Hard Disk


SASSAS Serial Attached SCSI : It was introduced as a new interface technology as a replacement for SAS (Serial Attached SCSI) has recently adopted a series of new server products has become the new standard.


SCSISCSI Small Computer Systems Interface. It improve your computer's performance, CPU without interference in the output takes place. Multitasking and, when large data transfers with minimal CPU load, and can rapidly process large volumes of data, because the cost is expensive, they are used primarily for the server Masu. SCSI hard drive, SCSI-1, Fast SCSI, Wide SCSI, Fast SCSI-20, Fast SCSI-40, Ultra-2 SCSI and Ultra 3 SCSI but has been upgraded and now SAS HDD has been replaced by.


 IDE


When a hard drive crash or media failure happens, knowledgeable and prudent professionals call to us more than any other company to salvage their seemingly unrecoverable data.
Data suddenly disappeared, you can not access the data, computer will not boot, hard disk is not recognized and data problems arise when you are first checkpoint .

Type of Recovery

The logical processing task to rebuild the system and data processing work on the structure of the physical damage to the hard disk. It is highly difficult task requiring both skill and experience, if a physical failure, we also work other logical processes. So yes, a measure of the state of the art data recovery disaster recovery rate of the physical.
hdd_recovery
Hard Disk Drive (HDD; Hard Disk Drive) is a high speed rotating disk coated with magnetic material, by moving the magnetic head reads the information recorded, the typical data storage devices are. Mainly personal computers, servers, RAID configuration NAS (Terastation, LANDISK) has been used by others. Recently, hdd recorder / HDD video , iPod, PS3, we have introduced a wide range of digital devices ranging from mobile phones in general. Recently, new technology, weak magnetic shocks, and structural weaknesses and limitations of mechanical disk SSD (Solid-state Drive) has received much attention.



Type of Hard Disk Drives

 IDE Integrated/Intelligent Drive/Device Electronics. First appeared years ago, hard 50 "RAMAC" was not a huge 24inch stacked disks 50. The hard disk, now took the form of, IDE hard disk is. Hard and ST-506 MFM, RLL and IDE becomes the EIDE, Ultra ATA went on to develop.

However, cable can not solve the problem of noise during data transmission, Serial ATA will change to look like.

SATASATA Serial ATA or Serial Advanced Technology Attachment. It achieved a simple and fast transfer rates possible, the conventional parallel system is also compatible with the ATA standard. The conventional serial and jumper settings are also needed by eliminating the need for ATA drives, the hard disk as well as "soon as you use the connection" is now. It also has the advantage that you can connect multiple peripherals to a single connector. Serial interface, an IEEE 1394 2.0 USB typical is, AV is a high-speed serial bus standard to connect external devices and peripherals.


SAS is one of the SCSI standard, whereas previous SCSI parallel transmission standards, SAS provides a serial transmission and they, in terms of speed is more than four times faster. In addition, 50% lower power consumption can be reduced by at least a high performance, high availability can be demonstrated.

External hard Disk

External Hard Drive Its easy to carry, easy to access various devices also are commonly used for reasons such as data backup and easy to use.
External hard drive (HDD), you have excellent phone, data and video and music recording and data backup large amounts of information is growing rapidly in demand. Primarily on the USB interface is used, IEEE (Firewire), eSATA, LAN and Internet connections available methods are also used. Convenient to carry the portable HDD, RAID configuration recently, NAS has been released from products that meet the diverse needs of products supported.

Common failures of the external hard drive content

Suddenly no longer recognizes.
I can hear noise from the hard drive.
" Safely Remove Hardware "message is displayed, OS does not recognize the drive.
" USB device not recognized "message.
" is not formatted. Do you want to format? "In the message. File system damage-PBS, FAT, MFT ERR
" delayed write error "message.
" Drive not accessible "message.
Device Manager "!" And "?" Mark out.
I do not know the meaning of the text is displayed. ( recovery rate of 90% or more )
0 is a disk size information to determine Disc.
Common disorder mostly external hard disk, MBR is damaged or if you fall, PBS partition configuration information (Partition Boot Sector ) or FAT (File Allocation Table) and if it is damaged it.

Top 5 Websites to Download Free Ebooks

Hello Friends, today i am going to share with you world's best top 10 websites to download free ebooks in PDF format. Most of us thinks that's eBooks are very hard to find on internet, but that's not true. You can find almost each and every eBook in the sites that i will tell you today. So guys these are the Best Top 10 websites to download free eBooks on internet.



EBOOKS-IT is the world's biggest source to download computer eBooks for free. Here you can find a huge collection of eBooks from the world's leading publishers. To access thousands of eBooks you just have to browse the various categories on the left or simply to use search engine. Find eBooks that you are interested in and download it for free.

FreeBookSpot is an online source of free ebooks download with 4485 FREE E-BOOKS in 96 categories which up to 71,97 GB.
You can search and download free books in categories like scientific, engineering, programming, fiction and many other books. No registration is required to download free e-books.
ManyBooks provides free ebooks for your PDA, iPod or eBook Reader. You can randomly browse for a ebook through the most popular titles, recommendations or recent reviews for visitors. There are 21,282 eBooks available here and they’re all free! On this website go to to book and at right you will see download option. Select the format and download the book.
GetFreeEBooks is a free ebooks site where you can download free ebooks totally free. All the ebooks within the site are legal downloadable free ebooks.
FreeComputerBooks consists of a huge collection of free online computer Programming, Mathematics, Technical Books, Lecture Notes and Tutorials. It is very well categorized by topics, with 12 top level categories, and over 150 sub-categories.

Hacking Bank Account Information

Most people learning hacking always have a keen interest in knowing that how they can hack bank accounts of other people. But most of them find it pity much difficult such that now they have made a perception that bank account information like credit cards or debit cards or net banking passwords cannot be hacked. Its truth to an extent that hacking Banking account information and credit or debit cards passwords is most difficult and almost impossible part. Today i will discuss with you why hacking bank account information is tough and always considered as impossible task. We will also discuss the different methods that hackers use to hack bank account information nowadays.

how to hack bank details, hacking bank account and credit card passwords

I am quite sure that almost everybody using internet nowadays uses that internet to pay online bills, book reservation tickets, purchase online things or simply transfer money i.e. involved in at least some kind of online transaction that is related to money i.e. banking information, credit or debit card payments or simply Net banking. Most of banks uses SSL(Secured Sockets Layer) connection and at least 128 or 256 bit encryption for online banking and transaction purposes. Also now an extra layer of security is introduced that is called transaction PIN layer means for each and every online transaction you have to enter your passwords and during transaction you have to enter PIN (a type of password that varies 4 to 8 chars in length). Thus bank do alot of work to protect your secret information and credentials from the eyes of the world that may wish to gain access to your such a vital information.

Below example will illustrate you how powerful the encryption method is:

  • 40 bit encryption, means there are  2^40 possible keys that could fit into the lock that holds your account information. That means there are many billions of possible keys that means brute forcing such thing is imposable. Only thing now left is dictionary and rainbow attack. But its not only the security measure that banks used to secure there information. Also its only 40 bit encryption.
  • 128 bit encryption means there are 2^88 times as many as key combinations that are being possible for 40 bit encryption.That means a computer would require exponentially more processing power and time than for 40-bit encryption to find the correct key.

That's a very powerful method of encrypting data sent from your machine to bank machine. But unfortunately it's all is useless to you once your system has been compromised or hacked.

Now How these all security Encryption can be bypassed and your system can be compromised online. There are several methods for exploiting and bypassing such account information. Note : This is for educational purposes only( For more details read Disclosure). 

Some of them are:
1. Phishing : We have discussed phishing on this website alot of times in tutorials like how to hack Gmail accounts password or hacking Facebook accounts and others too. But for new Guys I explain what is Phishing.  Phishing is a technique to hack password and login details of a particular website using Phish pages. Now what are Phish pages? Phish Pages are simply the fake pages that looks the original webpage. The only difference between phish page and original page is the Address bar link (for normal user) and redirection post and get method( inside source for advanced users). How to identify a fake link? Just check the address bar URL for a fake page or Phish page it will be showing different URL than the original URL. Also if you want that everything is done automatically then install a Web security tool bar in your browser (AVG and Crawler web security tool bars are good choices) as it detects the phishing automatically and do not allows you to visit Phishing Pages.

2. Trojans: Trojans are type to viruses that steals your information. It can be in many forms like Keyloggers or RAT's( remote administration tools). What a keylogger do is that it monitors all the keys that you have pressed from your physical keyboard and stores them in form of a log and send these details to hackers. RAT's are advanced form of Keyloggers that remotely monitors all your activities where keylogger is simply a functionality. Using RAT hacker can connect to your system anonymously i.e. without your information when you are online. RAT's have a huge list of functionality and these are best type of hacking tools available in the market. Now How you will protect yourself from Keyloggers? Just keep your antivirus updated and install Keyscramber that encrypts your keystrokes. Now why i haven't mentioned RAT there is because once the RAT enters your system you cannot do anything other than formatting your system. So RAT's attack only can be prevented before they enters in your system. For preventing from RAT's Please do not download any software or cracks or keygens online. Also avoid downloading freewares from new websites use certified websites only like CNET, filehippo etc.. Also please avoid testing fake hack tools (recommended for hackers) because most hacking tools have keylogger and RAT's attached to them. Test it under secured conditions like on Virtual Users. Means install virtual operating system user Virtual PC or Virtual Box and then test them there.

3. Session Hijacking: Most of us uses Wireless Networks to access the internet and data flow in form of packets and channels. And we know that Wireless are easier to hack as they have very weak encryption. So Hackers hack the wireless networks and using session Hijacking they take control of the internet data transfer and redirects the user from original path to their path. Means suppose you are visiting Google or Gmail or Facebook, then hacker when get access then he can redirect you to any of the page and capture you account details. Packet sniffing is another way to hack the account information and credentials using the wireless networks where Hackers captures packets and decrypt these encrypted information to get the information in form of plain text. Now how you will prevent this? Its also pity simple to prevent this, you need to hide you SSID and BSSID from being discovered by the other networks. Just leave the SSID or BSSID empty for that. Now hacker will not be able to discover your wireless router so he will not been able to hack it.

A Huge Collection Of Hacking Ebooks Download Free


(Ebook - Computer) Hacking The Windows Registry.pdf
(eBook - PDF) Hugo Cornwall - The Hacker's Handbook .pdf
(eBook pdf) Hacking into computer systems - a beginners guide.pdf
(ebook_-_pdf)_Hacking_IIS_Servers.pdf
0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf
0764578014.Wiley.The Database Hacker's Handbook- Defending Database Servers.chm
076459611X.John Wiley &amp_ Sons.Hacking GMail (ExtremeTech).pdf
1246523-Hacking.Guide.V3.1.pdf
1931769508.A-List Publishing.Hacker Linux Uncovered.chm
2212948-Hacker'S.Delight.chm
285063-Hacker.Bibel.pdf
3077366-HackerHighSchool.pdf
731986-Hacker's Desk Reference.pdf
A Beginners Guide To Hacking Computer Systems.pdf
Addison Wesley - Hackers Delight 2002.pdf
addison wesley - web hacking - attacks and defense.chm
Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb.chm
amazon-hacks.chm
Anti-Hacker ToolKit - McGraw Hill 2E 2004.chm
Attacking the DNS Protocol.pdf
Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf
Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf
bsd-hacks.pdf
ceh-official-certified-ethical-hacker-review-guide-exam-312-50.9780782144376.27422.pdf
Certified Ethical Hacker (CEH) v3.0 Official Course.pdf
Computer - Hackers Secrets - e-book.pdf
cracking-sql-passwords.pdf
Crc Press - The Hacker'S Handbook.pdf
Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.pdf
DangerousGoogle-SearchingForSecrets.pdf
database hacker handbook.chm
Dummies - Hack How To Create Keygens (1).pdf
ebay-hacks-100-industrial-strength-tips-and-tools.pdf
ebook.oreilly.-.windows.xp.hacks.sharereactor.chm
eBooks.OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools.chm
ethical hacking, student guide.pdf
excel-hacks.chm
For.Dummies.Hacking.for.Dummies.Apr.2004.eBook-DDU.pdf
For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf
google-hacks.pdf
Hack IT Security Through Penetration Testing.pdf
Hack Proofing - Your Network - Internet Tradecraft.pdf
Hack Proofing Linux A Guide to Open Source Security - Stangler, Lane - Syngress -  ISBN 1-928994-34-2.pdf
Hack Proofing Sun Solaris 8.pdf
Hack Proofing Your E-Commerce Site.pdf
Hack Proofing Your Identity In The Information Age.pdf
Hack Proofing Your Network Second Edition.pdf
Hack Proofing Your Network_First Edition.pdf
Hack Proofing Your Web Applications.pdf
Hacker Disassembling Uncovered.chm
hacker ethic.pdf
Hacker Linux Uncovered.chm
Hacker Web Exploitation Uncovered.chm
Hacker'S.Delight.chm
hacker-disassembling-uncovered.9781931769228.20035.chm
Hackers Beware.pdf
Hackers Secrets Revealed.pdf
Hackers Secrets.pdf
Hackers, Heroes Of The Computer Revolution.pdf
Hackers_Secrets.pdf
Hacker_s_Guide.pdf
Hacking - Firewalls And Networks How To Hack Into Remote Computers.pdf
Hacking - The Art of Exploitation.chm
Hacking Cisco Routers.pdf
Hacking Exposed - Network Security Secrets & Solutions, 2nd Edition.pdf
Hacking Exposed Network Security Secrets & Solutions, Third Edition ch1.pdf
Hacking For Dummies 1.pdf
Hacking For Dummies 2.pdf
Hacking For Dummies.pdf
Hacking GMail.pdf
Hacking IIS Servers.pdf
Hacking into computer systems - a beginners guide.pdf
Hacking the Code - ASP.NET Web Application Security Cookbook (2004) .chm
hacking the windows registry .pdf
Hacking Windows XP.pdf
Hacking-ebook - CIA-Book-of-Dirty-Tricks1.pdf
Hacking-Hacker's Guide.pdf
Hacking-Hackers Secrets Revealed.pdf
Hacking-Hugo Cornwall-The Hacker's Handbook .pdf
Hacking-The Hacker Crackdown.pdf
Hacking.For.Dummies.Access.To.Other.People's.System.Made.Simple.pdf
Hacking.Guide.V3.1.pdf
Hackproofing Oracle Application Server.pdf
hacks.sfv
Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm
Hack_IT_Security_Through_Penetration_Testing.chm
Halting.The.Hacker.A.Practical.Guide.To.Computer.Security.chm
How to Crack CD Protections.pdf
John Wiley & Sons - Hacking For Dummies.pdf
John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004.eBook-DDU.pdf
John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004.eBook.pdf
John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.

and.Deceivers.Feb.2005.ISBN0764569597.pdf
Jon.Erickson.Hacking.The.Art.Of.Exploitation.No.Starch.Press.2003.chm
linux-server-hacks.pdf
Linux-Server.Hacks-OReilly.pdf
little_black_book_oc_computer_viruses.pdf
mac-os-hacks.chm
McGraw Hill - Web Applications (Hacking Exposed).pdf
McGraw-Hill - Hacking Exposed, 3rd Ed - Hacking Exposed Win2.pdf
McGraw.Hacking.Exposed.Cisco.Networks.chm
McGraw.Hill.HackNotes.Linux.and.Unix.Security.Portable.Reference.eBook-DDU.pdf
McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eB.pdf
McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eBook-DDU.pdf
McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-.pdf
McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf
McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eB.pdf
McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eBook-DDU.pdf
Mind Hacks - Tips & Tricks for Using Your Brain.chm
network-security-hacks.chm
No.Starch.Press.Hacking.The.Art.Of.Exploitation.chm
O'Reilly - Online Investing Hacks.chm
O'Reilly.-.Network.Security.Hacks.chm
O'Reilly.Windows.Server.Hack.chm
O'Reilly.Windows.Server.Hack.rar
online-investing-hacks.chm
OReilly  Google Hacks, 1st Edition2003.pdf
OReilly - Flickr Hacks Tips and Tools for Sharing Photos Online (Feb 2006).chm
OReilly - Google Hacks.pdf
Oreilly Access Hacks Apr 2005.chm
Oreilly, Paypal Hacks (2004) Ddu.chm
OReilly,.Digital.Video.Hacks.(2005).DDU.LotB.chm
OReilly,.IRC.Hacks.(2004).DDU.chm
oreilly,.visual.studio.hacks.(2005).ddu.lotb.chm
Oreilly.Amazon.Hacks.eBook.LiB.chm
oreilly.firefox.hacks.ebook-lib.chm
OReilly.Google.Hacks.2nd.Edition.Dec.2004.ISBN0596008570.chm
OReilly.Google.Maps.Hacks.Jan.2006.chm
Oreilly.Linux.Desktop.Hacks.Mar.2005.eBook-LiB.chm
OReilly.Linux.Server.Hacks.Volume.Two.Dec.2005.chm
OReilly.Network.Security.Hacks.chm
OReilly.PayPal.Hacks.Sep.2004.eBook-DDU.chm
OReilly.PC.Hacks.Oct.2004.eBook-DDU.chm
OReilly.Perl.Hacks.Tips.and.Tools.for.Programming.Debugging.and.Surviving.May.2006.chm
OReilly.Skype.Hacks.Tips.and.Tools.for.Cheap.Fun.Innovative.Phone.Service.Dec.2005.chm
OReilly.SQL.Hacks.Nov.2006.chm
OReilly.Statistics.Hacks.May.2006.chm
OReilly.Ubuntu.Hacks.Tips.and.Tools.for.Exploring.Using.and.Tuning.Linux.Jun.2006.chm
OReilly.VoIP.Hacks.Tips.and.Tools.for.Internet.Telephony.Dec.2005.chm
oreilly.windows.xp.hacks.2nd.edition.feb.2005.lib.chm
OReilly.Word.Hacks.Oct.2004.eBook-DDU.chm
OSB.Ethical.Hacking.and.Countermeasures.EC.Council.Exam.312.50.Student.Courseware.eBook-LiB.chm
O_Reilly_-_Windows_XP_Hacks.chm
PC Games - How to Crack CD Protection.pdf
prentice hall - pipkin - halting the hacker- a practical guide to computer security, 2nd edition.chm
Que - UNIX Hints Hacks.chm
Que.Certified.Ethical.Hacker.Exam.Prep.Apr.2006.chm
Security and Hacking - Anti-Hacker Tool Kit Second Edition.chm
SoTayHacker1.0.chm
spidering-hacks.chm
SQL Hacks.chm
SQLInjectionWhitePaper.pdf
Syngress - Hack Proofing Linux (2001).pdf
Syngress - Hack Proofing Your Identity in the Information Age - 2002.pdf
Syngress - Hacking a Terror Network. The Silent Threat of Covert Channels.pdf
Syngress -- Hack Proofing Your Wireless Network.pdf
Syngress Hack Proofing Your Identity in the Information Age.pdf
Syngress.Buffer.Overflow.Attacks.Dec.2004.eBook-DDU.pdf
Syngress.Hack.the.Stack.Oct.2006.pdf
Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf
The Little Black Book Of Computer Virus.pdf
the-database-hackers-handbook-defending-database-servers.9780764578014.25524.chm
The_20Little_20Black_20Book_20of_20Computer_20Viruses.pdf
tivo-hacks.100-industrial-strength-tips-and-tools.pdf
u23_Wiley - Hacking GPS - 2005 - (By Laxxuss).pdf
Websters.New.World.Websters.New.World.Hacker.Dictionary.Sep.2006.pdf
Wiley.Hacking.Firefox.More.Than.150.Hacks.Mods.and.Customizations.Jul.2005.eBook-DDU.pdf
Wiley.Hacking.Google.Maps.and.Google.Earth.Jul.2006.pdf
Wiley.Hacking.GPS.Mar.2005.ISBN0764598805.pdf
Wiley.Lifehacker.Dec.2006.pdf
Wiley.The.Database.Hackers.Handbook.Defending.Database.Servers.chm
Win XP Hacks oreilly 2003.chm
Windows Server Hacks.chm
WinXP SP1 Hack.pdf
Xbox-hack - AIM-2002-008.pdf
Yahoo.Hacks.Oct.2005.chm
Hackers Beware Defending Your Network From The Wiley Hacker.pdf


Download From Here 


http://hotfile.com/dl/63621045/48187e9/Hacking_ebooks_collection.part01.rar.html
http://hotfile.com/dl/63621040/89a37db/Hacking_ebooks_collection.part02.rar.html
http://hotfile.com/dl/63621051/a3a4e4b/Hacking_ebooks_collection.part03.rar.html
http://hotfile.com/dl/63621044/2049a7d/Hacking_ebooks_collection.part04.rar.html
http://hotfile.com/dl/63621042/dba97d6/Hacking_ebooks_collection.part05.rar.html
http://hotfile.com/dl/63621048/b275797/Hacking_ebooks_collection.part06.rar.html
http://hotfile.com/dl/63621041/4abeb76/Hacking_ebooks_collection.part07.rar.html
http://hotfile.com/dl/63621039/5b95c9c/Hacking_ebooks_collection.part08.rar.html
http://hotfile.com/dl/63621049/ee10c26/Hacking_ebooks_collection.part09.rar.html
http://hotfile.com/dl/63621043/2092e64/Hacking_ebooks_collection.part10.rar.html
http://hotfile.com/dl/63621047/56181fd/Hacking_ebooks_collection.part11.rar.html


...................................................................The End...................................................

 .....................................................................................................................................................................................................................
 .....................................................................................................................................................................................................................
 .....................................................................................................................................................................................................................
 .....................................................................................................................................................................................................................
 ................................................................................................................................................................................................................

Enable Telnet in windows 7

It’s very rare that I use Telnet these days, so it took a long time for me to notice that by default it was not packaged with Windows 7. I did some research and found out that this was also true for Windows Vista. More than likely this was an attempt to make Windows more secure by default, as Telnet is very insecure and whenever you have the choice you should always use SSH. However, with that being said, you can quickly re-enable Telnet by following these steps:

  1. Start
  2. Control Panel
  3. Programs And Features
  4. Turn Windows features on or off
  5. Check Telnet Client
  6. Hit OK
After that you can start Telnet via Command Prompt. Credits FettesPS
.................................................................................................................... ............................................................................

Create Bootable Windows 7, Vista, or XP USB Flash/Pen Drive

Let’s begin the guide without wasting time. Just make sure that you have a pen drive with 4GB + capacity if you are making a bootable USB flash drive.

Requirements to create bootable Windows USB:

# Windows 7 or Vista ISO

# Pen drive with 4GB+ (2 GB is sufficient for XP)

# 15 Minutes of free time

Procedure:

1. Insert your USB flash/pen drive to your system and backup all the data from the USB as your USB drive will be formatted during the process.

2. Now download WinToFlash tool (free).(FROM google)


3. Run the tool, and browse to your Windows 7, Vista, or XP DVD files (make sure that your USB drive letter is correct).

4. Click Create button to begin the bootable USB process. Wait for few minutes to see the bootable USB.

5. That’s all!

reliance free net on pc and mobile( very easy)

This summary is not available. Please click here to view the post.

download movie yamla pagla diwana(high quality)only 182 mb

 

MOVIE INFO

Released : Jan 14, 2010
Genre : Comedy, Drama
Starcast : Dharmendra, Sunny Deol, Bobby Deol, Kulraj Randhawa, Anupam Kher, Mukul Dev
Desc :
Samir Karnik`s Yamla Pagla Deewana will see Dharmendra and Bobby Deol as a conmen duo. The film also stars Sunny as an upright man married to a Canadian living in Canada.
Duration : 2:33
Size : 182mb


link here-
part 1--yamla pagla diwana part 1 
part 2---Yamla.Pagla.Deewana-pDVD2.avi

FAKE EMAIL TRICK [Send mail from any email id]AWESOME TRICK

Step 1 :- Go to click here to goand another link

Step 2 :- Type in the email you'd like to sent it from.

step 3 :- type which email would you like to send it too.

Step 4 :- type the message you'd like the person your sending it too to receive.

step 5 :- send and complete enjoy hope this was helpful to some of you guys. 

H!T Thanx,if works

Kaspersky Internet Security 2011 License Keys

Kaspersky Internet Security 2011 License Keys

Finally i am here to share 3 kaspersky keys on this new year with all becomehacking.blogspot.com readers. First of all Happy New Year to all Blog Readers, May this new year brings a lot of joy an happiness in your life.
Yes this time there will be 3 winners for KIS 2011 keys. As i promised that i will be sharing 3 license keys on 13 January, but due to some issues i was not able to share on 13 Jan. Finally i am here to give you another opportunity to get a license key for your Kaspersky Internet Security 2011 and protect your computer from Threats, Malware, Adware and Virus.
This time there are 3 license keys waiting for you.

Download


Idman

Download Free and Full Internet Download manager


Internet Download Manager increases download speed with built-in download logic accelerator, resume and schedule downloads.



Download

Hacking a Website Using Havij

First Lets Download our Tool:
Now, Find a sqli infected site . Here i found a vulnerable site
http://www.hypetrading.com/productinfo.php?id=285
Now Let’s start
Open havij and copy and paste infected link as shown in figure
Now click in the “Analyze”
Then It shows some messages there….Be alert on it and be show patience for sometime to find it’s vulernable and type of injection and if db server is mysql and it will find database name.Then after get it’s database is name like xxxx_xxxx
Then Move to another operation to find tables by clicking “tables” as figure shown.Now click “Get tables” Then wait some time if needed
After founded the tables ,you can see there will be “users” Put mark on it and click in the ” get columns ” tab as shown in figure
In that Just put mark username and password and click “Get data”
Bingo Got now id and pass that may be admin…
The pass will get as md5 you can crack it also using this tool as shown in figure…

Hack Into Administrator Account

Hello friends, welcome back today i am going to share with you all possible ways to hack admin or administrator account in windows XP. Today i will explain how to hack admin or administrator account in just 2 minutes. So guys get ready to hack your friends systems in 2 minutes.
Most of times specially in our college we don't have the access to the admin account, now suppose you want to install a software on that system. What you will do now? Ask the admin to enter the password for you or simply hack it by yourself. I will tell you frankly that i have never opted method one in my life. Whenever i need administrator right i have hacked it but guys don't do it like that ways because i got suspended from lab twice for doing that.

how to hack admin password,hacking password,reset admin password, system hacking

There are four ways to hack the admin password:
1. Simply accessing Unprotected Administrator Account.
2. Hacking Through Net User Command.
3. Hacking Using the ERD(Emergency Rescue Disk)  Commander.
4. Resetting admin password using Ubuntu Live CD or DVD. 

Lets start from the first technique to hack the admin or administrator password..

1. Simply Accessing the Unprotected Admin or Administrator account.

How this hack works ? When we install windows XP on our system we usually rename the username as our name or some other keyword. But windows always creates the administrator account whenever we set up windows XP. So when you create your user account during install , windows creates two accounts that is one is your username account and other is Administrator account. But the main thing is that you will only see the account with your username and the Administrator account is hidden but its there and you can easily access that using the following steps:
Step1: Start your computer.
Step2: Now let it start until the windows user's username appears as shown in snapshot below...
how to hack admin password,hacking password,reset admin password, system hacking

Step3: As This Window Appears Press Ctrl+Alt +Delete (2 times).. Now the Windows like shown below appears..

how to hack admin password,reset admin password,hack computer password

Step4: Now as shown above Enter the Administrator on the Username box and press enter... Now you will be login in the admin account can easily rest the password...

For Resetting password you can follow two Procedures..
Procedure 1: Goto Start --> Control Panel --> User Accounts.. Now select the account whose password u want to reset.
Procedure 2 : Follow the Next method i.e hacking password through Net User Command.

Note: Hack 1 will only work if Administrator(default) is unsecured i.e User as some other username like above shown figure...


2. Hacking admin or administrator account using net user command
Note: This will work only when user has access of user account or some how he has been allowed  or working in admin account.

Steps to hack admin account:
Step1: Goto the Start and click on Run and Type cmd and press enter ... 
Step 2: Now type "net user" in the command prompt to obtain the All accounts on that computer.. as shown in figure..

how to hack admin password,reset admin password,hack computer password,windows password hacking


Step 3: Now Select the account Which u want to Reset the Password...
Suppose that we want to Reset the Password  of Administrator...
Now Type "net user Administrator *  " Without quotes... and press Enter. As shown in the Below Figure..

reset admin password,hack computer password,windows password hacking

Step 4: Now after that press Enter Twice to rest the password. Now Next time u open that Account .. It will not require any Password..


3. Hacking admin account using ERD commander (100% working hack)
This hack has no restrictions , using this hack you can hack each and every computer.

First of all Download the ERD(Emergency Rescue Disk)  commander... Extract the Files and Make a CD...

STEPS INVOLVED :
1. Insert the ERD Commander Boot CD into the drive and restart the system
2. Boot the computer using ERD Commander Boot CD. You may have to set the boot order in the BIOS first.
3. Select your Windows XP installation from the list as shown.


How to hack Admin Account
4. From the ERD Commander menu (Start menu), click System Tools and click Locksmith
How to hack Admin Account

5. Click Next

How to hack Admin Account

6. Select the administrator account from the list for which you want to reset the password.
How to hack Admin Account

7. Type the new password in both the boxes, click Next and click Finish

How to hack Admin Account

8 . Restart The System and take the CD out of the Drive..And Enjoy Admin account...

Method 4: Resetting windows password using Ubuntu Live CD or DVD
For this hack you will require the Ubuntu Live CD.

Steps involved :

  1. Insert Ubuntu Live CD and boot from it.
  2. Open terminal and install chntpw in Ubuntu. To do so use the following commands.
    sudo apt-get update
    sudo apt-get install chntpw
  3. Now mount your Windows volume. In my case it was dev/sda1. Replace it with yours.
    sudo mkdir /media/WINDOWS
    sudo mount /dev/sda1 /media/WINDOWS
  4. Now navigate to the Windows configuration folder.
    cd /media/WINDOWS/WINDOWS/system32/config/
  5. To reset the administrator password enter
    sudo chntpw SAM
  6. After completing this command you will see 5 different choices. Select the 1st one and press Enter and its done. 
  7. Now restart your system, it will not ask any password.  
..............................................................................................................................................................................................................

Make a Bootable USB Pen Drive


There are a number of ways to create your own bootable pen drive but we are going to show you the easiest way. To begin with you will need a PC with a CD/DVD ROM drive, the Windows CD/DVD, and a 2GB pen drive if you are creating a Windows XP bootable USB or a 4GB pen drive if the requirement is for Windows Vista/7. To start with, download and extract the program “WinToFlash”. Once extracted execute the file called “WinToFlash” and follow these simple steps.

Step 1: Click the 'Windows Setup transfer wizard' and select 'Next'.

Step 2: Here you will need to define two paths where the 'Windows File Path' points to the location of the Windows installation disk and the 'USB Drive' specifies the location of pen drive t
hat will be used for creating the bootable installation routine. Click on 'Select' and choose an appropriate path for both.


Step 3: Accept the 'Windows License Agreement' and click on continue.

Step 4: Don’t panic! The 'Warning' is just to remind you that the pen drive will be formatted before proceeding. Click 'OK' to proceed or 'Cancel' in case you inserted the wrong pen drive or want to check it.
That’s all that needs to be done to be able to create a bootable Windows installation pen drive. To be able to boot from the pendrive you will need to access the BIOS and change the boot priority to 'Removable disk'. If the settings are right you will be able to boot and proceed with the installation of Windows.

How to Change Your Computer Name in Windows


f you’re moving from XP to Windows 7 because you received a new computer over the holidays, one thing you might want to do is change the computer name. Here we show you how to get it done in Windows 7.

1. To change the computer name, open the Start Menu and right-click on computer and click on Properties.
sshot-2010-12-23-[03-54-03]
2. Alternately, you can right-click on the Computer icon on your Desktop if you have it showing and click Properties.
sshot-2010-12-23-[03-55-52]
3. Then click on the Advanced system settings link in the left panel.
sshot-2010-12-23-[03-56-19]
4. In the System Properties window click on the Computer Name tab, then the Change button. Notice in this window you can also enter in a computer description if you want as well.
sshot-2010-12-23-[03-57-12]
5. Clear whatever is in the Computer name field and type in whatever you want to change the computer name to and click OK.
sshot-2010-12-23-[03-58-08]
6. A restart is required to apply the changes. You’ll get one dialog advising you of this, and another to actually restart your system.
sshot-2010-12-23-[03-58-41]
sshot-2010-12-23-[03-59-00]
7. When you come back from the restart and log in, right-click on Computer and you’ll see the new name you changed the PC too.
sshot-2010-12-23-[16-49-34]
That is all there is to it! If you need to change the computer name in Windows 7 for any reason…this should help you get it done. If you’re still an XP user check out our article on how to change the computer name in XP.