Windows admin password

Reset Windows 7 Administrator Password

So what if you lost your administrator password and you are locked to log in to your computer well you should have the below live password cracking CD ready or follow the below steps to create one now.

Follow the below steps to Reset password now .:

1. Download the
Password Recovery Disk
2. After downloading the above recovery disk you have to burn it too a CD so that we can BOOT it up, to get started for the further process.
3. Now BOOT with your recovery disk and you will see some codes like below, if you are not able to BOOT directly than go to your BIOS OPTIONS and than choose BOOT CD Rom that’s it .:
4. Press Enter.
Reset Windows 7 Administrator Password
5. Watch the boot files load:
Reset Windows 7 Administrator Password
6. Select the partition where Windows is installed (usually 1.)
Reset Windows 7 Administrator Password
7. Press Enter to use the default Registry directory (unless you changed it, this will be right.)
Reset Windows 7 Administrator Password
8. Type 1 and press Enter.
Reset Windows 7 Administrator Password
9. Select Edit user data and passwords. [1]
Reset Windows 7 Administrator Password
10. Type the username of the account for which you want to change the password. i.e. Rich
Reset Windows 7 Administrator Password
11. I recommend you clear the password with option 1.
Reset Windows 7 Administrator Password
12. You will receive confirmation that your password is cleared. Now type the same username again and press Enter.
Reset Windows 7 Administrator Password
13. Choose option q to quit.
Reset Windows 7 Administrator Password
14. Save the files by typing y and pressing Enter.
Reset Windows 7 Administrator Password
15. Select n to quit.
Reset Windows 7 Administrator Password
16. Now restart your machine.
Reset Windows 7 Administrator Password
17. Wait for your machine to boot and login without a password.
Reset Windows 7 Administrator Password
Be sure to set a new password and don’t forget that this time.
Read more

FB Special Chat

Old Chat Client Experience on Facebook

Old Chat Client Experience on FacebookFacebook brought Video Calling and new chat sidebar which is good but ruins many happy faces as it disturbs many people so we are going to show you how you can chat in the easiest way like the old chat client.
So if you are one of them who do not like the new chat sidebar than you will be interested in this post so check it below .:
1. Go to Facebook.com and then sign in with your Username and Password.
2. Now click the below URL and the window will pop up which is the official Big Screen Chat Client from Facebook so now enjoy the chat in the old way like below .:

https://www.facebook.com/presence/popout.php

Old Chat Client Experience on Facebook
So as you can see in the above image the names are @ the left hand side the names are blurred due to some privacy you know so now you can enjoy this old chat experience and have fun with your friends.
Read more

FB theme for G+


Facebook theme for Google plus with Chrome browser 

Google Plus – New improved Social network site by Google is gaining great popularity from Facebook friends due to some positive review and word of mouth. We can also backup our Google Plus data using Google Takeout.Most of my Facebook friends are started to switch from Facebook to Google Plus. Google Plus invitation is the only thing stopping them to explore Google Plus.
Google Plus is now in beta stage and the user interface is very clean and simple. Many people liked it and some users who are very familiar with Facebook skin, buttons and color can switch their Google Plus profile into a Facebook Look a like. Facebook+ is a new extension for Google Chrome which transforms the look of Google+ and makes it similar to Facebook. Facebook+ is a simple extension to change some of the elements in Google+ to look like Facebook.
Facebook Style Theme for Google Plus

How to install Facebook Style Theme for Google Plus ?

Install Facebook+ Extension for Google Chrome Browser. After that just login into your Google Plus account. Google Plus UI will be changed like the above screenshot. Enjoy…Google Plus Social Exploring with Facebook UI Elements.
Read more

Angry Birds

Read more

FB app for Java phones

Facebook Launched ‘Every Phone’ App

http://www.watblog.com/wp-content/uploads/2010/02/facebook-mobile.jpg

Facebook is acknowledging the fact that everybody doesn’t own a smartphone in this world.So, to attract users with basic phones facebook has launched  Every Phone app.This application support more than 2500 phones.If you have a java enabled mobile phone then you should download this application.This app is specially optimized to use less data, it will use less internet then other applications that are currently available.This app provides access to almost complete features of Facebook.You can update your status,check notifications and messages,upload images and find friends.
facebook Facebook Launched ‘Every Phone’ App
They have also collaborated with many carriers across the world to provide free access to facebook using this app for 90 days.
The carriers that support free access to facebook are listed below

•   Aircel (India)
•   Airtel (India)
•   Banglalink (Bangladesh)
•   Beeline (Russia)
•   Celcom (Malaysia)
•   Etisalat (Egypt, Nigeria)
•   Globe (Philippines)
•   Idea (India)
•   O2 Telefonica (Germany)
•   Reliance (India)
•   Smart (Philippines)
•   Smartfren (Indonesia)
•   Telkomsel (Indonesia)
•   Three (Indonesia, United Kingdom)
•   TIM (Brazil)
•   TMN (Portugal)
•   Ufone (Pakistan)
•   Vodafone (Turkey)
How To Download Facebook for Every Phone App?
You can download Facebook for Every Phone App  directly in your mobile using the link given below (link won’t work in computers and laptops)
Download Facebook for Every Phone App
or
d.facebook.com/install (type this directly in your mobile browser),

 

Read more

G+ circles in FB

http://www.tech-wd.com/wd/wp-content/uploads/2011/07/Google-Plus-vs-Facebook-300x208.jpg

Make Facebook Account Like Google+ With Circle Hack

Google+ introduced the concept of using circles to organise friends.Now a new facebook application called Circle Hack has tried to copy this feature.It provides graphical interface like google+ circles with the Drag and drop feature.But the functionality provided by circle hack is limited as compared to
Google+.In google+ you can control who can see your update using the circles but in facebook this function cannot be performed by Circle hack instead you have to Control these settings from Privacy settings.
So, this Circle hack is nothing more than a convenient way to organise your friends in facebook groups.
circlehackpic1 5192149 Make Facebook Account Like Google+ With Circle Hack
How To Use Facebook Circle Hack?

  • Login into your Facebook Account
  • Now Open Facebook Circle Hack.
  • Click on the Login Button.It will ask you to grant permissions.
  • After Granting permission by click on Allow button you can see all your friends in the upper half of screen and circles at the bottom half.
  • Now you can create new groups by clicking on the Create List in the first circle.
  • After creating a group Drag and drop your friends from the upper half of the screen to circles.
There is also a funny trick to Hack facebook
Do share your views about Facebook circle hack Application!!,

 

Read more

Nokia formatting

NOKIA phones ways to format

 2 Easy ways to format your nokia phones and repair any problem related to its softwares

http://mrintech.com/wp-content/uploads/n73-music-edition-hard-format.PNG 

 

Method 1: Three Finger Reset for Nokia Phone


1. Switch off your Nokia phone.

2. Hold down the following three keys, Green (call answer button) * Key, and Number ‘3? key.

3. While holding these buttons, press the power button and switch on the phone.

4. Wait for message ‘Formatting’ to appear on the screen and release all keys once you see that message.



Method 2: Hard Format of Nokia Mobile Phone

 
1. Switch off your Nokia phone

2. Now Press following key sequence *#7370#

3. Enter Default lock code is 12345.

4. While holding these buttons, press the power button and switch on the phone.

5. Wait for message ‘Formatting’ to appear on the screen and release all keys once you see that message.

 

Read more

God mode

God mode enable control panel in computer desktop

 windows 7  has become the number one operating system by par. Its really user friendly and comes with alot of userfriendly addons. And in windows you can create a folder in god mode.
God mode is actually creating a master control panel listing all the options in your desktop, Its a great tool for any computer users
You can create god mode folder by following the steps below :-

1. Create a new folder (right click your mouse click new--> folder ) preferably you can create
colder in desktop itself for ease of use.

2.Rename the folder as:
godmode.{ED7BA470-8E54-465E-825C-99712043E01C}
(right click mouse in the folder-->rename)


3.After that the folder icon will change and you can have dozens of control options. 

Read more

Protect PC

Protect computer from virus easily

Computer viruses are deadly. They often spread without any apparent contact and can be a nuisance, or even worse, fatal to your computer. Individuals who create these viruses, estimated at 10-15 new ones a day, are the electronic version of terrorists. Their goal is to inflict havoc and destruction on as many people as possible by disabling, stealing, damaging, or destroying computer and information resources. Often, they have no specific target in mind, so no one is safe. If you access the internet, share files or your computer with others, or load anything from diskettes, CDs, or DVDs onto your computer, you are vulnerable to viruses.

Fortunately, there are good guys working just as hard as the hackers to develop cures for viruses as quickly as they send them off into cyberspace. And there are many things you can do to keep your computer from catching viruses in the first place.

Defining Viruses:

A virus is a small computer program that can copy and spread itself from one computer to another, with or without the help of the user. However, viruses typically do more than just be fruitful and multiply, which is bad enough in itself because it hogs system resources. Anything else viruses are programmed to do, from displaying annoying messages to destroying files, is called their payload. Often, they cannot deliver their payload until an unsuspecting user does something to make the virus execute its programmed function. This could be as simple as clicking on an innocent looking file attachment with the .exe (executable) extension.

Catching a Virus:

Most viruses are spread through e-mail attachments because it's the easiest way to do it. Although Macintosh, Unix, and Linux systems can catch viruses, hackers are particularly keen on exploiting the security weaknesses in anything Microsoft, particularly Microsoft Outlook and Outlook Express. Because of the popularity of this software, hackers get maximum bang for their buck, and they probably get some satisfaction from continually reminding Microsoft that being big doesn't mean you're perfect.

Solution 1: Anti-virus Software

Your first line of defense is to install anti-virus software. To be extra safe, also install firewall software, which is now included in some anti-virus packages. This software can scan all of your drives for viruses and neutralize them. Here are some features to consider when evaluating anti-virus software.

- Compatibility with your operating system - Make sure the software works with your system, particularly if you are using an older operating system like Windows 98.

- Firewall software - If it's not included, find out if it's available. If you must, buy it from another vendor.

- Automatic background protection - This means your software will constantly scan behind the scenes for infections and neutralize them as they appear. This provides some peace of mind.

- Automatic, frequent updates - Because new viruses appear every day, you'll want regular updates. It's even better if they occur automatically when you connect to the internet. If automatic updating isn't included, you'll have to check the vendor's website and download updates yourself. This is vitally important, because you will not be protected from new viruses if your software is out of date.

- Disaster recovery - Software with a recovery utility to help you get your system back to normal after a virus attack is always good to have.

- ICSA certification - The International Computer Security Associatioin has standards for the detection rates of anti-virus software. Make sure your software has the ICSA certification.

- Technical support - It's a good idea to select a package that offers free technical support, either online or through a toll-free number. If you're ever felled by a virus, you may need it. Some anti-virus software vendors are Symantec Corporation (Norton AntiVirus), McAfee Corporation (McAfee VirusScan), Trend Micro Inc. (PC-cillin), and Zone Labs Inc. (Zone Alarm Suite).

Solution 2: The Virus Scan

If you receive a particularly juicy attachment that you're dying to open, save it on your Windows desktop and run your anti-virus software on it first. To do this, click once gently on the file on your desktop ... don't actually open it ... then right click and choose Scan with (Name of Anti-Virus Software) to activate a virus scan.

If it's infected, your anti-virus software may neutralize it, or at least tell you the attachment is too dangerous to open. On the other hand, don't feel guilty if the very thought of saving a potentially damaging file anywhere on your system is enough to quell your eagerness to open it and make you delete it immediately.

Solution 3: Delete first, ask questions later.

When in doubt about the origin of an e-mail, the best thing to do is delete it without previewing or opening it. However, some viruses, such as Klez, propagate by fishing in people's address books and sending themselves from any contact they find to another random contact. You can spread a virus just by having people in your address book, even if you don't actually e-mail them anything. They'll receive it from someone else in your address book, which really makes life confusing. Because of the proliferation of porn on the internet, e-mail viruses often tempt victims by using sexual filenames, such as nudes.exe. Don't fall for it.

Solution 4: Beware of virus hoaxes

E-mails warning you about viruses are almost always hoaxes. You may be tempted to believe them because you typically receive them from well-meaning friends, who received them from friends, etc. These e-mails themselves usually aren't viruses, but some have actually fallen into the hands of hackers who loaded them with viruses and forwarded them merrily on their way as a sick joke.

The proliferation of e-mails about virus hoaxes can become nearly as bad as a real virus. Think about it, if you obey an e-mail that tells you to forward it to everyone in your address book, and they THEY do it, and this goes on long enough, you could bring the internet to its knees. If you ever want to verify a virus warning, your anti-virus vendor may have a list of hoaxes on it website. It's in the business of providing the fixes, so it will know which viruses are real.

Solution 5: Beware of filename extensions

The extension of a filename is the three characters that come after the dot. Windows now defaults to hiding filename extensions, but it isn't a good idea. Just being able to see a suspicious extension and deleting the file before opening it can save you from a virus infection.

To see filename extensions in all your directory listings, on the Windows XP desktop, click Start button | Control Panels | Folder Options | View Tab. Clear the check box for Hide extensions of known file types. Click Apply | OK. System files will still be hidden, but you'll be able to see extensions for all the files you need to be concerned with. Viruses often live on files with these extensions - .vbs, .shs, .pif, .Ink - and they are almost never legitimately used for attachments.

Solution 6: Disable the .shs extension

One dangerous extension you can easily disable is .shs. Windows won't recognize it and will alert you before attempting to open an .shs file. The extension is usually just used for "scrap object" files created in Word and Excell when you highlight text and drag it to the desktop for pasting into other documents. If this isn't something you ever do, or you have Word and Excell 2000 or later, which allow you to have 12 items on the Clipboard, click the Start button | Control Panel | Folder Options | File Types tab. Under Registered file types, scroll down and highlight the SHS extension. Click Delete | Yes | Apply | OK.

Solution 7: Dealing with double extensions

When you turn on your extensions in Windows, you'll be able to detect viruses that piggy-back themselves onto innocent looking files with a double extension, such as happybirthday.doc .exe. NEVER trust a file with a double extension - it goes against Nature.

Solution 8: Beware of unknown .exe files

A virus is a program that must be executed to do its dirty work, so it may have an .exe extension. Unfortunately, this is the same extension used by legitimate program files. So, don't panic if you find files named Word .exe or Excel .exe on your system - they're your Microsoft software. Just don't EVER open any file with an .exe extension if you don't know what the file's purpose is.

Solution 9: Watch out for icons

Viruses in attachment files have been known to assume the shape of familiar looking icons of text or picture files, like the wolf in the hen house. If you recieve an unexpected attachment, don't open it without first running it through your anti-virus software.

Solution 10: Don't download from public newgroups

What better place for a hacker to lurk and stick his virus than in the middle of a crowd? Sooner or later, someone's bound to download it and get the virus going. Don't download files and programs from newsgroups or bulletin boards, or open attachments sent from strangers in chatrooms ("Let's exchange pictures!") without first scanning with your anti-virus software.

Solution 11: Avoid bootleg software

This may seem like a no brainer, but sometimes that tiny price tag on a popular but expensive package can be too good to resist. Resist it! Likewise, be careful about accepting application software from others. You don't know where it's been, and what may have started out as a perfectly clean package could have become infected during installation on someone else's infected computer by virus.

Solution 12: Protect macros in MS Word, Excel, and Powerpoint

A common type of virus uses macros. Macros are sets of stored commands that users can save as shortcuts to perform long functions in just a few keystrokes. A macro virus may perform such mischief as changing file types from text files or spreadsheets into templates, locking up keyboards, and deleting files. Word, Excel, and PowerPoint come with macro virus protection. To make sure yours is activated, open each application, then click Tools menu | Macro | Security. On the Security Level tab, make sure Medium or High is selected. Clcik OK. If you are already infected with a macro virus, you may find that the steps of this procedure are unavailable becasue the virus has disabled them. In that event, run a virus scan on your system to see if your anti-virus software can kill the virus.

Solution 13: Use passwords

If you share your computer, it's a good idea to assign everyone a password. Passwords should be a combination of letters and numbers no less than eight characters long, and preferably nonsensical. Never write passwords and stick them anywhere near the computer. To assign passwords in Windows XP, click the Start button | Control Panel | User Accounts. Follow the prompts to assign/change passwords.

Solution 14: Update application software

Microsoft constantly issues patches for the security holes in its operating system and applications software. however, don't be lulled into complacency if you have Windows Update automatically checking things for you. Update checks for patches to repair bugs in the operating system, not for security problems. 

 

Read more

Proxy

Everything you needed to know about proxy servers in internet

proxy sites list
A proxy is a server that acts as a gateway between your computer and your destination (website, IRC chat, etc.). These proxy receive requests from users to view, for example, a web page in internet. The proxy will then forward the request to the internet, find your requested page, then send the web page back to you, the user. Most proxies come with a cache (sounds like “cash”) feature that saves former websites that were visited on that proxy. Think of cache as a proxy’s storage room. Each site that you make the proxy visit, it saves in its own storage area (cache). So if the user or someone else requests the same site again later on, the proxy will go back into its cache, find the web page and send it back to the user. This saves time because the proxy doesn’t have to go search the Internet for the web page. It just pulls the site out of its cache.

The use of proxies to stay anonymous is a favorite thing to do among people on the Internet who are either paranoid or just security conscious. The anonymity factor comes from the proxy’s ability to hide your true Internet address. For example, if I were to run a scan on your computer right now, I would get the Internet address that was given to you by your ISP (internet service provider), but if I were to scan you while you were using a proxy, then I would get the Internet address of the proxy server. Basically the whole proxy picture looks like this…

Read more

Hide Folders

How to superhide folders without softwares


It is a 100% safe and free method to hide a file or folder from others in your system without
using any application.For this ,open dos prompt and type:
For Hide:
X:\> attrib +a +r +s +h foldername /s /d [enter]
For unhide:
X:\> attrib -a -r -s -h foldername /s /d [enter]
X= x is location for our folder in hard disk.
Limitation:
If hide protected operating system option is uncheck in folder option, victim can see ur files
Read more