fly

Wednesday 31 July 2013

CARD RECOVERY FREE KEYS

                             

           CardRecovery, the award-winning digital photo recovery software is the reliable solution for digital image recovery, digital picture recovery, digital media recovery, photo rescue, photo restore, data recovery, or whether files were deleted, the storage was damaged or formatted.

Our unique and exclusive SmartScan technology completes those impossible recovery tasks that other software cannot touch -- SmartScan quickly locates and restores files that other recovery software could never find.

Using CardRecovery is safe and risk-free. The software performs READ-ONLY operations on your memory card. It doesn't move, delete, or modify the data on the card to avoid causing further damage or overwriting. It recovers the photos and movie clips from the source memory card and saves them to the destination location you specify.

 CardRecovery Features

  •  Recover deleted photos from memory cards
  •  Recover lost photos from memory cards
  •  Recover lost movies from memory cards
  •  Recover photos from formatted memory cards
  •  Recover photos from damaged, unreadable or defective memory cards
  •  Recover pictures from removable storage including flash drives
  •  Recover images, video files from mobile phones
 Supported Storage
  •  Secure Digital card, SD card, SDHC, miniSD, MicroSD (TransFlash) card recovery
  •  Compact Flash card, CF Type I, Type II, MicroDrive, CF card recovery
  •  Memory Stick, Memory Stick Pro, Duo, Pro-HG, XC, Micro(M2) recovery
  •  MultiMedia card, MMC card recovery
  •  SmartMedia, flash card recovery
  •  xD Picture card recovery
  •  Cellular phone, mobile phone memory card and digital media recovery
  •  MicroSD or MicroSDHC card used by Android smart phone
  •  USB flash drive digital image recovery

 Supported Situations

  •  Photos deleted accidentally or intentionally from memory cards
  •  Photo loss due to formatting or "Delete All" operation
  •  Memory card error or damage, or inaccessible memory card
  •  Corruption due to the card being pulled out while your camera is on
  •  Damage due to turning your camera off during a write/read process
  •  Data corruption due to critical areas damage e.g. FAT, ROOT, BOOT area damage
  •  Data loss due to using between different cameras/computers/devices
  •  Other events that could cause damage to data

 Supported Photo/Video File Types

  •  Common Picture Formats: JPG JPEG TIF
  •  Common Video Formats: AVI MPG MOV MPEG ASF MP4 3GP MTS
  •  Common Audio Formats: WAV MP3 AMR
  •  RAW Image Formats: Nikon NEF, Canon CRW and CR2, Kodak DCR, Konica Minolta MRW, Fuji RAF, Sigma X3F, Sony SRF, Samsung DNG, Pentax PEF, Olympus ORF, Leica DNG, Panasonic RAW and more

 Supported Camera Brands

  •  Nikon, Canon, Kodak, FujiFilm, Casio, Olympus, Sony, SamSung, Panasonic
  •  Fuji, Konica-Minolta, HP, Agfa, NEC, Imation, Sanyo, Epson, IBM, Goldstar
  •  LG, SHARP, Lexar, Mitsubishi, Kyocera, JVC, Leica, Phillips, Toshiba, SanDisk
  •  Chinon, Ricoh, Hitachi, Pentax, Kinon, Verbatim, Vivitar, Yashica, Argus, Lumix
  •  Polaroid, Sigma and almost all digital camera brands in the market
  •  Android, BlackBerry and other smart phones (excluding iPhone) in the market
  •  Supported Flash Memory Card Manufacturers
  •  SanDisk, Kingston, KingMax, Sony, Lexar, PNY, PQI, Toshiba, Panasonic
  •  FujiFilm, Samsung, Canon, Qmemory, Transcend, Apacer, PRETEC, HITACHI
  •  Olympus, SimpleTech, Viking, OCZ Flash Media, ATP, Delkin Devices, A-Data
  •  and almost all digital camera memory card brands in the market  

TRY THIS KEY

CYTG57SB1-GJJG6F5H9C2M87-T658TFJEMQTDS3E

USB DISK SECURITY KEY FREE

                   
             

laptop (especially laptops!) for movies, songs, images, backups, and other bulky data. USB thumbdrives and portable storage devices let you carry gigabytes of data with you. The USB interface means compatibility with almost every PC. And here's the problem: huge capacity, total portability, universal compatibility, and absolute indispensability work together to render your USB disks and devices especially vulnerable to viruses and other malware. USB Disk Security from Zbshareware Lab is an effective solution for securing your USB disks and data. This easy-to-use shareware is widely compatible with antivirus programs and other security tools. It's free to try, but the fully licensed version comes with lifetime updates and support.
Software tends to look like its type: media players, graphics apps, and e-mail clients usually look like media players, graphics apps, and e-mail clients. USB Disk Security looks like an up-to-date PC security tool, with a colorful and stylish yet professional-looking interface, clearly labeled buttons, and file list views. USB Disk Security incorporates several tools, including USB Shield, with real-time monitoring of USB drives; USB scan, a malware scanner optimized for USB drives; Data Prevention, which consists of the USB Access Control and USB Drive Control tools; and Safe Sites, with a URL Scanner and a Safe Web Navigation feature that sets the program's LinkZB page as your browser's home page. USB Disk Security also bundles some useful System Tools: Disk Cleanup, Repair System, and Autostart List. Unsafe and deleted files are moved to a Quarantine directory. The Settings menu is simple: just a password feature and language menu. But the Help menu is extensive and clearly written as well as illustrated with many screenshots.
We use a lot of USB disks and drives for a lot of different types of data, and we've used many utilities designed to protect them, but never one as powerful and capable as USB Disk Security, or with as many extras. If you like USB Disk Security, the registration cost is a small price to pay to keep your drives and data safe and secure.

KEY

Name : ABEL
Serial : 17752

Thursday 18 July 2013

HOW TO PROTECT EMAIL FROM HACKERS


  •                      

  • Every email service provider, be it Gmail, Yahoo, Hotmail, etc. has different security measures. All of the above companies timely provides security steps to protect user's account. They timely send emails to their customers like your account is being attempted to compromised from different IP addresses. Please change your password.

  • Email address. Have a complicated email address, not so you will forget it, but so no one else can guess it through your name (it should contain a number - for example, John023@_____.com)

  • Have a secure password. Passwords are there to protect your account; without passwords we would be lost. Make sure your password is complicated; do not use your name, or last name. For example, do not put in "John" because the first thing that hackers will do is to guess your password based on your name. Don't use a phrase or use a pet name that most people know about. For example, do not put in "MyPetMaddy" or "ShowUsYouFeelGood". Try to use a complicated code like "mkael092" or use a code like this "09484M92", so it is impossible to guess. Choose a password you have not previously used on your account before. A good password will contain a combination of uppercase and lowercase letters; numbers; and/or special characters such as %, $, and +. It is very important to keep your password private at all times. A password that contains a mixture of letters and numbers is a good way of securing your password.

  • Protect your computer. If your computer is wireless or does not use any antivirus software and is used not just by you, your email address and password is completely at risk. Download free antivirus software by going to www.avast.com. Using wireless isn't the safest form of using the Internet, as it can be hacked by people using network sniffers. If you have no other choice, make sure you have a WPA key on your wireless Internet connection. You can change or add one by going into Connections -> Your Wireless Network -> Wireless Map -> Your Router -> Properties -> Device Webpage. Then click Wireless Security Settings and then "WEP/WPA Key". It's best to have it set using a WPA key as it's the latest version of security.

  • Your email ID and its password are your own confidential information. No company's employee will ever ask you for your password in an unsolicited phone call or email message. The sender is a hacker, no doubt. S/he wants to gain access to your account and send spam emails, like asking money from your contacts or make an unauthorized third party send spam or fraudulent emails to your contact list.

  • If you are a victim of such a scenario, please contact the respective company immediately. Every company has an account verification department. They also provide instant chat support/phone support. By changing your password immediately, you quickly minimize the resulting risk of your Yahoo! account.

  • If you are ever asked for your password in an unsolicited manner or by someone you do not believe to be a representative of Yahoo!/Hotmail/Facebook/gmail, etc., please do not share your password with them and ask them the reason for asking or contact directly the respective company, as they have a separate department to handle such issues, like Yahoo!'s mail abuse department.

  • You should change the security questions and answers wisely. The answer to a good security question:

  • Cannot be easily guessed or researched
  • Doesn't change over time
  • Is memorable
  • Is simple or definitive

  • Tips

  • Do not tell anyone a clue to your password.
  • Keep a copy (if you have to) of your password written down somewhere.
  • Mix letters and numbers change john2468 to (j2o4h6n8).
  • Do not tell anyone your password.
  • Believe it or not, a string of three to four words in a row (i.e. MountainPhoneCandyJupiter) is more memorable and more secure than a difficult to remember password that is shorter. Length matters more than difficulty to guess when you're dealing with a hacker that uses a program.
  • Do not keep a copy of your email details on the Internet or on your system

Wednesday 17 July 2013

HOW TO BECOME HACKER

   

1. Learn TCP/IP, Basic Information gathering, Proxies, Socks, SSL, VPN, VPS, RDP, FTP, POP3, SMTP, Telnet, SSH.
2. Learn Linux, Unix, Windows - You can do this using vmware or any virtual desktop utility.
3. Learn a programming language that's compatible with all OS - Perl, Python, C, ASM
4. Learn HTML, PHP, Javascript, ASP, XML, SQL, XSS, SQLI, RFI, LFI
5. Learn Reverse engineering and crack some programs for serials easy ones like mirc, winzip, winrar or old games.
6. Code a fuzzer for common protocols - ftp, pop3, 80, 8080 - Pick some free software like ftp server, mail server, apache or iis webserver or a webserver all-in-one pack, or teamspeak, ventrilo, mumble.
7. Code a tool that uses grep to sort out unique code in source codes.
8. Make a custom IPtable, IPsec firewall that blocks all incoming traffic and out going traffic and add filters to accept certain ports that your software or scripts use.
9. Pick a kernel in linux or unix, also pick a Microsoft OS version lets say Winxp pro sp2 put them on the virtual desktops (vmware) and find and code a new local exploit in those versions, then install a Apache webserver on the Linux/Unix and a IIS webserver on the winxp pro and attempt to find and code a new local reverse_tcp_shell exploit.
10. Learn Cisco Router and Switch configuration and setup.
11. Learn Checkpoint Setup and Config
12. Learn Wifi scanning, cracking, sniffing.
13. Pick a person in you phonebook for the area code you live in or city then ring the person on a anonymous line like skype or a payphone or a carded sim and attempt to social engineer the person for his name, address, data of birth, city born, country born, ISP connected with, Phone company connected with, What bank he/she uses and anything else you can get. Then Attempt to ring using a spoof caller ID software with the person's phone number - call the ISP and try reset the password to his/her internet connection/web-mail, get access to bank account or ask them to send out a new *** to a new address (drop) with a new pin, reset of phone company passwords.
14. Use your information gathering skills to get all the information off a website like a shop then use the spoof caller-id software or hack your phone to show a new number of the Webserver's Tech Support number then ring the shop owner and try get the shop site password.
15. Do the same thing but attempt to use a web attack against a site or shop to gain admin access.
16. Once got access upload a shell and attempt to exploit the server to gain root using a exploit you coded not someone else s exploit.
17. Make your own Linux Distro
18. Use your own Linux Distro or use a vanilla Linux gnome (not kde) keep it with not much graphics so you can learn how to depend on the terminal and start from scratch install applications that you will only need for a blackbox (Security test box), make folders for fuzzers, exploits, scanners..etc Then load them up with your own scripts and other tools ( By this stage you shouldn't need to depend on other peoples scripts).
19. Learn macosx and attempt to gain access to a Macosx box whether it be your own or someone's else.

HOW TO KNOWN SOMEONES IP ADDRESS


There are several methods to known somones ip address. Try which u will get it well

Method 1

if you have a web server hosted someplace where you can see its logs then it's very easy to send someone a URL of an image or any webpage hosted on your web server (http://123.123.123.123/veryfunnyimage.jpg) whenever this page is visited the web server keeps a log of who visited that page (IP address, time, browser, OS ... and lots of more info) where you can check later to collect IP addresses. if

Method 2

sometimes people get freaked out from addresses that have ip addresses in the URL so having your webserver with a domain name would really help the person you sent the URL to press on the link (www.mywebsite.com/veryfunnyimage.jpg)

Method 3

Some paranoid people don't open links to unknown sites. so here comes the cool trick. you can embed the image in a post of yours in a known site that allows HTML tags with image sources like < img src = (your image URL). in this case the URL you are going to send to the person is a link to a known website but the website contains another link to your web server. And whenever someone views this page on the known website, the "img src" link is invoked and voila!, you have a log entry on your webserver.

Method 4

Some Ultra paranoid people don't open links at all!! for these people I use my old trick. I send an email to the target that looks important to him (depending on the target actually and what's important to him). This email is in HTML format and contains a tag that links to an image on my webserver (probably a white image not to attract attention). Now upon merely opening the email, my webserver is invoked and a log entry is saved about the persons current IP address.

Note that this method only works if the email client allows images to be displayed (gmail disable that by default)

Method 5

A more faster approach is IM. If you have the IM of the target, then it's possible that you try to send him a file (not malicious, a picture or smthng). upon sending the file, a direct connection is established between you and the target. with a simple connection monitoring application (e.g.netstat on windows), you can know the Ip address.

Method 6

Some paranoid people don't accept files! so another trick in case of MSN is background sharing. the default for MSN is to accept backgrounds shared by others. Actually background sharing performs file sending if the background is not one of the default backgrounds. So the trick is to set your background for the IM to a cool pic from your computer and share it. if the default setting was not altered on your target's IM, then he will automatically accept it right away and a connection is opened. here comes again the connection monitoring app where you can identify the new connection and extract the IP add of the target.

Well those are one's that I used .. do you have any other methods ?? sometimes I only have the username on a forum or website. Any clues?

UPDATE:

Method 7

  In MSN messenger, if u don't have the display picture of the person you're talking to, the messenger will try to download it by default. this cause the the MSN to open a direct connection. Using a sniffing tool like wireshark will allow you to know the IP of the remote person.So basically if you don't have his display picture and you opened the chat window you'll get your log entry. You can either convince the target to change his/her display picture or you can remove the your local directory that caches the display pictures for all contacts (located in application data folder for the msn) to force the messenger to redownload the picture.

HOW TO INCREASE SPEED TO COPY FILES


                             
About:-

TeraCopy Pro soft name for the purpose of its use enhances the speed of moving files and copy them in Windows with as above what for you by default by Windows. An interesting feature of this product can be used to point out that if you copy the information you can stop this operation again from the same point to continue passing information. versions of this software from all Windows, including Windows 7 is also supported. Supports 20 languages including the English language as well as the characteristics of this software.
The software TeraCopy Pro is able to update the common errors when copying the information to fix the problem and stop.

Time-saving and compact nature of the product offerings of features is that TeraCopy is very popular. this product by Code Sector at the disposal of users.

  click here DOWNLOAD

Tuesday 16 July 2013

HOW TO UNLOCK IOS ALL VERSIONS JAIL BREAK

Recently, law passed that made unlocking cell phones in the United States illegal for phones bought after January 26th 2013. While the rules are not really enforced currently we recommend U.S. citizens to use phones purchased before the 26th.

If you don’t know already, unlocking a phone will allow it to run on any other carrier supported by the phone itself and take away the restrictions placed by a carrier. Factory unlocking works directly through the carriers company and when applied will last indefinitely no matter if you update the software, restore, jailbreak or whatever. The only downside is that it will cost money as it can not be done by just anyone like most software unlocking used to work.

The good news is that the popular carrier AT&T can be very cheap while others are unfortunately more expensive. The process is very simple once you pay all you have to do is wait for the phone to be remotely unlocked. Most services take less than a day and respond to questions quickly.


     


UNLOCK IPHONE ALL MODELS

   
                      
PROCEDURE

Do you ever wonder how you can unlock your iPhone 4? Well, there are two known methods for the modification and one involves using a kit and the other one is through a software program. You may follow the steps below to perform the device enhancement by using an application.

Steps To Unlock iPhone 4

1.Firstly, download the needed software to get started. You can do that here: Unlock Software

2.  Go to the Springboard and then tap on the Cydia installer to launch it. After launching the application, the Cydia main menu will be displayed on the screen. You will see several buttons especially at the bottom part of the screen. You may then click o the Manage tab which is located in between the Search and Changes tabs.

3.  Select the “Sources” option among the three items presented at the Manage page. You will see a list of options at the Sources page and if you se the software’s repo, just skip the steps below and proceed to step 8.

4. If there’s no repo among them, just click on the Edit button located next to the text that says “Sources”. Click on the Add button and then continue by typing the source url of the software.

5. You will have two options after entering the url, once is the Add Source button and the other one is the Cancel button. Just click on the first option to add up the url.

6. The screen will turn black once the source has been added and all you have to do is go to the bottom art of the page and the tap on the Return to Cydia button. Hit on the Done button the the upper part of the Sources screen.

7.  At the Sources screen, you will see a list of installed packages or of sources entered by users.  Select the software’s url among the options.

8. Once you are in the repo666 page, select the item that says the software’s name.

9. Go to the top right part of the screen, click on Install and then followed by the Confirm button.

10. Click on the Restart Springboard button to complete the whole modification process.

Again, to get started you’ll need the correct software. Visit: Unlock Software

It can be a lot easier and safer to use a software program instead of using the SIM kits method. If you perform the technical changes using any of the kits available in the market, it can be both risky and expensive. Using an application is a lot better since it allows you to hack your device without any trouble at all.

Monday 15 July 2013

REMOVE WRITE PROTECTION FROM USB DISK IN WINDOWS

                      

Sometimes we get a problem on our PC that when we try to copy something to our USB disk it shows an error that "The disk is write protected". If the problem is due to viruses or any error in Windows registry then it can be rectified. But someone has intentionally make it write protected by adding a password then it will not work.

Process:
1. Open registry Editor.
Also Check: How to open Registry Editor and Group Policy Editor
2. Navigate to  HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies
3. Create a new key "WriteProtect" there.
4. Change the Value of write protect key to 0 In the Value Data Box. Press OK
5. Exit Registry
6.Restart system and re connect usb

Friday 12 July 2013

HOW TO CREATE FREE WEBSITE WITHOUT CODING


                                      

They are many websites available in online to create a website with out coding. For building a website you have to familiar with html or java coding but many websites providing  to build a website freely with out coding.

www.wix.com will help to design the website without coding .There are many templates available in different streams to build  a awesome website without coding.

Wix has something for everyone, so whether you’re a photographer, musician, small business owner, entrepreneur, bride or student, we provide all the tools
and features you need to build an amazing online presence for FREE.
Create your own original website that reflects you or your brand and get online today. We keep complex techy processes behind the curtain and guarantee that your experience is simple, fun and code-free.
We have the only drag n' drop website building platform with HTML5 capabilities,
100s of designer made templates, top grade hosting, innovative Apps and tons
of features for free. We offer valuable premium services (hey, we need to make
money too), but our business model allows us to provide full websites to
everyone for free.