keyboard in Windows using the On Screen Keyboard utility, but it is also possible to do the reverse.

Keyboard Mouse

All you need to do is:

Windows XP Users:-
  1. Go to Control Panel.
  2. Then click on Switch to Classic View.
  3. Then Click on Accessibility Options.
  4. Then Click on the Mouse Tab.
  5. Select Use MouseKeys.
  6. Click on OK.
  7. Then activate NumberLock (by pressing the NumLk key).
  8. You should hear a beep sound.
  9. Now you can control the mouse pointer using the arrow keys on the numeric keypad.
use keyboard as mouse


Windows 7 and Vista Users:

  1. Open Ease of Access Center by clicking the Start button , clicking Control Panel, clicking Ease of Access, and then clicking Ease of Access Center.
  2. Click Make the mouse easier to use.
  3. Under Control the mouse with the keyboard, select the Turn on Mouse Keys check box.

You can also increase the acceleration and speed of your mouse movements according to your needs.

You can alternately press the Alt+Shift+Num Lock combination to instantly activate the mouse keys.


Laptop Keyboard Mouse

For laptops, this will only work if your laptop keyboard has a numeric keypad or alternative keys with which you can use with the Number Lock Key or the Function key.

On my laptop, number 6 key of the numeric keypad moves the mouse pointer left, number 4 key moves the mouse pointer right, number 2 key moves it down, number 8 key moves the mouse pointer up, number 5 and + key serve as right click while the number 0 key works as left click.

Friday 27 April 2012

HOW TO LOCK FOLDER OR FILES WITHOUT ANY SOFTWARE

Password Protect folders in Windows without any Software

Most of us have private data. Not all of us have a private computer to keep that data. So, we just end up with other people viewing that data. Although password protecting software do work, it is almost useless to hide private data with these software(because we are always questioned as to what it is that we are hiding with the help of these software).

Hidden folders do not work as they can be easily searched with Windows Search. So, we need an alternative way to create hidden password protected folders which only we can access. And that is exactly what we will learn in this post.

With this trick, you can create a secure password protected folder in Windows which no one except you can access. To use this trick, follow the instructions given below:-
1.  Open Notepad.
2.  Copy and paste the exact code given below:-

cls
@ECHO OFF
title comhacking.blogspot.in
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== www.comhacking.blogspot.in goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDMyFolder
md MyFolder
echo MyFolder created successfully
goto End
:End


Hide Folders without any Software


3.  Click on the File Menu. Click on Save As.
4.  Select All Types in the Save As Type dropdown menu. Save the file as *.bat or Locker.bat.


After creating the file, double click on the Saved file. A new folder will be created. Enter your data in the folder. Again, double click on the batch file. Type Y and press Enter. The folder will be hidden from view.

To re-view your folder, double click on the saved batch file. Enter password as "www.comhacking.blogspot.in" without quotes and press Enter key. This is also the default password. Your folder will be visible again.

To change the default password, edit the part of the code given in blue and enter your own password.

The overall usability of this trick can be improved by deleting the batch file after hiding your folder and re-creating it when you wish to access your folder again.

If you face any problem using this trick, you can write a comment and I will do my best to help you.

Note: This works on Windows 7, Windows XP and Vista. First try this on useless data to be sure and then only hide your personal data.

HOW TO FIND HIDDEN PASSWORD OR HIDDEN LETTERS IN A WEBPAGE

HOW TO REVEAL HIDDEN PASSWORDS LIKE STARS USING JAVA SCRIPT

How to Reveal, Show, View Passwords hidden under Asterisks/Stars

Most modern browsers offer the capability of remembering usernames and passwords.  Most of us use this feature to automatically save our usernames and passwords in order to log in to our favorite websites more quickly. What if you forget the saved username and password?

As web browsers intelligently hide passwords using stars(, asterisks or dots), there is no way in which a user can recover his password by simply looking at what the browser shows. Here are some tips and tricks that you can use to reveal your password for a website when you have forgotten it but your browser remembers it.

Reveal Password Asterisk
Enter your Password!

JavaScript to Reveal Hidden Passwords in Asterisk (Stars)

A simple JavaScript code can be used to view passwords in web browsers like Google Chrome, Internet Explorer, Opera in a popup as an alert message (Mozilla Firefox does not support this. Users of this browser can utilize the bookmarklet given below or the addon mentioned at the end of this post. If you use Google Chrome and the code does not seem to work, precede it with "javascript:" without quotes). To use the JavaScript, open your web browser, open the webpage for which the password is hidden in asterisks, copy and paste the following code in the address bar.

javascript: var p=r(); function r(){var g=0;var x=false;var x=z(document.forms);g=g+1;var w=window.frames;for(var k=0;k<w.length;k++) {var x = ((x) || (z(w[k].document.forms)));g=g+1;}if (!x) alert('Password not found in ' + g + ' forms');}function z(f){var b=false;for(var i=0;i<f.length;i++) {var e=f[i].elements;for(var j=0;j<e.length;j++) {if (h(e[j])) {b=true}}}return b;}function h(ej){var s='';if (ej.type=='password'){s=ej.value;if (s!=''){prompt('Password found ', s)}else{alert('Password is blank')}return true;}}
Or, alternatively you can use this Show Password Bookmarklet by dragging it to your Bookmarks Bar to instantly view hidden passwords at the click of a button.

Asterisk Star Password
Asterisk Password Recovery Popup in Google Chrome

Software to Reveal Hidden Passwords behind Stars

There are many free software that you can use to recover forgotten passwords. Some of them are:-

Asterisk Logger:Asterisk Logger from Nirsoft is one such software. It automatically displays the hidden password whenever a window containing a hidden password is detected.

Password Viewer:Password Viewer by IT Samples is another application that can be used to unmask passwords hidden behind stars. It allows you to view passwords not only in web browsers but also in any program that might be masking passwords from the user.

Both of these software are free and do not require to be installed. All you need to do is just unzip the file and run them. These software work perfectly fine on Windows XP, Windows 7, Windows Vista and Windows Server 2008, 2003. However, in Windows 7 and Vista, they are  required to be used in an Administrator Account. These tools are browser independent. These software will not be able to decrypt or show User Account Control /Windows logon password.


Mozilla Firefox Add-on

Show My Password is a Firefox Add-on which automatically converts scrambled hidden passwords into human readable form. To use this nifty add-on, just open the webpage with the hidden password and click in the field containing the hidden password. This add-on will automatically reveal the password to you.

These tips can be also be used by someone else to hack your passwords. To avoid such mishaps, I would advise you to stay alert when others use your private computer.

HOW TO REVEAL HIDDEN PASSWORDS LIKE STARS USING JAVA SCRIPT

How to Reveal, Show, View Passwords hidden under Asterisks/Stars

Most modern browsers offer the capability of remembering usernames and passwords.  Most of us use this feature to automatically save our usernames and passwords in order to log in to our favorite websites more quickly. What if you forget the saved username and password?

As web browsers intelligently hide passwords using stars(, asterisks or dots), there is no way in which a user can recover his password by simply looking at what the browser shows. Here are some tips and tricks that you can use to reveal your password for a website when you have forgotten it but your browser remembers it.

Reveal Password Asterisk
Enter your Password!

JavaScript to Reveal Hidden Passwords in Asterisk (Stars)

A simple JavaScript code can be used to view passwords in web browsers like Google Chrome, Internet Explorer, Opera in a popup as an alert message (Mozilla Firefox does not support this. Users of this browser can utilize the bookmarklet given below or the addon mentioned at the end of this post. If you use Google Chrome and the code does not seem to work, precede it with "javascript:" without quotes). To use the JavaScript, open your web browser, open the webpage for which the password is hidden in asterisks, copy and paste the following code in the address bar.

javascript: var p=r(); function r(){var g=0;var x=false;var x=z(document.forms);g=g+1;var w=window.frames;for(var k=0;k<w.length;k++) {var x = ((x) || (z(w[k].document.forms)));g=g+1;}if (!x) alert('Password not found in ' + g + ' forms');}function z(f){var b=false;for(var i=0;i<f.length;i++) {var e=f[i].elements;for(var j=0;j<e.length;j++) {if (h(e[j])) {b=true}}}return b;}function h(ej){var s='';if (ej.type=='password'){s=ej.value;if (s!=''){prompt('Password found ', s)}else{alert('Password is blank')}return true;}}
Or, alternatively you can use this Show Password Bookmarklet by dragging it to your Bookmarks Bar to instantly view hidden passwords at the click of a button.

Asterisk Star Password
Asterisk Password Recovery Popup in Google Chrome

Software to Reveal Hidden Passwords behind Stars

There are many free software that you can use to recover forgotten passwords. Some of them are:-

Asterisk Logger:Asterisk Logger from Nirsoft is one such software. It automatically displays the hidden password whenever a window containing a hidden password is detected.

Password Viewer:Password Viewer by IT Samples is another application that can be used to unmask passwords hidden behind stars. It allows you to view passwords not only in web browsers but also in any program that might be masking passwords from the user.

Both of these software are free and do not require to be installed. All you need to do is just unzip the file and run them. These software work perfectly fine on Windows XP, Windows 7, Windows Vista and Windows Server 2008, 2003. However, in Windows 7 and Vista, they are  required to be used in an Administrator Account. These tools are browser independent. These software will not be able to decrypt or show User Account Control /Windows logon password.


Mozilla Firefox Add-on

Show My Password is a Firefox Add-on which automatically converts scrambled hidden passwords into human readable form. To use this nifty add-on, just open the webpage with the hidden password and click in the field containing the hidden password. This add-on will automatically reveal the password to you.

These tips can be also be used by someone else to hack your passwords. To avoid such mishaps, I would advise you to stay alert when others use your private computer.

HOW TO CHANGE PROCCESSOR NAME AND SPEED PERMENANTLY

Change Processor Name Permanently 

 AND ANOTHER SIMPLE TRICK IS HERE TOO

A while ago on Technology Inspired, I published an article on changing your processor name. But recently, Technology Inspired reader Anil Kumar pointed out that the trick only changed the name temporarily.

After a user restarts his computer, the name reverted back to original which is obvious as each time Windows boots, it checks the connected hardware and updates the registry value automatically. So, changing the processor name using the earlier article did not had permanent effect on the processor name.

Thus, the alien processor name you had earlier again reverted back to the boring old one.

Change Processor Name Permanently

Problem: To, make the name change permanent, it was required that the user updates the Processor Name String registry key each time when Windows starts.

Solution: It is very easy to change your processor name permanently by creating a registry key and placing a shortcut to it in the windows start up folder. To do so, just follow the steps given below:-


Steps :-
1.  Open Notepad.
2.  Copy and paste the exact code given below:-

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0]
"ProcessorNameString"="My Processor name 50000MHz"
To change the processor name, edit the part of the code given in blue. Also understand that \0 in the above code should only be present if Windows store your processor name at that location. Please open Registry Editor and navigate to the above mentioned keys to check whether or not to include the \0.

3.  Click on File Menu, click on Save As and select "All Types" in Save as Type option. Save the file as ProcessorNameChange.reg or *.reg.
4.  Create a new shortcut on your desktop. Enter regedit / S "Location of the .reg file" as the location of the item. For example, enter regedit /S "C:\Processor Name.reg" if your registry file is located in the root of C:\ drive.

Processor Name

5.   Copy the created Shortcut file.
6.  Navigate to C:\Documents and Settings\All Users\Start Menu\Programs\Startup (in Windows XP) or to C:\Users\ User-Name\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (in Windows 7 and Windows Vista . Also remember that AppData is a hidden folder.)  if C: is your System drive.
7.  Paste the copied file.


This registry file would now execute each time when windows starts and the Processor Name String would be modified each time. So, even upon restarting your computer, you will see that the changed processor name is permanent.

HOW TO CHANGE FB THEAME

Change Facebook Theme Color, Appearance, Skin, Style or Template

Facebook is a social networking site which enables people to connect with friends and people around. That's how Facebook is usually introduced but Facebook is beyond the requirement of being introduced as almost everyone is on it. But Facebook has one flaw, the default blue theme is really boring.

Some even consider it an annoyance while visiting Facebook. As Facebook does not allow users to change its theme like MySpace used to, users are left with no other option but to bear the theme Facebook wants them to use.

However, it is relatively easy to change the Facebook theme to a stylish one using a Firefox addon and custom themes which are available free of cost on the internet.

An example of the final outcome would be something like in the image.

Change Facebook Theme
This is the Ferrari theme. More themes are available for you to choose.


Requirement: The basic requirement for this to work is to have Mozilla Firefox 3.5 or higher.

Steps to achieve this: The following steps should be carried out to successfully change Facebook theme.

  1. Open Mozilla Firefox and install 'Stylish' addon.
  2. Follow the basic steps to install the addon.
  3. Restart Firefox after successfully installing the Stylish addon.
  4. Login to your Facebook Account and click on the small 'S' button in your Firefox status bar.
  5. Click on "Find Styles for this Site" to open a new tab with free themes to use for Facebook.
  6. Click on any theme and a preview will be shown.
  7. If everything is fine in the previewed theme, click on "Install with Stylish" button at the top right corner of the page.
  8. A dialog box will open.
  9. Click on Install in the dialog box.

Stylish Button


facebook theme change

Install with stylish

Installing Ferrari theme for Stylish Firefox

Now whenever you open Facebook, it will show the theme that you have installed with Stylish instead of the boring old blue theme.

WHY FB IN BLUE COLOUR

Why Facebook uses Blue Color?

When you open Facebook, the first thing that you notice is the blue color it uses. Ever wondered why is Facebook so blue in Color and not upgrading its theme.

Ever since they started as 'thefacebook', Facebook has sticked with the blue color. Although major changes have been made in the Facebook theme since then, the major unchanged thing has been the blue color.

facebook blue color
Facebook from its early days when it was known as  thefacebook

An exciting fact: In its earlier days, thefacebook.com required you to have an  .edu email id to join.

Everywhere from its login page to Facebook groups, you find only blue.

facebook is blue
Facebook Login Page. All Blue!

The reason for this is that  Mark Zuckerberg, the young founder of Facebook is red-green color-blind and blue is the richest colour for him which he confirmed in an interview with Leo Laporte in an online interview.

Another important commercial factor for using blue color is the fact that most colors tend to distract the viewers. Blue on the other hand acts as a transparent background to the main content as visible to the human brain due to which most popular websites tend to use the blue color. It can easily be called a webmaster's favorite color. Blue Color is also sometimes referred to as 'Nirvana' for the brain.

All these factors make blue a prominent color on Facebook.

If you are bored with Facebook's blue theme and want a stylish theme, visit Change Facebook Theme.

HOW TO CHANGE PROCCESSOR NAME and SPEED EASY TRICK

Change your Processor's Name

Are you bored with your old processor? Do you want a new processor with a breath-stopping name but are not going to upgrade any time soon? No need to worry. You can still have that new processor's name displayed in your computer. Well not only that, you can also have a better one than the one you are supposing to buy. Just follow this trick.

With this trick, you can change the name of your processor to a personalized one like My Processor or something extreme like Decacore Processor 50 GHz .  These are just a few examples. You can change the name of your processor to anything you like.

To have one such cool processor's name displayed in your computer, follow these steps:-
  1. Click on Start.
  2. Click on Run.
  3. Type "regedit" without quotes.
  4. Navigate to HKEY_LOCAL_MACHINE/HARDWARE/
  5. From HARDWARE, navigate to DESCRIPTION/System/CentralProcessor/.
  6. In the work area, double click on ProcessorNameString, and change its value according to your choice.
  7. Click Ok  
  8.  Right Click on Computer icon and select properties.The final outcome would be something like the one in the image.

    Try it on your PC and show it to your friends to see the fun.

    P.S.: Personally, I have recently changed the name of my processor to "iLife Processor 7, Alien Technologies".  Tell me what you change yours to.

    Note: This article changes the processor name temporarily. To permanently change processor

HOW TO MAKE ONLINE SHOPPING SAFELY


safely shop online

Safe Shopping: How to shop online safely?

Shopping online is becoming increasingly popular with consumers of all ages.
With fast shipping and websites selling virtually everything, online shopping is an attractive alternative to the hassle of visiting multiple stores.

However, eCommerce safety is a huge issue, and many shoppers are unaware of how to ensure that their online transactions are safe, secure and private. Fortunately, there are a number of simple signs to look out for and changes you can implement to make purchasing items on the Web considerably safer.

The most common methods used by hackers to steal consumer information are phishing sites and emails. Hackers may set up websites that look similar to other branded sites and send emails to potential customers of those companies urging them to shop through special links. By gaining consumer trust through having a similar appearance to the original company’s website, consumers feel more comfortable about entering their details into such sites, including credit card information.

Avoiding phishing emails and websites is simple. Any time a shopper receives an email from a company asking them to shop or navigate to a website, they should carefully check the domain the email is being sent from or the URLs of the links they land on. All email addresses and URLs should contain the company’s official domain.


A common trick to watch out for is a minor misspelling in the domain name that may be hard to pick up without careful attention. Additionally, some hackers may place the company’s name before the @ symbol in the email address, rather than after, which is where it should be.

All pages, including login pages, asking for consumer details, such as billing/shipping addresses and payment information, should have URLs that begin with “https://” rather than the more commonly used “http://.” The “s” denotes a secured connection and provides encrypted communication between a shopper’s computer and the receiving company’s servers.

Preferably, the site will also have a verifiable certification showing that the site can be trusted and that the installed security suites are up to date. Many sites display a security certification image link or privacy seal, making it easy to verify their status.

People who decide to shop on websites they’ve never heard of should ensure that these sites are legitimate. This can be done by searching for online reviews and confirming that the site is listed as a secure site with a trusted online security company.

Shopping with certain methods of payment and opting for tracked shipments can also provide enhanced protection. Payment services, such as Paypal, allow buyers to dispute charges and other issues they may have with sellers. Many credit cards offer similar protection, and since they aren’t linked directly to a bank account, hackers can’t drain a shopper’s finances. Finally, trackable shipping allows shoppers to find out exactly where their packages are, providing added confidence in the legitimacy of any seller's services. All tracking information should originate from the shipping service and be trackable within 24 hours of receiving the tracking number.

MAKE YOUR PC MORE SECURE

PC Security Tips : Make Computer Secure

PC Security tips
Here are some tips which will enable you to make your PC more secure.

Anti-virus

1. Never, ever turn off the resident protection of your antivirus even if it decreases performance. Upgrade if necessary.

2. Keep your virus definitions up-to-date. Use the automatic update feature of your anti-virus and try not to ignore the "Do you want to update now" message however often it might pop up.

3. Even if you update regularly and you have not seen any suspicious activity on your PC, do a deep scan at least once a month.

4. Always create an emergency boot disk and keep it in a safe place.


5. Run a deep scan in safe mode at least once every two months to kill viruses that would otherwise remain hidden.

Firewalls

1. If you are unsure about the alert displayed by your firewall, try searching it on the internet.

2. A firewall is a powerful tool that requires an understanding of how the program works and exactly what it is doing and whether it is secure or not. Reading the help files is extremely important in successful configuration of your firewall.

Computer Security

3. If you are running a third party firewall,be sure to turn off the Windows Firewall.

4. You can temporarily disable a firewall by right clicking the icon in the tray. This is handy when you know a site is one you can trust but your firewall is blocking it. But remember to re-enable it as soon as possible.

5. Read firewall notices carefully when they pop up so that you don't let a bad thing in or prevent good traffic.


Anti-Spyware

1. You should regularly check for updates. Enable the automatic update feature.

2. Remember to do a scan every now and then, or schedule scans if your program allows it. If you don't want to sit that long for scans to complete, use a single folder for all your downloads, then scan only that folder, Windows installation folder and the Registry. Alternately, you can do a quick scan if your program allows it.


Anti-Spam

1. Be patient with anti-spam software, it will get better over time.

2. Even if it looks that your anti-spam software is working great, periodically check the 'Spam' folder for good mail. None of the anti-spam software is perfect right now.

3. Don't give your anti-spam software too much rules, because it will not learn anything then. It is better if it learns on its own.

For a complete article on securing your PC, visit How to improve Cyber Security.

HOW CAN I IMPROVE CYBER SECURITY

How to Improve Cyber Security

How to make your PC secure from all the threats in the online world and improve cyber security? Not sure? Then read on. Here is a list of things you should know to improve your online cyber security:-

1. Anti-virus : Probably, one of the first thing which comes into one's mind when thinking about security. An anti-virus is an inevitable tool for the security of a PC. One can either choose a paid version of the anti-virus of his choice or opt for the equally effective free antivirus (only for private users). Before choosing the anti-virus, it is necessary to check whether the anti-virus has resident protection or not. Resident Protection automatically detects viruses when they are loaded into the memory and takes the appropriate action. Thus saving a user from sitting hours in front of the PC scanning viruses. It is important to check regularly for updates. Also do a quick scan (scanning Windows folder, registry, documents and recent downloads) at least once a week and a full scan at least once a month, even if your PC appears fine.

improve cyber security


2. Anti-spyware: A spyware is a program which collects private information and sends it to its programmer. Spywares are considered more dangerous than viruses as they steal private information like Windows registration number, bank accounts, credit card's information, site logins, which can be used to harm a user in all possible ways. Login Accounts to social networks like Facebook and Orkut seem to be the prime target. Thus, it is necessary to have a good anti-spyware software with resident protection ,registry monitoring and browser monitoring. Again it is the user's choice to either opt for a paid one or for a free one. It is important to enable the automatic update function in the anti-spyware software and to do a quick scan of the PC once a week. It is also necessary do a full scan once every month for best results.

3. Firewall: A firewall prevents unauthorized or malicious applications from reaching a computer. A firewall is basically needed to protect a PC against Trojans, spyware, worms, hackers, hijackers and other known and unknown threats. However a firewall must not be assumed an alternative to the anti-virus or anti-spyware software. Before choosing a firewall, the most important thing to keep in mind is the ease of use and the amount of customization possible. An often overlooked factor upon choosing a firewall is the amount of resources consumed by it. Keeping all these factors in mind, a good firewall software(free or paid) must be chosen. It is important to read the alerts displayed by it carefully, and select an appropriate action to do.

improve computer security

4. Anti-spam: Anti-spam software has become important because of the amount of spams received by internet users frequently. These scams are the most common cause of cyber crime. Installing one and using it is easy. So don't worry about how to use one. But the only difficult thing is to be patient with it. Its performance will improve over time. You can download any of the free anti-spam available over the web or can opt for a paid version.

5. Windows Update: A very important factor for PC security is updating Windows. It is important to enable Automatic Updates in Windows which helps to get all the latest security fixes. Getting these updates will help Windows work better and will make one's working more secure.

6. Backing Up: It is important to back up all your important data to have a copy of it whenever needed in case of a virus attack. A back up comes in handy in such unexpected situations.