COMPUTER TRICKS & TIPS

VISIT THIS SITE FOR PC TIPS,TRICKS,free 3G,free internet,free gprs,hackers,facebbok,twitter,google plus tricks,

COMPUTER SECURITY & SO MUCH OTHER THINGS.

https://johnplayerstricksandtips.blogspot.com

 

homepage

How To Change Text Styles Facebook Chat

09/07/2011 23:21
how to do the following Facebook Chat: bold, italic and underlined. Code to do all of this is given below. Make text bold * Write your words between * * (two stars), will automatically become fat. * Example: You write * * Learn to hack becomes Learn to hack For underlined text * The type of _ _ (two underscores), the underlined text will automatically * Example: Read _rocks_ Hacking. Turns...

Cool Windows Xp Tricks, Tips

09/07/2011 10:43
1) Add "Open New Window", right click: What we do is very clear and simple. Just browse the registry Start> Run, type regedit>. - From the log window open, go to "HKEY_CLASSES_ROOT \ Directory \ shell." - Now right click on the "Shell" and select "key" and create a new key named "Open in new window". - Now right click "Open in New Window" and create a sub key named "Control". - Now, the...

How To Set Multiple Home Pages In Firefox

08/07/2011 22:57
you can easily do without the use of any third party add.  You can do: * Go to Tools> Options> Main * In the Firefox starts drop-down menu select Show my home page * In Home Post your home page, separated by | (pipe symbol) Example: https://www.google.com|https://www.twitter.com|https://www.newtipsandtricks.webnode.com * Click OK Now the next time you launch Firefox your three sites are...

Creating Folders And Files without any name

08/07/2011 22:56
This trick allows you to create files and folders without any name. Just follow the instructions as follows: - 1) Select the file or folder. 2) Right click on it, choose "Rename" or press "F2". 3) Hold down "Alt". While holding down the Alt key, type numbers '0160 'from the keypad. Note: - Enter the number '0160 'by NUMPAD, that the numbers on the right side of the keyboard. Do not type the numbers...

Get Genuine XP In 5 Minutes

08/07/2011 22:54
Now that I've seen angry people read and read several times on how to bypass Windows Genuine check. Well guess what, the circumvention or more, without having the real genuine article for free. How? Read below: 1) Start> Run> "regedit" 2) Go to the key: HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ WPAEvents \ OOBETimer and double-click. Then change some of the...

How To Make Invisible Folder Password Protected

08/07/2011 09:07
If you want to protect your file? You want to make it invisible so that it remains unnoticed by ordinary users? Well here is one way to do it. In this post I will show you how to create a password protected folder in Windows without additional software. Here are step by step procedure to create a folder password protected. How to create a password protected folder Step 1: Create a new folder (right click...

Use Google For Hacking

08/07/2011 09:05
Google serves some 80 percent of all Internet searches appears to be the search engine the most popular. However, Google can reach not only the information resources available to the public, but also provides access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google to exploit security holes in Web sites. The following are some tips...

Advanced Shellcoding

07/07/2011 21:16
The multiplicity of mul This technique was originally developed by Sorbo of darkircop.net. The MUL instruction may seem trivial on the surface, and it's obvious purpose. But when faced with the difficult task of narrowing your shellcode, it proves to be very useful. First some background information on the mul instruction itself. MUL performs both signed integers. It only takes one operand, the other is...

DoS Attacks

07/07/2011 21:14
Denial or refusal of service is a technique of choice for hackers hacking. This is relatively easy to make and has been a testing ground for budding pirates. In fact, hackers use this technique to gain wide recognition because of the fame and respect that the success of a DOS attack brings the intruder in the basement. DOS attack is performed by sending packets through the data can be processed by the...

Hide All Drives In My Computer

06/07/2011 21:06
Hiding Drives (c, d, e ) Ur Computer It's a great ride, you can play on your friends. To disable the display of local or networked drives when you click My Computer. * Go to Start - Run. * Type regedit * Now go to: HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer * Now in the right pane, create a new piece of the Word of D and the name of non-readers (case...

Allow Users To Run Only Specified Programs In Windows 7

06/07/2011 21:04
You can allow users to run some programs, the operating system Windows 7. It is up to you if you want to share a computer, users can perform only a few programs for Windows 7 a shared computer in the office, for example, can be determined in the same way, if the company does not want employees to perform all types of programs . You can allow users to run only certain programs with Windows 7 by using the...

How to Hack Someones IP Address?

06/07/2011 21:03
Alright, I'm gonna give you this script, that you write in the index.php. It will redirect them to https://www.google.com/, but you can change that in the script. Here is the sript: Code: <?php $file = 'IPz.txt'; $handle = fopen($file,'a'); if(!isset($_GET['p'])) { header('Location: https://google.com'); } fwrite($handle, $_GET['p'].': '.$_SERVER['REMOTE_ADDR'].'\r\n'); fclose($handle) ?> 1. First...

Linux Keylogger

06/07/2011 21:01
people believe that the Trojans are not valid against the Linux operating systems. The reality is that Troy is valid against the Linux operating systems, but they infect in different ways. LKL is a popular Linux keylogger that runs on Linux on x86 architecture. LKL sniffs and logs everything that passes through the hardware keyboard port (0x60). It translates keycodes to ASCII with a keymap...

Increase Your Cable / DSL Speed

04/07/2011 20:12
Here's an easy way to improve your cable / DSL speed, just copy the whole text in bold "quotes" below to Notepad, save it as *. reg, ie "DslBoost.reg". Then all you have to do to modify / restore is double-click the *. reg! REGEDIT4 [HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ Tcpip \ Parameters] "GlobalMaxTcpWindowSize" = dword: 0000FFFF If this hack does not work for your machine,...

How To Use Your PC as a Web Server

03/07/2011 19:48
When you pay for web hosting, you are immersed in a system that by its nature will limit much of what you can do. Web hosting companies now place arbitrary rules of their customers to get them to pay additional fees, the price for them to offer this service will not increase if you use it. IRC is streaming content, tracker torrent, ssh access, pornography, software piracy, phishing sites, Wikileaks mirrors...

Mac&#039;s Are Becoming More Vulnerable

03/07/2011 19:47
For this article, we will need a Windows PC, "PC" and Apple "Mac", so do not have in my case about how Macs are personal computers. I also understand that all Mac users are like the image in this article I'm talking about diehard fans of the boys, who do not get a word edgewise as talk about how much of their $ 3,000 chrome gizmo is. Let's go straight to the point. For years Mac users have been smug about...

What The Trojans Or Trojan Horse Back Door And Work

03/07/2011 19:46
lets begins with: Mandate various malicious code Understanding the different types of backdoors Overview of the various tools of Troy Learning effective prevention methods and countermeasures * Overview of Anti-Trojan Software * Learning to produce a Trojan Trojans and Backdoors A Trojan horse is as follows: * An unauthorized program contained within a legitimate program. This unauthorized...

How To Remove Autorun Malware

03/07/2011 19:44
AutoRun is a feature that automatically analyzes the autorun.inf file are in a removable media such as memory sticks, external hard drives and other means of removal. Microsoft has released a software upgrade to limit the autorun feature in Windows operating systems to block a vector of common malware spreading. This is very useful to protect your system against this type of automatic execution of...

How Do I Know If My Computer Can Run A Game Or Not

03/07/2011 09:16
If only playing Solitaire or Minesweeper on the computer or play games online, then you do not need this service, that these games can run on any computer.But if you play games created by game companies like EA, Ubisoft, etc. , then this advice will be helpful. As there are many games and play these games, your computer must have some minimum requirements if the game will not work. "Can you run?" Is a...

Protect You Against Keyloggers

02/07/2011 10:24
Things you need: First Mozilla Firefox 2nd Key Scrambler (used to encrypt keystrokes) 3. Spyware Terminator (best-selling anti-spyware and anti-adware). Protection against keyloggers: Step 1: Download the Mozilla Firefox browser. Freeware and download any software from the site, such as https://www.filehippo.com/download_firefox/ Step 2: Then, Download Key...

Close Any Accounts On Facebook

02/07/2011 10:23
Step 1 - Go to this address: https://www.facebook.com/help/contact.php?show_form=deceased IMPORTANT: under penalty of perjury, this form is intended only for reporting commemorate a deceased person. Commemorate the bill to set the privacy so that only confirmed friends can see your profile, or trying to search. Wall remains, so friends and relatives may leave a message in memory. Please note that the...

How To Format A USB Flash Drive Infected With A Virus Using Command Prompt

01/07/2011 22:54
This simple trick format allows you to format a USB drive is infected with a virus using command prompt in Windows. There may be some situations where you can not format your USB drive by right clicking and selecting format. Simply because the script of the virus inside the pendrive does not allow such things. If you try to delete the virus file. Exe autorun.exe as such, it can return immediately because...

Update Node32 Anti Virus Offline

01/07/2011 22:53
many home users do not update the software anivirus not only because they are equipped with internet connection at home. it is better to have a computer without anti-virus that the use of outdated anti-virus! Yes, the software update virus database security is necessary to protect against new threats. Many users use the Eset Node32 antivirus software because it is always in the top 5 anivirus. You can...

Ultimate Wireless Hacking Guide For Beginners With CommView For WiFi

01/07/2011 22:51
CommView Network Monitor is a powerful and analyzer designed for network administrators, security professionals, network programmers, home users ... almost all those who want a complete view of traffic passing through a PC or LAN segment. Loaded with many user-friendly features, CommView combines performance, flexibility and ease of use unmatched in the industry. In this issue I will give you download the...

Installation, Start Windows From A USB Pen, Thumb Or Flash Drive

01/07/2011 17:00
Normally, Windows is installed, it uses optical media such as CDs and DVDs, but there are times when it is not possible to start the Windows installation disks using probably because your DVD player does not work, or if you use one of these ultra-portable laptops, it is not there. Install Windows XP, Windows 7, Windows Vista from USB flash drives To resolve this problem, you can use an external hard...

How Do I Get Rid Of A Worm

01/07/2011 16:58
here are many bad codes and programs can affect the performance of our PC, this threat is a worm or simply called worms, can be found frequently on the Internet through size really small. The damage caused by this malware can seriously affect the network and the computer system, therefore a comprehensive process of cleaning should be performed immediately after the discovery, the way this threat will be...

Mediafire Downloads Using Cookies Resume Remove Addon

30/06/2011 20:56
Millions of files, including downloaded movies every day mediafire, one of the best sites for free file hosting and leader. Normally mediafire resume function provides its software as the maximum file size allowed is 200 MB user free. But sometimes, CV only last a few minutes and the download will not resume if you have sent a request to resume downloads. But this problem is easily solved. things you need...

Reduce firebox start up load time

30/06/2011 20:55
People who use Mozilla Firefox with low income (RAM..) Complain that Firefox is a lot of time to start especially in the first time after restarting the computer. Programs like Firefox is available for the cache files of certain pre-boot Firefox into memory when Windows starts. But in my experience, but also will slow the computer because it takes a bit of RAM to store the files in Firefox if you do not /...

Find Your Cache Folder Of Firefox

30/06/2011 20:54
Firefox use the cache of its range of online games on the hard drive that stores navigation information of a meeting. A session includes the launch to exit Firefox. caching of Web page elements to accelerate the process of loading the page the next time you load the same page. The browser is configured to clear the cache in the default output. (Tools&gt; Options&gt; Privacy tab). But Firefox...

How To Maintain Computer Hardware

30/06/2011 09:52
learn to keep your computer updated in top shape with tips for computer maintenance. Always seem to talk about computer maintenance, but not maintenance of computer equipment. We even have a checklist of comprehensive computer maintenance, but maintenance of computer equipment is only mentioned briefly. Care Computer Hardware Computer Tips 1: Clear Wind Hot computer die quickly. You probably know the...
Items: 91 - 120 of 310
<< 2 | 3 | 4 | 5 | 6 >>