Thursday, September 16, 2010

Home

Hi All,welcome you on our blog , 

Falaah IT solutions is taking it's initial stage to the IT world. We provides Web development and Software development job as per the client's requirement. To provide re-engineering is our motto. Clients satisfaction will only lead our company to new peak so that's only our path to succeed. We always welcome suggestion and comments from customer.
 
This blog http://krm-technicao.blogspot.com is also for sharing my knowledge about computer technology and my views.

Knowledge is  accomplished only by sharing with other that is my approch to learn something more in my life
.
I want to share my knowledge with all of you and also want to learn from you , Its not only for me but for all visitors of my blog , You can reply to my post on my email address or can give the comment ,
If you want to publish any post then also you can say me , it will be published by your name just send it my email ID with you name and other details those you want to publish.
I will post HACKING tricks and INTERNET tricks , Computer Tricks and other fundas related to Internet and Computer use ,
If you know something more then lovingly can suggest me .
Friends there might be any mistake but i will learn only if you mention it and mark it to me to correct ,

Thanking you for using my site .

My contact detail :

Name     : Pathan Mo Karimkhan Y
                 Pathan Aamirkhan I.
Email ID : karimkhan_it@yahoo.com
                tech_aamir@yahoo.com

How to Customize Start Menu Button in Windows 7

.Have you ever wondered how to customize the start menu button in Windows 7? Well it is possible to spice up your copy of Windows 7 by giving a new look to the start menu button. Here is a detailed tutorial on how to do it. The following images shows a preview of how your start menu would look like before and after the customization process is done.






Default Start Menu Button





Customized Start Menu :
Tools That You Need:

1. Resource Hacker



2. Custom Start Menu icons (images). It mush be of the size 54×162 with a .bmp extension. which looks something as follows


1. Take the ownership of the file “explorer.exe“ which is located in the Windows Folder (Most likely in C:\Windows).

2. Open the Resource Hacker Tool.

3. Go to File menu and click on Open. Now load the file “explorer.exe” into the Resource Hacker.

4. Expand Bitmap branch in the left pane.

5. Now expand 6801 option, right-click on 1033 and select Replace Resource option.

6. A new window appears. Click on Open file with new bitmap button.


7. Navigate to the customized (.bmp) image, open it and click on Replace button.

8. Repeat steps 4 to 7 above for the options 6805 and 6809 as well.

9. Now click on Save option (File->Save). Resource Hacker will automatically create a backup file called explorer_original.exe so that you can restore it in the future if needed.

10. Log Off and Log On to see the changes in effect.

NOTE: If you are running 64-bit edition of Windows 7, then you need to use Resource Hacker version 3.5.2 beta which is 64-bit compatible. It is available from the same link provided above.

Hack Facebook Password

Hack Facebook Password

Wondering to know how to hack Facebook password? Well before you try to hack any Facebook password, it is necessary to understand the real ways of hacking that actually work and also those that are simply scam and don’t work. Everyday I get a lot of emails where people ask me “how to hack Facebook password?” So in this post I have taken up this topic to show you the possible ways to do that!

Today even a noob computer user (perhaps like you) can easily hack Facebook or any other social networking site with ease in a matter of hours and thus hacking is no longer the secret art of a Russian hacker! Well the idea behind this post is to expose the truth behind hacking Facebook account so that you can stay away from all those scam sites which will rip off your pockets by making false promises to obtain any password for you. Also this post is not meant to encourage people into hacking Facebook, but rather it is meant to educate the Internet users to be aware of the common scams and frauds and stay away from them.

With my experience of over 7 years in the field of ethical hacking and security, all I can tell you is that there are only two ways to successfully hack a Facebook account.

 Keylogging – Easiest Way to Hack Facebook Password



Keylogging refers to simply recording each and every keystroke that is typed on a specific computer’s keyboard. This is possible with the use of a small computer program called keylogger (also known as spy software). Once installed, this program will automatically load from the start-up, runs in invisible mode and start capturing each and every keystroke that was typed on the computer. Some keyloggers with advanced features can also capture screenshots and monitor every activity on the computer. To install and use a kelooger one doesn’t need to have any special knowledge. That means anyone with a basic knowledge of computer can install and use this software with ease. Hence for a novice computer user this method is the easiest way to hack Facebook password. I recommend the following keylogger as the best for gaining access to facebook password.

SniperSpy is a revolutionary product that will allow you to easily access *ANY* online accountor password protected material such as MySpace, Facebook, Yahoo, Gmail etc. There are absolutely *NO* limitations to what accounts or websites this software can access

 
 
2d WAY
The other common way to hack passwords or online accounts is Phishing. This is the most widely used technique by many hackers to gain access to Facebook and other social networking sites. This method will make use of a fake login page (often called as spoofeed webpage) which exactly resemble the original one. Say for example a spoofed webpage of Facebook looks exactly same as that of the original page. This page is actually created by the hacker and is hosted on his own server. Once an innocent victim enters his/her password in such a fake login page, the login details are stolen away by the hacker. Most Internet users would easily fall prey to online phishing scams. Thus phishing scams trick users so that they themselves give away their passwords. However phishing requires specialized knowledge and high level skills to implement. Thus it would not be possible for a noob user to attempt this trick. It is punishable offense too. So I would recommend the use of keyloggers to hack Facebook since it is the easiest and safest way.

Web using CalC

Steps:


1. Open your MS Calculator. This is normally found in Start => All Programs => Accessories => Calculator.

2. Open the help-window by pressing the F1 key.

3. Click the top-left corner icon of the help window once (Standard is a Document with a Questionmark).

4. Select 'Jump to URL'.

5. Type your address into the avaliable field, but remember to type http://, and not just www. (or equivalent).

Use Proxies in Windows

Go to control panel


1)phone modem options

2)advanced

3)In Providers, click Microsoft H.323 Telephony Service Provider, and then click Configure.

4)In Configure H.323 Service Provider

5)To specify an H.323 proxy, select the Use H.323 proxy, and then type the server name or IP address for the proxy.
Try google for available proxy IP /servers...

Or

try www.proxy4free.com

this is a easy way of using private proxy with windows... plus its more secure than public CGI ones

Get serials

YouSerials is a search engine for software serials. The idea is to have a backup of all software registration numbers that we use. Each serial key can be voted on by other users, increasing or decreasing its reputation based on its authenticity. It’s also useful if your Operating system had crashed and you need a reinstall but don’t have all the serials stored or are lost.

Download torrents Without Torrent Client!

A unique online service called Torrent2exe allows users to download torrents without having to install a torrent client by converting the torrent file into a standalone EXE file. Using Torrent2exe is very simple. Copy the URL of the torrent file or browse to the location of the torrent file in your hard disk to automatically upload it to their site. Once you they have got the URL of the torrent file, they will convert it into a self
extracting EXE file.

here you get the option to select the size of the EXE file to be downloaded. Suppose you want to see a movie. What will you require? A media player and the movie. Now you get two choices.

Firstly, you download the movie and the media player, which needs to be downloaded only once. Subsequent movie downloads do not require you to download the movie player since you have already downloaded it.
However, if you move to another computer you will need to download the movie player once again. This is the "small size".

In the second choice, you download the movie along with the media player every time you download a new movie. This is the "normal size"

After you have download the converted EXE file, just run it and it will automatically start downloading the torrent.

The standalone EXE file makes it easier for people to share files and applications on the Internet. You can publish the EXE files on your site or blog to make the downloads easy for visitors, send EXE files to your friends who don't want to be bothered with installing the client.

Torrent2exe is available both as an online service and as a desktop application.

Wireless Security

Internet has ubiquitous presence all around us. One can use broadband services or wireless networks. Now a days, more and more people are going for wireless security system in homes as well as offices. But while you go for wireless, try to keep security aspects in mind. It will also help if one has little knowledge of operations of wireless network security. Wireless networks are quite often prone to hacking so it pays to adopt some ultra-security measures. You must follow certain steps while you begin the process.

Begin with completely removing all the default settings on the wireless network devices. That’s the first step. Removing the default settings include changing the service set identifier (SSID), and the administrator name. Don’t forget to change the admin password as well. Never ever leave these settings to default. If you have attached remote services, you will also need to duplicate these changes. Keep in mind what you would like to use before implementing these changes. Many people prefer to leave every setting to default values and first test the network for operation. Once the test is done, shut the system and then change these values. That’s an individual’s choice when he does it sooner or later. But it has to be done.

The second stage is of enabling the security. Make sure the security is of highest level. The ideal setting is to go for WPA2 or WPA. That will make your network quite safe and secure. You must upgrade your security if you are still using an older version.

The last step involves shutting the ‘network door’ to outside, unauthorized users. This will include closing down all the broadcast invitations. Implementing all these steps will make your wireless network quite secure and safe.