Pages

Sunday 29 September 2013

How to Change Drive Letter


How to change Drive letter in Windows

You might also like:
Extend Windows 7 trial period
Do you want to change you predefined drive letter in Windows?
If you're interested in changing the drive letter then read on this tutorial.
There are two ways you can change the Drive letter in windows computers.

1. By Command Prompt (command line or text mode).
2. By GUI mode (from Disk management utility)

By Command line

Step 1
Press win+R to bring up Run command. In the Run command type
diskpart
to bring diskpart.exe window (command line).
Step 2
Now in the Diskpart command line type
list volume
This will list all the volumes followed by volume number (see screen shot).

screen1

Step 3
Now type
select volume #

Here # is the number, of the volume, of which you want to change the letter.
Step 4
Now type
remove letter D

Here I want to change the letter "D" so I've typed "remove letter D". Replace D with your drive letter, which you want to change. Now type
assign letter P

Replace "P" with your desired letter. Now type
exit

Done! You've Successfully changed the Drive letter.
Note: You can not change Drive letter of system volume or boot volumes.

By GUI method (Disk management)

Step 1
Press win+R and type
diskmgmt.msc
in the Run command box. The Disk Management Window will pop up.( see screen shot)

screen2

Step 2
Now Right click on the Drive you want to change the letter and then click on "Change Drive letter and Path". A new window will pop up. Now click on the button "Change..." and select any one letter from the drop down menu. Click on OK.
Done!
Hope you all enjoyed this!
If you have any problems or have any suggestions then please leave a comment or PM me.

Friday 27 September 2013

Happy 15th Birthday Google


Happy 15th Birthday Google!

google
Happy Birthday Google!
Today Google Doodle celebrates the 15th birthday of Google with a candy Pinãta. 15 years ago two Standandford Graduates, Sergery Brin and Larry Page founded Google, named after the mathematical term googol, which represents the number one followed by a hundred zeros. They founded Google on September 7 1998 but shifted it's official birth date to 27th September 1998. Google provides many services including gmail, google+ and many more. Google is most widely used search engine of this era.
This birthday google has updated it's new search algorithm called "Hummingbird". It is primarily aimed at providing Google's search engine a better grasp at understanding concepts instead of mere words.
So let's celebrate Google 15th birthday!

Thursday 26 September 2013

Change Splash Background of photoshop


How to change Photoshop Splash Background

Hello Friends!
In my previous article I showed you How to change Calc.exe menu items using Resource Hacker. Now in this Article I'm going to show you How to change Photoshop Splash Background using Resource Hacker. If you don't have this awesome tool then you can download it from the following link.

Getting Started

First thing you need is Resource Hacker which I think you have downloaded from the above link. Now the second thing you need is Photoshop (I think you have it otherwise you wouldn't come here). In this tutorial we are using Photoshop CS4 but you can use another versions too.

Procedure

Now that you've downloaded and Installed Resource Hacker let's move to interesting part.
Step 1:
Go to the directory where you've installed photoshop. Generally it can be found in C:\Program Files\Adobe\Photoshop CS4. Find the file PSArt.dll and first backup this file.
Step 2:
Now Open Resource Hacker. Then from the File menu click Open and browse to the file PSArt.dll or you can drag and drop PSArt.dll to the Resource Hacker's Window.

Step 3:
Now Double Click on PNGF folder and search for "SPLASHARTBACKGROUND.PNG"if you're using CS4 or "SPLASHARTFEATHER.PNG" if you are using CS2, and double click on it. Now you will see something like 1033, click on it. Now you will get the splash background (see screenshot below).

Step 4:
Now go to Action from the menu bar and "save resource as binary file" and name it as something.png.
Step 5:
Edit the file (using photoshop or any other photo editing tool) you just saved to whatever you want. Have a look at my Splash screen background image.

Step 6:
Now go back to Resource Hacker and goto SPLASHARTBACKGROUND.PNG and right click on 1033 and click on Replace Resource a new window will pop up, just locate the edited png file and in the boxes below type the following:
Resource Type: PNGF
Resource Name: SPLASHARTBACKGROUND.PNG
Resource Lnaguage: 1033

Click on "Replace" button and Save the dll file.

Wednesday 25 September 2013

How to change calc.exe menu using Resource Hacker


Hello friends!
Today I'm going to show you How to customize Windows from a small tool called "Resource Hacker".

Inroduction

Resource Hacker is a small but awesome tool to modify system files like DLL, EXE, CPL etc. Resource Hacker as its name suggests, hacks the resources of Windows and replace with customized ones.

You can download it using the following link.

Procedure

Since it is only the beginning of our How to customize Windows so I'll only show you a basic customization in Windows Calculator .
Step 1: Download the Resource Hacker.
First Download Resource Hacker tool from the link provided above and Install it in your computer.
Step 2: Open Resource Hacker tool
Now open Resource Hacker by going All Programs--> Resource Hacker--> Resource Hacker.
Step 3: Backup Calc.exe
First backup your original Calc.exe file, which is located at %windir%:\WINDOWS\system32. %windir% is your system directory where Windows is installed.
Step 4: Open Calc.exe with Resource Hacker
Now Open calc.exe from Resource Hacker or you can drag and drop calc.exe to Resource Hacker's Window.
Step 5: Main Part: Editing
res1
Now you can see in the left pane there is some folders.
res1
Click on Menu folder and extend its contents and click on 106 folder. There you can see 1033 click on it.
res1
Now you can see some codes in the Right Pane.
106 MENU
LANGUAGE LANG_ENGLISH, SUBLANG_ENGLISH_US
{
POPUP "&Edit"
{
MENUITEM "&Copy\tCtrl+C", 300
MENUITEM "&Paste\tCtrl+V", 301
}
POPUP "&View"
{
MENUITEM "S&tandard", 305
MENUITEM "&Scientific", 304
MENUITEM SEPARATOR
MENUITEM "D&igit grouping", 303
}
POPUP "&Help"
{
MENUITEM "&Help Topics ", 317
MENUITEM SEPARATOR
MENUITEM "&About Calculator", 302
}
}

Now replace "Scientific" or "Standard" with anything you want.
Remember put "&" before the letter which is not common in menu item.
Now Press "Compile Script" and Save your New (edited) file. Done!
You might also like:Extend windows 7 Trial period

Sunday 22 September 2013

How secure is iPhone 5S fingerprint


Prints in the cloud? Some observers have wondered aloud on Twitter and elsewhere whether Apple, armed with a potential database of millions of thumbprints, might turn over some customers' prints to the National Security Agency (NSA) if ordered to by the government. After all, Apple was reported to have been a partner in the NSA's PRISM surveillance program and has acknowledged it hands over user data when mandated by the government. But Apple has said users' fingerprint information will be encrypted and stored securely inside the phone's new A7 processor chip instead of on Apple's servers or backed up to iCloud, the company's Web-based storage service. Apple also has said it's not allowing third-party applications to access the scanner -- at least not yet. That's good news for users' privacy, experts say -- even amid news reports that the NSA can spy on smartphones. "Your iPhone knows who you call. It knows where you are. And in the newest versions, it will know your thumbprint. Given revelations about how the NSA can access Apple devices, should you be worried about it having that biometric data? No. No no no no no no. Come on. No," writes Philip Bump in The Atlantic. "Your fingerprint ... isn't traveling anywhere. Is it possible that the NSA could ask Apple to upload a user's fingerprint from the phone so that it can be transmitted to the agency? Sure. But that likely wouldn't be a request that comes through PRISM; it would probably require a separate warrant. Not impossible, but, given the burden of demonstrating need for a warrant, not as easy as a few keystrokes." Fingerprint hacks Then there's the question of hackers replicating fingerprints to break into phones. "Fingerprints are not private, you leave them lying around everywhere, and if someone has enough incentive -- and the resources available to them -- they may try to defeat any security system that you trust your fingerprint to unlock," writes noted security researcher Graham Cluley on his blog. "One thing is for sure. With the launch of the iPhone 5S, more people will be using fingerprint sensors as part of their daily security than ever before -- and the hackers will be certainly intrigued to see how they might circumvent it," Cluley adds. Dino Dai Zovi, co-author of "The iOS Hacker's Handbook," told CNNMoney that if he were trying to hack an iPhone 5S, he would first try to lift prints from elsewhere on the device "and figure out how to replay those to the sensor to log in to the person's phone." This is not as hard as it might sound. A decade ago, a Japanese cryptographer demonstrated how to fool fingerprint-recognition systems by transferring latent prints to a "finger" made from gelatin, the ingredient found in Jell-O and other sweets. It was informally known as the "Gummi bear hack." But Apple's new Touch ID technology is presumably more sophisticated than those old systems. In addition, latent prints may not provide enough of an overlapping match to unlock a phone, says digital-security expert Robert Graham. "You use a different part of your finger to touch the iPhone sensor than what you use to touch other things," writes Graham on the Errata Security blog. "That means while hackers may be able to lift your thumbprint from you holding other objects, or from other parts of the phone itself, they probably can't get the tip print needed to do bad things on your iPhone. "This means the fingerprint databases held by the NSA, FBI, and border security are largely useless at unlocking your phone: they don't cover the same parts of your fingers," Graham adds. But there is another potential vulnerability in the iPhone 5S's fingerprint scans. The Touch ID system also can be used as a secure way to approve purchases from iTunes or the App Store, which makes some security experts uncomfortable. "If Apple is right that fingerprints never leave the device, that means the new iPhones will be sending some sort of authentication token to Apple servers to verify that the end user has produced a valid print," writes Dan Goodin in Ars Technica, a CNN.com content partner. "If attackers figure out a way to capture and replay users' valid tokens, it could lead to new ways for criminals to hijack user accounts."
Source: CNN and HBH
You might also like:facebook chat codes

Saturday 21 September 2013

Facebook chat codes

Hello friends! Let's take a look at facebook chat codes. This is a new chat code system called f9. You can create all the alphabets and numbers from these chat codes. You can also create words from them but remember to put space between each chat code.
[[f9.cha]]
[[f9.chb]]
[[f9.chc]]
[[f9.chd]]
[[f9.che]]
[[f9.chf]]
[[f9.chg]]
[[f9.chh]]
[[f9.chi]]
[[f9.chj]]
[[f9.chk]]
[[f9.chl]]
[[f9.chm]]
[[f9.chn]]
[[f9.cho]]
[[f9.chp]]
[[f9.chq]]
[[f9.chr]]
[[f9.chs]]
[[f9.cht]]
[[f9.chu]]
[[f9.chv]]
[[f9.chw]]
[[f9.chx]]
[[f9.chy]]
[[f9.chz]]
[[f9.num0]]
[[f9.num1]]
[[f9.num2]]
[[f9.num3]]
[[f9.num4]]
[[f9.num5]]
[[f9.num6]]
[[f9.num7]]
[[f9.num8]]
[[f9.num9]]
[[f9.blank]]
[[f9.dash]]
[[355825317764954]]
check my other articles write upside down in facebook
There is more facebook chat smileys.

Friday 20 September 2013

Balance transfer methods of all mobile networks

Balance transfer methods for All Networks


Hello friends. In this post I'm going to share the official methods of transferring balance for all Indian networks. These are official methods not any kind of tricks or hack.
Note: These methods can only transfer balance from same network to same network. For example Airtel to Airtel, !dea to !dea.
Airtel :
To Transfer Balance In Airtel Just Dial *141# And Follow The Onscreen Instructions. You Can Transfer From 5 To 30 RupeesOf Balance In Airtel.
Tata Docomo :
To Transfer Balance In Tata Docomo SMS as BT MobileNumber Amount And Send It To 54321. E.g. BT 9876543210 30 To Transfer 30 Rupees Of Balance.
!dea :
To Transfer Balance In !dea Network Send SMS as GIVE MobileNumber Amount And Send It To 55567. E.g. GIVE 9876543210 30 to transfer 30 rs.
Vodafone :
To Transfer Balance In Vodafone Dial *131*Amount*Mobile No# E.g. *131*50*9876543210# To Transfer 50 Rupees Of Balance.
Uninor :
To Transfer Balance In Uninor Just Dial *202*MobileNumber*Amount# E.g. *202*9876543210*30# To Transfer 30 Rupees.
Aircel :
To Transfer Balance In Aircel Just Dial *122*666# And Follow The Instructions. You Can Transfer 5, 10, 20 Or 100 Rupees Of Balance.
BSNL :
To Transfer Balance In BSNL Just Send SMS GIFT MobileNumber Amount To 53733. E.g. GIFT 9876543210 50 to Transfer 50 Rupees Of Balance.

Thursday 19 September 2013

Introduction to Steganography

Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos(στεγανός) meaning "covered or protected", and graphei(γραφή) meaning "writing".
Source:Wikipedia
Further reading:Steganography

Write upside down in facebook


Hello friends! Do you want to update your status in facebook upside down text and impress your friends then follow the simple steps
Go to any given websites and type your desired text in the textbox and press the generate button and then copy those upside down text and paste them in your facebook or twitter or google plus status updates or in messages. That's all! Isn't it simple!
Websites:
upsidedowntext.com
fliptext.org

Hide file in Photo

How to hide a file in Photo/Image


fileWant to hide any executable file in an image? Hiding a file in an image is very simple process. All you need to have a computer (windows/Linux) and some basic knowledge.
Requirements
1. The image (image.gif) file into which we'll be hiding our file.
2. Files which we'll be merging with the image file.
Procedure
Now before we start compress your files (which will be merged with image) to file.zip.
WINDOWS
Open command prompt and move to the folder (by cd command) where the files are present (image.gif and file.zip) and type the code:
copy /b image.gif+file.zip newfile.gif
Linux
Open terminal. Move to the directory, where both files are present. And type the following code:
cat image.gif file.zip
>
newfile.gif

Done! If you open the file with image viewer the file will act like an image. Now there are two ways to access the files either change the extension of new file to .zip or open the file with a zip extractor.

Tuesday 17 September 2013

Start windows in 10 seconds

Start Windows in 10 seconds(may vary)


start windows in 10sYou might also like:
Extent window 7 trial period
Does your Windows Computer takes much time to start/boot? Do you want your Windows Computer to boot fast? Then follow the steps below:
Click on windows button and goto Run. Now type regedit in Runcommand box. Then find HKEY_LOCAL_MACHINE\SYSTEM \CurrentControlSet\Control\ ContentIndex
Now there find the Key Called "Startup Delay"Double Click On It. Now where its Base. Click Decimal Now its Default Value Is
4800000(75300:hexadecimal)Change The Value To 40000
Here you go. You have done it! Now close the Registery Editor and Restart Your Computer You'll See The Result.

Monday 16 September 2013

Access blocked websites via Google

Access blocked websites via Google Search


google
Hello friends, today we will access websites which are blocked in your country or school via Google Search. If your favourite website is blocked in your region then this trick can be helpful.

To access a blocked website you have go to Google Search and in the search box type the following query:
cache: website name


Here website name is your blocked website's url.It'll show you the cached version of the website. Done!

Hope it helped!
check out:Cyber awareness for beginners

Sunday 15 September 2013

Internet Companies and their Founders

Founders of Internet services/companies and their Innovations


companies logo
Below are the list of founders of internet company and their innovations
1. Google: Larry Page & Sergey Brin
2. Facebook: Mark Zuckerberg
3. Yahoo: David Filo & Jerry Yang
4. Twitter: Jack Dorsey & Dick Costolo
5. Internet: Tim Berners Lee
6. Linkdin: Reid Hoffman, Allen Blue & Koonstantin Guericke
7. Email: Shiva Ayyadurai
8. Gtalk: Richard Wah kan
9. Whats up: Laurel Kirtz
10. Hotmail: Sabeer Bhatia
11. Orkut: Buyukkokten
12. Wikipedia: Jimmy Wales
13. You tube: Steve Chen, Chad Hurley & Jawed Karim
14. Rediffmail: Ajit Balakrishnan
15. Nimbuzz: Martin Smink & Evert Jaap Lugt
16. Myspace: Chris Dewolfe & Tom Anderson
17. Ibibo: Ashish Kashyap
18. OLX: Alec Oxenford & Fabrice Grinda
19. Skype: Niklas Zennstrom,JanusFriis & Reid Hoffman
20. Opera: Jon Stephenson von Tetzchner & Geir lvarsoy
21. Mozilla Firefox: Dave Hyatt & Blake Ross
22. Blogger: Evan Willams
23. WikiLeaks: Julian Assange

Saturday 14 September 2013

Extend Window 7 Trial period

extend window 7 trial period
Hello friends, Today we are going to talk about how to extend window 7 30 day trial to 120 days.

Introduction


Microsoft window 7 trial can be downloaded free of cost from their site, but after installing that the countdown starts and after 30 days we are forced to buy the activation key!
But fortunately we can extend this 30 day trial period to 120 days (4 months) by a tool called slmgr (Software Licencing Manager). Below are the steps to do this:

Procedure


Step 1:Go to Start -- All Programmes --and right click on CMD and select Run as Administrator.
Step 2: Now Type "slmgr -rearm" (without quotes). Done!
Now your 30 day trial of windows 7 has extended to 30 more days. To extended windows trial to 120 days have to do Step 2 after the end of the trial.
You might also like:Your facebook account has two passwords

Tuesday 10 September 2013

Top facebook and twitter abbreviations


Hello friends today I'm sharing you most common abbreviations/short forms and their full forms used in social networking sites like facebook, twitter, google+ etc.
Below some common full forms are listed. The
UYou
URYour
W/With
W/OWithout
W/EWhatever
W8Wait
PLZPlease
PMPrivate Message
Q&AQuestion and Answer
RI8Right
S2USame to You
SRYSorry
THANQThank You
THANX, TNX, TXThanks
THNThen
NAnd
N2GNeed To Go
O7Salute
J4FJust For Fun
J4LJust For Laugh
J4UJust For You
JLTJust Like That
KOkay
KLCool
B4Before
I3U, ILU, ILYI Love You!
BFFBest Friend Forever
WTFWhat The F**k
BTWBy The Way
BRBBe Right Back
JKJust Kidding
zzzSleeping
FYIFor Your Information
JKJust Kidding
FBFacebook
WTHWhat The Hell
F9Fine
G2EGo To Eat
G8Great
GTHGo To Hell
LMKLet Me Know
OMGOh! My God

You can use these words/abbreviations with your friends only when your friends already know these words. So please share it
Visit Homepage

Saturday 7 September 2013

10 Useful Linux Commands


There are lots of linux commands out there but below are 10 useful commands which may be very useful to you.

1.cd (directory)

Change directory to (directory) Note: ../ is to go back a directory.


2. chmod a+x (file)

Change permission of file to all + excecute.


3. ls

List the stuff in this directory.


4. rm (file)

Delete (file). Note: You may need command 2.


5. top

shows top processes


6. vi (file)

Edit file in vi text editor Note: Type ":qa!" without the quotes and press enter to quit WITHOUT saving.

7. ./(file)


Excecute (file).


8. mv (file) (newfilename)


Rename (file) to (newfilename).Note: If the new file name has a directory in it as in "../Desktop/file.txt" will move the file back one directory into desktop and name it file.txt.


9. su


Become root. Note: sudo is a command to do a function as root.


10. shutdown now

Shutdown the computer... NOW!

If you liked this post please like my posts

Convert FAT to NTFS with cmd

Hello friends!
Summary: Today I'm going to tell you simple tutorial to convert FAT file system to NTFS

Introduction



FAT systems are older and does not support file handling of more than 4GB.

NTFS file systems are newer and has enhanced features.

So let us start with these simple steps:


Step 1: Open command prompt by going start->all programs->accessories->command prompt.

Step 2: Now type "Convert H: /FS:NTFS"(without quotes)

Here C: is the drive we're going to change to NTFS. You can replace c: with your desired drive. Done!
Note: This is irreversible process. you can not convert NTFS to FAT again easily.


check out my previous post on Facebook has two passwords

Thursday 5 September 2013

Your Facebook account has two password


Yes!, you heard it right your facebook account has two passwords, first is your real password and second is your real password with case inversed. For example if your password is 'Apple' then your other password will be 'aPPLE'. I've came across an article on ZDnet in which I've found it. But it is not a loophole or any kind of bug instead it is a feature of facebook. Facebook developers made it because of the fact that people having problem log in to their account when caps lock is on. I've tried it and it worked. Try yourself and see the Magic.
Check out my previous article here.

Tuesday 3 September 2013

Cyber awarness for beginners

frog
Hello everyone and welcome to my first article. First off, as the title states, this is for beginners, not you experienced computer users out there. Second, I am not anywhere near being good at hacking, I just find computers enjoyable and this article mainly reflects on situations that I have found are the most common after being asked dozens of times by friends and family for help. Now let’s get down to business! #1The most obvious problem with most people’s computer security is their password(s). People oftenleave their passwords written onpieces of paper, or on Word documents. Others just make their passwords based solely on how easy it is to memorize them.The problem with this is that they are often very generic or easy to guess, perhaps their last name and a 1 or something of the sort. Unfortunately, the most common password isn’t love, sex,secret, or god (high five if you get this), the most common password from one study was “123456”, with others such as “qwerty”, “abc123”, and the ingenious “Password” also high up on the list. Come on people; come up with a password that no one will ever be able to guess.Also, using dictionary words is not a great idea because it can make the password very easy to crack. Making the letters upper and lower case can slow the crack quite a bit, but having a random password will always be the best. Maybe use some combination of letters and numbers that is an abbreviation for something important to you, or just memorize some crazy jumbles of numbers and letters, whatever works for you.
#2The second most common security problem that I have seenhappening to people is someone “hacking” their account on somesocial network site such as Facebook. And no, they were not attacked by an actual hacker. They just left their computer logged into their account and walked away for a minute. This isthe most absurd problem on this list in my opinion because it doesn’t matter how insanely difficult that your password is, how good your programming skills are, or how many anti-virus programs that you have on your computer, your “friends” who are standing there can just zip right in and screw with your settings. This doesn’t only apply to social networking sites either, this can apply to an actual machine or network, etc. Whenever I step away from my computer, I lock it, log out of whatever I am on, whatever needs to be done to ensure that my computer is safe from prying eyes. Sure it may be a hassle logging back in every time, but I would rather have to type my password a few extra times thanhave to fix whatever problems might occur on my unattended machine. Besides, I don’t know about you but I cringe at the thought of someone getting their paws all over my computer.
#3The third thing that I want to discuss is the most common problem that I see people having when they have an infected computer. When I go in to help them, I find that there are numerous settings that are out of whack, random files on their drives, things shifted around anditems that just plain don’t function. They often tell me that these things have been going on for oh, maybe a week or so. Theylet the problem get way out of hand. They don’t notice that theirsettings have been changed, filesmoved, etc. until it is being done to such a degree that it is impossible to ignore. When usinga computer, you should be takingnote when you tweak settings, what the default settings are for different controls, and when you change them (just have a generalidea, you don’t need specific dates and times). This way you know that when things start acting differently, you can check to make sure that it wasn’t just some setting you changed the day before interfering with whatever you are doing now. This allows you detect whatever bug you might have before any major damage is done.

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More