You can find file of Rapidshare from google
Like if you want music so type in google
Code:
.cab OR .rar OR .zip OR .exe music site:rapidshare.de
you can find file frm any site like ths
You can find file of Rapidshare from google
Like if you want music so type in google
Code:
.cab OR .rar OR .zip OR .exe music site:rapidshare.de
you can find file frm any site like ths
Has it ever crossed your mind to use the editor to open a WAV file installed with Windows XP? Nobody will do that - that's what Microsoft probably thought. After all, countless WAV files are stored on a computer, and they are to be heard, not to be watched, right?
No, not exactly. Our colleagues over at Macwelt gave us the idea. We tried it and examined some WAV files that are stored on a drive with a newly installed Windows XP. And we made a stunning discovery. In fact, we didn't even have to search for very long, as coincidence lent us a helping hand. In the Windows system directory, we had our first find, in the directory
"Windows\Help\Tours\WindowsMediaPlayer\Audio\Wav".
Located there are exactly nine WAV files, with a size between 80 and 360 Kilobytes. They serve as background sound during the Windows Media Player Tour. When you open one of these files with the notepad, you at first only see scrambled letters. Of course, you think, it's a sound file, after all.
But things become interesting when you scroll down to the very bottom in notepad. Located there is a type of watermarking, which records the software that the Microsoft musician used to create the WAV files.
We found the following text there:
LISTB INFOICRD 2000-04-06 IENG Deepz0ne ISFT Sound Forge 4.5
At first, that sounds anything but spectacular. It seems as if the Microsoft musician or the freelance musician commissioned by Microsoft used the Sony-made software " Sound Forge " (formerly Sonic) in its 4.5 version. Sound Forge is a tool for professionals and enables users to create WAV, AIFF, MP3 and other music files priced at $400.
On its face, all that's not unusual: Microsoft uses professional software. Who would've thought? But wait a minute, who or what is "DeepzOne"?
Bingo!
DeepzOne is (or at least was) member of the Warez group Radium that had specialized on cracking music software. Along with a person using the alias "Sandor," he was also co-founder of this group, which was established in 1997( see in this interview ). In addition, it was DeepzOne who started circulating the cracked 4.5 version of Sound Forge a few years ago.
A few years back, the group "Radium" caused quite a stir. It cracked the original Fraunhofer MP3 codec in order improve the limited MP3 codec that comes along
with Microsoft. To listen to MP3s, the Windows codec was solid, but it offered only limited encoding functions. The Radium codec, by contrast, boasted an improved encoder (up to 320 Kbit/s). During this Warez release, then, the name DeepzOne" surfaced. But what is the name "DeepzOne" doing in nine WAV files in Windows XP? Nothing more than a coincidence? One has the suspicion that that the files were generated with the cracked version of Sound Forge 4.5. It's difficult to say whether Microsoft itself did that or one of the freelancers. Only the Redmond-based employees in charge of the Windows Media Player will know that for sure. It seems, though, as if someone wanted to get around filling out an investment order to buy a software worth $400.
The topic still raises a moral problem, though, as Microsoft is quick to report every oh-so-minor success in the fight against piracy. In the wake of that move, the company also joined the BSA (Business Software Alliance), which has devoted itself to the "fight against software piracy" and persecutes violaters around the globe. But maybe BSA knows which office door it should knock on
Microsoft has yet to issue a statement. It will be interesting to get the company's position on this issue.
Check the Source of information
Do you know that if your gmail a/c is 'gauravgehlot@gmail.com' thn gaurav.gehlot@gmail.com is same and GaUrAv.GeHloT@gmail.com is same as g.a.u.r.a.v.g.e.h.l.ot@gmail.com
Actually gmail server doesn't recognise DOT(.) character
And if you wanna to recognize someone you can gve him or her email address like dat gauravgehlot+rajat@gmail.com or gauravgehlot+rahul@gmail.com all email address are same as naumanrk@gmail.com.... but in +word you have the benifit that you can recognize your emailer or you can check whethere this email address is given by you personally or someelse has given your email address....
and friends if ur r using spaces after +say "gauravgehlot+how r u@gmail.com" this is wrong .... it goes like this "gauravgehlot+how+r+u@gmail.com"
And another name of ur mail account wd be
gaurav.gehlot@googlemail.com
this only works 4 gmail
So how do u like the trick...
leave comments..
As you all know, Yahoo! upgraded its features and the capacities of the mail accounts have grown to 250 MB. That's good for sure, but the "monitoring" methods that we all have been far too familiar with in the last couple of years have been renewed with this move also. Yahoo! is now keeping track of which sites its members that are getting into groups or using Yahoo! services are visiting and storing this data with a method called "Web Beacons". The aim is to give these statistics to the partner companies arranged by agreement and to improve the "advertisement guiding" function.
However, those who are bothered by this and do not want to be kept track of have still a choice. Yahoo! has hidden this option way deep inside somewhere but I'm declaring it here in case there are people who want it anyway:
1. Go to the address
CODEhttp://privacy.yahoo.com/privacy
and click the "Cookies" link under the "Special Topics" column.
2. Click the "Web Beacons" link under the "Reference Links" Column.
3. On this page, click the "click here to opt out" link toward the end of the third paragraph under the "Outside the Yahoo! Network" title.
4. After a while, a page that says you have been out of the monitoring program will load. Without doing anything, close that page or continue your usual surfing by typing another address in the address bar. (Do NOT click the "Cancel Opt-out" button, your action will be cancelled!)
5. You're done! Now Yahoo! will not record what you're doing during surfing.
You can let your friends that might be interested know about this; since no matter how "innocent" it may seem, it's still a violation of privacy
Tip 1: Hackers cover their tracks. Experienced hackers cover them more thorougly, but amateur hackers sometimes leave things behind. Don't expect them to leave any really big evidence behind; expect more of little things here and there you might find surprising. For example, if you're writing a term paper and a black hat hacker accidently saved it when he took a paragraph out- that's suspicious. Where did that paragraph go? Well, for one thing, now you know he was in that area. Check the folders surrounding the file- you might find something.
Tip 2: Decipher between the type of hackers that are attacking you. Experienced hackers will have a more in depth look around when they penetrate your system. They won't touch much because they know that that won't add too much to their knowledge. But if you know a hacker's been in, and some files are messed with, and you have a log of someone guessing passwords to a file or something of that sort, its probably some newbie who's just starting out. These are the easiest hackers to catch. They usually get so caught up in thoughts like "I'm in!" that they forget the basics, such as work behind a proxy.
My friend was setting up a webserver once. His first time too, and he wasn't to anxious to set up some good software to protect against hackers and viruses. He didn't put up one IDS, and before you know it, the obvious happened. But this time, a newbie had struck. The nice log files showed, bluntly across the screen, multiple instances of a foreign IP address that stood out. Some stupid newbie had tried to login as "uucp" on my friend's XP computer, with a password of "uucp." Well, that's great, but he also had tried the same user/pass combination three times, enough to get himself logged nicely. Even a semi-brainless user with some form of neurological system knows that uucp isn't a default XP account. Again, excitement toiled this hacker's brain, and maybe if he hadn't done that, along with a few other stupid things, he wouldn't have gotten caught. What other things did he do? Well, lets see. He openned 35 instances of MS-DOS. He tried to clean the printer's heads, and he edited a .gif in notepad. Then he uninstalled a few programs and installed some html editor, and replaced four files with the words "14P."
He might as well have posted his phone number. In a few days, we had tracked him down to a
suburban town in Ohio. We let him go, not pressing any charges, because he had done nothing really damaging and had provided me with an example of a moron for this guide.
Tip 3: Don't go crazy if you lose data. Chances are, if it was that important, you would have backed it up anyway. Most hackers nowadays wish they were back in 1989 when they could use a Black Box and having a Rainbow Book actually meant something. Most hackers aren't blackhat, they are whitehat, and some even greyhat. But in the end, most hackers that are in systems aren't satisfied by looking around. From past experiences, I have concluded that many hackers like to remember where've they been. So, what do they do? They either press delete here and there, or copy some files onto their systems. Stupid hackers (yes, there are plenty of stupid hackers) send files to e-mail addresses. Some free email companies will give you the IP of a certain e-mail address's user if you can prove that user has been notoriously hacking you. But most of the time, by the time you get the e-mail addy it's been unused for weeks if not months or years, and services like hotmail have already deleted it.
Tip 4: Save information! Any information that you get from a log file (proxy server IP, things like "14P", e-mail addresses that things were sent to, etc.) should be saved to a floppy disk (they're not floppy anymore, I wish I could get out of the habit of calling them that) incase there's a next time. If you get another attack, from the same proxy, or with similar e-mail addresses (e.g: one says Blackjack 123@something.whatever and the other says Black_jack_45@something.znn.com) you can make an assumption that these hackers are the same people. In that case, it would probably be worth the effort to resolve the IP using the proxy and do a traceroute. Pressing charges is recommended if this is a repeat offender.
Tip 5: Don't be stupid. If you've been hacked, take security to the next level. Hackers do talk about people they've hacked and they do post IPs and e-mail addresses. Proof? Take a look at Defcon Conventions. I've never gone to one, but I've seen the photos. The "Wall of Shame"-type of boards I've seen have IPs and e-mail addresses written all over them in fat red, dry-erase ink. Don't be the one to go searching the Defcon website and find your e-mail address posted on the Wall of Shame board!
Tip 6: Don't rely on luck. Chances are, sometime or another, you're going to be targeted for an attack. Here you can rely on luck. Maybe they'll forget? Maybe they don't know how to do it? If you think this way, a surprise is going to hit your face very hard. Another way you could stupidly rely on luck is by saying this: It's probably just a whitehat. On the contrary, my friend, it's probably just a blackhat. A blackhat with knowledge stored in his head, ready to be used as an ax. It's your data. You take the chance.
Extracting a sample movie from 1st part of rar set
1. Download the first part of the rar set.
2. Open the downloaded file with winrar.
3. Click on Extract.
4. U get a new window which shows the extract options.
5. Enter a path where u want to save the file.
6. Check the "Keep Broken Files" option on the miscellaneous frame and click on "OK".
7. Now go the path where u saved the file.
8. Observe that the file has been extracted.
9. Now u can use any standard player like "Windows Media Player" to watch the movie clip.
10. Some times some players do not read broken files.
11. If such thing happens u can download "Avi Preview" to watch this movie clip. This software is very good in reading broken files.
Here's something for broadband people that will really speed Firefox up:
1. Type "about:config" into the address bar and hit return. Scroll down and look for the following entries:
network.http.pipelining
network.http.proxy.pipelining
network.http.pipelining.maxrequests
Normally the browser will make one request to a web page at a time. When you enable pipelining it will make several at once, which really speeds up page loading.
2. Alter the entries as follows:
Set "network.http.pipelining" to "true"
Set "network.http.proxy.pipelining" to "true"
Set "network.http.pipelining.maxrequests" to some number like 30. This means it will make 30 requests at once.
3. Lastly right-click anywhere and select New-> Integer. Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before it acts on information it recieves.
If you're using a broadband connection you'll load pages 2-3 times faster now
How to Access Blocked Websites?
Blocking access to undesirable Web sites through the use of Internet protocol filters has been a common government tactic since commercial Internet access first became available here in 1995. China and Saudi Arabia are believed to extend greater censorship over the net than any other country in the world under the pretext of information control.
Most of the blacklisted sites in Saudi Arabia are either sexually explicit or about religion, women, health, drugs and pop culture. They even block access to websites about bathing suits. So if you want to buy something to swim in, they seem to treat that as if it were pornographic in Saudi Arabia.
In China, webites containing sexually explicit content were among those blocked, but they also included sites on sensitive topics such as Tibet, Taiwan, and dissident activity. China also blocks access to Google News, Typepad and Blogger hosted blogs.
But what if an innocent website is accidentally blocked by your ISP or your government. There are always legitimate reasons to visit these blocked websites. We have listed a few methods to help you access blocked websites in school, college, office or at home.
Approach 1: There are websites Anonymizer who fetch the blocked site/ page from their servers and display it to you. As far as the service provider is concerned you are viewing a page from Anonymizer and not the blocked site.
Approach 2: To access the blocked Web site. type the IP number instead of the URL in the address bar. But if the ISP software maps the IP address to the web server (reverse DNS lookup), the website will remain blocked.
Approach 3: Use a URL redirection service like tinyurl.com or snipurl.com. These domain forward services sometimes work as the address in the the url box remain the redirect url and do not change to the banned site.
Approach 4: Use Google Mobile Search. Google display the normal HTML pages as if you are viewing them on a mobile phone. During the translation, Google removes the javascript content and CSS scripts and breaks a longer page into several smaller pages. [link] View this website in Google Mobile
Approach 5: Enter the URL in Google or Yahoo search and then visit the cached copy of the page. To retrieve the page more quickly from Google's cache, click "Cached Text Only" while the browser is loading the page from cache.
Approach 6: A recent Oreilly story on accessing blocked websites suggested an approach to access restricted web sites using Google language tools service as a proxy server. Basically, you have Google translate your page from English to English (or whatever language you like). Assuming that Google isn’t blacklisted in your country or school, you should be able to access any site with this method. Visit this site via Google Proxy
Approach 7: Anonymous Surfing Surf the internet via a proxy server. A proxy server (or proxies) is a normal computer that hides the identity of computers on its network from the Internet. Which means that only the address of the proxy server is visible to the world and not of those computers that are using it to browse the Internet. Just visit the proxy server website with your Web browser and enter a URL (website address) in the form provided.
Introduction
Google Browser Sync for Firefox is an extension that continuously synchronizes your browser settings – including bookmarks, history, persistent cookies, and saved passwords – across your computers. It also allows you to restore open tabs and windows across different machines and browser sessions. For more info, please visit our FAQ.
Please note: Google Browser Sync must update your browser settings whenever you start Firefox. This will increase the start-up time of Firefox (the time between clicking on the Firefox icon and loading your start page) – please bear with us as we work to decrease this delay.
How to Use
To use Google Browser Sync, simply install and configure the extension on all computers for which you'd like your browser settings automatically kept in sync. Even if you only install Browser Sync on a single computer, you can use it to backup your browser settings and to restore your open tabs and windows across browser sessions.
Configuring your computers
After successfully downloading and installing the extension, then restarting your browser, you'll see a setup wizard. (Please note that you'll need a Google Account to complete the setup process; if you don't already have a Google Account, you can create one now.) The setup wizard will take you through a series of quick and easy steps. You'll need to choose which browser components you'd like to keep synchronized with your other computers (the standard install includes all possible components), and choose a PIN to protect your sensitive information.
Configuring your second computer is even easier. You only need to install the extension, log in with your Google Account username and password, and provide your PIN.
Day-to-day use
Google Browser Sync is completely automated. The settings you select at startup are automatically synchronized across each of the computers on which you install Browser Sync. You won't even need to log in every time you start the browser. You can change which browser components are being synced – or even stop the syncing process entirely – using the settings panel in the upper-right corner of the page. The settings panel also gives you access to your PIN.
http://www.google.com/tools/firefox/browsersync/
Install Extension : http://tools.google.com/firefox/browsersync/install.html
Lock Files without any locker
If u wanna lock a file with a password ...
u can do so using winrar..
Almost all archives support giving password, including WinZip, 7-Zip and it's not something special with WinRar.
Bt WinRar is more cmfrtble thn any other.
And if you are setting access like this, it is better you set the compression level to "Store", which will make the compression and decompression faster, since the main aim here is to set a password.
1)Right click on the file for which u want the password to b put.
2)Click on "Add to Archive".
3)Then go to Advanced tab.
4)Click on set password...choose ny passwd.
5)Click ok.
6)A winrar file with ur filename will be created.
7)Next u may delete the original file,as u have now compressed it with a password.
8)Any1 tryin to open the rar file wont be able to,unless he knows the passwd.
So, no need of folder lock software.
enjoy ur privacy guys....