helozzzzzz everyone ..

Here u can get some internet or OS tricks , pc and windows problems solutions••••

Hope u will like that••••


Search This Blog

Tuesday, May 31, 2011

Tips to get Maximum Performance from your P2P Softwares



1. Increase Download Speed

Do the following changes in the preference of uTorrent.
Go to Options>Preferences>Network
  1. Under ‘Port used for incomming connections’, enter any port number. It is best to use a port number above 10000. I use 33333.
  2. Randomize port each time utorrent starts: UNCHECKED. I leave this unchecked because I have a router. If you do not have a router or a firewall, and want extra security,check this option.
  3. Enable UPnP port mapping (Windows Xp or later only): UNCHECKED. I leave this unchecked because I have experienced it slowing down speeds. It is not needed if you manually port forward.
  4. Add utorrent to Windows Firewall exceptions (Windows XP SP2 or later only): UNCHECKED (do this only if you have windows firewall disabled)
  5. Global Maximum upload rate (kb/s): [0: unlimited]: 22 (for 256k connection)
  6. Protocol Encryption: ENABLED. I would recommend everyone to enable this. This can help increase speeds with many ISPs.
  7. Allow incoming Legacy Connections: CHECKED
Go to Options>Preferences>Torrents
  1. Global Maximum Number of Connections: 130 (for 256k connection)This number should not be set too low or the number of connections made to your torrents will be limited. Setting it too high may cause too much bandwidth to be used and can cause slowdowns.
  2. Maximum Number of connected peers per torrent: 70 (for 256k connection)If you see that the peers connected to a specific torrent are exactly this number, or very close, increase this number to improve speeds.
  3. Number of upload slots per torrent: 3 (for 256k connection)This depends on how much you want to upload to other users. Do not set too low or it may affect download speeds.
  4. Use additional upload slots if upload speed <90%: CHECKED
  5. Maximum number of active torrents: 2 (for 256k connection)
  6. Maximum number of active downloads: 1 (for 256k connection)
  7. Enable DHT Network: CHECKEDThis is recommended to be checked to improve speeds. More people will be available for sharing if this is checked.
  8. Enable DHT for new torrents: CHECKED
  9. Enable Peer Exchange: CHECKED
  10. Enable scrapping: CHECKED
  11. Pre-allocate all files: CHECKED
  12. Append .!ut to incomplete files: UNCHECKED
If you have a firewall
  1. Open up the options/preferences/settings for the firewall – usually your firewall will have an icon to click in the taskbar
  2. Look for the keywords “allow list” or “programs”
  3. Add the application you want to give access to the internet
  4. Make sure to save your settings when you are done
If you have a router
  1. Go to start>run>type cmd, press enter>type ipconfig, press enter
  2. Remember both your ip address and your default gateway
  3. Type in your default gateway into your default browser, a password prompt may come up. The default username and password are admin for my router
  4. Under ‘Applications’ fill out one line for each p2p client you use
  5. You need to use your ip address, the correct port range and set either tcp or udp
  6. You can find and change the ports in the actual p2p client’s settings, just make sure they are the same in the router
  7. Most p2p apps need both tcp and udp checked, if you are not sure check your p2p client’s FAQ
  8. Save your settings

2. Block Fake Peers

Anti-P2P organizations are actively polluting P2P networks with fake peers, which send out fake or corrupt data in order to waste bandwidth and slow down file transfers. At its worst, when downloading major copyrighted torrents, as much as a fourth of the peers you are connected to can be attributed to various Anti-P2P agencies. There is also a much more serious side to this. Once you’ve established a connection to one of these fake “peers”, your IP has been logged and will most likely be sent to the RIAA/MPAA.
But there is a way to fight back! If you are using the latest uTorrent, you can employ a little known feature called IP filtering. The author of uTorrent has gone out of his way to hide it, but it’s there nonetheless. But before we can activate this filter, we need to retrieve a list of currently known Anti-P2P organization IPs.
This is most easily done by downloading the latest blacklist from Bluetack (the same people who wrote SafePeer for the Azureus BT client).
This list is updated daily, and contains all known Anti-P2P organizations, trackers and peers, aswell as all known Goverment/Military IP addresses as collected by the Bluetack team. Once downloaded, extract and rename the file to “ipfilter.dat” in preparation for the final step.
To make the list available to uTorrent, you need to put it in %AppData%\uTorrent\. So type this into the Address Bar, or click Start -> Run and type it there. After placing the ipfilter.dat in this folder, start uTorrent and go into preferences (Ctrl+P), then click on “Advanced”. In the right hand pane, make sure that “ipfilter.enable” is set to true, and then close the dialog. That’s it for the configuration.
You can verify that the list has been loaded by looking under the “Logging” tab of uTorrent, where you should see the line “Loaded ipfilter.dat (X entries)”.

Friday, May 13, 2011

Hack administrators password through guest login

Learn to hack administrators password through guest login
Ever wanted to hack your college pc with guest account/student account so that you can download with full speed Hack Administrator !!!!there ? or just wanted to hack your friend’s PC to make him gawk when you tell your success story of hacking ? well,there is a great way of hacking an administrator account from a guest account by which you can reset the administrator password and getting all the privilages an administrator enjoys on windows..Interested ? read on...

Concept:

Press shift key 5 times and the sticky key dialog shows up.This works even at the logon screen. But If we replace the sethc.exe which is responsible for the sticky key dialog,with cmd.exe, and then call sethc.exe by pressing shift key 5 times at logon screen,we will get a command prompt with administrator privilages because no user has logged on. From there we can hack the administrator password,even from a guest account.
Prerequisites
Guest account with write access to system 32.


Procedure To Hack windows XP administrator Password

Method 1 (Change Admin Password)

Here is how to do that -

1.Go to 
C:/windows/system32

2.Copy cmd.exe and paste it on desktop

3.Rename 
cmd.exe to sethc.exe

4.Copy the new sethc.exe to system 32,when windows asks for overwriting the file,then click yes.

5.Now Log out from your guest account and at the user select window,press shift key 5 times.

6.nstead of Sticky Key confirmation dialog,command prompt with full administrator privileges will open.

7.Now type “ 
NET USER ADMINISTRATOR aaa" where “aaa" can be any password you like and press enter.

8.You will see “ The Command completed successfully" and then exit the command prompt and login into
administrator with your new password.

9.Congrats You have 
hacked admin through guest account.Method 2 (Access admin without changing password)

Also, you can further create a new user at the command prompt by typing “NET USERHow to hack /ADD" where "
 How to hack" is the username you would like to add with administrator privileges. Then hide your newly created admin account by -

Go to 
registry editor and navigate to this key



HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList


Here create a new "
 DWORD value", write its name as the “How to hack" (the username that you entered in the previous step),now you can live with your admin account forever :)

Install Media Player 11 on Pirated Windows

Windows media player 11 offers you great ways to store and enjoy all your music, video andpictures along with its new cool look.However if you do not have a geniune pack of windows service pack 2 you will not be able to run and install windows media player.
Here are the steps to Install windows media player 11 in priated windows

1. Download Windows Media Player 11.0 (make sure its the final and latest version, not beta) from the Microsoft Site.
2. Extract the downloaded Windows Media Player setup file (wmp11-windowsxp-x86-enu.exe) using WinRAR to a directory (wmp11-windowsxp-x86-enu). Now make sure you have a “LegitLibM.dll” file in the extracted “wmp11-windowsxp-x86-enu” folder.

3.Download the patched LegitLibM.dll and then copy-paste it to the “wmp11-windowsxp-x86-enu” folder and click yes when asked to overwrite.


4. Now run “setup_wm.exe” file in the “wmp11-windowsxp-x86-enu” folder.
5.Restart your PC, then run your Windows Media Player and you are done! 

Tuesday, May 10, 2011

How to Change the Position of Control Buttons in Ubuntu

As you know that in windows the control button like maximize, minimize and close are at right side of window but in ubuntu these are at left side, so today i will show you a small trick to take these buttons to right.
Follow my steps:
1. Press Alt+F2 to bring up “Run Application” window.
2. Now, Type gconf-editor into the box like this:
3. Click “Run” to bring up Configuration Editor in front of you.
4. Browse to apps > metacity > general, look for “button_layout” on the right panel.
5. Change the value in the “button_layout”
from close,minimize,maximize:
to menu:minimize,maximize,close and press the Enter key.

Linux kernel 2.6.38.6 ( stable) has been released !

Linux kernel 2.6.38.6 ( stable) has been released !


The latest -Stable kernel has been raised again after Greg released a new version : 2.6.38.6. This is a maintenance update, so no new feature are included, only bug fixes and minor changes. Even though Greg urges users to upgrade to this version, it's wiser to look at the ChangeLog to decide whether you really need to upgrade to this version or not.

Personally, i don't really see any important updates in this release, so if you have no problem with your current kernel (2.6.38.x series), you can stay with it until 2.6.39 comes up in probably a week or two.


Download : http://www.kernel.org/


Friday, May 6, 2011

4 Ways to Identify Safe Websites on the Internet


On the whole Internet, there are approximately more than 150 million active websites up and running. As a result, it often becomes a real challenge for the users to identify safe websites that are trustworthy and reputed. Have you ever wondered to know the reputation of a website before placing the order? Need to know whether a given website is child safe? Well, here are some of the ways to identify safe websites on the Web.
 
1. WOT or Web Of Trust (www.mywot.com):
WOT is a great place to test the reputation of your favorite website. WOT gives real-time ratings for every website based on the feedback that it gets from millions of trustworthy users across the globe and trusted sources, such as phishing and malware blacklists. Each domain name is evaluated based on this data and ratings are applied to them accordingly. 
As shown in the above snapshot, the reputation of each website is shown in terms of 4 components where green means excellent, yellow warns users to be cautious and red indicates potential danger.
 
Trustworthiness signifies the overall safety of the website. A poor rating may indicate that the site is associated with threats like Internet scams, phishing, identity theft risks and malware.
 
Vendor reliability tells you whether a given site is safe for carrying out buy and sell transactions with it. An excellent rating indicates superior customer satisfaction while a poor rating indicates possible scam or bad shopping experience.
 
Privacy indicates about “to what extent the site respects the privacy of it’s users and protects their personal identity and data”.
 
Child Safety indicates whether the content of a given site is appropriate for children. Site contents like sexual material, nudity and vulgarity will have a poor Child Safety rating.
 
In most cases, the WOT ratings are found to be highly accurate. To check the reputation of any given website, just visit www.mywot.com type-in the address of your favorite website and click on “Check now”. This tool alone can tell you a lot about the reputation and safety level of a website. However, in addition to this, I am giving you another 3 handy tools [...]



Thursday, May 5, 2011

Create an Apple ID in iTunes Account Without a Credit Card


iTunes: People often get confused when they go to create an Apple ID in iTunes, only to find that a credit card is required to proceed (even if they weren't planning on purchasing any apps). Oddly enough, whether or not iTunes will give the option to choose "None" for a credit card will depend on how the account is created.

There are two ways to create an Apple ID in iTunes. The main way is to actually click "Create Account" in the Store menu, which is what most people tend to do. If you do it this way, you won't see "None" listed in the payment options—you have to choose a method of payment to proceed.
The second way to get to the very same account creation walkthrough is to try installing a completely free app while not signed into an account. There's just one thing that's different if you do it this way; there's an option for "None" at the end of the payment methods.
This method works in both iTunes and the Mac App Store when trying to create a U.S. Apple ID.

Tuesday, May 3, 2011

How to Identify and Avoid Phishing Scams



Phishing is a form of social engineering technique used by hackers to gather sensitive information such as usernames, passwords and credit card details by posing as a trustworty person/organization. Since most online users are unaware of the techniques used in carrying out a phishing attack, they often fall victims and hence, phishing can be very effective.
With the dramatic increase in the number of phishing scams in the recent years, there has also been a steady rise in the number of people being victimized. Lack of awareness among the people is the prime reason behind such attacks. This article will try to create awareness and educate the users about such online scams and frauds.
Phishing scams usually sends an email message to users requesting for their personal information, or redirects them to a website where they are required to enter thier personal information. Here are some of the tips that can be used to identify various phishing techniques and stay away from it.

Identifying a Phishing Scam

1. Beware of emails that demand for an urgent response from your side. Some of the examples are:
  • You may receive an email which appears to have come from your bank or financial organization stating that “your bank account is limited due to an unauthorized activity. Please verify your account asap so as to avoid permanant suspension”. In most cases, you are requested to follow a link (URL) that takes you to spoofed webpage (similar to your bank website) and enter your login details over there.
  • In some cases, phishing emails may ask you to make a phone call. There may be a person or an audio response waiting on the other side of the phone to take away your credit cards details, account number, social security number or other valuable data.
2. Phishing emails are generally not personalized. Since they target a lagre number of online users, they usually use generalized texts like “Dear valued customer”, “Dear Paypal user” etc. to address you. However, some phishing emails can be an exception to this rule.
3. When you click on the links contained in a phishing email, you will most likely be taken to a spoofed webpage with official logos and information that looks exactly same as that of the original webpages of your bank or financial organization. Pay attention to the URL of a website before you enter any of your personal information over there. Even though malicious websites look identical to the legitimate site, it often uses a different domain or variation in the spelling. For example, instead of paypal.com, a phishing website may use different addresses such as:

  • papyal.com
  • paypal.org
  • verify-paypal.com
  • xyz.com/paypal/verify-account/
 

Tips to Avoid Being a Victim of Phishing

 
1. Do not respond to suspicious emails that ask you to give your personal information. If you are unsure whether an email request is legitimate, verify the same by calling the respective bank/company. Always use the telephone numbers printed on your bank records or statements and not those mentioned in the suspicious email.
2. Don’t use the links in an email, instant messenger or chat conversation to enter a website. Instead, always type the URL of the website on your browser’s address bar to get into a website.
3. Legitimate websites always use a secure connection (https://) on those pages which are intended to gather sensitive data such as usernames and passwords, account numbers or credic card details. You will see a lock icon Picture of the Lock icon in your browser’s address bar which indicates a secure connection. On some websites like paypal.com which uses an extended validation certificate, the address bar turns GREEN as shown below.
In most cases, unlike a legitimate website, a phishing website or a spoofed webpage will not use a secure connection and does not show up the lock icon. So, absence of such security features can be a clear indication of phishing attack. Always double-check the security features of the webpage before entering any of your personal information.
4. Always use a good antivirus software, firewall and email filters to filter the unwanted traffic. Also ensure that your browser is up-to-date with the necessary patches being applied.
5. Report a “phishing attack” or “spoofed emails” to the following groups so as to stop such attacks from spreading all over the Internet:
You can directly send an email to spam@uce.gov orreportphishing@antiphishing.org reporting an attack. You can also notify the Internet Crime Complaint Center of the FBI by filing a complaint on their website: www.ic3.gov.