Saturday, December 11, 2010


Theoretical quantum physicst are having some problems because their theories are falling short of the observed fact. The "oh my god" particle is a form of radiation with so much energy that there is no way that scientist can explain it, These particles are observed in gamma ray showers or to be very accurate, extreme energy cosmic rays. Apart from being unable to explain how the particles have such a high energies, the scientists are at a loss to explain where the particles come from. Although not proven, the most likely candidate for the origin of these particles are supermassive blackholes in the center of galaxies. Scientists have almost no proof for these claims though, and it is equally probable that there is Ultra-high-energy cosmic ray gun at every galactic center.

Monday, August 2, 2010


Recently I have found this interesting trick that will make your pdf file speak to you. To do this just follow the following steps:-

1. First of all, you need to download adobe reader (if you don't have already).

2. Now open any pdf file using adobe reader.

3. Click on view menu and then goto option "read out loud".

3. A submenu will open. Click on "activate read out loud".

4. Now again go to option "read out loud" and select the desired option.

Thats it. Your pdf file is talking to you.......

Thursday, July 29, 2010


Usually you are not allowed to change the name of the registered user or company. But now with this regestry hack you can change the name of the registered user or company. To do that just follow the following steps:-

1. Click on start and then run.

2. Type "regedit" without the quotes and press enter.

3. Now browse to HKEY_LOCAL_MACHINE >> Software >> Microsoft >> Windows NT >> CurrentVersion.

4. Look for the Registeredowner and registeredorganization.

5. Initially it will have the original owner and organizayion name.

6. To change it just double click on them and change the value.


Usuallly you cannot change the location of specific folder(like My documents, favourates, pictures etc.). It is restricted by default. But a little bit of registry hack you will be able to change the location of those specific folder. To do this just follow the following steps:-

1. Click on start and then run.

2. Type "regedit".

3. Browse to HKEY_CURRENT_USER >> Software >> Microsoft >> Windows >> CurrentVersion >> Explorer >> User Shell Folders.

4. Double click on any file and change the path of that file.

5. Restart your computer.

That's it you have just now change the location of special folder.

Tuesday, July 27, 2010


We all copy various data by using ctrl+c for pasting somewhere else. But do you know these copied data are stored in clipboard which are easily accessibe over the internet by the use of some javascript and ASP.

If you don't beleive just try out this:-
1) Copy any text by using ctrl+c.
2) Open your web browser and go to site:
3) You will see the text you copied on the Screen as it is accessed by this web page.

So, do not keep sensitive data (like passwords, creditcard numbers, PIN etc.) in the clipboard while brwosing the internet as it can be easily extracted to steal your sensitive datas. If sufficient data is stored by mistake it would give away confidential and important information without you even know about it.

So how to protect from yourself from this. Just follow the following steps:

1. Go to internet options >> security.

2. Press custom level.

3. In the security settings, select disable under Allow paste operations via script.

Thats it....Now the contents of your clipboard are safe. Now you can browse safely and securely.

Thursday, July 22, 2010


Gmail has introduced a neew feature that lets you browse your mail offline.

Today we will see how to do that.

• For this first of all you need to install GOOGLE GEARS. You can download it from here. http://gears

• Run the online installer or save the file and then double click it install it on your system.

• Now open your gmail and navigate to the settings and then to the labs tab.

• There you will find a feature called offline. Enable that.

• It will ask your permission to install offline access for gmail. Click next.

• After that you will get a google fear securitywarning, allow it.

• Click ok in the next window and thats it you are done. It will download all
your mails to your hard drive for offline browsing.

Have fun browsing gmail offline.

Thursday, July 8, 2010


As you know Google is the worlds most popular and powerful search engine having the ability to accept predefined commands and produce unbelievable results. Hackers use this search engine in a specific way to gather confidential or sensitive information.

I am going to discuss Google special commands which a hacker uses to gather confidential data...

N.B. This is for educational purpose only. I will not be responsible for any illegal activity you commit and get busted....

[ intitle: ]

intitle: this command restricts your search to the title of the web pages.

allintitle: it searches the WebPages in which all the words are included in the title of the web pages.

e.g. "intitle: login password" will show that results in which the web pages have the word "login" in their title and "password" anywhere in that page.

[ inurl: ]

inurl: this command restricts your search to the urls of the web pages.

allurl: it searches the web pages in which all the words are included in the url of the web pages.

e.g. "allinurl: etc/passwd" will show the results in which the web pages contains the word "etc" and "passwd" in its url.

[ intext: ]

intext: this will search for the words in body text only ignoring the title and urls of the web pages.

e.g. "intext: hacked" will display only those results which has the word hacked in its body text.

[ site: ]

site: it will restrict your search for a certain keyword in a site or domain.

e.g. "hacked site:" will search for the keyword hacked in all the links of the domain

[ link: ]

link: it will return the list of WebPages which are linked to a specified urls.

e.g. "" will list the WebPages that have links pointing to forex homepage.

[ related: ]

related: this will list the WebPages that are similar to the specified WebPages.

e.g. "" will display the list of urls which are similar to forex homepage.

[cache: ]

cache: this syntax will return or finds a copy of the page that Google indexed even if that page is no longer available at its original URL or has been changed its component completely.

e.g. "" will show Google cache of forex homepage.

[ filetype: ]

filetype: this will restrict the search for the files with a particular extension.

e.g. "filetype:doc site:gov confidential" will search for the file with extension ".doc" in all government domains containing the word "confidential" either in that page or in that file.

Wednesday, June 2, 2010



You have to create a folder and hide it for your secret information, right. Yes obviously, that's why you are here. Now I wil tell you how to do that. Its very easy. Just follow yhe following steps----

• First of all you have to make a folder(Obviously withoiut making a folder you can not hide it).
• Now while naming the folder just press alt key and type "0160" from the numeric keypad without the quotes.This will create an invisible space which will appear as if it has no name.
• Now right click on that folder and click on properties.
• Now, Click on customize tab and then click on change icon.
• Scroll along and you will find a few blank spaces.Click on any one and click ok.
• When you have saved the settings your folder will become invisible.
• Now enjoy hiding your secret files.

To make your folders hidden:-

• Right click your folder.
• Click on Properties.
• Check the “Hidden” option and click on apply and then ok.
In case of windows xp
• Click on views menu and then folder option.
• Click on views tab.
• Now click on “Donot show hidden files” option.
In case of windows vista
• Click on organize menu and then click on “folder and search option”.
• Goto Views tab.
• Select “Donot show hidden files” option.

To make your folders unhidden:-
In case of windows xp
• Click on views menu and then folder option.
• Click on views tab.
• Now click on “Show hidden files” option.
In case of windows vista
• Click on organize menu and then click on “folder and search option”.
• Go to Views tab.
• Select “Show hidden files” option.


Do you want to know for how long time your syaatem has been runnig.The do as follows -

1. Open command prompt (click on stsrt>>run>>type “cmd” without quotes and press enter).

2. Type “systeminfo” without the quotes and press enter,

3. Scroll down to the line where it says “system up time”.This will tell you in days, hours, minutes and seconds how long the system has been up.

But this will only work in windows xp pro and not in xp home.For xp home in case of xp home type “net statistics workstation” without the quotes in place of “systeminfo”.The first line will tell you the day and time that the system has up


Is your PC restarting automatically and continuously. Can’t understand what to do. Just follow the following steps -

1. Press alt key and double click the My computer icon to open the system properties dialog box.

2. On the advanced tab, under the Startup and Recovery section click on settings.

3. under system failure section, uncheck “Automatically restart” option.

4. Click ok and then ok again.

Your PC will stop restarting again…….enjoy……


To Delete An “undeletable” File just follwo the following steps:-


1.Open a Command Prompt window and leave it open.

2.Close all open programs.

3.Click Start, Run and enter TASKMGR.EXE

4.Go to the Processes tab and End Process on Explorer.exe.

5.Leave Task Manager open.

6.Go back to the Command Prompt window and change to the directory the AVI (or other
undeletable file) is located in.

7.At the command prompt type DEL where is the file you wish to delete.

8.Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the GUI shell.

9.Close Task Manager.


1.Open Notepad.exe

2.Click File>Save As..>

3.locate the folder where ur undeletable file is

4.Choose ‘All files’ from the file type box once on the file u wanna delete so its name appears in the ‘filename’ box

6.Put a ” at the start and end of the filename
(the filename should have the extension of the undeletable file so it will overwrite it) save,It should ask u to overwrite the existing file, choose yes and u can delete it as normal


1. Start

2. Run

3. Type: command

4. To move into a directory type: cd c:\*** (The stars stand for your folder)

5. If you cannot access the folder because it has spaces for example Program Files or pratik bluez folder you have to do the following. instead of typing in the full folder name only take the first 6 letters then put a ~ and then 1 without spaces.

Example: cd c:\progra~1\pratik~1

6. Once your in the folder the non-deletable file it in type in dir – a list will come up with everything inside.

7. Now to delete the file type in del ***.bmp, txt, jpg, avi, etc… And if the file name has spaces you would use the special 1st 6 letters followed by a ~ and a 1 rule. Example: if your file name was bad file.bmp you would type once in the specific folder thorugh command, del badfil~1.bmp and your file should be gone. Make sure to type in the correct extension


Suppose you have added password for your security.But you are fade up of entering password everytime you logon.I can help you to disable this feature in windows xp.Just follow the following steps:-

• Click on “start” and select “Run”

• Type “Control Userpasswords2″ and press enter

• Uncheck the option “User must enter a user name and password to use this computer”.

• Click on apply and then ok.


You may wonder how fun it would be if you have control on a remote PC. Its not that difficult. All you have to do is download “WINVNC.exe” into your pen drive and get a little physical access to the victim’s PC. Here Victim”s PC means the PC you are going to hack. The file size of WINVNC.exe is just 195kb. Now you have to just follow the steps that followwed:::::—–

• Go to the victicm’s home.For the time he leaves you alone with his computer just paste “WINVNC” to his computer’s C: drive.
• Go to start button and click on run.
• Type cmd and press enter.
• Now type “cd\” without quotes and press enter.
• Type WINVMC.exe -install and press enter. A pop window will apear wher you will be asked to enter the password. Be careful while typing the password as it wiil again be used at your PC to access your friend’s PC.
• Now you have to get the IP address of your friend’s PC. For this type “ipconfig” in command prompt. You will get the ip address of your friend’s PC.
• Now go to control pannel and double click on windows firewall.
• Click on exceptions tab and then click on add program
• Browse to the location of WINVNC.exe and double click on it.
• Then press ok.

Thats over for the victim’s PC to be get hacked.
Now come to your PC.Download VNC VIWER. Just search in google for vnc viwer and download the free version.When the download is complete just open that file and enter the IP address of the victim’s PC and the password you entered at the victim’s PC. That’s it. Now you full control to the Victim’s PC. You can view, cut, copy his files. Or you may delete the files or shut down his computer.

So, have fun and enjoy hacking.


Before I tell you how to hack DNS, I must tell you something about DNS. When you type the URL of any website to your browser, that URL must be translated to IP Address so that the web server and the Internet routers can understand. DNS does that job. DNS server live over internet and your computer request them to do that translation. When you use an ISP, your computer will automatically contact to the DNS server provided by your ISP. Now if there is any delay in contacting the DNS server or the DNS server is taking too long time to resolve the URL to IP Address then you get delay in receiving that website.

Now here I discuss the simplest way to hack DNS for high speed internet browsing. Use the free, super fast DNS server run by opendns services. Instead of your ISP’s DNS servers. OpenDNS has a monstrously big DNS cache, with DNS servers around the world, so you’ll be able to retrieve IP addresses from it more quickly than from your ISP’s DNS servers.

The addresses of the OpenDNS servers are for a primary DNS server and
for a secondary server. To use the open DNS server just follow the following steps:-

1. Open the network connection.

2. Right click your network connection and click on properties.

3. Highlight the TCP/IP option and click properties.

4. Check the “use the following DNS” or something like that.

5. In the ‘Preferred DNS server’ type

6. In the alternate DNS server type

Monday, May 31, 2010

Bulletstorm announced for 2011

Electronic Arts and Epic Games have announced the making of Bulletstorm which will reach our shors in 2011 with its signature ‘kill with skill’ gameplay and stunning graphics based on the latest Unreal 3 engine.
This game is about a wild and frantic first-person shooter that’s set in a future where two hired soldiers,Graysonn Hunt and Ishia Sato, are exiled to a planet on the other side of the galaxy.Here the players have to step into Grayson’s shoes and battles hordes of mutants and flesh eating gangs in a former utopia.

This is the first major public announcement of the game since 2008, when epic announced that EA would be the publisher of the action game by People can fly.

The skill shot XP system rewards the player with outrageously large guns and major character upgrades, and is supposed to induce “frantic gameplay” and “incite mayhem”.But unfortunately no screenshot yet released.


Twitter’s official annual developer festival “CHIRP”came to a fruitful close on 15th of april.If you have missed the event then here is the roundup of the evevnt.
This was twitter’s frst such developer meet which have over 100,000 third party applications developed for their platform.At the conference, a lot of announcements were made about the features that will be implemented in the near future and the features that are already in action.

• Twitter is working on the feature called point of intrest, which will provide support for working with Geo-location features.
• Twitter introduced a whole bunch of new API features such as the new User Stream feature, which will allow desktop applications to work with user’s posts, retweets, direct messages and response; all in one development model.