skip to main | skip to sidebar

Pages

  • Home

Computer Tricks and Techniques

Find any kind of information about your pc , notebook and notepad. Speeding up your system, activation key of any windows operation system, mobile utilities, mobile techniques, mobile software s, pc software s free download link, pc securities and more.

Ads 468x60px

Infolinks In Text Ads

Infolinks In Text Ads

Infolinks In Text Ads

Infolinks In Text Ads

Popular Posts

  • Download GTA IV free for pc
    Download GTA IV free for pc Requirements of Grand Theft Auto IV: Supported Operating Systems : Windows Vista (plus Service Pack 1) ...
  • Hack Facebook And Any Other Account Using Backtrack 5r3
    I am back after a long day.................. Today I am tuning about how to hack facebook or any other account who wants username and pass ...
  • Hack Facebook And G-mail By Using Backtrack 5 (Full Tutorial)
    Its very easy to hack fb and gmail by using Backtrack 5. Today i am giving you a full tutorial of how to hack fb and and gmail using Backt...
  • Hack Facebook Account In a New And Easy Way
     Today i am going to share a new simple way of hacking Facebook Account with you. Follow it step by step. 1.Download Microsoft .Net Fra...
  • All essential software serial key collection
    I am giving you some essential serial keys of some essential softwares. Those can be useful in many ways. I have colored all the serial ...
  • Batch File Programming, full tutorial
    TODAY I WILL GIVE YOU A PDF FILE ABOUT "BATCH FILE PROGRAMMING". IF YOU WANT TO MAKE SOME BATCH FILE U MUST READ THIS.There's...
  • Port Forwarding- FULL TUTORIAL
    Port   Forwarding Full Tutorial 1.AT first Open your web-browser. Type 192.168.1.1 in the address bar and press Enter. Note- you are en...
  • BACKTRACK 5 TUTORIAL | Part-I-Information-gathering-and-VA-tools
    Backtrack5 full tutorial BackTrack is named after a search algorithm called “backtracking”. BackTrack 5 tools range from passw...
  • Keep Windows 8 [Full Version] in your colletion
    After a long waiting the famous software builder Microsoft has introduced a new OS 'Windows 8' with us at 25 October. Many people t...
  • Windows activation keys 100% working
    Windows activation key is most important specially who use many entertaining softwares and use internet without using any anti-viruses.here...

Sample Text

Followers

About Me

Unknown
View my complete profile
Powered by Blogger.

Friday, September 28, 2012

Hack Facebook And G-mail By Using Backtrack 5 (Full Tutorial)


Its very easy to hack fb and gmail by using Backtrack 5. Today i am giving you a full tutorial of how to hack fb and and gmail using Backtrack 5.
Follow those step by step-

First open your backtrack terminal and type ifconfig to check your IP

Now Again Open Your Backtrack terminal and Type cd /pentest/exploits/set

Now Open Social Engineering Toolkit (SET) ./ set

Now choose option 2 , “ Website Attack Vectors ”.

In this option we will select option 4 “ Tabnabbing Attack Method ”.

In this option we will choose option 2 “ Site Cloner ”.

Enter the URL of the site you want to clone. In this case http://www.gmail.com/ and hit enter. SET will clone up the web site. And press return to continue.

Now convert your URL into Google URL using goo.gl and send this link address to your victim via Email or Chat. Now convert your URL into Google URL using goo.gl and send this link address to your victim via Email or Chat.

When victim open in their browser it should be a message that the page is still loading. so victim start to open another tab. As soon as victim open new tab, our fake website start working. That script will redirect the victim to the phishing page your derived.

download Backtrack 5 from here.
Good luck, and notify me if u can done it and also inform me if you face any problem.

Posted by Unknown at 1:12 AM 1 comment:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Saturday, September 22, 2012

How to Use or Record a Video Call in SKYPE

Hye every one. Now i am going to introduce a tool with you, that is skype video and audio call recorder. By using this you can record the video and audio interviews, conferences, broadcasts and family VoIP calls.This software can record the perfect swish.

Other Features:
- Skype video and audio source from AVI format to record and store the data.
- Skype single video call, Skype screen sharing session and about 10 ways Skype group video of the facility.
- The convenience of recording directly to your hardadike.
- You need to select the video format of the facility.
- Automatic chat reply.
- Easier to use Friendly intaraphesa

Download it from here (get skype)  
Posted by Unknown at 4:06 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Thursday, September 20, 2012

Start your PC without pressing its power button


We use CPU's power button to start computer. But if somehow power button get broken or stop to work we fill many problems . If we want we can start our computer by using our keybords. Turn on the computer , and press the DEL button and go to the BIOS . Then select the Power Management Setup and press the Enter and select the Power on my keyboard. Give a password and press enter. after giving a password you have exit from that page. Now you cant start your PC my entering those passwords. Although the method is applicable to other motherboard Gigabyte's motherboards can be found with this method.

Posted by Unknown at 3:22 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

How to increase your internet speed without using any software.


We often use many kind of software to increase the speed of the internet. Now i will give you a tips        
so that you can speed up your internet speed without using any software.

Tricks To Speed ​​Internet, we applied a little at 0% or 100% will increase.
■ How to do it-

A) From the Start menu, click Run.
wright gpedit.msc and hit enter.

B) A group policy editor will open. Now, go to-
Local Computer Policy / Computer Configuration / Administrative Templates / Network / QOS Packet Scheduler / Limit Reservable Bandwidth

C) Double-click the Limit Reservable bandwidth . It will not configure.
Now enable it and give it at 0% .

Please come out by clicking OK.

Now it will be like on your computer Reserve at 0% speed.
Try, will be alike.

► Do remember to install the PC software as well as Windows PC Performance evaluation.
Posted by Unknown at 3:10 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Introducing with function keys


Who we use windows , do we know every one how the function keys used for? Let us assume that all 'F's keyboard works -

F1: press it for getting help of windows

F2: usually change a file or folder name (Rename) is used for this. At Ms word by pressing Alt + Ctrl + F2 to open the new files. Also print preview in Word by pressing Ctrl + F2.

F3: This is a search facility on the windows of the program. Word from the text by pressing Shift + F3 in lowercase or uppercase first letter of each word in capital letters at the start of the work can be easy.

F4: This is the word of the last action performed again (Repeat) can be. Active by pressing Alt + F4 will close the program. Is activated by pressing Ctrl + F4 to close the window.

F5: Microsoft Windows, Internet browser, and the F5 Refresh button. Press ctrl + F5 refresh difficult for me. Word find, replace, go to the window is opened.

F6: The key of the mouse karasarake web browser address line of the addressbar. Ms word by pressing Ctrl + Shift + F6 on the active prograame do.

F7: Word of byakarana and is spelled correctly. Caret browsing in Firefox can turn. The Word is selected by pressing Shift + F7 word synonym, antonym, etc. To determine the type of sound can turn.

F8: the operating system to start when the key is used for a long time. For example, to run Windows in Safe Mode-This key is used.

F9: Quarks Express 5.0-'s Measurement for this key is used to open the toolbar.

F10: browser, or you can select any active window, menu bars. Selected text by pressing Shift + F10 / attach / link. Photographs and right-click the mouse to keep pressing this key will work.

F11: Browser in Full Screen-appear.

F12: ms word's key by pressing the Save as window will open. In addition, you can save files in Microsoft Word by pressing Shift + F12. Ep ms word file by pressing Ctrl + Shift + F12 is print.
Posted by Unknown at 2:44 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Monday, September 17, 2012

Crazy Call- Change you voice in calls

                               If you want make any punk calls or want to make your friend a fool then you can use crazycall . You can change your CallerID, so when you call someone he/she sees on his Caller ID display the number you selected. You can also change your voice and also can make it deep and creepy or high and funny.




Follow These Steps-

‎* Open --->
crazycall


* Select your country and wait for the page to load.


* Enter the number you want to display in the first big box (Dont change the contents of small box if the fake number is of same country).


* Enter the number you wish to call in second big box.



* Choose voice pitch as normal (for same voice) or high or low pitch to change your voice.


* Click Get me a code.


* Dial the number shown on right and enter the shown code when asked.


That's It, Remember International call rates apply.
Dont use for illegal purposes...
Posted by Unknown at 4:47 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Port Forwarding- FULL TUTORIAL

Port  Forwarding

Full Tutorial

1.AT first Open your web-browser. Type 192.168.1.1 in the address bar and press Enter. Note- you are entering your router settings.

2.After that the browser will ask for username and password. Usually, the natural username and password combo is admin:admin [If you have changed it, then type your customized username and password]See, I am using two routers. The first one is Nokia Siemens C2110 and the second one is DNA-A201BEI. The settings are almost same for all routers. All you need to do is to apply the same method in your router. No need to worry.

3.Then go to the port-forwarding settings in your router. In my router, the port-forwarding option is located in the Security tab. In some routers, it is located in the NAT or VIRTUAL SERVER tab.

4. Now click on 'Add' or 'New'. It will add a new port-forwarding rule.

5. Now give a name. Since I am port-forwarding for DarkComet, I will name it DC. And, I am forwarding the port 678.Now you need to get your IPv4 address. Open Command Prompt. Type 'ipconfig' (without quotation) and press Enter. Note your IPv4 address.Type your IPv4 address in the 'Internal Host IP Address' text field. Set both Internal and External packet to 678. Choose TCP/UDP as protocol. If they are separately present, make a TCP and a UDP separately.

6. Now, Apply the settings. Reboot your router. It's done now. Now run your RAT. Listen to port 678. Then use canyouseeme.org or PFPortchecker to check whether your port is open or not.
Posted by Unknown at 3:49 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Batch File Programming, full tutorial

TODAY I WILL GIVE YOU A PDF FILE ABOUT "BATCH FILE PROGRAMMING". IF YOU WANT TO MAKE SOME BATCH FILE U MUST READ THIS.There's a  full tutorial about it with pictures. download it from  here
pass-123456
Posted by Unknown at 3:35 AM 1 comment:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

BACKTRACK 5 TUTORIAL | Part-I-Information-gathering-and-VA-tools


  • Backtrack5 full tutorial
BackTrack is named after a search algorithm called “backtracking”. BackTrack 5 tools range from password crackers to full-fledged penetration testing tools and port scanners. BackTrack has 12 categories of tools.

Penetration testers usually perform their test attacks in five phases:
1. Information gathering
2. Scanning and vulnerability assessment
3. Gaining access to the target
4. Maintaining access with the target
5. Clearing tracks

Information gathering
Information gathering is the first and most important phase in penetration testing. In this phase, the attacker gains information about aspects such as the target network, open ports, live hosts and services running on each port. This creates an organizational profile of the target, along with the systems and networks in use. 

Zenmap UI in BackTrack 5
tutorial is a screenshot of Zenmap, the BackTrack information gathering and network analysis tool. The intense scan mode in Zenmap provides target information such as services running on each port, the version, the target operating system, network hop distance, workgroups and user accounts. This information is especially useful for white box testing.
Other BackTrack 5 information gathering tools of interest are CMS identification and IDS-IPS identification for web application analysis. CMS identification gives information about the underlying CMS, which can be used to do a vulnerability research on the CMS and gather all the available exploits to test the target system. The joomscan tool (for the Joomla CMS) is covered later in this tutorial.

Maltego UI in BackTrack 5
Another interesting and powerful tool is Maltego, generally used for SMTP analysis. Figure 4 of this tutorial shows Maltego in action.
The Palette in Maltego shows the DNS name, domain, location, URL, email, and other details about the website. Maltego uses various transformations on these entities to give the pen tester necessary details about the target. Views such as mining view, edge weighted view, etc, provide a graphical representation of the data obtained about a particular target.
Vulnerability assessment
The second phase in pen testing is vulnerability assessment. After gaining some initial information and an organizational profile of the target through conclusive foot-printing, we will assess the weak spots or vulnerabilities in the system. There are a number of vulnerability databases available online for ready use, but we will focus on what BackTrack 5 has to offer in this tutorial.

Joomscan in action
Web application scanners are used to assess website vulnerabilities. Figure 5 of this tutorial shows joomscan in action. Joomscan is meant for Joomla-based websites and reports vulnerabilities pre-stored in the repository.
Joomscan can be run with the following command:
./joomscan.pl –u <string> -x proxy:port
Here <string> is the target Joomla website. Joomscan has options for version detection, server check, firewall activity, etc. As can be seen in Figure 5 of this BackTrack 5 tutorial, the target Joomla website is running on an Apache server using PHP version 5.5.16.
OpenVAS (Open Vulnerability Assessment System) on BackTrack 5: Opening Applications -> Backtrack -> Vulnerability scanners -> OpenVAS will give you the list of options.


OpenVAS options in BackTrack 5
OpenVAS is a powerful tool for performing vulnerability assessments on a target. Before doing the assessment, it is advisable to set up a certificate using the OpenVAS MkCert option. After that, we will add a new user from the menu in this BackTrack 5 tutorial.
The user can be customized by applying rules, or assigned an empty set by pressing Ctrl+D. Once a new user has been added with login and other credentials, we can go ahead with the assessment part of this tutorial.

Adding a user with OpenVAS
OpenVAS works on the client/server model in the assessment process. You should regularly update the arsenal to perform efficient tests.
OpenVAS vs Nessus Scanner
Nessus Scanner is another vulnerability assessment tool for carrying out automated assessments. Let’s take a look at the difference between the two in the next step of this tutorial.
Nessus has two versions, free and paid, while OpenVAS is completely free. Recent observations have shown that the plug-in feed from these two scanners is considerably different, and depending on only one tool is not recommended, as automated scanners can throw up lots of false positives.
Clubbing manual scanners with other tools, alongside automated scanners, is recommended for doing a comprehensive assessment of the target. BackTrack 5 also offers other tools under this category including CISCO tools, which are meant for CISCO-based networking hardware. Fuzzers are also available, categorized as network fuzzers and VOIP fuzzers.

It’s evident from the above tutorial that Backtrack 5 has a lot in offer in terms of information gathering and vulnerability assessment. In this tutorial, I have made an effort to show the one or two tools which I felt would be most useful to readers. It’s best to try out all tools so that you have first-hand experience of BackTrack 5, and the power it brings to a pen tester’s arsenal. In subsequent tutorials, we shall see how Backtrack 5 facilitates exploitation of a target.
Step this way to read the next installment of our BackTrack 5 tutorial, which deals with exploits of remote system.


Options

Posted by Unknown at 3:19 AM 1 comment:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Sunday, September 16, 2012

The easiest way to renew your IP Address

It may be greatly helpful for you to know how to renew IP Address. If you experience an power outage at your home or business, a problem has occured which requires you to release and renew an IP Address. Following the steps below will first release an IP Address and then renew an IP Address on a Vista Operating System. If you are not successful in gaining access to the internet, try the tips listed below. If all else fails you may need to contact your Internet Service Provider for assistance.


To renew your IP address, you will need:
A Vista operating system
Click on the "Start" button, “All Programs” and “Accessories.” Then select and right-click on “Command prompt,” and select “Run as Administrator.” Click on continue and the command prompt window will display.
On the command prompt windows, Type "ipconfig /release," and press "Enter." This releases your computers current IP addresses.
Then Type "ipconfig /renew" and press "Enter." This assigns your computer a new set of IP addresses.
Type Exit" and press "Enter" to close the window. You computer now has a new IP address.

Tips:
If the above steps don't resolve your connectivity issue, unplug your modem and/or router for a few seconds and then repeat the process.
The command "ipconfig" reveals the IP address assigned to your computer. If you have more than one connection to your computer (i.e. having both a wireless and LAN network card) the command "ipconfig /all" reveals all your assigned IP addresses.

Posted by Unknown at 7:39 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Windows activation keys 100% working

Windows activation key is most important specially who use many entertaining softwares and use internet without using any anti-viruses.here are some activation keys of windows -




Vista |Ultimate|Acer|3YDB8-YY3P4-G7FCW-GJMPG-VK48C
Vista |Ultimate|Advent|39MVW-K8KKQ-BGJ9B-24PMW-RYQMV
Vista |Ultimate|Alienware|7QVFM-MF2DT-WXJ62-XTYX3-P9YTT
Vista |Ultimate|Asus|6F2D7-2PCG6-YQQTB-FWK9V-932CC
Vista |Ultimate|Dell|2QBP3-289MF-9364X-37XGX-24W6P
Vista |Ultimate|DixonXP|6JPQR-4G364-2B7P7-83FXW-DR8QC
Vista |Ultimate|Gateway|6P8XK-GDDTB-X9PJQ-PYF36-G8WGV
Vista |Ultimate|Hedy|7R2C3-DWCBG-C8G96-MPT8T-K37C7
Vista |Ultimate|HP|23CM9-P7MYR-VFWRT-JGH7R-R933G
Vista |Ultimate|Lenovo|24J6Q-YJJBG-V4K4Q-2J8HY-8HBQQ
Vista |Ultimate|OQO|C4QGV-XHYYT-9PW8R-DCFTQ-FBD6M
Vista |Ultimate|Toshiba|33G3W-JY3XQ-CQQ7C-TG96R-R6J6Q
Vista |Ultimate|Sony|2KKTK-YGJKV-3WMRR-3MDQW-TJP47
Vista |Business|Acer|2TJTJ-C72D7-7BCYH-FV3HT-JGD4F
Vista |Business|Asus|72PFD-BCBK8-R7X4H-6F2XJ-VVMP9
Vista |Business|Dell|368Y7-49YMQ-VRCTY-3V3RH-WRMG7
Vista |Business|Fujitsu|4C3CM-H3RXM-VBMVQ-K8RHX-RTFX8
Vista |Business|HP|2Q2WM-VCB98-8C6BG-C9BT2-3XDRY
Vista |Business|Lenovo|2YRV9-YCY3F-FRJ4T-BKD6B-C47PP
Vista |Business|MSI|2X4F8-Y4QGK-Y8RTT-CK6PB-M8X92
Vista |Business|OQO|KBK7F-XCVK4-9W477-GPFVC-YXFDM
Vista |Business|Sony|3W2Y2-GRRYB-VH76X-KPDXX-XFJ4B
Vista |Business|Toshiba|38MK6-4QYC6-GJQQX-9DYQ4-H9MQD
Vista |BusinessN|Acer|2434H-HFRM7-BHGD4-W9TTD-RJVCH
Vista |HomeBasic|Acer|2W7FD-9DWCB-Q9CM8-KTDKK-8QXTR
Vista |HomeBasic|Asus|762HW-QD98X-TQVXJ-8RKRQ-RJC9V
Vista |HomeBasic|Benq|7R997-DXYDR-YGCR3-RHVDP-T8TKX
Vista |HomeBasic|CHS|2QM7G-GTFJ4-2DTTG-R73YR-W3D8G
Vista |HomeBasic|Dell|3YMR2-WMV49-4WD8X-M9WM7-CH4CG
Vista |HomeBasic|Fujitsu|4G8P7-TVW66-Y3H3V-C4Q4J-CQR2B
Vista |HomeBasic|Gateway|7Q3BC-897QP-6HVMF-TTJ34-P92J4
Vista |HomeBasic|Gericom|MDRBF-FKHJB-6J8RV-P4GKQ-G6BR8
Vista |HomeBasic|Gigabyte|889T3-F4VGX-QK4V7-JH76R-3HHRC
Vista |HomeBasic|HP|2VX48-BVXT6-GD2PK-BD3R2-44MV3
Vista |HomeBasic|Ksystem-Irbis|J2QKK-V8M3X-WRPPT-FBW4B-FQ6FP
Vista |HomeBasic|Lenovo|2WP98-KHTH2-KC7KG-4YR37-H8PHC
Vista |HomeBasic|LG|6DT3K-TCY4G-Y2VK9-T8J3T-2RGT7
Vista |HomeBasic|Mecer|C3MXB-T6PGC-2M2XV-C6PRX-TPW79
Vista |HomeBasic|Medion|3XFY9-7GTXV-93RXP-V62MQ-84WP6
Vista |HomeBasic|NEC|2432B-Q9RGP-VT9CK-64JFP-X6XVT
Vista |HomeBasic|Packard Bell|4GW2B-QCB6W-BWTVG-2DDKY-KRDMH
Vista |HomeBasic|Rover|BMHBK-PJD8J-WDWGY-Q4D6Q-46YJP
Vista |HomeBasic|Samsung|27WDG-2G9G2-BTVMF-W4KCX-9F8PX
Vista |HomeBasic|Toshiba|4DV48-MFJR8-VRW92-3VTYM-HBTPB
Vista |HomeBasic|Trigem|2YY8K-6KVM4-3DTT6-XRFHK-RYYDG
Vista |HomeBasicN|Acer|22TC9-RDMDD-VXMXD-2XM2Y-DT6FX
Vista |HomePremium|Acer|2TYBW-XKCQM-XY9X3-JDXYP-6CJ97
Vista |HomePremium|Alienware|D9CRD-R8YYQ-VYG3W-YG4FK-2CXRF
Vista |HomePremium|Asus|8XPM9-7F9HD-4JJQP-TP64Y-RPFFV
Vista |HomePremium|Dell|4GPTT-6RYC4-F4GJK-KG77H-B9HD2
Vista |HomePremium|DixonXP|7VJMY-XWBMV-T3PCK-3FRWY-KKMRQ
Vista |HomePremium|Everex|BH3M9-MQPD8-PTPDK-T6DWK-B2XFW
Vista |HomePremium|Founder|C6KM8-8JDBT-QBRM8-2MGFH-XH7QY
Vista |HomePremium|Fujitsu|6M66G-C2BGD-XGBBV-2BHKV-C9KM3
Vista |HomePremium|Gateway|6DX2X-QR7XB-3RBY2-BGQ2R-DR9M6
Vista |HomePremium|HP|HW7V9-XYT4W-PFR9Q-2DKGJ-RR4TD
Vista |HomePremium|iQon|6R99P-3HY62-7XR3F-WGP2T-HKCB9
Vista |HomePremium|Kohjinsha|HRCXG-RQPBQ-YBP92-KFFRY-JKQQ3
Vista |HomePremium|Ksystem-Irbis|7QVBM-X4KG7-QCWDP-YC8PQ-PXKH8
Vista |HomePremium|Lenovo|34BKK-QK76Y-WWR7C-QF2M7-2TB37
Vista |HomePremium|LG|73JC4-PR3R6-9DKYC-FDG3K-3FTT3
Vista |HomePremium|Medion|4FG94-MMYPT-H2QD2-V4DCP-X7QB8
Vista |HomePremium|MeshPC|HR3TD-CH9JD-CT8WF-X948R-C3QR3
Vista |HomePremium|MSI|86C2J-2M84W-HBMRQ-GBJWJ-VPTRM
Vista |HomePremium|NEC|22CTR-JFKJJ-BMXQK-XKXBC-C8R98
Vista |HomePremium|Optima|863XK-7RW2B-6R8CR-4FYQV-3FTW8
Vista |HomePremium|Packard Bell|6PFJK-WKXQR-9Q27C-6CWD7-MQ3CQ
Vista |HomePremium|Powerspec|CK82T-QVTHF-8HGMF-9F3G9-FJH92
Vista |HomePremium|Quanmax|88XKM-J69QV-VB9M9-QCM66-647KW
Vista |HomePremium|Samsung|2MQH8-77KBM-PRTT7-HVDWW-DCXVT
Vista |HomePremium|Sony|6JWV3-843DD-4GV68-6D8JB-G6MF9
Vista |HomePremium|Targa|6VJ7B-3KTJH-H3DDQ-7JD7G-26VMG
Vista |HomePremium|TCL|BH626-XT3FK-MJKJH-6GQT2-QXQMF
Vista |HomePremium|Toshiba|6DG3Y-99KMR-JQMWD-2QJRJ-RJ34F
Vista |HomePremium|Velocity|GCHCQ-WTYXJ-GDJBC-JYDCX-F9VXW
Vista |Starter|Acer|26VQB-RP3T9-63FVV-VD7RF-H7M2Q
Vista |Starter|Lenovo|23Q4W-YQPHY-TY89Y-7Q3VX-W72KT
Server |ServerEnterprise|Dell|BKCJJ-J6G9Y-4P7YF-8D4J7-7TCWD
Server |ServerStandard|Dell|D7TCH-6P8JP-KRG4P-VJKYY-P9GFF
Server |SBS|Dell|76GGM-4MQ6T-XCJH9-6R2XQ-PW2D2
Server |Business|Dell|76GGM-4MQ6T-XCJH9-6R2XQ-PW2D2
Server |Enterprise|Dell|26Y2H-YTJY6-CYD4F-DMB6V-KXFCQ
Server |Standard|Dell|223PV-8KCX6-F9KJX-3W2R7-BB2FH
7 |Ultimate|Acer|FJGCP-4DFJD-GJY49-VJBQ7-HYRR2
7 |Ultimate|Alienware|VQ3PY-VRX6D-CBG4J-8C6R2-TCVBD
7 |Ultimate|Asus|2Y4WT-DHTBF-Q6MMK-KYK6X-VKM6G
7 |Ultimate|Dell|342DG-6YJR8-X92GV-V7DCV-P4K27
7 |Ultimate|HP|MHFPT-8C8M2-V9488-FGM44-2C9T3
#7 |Ultimate|Lenovo 2|22TKD-F8XX6-YG69F-9M66D-PMJBM
7 |Ultimate|Lenovo|6K2KY-BFH24-PJW6W-9GK29-TMPWP
7 |Ultimate|Samsung|49PB6-6BJ6Y-KHGCQ-7DDY6-TF7CD
7 |Ultimate|Sony|YJJYR-666KV-8T4YH-KM9TB-4PY2W
#7 |UltimateE|Demo|XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
#7 |UltimateN|Demo|XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
7 |Professional|Acer|YKHFT-KW986-GK4PY-FDWYH-7TP9F
7 |Professional|Asus|2WCJK-R8B4Y-CWRF2-TRJKB-PV9HW
7 |Professional|Dell|32KD2-K9CTF-M3DJT-4J3WC-733WD
7 |Professional|Fujitsu|PT9YK-BC2J9-WWYF9-R9DCR-QB9CK
7 |Professional|HP|74T2M-DKDBC-788W3-H689G-6P6GT
7 |Professional|Lenovo|237XB-GDJ7B-MV8MH-98QJM-24367
7 |Professional|Samsung|GMJQF-JC7VC-76HMH-M4RKY-V4HX6
7 |Professional|Sony|H9M26-6BXJP-XXFCY-7BR4V-24X8J
7 |Professional|Toshiba|2V8P2-QKJWM-4THM3-74PDB-4P2KH
#7 |Professional|????|862R9-99CD6-DD6WM-GHDG2-Y8M37
#7 |ProfessionalE|Demo|XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
#7 |ProfessionalN|Demo|XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
#7 |HomePremium|Asus 2|7JQWQ-K6KWQ-BJD6C-K3YVH-DVQJG
7 |HomePremium|Acer|VQB3X-Q3KP8-WJ2H8-R6B6D-7QJB7
7 |HomePremium|Advent|38JTJ-VBPFW-XFQDR-PJ794-8447M
7 |HomePremium|Asus|2QDBX-9T8HR-2QWT6-HCQXJ-9YQTR
7 |HomePremium|Dell|6RBBT-F8VPQ-QCPVQ-KHRB8-RMV82
7 |HomePremium|Fujitsu|C6MHH-TRRPT-74TDC-FHRMV-XB88W
7 |HomePremium|HCL|39QDH-D7MHH-WDMTD-TM2R9-KM7DB
7 |HomePremium|HP|4FG99-BC3HD-73CQT-WMF7J-3Q6C9
7 |HomePremium|Lenovo|27GBM-Y4QQC-JKHXW-D9W83-FJQKD
7 |HomePremium|LG|38GRR-KMG3D-BTP99-TC9G4-BBDJJ
7 |HomePremium|Medion|2P2P9-CM3F8-FTV6P-PC7CX-8TFF7
7 |HomePremium|MSI|4G3GR-J6JDJ-D96PV-T9B9D-M8X2Q
7 |HomePremium|Packard Bell|VQB3X-Q3KP8-WJ2H8-R6B6D-7QJB7
7 |HomePremium|Samsung|CQBVJ-9J697-PWB9R-4K7W4-2BT4J
7 |HomePremium|Siragon|HWDFB-YVFG4-3TJ7F-Q3WMT-7B6PH
7 |HomePremium|Sony|H4JWX-WHKWT-VGV87-C7XPK-CGKHQ
7 |HomePremium|Toshiba|6B88K-KCCWY-4F8HK-M4P73-W8DQG
#7 |HomePremium|Toshiba 2|6GF36-P4HWR-BFF84-6GFC2-BWX77
#7 |HomePremium|????|2P2P9-CM3F8-FTV6P-PC7CX-8TFF7
#7 |HomePremiumE|Demo|XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
#7 |HomePremiumN|Demo|XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
7 |HomeBasic|Acer|MB4HF-2Q8V3-W88WR-K7287-2H4CP
7 |HomeBasic|Asus|89G97-VYHYT-Y6G8H-PJXV6-77GQM
7 |HomeBasic|Dell|36T88-RT7C6-R38TQ-RV8M9-WWTCY
7 |HomeBasic|HP|DX8R9-BVCGB-PPKRR-8J7T4-TJHTH
7 |HomeBasic|Lenovo|22MFQ-HDH7V-RBV79-QMVK9-PTMXQ
7 |HomeBasic|Samsung|2P6PB-G7YVY-W46VJ-BXJ36-PGGTG
7 |HomeBasic|Sony|YV7QQ-RCXQ9-KTBHC-YX3FG-FKRW8
7 |HomeBasic|Tongfang|9DBMT-GXRWM-6Q9Y3-WMYM8-FJCBW
7 |HomeBasic|Toshiba|9H4FH-VD69Y-TGBD2-4PM4K-DRMMH
#7 |HomeBasicE|Demo|XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
#7 |HomeBasicN|Demo|XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
7 |Starter|Acer|RDJXR-3M32B-FJT32-QMPGB-GCFF6
7 |Starter|Asus|6K6WB-X73TD-KG794-FJYHG-YCJVG
7 |Starter|Dell|36Q3Y-BBT84-MGJ3H-FT7VD-FG72J
7 |Starter|HP|RH98C-M9PW4-6DHR7-X99PJ-3FGDB
7 |Starter|Lenovo|273P4-GQ8V6-97YYM-9YTHF-DC2VP
7 |Starter|MSI|2W4DJ-JFFJV-DMCPP-2C3X8-883DP
7 |Starter|Nokia|2XGHP-9TQK2-8CF28-BM2P2-8FRX8
7 |Starter|Sony|32J2V-TGQCY-9QJXP-Q3FVT-X8BQ7
7 |Starter|Toshiba|TGBKB-9KBGJ-3Y3J6-K8M2F-J2HJQ
7 |Starter|Viliv|7W842-2HCPJ-BC3MJ-B79K6-TD2HQ
#7 |StarterE|Demo|XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
#7 |StarterN|Demo|XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
#7 |Enterprise|Demo|XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
#7 |EnterpriseE|Demo|XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
#7 |EnterpriseN|Demo|XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
best of luck!
Posted by Unknown at 7:08 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

Speed up your pc or notepad

There are a lot of thing by which we can speed up our computer and notepad.. But today we will use notepad for speeding up computer by cleaning RAM cache.It is most important resource in term of computer's processing speed. And cleaning the RAM ache is the efficient way to improve your performance.


Follow these steps  
  1. Go to “My Computer” and click on “tools” (for XP) or click on “Organize” (for Win7). These options are placed on the left top of “My Computer”.
  2. Now click on “Folder and search” in the list down.
  3. Select “View” tab and uncheck “Hide extension for known file type” and click “Ok”.
Follow those for notepad
  1. Open “Notepad”
  2. Type: “mystring=(80000000)” (without quotes)
  3. Save the notepad file with the name RAM.vbe and close it.


Now every time you will run this file, it will clear your computer’s RAM cache and makes it almost 80% faster.
Posted by Unknown at 5:04 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Posts Home
Subscribe to: Posts (Atom)

Social Icons

Blog Archive

  • ►  2013 (6)
    • ►  July (4)
    • ►  June (2)
  • ▼  2012 (18)
    • ►  October (6)
    • ▼  September (12)
      • Hack Facebook And G-mail By Using Backtrack 5 (Ful...
      • How to Use or Record a Video Call in SKYPE
      • Start your PC without pressing its power button
      • How to increase your internet speed without using ...
      • Introducing with function keys
      • Crazy Call- Change you voice in calls
      • Port Forwarding- FULL TUTORIAL
      • Batch File Programming, full tutorial
      • BACKTRACK 5 TUTORIAL | Part-I-Information-gatherin...
      • The easiest way to renew your IP Address
      • Windows activation keys 100% working
      • Speed up your pc or notepad
 
Copyright (c) 2012 Computer Tricks and Techniques | Designed for www.collegetextbookprice.com - www.serviceslisted.com, www.corporateoffice.us, www.logosdatabase.com