Click Here For online Job Area

Wednesday, July 28, 2010

Download and Use New Indian Rupee Symbol Font



Now you can use new indian rupee symbol in ur pc...................
How to use ?




1. Download the above attached font Rupee.ttf or the new version Rupee_Foradian.ttf



2. Install the font. (It is easy. Just copy the font and paste it in "Fonts" folder in control panel)



3. Start using it. :)


Open ur Notepad or any text editor.......
then select the rupee font...
To use rupee symbol press "~" key...



Sunday, July 18, 2010

EPIC - The Indian Browser

the first-ever web browser for India made in India
the world's only antivirus browser
Sidebar Applications. 1500+ Apps. All Free.
Have more fun. Be more productive. Or both.

Built in Antivirus: Scan downloads automatically. Scan your system manually. Epic Kills any viruses it finds. Totally free.
Malicious Website Warnings: We'll warn you if you're about to visit a web site known to host viruses or malware.
Anti-Phishing Protection: A big, bolded domain so you know if you're at citibank.com or citiphishingsite.com.


1500+ Indian Themes and
Wallpapers.

Sunday, July 11, 2010

How to Hack an Ethernet ADSL Router

Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by a noob hacker just like you. In this post I will show you how to exploit a common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings and ISP login details.




Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in the Default username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later. This makes it possible for the attackers to gain unauthorized access and modify the router settings using a common set of default usernames and passwords. Here is how you can do it.



Before you proceed, you need the following tool in the proces


Angry IP Scanner


Here is a detailed information on how to exploit the vulnerability of an ADSL router.

Step-1: Go to www.whatismyipaddress.com. Once the page is loaded you will find your IP address. Note it down.



Step-2: Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.

Suppose your IP is 117.192.195.101, you can set the range something as 117.192.194.0 to 117.192.200.255 so that there exists atleast 200-300 IP addresses in the range.

Step-3: Go to Tools->Preferences and select the Ports tab. Under Port selection enter 80 (we need to scan for port 80). Now switch to the Display tab, select the option “Hosts with open ports only” and click on OK.

Step-4: Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open as shown in the below image

Step-5: Now copy any of the IP from the list, paste it in your browser’s address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the default username-password pair will be admin-admin or admin-password.




Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below.


If you do not succeed to gain access, select another IP from the list and repeat the step-5. Atleast 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.






What can an Attacker do by Gaining Access to the Router Settings?

By gaining access to the router settings, it is possible for an attacker to modify any of the router settings which results in the malfunction of the router. As a result the target user’s computer will be disconnected from the Internet. In the worst case the attacker can copy the ISP login details from the router to steal the Internet connection or play any kind of prank with the router settings. So the victim has to reconfigure the router in order to bring it back to action.






Safe Yourself:
If you are using an ADSL router to connect to the Internet, it is highly recommended that you immediately change your password to prevent any such attacks in the future. Who knows, you may be the next victim of such an attack.



Since the configuration varies from router to router, you need to contact your ISP for details on how to change the password for your model.

Tuesday, June 29, 2010

How to make undeletable folder in windows.

if we r going to make con name folder normally by click on new folder and then we give it name con then its name automatically changes to new folder...........
if u want to make con name folder then u have to go to command prmopt...
1.click on start
2.click on run and type command or cmd then enter,command prompt will ope.
now if we want to make folder in e drive then type

c:\>md\\.\e:\con

Now you are not able to delete  this folder directoly u have to delete it in command prompt...
 you have tp type

c:\>rd\\.\e:\con


thnx...............

Monday, June 7, 2010

Using BCC While Sending an Private Email

Almost every user on the Internet sends/receives hundreds of emails per day. However only a handful of them know what is BCC and what are the advantages of using BCC while sending an email. If you are one such Internet user who is unaware of BCC then this is the post that you should definitely read!






What is BCC?



BCC stands Blind Carbon Copy. It refers to the practice of sending an email to multiple recipients without disclosing the individual emails addresses. While sending the same email/message to multiple recipients, it is a common practice for most users to separate the email addresses by using comma or semi-colon and insert all those addresses in the To: filed. When emails are sent in this way, each receiver is able to see the complete list of recipient email addresses to which the same message if being sent to. Unlike To:, the BCC: option allows you to hide the recipients in email messages. In other words, when emails are sent using BCC:, the receiver will not be able to see the list of recipient email addresses. Thus using BCC is a smart way to protect the privacy of the recipients.





Why should you use BCC?



Here are the reasons for using BCC:



Privacy – BCC provides an easy and simple option for protecting the privacy of your recipients. Under many circumstances it is necessary for us send an email without letting the recipients know who else is receiving the same message. Also it is highly recommended that you use the BCC: while forwarding a joke or a funny email to a list of your friends. If you are sending email on behalf of a business or organization, it may be especially important to keep lists of clients, members, or associates confidential. So don’t forget to use BCC: in instances wherever privacy matters.



Respect for you recipients- While forwarding email messages, people often do not bother to remove the list of previous recipients. As a result, messages that are repeatedly sent to many recipients may contain long lists of email addresses. This makes it easy for the spammers to collect and target those emails for spamming.



In order to avoid the risk of spammers, it is necessary that you encourage people/friends to use BCC: while forwarding any message to you. This prevents your email address from appearing in other people’s inboxes thereby keeping yourself less exposed to spammers. You may also refer How to Protect an Email Account from SPAM for more information on spamming.





How to BCC an email message?



Most email clients provide the BCC: option under a few lines below the To: field. All you have to do is just enter the list of recipients in the BCC: field instead of entering in the To: field. You may enter only your own email address in the To: field. Once you do this just hit the Send button.



The moral is that you should use BCC: while sending bulk messages so as to protect the privacy of your recipients.

Tuesday, June 1, 2010

Docomo Unlimted GPRS Trick

Hi frnds,as u all know that docomo offers 10 mb for 1day(till midnight) in


5Rs.

So the trick is that just activate this service after 12am. and before 12.05am



To activate this service send msg gprs to 121 .

after that 5rs deduct on ur account and then chk ur gprs balance by

sending a msg bal to 121 .

its shows10 GB....(except 10 mb).





Yupp its true,I also used it since 30 days.....It means u got 10 Gb for 1

day(unlimitted)............... with 25-30 kbps speed





Remember one most important thing,

use TATA DOCOMO INTERNET setting not Dive_in ,otherwise ur

balance deduct.



For internet setting just send msg INTERNET to 52270 .



Or use Manual Setting:



A/c Name==TATA DOCOMO INTERNET

APN==TATA.DOCOMO.INTERNET

Proxy==0.0.0.0

Port==0

This Service automatically deactivate after 12am(midnight),so activate it again.........





Remember it's not a trick ,it's Server problem so get benefit before they solved..............





enjoy.


               OR


Tata Docomo Unlimited Free Gprs Browsing




Just Change your Home page to http://internet.tatadocomo.com.t9space.com/



and browse with this wap site

Monday, May 17, 2010

Free Rapidshare Premium Accounts and Megaupload premium accounts

hiiii frendz now m telling u how to make free Rapidshare of Megaupload account........
You have to do nothing big just join this site n refer to some frnds to join then u got unlimted acces to rapisdahe or megaupload.........


Click here to make free account

Saturday, May 1, 2010

How to access or Open Office 2007 files in Office 2003

Today m going to show you how to open Office 2007 files in Office 2003.You have to just install the software name as fileformatconverter.After installation this software when you open on Office 2007 file it converts automatically and open it in Office 2003.




Click Here To Download Software

Friday, April 30, 2010

How To Use Pen Drive as a RAM

HI.today i ma sharing the trick..how to use PEN DRIVE as RAM....In todays Days all have the PEN DRIVE...So it is easy way.....
  • First of all attach you pendrive to PC/Notebook.
  • Format your pendrive.
  • Then Name this Pendrive as RAM DRIVE.
  • NOW Go to the MY COMPUTER icon and right click on this and click on the properties.
  • System properties will opened.
  • Now select Advance Tab
  • Now click on the PERFORMANCE setting button.
  • A new window will open and select ADVANCED.
  • Now Click on the Virtual Memory Change button
  • Here select the RAM DRIVE(the name of pen drive which is given by us).
  • Now select Custom Size radio button.
  • Give the memory less than pendrive memory.for example:-for 1GB give 950MB in both Intial size and MAXIMUM SIZE.
  • Then click on set.
  • It takes 5-10mins to set
  • IT will RESTARTyour computer to change the effect.

Hope it will work for you...thnx...