Thursday, August 26, 2010

Apple’s internal iPhone 4 antenna troubleshooting procedures

Leaked: Apple’s internal iPhone 4 antenna troubleshooting procedures
The antenna issues plaguing the iPhone 4 have infuriated many iPhone users (and rightfully so), but have you ever wondered how Apple is training its employees to deal with the fiasco? Well thanks to one of our Apple connects, we now know the exact procedures AppleCare reps must follow when dealing with any reception complaints regarding the iPhone 4. Hit the jump to check them out.

1. Keep all of the positioning statements in the BN handy – your tone when delivering this information is important.

a. The iPhone 4’s wireless performance is the best we have ever shipped. Our testing shows that iPhone 4’s overall antenna performance is better than iPhone 3GS.

b. Gripping almost any mobile phone in certain places will reduce its reception. This is true of the iPhone 4, the iPhone 3GS, and many other phones we have tested. It is a fact of life in the wireless world.

c. If you are experiencing this on your iPhone 3GS, avoid covering the bottom-right side with your hand.

d. If you are experiencing this on your iPhone 4, avoid covering the black strip in the lower-left corner of the metal band.

e. The use of a case or Bumper that is made out of rubber or plastic may improve wireless performance by keeping your hand from directly covering these areas.

2. Do not perform warranty service. Use the positioning above for any customer questions or concerns.

3. Don’t forget YOU STILL NEED to probe and troubleshoot. If a customer calls about their reception while the phone is sitting on a table (not being held) it is not the metal band.

4. ONLY escalate if the issue exists when the phone is not held AND you cannot resolve it.

5. We ARE NOT appeasing customers with free bumpers – DON’T promise a free bumper to customers.

Clearly Apple is taking the position that nothing is wrong with the antenna, although that’s not surprising since most companies will never willingly admit their flagship product is potentially suffering from an unfixable flaw. But does anyone else find it interesting, if not troubling, that there is no mention of an impending software fix?

Firefox: The official web browser of IBM

Firefox: The official web browser of IBM

Mozilla's Firefox just became the official browser of IBM.

The announcement came on Bob Sutor's blog this morning and means that tens of thousands of new users will be downloading Firefox at work - and, quite possibly, many will do it at home as well.

Sutor is VP of Open Source and Linux in IBM's Software Group, so it comes as no surprise that he supported this move. But this isn't merely for his division. Or even for the Software Group. This is for all 400,000 IBM employees all over the world.

All computers - whether on Windows, Mac or Linux OS - will be loaded with the software from now on. Employees will be urged to - expected to - make it their default browser.

And IBM will encourage all its vendors of browser-based software to fully support Firefox as well.

Why Firefox? "Firefox is now the gold standard for what an open, secure, and standards-compliant browser should be," Sutor wrote. IBM has contributed to Firefox over the years, too, and will continue to.

Sutor cited the shift to cloud computing as another reason for the change. Cloud computing, to be successful, requires open standards to be used. After all, if everyone enters the cloud using different infrastructure, it's going to be difficult to share data and truly access it from anywhere.

The reasons Sutor gave for why he loves Firefox:
* Firefox is stunningly standards compliant, and interoperability via open standards is key to IBM’s strategy.
* Firefox is open source and its development schedule is managed by a development community not beholden to one commercial entity.
* Firefox is secure and an international community of experts continues to develop and maintain it.
* Firefox is extensible and can be customized for particular applications and organizations, like IBM.
* Firefox is innovative and has forced the hand of browsers that came before and after it to add and improve speed and function.

For a company the size of IBM to make this change and publicly encourage anyone and everyone to use Firefox as the default browser at home, too, is a huge boost for Mozilla.

50 Traffic Strategies for your site

1. Trade an adequate amount of Stumbles to improve your site’s Stumble Ranking. StumbleUpon is a feasible option, where-in better the content, higher the hits. Also, Diggs can be utilised to get your site indexed quickly.

2. Backlinks can be substantially incremented through sites such as Propeller, OnlyWire and SocialMarker, which serve the purpose of improving indexing and rankings.

3. A suitable press release publicizing your site can be submitted directly to PRWeb.com to attain a good flow of traffic and even rankings.

4. If a competitor with high traffic-site uses Ad Sense, then you can use Google’s Site Targeting Program to get your ad directly to your competitor’s site, evading hassles of contacting the owner.

5. Advertise your site with certified and commonly visited classifieds such as the centralized network on CraigsList.org.

6. Posting quality content through constant offerings on groups, communities and forums with common interests will help attract a good amount of traffic.
7. LinkedIn.com has a widespread online business social networking forum which effectively helps increase your contacts and repo amongst other onlinemarketers.

8. It is essential to keep updating and modifying your site in order to make it seem more dynamic. This will attract more visits from popular search engines.

9. Publishing brochures or even a mini-book based on what your site is all about can assist in creating huge publicity spreads.

10. Posting regularly on your blog and then pinging each time you write in is of great help. Also, each post must contain apt keywords concerned with the business in order to initiate better search results.

11. Writing eye-grabbing reviews about products that belong to the same niche as yours on blogs in your own niche with a link back to your site.

12. Helpful suggestions or comments can be left on other people’s blogs, with a backlink to your site attached at the bottom.

13. Options such as social bookmarking, Refer to a Friend and other such viral techniques will enable a widespread of your site’s popularity.

14. Sites such as OnlyWire.com help in automating social book marking, which enables you to generate more backlinks automatically, thus resulting in traffic from affiliated sites.

15. Offering free items on your site, such as free courses, affiliate products or e-books will help gain a higher number of subscribers and repeat traffic.

16. Attaining membership to the Better Business Bureau will not only help you develop marketing skills, but also enable you to have your site’s link posted on their website.


17. Submitting articles with qualitative contents to popular article directories and blogs and forums.

18. Business cards are also an effective method to create contacts and expand networks.

19. At times, you can get to advertise your site on the Thank You and Reference pages of other Sales websites in return of a nominal charge for the site owner.

20. Personal profiles on popular social networking sites such as Facebook, MySpace and Twitter can prove heavily beneficial to circulate your site’s information and backlinks.

21. A video-clip containing informative footage regarding your site can be uploaded on common video hosting sites such as YouTube. The link to your site must be included primarily in the About Video/Information section of the clip.

22. Buying advertisements on EBay or using PPC techniques is a way of spending your way into luring customers.

23. Some local Radio stations often accept advertisements at relatively affordable costs. So, investing some amount in advertisements on Radios in another medium of mass-communication with a large reach.

24. Also, sponsoring a small segment on a local News channel is a viable long-term option to spread word about your site.

25. Niches impact traffic flows heavily. Picking the correct niches to venture into and combining them with properly researched keywords thus becomes important for long term traffic.

26. If the content is able to generate enough heat, encouraging people to subscribe to your RSS feeds will become easy, which is an efficient method of building a loyal base of visitors.

27. Many readers who use backlinks to reach your site may not necessarily enter your index page. Hence, each standalone page of the site must be intriguing and attractive enough to make them navigate further and read on.

28. Multiple blogs can be created with one parent site to backlink to. Since all of these blogs act as channels leading to the same parent site, continuous traffic inflow is ensured.


29. Giving out attractive bloggers’ awards or rewarding the best blog entries in cash or kind can prove to be a healthy way of attracting a constant inflow of bloggers.

30. Posting backlinks on websites in similar niches and higher Page-Rank will assist in getting your site’s ranking up. Higher the Page-Rank, better therankings on Search Engines.

31. If you use Yahoo, then it is a common trick to set up a feed on MyYahoo. This will help Yahoo keep automated track of the updates on your site and blogs.

32. Web campaigns either earn money or cost money. Thus, it becomes vital to keep track of your site’s campaigns from time to time through effective tests of their feasibility.

33. An effective offline strategy, which is slightly expensive and lesser known, involves bringing forth your advertisements in front of the common public via modes such as posters, t-shirts, publishing in magazines etc.

34. Also, public places such as alleys, bus stations, cafes etc. are apt sites where you can put up paper Stick-Ons to promote your URL amongst the common masses.

35. The Alexa Tool Bar is an efficient tool to monitor traffic reports and acquire traffic rankings after searching profitable niche keywords on search engines like Google.

36. Hosting Tele-seminars or Webinars with other marketers of your niche can prove to be critical tools in enlightening members of your network with information about your site.
37. If you can’t get famous, get infamous. A trick to attract more eyes is to generate a controversial idea, against the popular beliefs common in the market, and then spread it around through articles and e-books.

38. There could be sites with misspellings or variations of your domain name floating on the web. Try and purchase some space on them in order to forward your URL.

39. Buying an authoritative site and getting high powered people to use it adds to your reputation. Following that up with a few press releases helps attain publicity.

40. Every time you make a presentation to a club, forum or local society, it is highly advisable to mention your site as many times as possible and expand your contacts amongst other online marketers.

41. Write articles and submit to E-zine articles and build backlinks to them if necessary(for quick google rankings), link back to your main page.

42. Use twitter to direct traffic, use automation software to add followers.

43. Add valuable articles to forums in your niche and have a link in your signature.

44. Write guest posts on high traffic blogs in your niche. Do a domain whois search for getting the details of the owner or write a comment telling that you have an offer that can be of mutual benefit.

45. Build a list and send them quality information once a week, soon you can have them come to your site just by requesting.

46. Build relationships in your niche. With fellow webmasters and more importantly the traffic. Make lists and satisfy them with good information.

47. Make video files watermarked with your URL and upload to torrent sites and other sharing hubs (mediafire,rapidshare). Give links to these download pages in forums.

48. Make linkwheels and keep at it consistently.

49. Ping, social bookmark and submit your RSS feeds to rss feed aggregators to get a steady source of traffic each time you update your site.

50. GET TO WORK AND STOP DAY DREAMING.

Change Your Ip In Less Then 1 Minute

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

P.S:
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back

Windows 7's Secret 'GodMode'

Although its name suggests perhaps even grander capabilities, Windows enthusiasts are excited over the discovery of a hidden "GodMode" feature that lets users access all of the operating system's control panels from within a single folder.

By creating a new folder in Windows 7 and renaming it with a certain text string at the end, users are able to have a single place to do everything from changing the look of the mouse pointer to making a new hard-drive partition.

The trick is also said to work in Windows Vista, although some are warning that although it works fine in 32-bit versions of Vista, it can cause 64-bit versions of that operating system to crash.

To enter "GodMode," one need only create a new folder and then rename thefolder to the following:


GodMode.

{ED7BA470-8E54-465E-825C-99712043E01C}



Once that is done, the folder's icon will change to resemble a control panel and will contain dozens of control options. I'm not sure it's my idea of playing God, but it is a handy way to get to all kinds of controls.

Friday, August 20, 2010

Where The Saved Passwords Stores In Windows Xp & Vista

Where The Saved Passwords Stores In Windows Xp & Vista - Must for hackers and Beginers


HOW TO ACCESS REGISTRY ??

1. Goto Start Menu.

2. Click on Run.

3. Type "regedit" (without quotes) in the Run Box .After that this Windows Opens . Now you are ready to see that.


LOCATIONS OF SAVED PASSWORDS !

# Internet Explorer 4.00 - 6.00:

The passwords are stored in a secret location in the Registry known as the "ProtectedStorage".
The base key of the Protected Storage is located under the following key:
"HKEY_CURRENT_USER\Software\Microsoft\Protected Storage System Provider".
You can browse the above key in the Registry Editor (RegEdit), but you won't be able to watch the passwords, because they are encrypted.
Also, this key cannot easily moved from one computer to another, like you do with regular Registry keys.

# Internet Explorer 7.00 - 8.00:

The new versions of Internet Explorer stores the passwords in 2 different locations.
1. AutoComplete passwords are stored in the Registry under
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\IntelliForms\Storage2.

2. HTTP Authentication passwords are stored in the Credentials file under
Documents and Settings\Application Data\Microsoft\Credentials

, together with login passwords of LAN computers and other passwords.


# Firefox:

The passwords are stored in one of the following filenames: signons.txt, signons2.txt, and signons3.txt (depends on Firefox version)
These password files are located inside the profile folder of Firefox, in
[Windows Profile]\Application Data\Mozilla\Firefox\Profiles\[Profile Name]

Also, key3.db, located in the same folder, is used for encryption/decription of thepasswords.


# Google Chrome Web browser:

The passwords are stored in
[Windows Profile]\Local Settings\Application Data\Google\Chrome\User Data\Default\Web Data

(This filename is SQLite database which contains encrypted passwords and other stuff)


# Opera:

The passwords are stored in wand.dat filename, located under
[Windows Profile]\Application Data\Opera\Opera\profile


# Outlook Express (All Versions):

The POP3/SMTP/IMAP passwords Outlook Express are also stored in the ProtectedStorage, like the passwords of old versions of Internet Explorer.


# Outlook 98/2000:

Old versions of Outlook stored the POP3/SMTP/IMAP passwords in the Protected Storage, like the passwords of old versions of Internet Explorer.


# Outlook 2002-2008:

All new versions of Outlook store the passwords in the same Registry key of the account settings.
The accounts are stored in the Registry under
HKEY_CURRENT_USER\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\[Profile Name]\9375CFF0413111d3B88A00104B2A6676\[Account Index]

If you use Outlook to connect an account on Exchange server, the password is stored in the Credentials file, together with login passwords of LAN computers.


# Windows Live Mail:

All account settings, including the encrypted passwords, are stored in
[Windows Profile]\Local Settings\Application Data\Microsoft\Windows Live Mail\[Account Name]

The account filename is an xml file with .oeaccount extension.


# ThunderBird:

The password file is located under
[Windows Profile]\Application Data\Thunderbird\Profiles\[Profile Name]

You should search a filename with .s extension.


# Google Talk:

All account settings, including the encrypted passwords, are stored in the Registry under
HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts\[Account Name]


# Google Desktop:

Email passwords are stored in the Registry under
HKEY_CURRENT_USER\Software\Google\Google Desktop\Mailboxes\[Account Name]



# MSN/Windows Messenger version 6.x and below:

The passwords are stored in one of the following locations:

1. Registry Key: HKEY_CURRENT_USER\Software\Microsoft\MSNMessenger

2. Registry Key: HKEY_CURRENT_USER\Software\Microsoft\MessengerService

3. In the Credentials file, with entry named as "Passport.Net\\*". (Only when the OS is XP or more)


# MSN Messenger version 7.x:

The passwords are stored under
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Creds\[Account Name]


# Windows Live Messenger version 8.x/9.x:

The passwords are stored in the Credentials file, with entry name begins with "WindowsLive:name=".



# Yahoo Messenger 6.x:

The password is stored in the Registry, under
HKEY_CURRENT_USER\Software\Yahoo\Pager
("EOptions string" value)


# Yahoo Messenger 7.5 or later:


The password is stored in the Registry, under
HKEY_CURRENT_USER\Software\Yahoo\Pager - "ETS" value.

The value stored in "ETS" value cannot be recovered back to the original password.


# AIM Pro:

The passwords are stored in the Registry, under
HKEY_CURRENT_USER\Software\AIM\AIMPRO\[Account Name]


# AIM 6.x:

The passwords are stored in the Registry, under
HKEY_CURRENT_USER\Software\America Online\AIM6\Passwords



# ICQ Lite 4.x/5.x/2003:

The passwords are stored in the Registry, under
HKEY_CURRENT_USER\Software\Mirabilis\ICQ\NewOwners\[ICQ Number]
(MainLocation value)


# ICQ 6.x:

The password hash is stored in
[Windows Profile]\Application Data\ICQ\[User Name]\Owner.mdb (Access Database)
(The password hash cannot be recovered back to the original password)



# Digsby:

The main password of Digsby is stored in
[Windows Profile]\Application Data\Digsby\digsby.dat

All other passwords are stored in Digsby servers.



# PaltalkScene:

The passwords are stored in the Registry, under
HKEY_CURRENT_USER\Software\Paltalk\[Account Name].

The Best Android Smart Phones

The Google-developed Android mobile operating system is an alternative to the Apple iPhone, Blackberry and Palm. Even though the Android operating system is relatively new to the market, the popularity of Android phones such as the Evo 4G, DroidIncredible and Motorola Droid suggests that these multitasking feature-rich smart phonesare coming in line with what we want our mobile devices to be. Here's a roundup of some of the best Android smart phones on the market today.


Motorola Droid
For those who must have a physical keyboard, the Motorola Droid is definitely a phone to consider. Despite the fact that the phone has a slide out keyboard, the phone is still relatively thin; actually it is only marginally thicker than the iPhone 3G. The 5 megapixel camera and dual LED flash also allow the phone to take surprisingly good photos – considering that this is actually a phone.

While you have to save apps to the phone's internal memory (512MB ROM and 256MB RAM), a memory card will store up to a maximum of 32GB of photos, music, and other content.

Other Features: 5MP camera, LED flash, GPS, 3.5mm headphone jack

Dimensions: 4.56” x 2.36” x 0.54”

Weight: 5.96 ounces

Display: 3.7”

Starting Price: $149 with a 2 year contract from Verizon


HTC Evo 4G
Sprint has the distinction of bringing the first 4G smart phone to the US in the form of the Evo 4G. The most noticeable feature of the Evo 4G is its generous 4.3-inch display. While the extra wide screen makes it a joy to watch videos on, it does tend to make the phoneuncomfortable to grasp and use for all but those with large hands. The phone also takes a battery life penalty for having such a large and vibrant display.Regardless, the phoneis one of the most feature-rich smart phone devices on the market with performance to back it up, thanks to the 1Ghz Snapdragon processor that makes the user experience quite snappy. One of the biggest selling points of this phone is the 4G service that it supports. You won’t be able to get the service in every area at this time, but if you do, you'll get speeds that are on average 10x faster than current 3G speeds.

Other Features: HDMI ports, 3.5mm head jack port, Wi-Fi

Dimensions: 4.8” x 2.6” x 0.5”

Weight: 6 ounces

Display: 4.3”

Starting Price: $199 with a contract from Sprint


HTC Droid Incredible
Like the Evo 4G, the Droid Incredible has a 1Ghz processor. While the Incredible has a smaller touch screen, measuring 3.7-inches, it does afford a better battery life than the Evo 4G. The phone’s user experience is enhanced by the HTC Sense interface that runs on Android 2.1.The Droid Incredible is a feature-rich phone that also supports Wi-Fi, Bluetooth, GPS and runs on Verizon’s fast 3G network. Like many of the top of the lineAndroid phones we highlight here, the Droid Incredible has fabulous multimedia and multi-tasking capabilities that are sure to please technophiles. One standout feature of this phone is its contoured back plate, which you either love or hate.

Other Features: 8MP camera, 8GB internal memory, 3.5mm headphone jack

Dimensions: 4.63” x 2.3” x 0.47”

Weight: 4.59 ounces.

Display: 3.7”

Starting Price: $199 with a contract from Verizon


Nexus One
This Google Android phone has a fast processor, vibrant display and a dual microphone to improve the audio quality on calls. One of the nice features of the Nexus One is its second microphone that monitors background noise, makes adjustments to speaker volume, and works some other magic to improve the audio quality even when you are operating the phone in a noisy room. The phone has a gorgeous 3.7-inch AMOLEDdisplay that handles 16.7 million colors at an 800 x 480-pixel resolution.

Currently, the phone is sold exclusive by Google, who offers the device for either $179 with a two-year T-mobile contract or $529 without a contract. What is remarkable is that both versions come unlocked, so it will work on the GSM carrier of your choice.

Other Features: 5MP camera, 3.5mm headphone jack, trackball

Dimensions: 4.56” x 2.36” x 0.47”

Weight: 4.58 ounces

Display: 3.7" AMOLED

Starting Price: $179 with a contract from T-Mobile


Motorola Cliq
Like the Motorola Droid, the Cliq includes a physical keyboard, but this keyboard is much better. The keys on the keyboard make it possible to dial and text by touch. The Cliq also uses Motorola Blur, which allows you to access all contacts, email accounts and social media accounts in one place as well as customize the five home screens using widgets.

Other Features: Bluetooth, Wi-Fi, 5MP camera, GPS, Micro USB, geo-tagging

Dimensions: 2.3” x 0.6” x 4.5”

Weight: 5.7 ounces

Display: 3.1”

Starting Price: $149 with a contract from T-Mobile

How To Use PayPal’s Mass Payment Feature To Save Money



Typical PayPal fees within the same country are 1.9-2.9% + USD$0.30. When you cross borders, international PayPal fees can creep up to 3.9% + USD$0.30. So, a payment for US$100 could wind up with a fee of US$4.20, which normally gets paid by the receiver. Amuch smaller fee is applied to Mass Payments. Any online freelancers getting paid a full-time wage this way will surely have noticed the significant impact of these fees on their final wage. But, they’re completely unnecessary – we just need to get the people makingpayments to update their ways.

By the way, don’t get too cranky with PayPal for these fees. Ever seen the fees banks charge to make international transfers? PayPal are really just passing on bank fees and other processing fees to do with single payments. You’re no doubt saving PayPal money too by suggesting your boss make Mass Payments.

So, let’s talk it through step-by-step so you can simply hand your boss this article and they’ll know exactly what they need to do. While you’re there, mention that by using Mass Payment their accounting records will be much easier to navigate.

Firstly, the sender will need to have a verified PayPal Premier or Business account. It’s easy to upgrade an existing account to Premier or Business, but it does require verifying the email address and bank account used with the sender’s PayPal account.

Secondly, the sender will need to ensure they have sufficient funds in their PayPalaccount. Credit cards can’t be used for Mass Payments.

Mass Payments can be made to any email address – if a recipient doesn’t have a PayPalaccount using that exact email address, the address can be easily added to an existingPayPal account. So, all the sender needs is to know the email address and how much they want to send. Senders should also note that all payments in a Mass Payment need to be made in the same currency as each other.

The sender needs to create a tab delimited file containing the email addresses, currency and amounts to be paid. From Excel, this is something you can create easily by saving as “Text (Tab Delimited)”. Put email addresses in the first column, payment amounts in the second column and the currency code in the third column (see PayPal for the codes). An optional fourth column lets you put in some sort of identifier for each person for your own accounting records. Another optional fifth column allows you to send a personal message to that recipient.


How To Use PayPal’s Mass Payment Feature To Save Money

To access Mass Payment, click the “Mass Payment” link at the bottom of the page when you’re logged in to PayPal.

How To Use PayPal’s Mass Payment Feature To Save Money

This takes you to an overview of Mass Payment, including guides, fees, codes and examples. Click on “Make a Mass Payment” to get started.

How To Use PayPal’s Mass Payment Feature To Save Money

How To Use PayPal’s Mass Payment Feature To Save Money

The Mass Payment file upload is straightforward and easy to use. It’s simple to add a generic subject and body to the email sent with all payments. Note that it’s also possible to use the PayPal API to send Mass Payments, so if you’re a larger company (or you just prefer automation) there’s that option available to you as well.

Mass Payments are processed instantly and available for recipients to use or withdraw immediately.

A word of caution: Ensure your recipient is trustworthy and has fulfilled their service or delivered their goods because PayPal Mass Payments can’t be cancelled.

If the recipient has a personal PayPal account in the same country as the sender (and the sender is not using a credit or debit card to make the payment), sending paymentsto them is free the regular way. If the recipient has a Premier or Business account, or they are in a different country to the sender, the fees are lower with a Mass Payment. With regular payments, the sender can choose whether to pay the fees or let therecipient pay them, however with Mass Payment the sender must pay the PayPal fees. So, discuss with the recipients which method is best before you send a Mass Payment.

Saturday, August 14, 2010

How to Hack a MySpace Account


MySpace is one of the most widely used Social Networking website by many teenagers and adults acropss the globe. I have seen many cheaters create secret Myspace accounts in order to exchange messages with another person and have secretrelationships. So, it’s no wonder many people want to know how to hack a Myspace account. In this post I’ll give you the real and working ways to hack a Myspace.

THINGS YOU SHOULD KNOW BEFORE PROCEEDING

With my experience of about 6 years in the field of Hacking and IT security, I can tell you that there are only TWO ways to hack a Myspace: They are Keylogging and Phishing. All the other ways are scams! Here is a list of facts about Myspace hacking.

1. There is no ready made software or program that can hack Myspace just by entering the target username or URL. If you come accross a site that claims to sell a program to hack Myspace then it’s 100% scam.

2. Never trust any Hacking Service that claims to hack a Myspace account just for $100 or $200. All the them are scams.

The following are the only 2 foolproof methods to hack Myspace.
1. HOW TO HACK MYSPACE – The Easiest Way

The easiest way to hack Myspace is by using a keylogger (Spy Software). It doesn’t matter whether or not you have physical access to the target computer. Hacking Myspace becomes just a cakewalk if you use a keylogger since it doesn’t need any technical knowledge. Anyone with a basic knowledge of computers can use keyloggers.

1. What is a keylogger?

A keylogger is a small program that monitors each and every keystroke that a user types on a specific computer’s keyboard. A keylogger is also called as a Spy software or Spy program.

2. Where is keylogger program available?

There exists tons of keyloggers on the internet, but most of them are useless and doesn’t turn out to be effective. But with my experience I recommend the following keylogger as the best to hack Myspce since it supports remote installation.
1. HOW TO HACK MYSPACE – The Easiest Way

The easiest way to hack Myspace is by using a keylogger (Spy Software). It doesn’t matter whether or not you have physical access to the target computer. Hacking Myspace becomes just a cakewalk if you use a keylogger since it doesn’t need any technical knowledge. Anyone with a basic knowledge of computers can use keyloggers.

1. What is a keylogger?

A keylogger is a small program that monitors each and every keystroke that a user types on a specific computer’s keyboard. A keylogger is also called as a Spy software or Spy program.

2. Where is keylogger program available?

There exists tons of keyloggers on the internet, but most of them are useless and doesn’t turn out to be effective. But with my experience I recommend the following keylogger as the best to hack Myspce since it supports remote installation.

http://www.sniperspy.com/

3. How to install a keylogger?

Keyloggers can be installed just like any other program. At the installation time, you need to set your secret password and hotkey combination, to unhide the keyloggerprogram whenever it is needed. This is because, after installation the keylogger becomes completely invisible and start running in the background. Because of it’s stealth behaviour the victim can never come to know about that the presence of the keyloggersoftware on his/her computer.

4. I don’t have physical access to the target computer, can I still use Sniperspy?
It doesn’t matter whether or not you have physical access to the victim’s computer.
Because SniperSpy offers Remote Installation Feature. So, you can hack Myspace remotely installing the keylogger on the target PC.

You can attach the keylogger with any file such as image, MS excel file or other programs and send it to the victim via email. When the victim runs the file, it will automatically get installed without his knowledge and start recording every activity on his computer. The logs containing these activities are sent to you by the keyloggersoftware via email or FTP.

5. What if the target user (victim) refuses to run the attached file?

Sometimes the victim may refuse to run the attachment that you send via email because of suspicion.

6. How can a keylogger hack Myspace account?

You can hack Myspace using keylogger as follows: You install the keylogger on a Remote PC (or on your local PC). The victim is unaware of the presence of the keylogger on hiscomputer. As usual, he logs into his Myspace account by typing the Myspace username and password. These details are recorded and sent to your Sniperspy account. You can login to your Sniperspy account to see the password. Now you have successfully hacked the Myspace account.

In case if you install the keylogger on your local PC, you can obtain the recorded Myspace password just by unhiding the keylogger program.

7. Why SniperSpy is the best?



I have given a complete review of SniperSpy in my new post Which Spy Software to Choose. This should answer your question.

So what are you waiting for? Go grab it.

For a complete installation guide and more information on SniperSpy visit the following link:
http://www.sniperspy.com/

2. HOW TO HACK MYSPACE – Other Ways

Phishing
Phising is the most commonly used method to hack MySpace. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites like Yahoo, Gmail, MySpace etc. The victim is fooled to believe the fake Myspace page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her Myspace login details are stolen away.

Phishing is proved to be the most effective way to hack Myspace and also has high success rate. The reason for this is quite simple. The users are not aware of the phishing attack. Also the users are fooled, since the fake login pages imitate the appearance of the original pages. So, you may use the phishing technique to hack your friend’s MySpace account (just for fun). But you must have a detailed technical knowledge of HTML and server side scripting languages (php, perl etc.) to create a fake login page.

Saturday, August 7, 2010

Shutdown Computer with Your Cell Phone

Using this method, a user can shutdown, restart, hibernate, etc. his or hercomputer, just by sending an email from his or her phone.

To do this, all you will need is Microsoft Outlook which should come withMicrosoft Office, which most people have. This will need to be on thecomputer wish you wish to shutdown.

So, this is how you do this:


1. First, you need the batch files to perform the Shutdown, Hibernate etc. You can write them down yourselves

2. open your note pad

and write lik this...

c:\windows\system32\shutdown -s -f -t 00

and save it as shutdown.bat

3. Open up Microsoft Outlook. Make sure that you have already configured it for your email.Now we will need to make it so that Outlook checks your inbox about every minute (1 minute for testing time can be increased if a delayed shutdown is desired). You can do this by going to Tools: Options.

4. Then click the Mail Setup tab, and afterwards, the Send/Receive button.

5. Make sure that the Schedule an automatic send/receive every... box is checked, and set the number of minutes to 1. Now you may close all of these dialog boxes.

6. Now go to Tools: Rules and Alerts... Next click the options button in the upper right hand corner and press the Import Rules button.

7. Now select the shutdown.bat file ...whi u hv created ...

8. Now, when you send a message from your phone to your e-mail address with the subject shutdown or smsshutdown%%, your computer will shutdown.


Use of any of the Isolated or dead E-mail address or any e-mail will shutdown your computer.
Related Posts Plugin for WordPress, Blogger...
 
Copyright 2009 Adakah Anda Tahu...???. Powered by Blogger Blogger Templates create by Deluxe Templates. WP by Masterplan