Here are many tips and hidden tricks for your knowledge base. mesothelioma paternity paternity testing crm software refinance loan online drug rehab center student loan consolidation electronic medical records telecom audits remote access credit counseling medical billing high risk merchant account corporate gift ideas leadership development fleet management identity theft big bear florida mortgage broker alcohol abuse data logger california mortgage rates rackmount chassis, id card printers

23 September, 2010

Use computer for security for free

How To Use A Computer As A Video Or Security Surveillance System For Free


pc security
Supervision Cam is an application that lets you turn your computer into a video or security surveillance system. What the Supervision Cam does is it compares by capturing pictures from cameras at regular intervals that you have defined. Some of the activities are as follows: * It can save images on your hard disk as PNG, JPG or BMP.
* It can also play back a sound file.
* It could forward a message to computers within a network.
* It could initiate a program.


Supervision Cam captures all the images within the time intervals specified by the user. The users can also use this as a Web cam program. This application is really easy to use as it is not complicated at all. This program can also collect image files from the Internet Webcam. Listed below are some of the additional features that a supervision cam can give to its users. * It can support a wide variety of capture boards and cameras.
* It has provisions to connect one or more cameras at the same time.
* It supports various languages such as Italian, English, French, German, Portuguese and Dutch.
* It also gives the users the option to add descriptions or a logo to the picture.
* You can create a mirror image or even rotate the picture.
* Quick print review or direct printing options of the captured image are some of the other options.
* It also gives certain advanced features to the print function.
* You can also save all your settings in documented format.

[ Download SupervisionCam ]

20 September, 2010

GOOGLE HACKING

Google serves almost 80 percentof all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites.The following are some of the hacks that can be accomplished using Google.

1. Hacking Security Cameras

There exists many security cameras used for monitoring places like parking lots, college campus, road trafficetc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Type in Google search box exactly as follows and hit enter

inurl:”viewerframe?mode=motion”

Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. You will see something as follows
As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really aless refresh rate. But there are other search queries through you can gain access to other cameras which have faster refresh rates. So to access them just use the following search query.

intitle:”Live View / – AXIS”
Click on any of the search results to access a different set of live cameras. Thus you have hacked Security Cameras using Google.


  2. Hacking Personal and Confidential Documents

Using Google it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing theirAddress, Phone, DOB, Education, Work experience etc. can be found just in seconds.

intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”

You can gain access to a list of .xls (excel documents) which contain contact details including email addresses of large group of people. To do sotype the following search query and hit enter.

filetype:xls inurl:”email.xls”

Also it’s possible togain access to documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query intitle:index.of finances.xls


3. Hacking Google to gain access to Free Stuffs

Ever wondered how to hack Google for free music or ebooks. Well here is a way to do that. To download free music just enter the following query on google search box and hit enter.

“?intitle:index.of?mp3eminem“

Now you’ll gain access to the whole index of eminem album where in you can download the songs of your choice. Instead of eminem you can subtitute the name of your favorite album. To search for the ebooks all you have to do is replace “eminem” with your favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.

19 September, 2010

Invisible password protected folder

Password-protected-folder
Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by thenormal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder.

How to create aPassword Protected Folder
Step-1: Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance I name it as ABC.
Step-2: Now in this folder place all the important files, documents or any folders that you want to password protect.
Step-3: Now Right-click on this folder (ABC) and select the option Send To -> Compressed (zipped) Folder.
Step-4: Now a new compressed zipped folder gets created next this folder (ABC) with the same name.
Step-5: Double-click on this compressed zipped folder and you should see your original folder (ABC)here.
Step-6: Now goto the File menu and select the option Add a password.
ie:File -> Add a password
Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus you have now created the password protected folder.

How to make it Invisible
Step-1: Now Right-click on this password protected folder and select Properties.
Step-2: At the bottom select theoption Hidden and press OK. Now your folder gets invisible (hidden).
Step-3: In order to unhide this folder go to My Computer – >Tools -> Folder options. Switch to View tab, scroll down and under Hidden files and folders you’ll see the following two options
  • Do not show hidden files and folders
  • Show hidden files and folders
Now select the second option and press OK. Now the invisible folder becomes visible in it’s location. To access it you need the password. To make it invisible again repeat step -1 through step-3 and select the first option and click OK. Now the folder becomes invisible once again.

who is invisible on gmail or gtalk

gmail hack

Step 1.

Set the target user as off the record while he/she is online. This can be done by simply clicking on the option in the chat window.


Step 2.

Try sending an IM when he/she is invisible or offline. If he/she is invisible he/she will receive message. If he/she is offline you will receive an error“did not receive your chat”. This hack will only work if you mark the target user as off record when he/she is online. It is a limitation.
How does it work? When the chat is off the record, it will no longer stored in the gmail account. When you send IM to an invisible / offline user it will be delivered by default. At the receiving end the IM will receive as a pop in form of chat window if the user is invisible. If the user is offline it will receive as an email in the inbox. The main problem with this hack is if the target user is using another email client or desktop version.

registry editing disabled fixed

Cannot Access Regedit, How to Fix It?

Registry Editing has been disabled by your administrator

First we'll begin with the method that appears to work the best.

Method 1 - Enabling the Registry with VBScript

Doug Knox, a Microsoft Most Valuable Professional, has created a VBScript that enables or disables the Registry Editor based on the following location in the registry. Of course, since the registry editor is disabled, you can't change it manually, so Doug wrote a Visual Basic Script to accomplish the task.

HKey_Current_User\Software\Microsoft\Windows\CurrentVersion\Policies\System\

Visit Doug's page and download Registry Tools VBScript to your desktop, double-click on it to run it, then reboot your computer and try to open the Registry Editor.

If this fix didn't solve your problem, try method two shown below.

Method 2: Use Symantec's tool to reset shell\open\command registry keys

Sometimes worms and trojans will make changes to the shell\open\command registry entries as part of their infections. This will cause the virus to run each time you try to run an .exe file such as the Registry Editor. In these cases, visit Symantec's website and download the UnHookExec.inf file to your desktop. Right-click on it and choose Install. Restart your computer and then try to open the Registry Editor.


Method 3: Rename Regedit.com to Regedit.exe
Some viruses and other malware will load a regedit.com file that is many times a zero byte dummy file. Because .com files have preference over .exe files when executed if you type REGEDIT in the run line, it will run the regedit.com instead of the real regedit.exe file.

Delete the regedit.com file if its a zero byte file to restore access to REGEDIT. In some cases, such as the W32.Navidad worm, you'll need to rename the REGEDIT file to get it to work.



Method 4: Windows XP Professional and Group Policy Editor

If you have Windows XP Professional
registry editing disabled fixed - NISHANT COOL TRICKS AND HACKS
and access to an administrative user account, you could change the registry editor options in the Group Policy Editor.

  1. Click Start, Run
  2. Type GPEDIT.MSC and Press Enter
  3. Go to the following location


    • User Configuration
    • Administrative Templates
    • System

  4. In the Settings Window, find the option for "Prevent Access to Registry Editing Tools" and double-click on it to change.
  5. Select Disabled or Not Configured and choose OK
  6. Close the Group Policy Editor and restart your computer
  7. Try opening REGEDIT again
Although there are a few other ways, the above ways I have used with great success in re-enabling the REGEDIT command. If you are interested in more ways to reactive the REGEDIT command, you may want to visit a site called Killian's Guide, that goes into more detail on a variety of ways to get the registry editor to work again.

MAC OS ON WINDOWS PLATFORM

Figure 8


Figure 7


Figure 6


Figure 5


Figure 4


Figure 3


Figure 2


Figure 1

MAC OS ON WINDOWS PLATFORMThis is a featured page


Want to use the glamorous Mac OSX? Don’t have money to buy a Mac? That’s okay because a new guide has been released that will allow you to install Leopard version 10.5.1 in a single step to your PC.
You will have to meet some very specific hardware requirements, non-Core Intel processors are not supported (meaning anything in the Pentium line), Core Duo or Core 2 Duo processors are required. AMD processors are not supported at this time though a patch is in the works for that.
After confirming you have the correct processor, you will need a blank DVD-R to burn the ISO image files to. DailyApps has all the links to the files you will need to complete the installation.
However, some of your hardware may not work, WiFi cards and sound seem to be the most common but since Apple supports Intel, ATi and nvidia graphic cards there shouldn’t be any problems.
The installation files are about a 2.1GB download which will take a while no matter how fast your connection is and it is recommended that you burn the files to DVD at a slower than normal speed.
That’s just the preparation, to actually install Leopard, pop the DVD you just created in your drive, boot from it and let the installation begin.
Since Mac OSX Leopard uses the HFS+ file system, it’s not clear if you will be able to partition your drive and be allowed to dual boot Leopard and Windows XP/Vista. Try that at your own risk. If you can live with wiping your whole drive just to try this, it’s probably the safer method.
You didn’t think I’d let you off that easy, did you? This falls on a gray area of the law and violates Apple’s EULA. It’s only a matter of time before Apple puts an end to this and is it really worth the risk? That’s just up to you.


CHECK THIS ALSO....



Run Mac OS X on a PCby NISHANT SRIVASTAVA



People have long wanted to run the Mac OS operating system on PC hardware, specifically on Intel and AMD architectures. But despite pleas and prayers, that wish remains unfulfilled.
Although running Mac OS natively on PC hardware is not possible, there is another option--running Mac OS X on an emulator. In this article, I will show you how to install and run Mac OS X Panther on your PC using PearPC, a free, architecture-independent PowerPC platform that runs on PCs. To check out PearPC's features, go to the PearPC-PowerPC Architecture Emulator web site.
Here are the steps you'll take to use PearPC to install Mac OS X:
  1. Download the PearPC PowerPC Architecture Emulator.
  2. Obtain hard disk images for use with PearPC.
  3. Obtain images of your client OS installation disk.
  4. Configure PearPC to use the hard disk image and the OS images.
Downloading PearPCDownload the PearPC PowerPC Architecture Emulator. Once it's downloaded, extract its content to a folder, say, [Desktop]:\PearPC. This is the folder that is going to contain all of the files you'll see in the next couple of sections.
Note: [Desktop] refers to the path of my Windows desktop; that is, C:\Documents and Settings\Wei-Meng Lee\Desktop\.
Hard disk imagesTo install Mac OS X on the emulator, you need a hard disk image. You can download preformatted hard disk images from http://pearpc.net/downloads.php. Two disk sizes are available: 3GB and 6GB. If you plan to install the full Mac OS X, then use the 6GB image. If you have limited disk space on your hard drive, use the smaller, 3GB image. Be aware that the default install of Mac OS X takes up a little more than 3GB, and so you need to unselect certain components during installation if you use the 3GB image.
The disk images come in two formats: BZ2 and RAR. I used the 6GB RAR disk images. You need to uncompress the disk image before you can use it. To uncompress the RAR image, I used WinRAR from http://www.rarlab.com/download.htm. Uncompress the image and save it in the [Desktop]:\PearPC folder.
Making images of your client OSTo install Mac OS X on your hard disk image, you need to make copies of your Mac OS X installation disk in ISO format. You can use Nero or any other disk utility to save CDs or DVDs in ISO format. In my case, I have saved the images in the C:\PearPC folder. I have named the first disk Panther1.iso.
Note: You need to purchase Mac OS X in order to run Mac OS X in PearPC.

Configuring PearPC

Once you've taken the previous steps, you're ready for the final step: configuring PearPC to use the all the relevant disk images. To do it, you need to create a configuration file. You can find the instructions on how to create one manually at http://pearpc.net/guides.php?guides_id=2. Or you can download a Windows application that does all the hard work for you. In my case, I used the PearPC Control Panel to help me manage my Mac OS X emulation.
Launch PearPC Control Panel and click on the Create New Configuration File icon. You will see the first screen as shown in Figure 1. Click on Continue to proceed to the next step.
Figure 1. Using the Create Configuration File wizard
In the next screen, you have to supply a few pieces of information (see Figure 2). First, specify the location of the PearPC emulator. In my case, it is [Desktop]:\PearPC\ppc.exe.
Next, specify the location of the hard disk image; that is, [Desktop]:\PearPC\macosx_6gb.img.
Note: Be sure to replace [Desktop] with your own desktop path.
Also, set the amount of memory you want to set aside for Mac OS X. (I have allocated 255MB.) Click on Continue.
Figure 2. Creating a new configuration file
In the next screen, you have the option to specify the screen resolution and color depth to use. Click on Finish when done (see Figure 3).
Note: I tried to enable networking, but I never got it to work. Also, use G3 and not G4 CPU emulation.
Figure 3. Specifying additional options
Give a name to the configuration file and save the file in the location specified (see Figure 4). Name it Mac OS X Panther and save it in the location [Desktop]:\PearPC\macosxpanther.cfg. Click on Finish.
Figure 4. Completing the wizard
You should now see the icon for your Mac OS X Panther in the PearPC Control Panel (see Figure 5). You need to complete one final step before you start installing Mac OS X on your PC--check the "CD-ROM device is installed" option and specify the location of the Mac OS install disk image. In my case, it is [Desktop]:\Panther1.iso. This is the image that will be used to boot up the emulator.
Figure 5. The completed configuration file
Figure 6 shows the files in my [Desktop]:\PearPC folder. The important files are highlighted.
Figure 6. Files in the PearPC folder
That's it! Double-click on the Mac OS X Panther icon and you should see the PearPC 0.3.0 window pop up (see Figure 7). Your Mac OS X installation should start soon afterward.
Note: It took me quite a while to get my Mac OS X to install. I encountered a number of failed attempts--when I booted into Mac OS X, it prompted me to restart my machine. But after several attempts, it worked.
Figure 7. Installing Mac OS X
Once the OS is installed, you will be asked to restart the machine. For subsequent attempts to run Mac OS X on your emulator, you should uncheck the "CD-ROM device is installed" option so that it can boot directly from the hard disk image. If the installation is performed correctly, you should see something like Figure 8 when Mac OS X boots up.
Figure 8. Mac OS X booting up
Figure 9 shows I am having fun with my newly installed Mac on my PC.
Figure 9
Figure 9. Running Mac OS X on a PC!
And if you still doubt if I am really running Mac OS X on my PC, Figure 10 will prove it to you.
Figure 10 Figure 10. Running Mac OS X in my Windows XP PC

Summary

Before installing PearPC and using Mac OS X, you need to keep several things in mind:
  1. You need a license to run Mac OS X. That is, you need to buy a copy of Mac OS X.
  2. The installation process takes time. Don't install Mac OS X on a slow machine; I tried the steps outlined in this article on three different machines--933MHz, 1.7GHz, and 3.0GHz, all equipped with 512MB of RAM. The 3.0GHz machine installed significantly faster compared with the rest, but it still took me several hours to get all of the installation done. Also, make sure you have lots of free hard disk space. The hard disk image itself takes up 6GB, and the additional installation disk images are going to take up a few more gigabytes.
  3. Even though the installation process is painfully slow, once the system is installed it is actually quite responsive. While you won't be able to fully experience Mac OS X as if you were using a real Mac, the emulation provides a good way for you to try out Mac OS X before you head to the nearest Apple shop to get the latest iMac.
Have fun, and let me know if PearPC works for you.