How to use Windows 7 without activation


How to use Windows 7 without activation

Hi do you know that it is possible to use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately 1 year! Here is a way to Use windows 7 without activation.
Read more »

Access Any Website Or Forum Without Registering [COMPLETE]

[TUT] How to acces sites/forums without registering [COMPLETE]

Access Any Website Or Forum Without Registering
Let's come straight to the point !

Visit any forum or website to find something useful and they will ask you to register. Every time a forum asks me to register, I simply close the site. You would probably do the same. But this time, lets face it.

Before I begin, you should know how things work. All websites and forums will block unregistered users, but they won’t block Google Bot. What we will do is to switch our User Agent to that of Google Bot and freely browse any website or forum without registering.

First grab the add-on for Firefox called ‘user agentHere and install it. Now go to Tools > User Agent Switcher > Options and then again to Options.

user agent switcher options

Select User Agent from the left sidebar and click Add. Now in the description field type:

and in user agent field type:
Googlebot/2.1 (+

as shown in the screenshot below.

adding a new user agent

Select Google Bot as your User Script by going to Tools > User Agent Switcher.

selecting google bot as user agent.

Now browse any website or forum without registering. Enjoy!

How to secure your wireless router


How to secure your wireless router

This is step by step on how to secure your wireless router
Connect your wireless router per the instructions in your user manual.

Open your Internet browser and enter the IP address assigned to your router. Major manufacturers assign different default IP addresses to their routers. For example, Netgear routers use while Linksys uses Consult your manual for details.

Log in to your router configuration by typing the username and password specified in your manual.

Set your Service Set Identificatier (SSID) by typing it into the box. This is the name of your wireless network. Make it a unique phrase; the default SSID is usually the name of the router manufacturer, such as Netgear or Belkin.

Set your wireless network's security protocol to WPA 2.0 -- Wi-Fi Protected Access. This encrypts any data sent over the network and allows access only to users who have the security key. Set your security key as something not easily guessed. A string of random numbers and letters is recommended. Be sure to record this security key in a safe place so you can recall it when adding a new device to your network or changing network security settings

Thanks hope you enjoyed

How to Create an Encrypted Zip Archive in Mac OS X and Windows


How to Create an Encrypted Zip Archive in Mac OS X and Windows

Archive files are great for portability and saving space, but a lot of people don't know they can also be encrypted. There are a lot of archiver programs out there, but most of them can open a file that's been encrypted using other software, as long as you're using a recent version.

Here's how to do it in both Mac OS X and Windows.

Mac OS X (Option 1)
There are two different methods for Mac users. The first uses the Apple Terminal. Open it up and type in the following command:

zip -e ~/Desktop/

Then, drag the folder with the files you want to encrypt into the Terminal window. The command should look like this:

zip -e ~/Desktop/ /Path/to/folder

Now, just come up with a strong password and you're all set.

Mac OS X (Option 2)
The other option in OS X is to create a disk image. To do this, open the Automator program and select Service.

Choose files or folders from the first drop-down menu, then select Finder as the program. Drag the New Disk Image into the workflow area, then select Size disk image to fit contents and check the box next to it marked Encrypt.

Set the name and location where you want the file to be saved and change the last option to Reveal Finder Items.

Now, just save the workflow and it should become available in the Service menu. To use it to encrypt files, select the files and right-click, then choose your new disk image from the Services menu. Once you supply a password, it will encrypt them.

Microsoft Windows
In Windows, the easiest way to encrypt an archive is to do it directly from a program like WinZip. All you have to do is select the files, open the Actions menu, and choose Encrypt. Then just choose what type of encryption you want and enter a good password.

You can also do this while you're creating the archive by checking the Encrypt added files box.
Don't use WinZip? Here's a guide to encrypting files in 7Zip. Once you've created the archive, you should be able to open it in a recent version of any archiver software.

Crack IDM Manually Windows 7

Crack IDM Manually Windows 7
Crack IDM Manually (Specially for window 7 users)

Mostly time after updating your IDM, it shows error "you have registered IDM using fake serial key". If you are windows 7 user, then this post is for you, because for XP/Vista users , users can easily access full version IDM by downloading it from here without any keygen & error,

Follow these steps:

Download the IDM, then click on Registration.
A dialog box will appear asking for Name, Last Name, Email Address and Serial Key.
Now Enter you name, last name, email address and in field of Serial Key enter any of the following Keys:
  1.                         RLDGN-OV9WU-5W589-6VZH1
  2.                         HUDWE-UO689-6D27B-YM28M
  3.                         UK3DV-E0MNW-MLQYX-GENA1
  4.                        398ND-QNAGY-CMMZU-ZPI39
  5.                        GZLJY-X50S3-0S20D-NFRF9
  6.                        W3J5U-8U66N-D0B9M-54SLM
  7.                        EC0Q6-QN7UH-5S3JB-YZMEK
  8.                        UVQW0-X54FE-QW35Q-SNZF5
  9.                        FJJTJ-J0FLF-QCVBK-A287M

After clicking, it will show error message that you have registered IDM using fake serial key and IDM will exit.
Now Go to the path C:\WINDOWS\system32\drivers\etc\hosts
Open hosts file with notepad.
Now copy the below lines of code and paste it to below localhost

Save it.
Now check IDM, it should be converted to full version.
Note: This Tutorial is for all windows but In Windows 7 sometimes it denied access to write anything on hosts file, so first you must be logged in as Administrator and then change the file permissions of hosts file.

Enjoy it.

How To Remove One Operating System from Dual Boot Windows?

How To Remove One Operating System from Dual Boot Windows?
Removing a dual boot can be dangerous and it does not guarantee that windows will forget about the 2nd boot sector. Most of us install two operating system in the pc just like windows xp and window 7 to get entertained by both the ends and can use any of them one by one. This adds ability to use any version but side by side adds some heavy burden on system and kills its performance.

How to remove one operating system from windows
Press Start Button and choose Run or cmd, you can also open Run command by pressing Windows Key + R
Now in cmd or Run dialog just type


and press enter, now System Properties Dialog will open in front of you.
Click on Advanced Tab and press Setting under Start up and Recovery option.
Now under System Startup Area click on Edit Button, if you have only one operating system installed then you will not see any Edit Button.
Now  a notepad file will open, that’s the boot.ini file.

“[boot loader]
[operating systems]
multi(0)disk(0)rdisk(0)partition(1)WINDOWS=”Windows XP Professional” /fastdetect
multi(0)disk(0)rdisk(0)partition(2)WINNT=”Windows 7” /fastdetect”

Now suppose if you want to delete Windows XP Professional from your system, just delete below line.

multi(0)disk(0)rdisk(0)partition(1)WINDOWS=”Windows XP Professional” /fastdetect

Now you had to remove the remaining files or operating system folder from the drive in which its installed so just navigate to the drive and delete the operating system folder and then restart your system


Do you feel half secure while using your VPN service?
What if you can get that other half?

The best security solution for your VPN connection and Computer ID.
Auto login for VPN and OpenVPN. Shutdown network or close and
autostart programs upon VPN crash. Unlimited programs supported.
Read more »

ESET Nod32 SmartSecurity & ESET Nod32 AntiVirus 2013 Usernames & Passwords

ESET Nod32 SmartSecurity & ESET Nod32 AntiVirus 2013 Usernames & Passwords

  1. Nod32 Username:TRIAL-74367616 Eset Password:3xn7t534h4
  2. Nod32 Username:TRIAL-74367611 Eset Password:aef87mdfp2
  3. Nod32 Username:TRIAL-74367614 Eset Password:bj8tuj3n38
  4. Nod32 Username:TRIAL-74367607 Eset Password:cd32d85c8a
  5. Nod32 Username:TRIAL-74369681 Eset Password:akdba5um4a
  6. Nod32 Username:TRIAL-74369710 Eset Password:x8xabubpfj
  7. Nod32 Username:TRIAL-74369739 Eset Password:6pnb783pn4
  8. Nod32 Username:TRIAL-74369783 Eset Password:sabf6vb2vj
  9. Nod32 Username:TRIAL-74369815 Eset Password:2s3h2b3x44
  10. Nod32 Username:TRIAL-74369845 Eset Password:7ashunrxak
  11. Nod32 Username:TRIAL-74369855 Eset Password:pb8e6k26tt
  12. Nod32 Username:TRIAL-74369876 Eset Password:erhjp3fve6
  13. Nod32 Username:TRIAL-74369918 Eset Password:hfvmu5ebvc
  14. Nod32 Username:TRIAL-74369912 Eset Password:dsfh8uthds
Read more »

Advanced SystemCare with Antivirus 2013


Advanced SystemCare with Antivirus 2013

Based on #1 ranked BitDefender antivirus technology and IObit anti-malware engine, Advanced SystemCare with Antivirus 2013 incorporates top anti-virus capabilities, as well as the already proven comprehensive PC tune-up ability. It is a part of IObit antivirus project dedicating to provide more and better value-added services with our users. With its real-time protection against viruses, spyware and phishing attacks, powerful tuning-up and cleaning functionality, Advanced SystemCare with Antivirus 2013 provides always-on, automated, and all-in-one protection against all kinds of security threats, system slow down, freeze and crash. It ensures PC security, and maintains maximum computer performance automatically without slowing down your system. Advanced SystemCare with Antivirus 2013 is compatible with other security softwares like anti-virus, anti-malware, firewall, etc.

Advanced SystemCare with Antivirus 2013 is a stand-alone product. Besides the newly built-in antivirus functionality, it includes all the features of Advanced SystemCare PRO. PRO users who uninstalled Advanced SystemCare during the trial can easily revert it back at any time.

Click here to download for free trial

  • Installation Instructions:

  • 1.Disconnect internet

  • 2.Install Program.

  • 3.Use Given serial To register 

  • 4.Serial:
  • 94ABB-892A2-78B72-6DFD6

Better Protection, and No Performance Lag Anymore. See Comparison below

Key Benefits

  1. Unrivaled Detection Rate and Maximum Protection
  2. One click to clean hidden and stubborn Viruses, Trojans, worms, spyware, adware and various malware. Advanced SystemCare with Antivirus 2013 also provides an always-on, automated, and proactive protection against all kinds of Internet security threats, with rapid virus database updating.
  3. Enjoy Confident Security without System Slowdown
  4. Your system runs at its top speed without any performance lag, due to our industry-leading Internet security technology.
  5. Safe Surf, Search, Download and Share with Confidence
  6. Proactive Virus Control technology monitors processes behavior in real-time, scans files shared with email and blocks possible threats. Unmatched detection rate assures you a safer environment while using your PC.
  7. Get Highly-tuned Performance and Enjoy the New PC Feeling
  8. Already proven powerful PC tune-up ability unleashes the full power of your PC. With Real-time optimization and ActiveBoost feature, system resources are intelligently managed to ensure you a super-fast PC.

ESET NOD32 Antivirus & ESET Smart Security Username And Password Update 8-16 Oct 2012

ESET NOD32 Antivirus & ESET Smart Security Username And Password Update 8-16 Oct 2012

Username & Password Of Eset Smart Security 4, 5 & 6

Username: EAV-72006391
Password: 57pscc4d3j
Expiry Date: 11.12.2012

Username: EAV-72009466
Password: 88txub65nu
Expiry Date: 11.12.2012

Username & Password Of Eset Antivirus 4, 5 & 6

Username: EAV-72093755
Password: hjbk7nf5fu
Expiry Date: 11/3/2013

Username: EAV-72088402
Password: 7afjsrbfxt
Expiry Date: 11.03.2013

Cyber-D's Autodelete 3.11


Cyber-D's Autodelete can delete old files in a folder (and subfolders) you selected. Simply select the folder you wish to clean (downloads for example), set the rules (older than 30 days since created) and how to delete (move, recycle, secure delete). The cleanup is done on system startup only so it does not stay open in the background or you can run the cleanup manually. Log files are created per clean session and filters can be applied. Cleaning status window, run on startup and log files can be disabled if you wish.


If you are not satisfied with Autodelete, then you might want to give Belvedere a try. I did not make Belvedere myself, but it can also do what Autodelete does and more.

Cyber-D's Autodelete is also featured on PCWorld.

If you get an "Error 5:" message when autodelete runs, then you most probably are a Windows Vista user and have UAC (User Account Control) turned on. The only way to run autodelete with UAC on is by running it as an administrator. You can also right-click on the autodelete shortcut and go to the 'advanced' tab, then the 'advanced' button and activate 'run as administrator'. The program will not give an error but you will get a UAC warning every time the program runs. I have not found a way to avoid this, so the only advice I can give is to disable UAC by going to the control panel and in the search type 'disable UAC', you will be given a link to disable UAC.

You can also avoid UAC prompts by ising Microsoft’s Compatibility Toolkit. Read more about it here:

PAD XML file


How To Use BTGuard To Completely Anonymize Your Bittorrent Traffic


How To Use BTGuard To Completely Anonymize Your Bittorrent Traffic

If you're using BitTorrent without taking special measures to hide your activity, it's just a matter of time before your ISP throttles your connection, sends you an ominous letter, or worst case, your ISP gets a subpoena from a lawyer asking for your identity for a file-sharing law suit. Here's how to set up a simple proxy to keep your torrenting safe and anonymous.

Note, you don't need to be doing anything illegal. Maybe you just want to keep Big Brother out of your business and from throttling your connection. Either way, if you really want to keep your activity private, your best bet involves routing your BitTorrent connection through an external service. BTGuard is a dead simple BT-focused proxy server and encryption service, and it's my service of choice. Below, I'll explain what it does, how it works, and how to set it up to privatize and anonymous your BT traffic.
Read more »

SendBlaster 2 Pro + Serial


SendBlaster 2 Pro + Serial

SendBlaster is the best bulk email software for managing your mailing list.
Discover the free solution or the cost effective one, a one-time payment package which allows you to easily manage your email marketing using a desktop bulk email software.
Read more »

Axure RP Pro 6.5 Full Version


Axure RP Pro 6.5 Full Version

Axure RP Pro 6.5 Full Version is a web design software. Axure RP is the leading tool for rapidly creating wireframes, prototypes and specifications for applications and web sites. Axure RP enables application designers to create wireframes, flow diagrams, prototypes, and specifications for applications and web sites faster and easier than creating static mockups with their current tools. Used by professionals including business analysts, information architects, usability experts, product managers, and IT consultants around the world from Fortune 1000 companies to independent agencies. Axure RP has become an essential tool for successful application design.

Wireframes are an effective tool for collecting and presenting functionality, navigation, and content of an application or web site. Attaching annotations or notes to elements or widgets on the wireframe eliminate guesswork and help clarify specific functions. With Axure RP Pro, creating annotated wireframes is fast and effective, allowing you to focus on the design instead of the documentation.

Download Axure RP Pro 6.5 Full Link Offical Website
Download Axure RP Pro 6.5 Full Link Sharebeast
Link password: koskomputer

RP Pro Serial Key

License: KosKomputer
Key    : dcENpZgjsYDoFPNYx9JMm77TfrzIMlv5iXfdwturL4pDe7DEHjEfjvfCodDKdjLr

Unprotected Network Cams


Unprotected Network Cams

Ok, You can find an protected NETWORK cams.

Like business, house, public bulidings, police stations, government buildings, etc.

Post the weird/interesting ones you find 

just google any one of these ->



Read more »

How To Start Hacking - The Right Way [A Unique Guide]

How To Start Hacking - The Right Way [A Unique Guide]

Table of Contents:

  1. What is a Hacker ?
  2. Types of Hacker
  3. Black Hat Hacker
  4. White Hat Hacker
  5. Grey Hat Hacker
  6. Choosing your side
  7. Knowing Cyber Laws
  8. Never Give Up
  9. Finding Learning Sources
  10. Asking Questions
  11. Doing Practically
  12. Be Creative
  13. No Hesitation
  14. Language
  15. Behavior
  16. About Tutorial
  17. About Me


What is a Hacker ?
Hacker is a person that have great knowledge about computer, though the term also refer to a person who find vulnerability in a computer system. It also refer to a person that have unauthorized access to a computer or network.
Read more »

How to remove any RAT or Keylogger from PC?


How to remove any RAT or Keylogger from PC?

So , i was looking to make a thread on removing viruses from computer. but i was so busy. So now i ma free so i thought to share it to you.

So go through these steps:

  1. Goto start
  2. Type msconfig
  3. A screen will be opened. Goto Start Up Tab
  4. Now go down in the list box.
  5. Check for the Different assemblies , which seems to be a Weird Publisher or any else.
  6. Uncheck them
  7. restart PC
Read more »

WinRar Password Remover Finder Cracker with crack / patch


WinRar Password Remover Finder Cracker with crack / patch

How does this work? WinRar doesn't lock you out after you have tried the wrong password a few times. This tries tons of passwords in no time until it figures it out. It has three different approaches you can use. I don't understand them all but the above describes it best.

RAR Password Recovery is a powerful tool to recover lost (forgotten) passwords for a RAR/WinRar archives. The program supports the Brute-Force attack, dictionary-based attack and dramatically fastest "Booost-Up" attack. The program is able to resume the previous interrupted attack.

Read more »

Chinese hackers attack on White House computers


Chinese hackers attack on White House computers

The White House acknowledged Monday that one of its computer networks was hit by a cyber attack, but said there was no breach of any classified systems and no indication any data was lost. Including systems used by the military for nuclear commands were breached by Chinese hackers.

A conservative newspaper that has been regularly critical of the Obama administration, called The Washington Free Beacon, first published the report on Sunday and said that the attackers were linked to the Chinese government.
Read more »

Cyber Attacks on Six Major American Banks


Cyber Attacks on Six Major American Banks

According to reports, some of the United States biggest financial institutions  including Wells Fargo, JPMorgan Chase, Bank of America, Citigroup, and Bancorp were hit by a series of cyber attacks last week, by a group claiming Middle Eastern ties, that caused Internet blackouts and delays in online banking.

The banks suffered denial-of-service attacks, in which hackers barrage a website with traffic until it is overwhelmed and shuts down. Such attacks, while a nuisance, are not technically sophisticated and do not affect a company’s computer network or, in this case, funds or customer bank accounts.

Hacktivists, calling themselves "Mrt. Izz ad-Din alQasssam Cyber Fighters," attacked Wells Fargo and posted on Pastebin that U.S. Bancorp and PNC Financial Services Group are next. The group said it had attacked the banks in retaliation for an anti-Islam video that mocks the Prophet Muhammad. It also pledged to continue to attack American credit and financial institutions daily, and possibly institutions in France, Israel and Britain, until the video is taken offline. The New York Stock Exchange and Nasdaq were also targeted.

Frustrated customers of Bank of America, JPMorgan Chase, Citigroup, U.S. Bank, Wells Fargo and PNC, who could not get access to their accounts or pay bills online, were upset because the banks had not explained clearly what was going on.

Representatives for other banks also confirmed that they had experienced slow Internet performance and intermittent downtime because of an unusually high volume of traffic. Security researchers said the attack methods were too basic to have taken so many US bank sites offline. The hackers appeared to be enlisting volunteers for the attacks with messages on various sites.

IT Security professionals need to realize that the hackers are doing damage to websites without having to access the corporate servers. They are hitting the site hard without breaking in. A safety barrier must be created and maintained.

How To Convert Virtual Machines Between VirtualBox and VMware


How To Convert Virtual Machines Between VirtualBox and VMware

Migrating to another virtual machine program can be intimidating. if you already have your virtual machines set up they way you like them, you don’t necessarily have to install them from scratch – you can migrate your existing virtual machines.

VirtualBox and VMware use different virtual machine formats, but each supports the standard Open Virtualization Format. Convert your existing virtual machine to OVF or OVA and you’ll be able to import it into another virtual machine program.
Read more »

Japan introduces piracy penalties for illegal downloads


Japan introduces piracy penalties for illegal downloads

Japan-based internet users who download copyright infringing files face up to two years in prison or fines of up to two million yen ($25,700; £15,900) after a change to the law.

Such activity has been illegal since 2010, but until now had not invoked the penalties.

It follows a lobbying campaign by country's music industry.

But critics said that efforts should have remained focused on stopping users making such material available.

In Japan illegal uploads of copyright infringing music and videos carry a maximum 10 year prison sentence and a 10 million yen fine.

Read more »

50 SQL Vuln Links For Hacking Tests

Read more »




List of ALL hacking Shells

  1. C99Shell v. 1.0 beta (5.02.2005)  PHP
  2. b374k PHP
  3. b374k-mini-shell PHP
  4. Cyber Shell  PHP
  5. GFS Web-Shell  PHP
  6. NFM 1.8  PHP
  7. r57shell  PHP
  8. Small Web Shell by ZaCo  PHP
  9. nsTView v2.1  PHP
  10. DxShell v1.0  PHP
  11. C99madShell v. 2.0 madnet edition  PHP
  12. CTT Shell  PHP
  13. GRP WebShell 2.0 release build 2018 (C)2006,Great  PHP
  14. Crystal shell  PHP
  15. Loaderz WEB Shell  PHP
  17. Antichat Shell  PHP
  18. CasuS 1.5  PHP
  19. Sincap 1.0  PHP
  20. C99Shell v. 1.0 pre-release build(safe-mode)  PHP
  21. hiddens shell v1  PHP
  22. Web-shell (c)ShAnKaR  PHP
  23. Predator  PHP
  24. KA_uShell 0.1.6  PHP
Read more »

Govt partially bans Facebook, YouTube in Kashmir


Govt partially bans Facebook, YouTube in Kashmir

Govt partially bans Facebook, YouTube in Kashmir
After SMS, more restrictions on freedom of expression
SRINAGAR, Oct. 01: Amidst the President’s call to Kashmir’s youth for belief in the Indian democracy, the government has partially blocked popular social-networking site, Facebook, and YouTube in Jammu and Kashmir.
The sine die ban was imposed on Thursday—the day President made an inspiring speech during the convocation at Kashmir University—and ever since the cell phone and PC users in the state have not been able to access the sites. It followed the daylong communication gag witnessed in Kashmir on September 21 in wake of the expected mass protests against the anti-Islam film.
Read more »

Quick Heal Internet Security 2013 FREE DOWNLOAD with PRODUCT KEY License :


 Quick Heal Internet Security 2013 FREE DOWNLOAD with PRODUCT KEY License :

It is a comprehensive Internet security suite designed specially for Windows PC which protects your system from all kinds viruses, worms, malware, Trojan or malware arising from the Internet.

It’s custom-made DNAScan Technology is capable of detecting even the unknown viruses.

It is priced at INR 1449 or $40 per year license.

Read more »

Quick Heal Total Security 2013 FREE DOWNLOAD with PRODUCT KEY License


Quick Heal Total Security 2013 FREE DOWNLOAD with PRODUCT KEY License :

Is an all-round computer security cum optimizer application for Windows PC which not only defends your computer from all kinds of threats that emerge from Internet, USB or email, but also optimize your computer.

It’s custom-made DNAScan Technology is capable of detecting even the unknown viruses. It also has PC Tuner that makes maximizes your PC performance.

Read more »