Sunday, July 18, 2010

WINDOWS 7 OEM Genuine Keys

GENERAL INFORMATION: ====================


In browsing around the web, I have found these OEM Windows 7 Genuine keys. These keys will enable
you to successfully activate three different versions of the new Windows 7 Operating System, these
versions are:
= Windows 7: Ultimate = Windows 7: Professional = Windows 7: Home Premium

These keys, however are limited to the Manufacture trademark / brand. The brand / Manufacturer name
for each version is as follows:
*WINDOWS 7 ULTIMATE:
= SAMSUNG = LENOVO = DELL = ACER
*WINDOWS 7 PROFESSIONAL:
= DELL = ACER = HP = SAMSUNG
*WINDOWS 7 HOME PREMIUM:
= SAMSUNG = PACKARD BELL = DELL = ASUS


For the Windows 7 ultimate OEM for Hp, I have found no key as yet, however I have found
some information on this topic that may help you to activate this version using one of the
provided keys. Please refer to the release notes at base of the windows 7 OEM keys notepad
document.





INSTALLATION INSTRUCTIONS: ==========================


Activate your copy of windows 7 with original OEM serials. Please note that all other
cracks and loaders must be removed first



windows 7 ulimate -
SAMSUNG - 49PB6-6BJ6Y-KHGCQ-7DDY6-TF7CD

windows 7 ulimate -
LENOVO - 22TKD-F8XX6-YG69F-9M66D-PMJBM

windows 7 ulimate -
DELL -  
342DG-6YJR8-X92GV-V7DCV-P4K27

windows 7 ulimate -
ACER - FJGCP-4DFJD-GJY49-VJBQ7-HYRR2



windows 7 professional -
DELL - 32KD2-K9CTF-M3DJT-4J3WC-733WD

windows 7 professional -
ACER - YKHFT-KW986-GK4PY-FDWYH-7TP9F

windows 7 professional -
HP - 74T2M-DKDBC-788W3-H689G-6P6GT

windows 7 professional -
SAMSUNG - GMJQF-JC7VC-76HMH-M4RKY-V4HX6




windows 7 Home Premium -
SAMSUNG - CQBVJ-9J697-PWB9R-4K7W4-2BT4J

windows 7 Home Premium -
PACKARD BELL - VQB3X-Q3KP8-WJ2H8-R6B6D-7QJB7

windows 7 Home Premium -
DELL - 6RBBT-F8VPQ-QCPVQ-KHRB8-RMV82

windows 7 Home Premium -
ASUS - 7JQWQ-K6KWQ-BJD6C-K3YVH-DVQJG


RELEASE NOTES: ==============

WINDOWS 7 ULTIMATE OEM KEY - FOR HP PC's:



So far, I haven't yet come across a genuine OEM key for Hp products wishing to run the windows 7 os.
However, I came across the following explanation bundled with the latest windows7 loader:


"There are only 3 known Windows 7 Ultimate OEM:SLP keys at the moment (Dell, Lenovo, Acer)"
"You can use any key on any OEM equipment, as the product keys do not encode the OEM:
the Dell key will work on an Acer computer and vice-versa. In fact, it looks like almost
all OEMs used the exact same key for Vista."


haven't tried this yet cuz I need an external drive to backup my data, but thought I'd pass
it on anyway, let me know if you find something better.
##################################
----------------------------------------------------------
...........................................................................

Saturday, June 26, 2010

ImTOO iPod Computer Transfer 2.1.43.0604 + Serials


                                                                                     

Username : of your own choice



Here are the keys

STX!LZ41723887080ENP3792-E7AA-AAD0-62AC

STX!LZ300078520501BDA3C3-E7BF-A2A1-879

STX!LZ41650477760GXY3ED7-2E73-42F9-EF5D

STX!LZ64207102220TNO5A71-FA0A-0BAC-6DA3

STX!LZ41142568380SLE7AFE-9D73-6C30-E66D

STX!LZ46558842630ZDE176C-1337-29A7-E57

STX!LZ15360264020HRS8A49-2067-3260-816D

STX!LZ474834172108IB42FD-D455-1F29-DC44

STX!LZ81216642220ZLU8AEB-6D51-B40E-6AAD

STX!LZ61436352450QBC126B-EB5F-2557-3ABD


Download ImTOO iPod Computer Transfer 2.1.35.0702
 

EVEREST Ultimate Edition 5.50.2163 Beta + Keys

                                                                              

F8YTCA4B47U14SVJ4S6FSRRMI

I799RV4Z47DG4PDR49EF9EDJQ

4H3WEBIR472E4PU145WF5GH7F

RU5UUKF347YW4PFY49VF9TYUL

U4DTF2CQ47IA4PR94PAFJQIDY

4W35CKFK471X4SY24AIF5MPJ5

IVMFURF547YD4SSV49WF9WYYG

E2KC47CK47GL4P2X4M5FYCX8F

EVPNFSEU4DXX4PLG48GFYWV1C

4A5VUDFX475I4PBM4ACFACJ19


How To Hack bux.to and make money

Bux.to is a PTC site(Paid to click).You get paid to click on ads and visit websites. The process is easy! You simply click a link and view a website for 30 seconds to earn money.In this article i will show you on How to hack bux.to to browse ads.By using this trick you will be able to surf more ads and the most amazing part is that you will not get banned by doing this.


Here is a step by step procedure to
hack bux.to and make money:Step 1:
First of all signup for bux.to account


Hack bux.to







Step 2:
You will need a firefox browser for this hack.

Step3:
Install Greasemonkey Plugin then restart Firefox

Step 4:
Install Bux : Browse Ads script for Greasemonkey.
Hack bux.to








Step 5:
You are almost done just login and click on Surf Ads in your main menu.
Then the script will automatically launch and Browse Ads :
Hack bux.to
..............................................................................................................................................................

Make Your Mobile Phone a PC Remote to Control PC

Hey guys Today I will going to explain How to use your Mobile phone to control your PC from anywhere In the Home. Imagine walking home from work or college, and turning on your favorite music tracks straight from your phone as you walk in the room. So Guys here is the method...

THINGS THAT WE NEED
1. PC with Bluetooth connectivity (If your PC don't have Bluetooth Buy a Bluetooth Dongle it cost only Rs 100)
2. Mobile Phone with Bluetooth Inbuilt.
3. Java Compatibility Mobile Phone.
4. Mobile Witch
(Before you  get started you will need to install both Mobile Application and PC Server.)
5. If Mobile witch is having Problem then use Phone Remote Control (www.blueshareware.com)


What is Mobile Witch??
MobileWitch is a very interesting free of charge computer software that allows you to turn your phone into a Pc Remote Control. It will allow you to access various PC application with your Phone. Now you can easily remote control your PowerPoint presentations, Mouse Cursor or simply explore the content of your computer directly from your mobile phone. To take advantage of this software you will need to have a PC and a phone that support bluetooth to send and receive data.


Key Features include: 

  • Remotely control Mouse, Keyboard, PowerPoint, Winamp, Windows Media Player and much more
  • Get access to your desktop from your phone
  • Bluetooth setup free! Simply connect from your phone
  • Customize your applications through Keymaps or VB and JScripts
  • Supports all PC Bluetooth solutions Toshiba, Windows, BlueSoleil and Widcomm/Brodacom


The software consist of two parts. There is a client and then there is a server which are both programmed in JAVA. The former is located into a J2ME capable mobile phone with Bluetooth capabilities while the latter is placed in the computer you wish to remotely control. So all you need to do is run the software on your mobile phone with Bluetooth™ support and a Bluetooth dongle installed on your computer.



STEPS TO MAKE REMOTE CONTROL



Step 1:

Start the PC Server application first


Step 2:
Start the Mobile Application. On Nokia phones the shortcut is located in Menu/Applications/Collection. The phone will automatically start searching for active devices.
Once both devices are connected you will be abble to acces the Mobilewitch Bluetooth Remote Control Menu from your phone.
From this menu you will be able to control your mouse cursor, keyboard and the following programs, if installed on your computer: Windows Explorer, Firefox, Window Media Player , Internet Explorer, Winamp and Powepoint. Please note that each application you would like to control has to be first started from the computer and needs to be Always On Top of your desktop.
The application does not require any configuration of Bluetooth or Java on both the client or server and the applications it work with are Firefox, Winamp, Windows Media Player, PowerPoint, Internet Explorer and Explorer.

Friday, June 25, 2010

Different Types of Virus and Worms Explained

Today we are going to have a deeper look of these different types like where they store, what they damage,and how to get rid from them?? So Guys read on...





System Sector Viruses 
System sectors are special areas on your disk containing programs that are executed when you boot (start) your PC. System sectors (Master Boot Record and DOS Boot Record) are often targets for viruses. These boot viruses use all of the common viral techniques to infect and hide themselves. They rely on infected floppy disk left in the drive when the computer starts, they can also be "dropped" by some file infectors or Trojans.


Stealth Virus
These viruses evade anti-virus software by intercepting its requests to the operating system.
A virus can hide itself by intercepting the anti-virus software’s request to read the file and passing the request to the virus, instead of the OS. The virus can then return an uninfected version of the file to the anti-virus software, so that it appears as if the file is "clean".
Bootable CD-ROM Virus

These are a new type of virus that destroys the hard disk data content when booted with the infected CD-ROM.
Example: Someone might give you a LINUX BOOTABLE CD-ROM.
When you boot the computer using the CD-ROM, all your data is gone. No Anti-virus can stop this because AV software or the OS is not even loaded when you boot from a CD-ROM.
Self-Modification Virus

Most modern antivirus programs try to find virus-patterns inside ordinary programs by scanning them for virus signatures.
A signature is a characteristic byte-pattern that is part of a certain virus or
family of viruses.
Self-modification viruses employ techniques that make detection by means of signatures difficult or impossible. These viruses modify their code on each infection. (each infected file
contains a different variant of the virus)
Polymorphic Code Virus

A well-written polymorphic virus therefore has no parts that stay the same on each infection.To enable polymorphic code, the virus has to have a polymorphic engine (also called mutating engine or mutation engine). Polymorphic code is a code that mutates while keeping the original algorithm intact.
Metamorphic Virus

Metamorphic viruses rewrite themselves completely each time they are to infect new executables. Metamorphic code is a code that can reprogram itself by translating its own code into a temporary representation, and then back to normal code again.
For example, W32/Simile consisted of over 14000 lines of assembly code, 90% of it is part of the metamorphic engine.



File Extension Virus

File extension viruses change the extensions of files. .TXT is safe as it indicates a pure text file. With extensions turned off if someone sends you a file named BAD.TXT.VBS you will only see BAD.TXT.If you've forgotten that extensions are actually turned off, you might think this is a text file and open it. This is really an executable Visual Basic Script virus file and could do
serious damage .
Countermeasure is to
turn off “Hide file extensions” in Windows.
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................

Monday, May 31, 2010

Translating Binary to Text: The Hard Way



A Tutorial for those willing to Learn


Contents
1. Introduction
2. The Binary System
3. Converting Binary to ASCII (Text)


Introduction:
We’ve all seen binary code. We’ve come to think of them as a bunch of ones and zeroes in long strings…
010010101010101001101011


But these ones and zeroes can also represent decimal numbers. First off, I will show you how to read these numbers as the decimal numbers we’re used to in our daily life. Then, I will show you how to use those numbers and your keypad to translate them into text. Note that your computer doesn’t use the decimal system, so technically, when it converts binary to text, it doesn’t go through the process I will show you. This is just a divertive way of explaining you how the binary system works.


The Binary System:
Here’s a simple example of binary:
10101


Let’s think of the example above as empty slots:
_ _ _ _ _


First off, you read binary from right-to-left. It’s just the way it’s designed. The first slot from the right represents a value of one, the second from the right a value of two, the third from the right a value of four, the fourth from the right a value of eight, the fifth from the right a value of sixteen, and the cycle continues by multiples of 2. This will never change.


By putting a 1 or a 0 in those slots you are either saying you want to corresponding value that’s attached to that slot or you don’t. A 1 means yes, and a 0 means no. For example, putting a zero in the first slot from the right, but a 1 in the second slot from the right means you want a two, but not a one:
_ _ _ 1 0


As such, the number above equals to a decimal value of two.


As an example, let’s say you want to represent eight in binary form. Well, thinking about the slots, you want the first slot to be 0 because you don’t want a one, you want the second slot to also be 0 because you don’t want a two, you want the third slot to also to be 0 because you don’t want a four, but you want the fifth slot to be 1 because you want a value of eight. As such, eight in binary form is:
1 0 0 0 (or simply 1000 without those underlines)


Now it is important to note that the amount of zeroes that precede the first value of one from the left is unimportant. So for example:
1 0 0 0 is the same as 0 0 0 1 0 0 0 (1000 = 000100)


To get it cleared up, here’s another example:
0 1 is the same as 1




Exercises: What do the following equal in decimal terms?
a) 100
b] 000100
c) 100000
d) 0010


Answers:
a) 4
b] 4
c) 32
d) 2


If you got the answers above right, then you pretty much understand the basics of binary.
Let’s now understand how to get the corresponding decimal values to the numbers which are not multiples of 2.


To get the total value of a binary number, add the values corresponding to each slot. So, for example, three in binary would be:
11


The above corresponds to three because if you add the total values of all the slots, that is to say a one from the slot to the right, and a two from the second slot to the right, then it equals three.


As another example, let’s say you want to represent 5 in binary terms. Then you would need a value of one to be added to a value of four, and you would not want a value of two:
101 [Reading from the right: 1(one) + 0(two) + 1(four) = five]


Here’s an additional example:
001011 [Reading from the right: 1(one) + 1(two) + 0(four) + 1(eight) + 0(sixteen) + 0(thirty-two) = eleven)






Exercises: What do the following equal in decimal terms?
a) 11011
b] 110
c) 010101
d) 10110


Answers:
a) 27
b] 6
c) 21
d) 22


If you got the above questions correct [without cheating], then you essentially understand the binary system. Understanding the binary system was the hard part. What follows is pretty easy.


3. Converting Binary to ASCII (Text)
ASCII is essentially the letters, numbers and symbols that are stored in our computers through the use of fonts. When the keyboard relays the buttons you pressed, it sends in a code which is then converted to the ASCII equivalent of “k” or “5” or whatever key you pressed.


Here’s an example of a message “hidden” in binary text:
0100100001100101011011000110110001101111


Now there are only so many letters, numbers and symbols stored for ASCII. Having sets of 8 digits for their binary equivalent is more than enough to represent all of these letters and the like. As such, all strings that represent text like in the above are separated into bits of 8 for simplicity:
01001000 01100101 01101100 01101100 01101111


Okay, so our example message was separated into 8 digit strings. The decimal value for each of these strings in the example was calculated for you.
01001000 = 72
01100101 = 101
01101100 = 108
01101100 = 108
01101111 = 111


The result was 72,101,108,108,111. Now, there is something called the ASCII table. It essentially corresponds to the binary numbers from yore to the equivalent letters/symbols/numbers. But since we found the decimal values of these binary strings, we can use a major shortcut.


By pressing ALT + [The Number], you will get the ASCII equivalent of that number. For example, by pressing the ALT key and at then (while keeping it down) the numbers 72 in any text editor, you will get the corresponding “H” to show up.


Let’s do so for the entire example message:
72 = H
101 = e
108 = l
108 = l
111 = o


So the entire “hidden” message translates to “Hello”.




Exercise: Decode the following message
010000110110111101101110011001110111001001100001011101000111010101101100011000010111010001
101001011011110110111001110011 00100001


Hint: The first step on your way to decoding the message (separated into bytes for you)
01000011 01101111 01101110 01100111 01110010 01100001 01110100 01110101 01101100 01100001 01110100 01101001 01101111 01101110 01110011 00100001




PS. Please note that this is the information as I've come to understand it. As such, it's somewhat easier to understand, but it may not necessarily be accurate. In other words, if another source contradicts what has been indicated here, that source is probably right. This text was completely written up by me, with no other sources for aid. If you wish to distribute this text, feel free to do so, but I would appreciate it if you contacted me first.

Turn off unneeded services and speed up your pc

 here is a list of services that can be turned off
this will speed up your pc a bit

right click my computer
manage
services and applications
services

set these to disabled you will need to reboot for them to take effect if you have a problem with any just reenable them again ie if you have a smart card and you disable it wont work

alerter
application layer gateway service
application management
ati hotkey poller
automatic updates
background intelligent transfer service
clipbook
com+ event system
com+ system application
distributed transaction coordinator
error reporting service
fast user switching compatibility
help and support
human interface device access
imapi cd burning com service
indexing service
internet connection firewall(icf)/internet connecton sharing(ics)
ipsec services
logical disk manager
logical disk manager administrative service
messenger
ms software shadow copy provider
net logon
netmeeting remote desktop sharing
network dde
network dde dsdm
nt lm securtiy support provider
performance logs and alerts
portable media serial number service
qos rsvp
remote desktop help sesson manager
remote registry
removable storage
secondary logon
security accounts manager
server
smart card
smart card helper
ssdp discovery service
system restore service
task scheduler
tcp/ip netbios helper
telnet
terminal services
uninterruptible power supply
universal plug and play device host
upload manager
video proes
volume shadow copy
webclient
windows time
wireless zone configuration
wmi performance adapter
workstation

How to turn MSN Messenger Display Pictures into User Pictures on XP

For the pix you downloaded from MSN
If you’ve ever wanted to turn the display pictures you download from MSN into an account picture (the one that appears in your Start Menu next to your username) for XP here’s how.


1) In messenger Choose ==> Change Display Picture and then ==> Download more pictures.
2) Download the desired images.
3) Open 'Folder Options' in Explorer and make sure you can view Hidden Files and folders.
4) Navigate to X:\Documents and Settings\User_Name\Application Data\Microsoft\MSN Messenger, where X: is the drive XP is on and User_N

Tutorial : How to create a bootable Windows XP SP1 CD (Nero)

How to create a bootable Windows XP SP1 CD (Nero):
Step 1
Create 3 folders - C:\WINXPSP1, C:\SP1106 and C:\XPBOOT
Step 2
Copy the entire Windows XP CD into folder C:\WINXPSP1
Step 3
You will have to download the SP1 Update, which is 133MB.
Rename the Service Pack file to XP-SP1.EXE
Extract the Service Pack from the Ru
Related Posts with Thumbnails
 

|