Posts

Showing posts from April 19, 2009

Windows XP Password Recovery Forget XP Password

Image
Cracking windows xp administrator password Cracking windows xp administrator password windows xp is said to be the most secure operating system, it is said to be an invulnerable operating system. 80% of the computer users in this world use windows xp. mic*ft has said that windows xp has will help you to have a safe and secure computing experience. i am completely agreeing with this, but i want to tell that windows xp is not invulnerable; there are some security holes in this operating system. here, i will be discussing a security hole. through this security hole, you will be able to penetrate the administrator password. note: please note, here, i am assuming that your windows xp box has an administrator password. first of all, get a windows xp bootable cd, if you don�t have one , please read the section hacking techniques � beginners. okay, after you get a windows xp bootable cd, place it in your cd rom or cd rewriter, now boot your computer through cd. in windows xp, during the spla

How To Recover Windows XP Administrator Passport

Forgot Your Windows XP Administrator Password? Here's How To Recover It! Getting the Administrator password can be done with a free program that can be found here: http://www.loginrecovery.com/ Use the program to create a floppy boot disk (or CD), and restart your computer with the disk in the drive, so your computer boots the software on the disk instead of booting Windows. It will then display an encryption key, which you should write down on a peice of paper if you're using a CD boot disk. If you're using a floppy disk, then you don't need to write it down. Just wait a minute for it to record the encryption key to the disk. Remove the disk, turn off your computer by pressing and holding the power button, and then turn it back on. Windows will boot up. Insert the disk back into the computer (or any computer with internet access. It doesn't have to be the one you're recovering the administrator password for) and go to http://www.loginrecovery.com/instruc

Create a PDF File Microsoft Word Excel Document

How to Creat PDF Using MS Office, MS Word, MS Excel, MS PowerPoint Creating a PDF file from a Word document is simple. Yet many people are confused by how to accomplish the task. That’s because they’re looking in the wrong place for the option. It seems logical that one would create a PDF by using the Save or Save As dialog boxes. But in reality, you’ll find the option to create a PDF file in the Print dialog box. This is where most, if not all, PDF creation tools allow you to create a PDF. To create your PDF, follow these easy steps: 1. Click File 2. Select Print 3. In the Print dialog box, click the drop-down box listing your installed printers 4. Select your PDF creation software on the list (for example, if you’re using Adobe Acrobat, select Adobe PDF) 5. Click OK 6. After That, Ask for the location, Select the Location on My Documents, or Desktop 7. Finish Adobe Acrobat Reader Professional is the Best Software for Crating PDF Documents by Using any Software.

Untold Windows Tips and Secrets

Welcome to another Hacking Truths Manual. This time I have a collection of Tips and Tricks which no body normally knows, the secrets which Microsoft is afraid to tell the people, the information which you will seldom find all gathered up and arranged in a single file. To fully reap this Manual you need to have a basic understanding of the Windows Registry, as almost all the Tricks and Tips involve this file. Important Note: Before you read on, you need to keep one thing in mind. Whenever you make changes to the Windows Registry you need to Refresh it before the changes take place. Simply press F5 to refresh the registry and enable the changes. If this does not work Restart your system Exiting Windows the Cool and Quick Way Normally it takes a hell lot of time just Shutting down Windows, you have to move your mouse to the Start Button, click on it, move it again over Shut Down, click, then move it over the necessary option and click, then move the cursor over the OK button and once aga

Stop Adware and Malware

Stop Adware and Malware Web Links Spyware Warrier Forums (Rate) (Report) http://spywarewarrior.com/ Provides forums and several tutorials. Topics include spyware prevention, spyware removal, Hijackthis logs, spyware news and warnings, anti-spyware software, spam, viruses, security and others. Rogue/Suspect Anti-Spyware Products & Web Sites (Rate) (Report) http://www.spywarewarrior.com/rogue_anti-spyware.htm Describes anti-spyware web sites and products that are either suspicious in their nature or are deceptive. It also lists legitimate products. This is a very helpful article and you should check here before using the anti-spyware product that you are considering. Spychecker.com (Rate) (Report) http://www.destroyadware.com/members/rate.php?2 Provides descriptions, pricing information, and ratings for spyware removal, adware removal, virus removal and prevention tools along with snoop prevention tools, firewalls, file deletion tools, cleanup tools, encryption tools, and cooki

What is twitter and twitter promotion

What is twitter and twitter promotion Twitter is a social networking and micro-blogging service that enables its users to send and read other users' updates known as tweets. Tweets are text-based posts of up to 140 bytes in length. Updates are displayed on the user's profile page and delivered to other users who have signed up to receive them. Senders can restrict delivery to those in their circle of friends (delivery to everyone being the default). Users can send and receive updates via the Twitter website, SMS, RSS (receive only), or through applications such as Tweetie, Twitterrific, Twitterfon and Feedalizr. The service is free to use over the web, but using SMS may incur phone services provider fees. You can send your messages using the Twitter website directly, as a single SMS alert, or via a third-party application such as Twirl, Snitter, or the Twitterfox add-on for Firefox. (See below for links to Twitter tools and applications.) Your tweets are displayed on your profi

Yahoo Messenger Sign In Problem

Image
Yahoo Messenger Services recently change some firewall settings that’s why most of users have sign in problem. All the Older Version of Yahoo Messenger will no longer be able to connect through firewall. So You Need to UPGRADE the Yahoo Messenger with 9.0 Version then you can signin Under Firewall. Download Yahoo Messenger 9.0 Yahoo! Messenger 9.0 . What is a firewall?A firewall is security software that prevents unauthorized access to your computer. Many company networks and some home networks have firewalls to keep their computers more secure. Firewalls protect against viruses and other types of malicious software. Yahoo Trick if you Don’t want o upgrade the Yahoo messenger and you want to run it under firewall setting just change the Connection Preferences

How to Download YouTube Video

Image
1. Open Favorites Video which you want to download 2. Past Video URL and Press OK 3. Select The Video and Press Save When the Download is Complete then you can Convert the video in your required format. after that you can play the video in Computer 1. Slect the saved Video 2. Slect The Video Format 3. Press Ok Button

Conficker Removal Tools, Patches

As every person related to IT field know on Conficker worm effect more than 9 million machines (as per external report) it is pretty impressive for such a classic infection vector. Conficker is a simple worm; it exploits a Microsoft Windows vulnerability, that can only be utilized over a local network as it uses the SMB protocol, ad uses an initial infection vector of running an “autorun” on removable media. In my previous blog I write you and show you in practical that how you can protect your computer from virus. When you insert removable media USB in computer it start automatically and when you click on that USB “Autorun” file run automatically and virus comes in your computer. Now I have some under mentioned patches for flicker ESET >> Conficker Remover BitDefender >> Win32.Worm.Downadup.Gen Remover Microsoft >> Windows Malicious Software Removal Tool Kaspersky >> KidoKiller Spywarevoid >> W32.downadup.c removal tool Symantec >> W32.Downadu

Password Protection

System Security Begins With You There are two classifications of individuals who try to break into computer systems -- hackers and crackers. Hackers are individuals with proficient computer skills who exploit weaknesses in system programming in order control a computer system. Crackers break into computer accounts and damage the system using the privileges that are available to the stolen account or use the stolen account to mask their identity when attempting to break into other computer systems on the local network or the Internet. How can these renegades be foiled? The hacker is stopped by closing down the “holes” the s/he finds. Computer & Telecommunication Services regularly installs software patches to close down security holes and continuously monitors possible break-in points. The cracker is stopped by good password security and good password security is in your hands. Keep your password secure Never tell someone else your password. Richard Stockton College feels so strongl

Site-Map

http://rays-systems.blogspot.com http://rays-systems.blogspot.com/ http://rays-systems.blogspot.com/2009/04/how-to-download-youtube-video.html http://rays-systems.blogspot.com/2009/04/conficker-removal-tools-patches.html http://rays-systems.blogspot.com/2009/04/when-computer-infected-with-virus.html http://rays-systems.blogspot.com/2009/04/yahoo-messenger-sign-in-problem.html http://rays-systems.blogspot.com/2009/04/cracking-windows-xp-password.html http://rays-systems.blogspot.com/2009/07/personal-computer-history.html http://rays-systems.blogspot.com/2009/06/top-10-things-that-put-pretty-girls-off.html http://rays-systems.blogspot.com/2009/06/microsoft-excel-cheat-sheet.html http://rays-systems.blogspot.com/2009/02/generic-host-process_7189.html http://rays-systems.blogspot.com/2009/04/usefull-tip-for-virus-protection.html http://rays-systems.blogspot.com/#sidebar http://rays-systems.blogspot.com/#main http://rays-systems.blogspot.com/feeds/posts/default http://rays-systems.blogspot.