Saturday, 30 June 2012

Reliance Free SMS trick

Hi friends! this is my new trick working on reliance for free SMS.

Just you to do is to send ACT SMSDD and send it to 53739


                                                              Enjoy!

Tata Docomo Free SMS Trick.

Hi friends! here is a trick for sending free SMS in Docomo. SO, get started-

STEP 1- Sms 'join' to 121 and wait for confirmation
STEP 2- sms 'quit' to 121 and wait for confirmation
STEP 3- now check your balance

You will have 50 local/ national sms valid for 1 week

                                                              Enjoy!

Helping codes for Batch files

Hi friends! today I am going to give you some helping codes for Batch files. 

Assoc - Displays or modifies file extension associations.
Attrib - Displays or changes file attributes.
Bootcfg - Used to configure, query, change or delete the boot entry settings in the boot.ini file.
Break - Sets or clears extended CTRL+C checking.
Bcdedit - Sets properties in boot database to control boot loading.
Cacls - Displays or modifies access control lists (ACLs) of files.
Call - Call one batch program from another
CD - Change Directory - Changes the directory it reads from or displays the name of the current directory.


Chkdsk - Checks a disk and displays statusreport.
Chkntfs - Check the NTFS file system
Choice - Allows uses to select one item from a list of choices and returns the index of the selected choice.
Cipher - Displays or alters the encryption of directories on NTFS paritions.
CleanMgr- Automated cleanup of Temp files, recycle bins, etc.
Cls - Clears the screen.
Cmd - Starts a new instance of the Windows command interpreter.
Cmdkey - Creates, displays, and deletes stored user names and passwords.
Color - Sets the default console foreground and backgroup colors.
Comp - Compares the contents of two files or sets of files.
Compact - Displays or alters the compression of files on NTFS partitions.
Convert - Converts FAT volumes to NTFS.
Copy - Copies one or more files to another location.
Date - Displays or sets the date.
Defrag - Defragments the hard drive.
Del - Deletes one or more files.
Dir - Displays a list of files and folders.
Diskcomp - Compare the contents of one floppy disk to another.
Diskpart - Displays or configures disk partition properties.
Doskey - Edits command lines, recalls Windows commands, and creates macros.
Driverquery - Displays current device driver status and properties.
Echo - Displays messages, or turns command echoing on or off.
Endlocal - End localisation of environment changes in a batch files.
Erase - Deletes one or more files.
Eventcreate - Add a message to the Windows event log.
Exit - Exits Command Prompt.
Expand- Expands one or more compressed files.
FC - Compares two files.
Find - Searches for a text string in a file or files.
Findstr - searches for strings in files.
For - Runs a specified command for each file in a set of files.
Forfiles - Selects a file, or set of files, and executes a command on that file.
Format - Formats a disk for use with Windows.
Fsutil - Displays or configures the file system properties.
Ftp - Transfers files to and from a romcputer running an FTP server service.
Ftype - Displays or modifies file types used in file extension associations.
Goto - Directs the Windows command interpreter to a labeled line in a batch program.
Gpupdate - Updates group policies settings.
Graftabl - Enables Windows to display an extended character set in graphics mode.
Help - Provides help information for Windows commands.
Icacls - Display, modify, backup, or restore ACLs for files and directories.
If - Performs conditional processing in batch programs.
Ipconfig - IP configuration.
Label - Creates, changes, or deletes the volume label of a disk.
MD - Creates a directory.
MKDir - Creates a directory
Mklink - Creates a symbolic link.
Mode - Configures a system device.
More - Displays output one screen at a time.
Mountvol - Creates, deletes, or lists a volume mount point.
Move - Moves one or more files from one directory to another directory.
Msg - Send a message to a user.
Msiexec - Microsoft Windows Installer.
Mstsc - Remote Desktop
Net - Manage network resources
Netsh - Configure network interfaces.
Nbtstat - Displays protocol statistics and current TCP/IP connections using NBT.
Netstat - Displays protocol statistics and current TCP/IP network connections.
Nslookup - Name server lookup
Openfiles - Displays files opened by remote users for a file share.
Path - Displays or sets a search path for executable files.
Pathping - Trace route plus network latency and packet loss.
Pause - Suspends processing of a batch file and displays a message.
Perfmon - Performance monitor
Ping - Test a network connection
Popd - Restores the previous value of the current directory saved by PUSHD.
Powercfg - Configures power settings.
Print - Prints a text file.
Prompt- Changes the Windows command prompt.
Pushd - Saves the current directory then changes it.
Rasdial - Manage RAS connections
Rasphone - Manage RAS connections
RD - Removes a directory (folder).
Recover - Recovers readable information from a bad or defective disk.
Reg - Registry: Read, set, export, delete, and add keys and values.
Regedit - Import or export registry settings.
Regsvr32 - Register or unregister a DLL.
Regini - Change Registry permissions.
REM - Records comments in batch files.
REN - Renames a file or files.
Rename - Renames a file or files.
Replace - Replaces files.
RMDIR - Removes a directory (folder).
Robocopy - Advanced utility to copy files and directory trees.
Route - Manipulate network routing tables.
RunAs - Executes a program uder a different user account.
Rundll32 - Runs a DLL command.
SC - Displays or configures services.
Schtasks - Schedules a command to run at a specific time.
Set - Displays, sets, or removes Windows environment variables.
Setlocal - Begins localization of environment changes in a batch file.
Setx - Set environment variables permanently.
SFC - System File Checker
Shift - Shifts the position of replaceable parameters in batch files.
Shutdown - Allows proper local or remote shutdown of machine.
Slmgr - Software Licensing Management
Sort - Sorts input.
Start - Starts a separate window to run a specified program or command.
Subst - Associates a path with a drive letter.
Systeminfo - Displays machine specific properties and configuration.
TaskList - Displays all currently running tasks including services.
Taskkill - Kill or stop a running process or application.
Time - Displays or sets the system time.
Timeout - Delay processing of a batch file.
Title - Sets the window title for a batch file.
Tracert - Trace route to a remote host.
Tree - Graphically displays the directory structure of a drive or path.
Type - Displays the contents of a text file.
Typeperf - Write performance data to a log file.
Ver - Displays the Windows version.
Verify - Tells Windows whether to verify that your files are written correctly to a disk.
Vol - Display a disk volume label and serial number.
Where - Locate and display files in a directory tree.
Whoami - Output the current Username and domain.
WMIC - WMI commands.
Wuauclt - Windows Update

A Simple Trick to Lock Your Computer

Hi friends! this is my new trick to lock computer.

nishanthacks.blogspot.com
Add caption
Right click on an empty area of the desktop and choose 'new' then 'shortcut.' The create shortcut wizard will open.




In the first text box, type '%windir%\\System32\\rundll32.exe user32.dll,LockWorkStation' and then give your shortcut an appropriate name on the next page, and hit 'finish.'

nishanthacks.blogspot.com

nishanthacks.blogspot.com

You will notice that the shortcut you created has a blank icon. To select a more appropriate one, right click on the shortcut and hit 'properties.' In the 'shortcut' tab, click the 'change icon' button.



Else u can simply press the \"window key + l\" to lock your computer.


You can also use the following keyboard shortcuts with a Microsoft Natural Keyboard or any other compatible keyboard that includes the Windows logo key and the Application key.

nishanthacks.blogspot.com

Hacking tools Download

Download Here- http://rapidshare.com/files/34738681/IMC_Tool_Set.zip.html

Tools available-
IMC Grahams Trojan
IMC Ice Dragon
Myspace Password Cracker
IMC Myspace Phisher
Ultra Surf
Rapid Share Account Gen
MSN Nudge Madness
Ice Reloaded
MSN Freezer
IMC Handbook
BrutusAE2
Lord PS
Hoax Toolbox
IMC Word List
Blues Port Scanner
Bandook RAT v1.35
Project Satan 2.0
EES binder v1.0
File Injector v3
Remote Desktop Spy v4.0
Passive Terror v1.3
Final EditionDyn-DL (Dynamic downloader)
Silent Assassin v2.0
Net Scan Tools v4.2
Rocket v1.0
NStealth HTTP Security Scanner v5.8
Attack Toolkit v4.1 & source code included
Legion NetBios Scanner v2.1
Battle PongTeraBIT Virus Maker v2.8
p0kes WormGen 2.0
JPS Virus Maker
IRC Ban Protection
IRC Mega Flooder
FTP Brute Hacker
RAR Password Cracker
Vbulletin 3.6.5
Sql Injection Exploit
IPB 2-2.1.5 Sql Injection Exploit
IPB 2-2.1.7 Exploit
Cain & Abel v4.9.3
NetStumbler 0.4.0
Cryptor 1.2
VNC Crack
Mutilate File Wiper 2.92
Hamachi 0.9.9.9
pbnj-1.0

Friday, 29 June 2012

MTS Mblaze 150 MB hack

HI Friends! This is my new trick for MTS Mblaze 150 MB hack.

1> Go to MTS Website.

2> In left side of website you can see (your MTS Account has 150 MB Free Data)

3> Now Click on Get Free Data(Do it carefully, there are many options).

4> Now Fill your Name, Email, Mobile Number and Submit it.

You Will Get Details Through Email For Claiming the Free Data Usage for Your Mblaze.

For Checking your Balance Start Mblaze then go to settings – Mode – Change to  Hybrid -Apply then Reconnect.



                                              ENJOY!!!!!

iPhone Tips and Tricks

Whether you are a new user or a seasoned user of Apple’s iPhone, you're most likely not making use of your smartphone to the absolute maximum. With these simple tips and tricks, you won’t learn everything about your iPhone, but you will definitely become a more proficient user.


You can take a screenshot.
From saving content you view on your mobile browser to taking quick snaps of funny texts,

How To Delete Yourself From the Internet: It Can Be Done!

If someone has written an unfavorable comment about you and if the content pops up first when people Google search you, you will want to erase it. You may also wish to remove a post that you yourself posted on a website. As is the case with most websites, their terms and conditions deny you the right to edit your content once you post it! Such content can often come up in Google when people

Tips to Protect Important Data against Online Attacks

Whether you talk about private individual users or online business owners, both need to pay more attention to the safety and security of their data. The fact of the matter is that in the last few years, more than 350 million users have reported theft of their precious data. In such a scenario, entrepreneurs and corporate managers have to take meticulous precautions to make sure that unauthorized

How to Really Destroy Your Confidential Data

Every business has some documents that need to be kept confidential. They can be anything from financial records to sensitive personal information to confidential trade or national data. Destroying some data could also be a legal requirement in some industries. Sometimes, some data needs to be destroyed because there is simply no physical or digital space to maintain it, and it cannot just be

Thursday, 28 June 2012

9 Free Web Hosting Providers You Should Try

The best things in life are free; but is this saying also true for web hosting providers? Yes, there are free web hosting providers that offer free web hosting. No monthly fees, no bills, no hosting packages; you get free web hosting services and even some perks that will help you create a professional web site for free.

Different free hosting sites have different features; but as it’s free, you

Monday, 25 June 2012

6 Uncommon But Highly Useful iPhone Features

An iPhone is a brilliant device and anyone who has one knows that it can make almost everything you do easier; whether that be looking for a nearby bar or sending e-mails to clients and colleagues. However, while you're probably familiar with many of the very useful aspects of your phone, there is a good chance that there are still things that you haven't made full use of yet. There are probably

Staying Safe On Your iPhone

By now, it is certainly safe to say that Apple has gained a wider following than just the young, tech-savvy demographic that initially seemed to flock to Mac products. While Mac computers (and specifically the MacBook Pro) have steadily arisen in popularity, the brand’s move to household name is built largely on their fleet of iOS products, and specifically the iPhone. Apple boasts

Beginner's Checklist Guide to SEO

One of the best ways to promote your website and drive quality traffic is through Search Engine Optimization (SEO). There are many ways to promote; Paid Advertisements, E-mail Marketing, Social Media Promotion, Article Marketing, Forum Marketing, Link Purchase, Viral Marketing and the list can go on.

So why would you choose SEO? Why would this particular online marketing technique be better

Sunday, 24 June 2012

How to Deal with Unwanted Phone Calls

Did you know that the most unused feature on a smartphone is the phone itself? We just don’t call each other the way we used to. Instead we text, email, or Facebook to get in touch. This is the reason your phone doesn’t ring very often. When it does, you usually know who is calling you thanks to caller ID. Caller ID allows you to screen every phone call and only answer when you want to talk. If

The Most Common Authentication Methods Used Today

As the news of network security breaches reaches more eyes and ears, thanks to high profile cases like the recent LinkedIn incident where millions of passwords were compromised, both consumers and regulatory agencies are putting increasing pressure on those in charge of enterprise security to step up their defenses.


The issue for network admins is that they are playing a continuous state of "

Notebook Accessories to Look Out For

The demand for notebooks has increased tremendously over the past few years. More and more consumers are choosing notebooks over traditional desktop computers. Netbook manufacturers are constantly adding new features to their products, thus making them even more attractive to users. Manufacturers are also frequently lowering prices in an attempt to create new customer segments for their products.

Facebook Scams and How to Tackle Them

Online scams are ever increasing. Almost in every phase of the online world, you will come across scams. Social networks are no exception for such malicious activity. Recently, millions of accounts from LinkedIn and eHarmony were compromised. Facebook seeing danger has updated its security and is advising its users regarding various scams and how to fight them back.


‘Please send money scam’
An

Safety and Security Risks When Using Facebook

There is no doubt that the biggest social networking site taking over the whole globe is Facebook. Since it’s the biggest thing the online world has ever seen for the last several years, it’s critical that you understand the guidelines and policies listed on the site. They’re very useful in keeping you informed with various aspects of the site and how it runs.

You should know by now that for

5 Android Apps To Protect Your Phone From Criminals

Security is a major concern because of the recent hacking incidents with many organizations. Mobile security is also another area of concern. Since Android phones comprise nearly 47 percent of the smartphone market, Android phones are increasingly being targeted by cyber criminals. With the increase, there is an increased chance that you too will encounter malware. So, what can be done about it?

Saturday, 23 June 2012

Notepad and Pen Versus iPad

We live in an age where we are surrounded by highly exciting, multifunctional and fantastic hardware. Devices like the iPhone and iPad have genuinely managed to transform our lives by giving us the ability to contact our friends, access the largest information archive known to man, watch films, play games and more. This is no doubt is a great thing, but it also means that sometimes we might also

Is the Government Spying on You with Insect Robots?

It’s possible. The title of this article may sound like a question from the tin hat brigade. It may also seem like the stuff of science fiction. However, current robotic technology is very close to being able to achieve this goal. That’s only the stuff we know about. The government has a long standing practice of keeping the newest advances in military technology top secret. So, those insect bots

Ways to Write a Killer First Sentence


It's a writer's worst nightmare. The blank page. Whether you're writing a book, a blog, an article or an essay for school, you can encounter the same problem. You have ideas but you just can't think of a way to get started. You have to grip the reader from the start, and that challenge can be pretty daunting. It might help you to break down what makes a good first sentence.

Dos and Don’ts of

How To Get Started With Video Marketing

Video marketing is basically a concept where companies or individuals come up with videos that are useful to the customer and also have some marketing message somewhere in the content. It could be an email address, a website or a telephone number. Usually, it is a very effective way of marketing; below is how to get started with it.
What Kind of Video Content Do I Need?
Make sure your content is

Virtual Collaboration Tools: Move Your Business Online

Before applying available collaboration technologies, you have to realize the requirements of your business and what your employees need. As soon as you define these two factors, you will have no problems in choosing the right communication and collaboration tool for your business. Now managing distributed teams doesn’t take much time and effort, as it was before. At present, business is done ‘on

Top 5 Gadgets Invented by Ingenious Engineers

Ever since humans began to experiment with self-made tools, civilizations throughout the course of recorded history have gradually developed various forms of technology to help make their lives easier and more efficient. Our humble beginnings with simple tools, however, have grown into something much more over the past few thousand years: We’ve eventually worked our way up to developing

Tuesday, 12 June 2012

Build a Set-Top Media Center for Under $60 With Raspberry Pi

The Raspberry Pi is a stripped-down, $35 computer-on-a-board created by the UK-based Raspberry Pi foundation to provide an affordable platform for beginning coders.


Released in February of this year, the Pi proved so popular that suppliers Premier Farnell and RS Components struggled to meet demand. It’s not hard to see why: with a 700 MHz ARM processor, a VideoCore IV GPU, and 1080p HDMI output

Increase A Laptop's Battery Life [How To]

When you’re constantly on the move and rely on your laptop to perform when you most need it, you need to be sure that your battery won’t suddenly drain on you, leaving you in the lurch. If this sounds like a situation that you frequently find yourself in, perhaps you should look at upgrading to a laptop battery with a longer life. But if that step sounds a bit drastic, there may be a few things

Internet Heavyweight's Security Blunders: gTLDs Gone Wrong

The Internet Corporation for Assigned Names and Numbers - ICANN, to you and me - has come clean over a bug in their software that led to the leaking of personal information. ICANN are currently in the process of offering 'generic top level domains' to wealthy bidders. Unfortunately, due to a problem with the TLD application system, applicants were able to view confidential information on their

Wednesday, 6 June 2012

4 Tricks to Google Analytics You Probably Don’t Use

Google Analytics can be one of your best friends when it comes to managing your website and understanding how well your campaigns perform. Most people don’t look further than the number of visitors, traffic sources and bounce rate, but there’s so much more to it – and these four tips can help you leverage this free tool to learn more about the people visiting your website, and to use those

6 Ways To Spot Fake Reviews Online

Seventy-nine percent of purchase decisions are influenced by online reviews – so it’s easy to see why businesses are so concerned about their reviews, and why some companies are willing to pay to get good ones. You don’t want biased reviews clouding your judgment, so here are six ways you can spot (and avoid) fake reviews with ease.

1) Check the Name
The reviewer’s name can reveal a lot. If it’s

Matte and Glossy Monitors – A Clear Difference

For many people their experience of ‘glossy’ screens comes from their shiny laptops, tablets and netbooks. This experience will undoubtedly have taught them the importance of regulating the lighting environment when dealing with glossy screens. Perhaps they can’t see (pun intended) the purpose of such a screen surface as they are unable to sit outside and make use of their device’s wireless

Tuesday, 5 June 2012

Phone Etiquette: Six Mistakes You Should Avoid

Everyone everywhere is talking on their cellphones, and everyone everywhere has committed some form of bad phone etiquette in their lifetime. The use of cellphones is always on the rise, and more people are finding new ways to use their phone in an unattractive and ignorant way. The following are a few things that cell phone users do that is considered bad phone etiquette.


1. Talking too loud.

Saturday, 2 June 2012

Secure Your WordPress Blog

WordPress is one of the most popular platforms in the world. If you're reading this, chances are you've heard of all of the insecurities your default WordPress installation has. Luckily for you, there are many tools and a few tricks to help make sure that your WordPress installation is as secure as it possibly can be.


1. Make Sure WordPress Is Up to DateOne of the main problems people have

Samsung Galaxy S3 Review & Features

The Galaxy S and SII were among the best smartphones of their respective generations. The S III is not a phone at all; it's a beautiful, magical pebble Samsung found in a clear mountain stream, and it loves you, which is why you shouldn't find its unblinking concentration on your mug at all unnerving. Yes, it has a giant brain that recognises your face, and your voice, and your friends' faces,