Pages

Friday, 15 July 2011

Anonymity complete GUIDE

Anonymity complete GUIDE By Theraider & Dangerous R.

Anonymity on the web

Wednesday, 13 July 2011

16x Dvd+-rw Dl Dvd Writer Comparison Guide

16x Dvd+-rw Dl Dvd Writer Comparison Guide

Source:
CODE
http://www.extrememhz.com/dlcomp-p1.shtml


Since the introduction of double layer DVD writers, the interest has been quite overwhelming and is why we keep bringing you reviews of these highly popular drives. The anticipation has now turned into down right obsession and it has become a key component in any current or new system build, thanks to the declining prices and continued media hype. Manufacturers are quite aware of the fascination and is why they have each

Sunday, 10 July 2011

AREA CODE AND TIME ZONE LISTING

   _   _   _   _   _   _   _   _   _   _   _   _   _   _   _   _   _   _   _
 _| |_| |_| |_| |_| |_| |_| |_| |_| |_| |_| |_| |_| |_| |_| |_| |_| |_| |_| |_
|_                                                                           _|
 _|      _   _                                                  _   _       |_
|_      ((___))               cDc communications               ((___))       _|
 _|     [ x x ]                   presents...                  [ x x ]      |_
|_       \   /                                                  \   /        _|
 _|      (` ')         AREA CODE AND TIME ZONE LISTING  

How to hack Windows XP

How to hack Windows XP Admin Passwords      

How to hack Windows XP Admin Passwords the easy way by Estyle, Jaoibh
and Azrael.
------------------------------------------------------------------------------
This hack will only work if the person that owns the machine
has no intelligence. This is how it works:

HACKING TECHNIQUES

****************************
***  HACKING TECHNIQUES  ***
***  Typed By:  LOGAN-5  ***
***   (Hacker Supreme)   ***
***       From the       ***
***   Inner Circle Book  ***
****************************

Computer Matinence.txt

You may not realize it, but your computer and your car have something in common: they both need regular maintenance. No, you don't need to change your computer's oil. But you should be updating your software, keeping your antivirus subscription up to date, and checking for spyware. Read on to learn what you can do to help improve your computer's security.

Change Your Ip In Less Then 1 Minute

How To: Change Your Ip In Less Then 1 Minute

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

Thursday, 7 July 2011

Anonymity complete GUIDE

Anonymity complete GUIDE By Theraider & Dangerous R.

Anonymity on the web

250+ tech book online

1
10 minute guide to lotus notes mail 4.5
http://www.parsian.net/set1252/pages/books.htm

2
10 minute guide to Microsoft exchange 5.0
http://www.parsian.net/set1252/pages/books.htm

10 Fast and Free Security Enhancements PC magazine.

10 Fast and Free Security Enhancements
PC magazine.

Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.

1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the

Cracking Manual

                                                   The Cracking Manual
         ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
                                 Written By The Cyborg - April 3, 1992







         Disclaimer
         The author of this text shall hold no liability for special,
         incidental, or consequential damages arising out of or
         resulting from the use/misuse of the information in this
         file.








                                                   The Cracking Manual



                                  INTRODUCTION

         Introduction
         ------------
              Welcome to the wonderful world of cracking.  What is
         cracking?  If you don't know and you're reading this, ask
         yourself why?  Anyway, cracking is the art of removing copy
         protected coding from programs.  Why do this?  In recent
         years, software companies have been fighting to keep copy
         protection in their software to avoid their work to be
         illegally copied.  Users feel that such copy protection is
         ridiculous in that it violate their own rights to make
         backups of their sometimes expensive investments.
              Whichever side you may favor, this manual will go into
         some detail on removing copy protection from programs.  If
         you feel offended by this, then I would suggest you stop
         here.  Please note, I do not endorse cracking for the illegal
         copying of software.  Please take into consideration the hard
         work and effort of many programmers to make the software.
         Illegal copying would only increase prices on software for
         all people.  Use this manual with discretion as I place into
         your trust and judgement with the following knowledge.


































                                     Page 1





                                                   The Cracking Manual



                               WHAT YOU WILL NEED

         What You Will Need
         ------------------
              Like all programming, cracking is the debugging stage of
         software development.  It is the most tedious and hectic part
         of programming as you shall see.  However, unlike software
         development, you are given no source code, only the machine
         level code commonly called machine language.  Cracking
         demands patience.  No patience, no cracking.
              Before we begin, you will need certain tools.  These
         include:

              - A decent computer.  By this, I mean at minimum a 286
                computer with 2 or more megs of RAM.  A 386 is the
                ideal since it can load a debugger into usable memory.
              - A source level debugger (eg. Turbo Debugger)
              - A low level debugger (eg. DEBUG)
              - An assembler system (eg. MASM, LINK, EXE2BIN)
              - A hex dumping program (eg. Norton Utilities)

         The source level debugger is what you will try to be using
         most of the time.  It provides many features that are a
         convenience to the cracker, such as interrupt redirection.
         Become comfortable with its features.  However, in some
         instances, the source level debugger may not be suitable for
         cracking huge games since the debugger itself may take up too
         much memory.  In such a case, a low level debugger must be
         used since their memory usage may be considered negligible.
         This manual will focus on its use.
              The assembler package will be used in the creation of
         the famed loaders, which provide the cracker with dynamic
         memory alterations without changing the original program.























                                     Page 2





                                                   The Cracking Manual



                       CRASH COURSE IN ASSEMBLY LANGUAGE

         Crash Course in Assembly Language
         ---------------------------------
              If you are already well familiar with the assembly
         language, you may wish to skip this section.  Cracking
         demands the knowledge of assembly language.  If you wish to
         become a "serious" cracker, you might like to read up more
         about this fascinating language.  This section will only give
         you enough info for intermediate level cracking.
              At this point, you should familiarize yourself with
         DEBUG and its commands as we will be using them shortly.

         Registers
         ---------
              One of the neato things that you will be fooling around
         most often with are called the registers.  Registers are like
         variables (such as in BASIC) that are located within the CPU
         itself.  These registers may hold a positive integer from 0
         to 255 or from 0 to 65535.  They can also hold negative
         integers from -128 to 127 or from -32768 to 32767.  The
         registers are given names as follows:

              AX => accumulator - this register is most commonly used
                    for mathematical or I/O operations
              BX => base - this register is used commonly as a base or
                    a pointer register (we'll talk more about this
                    later)
              CX => count - used commonly for counting instructions
                    such as loops
              DX => displacement - much like the base register

         The registers stated above are considered general purpose
         registers, since they can basically be used to store whatever
         the user wants.  Let's try putting some number in these
         registers.  Type in "R {enter}".  You should see a bunch of
         info, of which are four of the above mentioned registers.
         Now, type in "RAX {enter}".  Then type in a number like
         8FABh.  Type in "R" again and noticed how the accumulator
         (AX) has change its number.
              These general purpose registers can also be "split" in
         half into its higher and lower order components.  Instead of
         having one register AX, you can have two registers, AH and
         AL.  Note however that while you have a range of 0 to FFFFh
         for AX, you will now have a range of 0 to FF for AH and AL.
         You cannot change these directly in debug, but be aware that
         programs will use it.  If AX contains 0A4Ch, then AH will
         contain 0Ah and AL will contain 4Ch.
              The following are called the segment registers:

              CS => code segment - the block of memory where the code
                    (instructions are located)
              DS => data segment - the block of memory where data can
                    be accessed.  In block move operations in which


                                     Page 3





                                                   The Cracking Manual



                    huge blocks of memory are moved, this is commonly
                    the segment in which the CPU reads from.
              ES => extra segment - also another data segment.  In
                    block move operations in which huge blocks of
                    memory are moved, this is commonly the segment in
                    which the CPU writes to.
              SS => stack segment - this is the block of memory in
                    which the CPU uses to store return addresses from
                    subroutines.  (more on this later)

         In introductory level of cracking, we don't mess around with
         these registers.  Later, we will see how we can use these to
         trick a program into thinking other things, but that's later.
         You can also change these registers in debug.  Type in "RCS
         {enter}".  Then enter "0 {enter}" and notice how the CS
         register changed.
              There are other registers that we use to see what the
         program is doing.  These registers can also be change in
         debug.  Included are the following:

              SI => source index - this register is used in
                    conjunction with block move instructions.  This is
                    a pointer within a segment (usually DS) that is
                    read from by the CPU.
              DI => destination index - this register is also used in
                    conjunction with block move instructions.  This is
                    a pointer within a segment (usually ES) that is
                    written to by the CPU.
              BP => base pointer - a pointer used commonly with the
                    stack segment
              SP => stack pointer - another pointer used commonly with
                    the stack segment (this one, you don't touch)

              By now, you may probably be confused about this
         segment/pointer bit.  Here is an analogy that my straighten
         things out.
              Pretend you are in kindergarden learning to read.  There
         are four black boards surrounding the room.  These black
         boards are like SEGMENTS.  Let's pretend the front blackboard
         is the code segment (CS).  The teacher has written some
         instructions on pronunciation rules.  This is what the
         students refer to when they try to pronounce words.  In a
         program, this is what the CPU refers to when it follows
         directions.
              Okay, now the teacher has gone to the blackboard on the
         left of the classroom.  We will call this board the data
         segment (DS).  The teacher has also written a set of words on
         the board.  Then she uses a wooden stick or a POINTER to
         point to a word.  Let's pretend this stick is the source
         index (SI).  She points to the word "their".  Now, the
         students look at the front blackboard (CS) to see how to
         pronounce the word and they say "their".
              Now, the instructor wants the students to learn how to
         write.  She points the stick to the word "apple".  The


                                     Page 4





                                                   The Cracking Manual



         students pronounce the word.  Then she goes to the blackboard
         on the right.  We shall call this one the extra segment (ES).
         She then uses her finger as a different POINTER and points to
         a location on the board where Mary Jane will write "apple".
              That's basically what segments and pointers are.
         Segments are the blackboards and pointers are the teacher's
         stick (we're not talking sexually here) or finger.
              One last important register is the flags register.
         These registers control how certain instruction work, such as
         the conditional jumps (in BASIC, they are like IF-THEN's).
         They are stored as bits (0's or 1's) in the flags register.
         We will most often use:

              zero => ZR/NZ (zero/not zero) - tells you whether an
                      instruction (such as subtraction) yielded a zero
                      as an answer
              sign => NG/PL (negative/positive) - tells you whether an
                      instruction yielded a positive or negative
                      number
              carry => CY/NC (carry/no carry) - tells you whether an
                      instruction needed to carry a bit (like in
                      addition, you carry a number over to the next
                      digit).  Various system (BIOS) functions use
                      this flag to denote an error.
              direction => DN/UP (decrement/increment) - tells a block
                      instruction to either move forward or backwards
                      in reads and writes

         Try changing some of these bits.  Type in "RF {enter}".  Then
         type in "DN {enter}" to change the direction flag to its
         decrement position.

         The Instructions
         ----------------

         MOV - move
         ----------
              Now we get to the actual instructions or commands that
         the CPU will use.  The first instruction you will see most
         often is the move instruction.  Its form is
         MOV {destination},{source}.  Let's try programming now.  Exit
         (q) and reenter debug again.  Now, type in "A {enter}".  You
         will see a bunch of number to the left.  You can think of
         these as line numbers.  Now type in "MOV AX,7A7A {enter}".
         Then type "MOV DX,AX" and so on until your program looks
         similar to the one below:  (type "U 100" to see)

         xxxx:0100 B8A77A         MOV    AX,7AA7
         xxxx:0103 89C2           MOV    DX,AX
         xxxx:0105 B90000         MOV    CX,0000
         xxxx:0108 88D1           MOV    CL,DL
         xxxx:010A 890E0005       MOV    [0500],CX
         xxxx:010E 8B160005       MOV    DX,[0500]
         xxxx:0112 BB0200         MOV    BX,0002


                                     Page 5





                                                   The Cracking Manual



         xxxx:0115 26A30005       MOV    ES:[0500],AX

         Press enter again until you see the "-" prompt again.  You
         are ready to run your first program.  Type "R {enter}" and
         note the values of the general purpose registers.  Then type
         in "T {enter}".  Debug will automatically display the
         registers after the execution of the instruction.  What is in

The Basics of Hacking- Introduction.txt

_______________________________________
_______________________________________
__                                   __
__   THE BASICS OF HACKING:  INTRO   __
__                                   __
_______________________________________
__  Uploaded by Elric of Imrryr      __
_______________________________________
_                                     _
_ THE FIRST OF A SET OF ARTICLES:     _
_ AN INTRODUCTION TO THE WORLD OF THE _
_ HACKER.  BASICS TO KNOW BEFORE DOING_
_ ANYTHING, ESSENTIAL TO YOUR CONTIN- _
_ UING CAREER AS ONE OF THE ELITE IN  _
_ THE COUNTRY...    

User's guide to avoiding virus infections Keeping an eye out for viruses

User's guide to avoiding virus infections
Keeping an eye out for viruses


Computer viruses are everywhere! This guide will show you how to stay alert and how to avoid getting infections on your computer. Having an updated virus scanner is only a small part of this, there are many ways that you can prevent having viruses other than a virus scanner, as it will not always save you.

The difference between DVD-R, DVD+R, DVD+RW and DVD-RW

The difference between DVD-R, DVD+R, DVD+RW and DVD-RW explained

There's DVD+R, DVD+RW, DVD-R, DVD-RW, and even DVD-ROM! So what's the difference between all of these different names, aren't all DVDs the same? Well, it's not quite that simple.

Let's first start with the most obvious difference: some have R and some have RW. The "R" stands for readable, while the "W" stands for writeable.

The main difference between DVD-R and DVD-RW, or DVD+R and DVD+RW is that the R disc formats can only be written to once, and then it is only readable and can’t be erased for the rest of its digital life. While RW discs are can be written to and erased many times, they are both readable and writeable.

"R" discs are perfect if they are only needed to be written to once, such as giving some files to a friend or transferring them between PCs. "RW" discs have their strength in the ability to be used many times over, which is great for routine system backups, etc. And naturally, the RW discs are slightly more expensive than the R discs, but you'll have to decide if the trade offs are worth the money.

Now, onto the difference between DVD-R and DVD+R. As I just described above, DVD-R & DVD-RW are sister discs, the difference being one is writeable once, while the other is writeable multiple times. The same thing is true for DVD+R & DVD+RW. So the question is, what's the difference between the plus and minus?

In order to explain this we must take a trip back in time. When DVDs were first being developed, there was no industry standard. Multiple companies were competing to develop what they hoped would be the dominant form of the future.

The DVD-R DVD+R difference can easily be summarized by the following:

    * The DVD-R/RW standard was developed by Pioneer, and is used primarily by Apple and Pioneer. These "minus" discs can only be written to in one layer on the discs surface. In addition, this format is supported by the DVD forum, but is in no way an industry standard. DVD-R/RW discs are cheaper than the "plus" format.
    * The DVD+R/RW format is supported by Philips, Dell, Sony, HP, and Mcft. These discs can be written to in multiple layers, giving them slightly better and more disc storage than the "minus" format. Because of this additional capacity, they are slightly more expensive than "minus" discs.

A couple final things to clear up is the difference between DVD-ROM and DVD+RW, or the other DVD formats I mentioned above. The DVD-ROM drive can only read DVDs, while the other DVD drives can read and write data to DVDs.

And naturally the DVD+RW CD+RW difference can be explained by the "DVD" or "CD" prefix. DVDs, on average, can store up to 4.7 GB of data, while a CD can only store about 700 MB of data, or about 15% of a DVD's capacity. While CDs are slightly cheaper, in my opinion, the benefits of DVDs are much greater.

So now that you've learned about the difference between DVD-R, DVD+R, DVD-RW, DVD+RW, and even DVD-ROM, which one is right for you? The easiest way to determine which is more beneficial is to watch the industry trends. A few years ago all pre-built computers were shipping with DVD-ROM drives. Today, most PCs have a burnable DVD drive.

I feel that the benefits of having a burnable DVD drive far outweigh any additional costs. They store much more data, and they are ideal for storing your home movies to watch on your DVD player.

My advice is to look at DVD burners that support all of the major formats I've mentioned above, DVD-R, DVD+R, DVD-RW, and DVD+RW. While a DVD drive that supports all of these formats may be slightly more expensive, it will allow you to use any type of DVD disc to burn to, and you'll be protected from any industry shifts to one format or the other.

Some Google Tricks

A few things you might want to try with Google:

Hand type the following prefixes and note their utility:

link:url Shows other pages with links to that url.

related:url same as "what's related" on serps.

site:domain restricts search results to the given domain.

Steps to Clean Install XP

  Steps to Clean Install XP

  If the above instructions for configuring your system to boot from  CD
  or you have acquired the necessary boot floppy/floppies; you can now
  boot the computer and follow the on screen prompts. Have your Product Key
  available, typical install is around 30 minutes. If setup seems to hang,
  wait at least 10 minutes + before restarting system. You should experience
  momentary screen blackouts.

Mobile Secret Codes:

Siemens Mobile Secret Codes:


C25:

SP unlock *#0003*(secret code 8 digits)#

*#0606# shows you Secret Code, but only without SIM Card.

*#06# for checking the IMEI (International Mobile Equipment Identity)

Resets language to automatic selection : * # 0000 # then Green button

Pin Out (electrical connections)

1- GND
2- SB
3- POWER
4- NC
5- TX
6- RX
7- CLOCK
8- DATA
9- GND MIC
10- HF MIC
11- AUDIO
12- GND AUDIO


Languages:

*#0000#+green phone - choose automaticaly
*#0001#+green phone - English
*#0030#+green phone - Greek
*#0031#+green phone - Netherlands
*#0032#+green phone - French
*#0034#+green phone - Spanish
*#0039#+green phone - Italian
*#0049#+green phone - German
*#0090#+green phone - Turkish

How to change PIN:

**04*old PIN*new PIN*new PIN#

How to check simlock status

*#0606# and then press left soft-key, you will see strange characters, then text ("brak blokad"). If you see for example 260-02, it means the phone is locked to Era GSM. In older models you can use *#06# and see the same information after clicking on left key (you will see IMEI and software version).


S4:

Monitor Mode - how to activate:

Press left soft-key, then 9 (SET UP) 8 (Phone Status). You will see IMEI number, then press left soft-key and in order 7684666 and red phone at the end (monitor mode has been activated). To read information from Monitor Mode - press left soft-key, then 5 (GSM SERVICE) and 6 (Monitor). Monitor mode turns off when you switch off the phone. You must activate it again if you want.

How to recover MOST of scratched CD data discs

I learn an old thecnique to how to recover damaged or scratched disks
with some lost of data. In this case i have one borrowed game - MAX PAYNE 2
with a chunck of 4 mb lost with a scratch in CD1 Install. Here we cover some
special thecniques of how to create a full working CD from the scratched one.

How To make your own Radio Station ...

How To make your own Radio Station ...

::Must HAVE Winamp (Any Version)::

First, things First your speed has to be at least 256/64 kbps (which means Dial-up users, will have alot of latency, just dnt bother)

Second, your going to have to have a domain, an updated one with the current i.p active. (Could be anything e.g. My sig)

How to make key generators?

Introduction
------------
I take no responsibility of the usage of this information.
This tutorial, is for educational knowledge ONLY.
Hi there, in this tutorial, I intend to teach you how to make a pretty
simple keygen, of a program called W3Filer 32 V1.1.3.
W3Filer is a pretty good web downloader...
I guess some of you might know the program.

How To Make An Animted Logo, the easy way

Things you will need:
QUOTE
1. Photoshop or Paintshop (any versions)
2. Xara3D 5.xx
3. Jasc animation shop 3.xx
4. DUH!! A pic you want as a logo LOL

Things you MIGHT need:
      1. a computer
      2. Internet connection
      3. consciousness

How do I overburn a CD with Nero?

Start Nero

From the action-bar select File and select Preferences.



In the Preferences window, select Expert Features(1) and check the Enable overburn disc-at-once(2).



Choose a Maximum CD Length(3) and click OK(4) (*82:59:59 is the maximum value I suggest, but as you

Guide For Getting Free Stuff

k, if you are like me you have heard so much about the FreeIpods and FreeFlatScreens websites on different forums, blogs, IM's, etc, you are about to puke. So am I. But yet the draw of getting an Ipod for doing basically nothing is pretty strong. I dismissed all the "stories" of people getting their ipods as the marketing machine at work. However, when Kevin Rose published that not only did he receive his, but a few of his friends did as well, I figured I might take a chance and give it a go. Today I received proof that it does indeed work. Yep, I got my iPod.

General Keyboard Shortcuts

General Keyboard Shortcuts
CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)

20 Great Google Secrets

Google is clearly the best general-purpose search engine on the Web (see

www.pcmag.com/searchengines

But most people don't use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google's index, it's still a struggle to pare results to a manageable number.