skip to main | skip to sidebar

Pages

  • Home

Computer Tricks and Techniques

Find any kind of information about your pc , notebook and notepad. Speeding up your system, activation key of any windows operation system, mobile utilities, mobile techniques, mobile software s, pc software s free download link, pc securities and more.

Ads 468x60px

Infolinks In Text Ads

Infolinks In Text Ads

Infolinks In Text Ads

Infolinks In Text Ads

Popular Posts

  • Download GTA IV free for pc
    Download GTA IV free for pc Requirements of Grand Theft Auto IV: Supported Operating Systems : Windows Vista (plus Service Pack 1) ...
  • Hack Facebook And Any Other Account Using Backtrack 5r3
    I am back after a long day.................. Today I am tuning about how to hack facebook or any other account who wants username and pass ...
  • Hack Facebook And G-mail By Using Backtrack 5 (Full Tutorial)
    Its very easy to hack fb and gmail by using Backtrack 5. Today i am giving you a full tutorial of how to hack fb and and gmail using Backt...
  • Hack Facebook Account In a New And Easy Way
     Today i am going to share a new simple way of hacking Facebook Account with you. Follow it step by step. 1.Download Microsoft .Net Fra...
  • All essential software serial key collection
    I am giving you some essential serial keys of some essential softwares. Those can be useful in many ways. I have colored all the serial ...
  • Batch File Programming, full tutorial
    TODAY I WILL GIVE YOU A PDF FILE ABOUT "BATCH FILE PROGRAMMING". IF YOU WANT TO MAKE SOME BATCH FILE U MUST READ THIS.There's...
  • Port Forwarding- FULL TUTORIAL
    Port   Forwarding Full Tutorial 1.AT first Open your web-browser. Type 192.168.1.1 in the address bar and press Enter. Note- you are en...
  • BACKTRACK 5 TUTORIAL | Part-I-Information-gathering-and-VA-tools
    Backtrack5 full tutorial BackTrack is named after a search algorithm called “backtracking”. BackTrack 5 tools range from passw...
  • Keep Windows 8 [Full Version] in your colletion
    After a long waiting the famous software builder Microsoft has introduced a new OS 'Windows 8' with us at 25 October. Many people t...
  • Windows activation keys 100% working
    Windows activation key is most important specially who use many entertaining softwares and use internet without using any anti-viruses.here...

Sample Text

Followers

About Me

Unknown
View my complete profile
Powered by Blogger.

Featured Posts

Wednesday, July 3, 2013

Download GTA IV free for pc

Download GTA IV free for pc

Requirements of Grand Theft Auto IV:

Supported Operating Systems:
  • Windows Vista (plus Service Pack 1)
  • Windows XP (plus Service Pack 3, DirectX 9, Microsoft .NET Framework 3.5)
Minimum:
  • Processor: Intel Core 2 Duo 1.8Ghz, AMD Athlon X2 64 2.4Ghz
  • Memory: 1.5GB
  • Free Hard Drive Space: 16GB
  • Video Card: 256MB NVidia 7900 / 256MB ATI X1900
  • DirectX 9 compatible Stereo Sound Card
  • Keyboard
  • Mouse
Recommended:
  • Processor: Intel Core 2 Quad 2.4Ghz, AMD Phenom X3 2.1Ghz
  • Memory: 2GB (Windows XP) 2.5GB (Windows Vista)
  • Free Hard Drive Space: 18GB
  • Video Card: 512MB NVIDIA 8600 / 512MB ATI 3870
  • DirectX 9 compatible Surround Sound Card
  • Keyboard
  • Mouse

NOTE:THIS IS AN TORRENT FILE YOU MUST DOWNLOAD THE BIT TORRENT OR ANY OTHER TORRENT MANAGER TO DOWNLOAD THIS FILE THE DOWNLOAD MANAGERS FOR TORRENTS ARE ALSO AVAILABLE ON MY WEBSITE FOR FREE




DOWNLOAD IT FROM HERE
Posted by Unknown at 10:35 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

MICROSOFT OFFICE PLUS FULL DOWNLOAD WITH ACTIVATION KEY

Today i am giving you the Microsoft Office 2013 full version. i know you was searching for it but failed. so i am giving the activation keys with it.........
For downlod office click here.
For Serial Key Click here.
IF THERE IS ANY PROBLEM,  THEN PLEASE INFORM ME
ENNJOY
Posted by Unknown at 3:52 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Tuesday, July 2, 2013

Download Files With Premium Accounts For free!

Everyday we have to download softwares from the internet. Its very hard to find the actual softwares so that we use the Hotfile, Megaupload, Megashare, Rapidshare, Easy Share, Uploadcity, FileSonic etc shearing site to find and download these. But the worse thing is that u have to wait for 30-60 min to download  another software. But there are many sites that provide you to use a premium account such as-Hotfile, Megaupload, Megashare, Rapidshare, Easy Share, Uploadcity, FileSonic. You can get new account details of those premium accounts by this link.
  1. You can get the new username and password everyday  from here. You can directly find the username and pass of which site you want.
  2. You just need to sign up in it, then click on download links and then paste the link of the file that you want to download in the Unrestrict links. Then download the file.......
ENJOY 
Posted by Unknown at 6:49 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Monday, July 1, 2013

Lock Your PC With Pen-drive (Detective Style)

Everyone usually lock their computer with a password. If anyone can hack it, then you will be ready to open your PC easily. so there should be a complementary action. It may be that your pen drive.
You can lock and unlock your computer with a pen drive. The detective style. When the computer is turned on, you have to put the pen drive in your computer, otherwise it will not get started. If someone hack your computer they cant access it without that pen drive and it will show that  Access Denied.
So let's see how it can be-

  • At first you need to download a software named Pradetor.  Click here to download it.
  • Turn the Predator on. After installing this insert your pen drive in USB port. You will not lost your data for this. So you can use this safely.When you put the pen drive in USB drive you will see dialog box. Here you will be able to set password. Then Click OK.
  • Be sure to make some changes of the preference settings. Enter a new password in the new password box. Because if you lose your pen drive, you will be able to open your PC by this password .Then select your pen drive option and Click on the Create Key
  • Then click on the "CREATE" key. Then restart the software.Then it will be green colored after a few second. It means that Pradetor is now working. It will check after 30 sec that the pen drive is connected or not.If its not connected the pc will be locked again.If you want to pause this then click on pause monitoring. 
Posted by Unknown at 5:59 AM 1 comment:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Saturday, June 29, 2013

backtrac 5 codenamed "revolution"


  • BackTrack 5, codenamed “Revolution”, the much awaited penetration testing framework, was released in May 2011. It is a major development over BackTrack 5 R2. BackTrack 5 is said to be built from scratch, and has seen major improvements as well as bug fixes over previous versions.
    BackTrack is named after a search algorithm called “backtracking”. BackTrack 5 tools range from password crackers to full-fledged penetration testing tools and port scanners. BackTrack has 12 categories of tools.

    Penetration testers usually perform their test attacks in five phases:
    1. Information gathering
    2. Scanning and vulnerability assessment
    3. Gaining access to the target
    4. Maintaining access with the target
    5. Clearing tracks
    In this tutorial, we will look at the information gathering and vulnerability assessment tools in BackTrack 5.
    Information gathering
    Information gathering is the first and most important phase in penetration testing. In this phase, the attacker gains information about aspects such as the target network, open ports, live hosts and services running on each port. This creates an organizational profile of the target, along with the systems and networks in use.

    Zenmap UI in BackTrack 5
    tutorial is a screenshot of Zenmap, the BackTrack information gathering and network analysis tool. The intense scan mode in Zenmap provides target information such as services running on each port, the version, the target operating system, network hop distance, workgroups and user accounts. This information is especially useful for white box testing.
    Other BackTrack 5 information gathering tools of interest are CMS identification and IDS-IPS identification for web application analysis. CMS identification gives information about the underlying CMS, which can be used to do a vulnerability research on the CMS and gather all the available exploits to test the target system. The joomscan tool (for the Joomla CMS) is covered later in this tutorial.

    Maltego UI in BackTrack 5
    Another interesting and powerful tool is Maltego, generally used for SMTP analysis. Figure 4 of this tutorial shows Maltego in action.
    The Palette in Maltego shows the DNS name, domain, location, URL, email, and other details about the website. Maltego uses various transformations on these entities to give the pen tester necessary details about the target. Views such as mining view, edge weighted view, etc, provide a graphical representation of the data obtained about a particular target.
    Vulnerability assessment
    The second phase in pen testing is vulnerability assessment. After gaining some initial information and an organizational profile of the target through conclusive foot-printing, we will assess the weak spots or vulnerabilities in the system. There are a number of vulnerability databases available online for ready use, but we will focus on what BackTrack 5 has to offer in this tutorial.

    Joomscan in action
    Web application scanners are used to assess website vulnerabilities. Figure 5 of this tutorial shows joomscan in action. Joomscan is meant for Joomla-based websites and reports vulnerabilities pre-stored in the repository.
    Joomscan can be run with the following command:
    ./joomscan.pl –u <string> -x proxy:port
    Here <string> is the target Joomla website. Joomscan has options for version detection, server check, firewall activity, etc. As can be seen in Figure 5 of this BackTrack 5 tutorial, the target Joomla website is running on an Apache server using PHP version 5.5.16.
    OpenVAS (Open Vulnerability Assessment System) on BackTrack 5: Opening Applications -> Backtrack -> Vulnerability scanners -> OpenVAS will give you the list of options.


    OpenVAS options in BackTrack 5
    OpenVAS is a powerful tool for performing vulnerability assessments on a target. Before doing the assessment, it is advisable to set up a certificate using the OpenVAS MkCert option. After that, we will add a new user from the menu in this BackTrack 5 tutorial.
    The user can be customized by applying rules, or assigned an empty set by pressing Ctrl+D. Once a new user has been added with login and other credentials, we can go ahead with the assessment part of this tutorial.

    Adding a user with OpenVAS
    OpenVAS works on the client/server model in the assessment process. You should regularly update the arsenal to perform efficient tests.
    OpenVAS vs Nessus Scanner
    Nessus Scanner is another vulnerability assessment tool for carrying out automated assessments. Let’s take a look at the difference between the two in the next step of this tutorial.
    Nessus has two versions, free and paid, while OpenVAS is completely free. Recent observations have shown that the plug-in feed from these two scanners is considerably different, and depending on only one tool is not recommended, as automated scanners can throw up lots of false positives.
    Clubbing manual scanners with other tools, alongside automated scanners, is recommended for doing a comprehensive assessment of the target. BackTrack 5 also offers other tools under this category including CISCO tools, which are meant for CISCO-based networking hardware. Fuzzers are also available, categorized as network fuzzers and VOIP fuzzers.

    It’s evident from the above tutorial that Backtrack 5 has a lot in offer in terms of information gathering and vulnerability assessment. In this tutorial, I have made an effort to show the one or two tools which I felt would be most useful to readers. It’s best to try out all tools so that you have first-hand experience of BackTrack 5, and the power it brings to a pen tester’s arsenal. In subsequent tutorials, we shall see how Backtrack 5 facilitates exploitation of a target.
    Step this way to read the next installment of our BackTrack 5 tutorial, which deals with exploits of remote systems.


Posted by Unknown at 6:28 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Hack Facebook And Any Other Account Using Backtrack 5r3

I am back after a long day..................
Today I am tuning about how to hack facebook or any other account who wants username and pass with Backtrack 5 r3.........
watch the video below to see how its happens....

Posted by Unknown at 6:11 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Monday, October 29, 2012

Keep Windows 8 [Full Version] in your colletion

After a long waiting the famous software builder Microsoft has introduced a new OS 'Windows 8' with us at 25 October. Many people think that The Smart Phones , Tablet PC and mobile phones getting damn in the long run of science. The idea is began to prove Microsoft by 'Windows 8'.

Microsoft Chief Executive Steve said- Windows will again prove that its the best for comfort use.

   
Keep Windows 8 in your collection

Versions:

x64 (64-bit)
Windows 8 x64
Windows 8 N x64
Windows 8 Pro x64
Windows 8 Pro VL x64
Windows 8 Pro N x64
Windows 8 Pro with Media Center x64
Windows 8 Enterprise x64
Windows 8 Enterprise N x64

Windows 8 x86
Windows 8 N x86
Windows 8 Pro x86
Windows 8 Pro VL x86
Windows 8 Pro N x86
Windows 8 Pro with Media Center x86
Windows 8 Enterprise x86
Windows 8 Enterprise N x86

Installation:
1) Download
2) Burn to DVD
3) Select desired Windows version (NO KEY/SERIAL NEEDED)
4) Run the correct KMS Activator depending on your installed version (RUN AS ADMIN)
5) ENJOY

1 GHz processor or faster with support for PAE, NX, and SSE2
2 GB RAM / 20 GB available hard disk space
1366 × 768 screen resolution
DirectX 9 graphics processor with WDDM driver
To use touch, you need a PC that supports multitouch

Download links

UploadCore [1GB Split Links] Download link  

OR

OteUpload [1GB Split Links] 


 

Posted by Unknown at 7:26 AM 1 comment:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Older Posts Home
Subscribe to: Posts (Atom)

Social Icons

Blog Archive

  • ▼  2013 (6)
    • ▼  July (4)
      • Download GTA IV free for pc
      • MICROSOFT OFFICE PLUS FULL DOWNLOAD WITH ACTIVATIO...
      • Download Files With Premium Accounts For free!
      • Lock Your PC With Pen-drive (Detective Style)
    • ►  June (2)
  • ►  2012 (18)
    • ►  October (6)
    • ►  September (12)
 
Copyright (c) 2012 Computer Tricks and Techniques | Designed for www.collegetextbookprice.com - www.serviceslisted.com, www.corporateoffice.us, www.logosdatabase.com