welcome

Click here

Friday, March 11, 2011

Remove every copy songs which are twice or thrice


         SAME SONGS TWICE OR THRICE IN UR PC...???









R U FRUSTRATED ON HAVING SAME SONGS TWICE OR THRICE IN UR PC...???

HERES ALL IN ONE ULTIMATE SOLUTION...






Duplicate File Remover is a powerful tool to locate file duplicates on your computer (dedupe). It scans the computer and lists duplicate files based on Byte for Byte Comparison, which ensures 100% accuracy. It can find duplicates of any files: text, binary, music, video or images. For multimedia files (MP3, OGG/Vorbis, WMA), the contents of the following tags can also be analyzed: "Artist", "Album", "Title" and "Comment". The file Summary property can also be searched: title, subject, category, and author. Duplicate files can be deleted, hard-linked, moved, or copied. The list of duplicate files can be sorted, exported to an HTML report, and acted upon.

DOWNLOAD IT (INCLUDING PATCH)

http://rapidshare.com/files/105256740/Duplicate_File_Remover_1.5.464_By_Lode.rar

Hangs up internet dial-up connection


Hangs up internet dial-up connection

When you are browsing your favorite websites using dial-up internet connection, your incoming calls can create problem with your modem if the call waiting option in your modem sittings is enable. Your modem may be hangs up and disconnects the internet connection frequently. Normally when you disabled the call waiting option in your modem sitting and any body tries to call you, he will get the busy beep during internet connected. You should always disable the call waiting option to avoid modem disconnectivity or hangs up.









To disable the call waiting option, first click on Start button, then Network Connections.

Here double click on your internet connection and click on Properties button then General.

Under General tab select Use Dialing Rules box then click on dialing rules button.





Here select My Location then click on Edit button. Under General tab select the option To disable call waiting dial and put any number in next box like *32.

At the end click on Ok button and dial your connection again.

Free Remote Computer Assistance Made Easy with AMMYY Admin


Free Remote Computer Assistance Made Easy with AMMYY Admin

Have you heard about a remote access software called ShowMyPC? No? Perhaps you've heard of Crossloop and TeamViewer? Well, they all share the same similarities which allows you to connect to another computer at a remote location dead easy without port forwarding configuration or finding out what is the IP address. The only thing that the 2 person involved in the remote access is to know the secret code in order to authorize the connection.


This kind of remote access software are meant for providing computer support to another person and not to connect to your home computer. Reason is there must always be another person over the other end to provide the password or allow the connection before it can connect. Just like LogMeIn Free, it is a very good remote access and desktop control software but for providing support, LogMeIn Rescue would be a more suitable tool.

Recently I discovered another free software called Ammyy Admin that can be used to easily connect to another remote computer to provide computer support without port forwarding and knowing the IP address of the other computer.


Ammyy Admin is a reliable and friendly tool for remote computer access. You can provide remote assistance, remote administration or remote teaching for your clients or employees regardless of their location. Ammyy Admin connects remote computers within seconds without any installation or configuration. You can view or control (using your keyboard and mouse) any applications running on the remote computers.

To get remotely access another computer, both end needs to download and run AMMY Admin. The computer that will be controlled is called the Client and the person who is remotely controlling another computer is called the Operator. The client will need to make sure that the Client tab is selected and then click the Start button.



If this is the first time that the client is using AMMYY Admin, it will automatically download a small 121KB target.zip file and drop the extracted target.dll in C:Documents and SettingsAll UsersApplication DataAMMYY. Then the client will need to give the operator the 4 digit ID.

The operator will then make sure that he is at the Operator tab, enter the client ID that he just received from the client and click Connect.



If this is the first time that the Operator is connecting to a client, AMMYY Admin will automatically download 125KB viewer.zip file and drop the extracted viewer.dll in C:Documents and SettingsAll UsersApplication DataAMMYY.

Before the operator gets to see and control the client's computer, the client will have to authorize the connection. It will show the operator ID that is connecting and the client has the power to enable/disable access to the file system and keyboard & mouse. If the client wants to do a demonstration or presentation to the operator, the client can just show the screen without allowing the operator to control the keyboard and mouse. Simply uncheck all the boxes and click Accept.



Once accepted, the operator can now control the remote computer. I think that AMMYY Admin uses VNC because the remote control interface and settings looked exactly like the open source VNC program.



Unlike Crossloop, Ammyy Admin can be used to administrate unattended servers or computers. Like I mentioned earlier, usually these kind of remote tools requires another person on the other end to accept or allow the remote connection but Ammy Admin has the capability to auto accept connection. ShowMyPC has this feature but it charges $5 per month for 1 PC. TeamViewer also has this feature and it is free.

Here's an easy tip to get a faster and smoother remote connection. Even if you have a high-speed internet connection given by your ISP faster than 1024Kb, it'd be better if you select Low-Speed < 256 Kb on the operator tab. The quality of the graphics will be lower but at least you'll get a smoother remote control experience. Ammyy Admin might not be the best remote computer access software but it's always good to have another alternative when Crossloop, TeamViewer and ShowMyPC doesn't work on the client's computer. AMMYY Admin is free and portable.

Most annoying page





fool your friends: most annoying page on internet
i know i knwo
its like 3 years old
but what the heck a joke is a joke try it

http://home.comcast.net/~wolfand/





Essential Bluetooth hacking tools







Bluetooth technology is great. No doubt. It provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires. However, despite its obvious benefits, it can also be a potential threat for the privacy and security of Bluetooth users (remember Paris Hilton?).If you want the best Bluetooth hacker java app, then refer to the Super Bluetooth Hack post If you are planning to gain a deeper understanding of Bluetooth security, y"ou will need a good set of tools with which to work. By familiarizing yourself with the following tools, you will not only gain a knowledge of the vulnerabilities inherent in Bluetooth-enabled devices, but you will also get a glimpse at how an attacker might exploit them.





This hack highlights the essential tools, mostly for the Linux platform, that can be used to search out and hack Bluetooth-enabled devices.

Discovering Bluetooth Devices

BlueScanner - BlueScanner searches out for Bluetooth-enabled devices. It will try to extract as much information as possible for each newly discovered device.
Download BlueScan.

BlueSniff - BlueSniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices. 
Download BlueSniff.

BTBrowser - Bluetooth Browser is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth-enabled devices. You can browse device information and all supported profiles and service records of each device. BTBrowser works on phones that supports JSR-82 - the Java Bluetooth specification. 
Download BTBrowser.

BTCrawler -BTCrawler is a scanner for Windows Mobile based devices. It scans for other devices in range and performs service query. It implements the BlueJacking and BlueSnarfing attacks. 
Download BTCrawler.

Hacking Bluetooth Devices

BlueBugger -BlueBugger exploits the BlueBug vulnerability. BlueBug is the name of a set of Bluetooth security holes found in some Bluetooth-enabled mobile phones. By exploiting those vulnerabilities, one can gain an unauthorized access to the phone-book, calls lists and other private information. 
Download BlueBugger.

CIHWB - Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Currently it only support some Bluetooth exploits and tools like BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack. 
Download CIHWB.

Bluediving - Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode. 
Download Bluediving.

Transient Bluetooth Environment Auditor - T-BEAR is a security-auditing platform for Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and various cracking tools. 
Download T-BEAR.

Bluesnarfer - Bluesnarfer will download the phone-book of any mobile device vulnerable to Bluesnarfing. 
Bluesnarfing is a serious security flow discovered in several Bluetooth-enabled mobile phones. If a mobile phone is vulnerable, it is possible to connect to the phone without alerting the owner, and gain access to restricted portions of the stored data. Download Bluesnarfer.

BTcrack - BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack aims to reconstruct the Passkey and the Link key from captured Pairing exchanges.
Download BTcrack.

Blooover II - Blooover II is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable. 
Download Blooover II.

BlueTest - BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices. 
Download BlueTest.

BTAudit - BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices. 
Download BTAuding. 

learn c programming

made by avi.......click here to download
its just 240kb





Take Your Favourite DVD Movies Wherever You Go - Without Carrying Any DVD

Take Your Favourite DVD Movies Wherever You Go - Without Carrying Any DVD

Looks like a tricky thing to say, however not only it is possible, but it is also easy and fast. I can imagine how astonished you are to read this, as much as I was when I knew what Extra DVD Ripper Express is able to do regarding such a task. A task that seems to be a job for professional video editors rather than someone like me who is only interested in taking his favourite DVD movies in a portable device when I travel without having to battle with a mess of DVDs.








Since 2004 Extra Corporation Senior Tech Team are striving to develop some of the most high quality and efficient digital video and DVD software. To achieve this goal, they designed a DVD transcoding and authoring technology which brings excellent performance features. On that basis lies the success of this video ripping solution that is able to satisfy the needs of beginners as well as expert users.

Extra DVD Ripper Express is a versatile DVD ripper application, it is extremely easy to use, and it will help you to convert DVD movies into almost every format including AVI, VCD, MPEG, and many other with no quality loss.






Aesthetics, Features & Functionality
A detailed look at the software will result in the appreciation of its interface which is as user friendly as it can be with no complicated menus or procedures at all, everything is right there in front of your eyes.

Another important feature is that you will be able to watch the movie while you are ripping it, you will also know exactly at which point of the conversion progress you are at any time. So, all you have to do is to select the DVD source, the outcome format and enjoy. Extra DVD Ripper Express will do the rest for you.



Extra DVD Ripper Express is able to ripp all your DVD movies to: AVI, DivX, XviD, VCD, SVCD, MPEG, Apple iPod, Apple iPhone, Apple TV MP4 Video file, Sony PSP MP4, Sony PS3 Video file,YouTube FLV Video file, RM RMVB Video file, WMV Video file, Microsoft Zune Player for WMV and MP4 Video file.



This amazing program guarantees the quality of both video and audio for the outcome thanks to its latest industry standard compression technology.



You will get a smaller file with virtually the same quality of the original, besides, you will have the choice of including any of the available subtitles and Audio tracks. NTSC and PAL video formats are supported.
Extra DVD Ripper Express offers you a lifetime FREE Technical Support, FREE upgrades and a 30-day money back guarantee along with your acquisition.



Finally
This stable and powerful DVD ripper tool is the result of more than a year of development and two years for beta testing and getting perfection at its finest expression. Nevertheless, they keep working continually in order to improve functionality through the incorporation of state-of-the-art technology. Satisfaction guaranteed!

Best Anti Virus, Anti Spyware, Firewall And Internet Browser

Best Anti Virus, Anti Spyware, Firewall And Internet Browser

I am a regular visitor of Yahoo Answers and in the free time I help others in Computer & Internet section. I usually see people asking for which is the best anti virus ?? Which is the best firewall ?? Which is the best package I should use for Internet Security ?? and alot of questions regarding Internet Security.








In the month of March I wrote a post about Internet Secutiy Tips. In that post I told you about how you can remain secure from vunerable attacks of viruses,spywares etc.

But I get alot of mails asking me about best Internet Security package.
By Internet Security Package I mean combination of 4 secutity applications :





>>Anti Virus Program
>>Anti Spyware Program
>>Firewall Program
>>Internet Browser Program

I am writing this post from my own experience. Till now I have used almost all anti virus, firewalls, anti spyware, so in this post I am going to tell you the best 2 Internet security packages I have ever used. I have divided these 2 packages according to the users computer speed i.e amount of RAM user have.

So let start :

For users having RAM more than 512 mb :

Best Anti Virus : Kaspersky Anti Virus
Best Anti Spyware : Super Anti Spyware
Best Firewall : Comodo Firewall
Best Internet Browser : Mozilla Firefox

For users having RAM less than 512 mb :

Best Anti Virus : Nod32 Anti Virus
Best Anti Virus : AVG Anti Virus or Super Anti Spyware
Best Firewall : Zone Alarm Firewall
Best Internet Browser : Mozilla Firefox

Top 10 Hackers of world

                                     Here is a list off the top 10 hacks of all time 

                                                          Early 1990s 
Kevin Mitnick, often incorrectly called by many as god of hackers, broke into the computer systems of the world's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Microsystems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering. 








November 2002Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a "fast-track extradition" to the US where he is a wanted man. The next hearing in the case is slated for today.

1995Russian computer geek Vladimir Levin effected what can easily be called The Italian Job online - he was the first person to hack into a bank to extract money. Early 1995, he hacked into Citibank and robbed $10 million. Interpol arrested him in the UK in 1995, after he had transferred money to his accounts in the US, Finland, Holland, Germany and Israel.

1990When a Los Angeles area radio station announced a contest that awarded a Porsche 944S2 for the 102nd caller, Kevin Poulsen took control of the entire city's telephone network, ensured he is the 102nd caller, and took away the Porsche beauty. He was arrested later that year and sentenced to three years in prison. He is currently a senior editor at Wired News.





1983Kevin Poulsen again. A little-known incident when Poulsen, then just a student, hacked into Arpanet, the precursor to the Internet was hacked into. Arpanet was a global network of computers, and Poulsen took advantage of a loophole in its architecture to gain temporary control of the US-wide network.

1996US hacker Timothy Lloyd planted six lines of malicious software code in the computer network of Omega Engineering which was a prime supplier of components for NASA and the US Navy. The code allowed a "logic bomb" to explode that deleted software running Omega's manufacturing operations. Omega lost $10 million due to the attack.

1988Twenty-three-year-old Cornell University graduate Robert Morris unleashed the first Internet worm on to the world. Morris released 99 lines of code to the internet as an experiment, but realised that his program infected machines as it went along. Computers crashed across the US and elsewhere. He was arrested and sentenced in 1990.

1999The Melissa virus was the first of its kind to wreak damage on a global scale. Written by David Smith (then 30), Melissa spread to more than 300 companies across the world completely destroying their computer networks. Damages reported amounted to nearly $400 million. Smith was arrested and sentenced to five years in prison.

2000MafiaBoy, whose real identity has been kept under wraps because he is a minor, hacked into some of the largest sites in the world, including eBay, Amazon and Yahoo between February 6 and Valentine's Day in 2000. He gained access to 75 computers in 52 networks, and ordered a Denial of Service attack on them. He was arrested in 2000.

1993They called themselves Masters of Deception, targeting US phone systems. The group hacked into the National Security Agency, AT&T, and Bank of America. It created a system that let them bypass long-distance phone call systems, and gain access to the pbx of major carriers.

How To Copy Movie from a Scratched CD

           How To Copy Movie from a Scratched CD 









How To Copy Movie from a Scratched CD

This is the most common problem, people encounter. They get a CD/DVD on rent and try to copy the movie. But alas, the CD is scratched, so after sometime, you get a cyclic redundency check error.

Well, things are not as hopeless as it seems. Here are few methods:

--[ONE ]-- Use Nero to create an image of the media. In most of the ways, this happens, so that you can later use Nero Image Drive to mount the CD and then view it.