,

Your IP Address

what is my ip address?

Why iPhone 5 could come early: Verizon iPhone, white, antenna, inventory

Theres nothing seriously wrong with the iPhone 4, nevertheless the stars do not ever we’re in-line to the fourth generation of Apples flagship iPhone. Hence instead of waiting for the typical June rollout for the next generation model in 2011, Apple would do well introducing the iPhone 5 soon C say, January C if for no other reason than shedding the iPhone 4s real and dreamed demons. Even if you iPhone 5 isn’t a serious breakthrough from the iPhone 4 in terms of specs or options, an early on launch is the foremost thing Apple could do at this point to further improve iPhone sales. Here’s why:
3 weeks for three months: You are aware of your smartphone posseses an inventory problem when they’re even making jokes regarding it around the national sports news. Until eventually today, the web await ordering an iPhone 4 was three weeks, since it have been for nearly the iPhone 4s complete existence. Discovering one at an Apple retail store wasn’t anymore of a picnic. Even now, the net wait is perfectly up to a week ahead of it ships, compared with a lot of Apples other goods which ship within twenty-four hours. Several existing iPhone users (3GS, 3G, etc) have already experimented with gather an iPhone 4, deserted mainly because of the preposterous wait times, and decided to really skip the iPhones fourth generation and instead wait for the iPhone 5.
Antenna hangover: The iPhone 4 antenna issue ended up being just pure geek hype (we called that from the first day), nonetheless damage has been done. A lot of frequent people are even now available wondering iPhone 4 users whether there is something wrong with all the reception, which means that sales are still being lost a result of the preconception connected to the iPhone 4 antenna (even Jay Leno was making inaccurate jokes about it) that Apple might do well to only bury the iPhone 4 and start working on the iPhone 5 which could presumptively have a similar (excellent) antenna but without that certain spot.
Carriers: Effortlessly this speak about the iPhone increasing to numerous U.S. carriers noisy . 2011, it begs the question of why Apple is going to be accomplishing this simply months prior to a summer iPhone 5 launch. One school of thought says Apple is disturbing to flourish the iPhone 4 to multiple carriers during the early 2011 since the iPhone 5 won’t occur until late 2011. Another school says the iPhone 5 will arrive early on, and it’ll often be the iPhone 5 widening to even more carriers at the begining of 2011. They will both be wrong, nonetheless they can’t both equally be right.
White iPhone: Remember fondly the white iPhone 4? It exists solely in name, and features because the summer. Shipping a white iPhone 4 nearly a year late might possibly be embarrassing. Which means that would the need to announce which the white iPhone never was coming. But simply looking into iPhone 5 in January will allow Apple to either have the white model on course immediately in the fifth generation, or maybe operate the generational turnover to bury it.
Read more

Make Free Pc to Phone Calls anywhere in the World

Method 1
Most of us have been using voice chat in messengers for very long.It is indeed an excellent way of talking to your friends and relatives for free.But obviously the better option would be if we could make Free Pc to Phone calls.







where you can register for free.After free registration you can make

10 minutes of Free Pc to phone calls anywhere in the world to most landlines and mobiles.
And the nice part about it is that You get 10 minutes of Free Calling Everyday,
not just once.After you register you just have to download a flash plugin and you are ready to make free calls.
But there is just one restriction,the maximum call duration can be only 3 min/call.
The voice clarity is very good.You just need a microphone to make your calls.
A Must try out.Let me know how you find it?
......................................................................................
Method 2:
In This you will hav no restrictions for calling per a day
http://www.globe7.com/
here wat u need to do is to go through the advertisements and
just for viewing them u ll b paid to ur account........
with tat money u can call............................................
best way to call
Read more

Secret Codes for Nokia

Codes :
1) *#06# For checking IMEI(international Mobile Equipment Identity)
2) *#7780# Reset to factory settings
3) *#0000# To view software version
4) *#2820# Bluetooth device address
5) *#746025625# Sim clock allowed status
6) #pw+1234567890+1# Shows if ur sim as any restrictions
Read more

Tips to recover scratched CD's

1. Spread a cloth on a flat surface and place the CD on it.
2. Then, hold the disc with one hand, use the other to wipe the polish into the affected area with a soft cloth.
3. Wait for it to dry and buff using short, brisk strokes along the scratch, not across it.
4. A cloth sold to wipe spectacles or camera lenses will work super m8's.
5. When you can no longersee the scratch,, wash the disc with water and let it dry before playing. Intersting isnt it? Try it right now
I have used toothpaste with good effects before Ive also used car paint cutting compound on deeper scratches. It does leave lots of smaller scratches (as it is a cutting compound after all) but it will remove the worst scratches in most cases.
ya u r gng to b surely befinited by this Operation

* Fingermarks/prints cause 43% of disc problems!
* General wear & tear causes 25% of disc problems!
* Player-related issues cause 15% of disc problems!
* Remaining Others
Read more

Web Publishing with FileMaker and PHP


Web Publishing with FileMaker and PHP
English | 2007 | 432 pages | PDF | 5,4 MB


Whether you are a FileMaker developer who is new to web publishing, a web developer who is new to FileMaker, or a complete beginner looking to put your data online, this book is for you.
In Part I, you learn the basics of how web publishing works and how to write your own HTML and PHP.
In Part II, you learn how to build a FileMaker database and install and configure the FileMaker Server to host the database. In Part III, you learn how to put it all together to create web pages that talk to your database and allow people to view the data and, if you like, modify it. Throughout the book, publishing a FileMaker Product Catalog to the web is used as an example. Each chapter builds on the previous chapter. When you are done, you will have a working website!
Detailed information on how to…
Master web publishing
Read and write basic HTML
Read and write basic PHP
Build a FileMaker database
Install and configure FileMaker Server
Publish your FileMaker data to the web
Work with portals and container fields
Repurpose your FileMaker layouts on the web


Read more

Building a Web Site with Ajax:


Building a Web Site with Ajax: 
Visual QuickProject Guide 
 176 pages | PDF | 2 MB 

Ajax is at the heart of the Web 2.0 revolution. It isn't a technology but, rather, is a technique that leverages other technologies and techniques, such as CSS, XML, DHTML, and XHTML. Many Web designers and programmers would like to incorporate Ajax in their projects because of the amazing functionality it can add to a Web site, but they can't because of the steep learning curve. That's where this book steps in. It makes learning Ajax fun and easy -- a great place to start! Visual QuickProject Guides focus on a single project. In this case the project is creating a business employee directory, like an address book. What's being created is a better, new kind of Web site.


Read more

Build a Better Website - 2010


Build a Better Website - 2010 
English | PDF | 164 pages | 27,2 MB

Your complete guide to web design. Revamped and remastered, this second edition of the popular internet guide reveals the latest tips, modifications and workshops guaranteed to get you building websites like a pro. Presenting comprehensive step-by-step and easy-to-follow advice spanning the initial planning and design of your website right through to maintenance, this magbook shows you how to harness and maximise the power of the internet to create original, effective and eye-catching sites whatever your budget.


Read more

PHP for the World Wide Web:


PHP for the World Wide Web: 
Visual QuickStart Guide, 3rd Edition 
 480 pages | PDF | 10,1 MB 

With PHP for the World Wide Web, Third Edition: Visual QuickStart Guide, readers can start from the beginning to get a tour of the programming language, or look up specific tasks to learn just what they need to know. This task-based visual reference guide uses step-by-step instructions and plenty of screenshots to teach beginning and intermediate users this popular open-source scripting language. Leading technology author Larry Ullman guides readers through the new features in PHP 6, focusing primarily on improved support for handling any language in a Web site.

Other addressed changes include removal of outdated and insecure features, plus new functions and more efficient ways to tackle common needs. Both beginning users, who want a thorough introduction to the technology, and more intermediate users, who are looking for a convenient reference, will find what they need here--in straightforward language and thorough readily accessible examples.



Read more

Advanced PHP for Web Professionals


Advanced PHP for Web Professionals 
 Pages: 368 | CHM | Size: 1,27 MB

Take your PHP programming skills to the next level, with this hands-on, example-rich tutorial! In Advanced PHP for Web Professionals, best-selling PHP author Christopher Cosentino brings together dozens of powerful new techniques for building serious Web applications. Learn how to manage sessions more effectively, create better forms, develop custom error handlers, build database-independent Web applications with PEAR::DB, parse XML files, authenticate users via database query, build cross-platform client apps with PHP-GTK, and much more!

Download Link

Read more

HTML: A Beginner's Guide, Second Edition


HTML: A Beginner's Guide, Second Edition 
550 pages | PDF | 10,3 MB  

Essential skills for first-time programmers! This easy-to-use book explains the  fundamentals of HTML and Web development. The modular approach of this series--including  drills, sample projects, and mastery checks--makes it easy to learn to use this powerful  programming language at your own pace.

Download Link

Read more

Web-based Support Systems


Web-based Support Systems 
 440 pages | PDF | 6,2 MB

The emerging interdisciplinary study of Web-based support systems focuses on the theories, technologies and tools for the design and implementation of Web-based systems that support various human activities.

This book presents the state-of-the-art in Web-based support systems (WSS). The research on WSS is multidisciplinary and focuses on supporting various human activities in different domains/fields based on computer science, information technology, and Web technology. The main goal is to take the opportunities of the Web, to meet the challenges of the Web, to extend the human physical limitations of information processing, and to keep up with the advance of technology advances. This book discusses the four types of existing research: WSS for specific domains, Web-based applications, techniques related to WSS and design, and development of WSS.

This comprehensive, wide-ranging text will provide an invaluable insight into the state of the art in WSS for researchers and graduate students.

Download Link

Read more

Blue Screen on Windows XP setup disc

Figured it out.

Download nLite here - http://www.nliteos.com/

Step 2 : Download SATA drivers

You need to get your hands on the SATA drivers next, that you will need to slipstream into the CD. Although there are different version based on your motherboard that you can search them on intel website which work with most of the motherboards. After downloading extract the driver and remember the location.

Download here - http://downloadcenter.intel.com/conf...Name=&lang=eng


Step 3 : Insert XP CD and start nLite

Now that you successfully have the tools and utilities, we can get down with the real stuff. Launch nLite after inserting Windows XP CD into the drive. Choose to make an image of Windows XP in a directory of your choice. Click next and proceed to skip import or load previous settings step by clicking next and proceed to next step.
Step 4 : Add the SATA driver

On the next page, you will find a “Drivers” tab. Click on it and also check the bootable ISO option and then click on next. Click on the button at the bottom to insert the driver. Give the location to the folder where you extracted the SATA driver. You will find a couple of inf files, select any one of them. Now select the all the driver files. That is it, click Next.
Step 5 : Burn the ISO

You will now be asked for confirmation, select yes and let nLite integrate the driver and create a bootable image. Burn it on a CD by just hitting the Burn button at the bottom and you will be ready to install Windows XP on your laptop!


Really this will work for any driver that needs to be slipstreamed into an xp installation disk.

Read more

Protect computer from virus easily

Computer viruses are deadly. They often spread without any apparent contact and can be a nuisance, or even worse, fatal to your computer. Individuals who create these viruses, estimated at 10-15 new ones a day, are the electronic version of terrorists. Their goal is to inflict havoc and destruction on as many people as possible by disabling, stealing, damaging, or destroying computer and information resources. Often, they have no specific target in mind, so no one is safe. If you access the internet, share files or your computer with others, or load anything from diskettes, CDs, or DVDs onto your computer, you are vulnerable to viruses.

Fortunately, there are good guys working just as hard as the hackers to develop cures for viruses as quickly as they send them off into cyberspace. And there are many things you can do to keep your computer from catching viruses in the first place.

Defining Viruses:

A virus is a small computer program that can copy and spread itself from one computer to another, with or without the help of the user. However, viruses typically do more than just be fruitful and multiply, which is bad enough in itself because it hogs system resources. Anything else viruses are programmed to do, from displaying annoying messages to destroying files, is called their payload. Often, they cannot deliver their payload until an unsuspecting user does something to make the virus execute its programmed function. This could be as simple as clicking on an innocent looking file attachment with the .exe (executable) extension.

Catching a Virus:

Most viruses are spread through e-mail attachments because it's the easiest way to do it. Although Macintosh, Unix, and Linux systems can catch viruses, hackers are particularly keen on exploiting the security weaknesses in anything Microsoft, particularly Microsoft Outlook and Outlook Express. Because of the popularity of this software, hackers get maximum bang for their buck, and they probably get some satisfaction from continually reminding Microsoft that being big doesn't mean you're perfect.

Solution 1: Anti-virus Software

Your first line of defense is to install anti-virus software. To be extra safe, also install firewall software, which is now included in some anti-virus packages. This software can scan all of your drives for viruses and neutralize them. Here are some features to consider when evaluating anti-virus software.

- Compatibility with your operating system - Make sure the software works with your system, particularly if you are using an older operating system like Windows 98.

- Firewall software - If it's not included, find out if it's available. If you must, buy it from another vendor.

- Automatic background protection - This means your software will constantly scan behind the scenes for infections and neutralize them as they appear. This provides some peace of mind.

- Automatic, frequent updates - Because new viruses appear every day, you'll want regular updates. It's even better if they occur automatically when you connect to the internet. If automatic updating isn't included, you'll have to check the vendor's website and download updates yourself. This is vitally important, because you will not be protected from new viruses if your software is out of date.

- Disaster recovery - Software with a recovery utility to help you get your system back to normal after a virus attack is always good to have.

- ICSA certification - The International Computer Security Associatioin has standards for the detection rates of anti-virus software. Make sure your software has the ICSA certification.

- Technical support - It's a good idea to select a package that offers free technical support, either online or through a toll-free number. If you're ever felled by a virus, you may need it. Some anti-virus software vendors are Symantec Corporation (Norton AntiVirus), McAfee Corporation (McAfee VirusScan), Trend Micro Inc. (PC-cillin), and Zone Labs Inc. (Zone Alarm Suite).

Solution 2: The Virus Scan

If you receive a particularly juicy attachment that you're dying to open, save it on your Windows desktop and run your anti-virus software on it first. To do this, click once gently on the file on your desktop ... don't actually open it ... then right click and choose Scan with (Name of Anti-Virus Software) to activate a virus scan.

If it's infected, your anti-virus software may neutralize it, or at least tell you the attachment is too dangerous to open. On the other hand, don't feel guilty if the very thought of saving a potentially damaging file anywhere on your system is enough to quell your eagerness to open it and make you delete it immediately.

Solution 3: Delete first, ask questions later.

When in doubt about the origin of an e-mail, the best thing to do is delete it without previewing or opening it. However, some viruses, such as Klez, propagate by fishing in people's address books and sending themselves from any contact they find to another random contact. You can spread a virus just by having people in your address book, even if you don't actually e-mail them anything. They'll receive it from someone else in your address book, which really makes life confusing. Because of the proliferation of porn on the internet, e-mail viruses often tempt victims by using sexual filenames, such as nudes.exe. Don't fall for it.

Solution 4: Beware of virus hoaxes

E-mails warning you about viruses are almost always hoaxes. You may be tempted to believe them because you typically receive them from well-meaning friends, who received them from friends, etc. These e-mails themselves usually aren't viruses, but some have actually fallen into the hands of hackers who loaded them with viruses and forwarded them merrily on their way as a sick joke.

The proliferation of e-mails about virus hoaxes can become nearly as bad as a real virus. Think about it, if you obey an e-mail that tells you to forward it to everyone in your address book, and they THEY do it, and this goes on long enough, you could bring the internet to its knees. If you ever want to verify a virus warning, your anti-virus vendor may have a list of hoaxes on it website. It's in the business of providing the fixes, so it will know which viruses are real.

Solution 5: Beware of filename extensions

The extension of a filename is the three characters that come after the dot. Windows now defaults to hiding filename extensions, but it isn't a good idea. Just being able to see a suspicious extension and deleting the file before opening it can save you from a virus infection.

To see filename extensions in all your directory listings, on the Windows XP desktop, click Start button | Control Panels | Folder Options | View Tab. Clear the check box for Hide extensions of known file types. Click Apply | OK. System files will still be hidden, but you'll be able to see extensions for all the files you need to be concerned with. Viruses often live on files with these extensions - .vbs, .shs, .pif, .Ink - and they are almost never legitimately used for attachments.

Solution 6: Disable the .shs extension

One dangerous extension you can easily disable is .shs. Windows won't recognize it and will alert you before attempting to open an .shs file. The extension is usually just used for "scrap object" files created in Word and Excell when you highlight text and drag it to the desktop for pasting into other documents. If this isn't something you ever do, or you have Word and Excell 2000 or later, which allow you to have 12 items on the Clipboard, click the Start button | Control Panel | Folder Options | File Types tab. Under Registered file types, scroll down and highlight the SHS extension. Click Delete | Yes | Apply | OK.

Solution 7: Dealing with double extensions

When you turn on your extensions in Windows, you'll be able to detect viruses that piggy-back themselves onto innocent looking files with a double extension, such as happybirthday.doc .exe. NEVER trust a file with a double extension - it goes against Nature.

Solution 8: Beware of unknown .exe files

A virus is a program that must be executed to do its dirty work, so it may have an .exe extension. Unfortunately, this is the same extension used by legitimate program files. So, don't panic if you find files named Word .exe or Excel .exe on your system - they're your Microsoft software. Just don't EVER open any file with an .exe extension if you don't know what the file's purpose is.

Solution 9: Watch out for icons

Viruses in attachment files have been known to assume the shape of familiar looking icons of text or picture files, like the wolf in the hen house. If you recieve an unexpected attachment, don't open it without first running it through your anti-virus software.

Solution 10: Don't download from public newgroups

What better place for a hacker to lurk and stick his virus than in the middle of a crowd? Sooner or later, someone's bound to download it and get the virus going. Don't download files and programs from newsgroups or bulletin boards, or open attachments sent from strangers in chatrooms ("Let's exchange pictures!") without first scanning with your anti-virus software.

Solution 11: Avoid bootleg software

This may seem like a no brainer, but sometimes that tiny price tag on a popular but expensive package can be too good to resist. Resist it! Likewise, be careful about accepting application software from others. You don't know where it's been, and what may have started out as a perfectly clean package could have become infected during installation on someone else's infected computer by virus.

Solution 12: Protect macros in MS Word, Excel, and Powerpoint

A common type of virus uses macros. Macros are sets of stored commands that users can save as shortcuts to perform long functions in just a few keystrokes. A macro virus may perform such mischief as changing file types from text files or spreadsheets into templates, locking up keyboards, and deleting files. Word, Excel, and PowerPoint come with macro virus protection. To make sure yours is activated, open each application, then click Tools menu | Macro | Security. On the Security Level tab, make sure Medium or High is selected. Clcik OK. If you are already infected with a macro virus, you may find that the steps of this procedure are unavailable becasue the virus has disabled them. In that event, run a virus scan on your system to see if your anti-virus software can kill the virus.

Solution 13: Use passwords

If you share your computer, it's a good idea to assign everyone a password. Passwords should be a combination of letters and numbers no less than eight characters long, and preferably nonsensical. Never write passwords and stick them anywhere near the computer. To assign passwords in Windows XP, click the Start button | Control Panel | User Accounts. Follow the prompts to assign/change passwords.

Solution 14: Update application software

Microsoft constantly issues patches for the security holes in its operating system and applications software. however, don't be lulled into complacency if you have Windows Update automatically checking things for you. Update checks for patches to repair bugs in the operating system, not for security problems.
Read more

Cookie Stealing: How to hack an Email Account

I posted articles on Phishing and Keylogging - the two best methods to hack an Email account. Today I am writing about a new topic on Techotoys - Cookie Stealing. I observed that cookie stealing is neglected by some fellow hackers (even I was one of them). But, recently, I discovered that cookie stealing can be pretty handy to hack an Email account. In the following article, I have covered basics ofhow to hack an Email account using Cookie Stealing.
How to hack an Email account

How to hack Email account:


If you are a newbie and don't know about cookie, then for your information, Cookie is a piece of text stored on user computer by websites visited by the user. This stored cookie is used by webserver to identify and authenticate the user. So, if you steal this cookie (which is stored in victim browser) and inject this stealed cookie in your browser, you can imitate victim identity to webserver and enter hisEmail account easily. This is called Session Hijacking. Thus, you can easily hackEmail account using such Cookie stealing hacks.

Tools needed for Cookie stealing attack:


Cookie stealing attack requires two types of tools:
1. Cookie capturing tool
2. Cookie injecting/editing tool

1. Cookie capturing tool:
Suppose, you are running your computer on a LAN. The victim too runs on same LAN. Then, you can use Cookie capturing tool to sniff all the packets to and from victim computer. Some of the packets contain cookie information. These packets can be decoded using Cookie capturing tool and you can easily obtain cookie information necessary to hack Email account. Wireshark and HTTP Debugger Pro softwares can be used to capture cookies.

Update: Check out my Wireshark tutorial for more information on cookie capturing tool.

2. Cookie injecting/editing tool:

Now, once you have successfully captured your victim cookies, you have inject those cookies in your browser. This job is done using Cookie injecting tool. Also, in certain cases after injection, you need to edit cookies which can be done by Cookie editing tool. This cookie injection/editing can be done using simple Firefox addonsAdd N Edit Cookies and Greasemonkey scripts. I will write more on these two tools in my future articles.

Update: Check out my article How to hack Gmail account by Cookie stealing for more information on Cookie injecting tool.

Drawbacks of Cookie Stealing:


Cookie Stealing is neglected because it has some serious drawbacks:

1. Cookie has an expiry time i.e. after certain trigger cookie expires and you cannot use it to hijack victim session. Cookie expiry is implemented in two ways:

a. By assigning specific timestamp(helpful for us).

b. By checking for triggers like user exiting from webbrowser. So, in such cases, whenever user exits from his browser, his cookie expires and our captured cookie becomes useless.

2. Cookie stealing becomes useless in SSL encrypted environment i.e. for https (Secure HTTP) links. But, most Email accounts and social networking sites rarely use https unless vicitm has manually set https as mandatory connection type.

3. Also, most cookies expire once victim hits on LogOut button. So, you have to implement this Cookie stealing hack while user is logged in. But, I think this is not such a serious drawback because most of us have the habit of checking "Remember Me". So, very few people actually log out of their accounts on their PCs.

So friends, this was a short tutorial on basics ofhow to hack Email account using Cookie Stealing.As I have stated, Cookie stealing has some disadvantages. But, I think Cookie stealing is a handy way to hack an Email account. In my next articles, I will posthave posted a detailed tutorial to hack Facebook and Gmail accounts using Cookie stealing. If you have any problem in this tutorial on how to hack Email accountusing Cookie stealing, please mention it in comments.

Enjoy Cookie stealing trick to hack Email account...
Read more

Wireshark Tutorial: Download Free Packet sniffer

Hello friends. We have been talking about Cookie stealing since last few days. As I said in my previous article Cookie Stealing to hack Email accountWireshark is the bestfree packet sniffer softwareever made. So, I am posting this Wireshark tutorial to help you in capturing victim packets using this free packet sniffer software. So,download Wireshark and follow this Wireshark tutorialto hack email account.
Wireshark tutorial logo

Wireshark tutorial to capture cookies:


Wireshark is the best free packet sniffer software available today. Actually, it was developed for making a network secure. But, the same software is now used by hackers to test for vulnerability and security loopholes in the network and to attack the network accordingly. Cookie stealing being one of the types of hacks implemented using this Wireshark software.

Below, I have listed steps on how to capture Facebook cookies. This will help you to know how Wireshark can be used to sniff packets and capture cookies.

1. Free download Wireshark software to capture cookies.
Password: techotoys.blogspot.com

2. Install and run this Wireshark application. Go to Capture -> Interface to see all the interfaces to your computer. Select the interface (usually LAN) and hit on Start so that Wireshark will start capturing all the packets on this interface.

Wireshark tutorial

Note: You can sniff your own packets by selecting your local interface.

3. You will see all the packets captured by Wireshark on the interface.

4. Now, if you wanna capture Facebook cookies, enter: http.cookie contains "datr" in Filter textbox and hit on Enter. Wireshark will filter all the packets as shown:

How to capture facebook cookies

5. Now, look for packet with info "GET/HTTP/1.1". Right click -> Copy -> Bytes(Printable Text Only). In this step you have successfully copied all the contents of victim Facebook account cookie. Now, its time for injecting this copied or stolen cookie in your own browser so that you can hack victim facebook account.

I will post on how to inject this copied cookie in your browser in my next article.

Update: I have posted on how to inject copied cookie in your browser in my article How to hack Facebook account. Check it out for more help on Cookie stealing.

So friends, this was a shortWireshark tutorialexplaining how to use free packet sniffer to capture cookies. I have tried my best to keep this Wireshark tutorial simple. If you find any problem in this Wiresharktutorial, please mention it in comments.

Enjoy hacking facebook using Wireshark tutorial...


Read more