eMailaya 3.5.0


In order to communicate in the virtual world, users can use variety ways and an e-mail using is one of it. For those who do Traveling, whether in order to work or leisure, would have difficulty in the same computer to read e-mail through e-mail client that is installed on the PC.

There is a good idea if the e-mail client, it can be brought whereever you are, and used.....

on any PC connected through the Internet with a portable media. One of the e-mail client that can be used is eMailaya a portable e-mail client software.

This application contains many unique features, user-friendly and can be brought in a removeable media as a portable ones, so easy to use on other computers that are connected Internet anywhere, without installing it.

In general, various activities in the e-mail is available in it so you can use it every day comfortably. While some features eMailaya which is commonly known as password protection, tabbed emailing, the mode text / html, back up files, ssl support, a quick chat and others.
eMailaya can be downloaded as a free version in its site with 1.88MB size.

[+/-] Read more....

Microsoft Gives a Free Software

Microsof Indonesia officially announced its commitment to provide free software for Indonesian students. That Software which provided by Microsoft is the latest software for design courses and development that are expected to trigger students creativity , and also prepare them to get ready in accupation world. 

Microsoft Dreamspark is a downloading software solution for students, both in Indonesia and around the world, and its avalaible free of charge. through this software, students can utilizing the software provided, like a professionals ones.

One of the goals of Dreamspark is creation of various creative industries development, which became one of the new Indonesian government purposes in labour field and improving a human resources.

At the first time Dreamspark was released on 19 February 2008, at Sanford University, California, by Bill Gates. Dreamspark launching in Indonesia marked with memorandum of undertstanding agreements between Microsoft Indonesia with several universities and private which has a ready facilities to access Dreamspark.
Before all the university can connect with Dreamspark, ITB and Aptikom become IDPs (identify providers). After the second run with IDP, then every university will be able to connect to Dreamspark system well.
From the total number of students in Indonesia, which reached more than 2 million students, it expected around 20% or 400 thousand students can download its free software.Curently this Software is provided is for students majoring in design, technology, mathematics, and engineering.

[+/-] Read more....

Google Chrome: An Innovative, faster and safer browser


Finally, Google released its first browser, Google's Chrome and currently is in beta version now. Basiccaly, Google Chrome includes one of an Google gears applications, which based on webkit, a rendering engine that was previously used by the Apple Safari.

One of the interesting features of Google Chrome is a tab which has own manager proccess and memory which quite the same with the Task Manager feature in the Windows OS.

With the manager proccess on the tab, it enable us to see which tab has the most consumed memory, and another unique feature is if one of the tabs get hang or crash, the entire browser is not involved in crashes or hangs too.

Google Chrome kernel is come from Webkit engine, a HTML light rendering that was developed by Apple and part of the KDE open source project; a KHTML components. In addition, Webkit also adopted within the context of applications, including Adobe AIR Runtime, Troltech, Qt, the Nokia S60 web browser and also Google Android.

Although Chrome is made based on Webkit technology, Its developers decided not to use SquirrelFish, a high-runtime performance belongs to Apple, and they prefer to use V8, a unique virtual machine developed by a group of researchers from Denmark.
With this V8 engine, Chrome has proved as the fastest browser between its competitor like Firefox 3.0.1, IE7, IE8 beta 2, Safari 3.1.2 even Opera 9:52

[+/-] Read more....

How to protect your copyright Photo


A Photo as the expression instrument need tobe protected from the piracy. Here are some easy steps to create your protected copyright photos using Adobe Photoshop:

1. Make a duplicate of your original photos
Before starting to protect your photo,which called watermark, please create duplicate of you original photos first. It aims to make an original one before the photo is being watermark and published. You can copy a page from Window Explorer or Photoshop to do so by clicking File | Save as. Give specific name and you can also change the format when you use Photoshop.

2. Make a layer photo duplicate
After making a copy of your original photo, now in Photoshop you can change the status of your photos from a type of diversified Background Layer by double click on the tab photo layer. After changing into layers, Duplicate this layer by pressing the keys CTRL + A or by clicking on the alert which is aimed to make a grouping process running smoothly.


3. Create Your Typical Text
When you ready with a new layer. Provide text, images, logos, and other signs which show the characteristics of your photo. If you insert an image or logo, create a new layer above. If you want to insert text, Click Type tool on the toolbar. After that, Click pointer input text on the place that you want. When the cursor appears, set the large, type, model of the font, and give color to text. After that, type the text in that area. Once completed, set back the position of the text.

4. Bevel and Emboss technique
Just give a little effect on the text so it becomes more visible and prominent, and can be seen on the next grouping process.Then you can give effect bevel and Emboss on this text by Click sign tab on the bottom layer, and then choose the option bevel and Emboss. Arrange that effects as you wish. It is important to set the display text is not too obtrusive to the original photos. After clicking OK, Your text have a special effect now

5. Merge text with photos
Once the text is ready, next step is to make the text seems appear with the original photos by grouping tet with the photo layer.Here they are, first move the position of the original Photos layer to the top, so the layers of the text is in the middle of the second layer photos. Click the photo layer from menu tab and Click Layer | Group with Previous. Once completed, you will get the text appear disguised in the photos.

6. An Addition
Now you have Photo that have special marks on it already. This marks deliberately made vague and placed in the middle of the photo it is not misused easily. If you still feel less secure with this signature , you can add the typical signs on other area.Most importantly, make signs typical of an additional layer on your new order not to disrupt existing. Once finished, save your new image and ready to publish.

[+/-] Read more....

Downloading Podcast as Freely as U Can

It is quite simple to download a podcast freely. The best way to acquisition chargeless podcasts is apparently to analysis a podcast directory. A podcast agenda is a advertisement of many and sometimes bags of altered podcasts. The podcast directory will usually adapt the podcasts by affair and genre, authoritative it simple to acquisition the blazon of podcast that is sought.

In addition, podcast directories generally acquiesce the visitors to animadversion on the podcasts listed, and provide a account of the admired podcasts on the site, authoritative it easy for users to acquisition the best podcasts available. These podcast directories can be acclimated to browse through, introducing users to abounding altered podcasts they otherwise would not accept found.....

Once a podcast has been begin making interests a user, it is all-important to download the chargeless podcast. The vast majority of podcasts will be free, but there will be a few bulk and waste our money. The action to subscribe to and download the podcasts is the aforementioned in either case. First, a podcast applicant needs to be begin and installed.

There are abounding chargeless podast audience available, all accouterment a hardly altered user interface and range of options. They appear with abounding altered names, such as Podscape, or Nimiq, and analytic for 'free podcast client' or something like it will about-face up many possibilities.

When the podcast applicant has been installed, inputting the augment abode will acquiesce the podcast to be downloaded. The podcast applicant will check the abode accustomed for a small, apparatus readable file alleged an RSS file.

This book will contain information about the podcasts, conceivably some text about the alone episodes, as able-bodied as the area of the adventure file. Once the podcast applicant has been located the book referred to in the RSS feed, it will be downloaded and stored on the users computer until the want to appearance it.

Sometimes, of course, admission to a claimed computer is not available, but it is still important to analysis a certain podcast. Fortunately, abounding podcast directories offer built in podcast readers in the site. Not alone do they often appearance anniversary contempo adventure that is available, they may aswell action a way to appearance or accept to those podcast episodes from aural the site.

By application the viewer contained aural the site, it is no best all-important to
even download the podcast episodes. However, the ability to move and allotment the episodes after downloading is one of the admirable things about podcasting. The files can be placed on about and media player, alignment from iPods to the new Play
Station Portable.

This adaptability is one of the reasons podcasts accept succeeded, admitting added technologies like alive music and video. The admiration of consumers to accept ascendancy over technology cannot be over estimated.

[+/-] Read more....

Podcast for client

A podcast is the software acclimated to admission and download podcasts. Podcast audience are aswell accepted as media aggregators, programs advised to automatically access an online file, or feed, and download the audio or video book associated with it. Hundreds of these programs exist, with names like IpodderX, Juice,Nimiq, and PodSpider.

These podcast audience are simple to find, and because there are so abounding accessible for free, it is simple to acquisition one that apparel an individuals needs and style. These programs run on the users computer, periodically downloading a baby RSS book from sites that it has been told to monitor.

The book tells the program about an audio or video book stored on the server, and the podcast applicant again downloads that file for the user to appearance or accept to.

The podcast applicant appropriately allows the user to view information on a advanced ambit of capacity from their computer, after even application a web browser.

Just like blogs let humans acquisition writers they enjoyed for any niche topic they were absorbed in, podcasts let humans do them aforementioned for audio and video. Its as if a bags of radio and television channels were created to server every accessible interest, and added were fabricated every day.

Using the podcast applicant to admission and download the files makes it as simple to accumulate up with the sites one likes as it is to broadcast the feed.

[+/-] Read more....

Auto install Xp

May be this might be useful. I install 98 with backup/restore utility.

My way of auto installation of XP
Then on second partition or the same partition XP without pagefile.sys.

Then i get a dual boot. So after booting into XP, Install all ur fav progies
n games. Test each of them, to make sure they work... etc etc... all
ur drivers also. Tweak ur xp.

make sure u unhide all files relates to win xp dir and progra files.

Then boot into 98 > goto backup utility of 98....

Select the folders used by XP, eg
my documents and settings
winxp (or windows- what ever name u gave to windows dir)
check all files in the root
program files folder
and like this all folders and files used by xp.

then start the backup process.

make sure u have ~ > 3gb of free space on the disk / partition
u r planning to save the image file.

Then when ur XP crashes or U crash it ... lol
then just boot into 98, goto restore option,
and click ok. Over write old files or new ones as u like.

It takes ~20min to install



Windows Xp including

Office Xp
Interdev
.net framework
winzip
winrar
tweaks
easy cleaner
adobe
gif animator
acdess 6
service pack1 , and now service pack 2b
lan settings
mcafee antivirus
zone alarm
cute ftp3 pro
Easy CD-DA Extractor 7
Eraser
Ahead
Links Organizer
Bulk Rename Utility
BitStrike Software
Mozilla Firefox
Microsoft Visual Studio
Opera
Onlinetimer
Nokia
Ulead Systems
UltraISO
Virtual CD v4
SlimBrowser
Yahoo!
Msn
Webroot
Spamihilator
inetpub


U can exclude any folder, u think is not needed at that time for reinstallation.

The whole task id completed in 20 minutes ... in the mean while
I make a nice cup of tea for myself and wait for XP to start

PS: dont forget to include boot.ini file.

Hope it will help.

[+/-] Read more....

Yahoo Massenger with NO- Ads

I went into the system registery and found out that Yahoo! moved the 'banner url' key to a slightly different location. Than what it used in version 5.5!

Yahoo! IM no longer uses 'YUrl', but uses 'View' instead. You gotta click on each key inside of 'View' and edit the 'banner url' string to anything you want... I simply cleared mine out completely and it works flawlessly!

Here is what you gotta do:

Run regedit
Goto HKEY_CURRENT_USER -> Software -> Yahoo -> Pager -> View

Inside the 'View' key there are a several other keys... go through each one and edit the 'banner url' string to your liking. It even works if the string is left blank (this causes it to look as if ads were never even implemented)!

Restart Yahoo! IM for the effect to take hold.

This is great for Yahoo! IM 5.6 users who don't want to be bothered with ads.

[+/-] Read more....

10 Fast and Free Security Enhancements

Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.
1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options....

2. Install a personal firewall. Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.

3. Install a free spyware blocker. Our Editors' Choice ("Spyware," April 22) was SpyBot Search & Destroy (_http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies.

4. Block pop-up spam messages in Windows NT, 2000, or XP by disabling the Windows Messenger service (this is unrelated to the instant messaging program). Open Control Panel | Administrative Tools | Services and you'll see Messenger. Right-click and go to Properties. Set Start-up Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them.

5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro@l. This will make it much harder for anyone to gain access to your accounts.

6. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.

7. Buy antivirus software and keep it up to date. If you're not willing to pay, try Grisoft AVG Free Edition (Grisoft Inc., w*w.grisoft.com). And doublecheck your AV with the free, online-only scanners available at w*w.pandasoftware.com/activescan and _http://housecall.trendmicro.com.

8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get. For more, check out our wireless section or see the expanded coverage in Your Unwired World in our next issue.

9. Join a respectable e-mail security list, such as the one found at our own Security Supersite at _http://security.ziffdavis.com, so that you learn about emerging threats quickly and can take proper precautions.

10. Be skeptical of things on the Internet. Don't assume that e-mail "From:" a particular person is actually from that person until you have further reason to believe it's that person. Don't assume that an attachment is what it says it is. Don't give out your password to anyone, even if that person claims to be from "support."

[+/-] Read more....

Graffiti On Walls 4 Adobe Photoshop Cs 8.0

For This Tutorial You Must Have A Basic Understanding Of Adobe Photoshop Cs 8.0, Example : Where The Features Of The Program Are.
CODE

For This Tutorial You Will Need The Font Called Political Graffiti FIll Which Can Be Aquired Here:
http://www.dafont.com/en/font.php?file=political_graft And....
The Starting Wall Picture Which Can be Aquired Here:
http://www.imagehosting.us/imagehosting/showimg.jpg/?id=59054





(1). Open Photoshop Cs 8.0

(2). Open Wall Picture

(3). Type Ur Second Name In Red At 210pt Font Size In The Political Graffiti Fill Font.

(4). Click Icon All The Way At The Topright That Looks Like A T With A Rounded Line Under It. (Warp Text)

(5). Distort Style Squeeze Vertical, Bend = -31%, Horizontal Distortion = +18%, Vertical Distortion = +34%

(6). Layer> Layer Style> Blending Options, General Blending> Opacity 79%> Fill Opacity 100%, Blend If: Gray, Underlying Layer Black 60, White 210

(7). Type Ur First Name In Red At 210pt Font Size In The Political Graffiti Fill Font.

(8). Click Icon All The Way At The Topright That Looks Like A T With A Rounded Line Under It. (Warp Text)

(9). Distort Style Squeeze Vertical, Bend = +50%, Horizontal Distortion = 0%, Vertical Distortion = -31%

(10). Layer> Layer Style> Blending Options, General Blending> Opacity 79%> Fill Opacity 100%, Blend If: Gray, Underlying Layer Black 60, White 210

(11). Duplicate Both Layers

(12). Move Copied Layers One On Top Of The Other (In The Layer Menu)

(13). Hide The Original Ur Second Name And Ur First Name Layers By Clicking The Eye Icons So That They Dissapear.

(14). In The Copies, Right Click (One At A Time) And Click Rasterize Layer.

(15). Go to Layer> Merge Down (Ctrl + E) (On Top Name Layer).

(16). Layer> Layer Style> Stroke Change Color To Black, Size to 8, Then Opacity To 68%.

(17). Save If No Blur Effect Wanted

(18). Filter> Blur> Smart Blur> Mode: Overlay Edges, Threshhold 48%, Radius 6, Quality: High.

(19). Layer> New Layer

(20) Brush Tool (B), Paint Brush With The Soft 16pt Airbrush For Spraypaint Effect.

(21). Smuge Around Graffiti For Paint Smudge Look For Good Effect (Optional)

(22). Save.

Finito

Final Images:

CODE
Graffiti With Blur:
http://www.imagehosting.us/imagehosting/showimg.jpg/?id=59056

Graffiti No Blur:
http://www.imagehosting.us/imagehosting/showimg.jpg/?id=59057

[+/-] Read more....

Free World Dialup

"Use FWD to make real, free phone calls using your favorite telephone, computer or PDA and any broadband connection. Call your neighbor or a relative, next door or in another country; all with the same ease, speed, and high quality." Thanks to Jeff Pulver and his crew!

Quick summary:

1 - First, got to http://www.freeworlddialup.com and sign up to get your FWD # and password.
2 - Download http://brands.xten.net/x-litefwd/download/X-LiteFWD_Install.exe FWD/X-Lite ("self-configures") program or go to http://www.myphonebooth.com/ to call any FWD # and U.S. toll free #s using Internet Explorer (Firefox not supported).

Quickstart Guide: http://www.freeworlddialup.com/support/quick_start_guide
FWD Xlite Configuration Guide: http://www.freeworlddialup.com/support/configuration_guide/configure_your_fwd_certified_phone/fwd_xlite/all
MS Windows Messenger Configuration Guide: http://pulver.com/fwd/fwd30news.html#messenger (FWD supports Windows Messenger 4.6/4.7 but not MSN Messenger 5.x.)

3 - To call a U.S. landline/cell #, dial *+arecode+7digit#. (This FWD feature is not listed on their website, but has been working for several months now.)

4 - To call a FWD # from a PSTN (your regular phone), click
http://www.dslreports.com/r0/download/476274~3ccc4c9edbe2a596714a4fd9da897204/fwdaccessnumbers.zip or after you've signed up go to FWD web page, click on "Features", "Access #s" for a list of FWD access numbers in your area. Available in several states in the U.S., UK, NL and DE at this time.

Packet8:
-- To call a P8 phone # from a FWD phone: Dial **898 + 1 + P8 number to be routed to P8 service.
-- To call a FWD # from a P8 phone:
*If the FWD # you are calling contains 5 digits, start to dial with the prefix 0351. For example: 035112345
*If the FWD # you are calling contains 6 digits, start to dial with the prefix 0451.

Call UK:
Get a UK telephone # that will call you on your FWD #. Register http://fwd.calluk.com.

FWD Features: Some features like Voice email needs to be activated at http://www.fwdnet.net

Internet Calling
Call Waiting
CallerID
Missed Call notification
Call Forwarding
Call Transfer
Three Way Calling
Voice email
SoftPhone, IP Phones & *Web-based
Aliases
Whitepages directory
ENUM Entry
eDial SOAP
Conferencing
Instant Messaging
Web Calling/FWD-Talk
Corporate Cisco Call Manager Connection
Calling to Toll Free Numbers in the UK, US, NL, JP and FR TellMe Service (411).
-- NL Dial *31(800)... to reach Netherlands toll free #s.
-- UK Dial *44(800)... or *44(808)... or *44 (500) to reach UK toll free #s.
-- US Dial *1(8xx) xxx xxxx to reach United States toll free #s.
-- JP Dial *81 0120... to reach Japan toll free #s.

Frequently used numbers
613 Echo test
55555 Volunteer Welcome Line
514 FWD Coffee House
612 Time
411 TellMe Information
611 Part Time Technical support
511 FWD Conference Bridge

At the moment, I think this is way better than Skype, Yahoo IM voice chat, etc...I've been using FWD for over a year with my cable broadband service and didn't have to set up any port forwarding on my broadband router. Obviously you'ld need a mic/speakers connected to your PC.

You can also use your regular telephone via an adapter http://voipstore.pulver.com/product_info.php?products_id=32 and IP phone http://voipstore.pulver.com/product_info.php?products_id=33. Adapters and IP phones from different vendors like Cisco are available.

* Broadbandreports.com VoIP forum (formerly known as DSLReports.com)
-- If you have any questions or just curious about VoIP, visit the VoIP forum http://www.dslreports.com/forum/voip at DSLReports.com.

[+/-] Read more....

Free Hosting Here

This summary is not available. Please click here to view the post.

[+/-] Read more....

Enable Folder and Icon Refresh

This reg file Enables Folder and Icon Refresh.

1. Copy the following (everything in the box) into notepdad.

QUOTE
Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"NoNetCrawling"=dword:00000000

2. Save the file as disablerefreshundo.reg
3. Double click the file to import into your registry.

NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

[+/-] Read more....

How to find a remote IP

Method 1

To view someone's IP# when they send you hotmail email do this:
1) Click "Options" on the upper right side of the page.
2) On the left side of the page, Click "Mail"
3) Click "Mail Display Settings"
4) Under "Message Headers" select "Full" or "Advanced"
5) Click ok

Method 2
reg a dydns account and install the ip pointer, so each time you ping the host name you regestored

for example:
you regestor the host name myhost.dydns.com, then you keep a little software running on the target host. The little software will keep update your IP to dydns.com server.

so at your pc just start cmd, and ping myhost.dydns.com, it will give you the most updated ip address.

Method 3
neverender, what doesn't work for you? Simply type in nc -vvv -l -p 80 on your box, which will set it to listen in verbose mode on port 80. Then give them a link to your IP address (for example: 111.111.111.11) and tell them to type it in their browser. The browser should resolve the address as well as append port 80 automatically. Just make sure that your friend is not very computer literate.

Method 4
Just download a very simple server such as this one and install it on your comp. Then run it and give your ip to the person you want and tell them to connect to it through a browser. Your server will log their connection and you will get their IP.

link:http://www.download.com/Abyss-Web-Server/3000-2165-10283992.html?tag=lst-0-6


Other Ways
-www.imchaos.com and make a "spy poll" to put in ur profile, this will tell u the IP of anybody who answers ur poll
-originalicons.com there is a page for doin it (i dont like it, but it works)
-or irc


Here is a more detailed tutorial about using NetCat.

http://www.onlamp.com/pub/a/onlamp/2003/05/29/netcat.html

Windows users can download NetCat from here:

http://www.atstake.com/research/tools/network_utilities/

[+/-] Read more....

how to execute chm files in linux

download the following rpms on ur pc:-

http://dag.wieers.com/packages/chmlib/chmlib-0.35-1.1.fc3.rf.i386.rpm
ftp://rpmfind.net/linux/dag/fedora/3/en/i386/dag/RPMS/wxGTK-2.4.2-5.1.fc3.rf.i386.rpm
http://acmserver.cs.ucr.edu/%7Ensoracco/rpms/xchm-0.9.8-1.i386.rpm

and also install them in the same sequence. using the command:-

rpm -ivh

Note:- i am giving the path of packages for fedora cpre 3. if want for any other os take a look at the following sites.

chmlib:- http://dag.wieers.com/packages/chmlib/
wxGTK:- ftp://rpmfind.net/linux/dag/
xchm: - platform independent for all redhat's.............

[+/-] Read more....

HOW TO CAPTURE STREAMING MEDIA

many websites (http://ww.smashits.com) stream songs and videos
people believe they cannot be downloaded, quite why i dont know. they kinda think there is no file present to dwnld

once the file is located it can then be retrieved by nettransport
nettransport is able to dwnld any file whether ftp or rtsp etc

1. Download Project URL Snooper 1.02.01 from http://rain66.at.infoseek.co.jp/
2. Install URL Snooper (and WinPcap together)
3. Don't run URL Snooper when it is done installing
4. Restart computer
5. Open Project URL Snooper
6. Click on the General Options Tab
7. user posted image
8. Chose a network adapter
9. Now click on the search tab
10. Click Sniff Network
11. Go to a webpage and you should see some results in the results list
12. If nothing is appearing then chose another network adapter, until one works

13. Now you are ready to begin searching
14. Click the "Hide Non-Streaming URLs" option to hide all http:// references and only show URLs corresponding to streaming audio/video (rtsp, pnm, wma, etc.)
15. Then click Sniff Network
16. Your links should appear as you begin streaming your file
17. Select your desired stream user posted image
18. usually rm file user posted image
19. On the bottom there should be the link which you simply copy user posted image

20. Download nettransport from here ftp://down_transport:123@s1.5fox.com/NT2Setup_multi.EXE or
ftp://nettransport:nettransport@61.153.24...Setup_multi.EXE
http://lycos26486.l97.lycos.com.cn/download.htm

21. Install it
22. Click on new
23. Paste link

now you should be able to download any file
if u need ne help
jus ask
i think dialups may have problems

[+/-] Read more....

How to Add an URL Address Bar to the task bar

You can add an Internet URL address bar to your Windows XP taskbar. Doing so will let you type in URLs and launch Web pages without first launching a browser. It will also let you launch some native Windows XP applications in much the same way as you would via the Run menu (so you could type in calc to launch the calculator or mspaint to launch Microsoft Paint. Here's how you add the address bar:

1. Right-click on the taskbar, select Toolbars, and then click Address.

2. The word Address will appear on your taskbar.

3. Double click it to access it.

4. If that doesn't work, your taskbar is locked. You can unlock it by right-clicking on the taskbar again and uncheck Lock the Taskbar.

NOTE: You may also need to grab the vertical dotted lines beside the word Address and drag it to the left to make the Address window appear.

[+/-] Read more....

HHow to Add an Option to Print the Contents of a Folder

ould you like to be able to right click any folder in Explorer and print its contents? You can add this option to the context menu by following these steps:

First, you need to create a batch file called Printdir.bat. Open Notepad or another text editor and type (or cut and paste) this text:

@echo off
dir %1 /-p /o:gn > "%temp%\Listing"
start /w notepad /p "%temp%\Listing"
del "%temp%\Listing"
exit

Now, in the Save As dialog box, type "%windir%\Printdir.bat" (without the quotation marks) and click the Save button.
Click Start, Control Panel, Folder Options.
Click the File Types tab, and then click File Folder.
Click the Advanced button.
Click the New button.

In the Action box, type "Print Directory Listing" (without the quotation marks).

In the Application used to perform action box, type "Printdir.bat" (without the quotation marks).

Click OK in all three dialog boxes to close the dialog boxes.

You're not quite finished yet! Now you need to edit the Registry, so open your favorite Registry Editor.

Navigate to HKEY CLASSES ROOT\Directory\shell.

Right click on "default" and select Modify.
In the File Data box, type "none" (without the quotation marks).

Click OK and close the Registry Editor.

Now when you right click a folder, you'll see the option to Print Directory Listing. Selecting it will print the contents of the folder.

Who needs a stinking program to print a folder directory?

[+/-] Read more....

How Long Has Your System Been Running?

Here's how you verify system uptime:

Click Start | Run and type cmd to open a command prompt.
At the prompt, type systeminfo

Scroll down the list of information to the line that says System Up Time.

This will tell you in days, hours, minutes and seconds how long the system has been up.

Note that this command only works in XP Pro, not in XP Home. You can, however, type net statistics workstation at the prompt in Home. The first line will tell you the day and time that the system came online.

[+/-] Read more....

Flashing A Video Card Bios

PCStats have a new advanced guide out for flashing your video card BIOS! While this *not* something for the novice to undertake, flashing your video card BIOS may lead to performance and feature enhancements.

We recently ran an article on flashing (reprogramming) the BIOS (Basic Input/Output System) of your motherboard to enable new features and fix errors. That got us thinking that we'd only covered half the story. Sure, hardware enthusiasts have been upgrading the BIOS on their motherboards for years, but what about the other components of a computer system?

Here's a snap:

Video cards in particular have an interesting history in relation to the BIOS flashing procedure. While motherboard BIOS fixes generally add support for new processors and fix hardware glitches, video card BIOS updates have the potential to do much more. Enterprising tech-heads have discovered instances where a video card can actually be transformed by a BIOS update, activating hidden features and potential buried performance aspects by the manufacturer (generally for marketing purposes).

[+/-] Read more....

hacking XP Part 3

With a computer conected you can use telnet into and mess around with, and not get into trouble no matter what you do to it? I've set up my techbroker.com (206.61.52.33) with user xyz, password guest for you to play with. Here's how to forge email to xyz@techbroker.com using
telnet. Start with the command:
C:\>telnet techbroker.com 25
Connecting To Techbroker.com
220 Service ready
Now you type in who you want the message to appear to come from:
helo santa@techbroker.com
Techbroker.com will answer:

250 host ready
Next type in your mail from address:
mail from:santa@techbroker.com
250 Requested mail action okay, completed
Your next command:
rcpt to:xyz@techbroker.com
250 Requested mail action okay, completed
Your next command:
data
354 Start main input; end with .
Newbie note: just means hit return. In case you can't see that little period between the s, what you do to end composing your email is to hit enter, type a period, then hit enter again.
Anyhow, try typing:
This is a test.
.
250 Requested mail action okay, completed
quit
221 Service closing transmission channel
Connection to host lost.
Using techbroker's mail server, even if you enable full headers, the
message we just composed looks like:
Status: R
X-status: N
This is a test.
That's a pretty pathetic forged email, huh? No "from", no date.
However, you can make your headers better by using a trick with the data command. After you give it, you can insert as many headers as you choose. The trick is easier to show than explain:
220 Service ready
helo santa@northpole.org
250 host ready
mail from:santa@northpole.com
250 Requested mail action okay, completed
rcpt to:
250 Requested mail action okay, completed
data
354 Start main input; end with .
from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.
.
250 Requested mail action okay, completed
quit
221 Service closing transmission channel
Connection to host lost.
The message then looks like:
from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.
The trick is to start each line you want in the headers with one word
followed by a colon, and the a line followed by "return". As soon as
you write a line that doesn't begin this way, the rest of what you
type goes into the body of the email.
Notice that the santa@northpole.com from the "mail from:" command didn't show up in the header. Some mail servers would show both "from" addresses.
You can forge email on techbroker.com within one strict limitation.
Your email has to go to someone at techbroker.com. If you can find any way to send email to someone outside techbroker, let us know, because you will have broken our security, muhahaha! Don't worry, you have my permission.
Next, you can read the email you forge on techbroker.com via telnet:
C:\>telnet techbroker.com 110
+OK <30961.5910984301@techbroker.com> service ready
Give this command:
user xyz
+OK user is known
Then type in this:
pass test
+OK mail drop has 2 message(s)
retr 1
+OK message follows
This is a test.
If you want to know all possible commands, give this command:
help
+OK help list follows
USER user
PASS password
STAT
LIST [message]
RETR message
DELE message
NOOP
RSET
QUIT
APOP user md5
TOP message lines
UIDL [message]
HELP
Unless you use a weird online provider like AOL, you can use these
same tricks to send and receive your own email. Or you can forge email to a friend by telnetting to his or her online provider's email
sending computer(s).

[+/-] Read more....

Hacking XP Part 2

The queen of hacker commands is telnet. To get Windows help for
telnet, in the cmd.exe window give the command:
C:\>telnet /?
Here's what you will get:
telnet [-a][-e escape char][-f log file][-l user][-t term][host
[port]]
-a Attempt automatic logon. Same as -l option except uses
the currently logged on user's name.
-e Escape character to enter telnet client prompt.
-f File name for client side logging
-l Specifies the user name to log in with on the remote system.
Requires that the remote system support the TELNET ENVIRON
option.
-t Specifies terminal type.
Supported term types are vt100, vt52, ansi and vtnt only.
host Specifies the hostname or IP address of the remote computer
to connect to.
port Specifies a port number or service name.

Newbie note: what is a port on a computer? A computer port is sort of like a seaport. It's where things can go in and/or out of a computer. Some ports are easy to understand, like keyboard, monitor, printer and modem. Other ports are virtual, meaning that they are created by software. When that modem port of yours (or LAN or ISDN or DSL) is connected to the Internet, your computer has the ability to open or close any of over 65,000 different virtual ports, and has the ability to connect to any of these on another computer - if it is running that port, and if a firewall doesn?t block it.
****************
****************
Newbie note: How do you address a computer over the Internet? There are two ways: by number or by name.
****************
The simplest use of telnet is to log into a remote computer. Give the
command:
C:/>telnet targetcomputer.com (substituting the name of the computer you want to telnet into for targetcomputer.com)
If this computer is set up to let people log into accounts, you may
get the message:
login:
Type your user name here, making sure to be exact. You can't swap between lower case and capital letters. For example, user name Guest is not the same as guest.
****************
Newbie note: Lots of people email me asking how to learn what their user name and password are. Stop laughing, darn it, they really do. If you don't know your user name and password, that means whoever runs that computer didn't give you an account and doesn't want you to log on.
****************
Then comes the message:
Password:
Again, be exact in typing in your password.
What if this doesn't work?
Every day people write to me complaining they can't telnet. That is
usually because they try to telnet into a computer, or a port on a
computer that is set up to refuse telnet connections. Here's what it
might look like when a computer refuses a telnet connection:
C:\ >telnet 10.0.0.3
Connecting To 10.0.0.3...Could not open connection to the host, on port 23. A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond.
Or you might see:
C:\ >telnet techbroker.com
Connecting To techbroker.com...Could not open connection to the host, on port 23.
No connection could be made because the target machine actively
refused it.
If you just give the telnet command without giving a port number, it
will automatically try to connect on port 23, which sometimes runs a
telnet server.
**************
Newbie note: your Windows computer has a telnet client program,
meaning it will let you telnet out of it. However you have to install
a telnet server before anyone can telnet into port 23 on your
computer.
*************
If telnet failed to connect, possibly the computer you were trying to
telnet into was down or just plain no longer in existence. Maybe the
people who run that computer don't want you to telnet into it.
How to Telnet into a Shell Account
Even though you can't telnet into an account inside some computer, often you can get some information back or get that computer to do something interesting for you. Yes, you can get a telnet connection to succeed -without doing anything illegal --against almost any computer, even if you don't have permission to log in. There are many legal things you can do to many randomly chosen computers with telnet. For example:
C:/telnet freeshell.org 22
SSH-1.99-OpenSSH_3.4p1
That tells us the target computer is running an SSH server, which enables encrypted connections between computers. If you want to SSH into an account there, you can get a shell account for free at
. You can get a free SSH client program from
.
One reason most hackers have shell accounts on Internet servers is because you can meet the real hackers there. When you've logged in, give the command w or who. That gives a list of user names. You can talk to other users with tht talk command. Another fun thing, if your shell account allows it, is to give the command
ps -auxww
It might tell you what commands and processes other users are running. Ask other users what they are doing and they might teach you something. Just be careful not to be a pest!
***************
You can get punched in the nose warning: Your online provider might kick you off for making telnet probes of other computers. The solution is to get a local online provider and make friends with the people who run it, and convince them you are just doing harmless, legal explorations.
*************
Sometimes a port is running an interesting program, but a firewall won't let you in. For example, 10.0.0.3, a computer on my local area network, runs an email sending program, (sendmail working together with Postfix, and using Kmail to compose emails). I can use it from an account inside 10.0.0.3 to send emails with headers that hide from where I send things.
If I try to telnet to this email program from outside this computer,
here's what happens:
C:\>telnet 10.0.0.3 25
Connecting To 10.0.0.3...Could not open connection to the host, on
port 25.
No connection could be made because the target machine actively
refused it.
However, if I log into an account on 10.0.0.3 and then telnet from
inside to port 25, here's what I get:
Last login: Fri Oct 18 13:56:58 2002 from 10.0.0.1
Have a lot of fun...
cmeinel@test-box:~> telnet localhost 25
Trying ::1...
telnet: connect to address ::1: Connection refused
Trying 127.0.0.1... [Carolyn's note: 127.0.0.1 is the numerical
address meaning localhost, the same computer you are logged into]
Connected to localhost.
Escape character is '^]'.
220 test-box.local ESMTP Postfix
The reason I keep this port 25 hidden behind a firewall is to keep
people from using it to try to break in or to forge email. Now the
ubergeniuses reading this will start to make fun of me because no
Internet address that begins with 10. is reachable from the Internet.
However, sometimes I place this "test-box" computer online with a
static Internet address, meaning whenever it is on the Internet, it
always has the same numerical address. I'm not going to tell you what its Internet address is because I don't want anyone messing with it. I just want to mess with other people's computers with it, muhahaha. That's also why I always keep my Internet address from showing up in the headers of my emails.
***************
Newbie note: What is all this about headers? It's stuff at the
beginning of an email that may - or may not - tell you a lot about
where it came from and when. To see full headers, in Outlook click
view -> full headers. In Eudora, click the "Blah blah blah" icon.
****************



[+/-] Read more....

Hacking XP Part 1

Part I: The Magic of DOS
In this guide you will learn how to telnet , forge email, use
nslookup and netcat with Windows XP.
So you have the newest, glitziest, "Fisher Price" version of Windows: XP. How can you use XP in a way that sets you apart from the boring millions of ordinary users?
****************
Luser Alert: Anyone who thinks this GTMHH will reveal how to blow up people's TV sets and steal Sandra Bullock's email is going to find out that I won't tell them how.
****************
The key to doing amazing things with XP is as simple as D O S. Yes, that's right, DOS as in MS-DOS, as in MicroSoft Disk Operating System. Windows XP (as well as NT and 2000) comes with two versions of DOS. Command.com is an old DOS version. Various versions of command.com come with Windows 95, 98, SE, ME, Window 3, and DOS only operating systems.

The other DOS, which comes only with the XP, 2000 and NT operating systems, is cmd.exe. Usually cmd.exe is better than command.com because it is easier to use, has more commands, and in some ways resembles the bash shell in Linux and other Unix-type operating systems. For example, you can repeat a command by using the up arrow until you back up to the desired command. Unlike bash, however, your DOS command history is erased whenever you shut down cmd.exe. The reason XP has both versions of DOS is that sometimes a program that won?t run right in cmd.exe will work in command.com
****************
Flame Alert: Some readers are throwing fits because I dared to compare DOS to bash. I can compare cmd.exe to bash if I want to. Nanny nanny nah nah.
****************
DOS is your number one Windows gateway to the Internet, and the open sesame to local area networks. From DOS, without needing to download a single hacker program, you can do amazingly sophisticated explorations and even break into poorly defended computers.
****************
You can go to jail warning: Breaking into computers is against the law if you do not have permission to do so from the owner of that computer. For example, if your friend gives you permission to break into her Hotmail account, that won't protect you because Microsoft owns Hotmail and they will never give you permission.
****************
****************
You can get expelled warning: Some kids have been kicked out of school just for bringing up a DOS prompt on a computer. Be sure to get a teacher's WRITTEN permission before demonstrating that you can hack on a school computer.
****************
So how do you turn on DOS?
Click All Programs -> Accessories -> Command Prompt
That runs cmd.exe. You should see a black screen with white text on it, saying something like this:
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\>
Your first step is to find out what commands you can run in DOS. If you type "help" at the DOS prompt, it gives you a long list of commands. However, this list leaves out all the commands hackers love to use. Here are some of those left out hacker commands.
TCP/IP commands:
telnet
netstat
nslookup
tracert
ping
ftp
NetBIOS commands (just some examples):
nbtstat
net use
net view
net localgroup
TCP/IP stands for transmission control protocol/Internet protocol. As you can guess by the name, TCP/IP is the protocol under which the Internet runs. along with user datagram protocol (UDP). So when you are connected to the Internet, you can try these commands against other Internet computers. Most local area networks also use TCP/IP.
NetBIOS (Net Basic Input/Output System) protocol is another way to communicate between computers. This is often used by Windows computers, and by Unix/Linux type computers running Samba. You can often use NetBIOS commands over the Internet (being carried inside of, so to speak, TCP/IP). In many cases, however, NetBIOS commands will be blocked by firewalls. Also, not many Internet computers run NetBIOS because it is so easy to break in using them. We will cover NetBIOS commands in the next Guide to XP Hacking.

[+/-] Read more....

Hacking Pasword Protected site

There are many ways to defeat java-script protected web
sites. S ome are very simplistic, such as hitting ctl-alt-del
when the password box is displayed, to simply turning off
java capability, which will dump you into t he default page.
You can try manually searching for other directories, by
typing the directory name into the url address box of your

browser, ie: you w ant access to www.target.com . Try typing
www.target.com/images .(almost ever y web site has an images
directory) This will put you into the images directo ry,
and give you a text list of all the images located there.
Often, the t itle of an image will give you a clue to the
name of another directory. ie: in www.target.com/images,
there is a .gif named gamestitle.gif . There is a g ood
chance then, that there is a 'games' directory on the site,
so you wou ld then type in www.target.com/games, and if it is
a valid directory, you aga in get a text listing of all thefiles available there.
For a more automated a pproach, use a program like WEB SNAKE
from anawave, or Web Wacker. These pro grams will create a
mirror image of an entire web site, showing all director ies,
or even mirror a complete server. They are indispensable for
locating hidden files and directories.
What do you do if you can't get past an openin g "Password
Required" box? First do an WHOIS Lookup for the site. In our
example, www.target.com . We find it's hosted by www.host.com
at 100.100.100. 1. We then go to 100.100.100.1, and then launch \
Web Snake, and mirror the e ntire server. Set Web Snake to NOT
download anything over about 20K. (not ma ny HTML pages are
bigger than this) This speeds things up some, and keeps yo u
from getting a lot of files and images you don't care about.
This can take a long time, so consider running it right before bed time.
Once you have an image of the entire server, you look through
the directories listed, and find /target. When we open that
directory, we find its contents, and all of i ts sub-directories listed.
Let's say we find /target/games/zip/zipindex.html . This would be the index
page that would be displayed had you gone through the
password procedure, and allowed it to redirect you here.
By simply typ ing in the url
www.target.com/games/zip/zipindex.html you will be on
the index page and ready to follow the links for downloading.

[+/-] Read more....

A Novice's Guide To Hacking

The word "hacking" is here used the way the non-hacking public
thinks it is used, to mean breaking into somebody else's computer. Its
purpose is to expand and clarify the information about the TOPS-20 operating
system, which runs on DECsystem-20 mainframes. The Mentor basically lumped
this system in with TOPS-10 and didn't note important differences between the
two. I will here reproduce in full what The Mentor had to say about TOPS-10
and about VMS, which are the parent and the offspring of TOPS-20.

VMS- The VAX computer is made by Digital Equipment Corporation (DEC),
and runs the VMS (Virtual Memory System) operating system.
VMS is characterized by the 'Username:' prompt. It will not tell
you if you've entered a valid username or not, and will disconnect
you after three bad login attempts. It also keeps track of all
failed login attempts and informs the owner

of the account next time
s/he logs in how many bad login attempts were made on the account.
It is one of the most secure operating systems around from the
outside, but once you're in there are many things that you can do
to circumvent system security. The VAX also has the best set of
help files in the world. Just type HELP and read to your heart's
content.
Common Accounts/Defaults: [username: password [[,password]] ]
SYSTEM: OPERATOR or MANAGER or SYSTEM or SYSLIB
OPERATOR: OPERATOR
SYSTEST: UETP
SYSMAINT: SYSMAINT or SERVICE or DIGITAL
FIELD: FIELD or SERVICE
GUEST: GUEST or unpassworded
DEMO: DEMO or unpassworded
DECNET: DECNET


DEC-10- An earlier line of DEC computer equipment, running the TOPS-10
operating system. These machines are recognized by their
'.' prompt. The DEC-10/20 series are remarkably hacker-friendly,
allowing you to enter several important commands without ever
logging into the system. Accounts are in the format [xxx,yyy] where
xxx and yyy are integers. You can get a listing of the accounts and
the process names of everyone on the system before logging in with
the command .systat (for SYstem STATus). If you seen an account
that reads [234,1001] BOB JONES, it might be wise to try BOB or
JONES or both for a password on this account. To login, you type
.login xxx,yyy and then type the password when prompted for it.
The system will allow you unlimited tries at an account, and does
not keep records of bad login attempts. It will also inform you
if the UIC you're trying (UIC = User Identification Code, 1,2 for
example) is bad.
Common Accounts/Defaults:
1,2: SYSLIB or OPERATOR or MANAGER
2,7: MAINTAIN
5,30: GAMES

**** note: I'm remembering this stuff from several years ago, and in some
cases my memory may be foggy or stuff may be outdated.

TOPS-20, once you are inside, resembles VMS much more than it resembles
TOPS-10, as far as I know (I'm not really familiar with VMS). From the
outside, it's more like TOPS-10, except that the prompt is a @ instead of a
period. You can enter many commands without logging in, including SYSTAT and
probably FINGER. (Sometimes you can even use the mail program without
logging in.) It is very helpful. Not only does the command HELP lead to
lots of useful information, but anywhere in typing a command you can press ?
and it will tell you what the format of the command expects. For instance,
if you type ? by itself, it will tell you all the words that a command can
begin with. If you type S?, it will tell you all the commands that start
with the letter S. If you type SYSTAT ?, it will tell you the options
available on the systat command. You can use this at any point in any
command. Furthermore, if there is only one possibility (you have typed a
unique abbreviation), you can press Escape and it will finish the word for
you. I'm not sure, but I think TOPS-20 was the system that first introduced
filename completion as well --turning a uniquely abbreviated filename into a
complete name when you press escape, beeping if the abbreviation is not
unique. With command keywords you can leave the abbreviation un-expanded,
with filenames you have to expand it (or type it all in) for it to work.

Use the "Login" command to log in, followed by a username. It will prompt
for a password. Note that a password can be something like 39 characters
long, as can the username itself. TOPS-20 does NOT use numbers like 317,043
for user IDs. (Note that these numbers in TOPS-10 are octal, not decimal.)
Furthermore, the password can contain spaces. So, if somebody wants to make
his password difficult to guess, he can easily do so.

(But sometimes they might get overconfident. I remember a story from
Stanford... Someone asked the large cheese if he would let him know what the
operator password was, and he said "The operator password is currently
unavailable." So the guy tried "currently unavailable" as a password, and
got in. (Which reminds me of the time they got a real bug in the system
there... a head crash caused by an ant on the disk platter.))

In general, TOPS-20 does not limit the number of login attempts, nor does it
keep a record of bad tries. However, it is not difficult for the local
management to add such measures, or others such as a delay of several seconds
after each attempt. And unlike Unix, it is difficult to evade these even
once you're in. Without heavy in-depth knowledge, you can't test a username-
password combination except through a system call, which will enforce delays
and limited failures and such against password-trying programs.

So, TOPS-20 is easy to defend against the "database hack", in which you try
many different common passwords with many different usernames. (Unix is
much more vulnerable to this.) But any particular system, especially a lax
one like a college machine (DEC is always popular in academia), might have
little defense here. But you might not know how much defense until too late.

Do try the GUEST username.

But TOPS-20 can be very vulnerable to trojan horses. See, there's this thing
called the Wheel bit. A username that has the Wheel property can do anything
the system operator can do, such as ignore file protection masks, edit the
disks at the track/sector level, change any area of memory... On Unix, only
one user, the superuser, can read and write protected files. On TOPS-20, any
user can do these things from any terminal, if the Wheel attribute is set in
his user data. Some campus computers tend to accumulate excess trusted users
with wheel bits, and have to periodically prune away the unnecessary ones.

The thing is that a wheel can do these things without knowing that he has
done them. Normally the privileged commands are deactivated. But a program
run by a wheel can activate the privileges, do anything it wants, cover its
tracks, and deactivate them without the user ever being the wiser. So if you
can get any wheel user to run any program you wrote, such as a game or small
utility... there's no limit to what you can do. In particular, you can
create a new username, and make it a wheel. Or you can simply ask the system
outright for someone's password, if I'm not mistaken. (All this requires
access to TOPS-20 programming manuals, but some of the necessary material
should be available on line.) You cannot actually conceal this creation, as
far as I know... but maybe with sophisticated enough knowledge you could
make it not immediately apparent... Anyway, once you get that far in, you can
probably keep one step ahead of them for a while... If they erase your new
accounts, you can use the passwords to old ones... They can change all of
the wheel passwords, but a lot of the regular users won't change for some
time... You could even lock the operators out of their own system by
changing all their passwords for them, if you were crazy enough, perhaps
forcing them to shut the machine down to regain control of it. They might
even have to restore stuff from tape backup.

Even if you don't wedge your way into secret stuff, a TOPS-20 system can be
fun to explore. It's much more novice-friendly than most systems, and much
more hacker-friendly as well. I think the ascendency of Unix as the least-
common-denominator OS that everybody can agree on is a definite loss,
compared to TOPS-20.

[+/-] Read more....

HACKING ANGELFIRE ACCOUNTS

THIS TEXT FILE IS FOR EDUCATIONAL PURPOSES ONLY!! WITH THIS KNOWLEDGE I IN NO WAY ENCOURAGE U
TO GO ON A HACKING SPREE!! JUST KNOWING HOW SHOULD BE ENOUGH!!!
This text file may be
redistributed freely. But, it may NOT be changed in any way without permission from HotWired. So spread the knowledge!!!!!
================================================================
To Whom It May Concern,

My name is DJ and my web page is located at http://www.angelfire.com/ky/LydianSociety/welcome.html. This weekend I left for a trip to NY, and when I got back I decided to edit my homepage. Except when I entered my password it did not work. I am fairly sure I have the right one but am not 100% certain. I would have used the web based password retrieving system form your site but I have changed my E-Mail addresses as well, so the old ones are no longer available. My new address is XLydeX@hotmail.com

If you would please send me my account information again so I can finally edit my page again, I would be greatful. Thank you.

Lyde
==============
The Angelfire Hack!
==============

Enough with the legal shit! Let's get to the hack! Ok... You know this lamer on the net and u
want to get him back and he's got a page on Angelfire! What do u do? You hack his page of
course! For those of you who don't know what Angelfire is it's a free web page service. The
basic things u will need to hack an Angelfire account are:


/\/\/\/\ STEP 1 /\/\/\/\

The full url of this dood's page. Like http://www.angelfire.com/ca/lamer/index.html
or what ever the url is... Basically what the url says is his page is at angelfire.com
in the State of California in a directory called lamer. Index is just the name of the
specific page. It could be different, but it usually defaults to index.html for their
main page if they didn't change it.

/\/\/\/\ STEP 2 /\/\/\/\

I know what ur saying... How could i hack an account with just the url!! Keep reading! On
to step 2! Next up you need to find out this person's old email addy. Usually it's on their
front page. Write it down!

/\/\/\/\ STEP 3 /\/\/\/\

Now you've got their full url and their email address. Now you have to find their name on their
page. Usually they fill u in on what their real names are so find it and write it down. This
isn't necessary, but it makes the letter a lot more genuine...

/\/\/\/\ STEP 4 /\/\/\/\

With all this information write a letter to Angelfire sayin how unhappy u r! Angelfire's help
mail is mail@angelfire.com. Make the letter sound like a REAL scenario. That's the trick to
this hack. A little social engineering goes a long way in getting u what u want. Say something
in your letter like you went on vacation and forgot ur dam password! Say that you changed your
email address and your old addy is no longer available so the password retrievable form won't
work because it's sending to an unavailable address. So you give them a new address to send
the password to!! Check ur mail the next day and wallah!!! INSTANT ACCESS!!!

-released by-
\\\\\\\\\ HotWired /////////

oO keeping the scene alive! Oo



[+/-] Read more....