Wednesday, November 25, 2009

Pranav Mistry: The thrilling potential of 'SixthSense' technology

Hi guys,
        I received a mail from friend with this caption, I was wondering what this is all about? this video is amazing. You can find the video from the link given below:


Monday, November 23, 2009

Download Microsoft Office Professional Plus 2010

wow microsoft is offering microsoft office 2010 for free. Yes, it is true. The only thing is you would be the tester, as it is going to be the BETA version of the application. If you wish to test it as developer mode you can do it and just end user as well you can use

Developer download...

to know more.. the link is...

, , , , , , , , , ,

Monday, October 05, 2009

Resize Partitions with Vista Disk Management


In Windows Vista it is now possible to resize partitions without any data loss in the new Disk Management console.

Resizing Partitions with Windows Vista:

  1. Click on the Start Button and right click on Computer and select Manage.
  2. Expand the Storage section and select Disk Management.
  3. Then just right click on any partition and select either Expand or Shrink to change the size of the partition.

This will allow you to safely resize your partitions without any data loss.

Wednesday, September 23, 2009

Personas - Mozilla what do u wear?


The way to dress your browser everyday, it is just a plugin for the browser, you get lots of choice to make and dress your browser everyday differently by just click. The best thing about this feature is that even before you select a dress, you can scroll over and see the preview in your browser and then make a choice of yours....You can even create your own browser dress..Create your own.

Get Personas for Firefox

  • Install Now for Firefox 2.0.0.* – 3.0b2pre, Windows/Mac/Linux
    Compatible with the default themes that ship with Firefox

Wednesday, September 16, 2009

How do I get rid of W32 Gaobotwormgen u Win32 RBot 3euWorm


Please go to :

start > run > then in the open box Type in and enter the following


it will start the windows malicious software removal tool
do a full scan and you run a scan with malwarebytes . you can get malwarebytes here, this is a direct download link so you should have no trouble getting it. click on this link ↓ and then select run.… install it and then update it, then run a full scan and remove everything it finds. some viruses will try to disable it so if malwarebytes will not start up then go into the folder it is in and rename the mbam file to XXX then double click on the file you just renamed to start it up. After you have used malwarebytes then do this online scan.
to make sure you have nothing else hiding away.
preferably in safe mode with networking.

Windows Easy access command....


Maybe a little easier to remember and most commonly used:

Every .exe file can be launched via Start>Run. (.exe)

Any control panel item (.cpl)

access.cpl: Accessibility controls
appwiz.cpl: Add/Remove Programs
desk.cpl: Display properties
hdwwiz.cpl: Add hardware
inetcpl.cpl: Configure Internet Explorer and Internet properties
intl.cpl: Regional settings
joy.cpl: Game controllers
main.cpl: Mouse properties and settings
main.cpl,@1: Keyboard properties
mmsys.cpl: Sounds and Audio
ncpa.cpl: Network properties
nusrmgr.cpl: User accounts
powercfg.cpl: Power configuration
sysdm.cpl: System properties General
telephon.cpl: Phone and modem options
timedate.cpl: Date and time

Management consoles (.msc)

ciadv.msc: Indexing Service
compmgmt.msc: Computer Management Console
devmgmt.msc: Device Manager
dfrg.msc: Disk Defragmenter
diskmgmt.msc: Disk Management
gpedit.msc: Group Policy Editor. (XP Pro)
services.msc: services

Thursday, September 10, 2009

How to Activate Microsoft office 2007


Once Microsoft Office 2007 has been installed with no product key, proceed with the following steps:

  1. In Windows Explorer, brose to the following folder:

    C:\Program Files\Common Files\Microsoft Shared\OFFICE12\Office Setup Controller\Proof.en\

  2. Right click on Proof.XML file, select “Open With…” in the right click menu.
  3. In the “Open With” window, select Notepad to be used to open the XML file. In Vista, if you can’t see the Notepad option, simply double click the “Other Programs” to unhide it.
  4. Scroll down to the bottom of the Proof.XML to locate the following lines:

  5. Change the AlwaysInsalled to neverInstalled so that the line looks like following:

  6. Save the Proof.xml file. In Windows Vista, you may need to take ownership and grant full access permission to yourself before able to modify the file.
  7. You can now launch Microsoft Office 2007 application such as Word, Excel, Powerpoint, Outlook and etc without prompting for activation.
Even if these donot work:

1. Go to this location:

C:\Program Files\Common Files\Microsoft Shared\OFFICE12\Office Setup Controller\Proof.en\

2. Find the file named:

Proof.XML file

3. Then just rename the file to proof1.xml, before doing this make sure you have ownership for the folder completely, right click properties of the folder you can add your name and enter the rights(full rights). This will activate the product....

As usual, as it’s a hack, and before you purchase a valid product key for it, you won’t be able to AND can’t access any updates or Microsoft Office Online.

Disclaimer: This article is for educational and informational purpose only.

Technorati Tags: , , , , , , , , , ,

Monday, September 07, 2009

Unlocking an iPhone


If you’re one of the million people who’ve purchased an iPhone since the end of June, you probably signed up with Apple’s exclusive carrier in the U.S., AT&T, when you activated your phone. That means your iPhone identifies itself to AT&T’s network using an AT&T SIM card, a smart card that’s located in a small tray between your iPhone’s sleep/wake button and its recessed headphone jack.

But what if you’re planning a trip to Europe and rather than paying AT&T to use the networks of its European partners, you want to take advantage of the favorable rates and local phone numbers offered by replacing your AT&T SIM card with a pre-paid European card? Or what if you’d prefer to use T-Mobile as your cellular provider, rather than AT&T?

In the past month several groups have announced that they’ve found a way to “unlock” the iPhone, allowing it to use a SIM card from any provider. (Keep in mind that this is only half the story: the iPhone uses the GSM radio band for its communications, meaning that it’ll only work with providers that use the GSM network. In the U.S., that means T-Mobile and AT&T.)

In August, a group of hackers demonstrated a method for unlocking SIM cards and sold its software to resellers, who in turn began selling it to the public for as much as $100 last week.

But another group has came up with its own hack that, with the help of some free, open-source software, lets you unlock your iPhone in about an hour, free of charge. Below, I’ll show you how it works — and it does work, because I’ve used this technique to unlock my own phone. (One important caveat: Certain AT&T-only features, such as Visual Voicemail, will not work when you’re connected to other cellular networks.)

Before we get started, you’ll want to disable the iTunes helper application that may get in the way of the installation. Make sure iTunes is not running, then open OS X’s Activity Monitor in the Utilities folder of the Applications folder. Search for or scroll down to iTunes Helper, select it, and then click on the Quit Process button in the top left of the screen. You’ll also need your iPhone, your data cable, and a Wi-Fi connection to the Internet.

(If you haven’t already activated your iPhone with AT&T—and aren’t planning to—you need to conduct a fake activation. To do this, you’ll need to follow the excellent instructions at ModMyiPhone and download and install a program called iNdependence.)

Install AppTapp

Apple doesn’t support the installation of third-party applications on the iPhone, but the enterprising developers at NullRiver have created a program called AppTapp that will let you install including chat clients, games, and other pieces of software — including those that are needed to unlock your iPhone. (For more detailed instructions on using AppTapp, see our iPhone Hacking Kit.)

Download and install AppTapp. Once you run the program, the first thing it will do is ask what version of the firmware you’re running. If you’ve just updated your iPhone, you probably have Firmware 1.0.2—select that and click on Continue.

Assuming all goes well, you should get a screen that begins with the words: “Congratulations! You have successfully installed AppTapp Installer onto your iPhone.” You should then find a new application on the iPhone’s home screen called Installer.

The next instructions will require downloading some applications from the Internet to your iPhone—so make sure your iPhone is connected to a WiFi network. Launch the Installer program, and you’ll see a long list of various applications that you can install. Scroll down, then select and install—in order—Community Sources, BSD Subsystem and OpenSSH.

Perform the GSM Unlock

First, download and install, lockdownd, and Cyberduck.

Then go to the iPhone’s General settings and set Auto-Lock to Never. Next, you’ll need to get your iPhone’s IP address on your local network. To do this, go to Settings: Wi-Fi and click on the blue arrow next to the network that you’re connected too. Write down the IP address, as you’ll need it for later.

Now, open Cyberduck and click on the Open Connection button in the top left of the window. In the connection window, type the IP address that you just noted. Make sure that SFTP (SSH Secure File Transfer) is selected, and that you are using Port 22. For the username, type

, with the password of

Once connected, navigate from

to the main directory by choosing the
item. Next, navigate to
and drag the file named
(the one you downloaded earlier) into it. It will ask if you want to overwrite the existing file—click on Continue to do so.

Now, in Cyberduck, drag the Unlock file from the Mac’s desktop into the

folder at the top of the main window. Once that’s done, turn off your iPhone and remove the SIM card, then turn your iPhone back on and choose the application on your iPhone called Unlock.

Assuming everything went smoothly, there should be a white screen that says “All files found. Ready to go. Press Start.” Once you press start, it will take about 20 minutes for all the files to install.

The progress messages will appear at the top of the screen as it progress—once you see “Completed” then you’re finished. Insert a new SIM card of your choosing into your iPhone. Congratulations, you’ve just unlocked your iPhone!

(If you’re planning on using a T-Mobile SIM card in your iPhone, you’ll want to modify the iPhone’s settings. Follow the instructions at the bottom of the ModMyiPhone tutorial to make sure the settings you enter conform to your T-Mobile data plan.)

The aftermath

One Macworld editor tried this approach — minus the faux-activation step — on his iPhone and was able to insert a T-Mobile SIM card from a co-worker and get the iPhone up and running on the T-Mobile network, as if it were her phone.

(To swap SIM cards in your iPhone, insert an unfolded paper clip into the small hole in the top of the iPhone, next to the headphone jack. This will open the iPhone’s SIM card slot, allowing you to remove your AT&T card and replace it with a different one.)

We don’t know if future Apple iPhone updates will break this functionality. But if you’re about to embark on a European vacation, or if you avoid downloading those iPhone updates, this method will allow you to use the SIM cards of other cellular providers in your iPhone, provided that those providers also use the GSM cellular radio frequencies.


Technorati Tags: , , , , , , , , , , ,

Thursday, June 25, 2009

AVG LinkScanner real time

I have found this scanner a wonderful tool and i wish you folks would try it out. As it is free and the good news is it will not impact your current anti virus that is installed in your computer.Today's web threats don't just attack your computer, they get into major, everyday websites and then jump onto your PC to go after your identity, money, and digital valuables.
AVG Technologies today announced the release of AVG LinkScanner, a browser plug-in designed to keep users from accidentally visiting sites hosting malicious code and other dangerous sites. In addition to scanning web pages while you surf, AVG LinkScanner evaluates search results from Google, Yahoo, and MSN. For each link it adds an icon indicating whether or not the link is dangerous.LinkScanner looks similar to SiteAdvisor and Web of Trust.
LinkScanner download
How it works


, , , , , , , ,

Monday, June 15, 2009

4 Shared Free sharing

Hi Guys,
         This is pretty much very useful site, this gives you option to share your stuff with people and it also helps you to upload the file size of 5GB. You can do music,video,photos being uploaded to it.
If you love music and would like to listen to your favorite songs while browsing 4shared pages, we have really great news for you! Now you can create an unlimited number of music playlists, listen to them online and share them with others. This new feature lets you generate a playlist to listen to all audio files from a shared folder online. As you get to an audio file download page, take a look at the right area next to the number of downloads. In case the folder is shared you will be able to see the ‘Play all mp3s from the folder’ option there. Just click on it to enjoy beautiful music our new feature. By any chance, you might have any suggestions on how we can improve the new functionality. Of course, we are eager to hear your thoughs and make 4shared even more handy!

This is taken from the site :

Just drop us a line to to share your ideas with our Technical Support Team. Thanks in advance!Click here...Technorati Tags: , , , , , , , , , , ,

Saturday, June 13, 2009

Metin 2 - Oriental Action MMORPG

Step into an eastern fantasy world with picturesque towns and impressive landscapes.

Dangerous battles await you!Become a master of martial arts and protect the country from the dark influence of the Metin stones.Metin2 leads you into an eastern fantasy world. Become a master of martial arts and fight as ally of the Dragon God against the dark influence of the Metin Stones, which are poisoning the land. Fight in wild battles for one of the three empires, conquer their land and possessions or reunite them and become the new Emperor of the land. Your destiny is in your hands!


A big continent on which many adventurers and brave warriors are waiting.
  • Three enemy emperors which you are able to join.
  • Fight for territory and honour, on foot or on horse!
  • Become lord of a castle and build up your own fortress with your own guild!
  • Learn a martial art and get many destructive special skills!
  • To know more about this fantasy games... click here

  • GaneshKB

, , , , , ,

Enovy - Save your Lands

This is a beautiful game and it is very aggressive one of its time. SAVE YOUR LANDS, your properties and your lover now. You have to register to play this game, Click here...

Please do update your reviews, so it will be helpful for others to play...


, , , , , , ,

Hell Cops Online

Hell Cops on the way for fresh doughnuts. Crash cars, vans, trucks, run over pedestrians. Nothing can stop hell cops from completion of this important mission.

Online Game link:

, , , ,

Alien Wars -download free PC game

Welcome to the fantastic world of Alien Wars - a fantastic Vertical Scrolling Space Shooter.

Click to Download Free PC Game Alien Wars.

File Size: 6,9 Mb

, , , , ,

Gold Miner: Vegas download

Gold Miner is back with a brand new action adventure! He's setting his sights on Vegas. Can you help him achieve his dream?

With new levels, challenges and gadgets the action is bigger, brighter and more enjoyable than ever before.

You'll meet new characters, creatures and villains as you help our bearded friend mine enough gold to get him to Vegas. Play alone or with another player in this family-friendly gaming JACKPOT! Download


, , , , , , ,

Plants vs. Zombies download

Get ready to soil your plants! A mob of fun-loving zombies are invading your home, and your only defense is your arsenal of 49 zombie-zapping plants.

Use peashooters, wall-nuts, cherry bombs and more to slow down, confuse, weaken and mulchify 26 types of zombies before they can reach your front door! To know more, Click here... Limited features Download


, , , , , , ,

Wednesday, April 15, 2009

Popular PC-Dos Classic Games (before '90), A-G,

Popular PC-Dos Classic Games (before '90), A-G
Remember the old days....
Manual included. DosBox apps included (to emulate "the old 266Mhz" in your burnin GigaMhz PC's)


, , , , , , , ,

Thursday, March 26, 2009

32 Rapidshare Premium Accounts

Premium accounts free, i have not tried these but i got this link from a community. If you guys face any problem, just leave a message. I would check for the same and revert to you guys....

, , , , , , ,

ESET Smart Security & ESET NOD32 Antivirus 4.0.314 -2009

ESET Smart Security &

ESET NOD32 Antivirus

Version (4.0.314) - FULL - 2009

Activation Using: User name & Password /

Updated Daily

ESET Smart Security is a fully integrated security solution and includes antivirus, anti-spyware, a personal firewall and antispam. While some competitive solutions purport to have similar functionality, ESET has developed a unique approach that provides true and full integration of point security solutions. The key advantage of this approach is that individual protection modules are able to communicate together seamlessly, to create unparalleled synergy to improve the efficiency and effectiveness of protection. Moreover, the integrated architecture guarantees optimal utilization of system resources, so ESET Smart Security continues ESET’s well know reputation for providing rock solid security in a small footprint that will not slow down an individual’s computer.
Changes in ESET Smart Security 4.0:
* Firewall - Added support for UAC
* Export/Import of root SSL certificate to well known web browsers (Firefox, Opera, Internet Explorer)
* Windows Live Mail v14 (Beta) is supported also
* Added support for including external programs to iso image (recovery CD function)
* Added possibility to edit user-defined servers for update module
* Support of SSL on Microsoft Windows 2000 has been added
* Improved filtering of logs is available now(smart filtering)
* Support “Download Headers” mode in MS Outlook (Exchange, IMAP)
* Exclusions work for mapped network drives (there must be two exclusions: one for mapped path and one for UNC path)
* Added port for MSN (1863) in Firewall rules (local) settings available

, , , , , , , ,

Kaspersky Internet Security 2009

Kaspersky Internet Security 2009 v8.0.0.506 Full With Lasted Keys 100% Working !!
Updated On 20 Feb 2009




Kaspersky Internet Security 2009 – the all-in-one security solution that offers a worry-free computing environment for you and your family. Kaspersky Internet Security 2009 has everything you need for a safe and secure Internet experience.

Kaspersky Internet Security 8.0 – is a new line of Kaspersky Labs products, which is designed for the multi-tiered protection of personal computers. This product is based on in-house protection components, which are based on variety of technologies for maximum levels of user protection regardless of technical competencies. This product utilizes several technologies, which were jointly developed by Kaspersky Labs and other companies; part of them is implemented via online-services.
Our products for home and home office are specifically designed to provide hassle-free and quality protection against viruses, worms and other malicious programs, as well as hacker attacks, spam and spyware.

During product preparation several competitor offerings were considered and analyzed - firewalls, security suites systems, which position themselves as proactive in defence and HIPS systems. Combination of in-hosue innovative developments and results from analysis gathered through the industry allowed to jump onto a new level of protection for personal users, whereby offering even more hardened and less annoying computer protection from all types of electronic threats – malicious programs of different types, hacker attacks, spam mailings, program-root kits, phishing emails, advertisement popup windows etc..

Kaspersky Anti-Virus 2009 provides the basic tools needed to protect your PC. Essential Protection · Protects from viruses, Trojans and worms · Blocks spyware and adware · Scans files in real time (on access) and on demand · Scans email messages (regardless of email client) · Scans Internet traffic (regardless of browser) · Protects instant messengers · Provides proactive protection from unknown threats · Scans Java and Visual Basic scripts Preventive Protection · Scans operating system and installed applications for vulnerabilities · Analyzes and closes Internet Explorer vulnerabilities · Disables links to malware sites · Detects viruses based on the packers used to compress code · Global threat monitoring (Kaspersky Security Network) Advanced Protection & Recovery · The program can be installed on infected computers · Self-protection from being disabled or stopped · Restores correct system settings after removing malicious software · Tools for creating a rescue disk · Data & Identity Theft Protection · Disables links to fake (phishing) websites · Blocks all types of keyloggers Usability · Automatic configuration during installation · Wizards for common tasks · Visual reports with charts and diagrams · Alerts provide all the information necessary for informed user decisions · Automatic or interactive mode · Round-the-clock technical support · Automatic database updates

Essential Protection :
* Protects from all types of malware and spyware
* Scans files, email messages and Internet traffic
* Protects instant messengers (ICQ, MSN)
* Updates automatically
Extended Protection
* Two-way personal firewall
* Safe Wi-Fi and VPN connections. New!
* Intrusion prevention system
Preventive Protection
* Intelligent application management and control. New!
* Proactive protection from unknown threats
* Scans OS and applications for vulnerabilities. New!
* Disables links to malware sites. New!
Identity Theft Protection
* Disables links to phishing websites
* Virtual keyboard for safe entry of logins and passwords. New!
* Prevents theft of data via secure connections (HTTPS / SSL). New!
* Blocks unauthorized dial-up connections
Content Filtering
* Parental control
* Antispam protection


, , , , , , , ,

CyberLink DVD Suite 7 All in one Inc key

CyberLink DVD Suite 7 All in one Inc key

Home Entertainment

DVD Suite 7 is the answer for movie fans and video enthusiasts who love to watch the latest movies on Blu-ray Discs. Get the total entertainment experience from your PC with high quality movie playback, Dolby Digital and DTS audio support.
Remix your DVDs and create new stories based on existing movies, or simply express your creativity and opinions in unconventional ways.
Photos and Videos

DVD Suite 7 gives you total flexibility to achieve pro-like results in high-definition for videos and photos. Create stunning movies and add personal touches before outputting your projects to your medium of choice.
CYBERLINK EXCLUSIVE: Featuring a totally revamped edition of MediaShow, DVD Suite 7 allows you to effortlessly manage your photos and videos.
Data Backup and Burning

DVD Suite 7 delivers powerful yet simple tools to back up your valuable files using a wide selection of disc formats. Leverage discs as a hard disk-like storage device, and archive data on your PC.
Unlimited Online Resources

Access our online community, where you can share your passion for movies with others. Take your creativity to new heights with unlimited resources that you can download for your own video projects.
 <a href="" target="_blank"></a> <br /> <a href="" target="_blank"></a> <br /> <a href="" target="_blank"></a> <br /> <a href="" target="_blank"></a> <br /> <a href="" target="_blank"></a> <br /> <a href="" target="_blank"></a> <br /> <a href="" target="_blank"></a> <br /> <a href="" target="_blank"></a> <br /> <a href="" target="_blank"></a> <br /> <a href="" target="_blank"></a> <br /> <a href="" target="_blank"></a> <br /> <a href="" target="_blank"></a></pre> </div><font size="5"><font color="Red"><b>Password</b></font></font><br /><div style="margin: 5px 20px 20px;"> 	<div class="smallfont" style="margin-bottom: 2px;">Code:</div> 	<pre class="alt2" dir="ltr" style="border: 1px inset ; margin: 0px; padding: 6px; overflow: auto; width: 640px; height: 34px; text-align: left;">

System Requirements

Operating System
  • Microsoft Windows Vista and XP
Screen Resolution
  • 1024 X 768 pixels, 16-bit color or above
  • 512 MB required (1 GB or above recommended)
  • 2 GB DDR2 or above recommended for editing HD videos
Hard Disk Space
  • 5 GB required (400 MB for SmartSound Quicktrack Library)
  • 10 GB (20 GB recommended) for DVDs
  • 60 GB (100 GB recommended) for Blu-ray Discs
  • Pentium 4 2.2 GHz or AMD Athlon XP 2200+ for DVD quality MPEG-2
  • Pentium 4 2.4 GHz or AMD Athlon XP 2400+ for high quality MPEG-4 and streaming WMV, QuickTime, and Real Video
  • Pentium Core 2 DUO E6400 or Athlon 64 X2 5000+ for AVCHD and MPEG-2 HD (BD burning)
  • Higher than Intel 945 GM
  • 64 MB-VRAM or above
  • Some animation effects may be turned off or degraded for lower end graphics systems
Video Capturing Device
  • OHCI IEEE 1394 compliant device
  • PCI or USB 1.0/2.0 capture device compliant with WDM standard
  • DV camcorder connected via OHCI-compliant with IEEE 1394
  • DVD camcorder connected via USB 2.0
  • Sony MicroMV/AVCHD/HDV camcorder
Burning Device
  • A BD-RE burner is required to burn Blu-ray Discs
  • A DVD burner (DVD+R/RW or DVD-R/RW) is required to burn DVD/MiniDVD/AVCHD titles
  • A CD burner (CD-R/RW) is required to burn VCD/SVCD titles
  • A microphone is required for recording voice-overs
Internet Connection
  • Internet connection required for web services

Burnout Paradise(1 link)+Crack

        Burnout Paradise (formerly known as Burnout 5) by Criterion Games is the seventh game in the Burnout video game series. It was released in January 2008[2] for PlayStation 3 and Xbox 360 and on February 5, 2009 on Microsoft Windows. It was also released on the PlayStation Store in September 2008.[4] It has an open world set in the fictional Paradise City, with few loading times and few traditional online lobbies or game menus. The song "Paradise City" by Guns N' Roses is the game's title music and also featured on the in-game soundtrack.


1. Download the file below

2. Once your done, open it and run Setup

3. Click Install

4. Click on Next, not Install Trial
5.Enter the registration code and click "Next".

6.Once you have finished installing, open the "burnoutparadise crack fix" file you have downloaded.
"BurnoutParadise" is the crack. "burnoutparadise1001" is the patch.
The crack is also below

7.Go to the directory where you install the game. It should be in Programs Files in Electronic Arts folder.
There's a BurnoutParadise file which you will have to replace with the crack, the file you downloaded in Step 5).
Remember the crack is 42MB while the one you need to replace is 17MB.

8. Overwrite the Crack and replace burnoutparadise and you are now ready to play the game! Double click the "BurnoutParadise" to start the game.



L22A-LRVB-UHJ2-NUHF-8RLD <br />25MV-5S9Y-TSDD-LTSL-HRLD</pre> </div><font size="5"><b>Password</b></font><br /><div style="margin: 5px 20px 20px;"> 	<div class="smallfont" style="margin-bottom: 2px;">Code:</div> 	<pre class="alt2" dir="ltr" style="border: 1px inset ; margin: 0px; padding: 6px; overflow: auto; width: 640px; height: 34px; text-align: left;"><font color="red">jackalpunk</font>

, , , , , , , , , , ,


              I am back after a long gap. Things are not fine for me these days and had to build another machine for myself to get back things. So i am back now and soon, i will recover from my worst days as well. I HAVE HOPE TO REBUILD things, so i want you folks to pray for me and wish me to get back better.


Wednesday, January 21, 2009

Adventures of Robinson Crusoe (New Hidden Object)

Adventures of Robinson Crusoe | PC Game | Hidden Object Game Hidden
object treasure and mystery await you in this yet another exciting
adventure of Robinson Crusoe

System requirements: • Windows 2000, Windows XP, Windows Me, Windows
Vista • Memory: 64 MB • DirectX: 9 or later • CPU: P2 450 • Video: 3D
Accelerated Video Card • Language: English



, , , , , , ,

Virtual Villagers 2: The Lost Children


Follow two curious, determined villagers as they make their way into
the darkest recesses of the cave that had long taunted them. Plunge
with them into dazzling sunlight and mist, as a magnificent waterfall
at once cuts them off from their friends and family and brings them
face to face with ... children!

Virtual Villagers 2: The Lost Children challenges you in new ways to
care for this fledgling tribe as you discover even more secrets of
Isola. The unexpected awaits! Explore the western shore of Isola!



, , , , , , , , , ,

knight rider 2

Genre: Action/Adventure

Format: .iso

Size: 531 Mb

Minimum requirements:

S.O.: Win98/ME/2000/XP

· Processor: 700 MHz

· Memoria RAM: 256 MB

· VĂ­deo: 32 MB

*Mount the image using daemon tools


*paste the crack in the installation directory




, , , , , ,

Mario 2009 (35mb)

Learn different languages in 30 mint ( audio book)

This is an audiobook u can store it in ur Ipod and learn different languages

Learn french

Learn spanish

Learn swedish

Learn Russian

Learn portuguese

Learn Dutch

Learn chinese

Learn japanese


, , , , , , , ,

Sunday, January 18, 2009


Game :


Review :

Take to the centre court and smash your way to becoming the number one

seed on the world`s toughest pro tour. Stunning international venues, a

range of challenging singles and doubles tournaments and multiplayer

games modes. All this will have you coming back until you`re crowned the

world`s greatest.

Download :

</div><font color="black"><b>Password :</b></font> <br />
<div style="margin: 5px 20px 20px;">
<div class="smallfont" style="margin-bottom: 2px;">Code:</div>
<pre class="alt2" dir="ltr" style="border: 1px inset ; margin: 0px; padding: 6px; overflow: auto; width: 640px; height: 34px; text-align: left;">s7or4x

, , , , , , , ,

The Lord Of The Rings Conquest [2009] [ENG]

In this exciting, action strategy game, players fight on the side of both
Good and Evil in all the biggest battles from The Lord of the Rings movies.
The Battlefront format allows them to switch between characters at will, to
suit the circumstance or their style, reliving and even reinventing the
chaotic and engrossing conflicts from the films as they choose how best to
tackle their objectives and defeat their enemies. In online multiplayer,
gamers can choose to be Evil from the outset.

Code: RELEASE NAME....: The Lord Of The Rings Conquest-Razor1911
RELEASE DATE....: 13.01.2009
RELEASE SIZE....: 6,4 GB - 35 Files (Parts 200mb)
PROTECTION......: SR7+Serial+Activation
GAME TYPE.......: Action


Install Notes:
1. Extract RARs
2. Mount or Burn image
3. Install and use one of these serials or use keygen from Razor1911 dir
4. Copy Crack to your install folder
5. Play





, , , , , , ,

Saints Row 2 [2009] [ENG]

Saints Row 2 brings true freedom to open-world gaming. Players can play as
who they want, how they want, and with whomever they want in this sequel to
the much acclaimed and tremendously successful Saints Row. Set years after
the original, the player finds himself in a Stilwater both familiar and
strange and challenged with bringing the Saints back as the rightful kings of
Stilwater and bringing vengeance to those who wronged him.

RELEASE NAME....: Saints Row 2-Razor1911
RELEASE DATE....: 08.01.2009
RELEASE SIZE....: 6,8 GB - 37 Files (Parts 200mb)
PROTECTION......: Steam
GAME TYPE.......: Action


1. Extract RARs
2. Mount or Burn iso
3. Install using rzrsetup.exe on the disc, or run autorun
4. Copy Crack from the razor1911 dir over the installed files!!









, , , , , , ,

Mirrors Edge [2009] [ENG]

In a city where information is heavily monitored, agile couriers called
Runners transport sensitive data away from prying eyes. In this seemingly
utopian paradise, a crime has been committed, your sister has been framed
and now you are being hunted.

You are a Runner called Faith - and this innovative first-person action-
adventure is your story. Mirrors Edge delivers you straight into the shoes
of this unique heroine as she traverses the vertigo-inducing cityscape,
engaging in intense combat and fast paced chases. With a never before seen
sense of movement and perspective, you will be drawn into Faiths world.
A world that is visceral, immediate, and very dangerous. Live or die? Soar
or plummet? One thing is certain, in this city you will learn how to run.

Code: RELEASE NAME....: Mirrors Edge-RELOADED
RELEASE DATE....: 13.01.2009
RELEASE SIZE....: 6,1 GB - 33 Files (Parts 200mb)
PROTECTION......: Securom


1. Unrar.
2. Burn or mount the image.
3. Install the game.
4. Copy the content of the Crack dir to your installation folder.
5. Play the game.









, , , , , , , ,

Need for Speed: Undercover FULL RIP


OS: Windows XP/Vista
CPU: Pentium 4 3.2 Ghz or AMD Athlon 64 3500+
RAM: 1GB MB RAM or higher (Windows Vista requires 2 GB RAM)
HDD: 10 GB free disk space or more
Graphics: 256 MB or higher (Pixel Shader 3.0, PCIe only)
DirectX: Version 9.0c

RaR Pass


, , , , , , , , ,

Tuesday, January 13, 2009

The other Indo-Pak war. Are we Ready?

I read this article at, found it important. So sharing with you all...

Aasis Vinayak wears many hats. Author,
hacker, researcher and free software activist. He is also the developer
of V Language, a programming language which employs Artificial
Intelligence. In this exclusive column for, he argues that
even as India and Pakistan reiterate that war is not really an option,
the cyberwar between the two nations began long ago, and that India
seems less than prepared to fight it.

IronLogik> what's the address yer working on?

 t3k-9> hehehe. i'll probably get on or cnn.

IronLogik> just give me the url, I'm bored.


IronLogik> india? kewl.

t3k-9> yep. just use IRIX cgi-bin exploit.

IronLogik> irix? sweet.

t3k-9> hehehe. I already controlled the by way of backdoors now.

IronLogik> and that is? this a *nuclear* facility?

 t3k-9> yep.

IronLogik> double the pain :>)

t3k-9> it has top secret #@$%. I have the pw file, it has like 800 passwords.

IronLogik> thanks. i'll be there soon.

t3k-9> if you haxor it put like stop nuke testing and stuff.

IronLogik> on the web site? no problem.

t3k-9> bye got to go eat...

IronLogik> later.

is the transcript of the conversation between two hackers (I prefer the
word cracker) after successfully hacking the server of Bhabha Atomic
Research Centre (BARC) way back in 1998.  The two geeks were chatting
about their spare time activities in an IRC channel.

Joey (who
used the nick name t3k-9), was just a 15 year old 10th grade student.
On that afternoon, he pointed his browser to the old search engine,
Infoseek, and queried “.in atomic”.  One of the first sites to come up
was that of BARC.

`Time for offensive action`

He then used the John the Ripper DES Encryption Cracker software to
crack the login password. In fact, this software does the simple
dictionary operation by exploiting a phoney login mechanism. The
cruncher tried many probable mishmash of characters – ranging from a,
b, aa, bb, cc to complex combinations. To this, he added many other
special customised wordlists that he downloaded from the Net, for
better results.  

It took him just 45 seconds to break into the BARC server.  He looked
at the password: ANSI – a simple and elegant one. Now he had to log
into the system. Joey decided to try his luck by using the same
password, and stuck pay dirt.  Without wasting any time, he downloaded
all login names and passwords. He then created a back door through
which which he could login to the system even if the password was

His next target was the Web server. He went there, read some emails and
opened the attached files. But reams of matter about particle physics
didn’t interest him.  So he backed out, of course after erasing his
fingerprints in the site log.

It was only after this incident that India started taking network security issues seriously.

Why is Pakistan Indo-centric?

Ratko (IronLogik) , who was then 18, showed the government that its
classified and semi-classified data was anything but secure. The two
youngsters claimed to have acquired many classified documents
pertaining to the nuclear test conducted in May 1998.  Using a hacked
Internet account, Ratko migrated to different US/ European servers and
finally picked an IP, assigned to a Los Alamos-based system. These made
it extremely hard to track the original system. Once he got in, he
erased the administrator logs.

While most experts described this incident as a mere prank, it brutally
exposed the vulnerabilities in Indian network security. The leakage of
information on key strategic issues poses a major security threat, as
hackers can effortlessly read unencrypted emails and attachments and
electronically eavesdrop on mail conversations. The hackers/crackers
can also relocate all the data stored in the system, delete data or
send unauthorised mails to others that may tarnish the image of the
country. And by a logical extension, they can control any strategic
defence device attached to the network and exercise it against the

The BARC event heralded a new era of warfare, and the first phase
lasted from late 1997 to 2002. Hacker clubs owing allegiance to
either India or Pakistan formed networks. Pakistan’s ISI quickly
started ‘recruiting’ these hackers to attack many Indian sites. Infact,
PHC (Pakistan Hackers Club) and Gforce fought for Pakistan in the war.

Soon, in the third-quarter of 2002, the official website of the Andhra Pradesh Crime Investigation Department
(CID) - was reportedly hacked by pro-Pakistan hackers (the website was
again targeted on November 26, 2008). A self-proclaimed Indian hacker
group HMG, or ‘Guards of Hindustan’ fought on the ‘Indian’ side. These
groups ‘fought for websites’ to demonstrate their skills and establish
themselves. Finally it was reported that the Pakistani Groups settled
issues with NEO, an Indian hacker, and they decided to put an end to
the five-year-long-warfare.

Our military mess

But the war was restarted soon after, and continues to this day. Pakistan's
Oil & Gas Regulatory Authority's (OGRA) website was hacked by HMG’s
 ‘Indian script kiddie’ (November 17, 2008) A Pakistani Group
called PCA (Pakistan Cyber Army) struck back by hacking into 
India’s Oil
and Natural Gas Corporation
 (ONGC) website . These ‘black
hat’ hackers also vandalised four more Indian sites including the data
site of the Indian Institute of Remote Sensing
(that handles emails) and the Indian
Railway's data site
but thankfully they couldn’t do much damage
to the IIRS site.
They also attacked the Kendriya
(in Ratlam) site. Pakistan groups even targeted general
websites like  (which now carries a message posted byCyberSpy 5
– the hacking agent) After gaining control over the Kendriya Vidyalaya
website, the HMG posted an ‘advice' asking the site administrator to fix
the flaws. “Ur site was hacked by Pakistani hackers, now ur site is in
our Indian hackers' control,” was their message.

The Pakistani group also infiltrated into the server of the Bank of Baroda and Eastern Railway (www.eastern), and used it to ‘officially’ declare war.

“Cyber war has been declared on Indian cyberspace
by Whackerz- Pakistan (24 Dec-2008),” read the message. This was
followed by another note: “Indians hit hard by Zaid Hamid.”

Izzat and lessons unlearnt

But it is not just hackers from Pakistan that India has to
contend with. The website of The Bank of India, for instance, was
hacked and seeded with a wide array of malware that in turn attacked
visitors to the site. Tracing the source of an attack is a headache.
This may sound strange given reports of the police tracking down the
person who had sent intimidating emails to the President, or the person
who had sent abusive mail to a celebrity.

But the perpetrators are dissimilar. Professional hackers know the
tracing tools used by authorities and hence, use effective
countermeasures and opt for ‘the safest route’. When the Eastern
Railway website was attacked by planting a Trojan virus in the site
(which was done in retaliation to the alleged violation of Pakistani
airspace by Indian aircraft), ER officials tried to trace the route.
After numerous top-brass meetings, they could to only up
Toronto in Canada  before reaching a dead end.

There are also many ‘local hackers’ who intrude into high security
zones “for fun” or to expose their vulnerabilities. But this may aid
foreign agents to attack our servers.

Take the war to the enemy

Though many government sites have add-on firewalls and cyber security
certificates (ER has a certificate issue by US-based Thawte
consultation company), the attackers continue to get through. It was
not long before when Greek black hat hackers broke into the high
security zone of the CERN laboratory and vandalised the website of
Large Hadron Collider – LHC.

Apart from the dictionary attack mode, hackers can also use a SQL
(Structured Query Language) injection method where pages with active
content (like contact forms) are used. This is the most preferred
technique of Chinese hackers. For over two years (which lasted till the
first half of 2008), China mounted daily attacks on Indian computer
networks, both government and private. The methods adopted are so
sophisticated and varied that it is difficult to categorize them under
a generic head. Some of the major attacks whose roots were traced
to China targeted the NIC (National Informatics Centre), the National
Security Council, and the Ministry of External Affairs.

Pakistan: Thus far and no further

According to security experts, Chinese hackers are the acknowledged
experts in setting up BOTs - a parasite program embedded in a network,
which hijacks the networks and control the systems in the network-
which in turn are controlled by external agents.

As per official estimates, there are at least operational 50,000 BOTs
in Indian networks. The infiltrator usually also embeds some ‘mines’
which are essentially ‘key loggers’ capable of scanning devices and
processes. So the moment you hit a key on the keyboard, it will be
communicated to the ‘external agent’. They also use mapping (or
scanning networks) as a prerequisite.

Faced with this new threat, India's Research and Analysis Wing, as well
the Intelligence Bureau, took this new form of warfare seriously and
created a body to monitor network activity. In Pakistan, they use a
central routing device (a Cisco router) to monitor the traffic. But
in India, our mechanisms are multifaceted.

Why terrorists can relax in India

Anyone using computers is familiar with the words
malware and spyware. But hardly anyone discusses hackware that poses a
far serious threat to an increasingly networked world. A group of
security experts reviewed the networking tools after crackers broke
into the Bank of India server
(August 30, 2007).  In their report (a segment of which is available
here), they exposed the serious threats and the vulnerabilities in the
network security.

This is not just true for India. The entire world's
commercial and financial markets are intricately networked. The 2008
financial meltdown is a prime example of how quickly a domestic
economic crisis can impact the entire world.   

Much has been said about the War on terror.  But are we prepared to
deal with cyber-terror where faceless entities sitting in another
corner of the world can bring down or seriously compromise a nation's

Those who believe that nations like Pakistan lack the technical
know-how to initiate such acts, should read a recent article in Tehelka 
by Harinder Baweja. According to Baweja, who was taken on a conducted
tour of the madrasa at Muridke, Pakistan, the headquarters of the
Jamaat-ud-Dawa and believed to be the headquarters of the Lashkar-e-
Taiba, “The students who enroll in the school pay a fee while those who
study in the madarsa and pass out as masters in Islamic studies can
come for free. Learning English and Arabic from class one is
compulsory, as is a course in computers.”

The Chinese cyber attack on the Pentagon in June 2007 is another prime example.

Even as I was writing this piece, I learnt that the site had been attacked again, with visitors being redirected to a commercial website.

So, while India and Pakistan officially maintain that neither side
wants a war, the cyber war has been officially declared open.

Are we ready for it?

The author can be reached at 

The views expressed in the article are the author’s and not

, , , , , , , , , , , ,