Wednesday, June 29, 2011

This video tutorial series will show you how to build a wooden chessboard. If you follow these seven videos, you'll be playing chess in no time.
You'll go through the steps of making this woodworking project, like designing the top of the wooden chessboard, constructing the chess case and the drawers, assembling the whole chessboard set, prepping the finished product, sealing it and giving a hand-rubbed finish for a beautiful chess game.


This is a video tutorial where you will learn how to change your NAT to OPEN with a Linksys router. Go to your browser and type in 192. 168. 1. 1 and that will take you to the basic set up. The authentication dialog box comes up. Type in ‘admin’ for the username as well as the password. These are default settings. In the Linksys page, go to ‘applications and gaming’ and on the Port Range page fed in these information. Your application you can name anything. Start 80, End 80, Protocol – both and then check your IP address and put in the last 3 digits and click Enable. For the next application, give it a name, Start 3074, End 3074, Protocol – both and the same IP address as the 1st one and click Enable. Then ‘save settings’ and ‘continue’. There you go!


Want to hack a LAN? Well, hacking local area networks is easier than you'd think. And by watching a few short videos, you can become a master hacker, something every techie wants to achieve. And what's the best way to hack a LAN? Ettercap, a password sniffing program.
The program can easily sniff out LAN passwords, and can recognize several different packets that contain passwords. Some of these include HTTP, Telnet, FTP, POP, rlogin, SSH1, ICQ, SMB, MySQL, NNTP, X11, IRC, IMAP, VNC, SNMP, MSN, YMSG, etc.
Also, if you know what "man in the middle attacks" mean, then you'd be happy to know that Ettercap can do that, too. It hijacks packets, redirecting them to the attacker's computer, allowing it to extract the secure LAN passwords. This particular six-part video will outline how to use ARP Poisoning, also known as ARP Spoofing, ARP Flooding and ARP Poison Routing, and it's used to attack both wired and wireless networks, letting you (the attacker) sniff data frames over the LAN. You'll also learn about DHCP Spoofing, Port Stealing MITM Attacks, and using Ettercap to sniff encrypted passwords over the Secure Sock Layer (SSL; HTTPS).
Also, learn how to use Ettercaps plugins, like Check Poison, Re-Poison, DNS Spoofing, Isolate, DoS Attack, Find IP, Gateway Discover, Search Promisc, Arp Cop and Scan Poisoners.



This video tutorial will show you how to bypass, and then change, a Windows XP start-up password. For a detailed run through of this simple Windows log-in hack, watch this video how-to.


This video tutorial demonstrates a simple hack that will allow you to remove the Windows Genuine Advantage Validation software. For step-by-step instructions on removing the Windows XP Validation tool, watch this video guide.


One trick is to go to Control Panel < Display < Settings < Advanced < Troubleshoot < Hardware Acceleration < None < Apply < OK.
That is one method for increasing your video buffering speed. Watch to find out another.


Learn how to bypass proxy servers that block access to certain websites by watching this how-to video. In this case it's done to access Myspace but this method can be used with any blocked website. Follow along with this video tutorial and never get hindered by restricted internet searching again.


In this video, learn how to view private Facebook photos, or photos of those who are NOT your friend, provided they have their photo album privacy settings set to "everyone".




To do this, one must sign up for the application Photo Stalker, which can be downloaded 
Here

How to use the Energy Saver preference pane to program an Apple Mac OS X computer to shut itself off or turn itself on at a specified time. For all of the details, and to get started using this lesser-known trick on your own Mac, watch this video guide.

get more here


Tuesday, June 28, 2011

In this clip, you'll learn how to transfer files to and from Microsoft Windows, Apple Mac OS X & Linux desktop or laptop computers. For more information, including a complete demonstration, and detailed, step-by-step instructions, as well as to get started using this trick yourself, take a look.


For more information, including a complete demonstration, and detailed, step-by-step instructions, as well as to get started using this trick yourself, take a look. In this clip, you'll learn how to use VNC to remotely control an Apple desktop or laptop computer over the web.



For more information, including a complete demonstration, and detailed, step-by-step instructions, as well as to get started using this trick yourself, take a look. In this clip, you'll learn how to set up and use Synergy to control multiple Windows, Mac or Linux computers from a single keyboard and mouse.



Friday, June 24, 2011

This is a totally free and working solution to remove Total Security and any other fake rogue antivirus/antispyware programs. It works for many other rogue antiviruses, not just for Total Security. In the video, I am working with a Virtual PC. The antimalwares he is using to clean the computer are Malwarebytes antimalware and SuperAntiSpyware free edition. You can download/buy these softwares from:
Malwarebytes - http://malwarebytes.org/
SUPERAntiSpyware - http://www.superantispyware.com/
They are both freeware, and they can remove any kind of disturbing rogue antivirus program you have.
Hope this helps all of you. 



Jailbreaking your iPhone, iPod Touch, or iPad is a better idea than ever before!
All you need is a program called Spirit, iTunes version 9.2, and you device and you're good to go! This particular method is great because the jailbreak is untethered, meaning that you can turn your device off and on as much as you want without having to restore it. This is crucial, and yet another reason why you should use this great hack.

From the creator:
Restore your iPod Touch/iPhone/iPad
Plug in your device
FOR WINDOWS USERS: Right-Click on the program, select "Compatibility", and make sure it is in "Windows 98/ME" mode
Open the program
Click Jailbreak
Wait for your device to boot!
**Spirit Fixes (If you get any errors):
1. Download Spirit Fixer by kirma
http://rapidshare.com/files/383018942/Spirit.Fixer.By.Kirma.v1.0.1.rar
2. Extract the downloaded files
3. Run Spirit.Fixer.By.Kirma.v1.01.exe
4. Now run Spirit.exe
-If on Windows, right click on the program, select "Properties", click "Compatibility", then select "98/ME", and re-run the program.
-If getting the iTunes error, try NOT doing compatibility mode.
-If that above still doesn't work, try doing the same steps, but put it in "95" mode for compatibility.
-Even try to run as administrator, and see if it works.
-If you get iTunes errors, try reinstalling iTunes.
-Or, you can just reinstall the program itself and then see if it works.
-Lastly, if you decided not to restore, and it won't work, try restoring and then trying!






Install antivirus and antispyware programs from a trusted source
  • Never download anything in response to a warning from a program you didn't install or don't recognize that claims to protect your PC or offers to remove viruses. It is highly likely to do the opposite.
  • Get reputable anti-malware programs from a vendor you trust.
Update software regularly
Cybercriminals are endlessly inventive in their efforts to exploit vulnerabilities in software, and many software companies work tirelessly to combat these threats. That is why you should:
  • Regularly install updates for all your software—antivirus and antispyware programs, browsers (like Windows Internet Explorer), operating systems (like Windows), and word processing and other programs.
  • Subscribe to automatic software updates whenever they are offered—for example, you can automatically update all Microsoft software.
  • Uninstall software that you don't use. You can remove it using Windows Control Panel.
Use strong passwords and keep them secret
  • Strong passwords are at least 14 characters long and include a combination of letters, numbers, and symbols. Find out how to create them.
  • Don't share passwords with anyone.
  • Don’t use the same password on all sites. If it is stolen, all the information it protects is at risk.
  • Create different strong passwords for the router and the wireless key of your wireless connection at home. Find out how from the company that provides your router.
Never turn off your firewall
A firewall puts a protective barrier between your computer and the Internet. Turning it off for even a minute increases the risk that your PC will be infected with malware.
Use flash drives cautiously
Minimize the chance that you'll infect your computer with malware:
  • Don't put an unknown flash (or thumb) drive into your PC.
  • Hold down the SHIFT key when you insert the drive into your computer. If you forget to do this, click Close in the upper-right corner to close any flash drive-related pop-up windows.
  • Don't open files on your drive that you're not expecting.

Into downloading malware, don't be tricked

Instead, follow this advice:
  • Be very cautious about opening attachments or clicking links in email or IM, or in posts on social networks (like Facebook)—even if you know the sender. Call to ask if a friend sent it; if not, delete it or close the IM window.
  • Avoid clicking Agree, OK, or I accept in banner ads, in unexpected pop-up windows or warnings, on websites that may not seem legitimate, or in offers to remove spyware or viruses.
    • Instead, press CTRL + F4 on your keyboard.
    • If that doesn’t close the window, press ALT + F4 on your keyboard to close the browser. If asked, close all tabs and don’t save any tabs for the next time you start the browser.
  • Only download software from websites you trust. Be cautious of "free" offers of music, games, videos, and the like. They are notorious for including malware in the download.

    To help secure your computer against malware:
  • Build up your computer's defenses
  • Do not be tricked into downloading malware

Wednesday, June 22, 2011

 To pop a banner which can contain any message you want to display just before a user is going to log on, go to the key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WinLogon
 Now create a new string Value in the right pane named LegalNoticeCaption and enter the value that you want to see in the Menu Bar.
Now create yet another new string value and name it:
   LegalNoticeText
Modify it and insert the message you want to display each time Windows boots. This can be effectively used to display the company's private policy each time the user logs on to his NT box.
 It's .reg file would be:
REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Winlogon] "LegalNoticeCaption"="Caption here."


Suppose you want to lock the folder images in d: which has the path D:\movies.
In the same drive create a text file and type:

ren images images.{21EC2020-3AEA-1069-A2DD-08002B30309D}
Now save this text file as loc.bat
Create another text file and type in it
ren images.{21EC2020-3AEA-1069-A2DD-08002B30309D} images
Now save this text file as key.bat
     Now you can see 2 batch files loc and key. Press loc and the folder movies will change to control panel and you cannot view its contents. Press key and you will get back your original folder.


To add or remove programs in the Registry
1.Open Regedit  Start-->Run-->regedit
2.Go to the desired Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
3. Add a new String Value and name it anything you like
4. For the value data, enter the path and executable for the program you want to run.
By adding the value to the HKEY_CURRENT_USER hive instead allows the program to start only when that user is logged on.
If you add the value to the RunOnce key the program will run once and be removed from the key by Windows.


Start Regedit
Go to HKEY_CURRENT_USER\Control Panel\Sound
Edit the key Beep and give it a value of No


Go to Start Menu and Click Run
Type in regedit then click ok
Find "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOptimizeFunction"
Select "Enable" from the list on the right
Right on it and select "Modify"
Change the value to Y .
Reboot your Pc and see the change yourself.

The method doesn't require ip addresses and won't spawn noxious viruses so you won't be greeted by an angry knock at your door after the fact.
Watch this video to learn how to quickly shut down someone else's computer from your own.



This video shows you how to get this fake virus working, step-by-step, so your unsuspecting prey will accidently shut down there computer unknowing that it is not a real virus, but a fake one.It also shows you how to email or AIM this prank virus to a friend.


You'll learn with this video tutorial,  how to hack demo versions of applications such that they'll run indefinitely. You must be outline at their running moment, You'll just need to modify the date and time on your computer. Learn how to use trials of programs without them ever expiring instead of buying the real thing with the hack outlined in this how-to video.


Sunday, June 19, 2011

This booster is a parabolic reflector made to focus a signal so it is stronger and can project farther. This is perfect if your wireless router is awkward and cannot broadcast a wifi signal to the far reaches of your home. This is called the windsurfer. 



This is a parabolic antenna to reflect the signal in the direction of your laptop, because paper rolls in a circle to close modem will help to increase the interference WiFi up a lot. This helps to increase your WiFI range and signal strength is low.



This is one of many ways to recycle a satellite dish. You'll learn how to hack an old satellite dish into a biquad WiFi antennaIn this video tutorial.





How to hack a WiFi USB adapter for better reception

 This video tutorial demonstrates a simple hack for improving the WiFi reception of a USB adapter. To replicate this hack yourself, you'll need the following materials: (1) a WiFi USB adapter, (2) a USB extension cable, (3) a metal strainer, and (4) a pair of scissors. For detailed, step-by-step instructions on improving your WiFi adapter's signal levels, watch this how-to video.





Watch this video and follow these instructions to learn how to set up an Xbox 360 controller to work with your tablet wirelessly. Play all of your favorite emulator games. 



Here the instructions:
To restore your iphone without upgrading the firmware... follow these steps

you would need
1) the original firmware.ipsw
2) the most updated firmware.ipsw

To start -

1) run itunes, and plug in your iphone
2) open itune working directory,
C:\Documents and Settings\*****\Application Data\Apple Computer\iTunes\iPhone Software Updates
3) if you have downloaded the software updates for your iphone, it should appear in this directory
4) put your iphone in recovery mode (power+home 25sec)
5) itunes will need to restore your phone, click restore
6) itunes will ask to check the internet for updates, click Check
SKIP To 8 if you have already downloaded the updated firmware
7) wait for download to finish (donot click restore and update yet!)
HERE the simple trick (if itunes starts to unpack already..then uve done it wrong..click cancel)
8) rename your the original firmware.ipsw to same name as the updated firmware.ipsw
9) copy your renmaed original firmware to the C:\Documents and Settings\*****\Application Data\Apple Computer\iTunes\iPhone Software Updates overwriting the updated firmware
10) click restore and update and it should unpack the original firmware and reflash.


Friday, June 17, 2011

Recommended Hardware

The following recommendations are based on our experience with active customer installations. If you have a favorite brand or spare camera not on our list, give it a try.

For Participants at Their Own Desktop


USB Webcams

Microsoft HD Camera Microsoft® HD Lifecam
This is a USB 2.0 webcam that captures video at up to HD 720p.
[Read Lifecam Review]
Logitech® HD Pro C910
Ideal for PCs and small conference rooms providing crystal clear images with lots of detail at up to HD 720p sustained, the maximum w/ USB 2.0.
[Read C910 Review]
Facevsion™ N1
The N1 provides great clarity with superb wide-angle field of view. This camera is capable of 30 fps at 1280x720p sustained. Since our N1 review, Facevsion also started shipping the E1 and L2, both HD 720p.
[Read N1 Review]
Logitech QuickCam Pro 9000
Ideal for PCs with large LCD monitors. This is the most popular standard definition webcam for use with Nefsis.
[Read Quickcam Review]
Logitech Quickcam Orbit AF
For PC desktops. This camera offers pan-and-tilt tracking, it is good for speakers and trainers that move around during live meetings. It can also be used as an entry-level conference room camera. See below for more conference room equipment recommendations.
Logitech Webcam C905
Ideal for laptops.
For the latest Windows Vista and Windows 7 devices drivers, please click Logitech to retrieve the latest updates

USB Headsets

Headsets are strongly recommended for


Camera 10x offered by LifeSize® Camera is designed to support and enhance HD video communication by providing lifelike video quality through 10x optical zoom, better low-light handling in medium and large spaces, and support for Full 1080p HD at 30 frames per second. LifeSize Camera 10x, bundled with any of the LifeSize® 220™ series offerings perfectly captures every gesture and facial expression – so detailed and true to life, it’s as if you are there. 

     With smooth, quiet Pan/Tilt/Zoom handling and the anti-glare visor, LifeSize Camera 10x ensures that conference participants and the information being shared remain the focus of the HD video call. LifeSize Camera 10x is the ideal choice for a truly collaborative, true-to-life communication experience.

Key Features:

  • Improved Pan/Tilt/Zoom functionality - Smoother operational handling for more lifelike interactions
  • Full 1080p30 HD and increased zoom capability - HD video quality for large meeting rooms
  • Improved low-light handling sensor –- Better quality video in low-light environments
  • Antiglare visor and lens coating –- Reduced light glare on lens to ensure more productive HD video communications
  • HDMI video out support - Support for cable lengths up to 170 feet (52 meters)


Thursday, June 16, 2011

Manually:

If your microphone is a standard 3.5 jack plug , you should be able to connect directly into a "in"  ( if your speakers are somewhat consistent ). There are splitters in jack which, combined with converters if your microphone is taken to another format. You will lose a little quality, but this system to the advantage of being simple and quick to implement.

A power jack 3.5 standard:




Converter :






Remover of lining:



 




With the computer

First , make sure your microphone is properly connected and recognized :

     * In Control Panel , click " Sounds and Audio Devices " (" sound " in Vista and Seven)
     * Then go to "Register " if yousee your mic connected, it's perfect. Otherwise , make sure the cables / plugs ...









* Click on "Properties" you will find several settings that can be useful later ( including the amplifier !)








G eneral solution:

  * Download Audacity  ( freeware) if you have not.


  * Once installed, open it and click on "Edit" "Preferences" " I / O " .
  * Click on "Passage audio software ."





  * Download the file and save the lame_enc.dll ductions">on the desktop ( or elsewhere, as you find it ...)
   * Open "My Computer ", " Drive ductions">C", " Program Files" (or Programs in Vista ) and find the folder named " Audacity ."
   * Copy the file lame_enc.dll inside. After that , you can delete the original.

Windows Seven

     * In Control Panel , click " Sounds and Audio Devices " (" sound " in Vista and Seven)
     * Then go to "Registration" and then "Properties" and check the " Listen to this device ."

Special cases

Some sound cards have drivers that are their own and settings that can be made in the control panel of this driver. This is the time for you to try to understand , test, or even to search the Internet , bearing the name of the driver , special solutions. But note that the trick of Audacity is valid at all; )
In the Control Panel :
  •      Double- click Administrative Tools ,
  •      Click on Computer Management
  •      Click on Disk Management .
           If the external hard drive appears:
                 +      it is necessary to partition and then format it to appear in the workplace .
           * If the disc does not appear :
                 + Test with a different USB cable
                 + Try to unplug the drive , turn it off , reconnect , then turn it on
                 + Install the latest drivers from the motherboard , including USB drivers !
                 + Check the manufacturer's website if the hard drive have no specific drivers .  
                    Also check if it does not offer a section with answers to  FAQ
                 + Check ( if possible ) the jumper in the rack (SATA1/SATA2 for Sata disk ) or
                    position it on the master ( IDE Disk )
                 + Connect the hard drive housing directly on the motherboard (or another box ) to
                    check if the failure is due to the housing or the HDD



Principle of anonymous surfing
The only way to make a anonymous surfing is therefore to go through an intermediary server that connects to the web sites you visit for you and return you to turn the pages. This server is called agent or proxy,
For your provider: you always connect to the same server, ie the proxy for the remote site, you do not exist, the proxy server that connects.
The only limitations of this system are the constraints of an intermediary, namely:

    
* A connection time longer, because the packet must travel from your computer to the proxy and the proxy to the website, then the same in return, not counting the processing time by the proxy server itself!
    
* Uncertainty as to the third party, for no one knows who is behind the proxy and the data passing through the intermediary will not be intercepted and reused so malicious.
Solutions to surf anonymously
There are several ways to surf anonymously:

    
* Use the services of an anonymous website, displaying page views in its own interface
    
* Use an anonymous software.

Websites anonymous browsing
The main anonymous surfing sites are:

    
* Http://www.idzap.com/
    
* Http://www.netscop.net/ (anonymous surfing service free and paid)
    
* Http://www.zend2.com/
    
* Http://www.youhide.com/
    
* Http://www.free-proxy.fr/
    
* Http://kproxy.com/
    
* Http://proxify.co.uk/
Anonymous surfing software
The main software anonymous surfing are:

    
* Torpark, a derivative of the portable version of the popular browser Mozilla Firefox, set to use a network of routers, called "onion rings" (literally, onion rings) randomly exchanging encrypted data to cover their tracks.
        
Download Torpark
    
* JAP (Java Anon Proxy) is a tool developed in Java, so multi-platform, to manage a list of proxies in cascades, that is to say a list of servers acting as an intermediary to ensure the anonymity of the user throughout the visit.
        
Download Jap
    
* Tor is a toolset for a wide range of organizations and individuals seeking to improve the privacy and security of their trade on the Internet. Compatible with Windows, GNU / Linux and Mac. A complete tutorial (operation and use) is available here: Understand and use Tor to protect his identity.
          *
Tor + official website
          
* Privoxy (for Web browsing)
         
* Torbutton (Firefox extension)
    
* UltraSurf is a free software that lets you access the Internet anonymously. Very easy to use, it requires no installation.
          


Download UltraSurf
-->
Cover his tracks by local
The solutions presented above allow to avoid leaving traces of its IP address at the remote site, but still the problem traces locally in the browser. Indeed, when surfing, the browser stores cookies, temporary files (cache), but also keeps the history of pages visited. To be sure to be anonymous should either use a mobile browser, stored on the USB key, in which case the data remains in a place that belongs to you, or cover his tracks. To do this:

    
* Clear Internet cache
    
* Manage cookies
    
* Delete Search History
  
* The software allows CCleaner to empty the cache at one time for different browsers (IE, Opera, Firefox, ...) and cleans a lot of other information stored on the system.

Wednesday, June 15, 2011

 Why change the hosts file?



The hosts file is consulted each time you connect to a website, much like a directory of addresses. If the site is listed in the list of hosts file, access is blocked if the address is 127.0.0.1. By cons, if not found in the file, your provider (ISP) which connects with the IP address of the site requested.
By modifying the hosts file, you can:Prohibit access to certain sites,accelerate access to the sites you prefer and which you know the IP address,circumvent the prohibition of access to security sites caused by some malware.
Change the hosts file is simple, free, harmless and reversible.

How to modify the hosts file?
Where is the original hosts file?
The original hosts file is located here:
 
C: \ WINDOWS \ system32 \ drivers \ etc \ hosts
What does it contain?
It should contain this if it is intact:
 ---------------------------------------------------------------------------------------------------
 
Copyright (c) 1993-1999 Microsoft Corp..## This is a sample HOSTS file used by Microsoft TCP / IP# For Windows.## This file contains the mappings of IP addresses to host names.Each # entry should be on an individual line. The IP address should be placed# In the first column followed by the corresponding host name.Address# IP and host name should be separated by a space.## Additionally, comments (such as this one) may be inserted on individual# Lines or following the machine name. They are indicated by the# '#' Symbol.## For example:## # Source server 102.54.94.97 rhino.acme.com38.25.63.10 x.acme.com # # x client host
127.0.0.1 localhost
-------------------------------------------------------------------------------------------------------
If you have the same text as above, it is clean, but it does not serve much!

Modification method


The first thing to do is open your favorite text editor such as notepad in administrator mode. This is done by clicking the Start Menu -> right click on WordPad for example -> Run as administrator.


Once the text editor open, go to File -> Open and navigate to the host file (C: \ WINDOWS \ system32 \ drivers \ etc \ hosts).
Now let's do something useful, add sites to block:Select this: (note that within a tablulation (TAB) between 127.0.0.1 gromozon.com)
127.0.0.1 gromozon.com127.0.0.1 xearl.com127.0.0.1 td8eau9td.com127.0.0.1 mioctad.com127.0.0.1 mufxggfi.com127.0.0.1 uv97vqm3.com127.0.0.1 coeds.com *127.0.0.1 lah3bum9.com *127.0.0.1 cvoesdjd.com *
Once completed, your file should be like this:


Obviously you can add all the addresses you want.
There are also lists of hosts made all ...Be careful though, if your hosts file becomes large, it may be a problem with the service ClientDNS of Windows that would duplicate (which puts a 99% svchost process in your Task Manager), therefore, caution ....
We just have to disable this service if you wish to use a large hosts file:Start / Run / type services.msc / search the right column ClientDNS / set "disable"
Example here:
26,000 entries.
Wait until the file is completely loaded, then choose Save As:C: \ Windows \ system32 \ drivers \ etc \ hosts
http://speedweb1.free.fr/download/secu/hosts.ZIP file (8 Mega)
Some addresses are blocked in your firewall:(IP Range)
To summarize, if you stumble on the Net on one of these places, right columns, the computer will redirect to 127.0.0.1 (your computer's IP)Try pasting the line 127.0.0.1 in your Explorer to see the result!
195.225.176.0 - 19522517925585.255.112.0 - 85,255,127,25566.230.175.0 - 66,230,175,255
Restore the hosts file to its original state
Some malware modifies the hosts file to redirect to another server, usually trapped. They can also block access to useful sites, such as anti-virus online, so as to make the disinfection of the machine more difficults.To restore the hosts file to its original state, you can use one of these programs:
1 / myhost (from jeanmimigab):
Its main advantage is its compatibility Windows 95 / 98 / ME / 2000 / XP / Vista / 7Just download it and run it.Note: No need to disable UAC or run as administrator under Vista / 7.Official Website myhost(Article posted by philo2100)
2 / RstHosts (of Xplode)
Like myhost, RstHosts is compatible with Windows 95 / 98 / ME / 2000 / XP / Vista / 7 (x86 and x64)RstHosts download at this addressStart, then click [Restore].

3 / Hoster:Hoster Download here: http://www.funkytoad.com/download/HostsXpert.zipUnzip the file on the desktop.Run Hoster and click Restore Microsoft's Hosts File
4 / Rogue Killer

Rogue Killer Download here: http://www.sur-la-toile.com/RogueKiller/Run the downloaded fileAt the command prompt, select option 3 "Restore the Hosts
5 / Zeb restore under Windows 2000 and XP
link here: http://telechargement.zebulon.fr/zeb-restore.html
6 / ZhpfixZhpfix ZHPDiag supplied to restore the host file by using the Hostfix (outlined in pink in the picture)


Sunday, June 12, 2011


Step 1.
For minimum of a year, administer a minimum number of five websites. Linking them together is not a good idea. They should be completely separate, making no possibilities of contaminating one another.
Step 2.
Take a scientific approach to your problems. Try to come up with your own theories and techniques. Test them out, note the results, make changes, test it out again, and just keep doing that. Observe how the search engines are working to bring up your websites and try to incorporate that to your SEO techniques.
Step 3.
Rigorously find a better way to get the right keywords.
Yet again to your potential customers' minds. This is not just about looking for keywords that are low in competition, but rather researching and contemplating which were combinations that your customers will likely use to search the contents on your website.
Step 4.
Just stick with one tool that really works for you. There are numerous tools out in the web and off-line which claims to drive your website to the top of the search results. Dumbest thing you can do is to buy and use many or even all of them (not that it's possible). Find the one that you can work comfortably with and stick with it. Try to figure out the best way to

Saturday, June 11, 2011

In this episode of Lab Rats TV, Andy and Sean show you how to recover your deleted data (and your marriage!) using oranges. For detailed instructions on recovering your own lost data, take a look at this tech how-to. 

You may have lost your files but you needn't loose hope, too.



Using TeamViewer

The easiest way to access your computer remotely is using TeamViewer. Firstly, it is free for personal use. Secondly, you can connect to any computer, Mac, Windows, or Linux, using any other computer or your iPod touch or iPhone. Thirdly, it doesn't require playing with settings in your router. And finally, it uses AES 256bit encryption, the same security standard used by SSL sites. Heres how to set it up:
Step 1.  
Download and install TeamViewer on your computer. Be sure to use the all-in-one version. You will also need to install it on your iPod/iPhone, or any remote computer you will be using to access your computer.
Step 2. 
Open TeamViewer. Go into options/preferences, and under the general tab, in the startup box, put in a startup password. This is the password you will use to access your computer. On Windows, click the boxes labelled "start with Windows" and "minimize to tray." On Macs, go into system preferences -> accounts -> login items, and add TeamViewer there.
Step 3. 
Take note of the ID under wait for session (should be ### ### ###), as well as the password you entered in Step 2.
Step 4. 
After installing TeamViewer on a remote computer, enter your ID and password. If your home computer is on, and teamviewer is running (as it should), your home computer's screen will show in a window on the remote computer.

Using Remote Desktop or a VNC Server

Some advanced users may prefer using a VNC server to Teamviewer. 

Step 1. 
PC users: If you are running Windows XP Home, you can use Microsoft's Remote Desktop software or install a free VNC server like TightVNC. Windows XP Pro and Windows Vista or later have Remote Desktop Connection built into it. Simply right-click on "My Computer", select "Properties" and click on the "Remote" tab. Check the box to enable remote access.
Mac OS X users: Macs have a remote screen sharing program built in. If you want to share your Windows desktop from your Mac, download Microsoft's Remote Desktop Connection software for Mac OS X.
Step 2. 
Sign up for a domain name service like DynDNS, which lets you assign an easy-to-remember name (adrienne.is-a-geek .net, for example) to your home connection's ever-changing IP address. For in-depth instructions, see our article Set Up Dynamic DNS.
Step 3. 
Configure port forwarding on your home router to allow remote access. Check your router's user manual for directions, or visit your router's page on portforward.com for specific instructions. Don't have a router? Try a web-based app like LogMeIn. Note: the default port for Remote Desktop on Windows XP is 3389.
Step 4. 
If you don't want to use the operating system's remote desktop software (mentioned in Step 1), install a VNC viewer on the remote machine instead. For Macs, try JollysFastVNC. For PCs, TightVNC's viewer component is good. Now simply enter your home computer's domain name and you're in!
Step 5. 
Remember: VNC isn't secure. If you're worried about eavesdroppers, ask someone even geekier than us to help you set up an encrypted SSH tunnel. Doug Bowman has an informative article about setting up SSHTM on a Mac. We recommend running your remote desktop through a non-standard port and pick solid passwords. Beware: there are bots that try common usernames and passwords on public IP addresses. 
Get more here