Friday 14 December 2012

Windows 8 : Shortcut for Accessing New PC Settings A

Windows 8 has a metro styled Control Panel Settings which can be accessed only using the shortcut Windows + I, followed by settings option. This is pretty version of the control panel which is more readable, but still has tons of options including Reset, Wallpaper Changer etc.
The drawback here is that there is no way to create a shortcut of any of the items inside and buried deep inside which makes it easy for any one using it for the first time to get lost in the jungle. What is so odd about this control panel is that it was there in Windows 8 beta, but vanished in the final release. May be Windows 8 team did not want to confuse the modern control panel with the old one.
Use the User Menu on Lock Screen :
On the top right of the start screen, your user account is displayed. Select it and you will see a dropdown with option to “Change Account Picture”. Select it and you will get into the PC Settings. Next you can switch to any section you want.
Change Account Picture in Windows 8
Use the Start Search :
This is best for any kind of query. All you need is type in what you are looking for and choose settings filter in the search result. This will then guide you to the modern PC settings. You might have to look a bit after that if there are too many options.
As an example if you search for Reset, You will get a list of settings that will give you quick access to the new PC settings.
Reset Search Result in Windows 8

Shortcut for Modern PC Settings :  Ciprian Adrian Rusen has created a custom script which you can run on your PC and it launches the new PC settings menu.  Once you download it, keep it in a place where you will not forget and then drag a copy on your desktop.
PC Settings Shortcut
To download it go here, and scroll down a bit and look for a link which says PC_Settings.zip.
Canonical Names for Deep seated Windows Control Panel items :
Apart from this, it is also possible to access some of the deep seated menus in the traditional control panel using the control panel.  A complete list can be found here. Look for options which say, Windows 7 and Later. e.g Type the following in your run prompt and hit enter. explorer.exe shell:::{ED7BA470-8E54-465E-825C-99712043E01C}.
You may also use the infamous God Mode of Windows 7 to get access to a complete list of control panel items in one view and then make use of search to find what you want to launch.
Windows 8 God Mode

Windows 7 God mode gets you all control panel items on one place

This is something extraordinary and very useful for power user, In Windows 7 you can create a special control panel item which lists all the control items in one place. So next time you are looking for something in control just open this and search.
Windows 7 god mode List

Windows 7 god mode List
Here is how you should set the God Mode:
  • Create a new folder anywhere.
  • Rename the folder by pasting the string below
  • GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
Windows 7 god mode folder
Windows 7 god mode folder
There are total of 284 items in this mode, possibly all the items in control panel is right here.

How to Hack Any Photo Video Lock Android Application

How secure is your Photos and Videos with all available Photo locker Application.

Galley Lock or any Photot lock or Video lock Android app can be easily hacked by any android user ,There are many popular photo and video locker application among android users, But you are unaware of this fact that all locked photos and video can be accessed easily by any file manager App.

This is the biggest loop hole of this android app or we can say app is cheating user by saying they are locking photos and videos , they are only shifting media content from one folder to another .But if anyone wants to Access those hidden vidoes and photos then they can access easily via file manager.
To check this Open your File manager App > Open Data Folder then Open Gallery Lock Folder and then Access Protected Folder and you can easily view all locked Photos and Videos.

Automatically organize Files on your Desktop using Fences Rules

Fences is a pretty old software which is the best way you can organize your desktop. It creates grids or area on your desktop where you can keep files and it stays within it. This makes sure your files are not scattered around.

I had been using it for a while and in its recent update, Fences 2.0, it has introduced Rules. These rules allow you to automatically move documents into their fence. Saves time and make you even more productive. In the previous versions, you were supposed to manually move them into its specific sections.

Important : If you are using any previous version which was free and you never had a license, this upgrade will make the software as trail version. You will need to pay 10$ USD to use it beyond 30 days. I am still looking to find if there is a non commercial free version of this.

How to use Rules in Fences :

First, download the latest version of Fences  and install it. Once you install, you would see a default fence like Docs, Folders and Programs set  setup on your desktop.
Access Fences Rules
Now move your mouse over the grid and you should see a list icon getting highlighted. Click on it and it will give you option to Manage all the Rules. Once you select it, you will get another window which lists down :
  • Default Rules.
  • Option to Edit Current Rules.
  • Create New Rules.
  • Time Based Rules
  • File Size Based Rules
and so on.
Fences Rules Settings

There are few important things :
  • Automation : You can choose to Keep the rules applied all the time then it keep moving between the respective grids automatically. If you prefer to organize later, Make sure to apply the rules manually using “Apply Rules Now”. You can uncheck rules if you wish to run them one by one.
  • Editing Predefined Rules :  Some of the rules can be edited to a limit. As an example, a rule which moves all folders into a fence cannot be edited to include a file also.
  • Conflicting Rules : Don’t make lot of rules that you end up conflicting them with each other. If you do a lot, you might end up in an infinite loop.

Editing Fences Rules


Download :

Download from Stardock

Thursday 13 December 2012

Adobe Reader App For Windows 8


Unlike its predecessors, Windows 8 ships with its own PDF (Portable Document Format)reading app named Reader for opening and viewing PDF documents. But if you’re looking for a better PDF reader specially designed for touch user interface, you can now download an app developed by none other than Adobe.

Adobe has just announced the availability of its popular PDF reading tool Adobe Reader for Windows 8 and is now available in the Windows Store. The Adobe Reader app has specially been designed for Windows 8 touch user interface.
Adobe Reader app for Windows 8 Picture5
With Adobe Reader for Windows 8, one can quickly open PDF documents, open and read password protected PDF files, share PDFs with other apps using Share charm, and more. The current version of the app includes search text option to find specific information in the document, zoom in, and bookmarks option to jump directly to a specific chapter in your PDF document.
Adobe Reader app for Windows 8
To change viewing modes, first you need to swipe from the bottom of the screen to view the app bar and then tap View Modes button to select Single Page or Continuous view mode. To find a specific word or information in the document, open the app bar by right-clicking anywhere on the document or by swiping from the bottom of the screen, click or tap Find button, enter the keyword, and finally click or tap search button.
Adobe Reader app for Windows 8 Picture2
To jump to a specific chapter using bookmarks feature, you need to first open the app bar and then click or tap bookmarks button located on the upper right of the screen, and then click or tap the chapter you would like to jump to.
Adobe Reader app for Windows 8 Picture1

To move from one page to another, simply swipe left or right. And if you’re in continuous view, you need to swipe up or down on the screen to change pages. While reading a PDF document, pinch to view all of your thumbnails and tap a thumbnail to jump to a particular page quickly.

However, the current version of Adobe Reader app is missing many features and options present in the desktop version. If you’re running Windows 8 on a desktop or notebook, we recommend you download and install desktop version of Adobe Reader or Fixit or Soda PDF 3D Reader for more advanced features.

4 Secrets Wireless Hackers Don't Want You to Know


You're using a wireless access point that has encryption so you're safe, right? Wrong! Hackers want you to believe that you are protected so you will remain vulnerable to their attacks. Here are 4 things that wireless hackers hope you won't find out, otherwise they might not be able to break into your network and/or computer:
1. WEP encryption is useless for protecting your wireless network. WEP is easily cracked within minutes and only provides users with a false sense of security.
Even a mediocre hacker can defeat Wired Equivalent Privacy (WEP)-based security in a matter of minutes, making it essentially useless as a protection mechanism. Many people set their wireless routers up years ago and have never bothered to change their wireless encryption from WEP to the newer and stronger WPA2 security. Updating your router to WPA2 is a fairly simple process. Visit your wireless router manufacturer's website for instructions.
You're using a wireless access point that has encryption so you're safe, right? Wrong! Hackers want you to believe that you are protected so you will remain vulnerable to their attacks. Here are 4 things that wireless hackers hope you won't find out, otherwise they might not be able to break into your network and/or computer:
2. Using your wireless router's MAC filter to prevent unauthorized devices from joining your network is ineffective and easily defeated.
Every piece of IP-based hardware, whether it's a computer, game system, printer, etc, has a unique hard-coded MAC address in its network interface. Many routers will allow you to permit or deny network access based on a device's MAC address. The wireless router inspects the MAC address of the network device requesting access and compares it your list of permitted or denied MACs. This sounds like a great security mechanism but the problem is that hackers can "spoof" or forge a fake MAC address that matches an approved one. All they need to do is use a wireless packet capture program to sniff (eavesdrop) on the wireless traffic and see which MAC addresses are traversing the network. They can then set their MAC address to match one of that is allowed and join the network.

3. Disabling your wireless router's remote administration feature can be a very effective measure to prevent a hacker from taking over your wireless network.
Many wireless routers have a setting that allows you to administer the router via a wireless connection. This means that you can access all of the routers security settings and other features without having to be on a computer that is plugged into the router using an Ethernet cable. While this is convenient for being able to administer the router remotely, it also provides another point of entry for the hacker to get to your security settings and change them to something a little more hacker friendly. Many people never change the factory default admin passwords to their wireless router which makes things even easier for the hacker. I recommend turning the "allow admin via wireless" feature off so only someone with a physical connection to the network can attempt to administer the wireless router settings.
4. If you use public hotspots you are an easy target for man-in-the-middle andsession hijacking attacks.
Hackers can use tools like Firesheep and AirJack to perform "man-in-the-middle" attacks where they insert themselves into the wireless conversation between sender and receiver. Once they have successfully inserted themselves into the line of communications, they can harvest your account passwords, read your e-mail, view your IMs, etc. They can even use tools such as SSL Strip to obtain passwords for secure websites that you visit. I recommend using a commercial VPN service provider to protect all of your traffic when you are using wi-fi networks. Costs range from $7 and up per month. A secure VPN provides an additional layer of security that is extremely difficult to defeat. Unless the hacker is extremely determined they will most likely move on and try an easier target.

Has your computer become a zombie slave without you even knowing it?


Have you noticed that your PC has suddenly slowed to a crawl for no apparent reason? It might be nothing, but it could be that your computer is busy doing other things, and by other things I mean attacking other computers as part of a bot net controlled by hackers, or other assorted bad guys.
"How can this be? My anti-virus software is always up to date?", you say.
Bot net software is usually installed on computers by users who are tricked into loading it. The software might pass itself off as a legitimate product claiming to be an anti-virus scanner, when in reality it is malicious Scareware that, once installed, provides a gateway into your system for malware software developers to install things like rootkits and bot net-enabling software.
The bot net software effectively sets your computer up to receive instructions from a master control terminal that is controlled by the bot net owner who is usually a hacker or other cyber criminal that purchased the use of your computer from the person who infected it.
Have you noticed that your PC has suddenly slowed to a crawl for no apparent reason? It might be nothing, but it could be that your computer is busy doing other things, and by other things I mean attacking other computers as part of a bot net controlled by hackers, or other assorted bad guys.
Yes that's right, you heard me correctly. Not only is your computer infected, but people are making money by selling the rights to use your computer (without your knowledge) to carry out attacks on other computers. Mind boggling isn't it? It's like someone renting out your car for someone else's use while it's parked at a shopping center, and then putting it back before you discover it was gone.

A typical bot net may consist of tens of thousands of computers that are all controlled by a single command and control terminal. Hackers love using bot nets because it allows them to combine the computing power and network resources of all the computers in the bot net to attack a single target. These attacks are called distributed denial of service attacks (DDoS).
Thees attacks work well because the target of the attack may not be able to handle the network and resource load of 20,000 computers all trying to access it at one time. Once the system is bogged down by all the DDoS traffic from the bot net, legitimate users might not be able to reach the server which is extremely bad for business, especially if you're a large electronic retailer where constant availability is your lifeblood.
Some of the bad guys will even blackmail the targets, telling them that if they pay them a fee, then they will stop the attack. Incredibly enough, some businesses will pay the blackmail fee just to get back in business until they can figure out how to better deal with the attacks.
How do these bot nets become so large?
Malware developers who create the bot net software pay money via malware affiliate marketing programs to people willing to install their malware on victims' computers. They may pay $250 or more per 1000 "installs". Enterprising bad guys will use every means necessary to trick unsuspecting users into installing this crapware. They will link it in spam e-mails, post malicious links to forums, setup malicious websites, and anything else they can think of to get you to click the installer so they can get credit for another install.
The malware developer will then sell control of the bot nets they have created. They will sell them in large blocks of 10,000 or more slave computers. The larger the block of slave bots, the higher the price they will ask.
I used to think malware was created by kids trying to prank people, but it is really all about bad guys making money off of trafficking the use of your computer's CPU cycles and your network bandwidth.
How can we stop these Sons of (insert favorite bad thing here)'s from enslaving our computers?
1. Get a malware-specific scanner
Your virus scanner might be awesome at finding viruses, but not so good at finding Scareware, rogue malware, rootkits, and other types of malicious software. You should consider getting something like Malwarebytes which is known for finding malware that often evades traditional virus scanners.
2. Get a "second opinion" scanner
If one doctor says everything is good, but you still feel sick, you might want to get a second opinion from another doctor, right? Do the same for your malware protection. Install a second malware scanner on your computer to see if it might catch something that the other scanner missed. You would be surprised how many times one tool misses something that another one catches.
3. Be on the lookout for fake anti-virus software
In your search for malware protection you could end up installing something malicious if you don't do your research on the product first. Google the product to see if there are any reports that it is fake or malicious before you install anything. Never install anything that is sent to you in an e-mail or found in a pop-up box. These are often delivery methods for malware developers and malware affiliates.
If you want to be extra sure that the malware infection is gone then you should consider a performing full backup, wipe and reload of your computer to ensure that the malware is gone.

Wednesday 12 December 2012

How To hack Facebook Page Like


Facebook Like Hack   

How To Facebook Page Like Hack 


Facebook Hacking Software


Facebook Hacking Software is a multi-functional software used to hack facebook account.  Also, you can create many nuisance and pranks by using this Facebook Hacker software.

1. First download Facebook Hacker software  from the link given below :

Download Facebook Hacker

2. Now, run Facebook Hacker.exe file to see :


Login to your Facebook account and then hit on OK at right bottom.
3. Now, Facebook Hacker options are displayed as shown:


4. In Victim pane at left bottom, enter the facebook ID of the victim you wanna hack in User IDfield.
5. Now, using this Facebook Hacker software you can:
- Flood wall of victim.
- Spam his message box.
- Comment on him like crazy.
- Poke him and even add mass likes.
Thus, you can play such pranks with your friends using this Facebook Hacker. So, free download Facebook Hacker and trick out your friends. DONE!


Download RealPlayer



These days, a great number of people are not only finding the majority of their entertainment online but are also conducting a fair amount of their social lives there as well. In such times, it's great to have a quick and simple tool for downloading, editing, sharing, and transferring media. RealPlayer for Windows already had most of that down, offering a sweeping array of features, from one-click video downloading to automatic transcoding to social network sharing. The latest offering focuses mainly on improved device integration and an even smoother user experience.
RealPlayer has been around since 1995, which is practically the dawn of the Web. It started as a basic media player, becoming the preferred embedded app for streaming audio and video as sites started to offer that functionality, and eventually morphing into the easy-to-use, fully functioning beast we have today.
The previous version of RealPlayer already offered an easy, one-click solution for downloading unprotected videos for the Web. Another click transcodes those same videos to your portable device without a bit of extra effort on your part when it comes to fiddling with tricky digital format settings.
The program also incorporates a very simple-to-use video-trimming tool that allows you to select only certain bits of a video to transfer or share, and there are one-click buttons that let you share with a variety of social sites, such as Facebook and YouTube. In addition, you have the option to strip the audio out of the videos and save those as separate files.
The latest version of the software adds even more devices to the ever-expanding list of compatible handsets. Plus, RealPlayer now shows USB-connected smartphones and cameras inside the library in the main app window, allowing users to quickly and easily transfer content to the devices via drag-and-drop. Perhaps more compelling, though, is a new back-end feature that simplifies the process of getting photos and videos off of those devices and organized on your PC. In our testing, content was slow to load, but it's a welcome feature nonetheless.
Best of all, you can do all this for free. RealPlayer only requires a license fee if you want to upgrade to the Plus version in order to access additional features, such as H.264 conversion and DVD burning.

                           Download Now

download Virtual DJ 7.0.2 full version



Digital deejaying has skyrocketed in popularity over the past five years and it's no wonder why. Compared to a full vinyl setup with all the hardware and physical media it requires, an MP3-based mixing station is extremely simple and cheap. There's even free software to get you started, and one of the most popular programs available is Virtual DJ.
Virtual DJ is often packaged with USB-based hardware mixing consoles from the likes of Hercules and Numark, and, in fact, if you really want to delve into the full array of features, such devices are going to be a necessity. That said, you can download the app by itself and make very basic mixes and playlists.
While the program isn't specifically geared at newbies, it is intuitive enough for a musically inclinedindividual to use right off the bat. Once installed, Virtual DJ automatically populates a folder tree in the bottom left corner where you can easily access your music collection. The bottom middle serves as a tabbed, multifunction area where you can browse tracks, sample music bites, add effects, and make recordings.
The top of the window is dominated by two digital turntables, which are distinguished by color: blue on the left and red on the right. Each one has the ability to cue, loop, adjust pitch, scratch, and shift (among other features). In the middle is the mixing console, where you can adjust the gain and master volume, as well as transition between the two tracks. Once the songs have been dragged and dropped into the console, a bar along the top displays the sound waves of each to help with visual mixing. There's also a video input option that lets you create montages to the music.
The stylish interface and high number of features score points, but learning how to use the program is a hit-or-miss proposition. To be perfectly honest, using it without mixing hardware (that is, just a mouse and keyboard) is a challenge, and not one we enjoyed, so we recommend hooking up a compatible USB controller. Also worth a look: the thorough online user guide.
Virtual DJ is free, fully featured, and well-laid-out. It's a useful option both for aspiring mixers and newbies.

                   Download Now



Network LookOut Administrator Professional v3.6.1 Free Download


NETWORK LOOKOUT ADMINISTRATOR PROFESSIONAL V3.6.1

The Network LookOut Administrator allows you to see live screens of remote computers. This way, you can always watch what users are doing on the remote computer. Additionally, you have the ability to take control of a remote computer by controlling the mouse and keyboard; this is especially useful when you need to assist the person who uses the remote computer. If you are an administrator, you can easily administer remote computers from your computer
.
                         Download Now


Get Kasperky License Forever


Kasperky License Forever

This tutorial will explain how to use kaspersky forever without key or activation code.

The method we are going to use is resetting the PCID, so that each time kaspersky thinks its a new computer and gives us a month of fully functional and upgradable trial.

SO the method is as explained below :-
1) First of all delete the existing key if you have
2) Goto Setting, then select Option, Uncheck the "Enable Self Defense" and click OK
3) Now right-click the kaspersky icon from taskbar and click on "Exit".
4) You will get a promt like this . Click "Yes"
6) Now goto HKEY_LOCAL_MACHINE ---->SOFTWARE ---->KASPERSKYLAB ---->PROTECTED ---->AVP9 ---->ENVIRONMENT .
7) Now in the right hand side you can see PCID. Double click it and change the last two values before the flower bracket and click ok.
eg:- The last two values are "D7"... So i change it to "F9"...
8) Now open kaspersky again and you will see this.
9) Select "Activate Trial License" and click next.
10) Now enable Self-Defence and you are good to go.

best Image Hosting Sites

Always we need image hosting site to upload our images but it is little difficult to trust on any image hosting site
because at any time those sites can delete our precious images and pictures without any reason
and then we will have to re upload our images and that is like a headache.
If you are a blog user then it is more difficult because we could not upload all images on blogger server .It will
create heavy load on blogger blog
So problem is that which site is trust able where can we upload our images
In this Article i will tell you Some best Image Hosting sites where we can upload our all images



Imageshack is a best free and fastest growing image hosting site where you can trust in short words you can
upload your images at imageshack and then forget it (I personally like imageshack)
Here Registration is optional its mean you dont need to get registration for uploading images just open and
upload but if you want to upload big images like more than 10mb per image then you will have to create a premium account for premium account click here

With Premium Account you get 


  1. 10 megabyte per image limit instead of 5
  2. unlimited bandwidth
  3. unlimited uploads
  4. dedicated download speed
  5. dedicated upload speed
  6. premium customer support
  7. free upload tools (see "tools" in the imageshack header)
  8. automatic image backups

Picasa Is Also Best Image Hosting Site it gives unlimited bandwidth and you can upload images via blogger,s blog or google account , picasa also provides 1Gb of free storage and per image limit is 20Mb And should
be 50 megapixels or less. One thing more you can edit your photos online too and share with your friends.
If you want to upload videos then there is this option too

Over 46 Million Visitors Use photobucket in worldwide.For uploading and sharing photos,videos and graphics Photobucket Is a premier site .You can store thousands of photos and hours of videos with photobucket free Account.

Tinypic is best image hosting site for uploading photos and videos and share link with your friends and family
you can share photos and videos on MySpace, eBay, Orkut Scrapbooks, blogs.
Tinypic supports Jpeg (jpg), png, gif and tiff files.Image are larger than 1600 pixels.tinypic does not support
videos files larger than 500 Megabytes or longer than 15 minutes.

flickr is a limited storage and capacity image hosting site for image and video hosting.but i dont know why many users likes it. with free account you can store 100 MB of photos and videos And you can upload two
videos per month.videos are limited to 90 Seconds in length and 150mb is size but if you have pro account then you can get more features and one thing more you can use youryahoo account to upload images .