Jai Shree Ganesh

Jai Shree Ganesh

Collection of Medical ppt

Hey here is some medical ppt which is not going to help any engineers but worth useful for medical students....
http://www.medicalppt.blogspot.com

Hack using Telnet

In this Guide you will learn:

· What is telnet?

· How to telnet

· How to get telnet accounts

· Why you might not want to telnet

· How to install a telnet server on your home Windows computer

· How to turn off a telnet server on your home Linux computer

· How to explore computers using telnet

· Why not use a portscanner instead?

· How to break into web sites using telnet

"Where do I type that command?" People ask that all the time when they read my early Guides to (mostly) Harmless Hacking. I wrote those guides back when the Internet was in its infancy and almost everyone in cyberspace used telnet. However, nowadays you might never even hear about telnet, much less use it, unless you are a hacker. So if you are still wondering about telnet, today is your lucky day.

What Is Telnet?

Telnet is a protocol that is most commonly used to log into a remote computer. It also is the single most powerful hacking tool on the planet. With just a telnet client program, you can:

· send email

· download source code from web sites

· send unexpected input to webservers that can give you amazing and sometimes illegal results

· give arbitrary input to many other services on Internet host computers

· probe the services offered by servers, routers and even people's home computers.

How to Telnet

Don't know how to telnet? Click the easy telnet links at happyhacker.com and land in the middle of a real hacker wargame! This should work regardless of your computer operating system -- if you have an up to date browser, if your online service provider gives you a true Internet connection, and if your computer is able to telnet at all.

Did those links get you into a telnet session? Were you able to login to a remote computer? If yes, congratulations.

If not, how can you fix the problem? If no telnet program appeared on your monitor when you clicked these links, perhaps your browser is too ancient to allow telnet. Try installing the latest Netscape browser (). Or, perhaps your operating system does not include a telnet program. In that case, install or reinstall Windows 95 or 98. If you own a Mac, get the superb Mac OS X or Linux PPC ().

If a telnet program came up and failed to connect, possibly the computer you were trying to telnet into was down or just plain no longer in existence. Or, you may be using America Online (or a similar extremely poor online service). If so, your simplest solution may be to get a better online service provider. Determined to hack using AOL? See http://happyhacker.org/aol.shtml <../aol.shtml> for some ways to make AOL give you a true Internet connection.

OK, so you've managed to telnet for the first time. Presumably you don't want to limit yourself to telnet links on web sites. How do you telnet anywhere you want to go?

If you have Linux or any other type of Unix (BSD, SCO, Solaris, Sun OS, Irix, Ultrix, etc.) telneting is easy. Just bring up "console" or "shell" (or whatever your GUI calls the command line interface). At the prompt type:

telnet

More on Telnet: the Number One Hacker Tool

Windows 2000 works pretty much like Unix. See Figure 1 for an example of a Win 2000 telnet login. Not shown on the screen was the command "telnet 10.0.0.10", which I gave at the Command (MS-DOS) prompt.

Figure 1: Telnet using Windows 2000

If you have Windows 95, 98 or NT, to telnet, bring up the MS-DOS prompt (Start --> Programs --> MS-DOS).

Click "connect" then "remote system…". In the host name box place the host name or IP address of the computer to which you wish to telnet. Leave the Port and Term Type boxes alone for now.

Here is a really important point. Every day people email me complaining that some computer won't let them telnet into it. They ask what they are doing wrong. They aren't doing anything wrong:

· Maybe the computer they are trying to reach no longer exists.

· Maybe the computer they are trying to reach doesn't allow telnet logins. For example, whois.internic.net no longer allows telnet logins on port 23 (the default port). Click here to learn how to telnet into whois.internic.net on the right port for that particular server. <../whois.shtml>

· Maybe a firewall is blocking them.

· Or maybe they make a telnet connection and the remote computer asks for a user name and password they don't have. Then they email me asking for how to get a login name and password that will work.

Newbie note: The owners or administrators of any Internet host computer decide who gets user names and passwords. Believe it or not, about once a week someone emails me asking what user name and password their own online service provider has assigned them for a telnet login. That's why I'm telling people the obvious -- if you want to telnet into any computer, and you don't have a user name and password, you must ask the owner, administrator of tech support for that system for a user name and password. If they won't give that to you, they don't want you to have it!

You can go to jail warning: If you guess the user name and password, or use a computer breakin technique to get or create them, or if someone other than an owner or administrator or a legitimate user on that system gives you a user name and password, it is against the law to use them. Many computer criminals give out user names and passwords that they obtained illegally.

More on Telnet: the Number One Hacker Tool

How to Get Telnet Accounts

OK, so you want to get legal user names and passwords so you can telnet into other computers. Here are some of the best ways:

· See http://happyhacker.org/links2.shtml#shells <../links2.shtml> for organizations that will give you free shell accounts. You can telnet into these.

· Ask Internet Service Providers for shell accounts. Some offer them, although most don't.

· Set up a telnet server on your own computer (see instructions below). Yes, once you are running a telnet server, you can telnet from your computer back into your computer. Simply give the command "telnet 127.0.0.1".

· Make friends with people who run Internet computers with telnet servers.

Why you May Not Want to Telnet

If you love your shell account server, don't ever, ever telnet or ftp into it. I recommend Ssh or Openssh for logging into remote computers? The telnet (and ftp) protocol is a "clear text" transmission. That means that computer on the same LAN as either You or your destination computer, or any computer on any LAN or network path through which your connection passes can steal your login name, password or anything else that goes across your connection. Ssh and OpenSsh encrypt all communications so no one can snoop on you.

How to Install a Telnet Server on your Windows Computer

Usually you can't telnet into a Windows home computer. The reason is, they aren't running telnet servers. Here's how to get a telnet server on your home Windows computers so your friends and you can telnet in and play.

For Windows NT, the Options Pack includes a primitive telnet server.

For Windows 95/98/NT and 2000, you also can install shareware or commercial telnet servers. Check out http://www.winfiles.com, or do a web search.

Of course installing a telnet server makes your computer vulnerable to all sorts of trouble from hackers. It's your funeral, don't come crying top me if a telnet visitor destroys your computer

More on Telnet: the Number One Hacker Tool

How to Turn off a Telnet Server on your Unix-type Computer

If you go online with Linux or other Unix-type computer, a telnet server is the easiest way to ensure you get destroyed by a malicious hacker. Here's how to prevent this. On most of these, the file /etc/inetd.conf launches most of your servers. Edit the file to put a "#" in front of the line that has telnet in it and either reboot your computer or kill and restart inetd.

If your computer doesn't use inetd to launch services, you should be able to find telnetd under /etc/init.d.

Install ssh instead and only use that to log into your shell account.

How to Explore Computers Using Telnet

Even if a computer doesn't have a telnet server, there are lots of fun and even legal things to do to it using telnet. The easiest thing to do is extract "banners" from a victim computer. A banner is a message a computer will often give when you telnet to a port that is running an Internet server of some sort.

For example, most mail sending servers use port 25. To telnet to port 25 from Win 2000 or a Unix shell, simply type:

telnet 25

Windows 95, 98 and NT make it a tiny bit harder.

More on Telnet: the Number One Hacker Tool

If the victim computer is running a mail server, you will see something that looks like this:

Whoa, look at that! The victim computer told us what operating system (Windows NT) and mail server (Mercur) it runs!

A quick search of the Bugtraq archives at revealed horrid things a criminal could do to that Mercur mail server. Since I think it is more fun to be nice, I told someone at the company using this mail server about the problems. He invited me to vacation at his beautiful Swiss home, where he and his wife keep horses and take long trail rides in the Alps. Golly, that is much more fun than breaking into a computer!

Right about now some elite ueberhaxorz are probably reading this and saying "What a lamer Meinel is! We can do the same thing by running nmap."

They are right, you can learn the same things by running a port scanning program such as nmap (available at ). However, I am quite careful about under what circumstances I run any port scanner. In order to get information on what programs are running on what ports, you must run a port scanner in a mode that will probably convince the owner of the victim computer that you are a criminal. He or she may persuade your online service provider to cancel your account.

The other reason to analyze computers using telnet is that you learn more. It's the difference between eating at McDonalds and learning how to cook.

More on Telnet: the Number One Hacker Tool

A quick search of the Bugtraq archives at revealed horrid things a criminal could do to that Mercur mail server. Since I think it is more fun to be nice, I told someone at the company using this mail server about the problems. He invited me to vacation at his beautiful Swiss home, where he and his wife keep horses and take long trail rides in the Alps. Golly, that is much more fun than breaking into a computer!

Right about now some elite ueberhaxorz are probably reading this and saying "What a lamer Meinel is! We can do the same thing by running nmap."

They are right, you can learn the same things by running a port scanning program such as nmap (available at ). However, I am quite careful about under what circumstances I run any port scanner. In order to get information on what programs are running on what ports, you must run a port scanner in a mode that will probably convince the owner of the victim computer that you are a criminal. He or she may persuade your online service provider to cancel your account.

The other reason to analyze computers using telnet is that you learn more. It's the difference between eating at McDonalds and learning how to cook.

How to Break into Web Sites Using Telnet

You don't have to use a web browser to access files on a web site. All you need to do is:

telnet 80

Or specify port 80 in a Windows telnet.

If you are using Windows 95/98/NT, whenever you are NOT logging into a telnet account, you should enable local echo. Otherwise whatever you type in (unless you are in a telnet account) will not show on the screen. To enable local echo, click Terminal --> Preferences --> Local Echo.

So how do you send stuff back to the webserver? Try this:

GET / HTTP/1.0

What kinds of commands can you send? The book Hackproofing Your Network <../bookstore/general.shtml> (by Ryan Russell of Securityfocus.com and Stance Cunningham) suggests a fun and harmless hack. Create and store a bogus cookie in the location on your web browser that stores cookies. (Find it by searching for the file "cookies.txt".) Name your bogus cookie something like "MyBogusCookie." Then telnet to the victim webserver and give something like this command:

GET / HTTP/1.0
User-Agent: HaveABogusCookieThisIsAJoke 123.4
Cookie: /; MyBogusCookie

The Ãœberhacker! -- How to Break into Computers <../uberhacker/index.shtml> book details a number of serious attacks you can perform through sending funny input to a webserver. Basically, you need to learn how to write shell programs, and then find ways to get them to be run by the webserver. I'm not going to explain them here, however. These attacks, when carried out against a vulnerable webserver, are so easy that little kids could do them, and I don't want to be responsible for their behavior. It's much harder for little kids to get a hold of Russell's and my books than it is for them to read this GTMHH on the Happy Hacker website.

So are you dying to know what to send a webserver in order to break into it, without having to buy a book? Here are some hints. How to do this will depend on what webserver it is, what operating system it runs on, whether its security weaknesses have been fixed, and whether the web designer has used things such as Common Gateway Interface (CGI) or Server Side Includes (SSIs) that have weaknesses in them.

You will have to research these issues at Web sites that archive vulnerabilities and exploits such as and . You will need to study web site programming (HTML -- hypertext markup language, CGI and SSIs) and shell programming. You will need to learn webserver commands (documented at ). You will have to use your brain and be persistent.

But at least if you come across a telnet exploit, now you know the answer to the question "where do I type that command?"

View restricted sites-Use the below proxies

Proxy servers hide your IP address and thereby prevent unauthorized access to your computer through the Internet. They do not provide anyone with your IP address and effectively hide any information about you and your reading interests. Besides that, they don’t even let anyone know that you are surfing through a proxy server.

TYPES OF PROXY

Transparent proxy

A transparent proxy announces to the world that it's a proxy, and passes on your information. It provides no privacy improvements. It can provide a benefit by caching frequently accessed pages; many companies also use this system for filtering purposes.

Anonymous proxy

An anonymous proxy offers the caching benefits of a transparent proxy, while hiding your IP address (by replacing with either the proxies IP, or a random address. The downside to this approach is that sites that use address detection to establish unique users (online games, voting, some logins) will not be able to distinguish you from others in your domain. Of course, that might be a bonus sometimes.

Highly Anonymous proxy

A highly anonymous (often known as an elite proxy) makes your system look the same as a non-proxied system (with the proxy server's IP address). This provides the best security; however, all the caveats of an anonymous proxy are still present. In addition, an anonymous proxy's existance can be detected, and the server can suggest workarounds, but there's no way to detect an elite proxy. Again, that may be your goal.

NOW A PROXY ADDRESS MAY LOOK LIKE xxx.xxx.xxx.xxx:xxxx

for eg. 192.168.1.1:3128

The part 192.168.1.1 represents the IP address of the proxy and 3128 the port through you connect to proxy.

There are many websites like www.hidemyip.com anonymouse.org , www.hidemyass.com.

These sites do not change your IP address but you can surf the internet with great privacy.

A good method to change your IP is to use a CGI based proxy. While there are thousands of proxies available but only a few will work in your browser. Now these type of proxies can assure full online privacy.

Latest List of Proxy Sites-Just log on to any of the site listed below then write the address of the site and view any of the restricted sites in your school or college...
http://www.proxylink.info/
http://www.hideyourpersonal.info/
http://www.limeproxy.info/
http://www.arcademachine.info/
http://www.superbrowser.info/
http://www.hidemyaccess.com/
http://www.ok156.com/
http://www.yurj.com/
http://www.concealmyip.com/
http://www.thunderproxy.com/
http://www.freebrowser.info/
http://www.quickbrowse.info/
http://www.untraceable.info/
http://www.chilliproxy.info/
http://bnosy.com/
http://www.myredproxy.com/
http://www.filterlessbrowser.com/
http://www.myspacebrowse.net/
http://www.optiproxy.com/
http://www.my-free-proxy.com/
http://www.unblocko.com/
http://www.spinproxy.com/
http://www.aroundcensor.info/
http://www.aroundwork.info/
http://www.aroundban.info/
http://www.lethergo.in/
http://www.lethimgo.in/
http://www.letusgo.in/
http://www.letmego.in/
http://www.icanbrowse.info/
http://www.imsosneaky.com
http://www.certainproxy.com/
http://www.proxy-monkey.com/
http://www.evelez.net/
http://www.finxe.com/
http://www.ezproxee.info/
http://www.ipconcealer.com/
http://www.concealedweb.com/
http://www.fastproxy2u.com/
http://www.legalsurf.info/
http://www.fastwebproxy.net/
http://www.concealmyspace.com/
http://www.ucproxy.com/
http://www.keep-it.info/
http://www.letmeunblock.info/
http://www.apple-nike.com/
http://www.proxy23.net/
http://www.myspaceipchange.info/
http://www.boredsurf.com/
http://www.4ra.net/
http://www.4ri.net/
http://www.8au.net/
http://www.letmeunblock.info/
http://www.myspaceipchange.info/
http://www.ucproxy.com/
http://www.schoolbites.info/
http://www.highschoolsurf.com/
http://www.campusbypass.com/
http://03.vc/
http://www.rapidwire.info/
http://www.surfspy.info/
http://www.rapidwire.info/
http://www.nowyoudont.com/
http://www.unblockitall.info/
http://www.daubed.com/
http://www.surfgames.info/
http://waveproxy.net/
http://www.vtunnel.com/
http://nowebfilters.com/
http://flyproxy.com
http://www.bigate.com/cgi-bin/bigate/b/k/k/
http://www.userbeam.de/
http://www.calcmaster.net/
http://www.misterprivacy.com/begin_anonymous_surfing.htm
http://www.myshield.com/
http://www.idzap.com/
http://www.safegatetech.com/
http://www.breiter.ch/
http://www.rrdb.org/rrdbproxy.php?l=en
http://proxy.decodes.biz/
http://proxy.mxds.ch/
http://www.spondoo.com/
http://search.sicomm.us/
http://schnarre-monika.celebrityblog.net/cache.cgi
http://filter2005.com/
http://www.kproxy.com/
http://www.websitereactor.org/cgi-bin/001/nph-.pl
http://www.goproxing.com/
http://anonycat.com/
http://www.spynot.com/
http://www.merletn.org/anonymizer
http://www.cgi-proxy.net/
http://www.proxymouse.com/
http://www.theunblocker.tk/
http://www.betaproxy.com/
http://www.letsproxy.com/
http://www.freeproxysurf.info/
http://www.mysticproxy.com/
http://www.proxywave.com/
http://www.vtunnel.com/
http://www.proxysnail.com/
http://www.freeproxy.ca/
http://basic.3proxy.com/
http://www.privatebrowsing.com/
http://www.hackingtruths.org/proxy
http://xanproxy.be/
http://www.ipsecret.com/
http://www.proxyanon.com/
http://www.anonproxy.info/
http://www.proxysafe.com/
http://www.strongproxy.com/
http://www.boredatschool.net/
http://www.ukproxy.com/
http://www.simpleproxy.com/
[MALICIOUS LINK SUPPRESSED]
http://surfonym.com/
http://geoepker.hu/freeproxy/
http://www.browseatwork.com/
http://www.ipblocker.info/
http://www.boredatwork.info/
http://www.anonymousurfing.info/
http://www.browsingwork.com/
http://www.freeproxyserver.org/
http://www.browseany.com/
http://www.browsesecurely.com/
http://ieproxy.com/
http://www.sneak3.po.gs/
http://www.proxytastic.com/
http://www.freewebproxy.org/
http://www.thecgiproxy.com/
http://www.hide-me.be/
http://www.anotherproxy.com/
http://www.proxy77.com/
http://www.surf-anon.com/
apliterature.info
apenglish.info
apushistory.info
apcalculus.info
peak40.com
apbiology.info
passthedata.com
surfnfree.com
fuzmuz.com
apchemistry.info
nomoreblocks.info
virtual-browser.com

proxykiller.info
jerseybrokers.info
overridewebsense.com
unblock.be
kaaawa.info
unblockthesites.com
proxyeh.com
gibraltarbusiness.info
bigsocial.info
seychellesflights.info
uruguayapartments.info
hiddenexpress.com
getpastwebsense.com
bive.org
circumventors.info
beatfilters.com
russiaholiday.info
websenseavoid.com
wonderfulunblocker.info
wehidesites.com
hotexpress.info
prox101.info
getaroundfilter.info
aulab.info
avoidfilters.info
overrideblock.com
proxy101.org
classbrowser.com
floravitamins.info
maltabrokers.info
peruapartments.info
nides.info
filter-ip.com
moscowapartment.info
hugeunblocker.info
goodunblocker.info
ninjahide.com
nyclife.mobi
portlandapartment.info
saintgeorges.info
omanapartments.info
getaroundblock.com
sandersville.info
ckbia.com
browseprox.com
visitburkinafaso.info
avoidfiltering.com
unblockmysurf.com
connectnow.info
bypassingfilters.com
fastpanda.info
fleesurf.com
onlinediagnostics.info
iproxied.com
surfcontrolbypass.com
gibraltaroffshore.info
leuwen.info
kuwaitbrokers.info
turkeybrokers.info
circumventer.info
greeceapartments.info
proxify.net
proxoid.com
huvs.info
somervilleapartment.info
proxycheap.com
youarehidden.com
bigbrotherproxy.com
urlburst.com
funnycam.info
parisdating.info
tempidentity.com
proxyless.net
finlandflight.info
coldip.com
paymentform.info
visitcomoros.info
norwayapartments.info
furnituredesk.info
hidemyback.net
visitgabon.info
irelandapartments.info
nailset.info
lovepersonal.info
niceunblocker.info
imbanned.info
w3privacy.com
websneak.info
hidemeup.com
surfandhide.com
zeroization.com
kekaha.info
sciencesoftware.info
facebookproxyonline.com
http://sneakyuser.com/
http://www.hideu.net/
http://proxify.com/
http://www.hidemyass.com/
http://www.proxybrowsing.com/
http://collegepie.com/proxy/index.php
http://www.proxybrowsing.com/
http://myspace-anonymous-proxy.xtreview.com/
http://www.gostealthy.com/
www.hidehome.com
http://www.blockfilter.com/
www.hidemyass.com
http://sneakyuser.com
http://collegepie.com/proxy/index.php
www.bebounblocked.com
www.blockstop.com
www.blockstop.net
www.cdweb.info
http://amyspaceproxy.com/
www.weprox.comwww.weprox.info
www.weprox.bizwww.dahprox.com
www.xxxproxy.com
vivol.info
fengzhen.info
montrealapartment.info
visitvatican.info
kapaa.info
bypassease.com
proxy901.info
miami-gardens.com
Vtunnel.com (Supports SSL)
Vtunnel.biz
Vtunnel.info
Vtunnel.us
Vtunnel.tv
V-tunnel.org (new)
Atunnel.com
Btunnel.com
Ctunnel.com
Dtunnel.com
Ftunnel.com
Gtunnel.com
G-tunnel.com (new)
H-tunnel.com (new)
I-tunnel.net (new)
Jtunnel.com
J-tunnel.com (new)
Ktunnel.com
K-tunnel.com (new)
Ltunnel.com
L-tunnel.com (new)
M-tunnel.com (new)
Ntunnel.com
N-tunnel.com (new)
Otunnel.com
O-tunnel.com (new)
Ptunnel.com
P-tunnel.com (new)
Q-tunnel.com (new)
Rtunnel.com
R-tunnel.com (new)
T-tunnel.net (new)
Wtunnel.com
Ztunnel.com
Ftunnel.net
Htunnel.net
Jtunnel.net
Ktunnel.net
Ltunnel.net
Ntunnel.net
Otunnel.net
Rtunnel.net
Wtunnel.net
W-tunnel.com (new)
Ztunnel.org
Unblock-Websense.com (new)
Unblock-Bess.com (new)
UnblockWebsense.com
UnblockBess.com
Polysolve.com
VPNTunnel.net
SafeForWork.net
24Proxy.com (new)
24Traffic.info (new)
HideMyBox.com (new)
ProxyButton.com (new)
IraniProxy.com (new)
WizProxy.com (new)
Backfox.com
Calculatepie.com
DahProxy.com
Englishtunnel.com
EvProx.com
FreeIam.info
g2gToMyspace.com
http://62.193.249.41
http://62.193.245.234
http://62.193.236.96
http://62.193.236.100
http://62.193.235.46

# https://www.utopianpal.com
# http://www.surf100.com
# www.gazzastunesproxy.info
# filterlite.info
# hidetunnel.info
# yiddoo.info
# ultrahide.info
# unblockcyberspace.info
# hidetheweb.info
# xoxxox.info
# www.betterlook.info
# www.collegequote.info
# reezoo.info
# hidethepc.info
# paxdoo.info
# unblockawebsites.info
# www.proxybooster.cn
# firefox3.be
# www.ipboys.com

# https://www.utopianpal.com/
# http://surfall.net
# ivci.org
# www.universeproxy.com
# www.kpr0xy.com
# filterbrowse.info
# xteb.info
# hidepc.info
# facebookproxies.info
# babesonline.info
# xteb.us
# 49a.info
# proxhid.info
# proxy4hi5.info
# www.proxy4facebook.info
# proxy4bebo.info
# myspacenewproxy.com
# myspaceproxies.info
# www.unhideme.net
# free2click.info
# www.clickmode.com
# www.utopianpal.com
# shork.ws
# proxhost.us
# rapidremote.info
# justavoid.net
# filterblast.info
# fastfacebook.info
http://proxifyit.appspot.com/
http://surfall.net
5toc.com
4plus9.com
idmask.info
4plus12.com
4plus11.com
www.viddivision.com
pr0xy.pl
www.bypasscat.info
www.nighttimecloak.com
ipclass.info
www.proxywebsite.ca
www.mazda5zone.info
www.flippinsweet.net
www.antibloxx.com
www.theblueproxy.info
monkeytrio.com
huhy.info
hidebooks.info
unblockmyspace3.info
zzzstore.info
hidemyplay.info
zzztoday.info
proxyneeds.info
www.criminalproxy.cn
alfrahost.com
www.beyond1.info
www.hideallday.info
liv3.in
www.crookedsurfing.info
www.browsedaweb.com
asuntos.info
www.fadecover.info
www.autohide.info
www.yolkd.com
infoproducts.info
calcite.info
myzzz.info
freezzz.info
bestzzz.info
hidemyclass.info
thezzz.info
zzznow.info
zzzonline.info
tinypig.info
zzzsite.info
zzzstore.info
hidemyplay.info
zzztoday.info
proxyneeds.info
www.criminalproxy.cn
alfrahost.com
www.beyond1.info
www.hideallday.info
liv3.in
www.crookedsurfing.info
www.browsedaweb.com
asuntos.info
www.fadecover.info
www.autohide.info
www.yolkd.com
infoproducts.info
calcite.info
myzzz.info
freezzz.info
bestzzz.info
hidemyclass.info
thezzz.info
zzznow.info
zzzonline.info
tinypig.info
zzzsite.info
zzzstore.info
hidemyplay.info
zzztoday.info
proxyneeds.info
HideU.pl
filteraccess.info
www.findstuff.asia
www.hidemein.cn
www.zzzshop.info
www.bypassdoor.info
cloakb.info
disapeer.info
www.unoticed.info
www.seeurl.info
www.urlsurf.info
www.getcover.info
www.megacover.info
www.mustsee.info
www.httphide.info
www.bumhide.info
www.cvvv.org
www.hidingproxy.tk
hidemyweb.info
www.federalproxy.info
iloveproxy.us

Edit your Image as u like it.....

Images Site
http://www.imagechef.com/ic/product.jsp
http://www.caption.it/
http://asciizone.blogspot.com
http://www.glassgiant.com/
http://sig.graphicsfactory.com/

Some Useful ftp Links

FTP Links
ftp://193.10.65.230/
ftp://193.124.215.195/
ftp://193.124.57.116/pub/music
ftp://193.124.57.116/pub/music/Joe_Satriani/
ftp://193.124.85.215/
ftp://193.124.85.215/mp3
ftp://193.125.152.110/pub/.1/misc/sounds/mp3/
ftp://193.125.152.110/pub/.1/misc/sounds/mp3/murray/
ftp://193.125.152.110/pub/.1/misc/sounds/mp3/murray/2fools
ftp://193.140.250.19/mp3/
ftp://193.140.250.19/mp3/CSNY/
ftp://193.140.54.18/
ftp://193.170.46.174/
ftp://193.170.92.31/pub/54/Thirteen.avi
ftp://193.190.244.145/
ftp://193.2.123.66/upload
ftp://193.219.160.115/incoming/
ftp://193.219.166.69/
ftp://193.219.168.116/Video
ftp://193.219.168.116/Video/
ftp://193.219.33.197/pub/Mokslai/PCsoft/nt2/
ftp://193.219.42.67/Dokumentacija/
ftp://193.224.41.111/pub/cstrike/
ftp://193.226.140.129/games/
ftp://193.233.48.66/pub/software/quake/
ftp://193.233.85.46/pub/OS/Windows/graphics/ACDSee/
ftp://193.233.9.194/
ftp://193.25.37.130/
ftp://193.25.37.130/pub/patches/adobe/premiere6/
ftp://193.251.144.217/
ftp://193.251.144.217/logiciels/
ftp://193.28.86.29/
ftp://193.43.36.131/
ftp://193.43.36.131/radio/
ftp://193.43.36.131/Radio/MP3/
ftp://193.6.156.020/
ftp://193.6.156.16/
ftp://194.105.193.56/
ftp://194.105.193.56/pub/warez/books/
ftp://194.109.159.49/hdb1/texts/
ftp://194.109.159.81/hda6/movies/night_of_the_living_dead/
ftp://194.109.159.81/hda6/movies/night_of...living_dead.mpg
ftp://194.109.206.210/pub/c64/Scene/Old
ftp://194.109.206.210/pub/Linux
ftp://194.109.206.211/incoming/
ftp://194.109.206.211/pub/c64/Scene/Old/h/
ftp://194.109.206.212/incoming/
ftp://194.109.206.60/pub
ftp://194.149.135.49/
ftp://194.149.135.49/outgoing
ftp://194.153.128.133/
ftp://194.153.128.133/pub
ftp://194.190.136.15/
ftp://194.190.136.15/Documents
ftp://194.190.136.15/HTML
ftp://194.190.221.196/
ftp://194.204.28.130/Vanadest
ftp://194.204.5.180/incoming/
ftp://194.226.121.165/

ftp://193.10.65.230/pub/incoming/
ftp://193.124.215.195/mirrors/hdn
ftp://193.124.57.116/pub/music
ftp://193.124.57.116/pub/music/
ftp://193.124.57.116/pub/music/Joe_Satriani/
ftp://193.124.85.215/
ftp://193.124.85.215/mp3
ftp://193.125.152.110/pub/.1/misc/sounds/mp3/
ftp://193.125.152.110/pub/.1/misc/sounds/mp3/murray/
ftp://193.125.152.110/pub/.1/misc/sounds/mp3/murray/2fools
ftp://193.140.250.19/mp3/
ftp://193.140.250.19/mp3/CSNY/
ftp://193.140.54.18/
ftp://193.170.46.174/
ftp://193.170.92.31/pub/54/Thirteen.avi
ftp://193.190.244.145/
ftp://193.2.123.66/upload
ftp://193.219.160.115/incoming/
ftp://193.219.166.69/
ftp://193.219.168.116/Video
ftp://193.219.168.116/Video/
ftp://193.219.33.197/pub/Mokslai/PCsoft/nt2/
ftp://193.219.42.67/Dokumentacija/
ftp://193.224.41.111/pub/cstrike/
ftp://193.226.140.129/games/
ftp://193.233.48.66/pub/software/quake/
ftp://193.233.85.46/pub/OS/Windows/graphics/ACDSee/
ftp://193.233.9.194/
ftp://193.25.37.130/
ftp://193.25.37.130/pub/patches/adobe/premiere6/
ftp://193.251.144.217/
ftp://193.251.144.217/logiciels/
ftp://193.28.86.29/
ftp://193.43.36.131/
ftp://193.43.36.131/radio/
ftp://193.43.36.131/Radio/MP3/
ftp://193.6.156.020/
ftp://193.6.156.16/
ftp://194.105.193.56/
ftp://194.105.193.56/pub/warez/books/
ftp://194.109.159.49/hdb1/texts/
ftp://194.109.159.81/hda6/movies/night_of_the_living_dead/
ftp://194.109.159.81/hda6/movies/night_of...living_dead.mpg
ftp://194.109.206.210/pub/c64/Scene/Old
ftp://194.109.206.210/pub/Linux
ftp://194.109.206.211/incoming/
ftp://194.109.206.211/pub/c64/Scene/Old/h/
ftp://194.109.206.212/incoming/
ftp://194.109.206.60/pub
ftp://194.149.135.49/
ftp://194.149.135.49/outgoing
ftp://194.153.128.133/
ftp://194.153.128.133/pub
ftp://194.190.136.15/
ftp://194.190.136.15/Documents
ftp://194.190.136.15/HTML
ftp://194.190.221.196/
ftp://194.204.28.130/Vanadest
ftp://194.204.5.180/incoming/
ftp://194.226.121.165/

Free music sites

1.www.bollyextreme.com
2.www.dishant.com
3.www.pappuyaar.com
4.www.songs.pk
5.www.smashits.com
6.www.ragga.com
7.www.pakheaven.com
8.www.cooltoad.com
9.www.fmw11.com
10.www.dctorrent.com
11.www.bollyfm.net
12.www.mp3hungama.com
13.www.apniisp.com
14.www.mp3yug.com
15.www.radioreloaded.com
16.www.mp3000.net
17.www.gohollywood.com
18.www.multiply.com
19.www.musicindiaonline.com
20.www.m4mp3s.com
21.www.bollyexress.com
22.www.downloadhindimp3.com
23.www.raaga.com
24.www.musicyogi.com
25.www.downloadhindimp3s.com/albuminfo/Bollywood%20Love%20Themes.php

Free SMS sending sites

www.mobilick.com
www.160by2.com
www.freesms8.com
www.ringtones2world.com
www.atrochatro.com
www.way2sms.com
www.youmint.com (80 characters)
www.indyarocks.com (90 characters)
www.smsgupshup.com
www.krifysms.com
www.indiamobiles.com
www.smsjunction.com
www.funonphone.com
www.smscountry.com
www.ananthapuri.com
www.indiatunes.com
www.smstorrents.com
www.throwsms.com

Computer e-books sites

http://www.ebooksportal.org/
http://www.flazx.com/
http://www.itquestionbank.com/
http://www.pdfchm.com/
http://www.freeprogrammingresources.com/
http://www.freevbcode.com/
http://www.sourcecodesworld.com/
http://www.programmingtutorials.com/
http://www.techtutorials.net
http://www.academictutorials.com/
http://www.echoecho.com/
http://www.tutorialdownloads.com/
http://online-books-reference-index.blogspot.com/2005/11/index-of-online-books-for-reference.html
http://www.computeruser.com/index.html
http://www.exforsys.com/
http://www.itlearningexchange.com/
http://www.freejavaguide.com/
http://www.kebook.com/0-1.htm
http://nexus.realtimepublishers.com/
http://isoftwaretesting.info
http://www.onestoptesting.com/
ftp://ftp.uar.net/pub/e-books/
http://www.thebiglibrary.com/
http://freeitebooks.blogspot.com/
http://www.click-now.net/
http://www.geocities.com/subash_iitkgp/EBooks/EBooks.html
http://www.flazx.com/
http://hellnet.perverz.hu/ebookz/
http://ftp.cdut.edu.cn/pub/document/book/
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/
http://www.onesmartclick.com/
http://web.archive.org/web/20010810185530/http:/www.ravan.com/ebooks.html
http://www.techtutorials.net/
http://www.edcomp.com/
http://giuciao.altervista.org/books/
http://www.intelligentedu.com/free_computer_books.html
http://www.techbooksforfree.com/
http://ebook.irdesigner.com/index.php?cat=1
http://www.opengroup.org/
http://web.archive.org/web/20010406190216/sunsite.net.edu.cn/tutorials.html
http://freecomputerbooks.com/
http://hellnet.perverz.hu/ebookz/
http://www.freecodemomma.com/
http://coreservlets.com/
http://www.jguru.com/
http://www.javaranch.com/

For YouTube Videos Downloads

Use This Site For YouTube Videos Downloads:-
http://www.clipnabber.com/,
http://www.keepvid.com/
Both the sites offer to download in .flv(Low quality) and .mp4(Good quality) format directly...

Change Your Procecer Name As You Like..


HOW TO DISPLAY PENTIUM 5 OR EVEN MORE IN XP
NOW U CAN ABLE TO SHOW PENTIUM 5 AND EVEN MORE

I AM GIVING U THE TRICK BY WHICH YOU CAN NOW ABLE TO SHOW OR DISPLAY EVEN PENTIUM 4 OR EVEN 5{EVEN U NOT HAVE THAT MUCH}
AND PROCESSOR
VALUE UPTO 3.0 HRTZ OR MORE THAN THIS

TYPE "REGEDIT" IN RUN BOX {START->RUN->TYPE REGEDIT}
NOW CLICK IN
H-KEY-LOCAL-MACHINE . THEN ON HARDWARE. THEN ON DISCRIPTION.THEN ON SYSTEM,THEN ON
CentralProcessor.THEN ON 0
{H-KEY-LOCAL-MACHINE/HARDWARE/DISCRIPTION
/SYSTEM/CentralProcessor/0}
NOW U GET IN RIGHT PANE THE VALUE THAT IS
"ProcessorNameString"
DOUBLE CLICK ON THIS VALUE
VALUE NAME AND VALUE DATA IS NOW IN FRONT OF U NOW IN DATA COLUMN U CAN EDIT IT RANDOMLY WHAT U WANT IN PLACE OF THAT
VALUE
AND THEN PRESS OK


NOW SEE SYSTEM PROPERTY JUST RIGHT CLICKING IN UR 'MY COMPUTER' ICON AND THEN PROPERTIES.

Can-someone-answer-these-questions
If we have time on our hands, why don't our hands look like clocks? Clearly, your help is needed here...

1. Why is the third hand on the watch called the second hand?
2. If a word is misspelled in the dictionary, how would we ever know?
3. If Webster wrote the first dictionary, where did he find the words?
4. Why do we say something is out of whack? What is a whack?
5. Why do "slow down" and "slow up" mean the same thing?
6. Why do "fat chance" and "slim chance" mean the same thing?
7. Why do "tug" boats push their barges?
8. Why do we sing "take me out to the ball game” when we are already there?
9. Why are they called "stands" when they are made for sitting?
10. Why is it called "after dark" when it really is "after light"?
11. Doesn't "expecting the unexpected" make the unexpected expected?
12. Why are a "wise man" and a "wise guy" opposites?
13. Why do "overlook" and "oversee" mean opposite things?
14. Why is "phonics" not spelled the way it sounds?
15. If work is so terrific, why do they have to pay you to do it?
16. If all the world is a stage, where is the audience sitting?
17. If love is blind, why is lingerie so popular?
18. If you are cross-eyed and have dyslexia, can you read all right?
19. Why is bra singular and panties are plural?
20. Why do you press harder on the buttons of a remote control when you know the batteries are dead?
21. Why do we put suits in garment bags and garments in a suitcase?
22. How come abbreviated is such a long word?
23. Why do we wash bath towels? Aren't we clean when we use them?
24. Why doesn't glue stick to the inside of the bottle?
25. Why do they call it a TV set when you only have one?

These important life questions were taken from a website. The original author is unknown; please advise if you know so I can give credit where it’s due.

Get ur email id with ur username and domain


Get your Own Unique msn account @"whateveryouwant"


Get your Own Unique msn account @"whateveryouwant"


go to:
https://accountservices.passport.net/reg.srf?fid=RegCredOnlyEASI&sl=1&vv=410&lc=1033

and continue registering from here .. this is the easy way ...

Command to mount a pendrive in Linux

Open new terminal and type the below commands:-

mkdir /mnt/usb


The above statement is for creating a directory named 'usb' in mnt directory.

mount /dev/sda1 /mnt/usb

The above command mounts ur pendrive in
'/mnt/usb' folder.

Note:there is a space after mkdir,mount,sda1 commands..

Enable the disabled Task Manager in XP

It is due to some kind of virus/ trojan activity which normally disables the task manager.Now due to this problem when ever the user press alt+ctrl+del to launch windows task manager it gives an error saying “Task Manager is being disabled by your administrator”.

Solution:

To Enable the Disabled Task Manager on your system

1. Press window key+r to show run prompt
2. Follow the following steps

* Enter gpedit.msc in the run prompt and click OK
* In the Group Policy settings window
* Select User Configuration
* Select Administrative Templates
* Select System
* Select Ctrl+Alt+Delete options
* Select Remove Task Manager
* Double-click the Remove Task Manager option’.
* Set the property of this item as disabled.


For Those who use Windows XP Home Edition can use the registry to enable Task Manager

1. open start --> run and type regedit

2. Navigate to the following path:

Hive: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
3. You will find a registry key with name DisableTaskMgr of type: REG_DWORD
4. Double click the key with and set the Value to 0
5. Exit the registry and restart to see the effect.

Winamp pro 5.55 with DFX(Full)

BEST 25 RESUMES FOR B-TECH FRESHERS

Izotope ozone for winamp(Full)


this is an extra plugin for winamp that enhances the sound of music just like DFX.


Embedded systems design with 8051


TEST UR C SKILLS BY YESHWANTH KANETHKAR

GMAT McGraw-Hills 2008 EDITION

BARRON’S 12TH EDITION EBOOK

Puzzles to Puzzle for You by Shakuntala Devi

Let Us C-Yeshwanth Kanethkar(pdf)

RS AGGARWAL VERBAL REASONING

RS AGGARWAL QUANTITATIVE APTITUDE

Boost ur Firefox Speed


This tricks will improve the speed & load time of firefox. And you will be able to surf faster.

Type 'about:config' in the address bar, Then look for the following entries, and make the corresponding changes.

1.network.http.max-connections-per-server =32
2.network.http.max-persistent-connections-per-proxy =16
3.network.http.max-connections = 64
4.network.http.max-persistent-connections-per-server = 10
5.network.http.pipelining = true
6.network.http.pipelining.maxrequests = 200
7.network.http.request.max-start-delay = 0
8.network.http.proxy.pipelining = true
9.network.http.proxy.version = 1.0
Lastly right-click anywhere and select New- Integer. Name it nglayout.initialpaint.delay and set its value to 0. This value is the amount of time the browser waits before it acts on information it recieves.Enjoy!!

PowerISO 4.3

PowerISO is a powerful CD/DVD image file processing tool, which allows you to open, extract, create, edit, compress, encrypt, split and convert ISO files, and mount these files with internal virtual drive. It can process almost all CD-ROM image files including ISO and BIN. PowerISO can be used easily, which support shell integration, context menu, drag and drop, clipboard copy paste.

Download

Convert any file into another format online!

Everyone needs a good file converter, for example if you got that file via email in a .gz format and you thought why don’t they send it in a zip format, or that important document that was sent in PDF format and you wanted it to be in a doc format in short it good to have a file converter.


I have just got the perfect web-app for you it can convert almost any given file format to another, Best of all its FREE to use and you don’t need to install anything on your computer to use it!

This online app can convert video, music, documents, pictures, compressed files etc… you name it and this application should be able to convert the file into the format you want, say hello to

http://www.youconvertit.com/

http://www.zamzar.com/

http://media-convert.com/convert/index.php


Virtual DJ(Complete)

U can make nice remixes of songs

Barcode maker 5.0

Internet Download Manager 5.15.6(no crack required)



DOWNLOAD

Real Player 11 GOLD (Full)

TuneUp Utilities 2009(Full)

Winrar 4.1.65

Adobe Photoshop cs4(Portable)

Make ur windows xp sp2 genuine for free..its working 200%

Make your Windows Genuine for free
at Wednesday, August 20, 2008 Labels: EBOOKS/TUTORIALS

Make your Windows XP with Service Pack 2 geniune. Im not sure if this works on SP3.

This procedure described below will allow you to bypass the Microsoft Genuine

Validation.

I hope this is the best way to make your copy of windows xp geniune.

1. Click START->RUN and type ‘regedit’

2 Registry window will be opened, Then Go to

HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\WPAEvents\OOBETimer

…and double click on it. Then change some of the value data to
ANYTHING ELSE…delete some, add some letters, I don’t care…just change
it!

now close out regedit.

3) Go to start > run > “%systemroot%\system32\oobe\msoobe.exe /a” (again, dont type

the quotes)

4) the activation screen will come up, click on register over
telephone, then click on CHANGE PRODUCT KEY, enter in this key:
JG28K-H9Q7X-BH6W4-3PDCQ-6XBFJ.

Now you can download all the updates without activating, and the Genuine Microsoft

Copyright © 2008 - UCE GUYS - is proudly powered by Blogger
Blogger Template