Friday, January 3, 2014



Using W32Dasm, and HIEW. 

OK, let’s start:
First of all, you have to run the damn game you want to crack, without the CD.
The game, doesn’t work of course, (Please, don’t panic) BUT a window pops up, telling you an error message. 
This error message will help you to crack the game so, you’ve got to remember it.
For example: Please insert the - CD, or: You need the CD to play the - . 
( -, is the game you want to crack). Anyway, if you are so idiot and you can’t remember it, write it, in a little piece of paper.
Now, run Win32Dasm, and on the toolbar, press the first little button on the left, OR, go to Disassembler ->Open file to Disassemble. A menu will pop up. Select the exe which you want to crack. The disassemble, will take few minutes so, I suggest you, to go for shitting. 

OK, it finished its process. 
Now, in your screen, there is a strange text, and we can’t understand anything of course. Don’t worry, the only thing we have to do, ( If you want, you can change the font), is to click on the String Data References, the button next to the print button (Strn.REF). 
You can see a window which is called String Data Items. Scroll down, and try to find the game’s error message. When you’ll find it, double click on it, and then, close the window, to go back to the Win32Dasm text. 
As you can see you are somewhere in the CD check routine. This is the message’s place. Now comes the interesting and difficult part, so, be careful. 
We don’t know what all these shits mean, BUT we must know the @ offset of every call and jump command.
Write down, every call and jump @ offset number. (You have to be sure, that the OPBAR change its used color to green). You need the number behind the @offset without the h. Let’s go to HIEW, now.

HIEW:
To move up and down, use the cursor keys. Start HIEW. exe. 
In the HIEW directory, there is a list of exes and programs. Go to the directory, which you saved the game’s exe, we want to crack, and click on the exe. Click F4, and then, a menu will pop up, with 3 words. Text, Hex, and Decode. Click on Decode, and now, we can understand the list of numbers.
Click F5, and you can now enter the number, we wrote down, in Win32Dasm. Type it, and you will be placed at the number’s place. The cursor is placed on a command. 

Before I’ll continue, I want to explain you something. For example, if the command where our cursor is placed on, is E92BF9BF74, means that it is 5 bytes.
Every 2 numbers, are one byte: E9-2B-F9-BF-74 = 90-90-90-90-90. 10 letters, mean, 5 bytes. 
OK, if you understood it, you can continue. 

Press F3, which means edit, and now you can edit these ten numbers.
Type five times, the number 90. For every byte, 90. Now click on F10 to exit.
We cracked the CD protection
we all know that a slow internet connection really costs time and makes feel annoying . many friends ask me the ways to increase their internet speed.however . it's possible to do to some extent and make your internet
much better then it was in the past.

There are Two tricks that will help you to increase your internet speed..


First Method- Speed Up Your Net Speed By 20%


1. First you go to start button

2. Go To Run

3. Type gpedit.msc And Then Hit Enter.

4.Then Expand Adminsitrative Templates.

5.Then Network

6.Then QoS Packet Scheduler.

Now A New List Appear . Click On Limit Reservable Bandwidth.
Just Disable it.

Now You Click On Apply .

That's It Now You Are Done !! :)

Now Just Restart Your Computer . And I hope You will Get change in Your Speed

Some Basic Tricks From My Side-
1. Use IDM To Boost Your Downloading Speed.

2. Use A Good Anti-virus in Your Computer.
3. Remove Unwanted Add-ons, Software,Unwanted Files Form Your Computer.

4.Update Your Drivers Periodically.

5.Keep A Good Maintennance Of Your Computer.

Thursday, January 2, 2014

In this simple tutorial, I´ll show you how to print out a list of files in a folder. There is plenty of shareware programs which can do this, but I think that the simplest way to do this is with using Command Promt ( cmd).

1. Go to Start, then click Run. In Run option type cmd and click OK.
2. After this will open cmd.exe ,find folder which you want to print out with cmd, If you do not know how to move through the directories using cmd, see this post: How to find directories with cmd.
3. When you find specified folder, with this command dir > list.txt, you´ll create text document with list of files.
Example:
I want to print list of all files in folder with path E:\movies
In cmd I´ll write E: and press enter , then write cd and with TAB find folder movies and press enter . Then write dir > list.txt In folder with path E:\movies I will find text document list. txt . Open that text document and print out. It looks like this
cmd
After this list.txt created in E:movies
list of files cmd
List.txt looks like this
Fast Visits Fake Traffic Generator bot
FastVisits is a Fake Traffic Generator Bot. It clicks any URL using Proxies. It is a Very Helpful Application to increase Alexa and Google Rank as Well as Your Website Traffic. Runs Directly No Need to Install.


How to use?
1. Download FastVisits.7z and Extract it.

2. Now Run FastVisits.exe.

3. Fill the all the Info.
website
4. Now Select No. of Threads.
Threads

5. Now Press Run and Enjoy.

i am going to discuss how to get maximum number of like on your status(more than 1000+) and make your friend astonish.
This Can be Done Without Using Any Software Or Without knowing Any Programming Language just simple basics of internet browsing is needed.

Follow the steps


step 1:
Go to your privacy Settings and change your Privacy Settings To Public.

Step 2:
Go here https://www.facebook.com/about/subscribe And Allow Suscribers

Now , Comes The main step...

Just By Using Some Sites :-

These Site  provide you mass amount of likes with the help of others access Tokens.

http://www.powerlike.net/
http://www.postliker.co.cc/

http://wendellocampo.weebly.com/


(if You use all these sites then i am sure you will get more than 100+ likes :) )

Use these Trick before Facebook Patches IT
Some of the Site must not be working as they are banned Or server must be down
Hello friends, in this article I will show you how to hack mobile phone with simple software called Super Bluetooth Hack v. 1.08 . Once connected to a another phone via bluetooth you can do the following:
1) Call from his phone. It includes all call functions like hold etc.
2) Read his messages
3) Read his contacts
4) Change profile
5) Play his ringtone even if phone is on silent
6) Play his songs(in his phone)
7) Restart the phone
8) Switch off the phone
9) Restore factory settings
10) Change ringing volume

Follow the steps:
1) Download the Super Bluetooth Hack V1.07.
2) Unzip the file and send it to your mobile phone.
3) Install the software in your mobile phone.
4) Inquire new devices through the software.
5) When connecting devices use a code 0000
Her are video instructions :
Hello friends, in this article I will show you how to hack mobile phone with simple software called Super Bluetooth Hack v. 1.08 . Once connected to a another phone via bluetooth you can do the following:
1) Call from his phone. It includes all call functions like hold etc.
2) Read his messages
3) Read his contacts
4) Change profile
5) Play his ringtone even if phone is on silent
6) Play his songs(in his phone)
7) Restart the phone
8) Switch off the phone
9) Restore factory settings
10) Change ringing volume

Follow the steps:
1) Download the Super Bluetooth Hack V1.07.
2) Unzip the file and send it to your mobile phone.
3) Install the software in your mobile phone.
4) Inquire new devices through the software.
5) When connecting devices use a code 0000
Her are video instructions :
Hello friends, in this article I will show you how to hack mobile phone with simple software called Super Bluetooth Hack v. 1.08 . Once connected to a another phone via bluetooth you can do the following:
1) Call from his phone. It includes all call functions like hold etc.
2) Read his messages
3) Read his contacts
4) Change profile
5) Play his ringtone even if phone is on silent
6) Play his songs(in his phone)
7) Restart the phone
8) Switch off the phone
9) Restore factory settings
10) Change ringing volume

Follow the steps:
1) Download the Super Bluetooth Hack V1.07.
2) Unzip the file and send it to your mobile phone.
3) Install the software in your mobile phone.
4) Inquire new devices through the software.
5) When connecting devices use a code 0000
Her are video instructions :
Privacy has become something very important to people using Internet these days. The more we do online, the more trails we leave behind. There are lots of private companies tracking every movement, keystrokes, websites you visit and the people you communicate with online. These companies often sell this information to law enforcement agencies or the government for legal affairs. Day by day more sophisticated tools and methods are being discovered to track your activities and the entire scenario has become very sophisticated. So it is very important for one to keep his privacy and stop third-parties from intruding into their activities. In this article, we will learn about various methods by which you can become secure online and mask your activities that you do not want the world to know.
The three types of methods we will use to make ourselves secure online are:

  • TOR
  • Proxies
  • VPN

TOR
Tor, short form of The Onion Router is a system that offers you anonymity online. TOR clients  redirects all your internet traffic through a network of computers concealing your actual location and preventing any tracking. The TOR bundle comes with a firefox that’s integrated to the TOR network and a GUI named Vidalia is used to use the TOR network. Here is how Vidalia looks like:
111
So before we start, let’s see how the TOR network works. Here are some pictures from the official website which will help you get started.
222
So whenever you try to contact to Dave, instead of directly contacting him, TOR first sends your transaction through a number of networks so no single point can track back to your location. So packets from your network take a random route through the network and reach the destination.

333
So once a route has been established, all kinds of data can be sent and received over the TOR network. And after a fixed amount of time, TOR changes the route through which you connect randomly which makes it very hard to trace back to you.

444
Tor is good, but it can’t completely secure you and your activity. While it protects the transported data, experts can use statistical analysis and get your circuit route and find out your location.             Official Website: http://www.torproject.org
Download TOR Bundle: http://www.torproject.org.in/download/download-easy.html.en

PROXIES
A proxy or a proxy server is a computer system or application that acts as an intermediary between you and your client server or application. So you want to access a target, you connect to the proxy, the proxy connects to the target, then it gets back the relevant information to you.
555
So a proxy can be used to keep you anonymous, or to bypass IP restrictions, security/parental controls, or to get around regional restrictions. A proxy server appears as an IP address which you have to configure on your web browser to use it. When you do that, your original IP will be masked by the proxy and you will be anonymous.
190.96.64.234This is how a proxy looks like. All proxies are from a particular location or country so using a proxy near to your target server might help faster browsing too! If you’re on Firefox, you can set a proxy by going to Firefox Options > Advanced > Network > Connection Settings > Manual Proxy Settings.
666
VPN (Virtual Private Network)
A VPN or Virtual Private Network is a remote server in an offsite location that tunnels all your data and information through their secured servers by encrypting them thereby making your connection secure. Most of the VPN’s use 128 bit SSL encryption or 256 bit SSL encryption. More the bit count, better the encryption. VPN helps you hide your real IP and spoofs your location to any programs or clients trying to track you. So suppose you’re from USA and needs to access a website that’s for Russia only, I could use a VPN located in Russia that masks my IP as a Russian one and thereby access the website.
777
Another matter of concern while using a VPN is logs. Almost all of the VPN providers keep logs as a security measure. This is done so that if they ever want to check up a user’s activity, they could refer to the logs. So federal agents or the government could contact the VPN providers and get your activity. Hence if you are really concerned about your security, you should purchase a VPN that do not keep logs. When you purchase a VPN, make sure you choose one which is closer to you since it will make your Internet experience smooth and won’t cause any lag or slowness.
There are lots of free VPN’s available but they’re not recommended since most of them come with lots of ads, adwares and slow connection. Most of them keep logs which mean you’re not really secure and the connection won’t be having a good encryption rate. So it is always recommended you get a paid VPN. But I’ll include some good free and paid VPN’s to help you out.

Free VPN

Paid VPN

CONCLUSION
So that’s it. I’ve discussed some main methods by which you can be secure online. But always remember, you’re never 100% safe. If the federals or others want to track you, they can still do it no matter what measures you’re using to prevent it. These methods will work, but only up to a limit. The rest is up to you to use your intuition to keep yourself safe.
Subscribe to RSS Feed Follow me on Twitter!