Banjara lambani

Monday, 6 February 2017

Digital ads and advertising SEO to make money fast in united state of America(USA)

Digital ads and advertising SEO to make money fast

until january 1st to use these services
you call the local acssess number and
then type in a 5 or 6 digit code.you
can get programs that will call mci
,sprint,or whatever and try consecutive
numbers until it gets one.to fight
against this the companys use 2 things.
..

1.they have dummy numbers that you thin
k work but when you call using it
they trace you!

2.they change the numbers randomly
eveery week or less,so you cant use
a number to long!

here are some access numbers you can
try hacking...

access numbers
--------------

metrophone-(415) 579-6001
itt-(415) 858-2750
mci-(415) 495-2640
sprint-(415) 348-7700

future developments
-------------------

after january first,the date the att
break up starts,all hell will break
loose because the reginal companies
will not no what the fuck to do!
who will profit from this?

Saturday, 4 February 2017

Brand new launched apple iPhone gadgets

Brand new launched apple iPhone gadgets

Sometimes if the no one is home at the number you're trying to bill to, you 
can convince the operator that it's really you're number if you know what the
answering machine message is going to say and if you can do an impression of
their voice on the machine. Even a bad impression will sometimes work.

When doing this from home, try not to use the same number more than two or
three times so the owner of the number will be less likely to investigate.

I've experienced third-party billing from both sides. Someone charged forty
dollars worth of calls to my dad's phone and the operators were very 
unhelpful and unfriendly. They refused to investigate even though it was
comming from a residential line and it took two months to get the charges
removed. This was back in 1990 but I've been doing this for a few years now
and people don't seem to care too much at a few calls totaling to under ten 
bucks. I've actually called the people I used and asked them about it and they 
almost always blow it off as a "minor nusience."

AT&T is completely automated from your home and the best to use. U.S.Sprint
is the second best because they're not automated but they also don't call and
verify. M.C.I. sucks because they're losers who verify no matter what so don't 
use them. To choose your company, before you dial the number dial 10288 for 
AT&T or 10333 for U.S. Sprint.

International calls will be verified no matter what from pay phone or home.
Hope this file benefits everyone who reads it. It'll sure cut your long
distance bill down a lot.

May 13, 1995 Update:
-------------------
Well, it seems that AT&T are finally waking up to this problem of third party
billing...On my local phone bill I was backbilled for $175 worth of third 
party calls. The kicker part is that I called the phone company and complained
that there were all these extra charges on my bill that I know nothing about
and they were more than happy to take the charges off. A few weeks later, I
got a letter from AT&T concerning some more charges...

eHealthcare solutions and insurance quote

eHealthcare solutions and insurance quote

First of all, if you're going to be calling from home, it's best to charge
the calls to a different area code than your own. Sure, a local number will
work but when the people get their phone bill and see a local number on it,
they'll most likely call it to find out what it is. When they see a long
distance number they think "Goodness gracious! If I call that number my
phone bill will even be higher." Even if they do call you, you can just play
ignorant and if they're far away they probably won't come looking for you.

Pick a city, any city. The city should be far away in another state. Now dial
local information and ask for the area code to your city. Let's say you
picked Waverly, Iowa. The area code is 319. Now dial 1-319-555-1212 to call
Waverly Directory Assisstance. The charge for this call should only be about
sixty cents.

Now think of a very common last name like Smith, Lawrence, Conner, Mitchell,
Shlappenheimerwinthrop, etc. You get the idea. 

OPER: Directory Assisstance, Betty. What city, please?
 YOU: Waverly.
OPER: Go ahead.
 YOU: I need the number of a last name Conner.
OPER: (type, type, type) Okay I have two Conners listed. A Bob and an
      initial H.
 YOU: Bob, yeah that's it. Definately Bob. Bob it is. Gimmie Bob. Yeah, Bob.
OPER: The number is 452-0357.

So that's the number you'll bill to. 319-452-0357. Of course if you're 
planning to do this extensively you'll need many more numbers to pick from.
That's when you call up the phone company and ask for a phone book to be
delivered to you so you'll have a whole list of numbers to choose from. A
normal book will cost about $7.00 or so. If you know how to do it right, it
won't cost you anything but I won't get into that. The phone book will pay
for itself after about 3 or 4 long distance calls.

Advertising alliance and new upcoming android mobile apps

Advertising alliance and new upcoming android mobile apps

Breaker B0X

   This is a new b0x INVENTED AND MADE BY _--=PeEll=--_ on June 18, 1995 at 
11:20 pm central time.  Okay?  This is not really a box.  This has nothing 
to do with tha fone system.  It has to do with a person's (not yours) breaker
box and electrical system within his/her house.  This is foe info only.  
These plans should not be use in an illegal way.  There are two wayz to make 
this box.

   Materials

2 Extension cords (doesn't matter how long)
Knowledge of splicing wire
Whatever you need to splice
A plastic crate
A long thin (but strong) peice of wood (a stick, broom-handle)

   How to make it

   Take tha extension cords and cut off tha ends that you plug into tha wall 
(ya know tha plugs).  Make SuRe you have about four-five inchs on both.  Now
splice tha two plugs together.  *****If they have tha third prong you have to 
break it off*****  You should have something like this:

=|)-------(|=

   Now to use it

   Go to tha enimies house and find an outside power outlet.  Plug one of tha
plugs into one of tha outlets.  THEN GET ON THA CRATE!!!  Make SuRe that no 
part of you is touching tha ground.  Then plug tha other end in (cause there 
is usally two sockets).  Watch tha sparcks.  It may start a fire.  When it 
stops lighting up tha ski, take tha stick or whatever put it in tha loop and 
pull it out.  Grab it and run.

   Materials (foe tha second kind)

1 Extention cord
1 Bucket of Salt water (like a 5 gallon bucket filled with a lot of salt)

   Cut tha cord so you have about six-seven feet of cord.  Now find an 
outside power outlet and plug in tha cord (might wanna get a crate).  Now you
have a LIVE wire.  THROW (so you are not holding it) into tha bucket of 
water.  You may have to leave tha breaker box there.

   This b0x is KewL cause if it doesn't trip tha breakers or fuses it will 
fry tha wires in tha house!!!  If something is running and using electricity 
it may blow it (ie lights, TV, things like that).

About webads and search engine marketing

About webads and search engine marketing


Here we'll go over in detail some of the most common operators.

 TSPS OPERATOR:

Trafic (us) Service Position System Operator is the bitch you commonly here
whenever you use a pay phone etc. To say the least she's a meat head. Her
responsibilities are as follows:

 [1] Getting all billing information for Calling Cards and 3rd number calls.

 [2] Making sure you get the right person on person-to-person calls.

 [3] Making sure the fool on the other end will pay for your collect call (why
     call collect?)

 [4] Identifying calling numbers, or basically asking you,
     'what number are you calling, please.' when the system fucks up.

Even though these operators are commonly ding-bats, you shouldn't screw with
them, for they are known to be quick with the tracer. She can even tell if you
are calling from a fortress phone. She has a portable all time ready tracer.
Beware of these deadly bitches.

  INWARD OPERATORS:

This wench is basically an apprentice to the bitch above (TSPS) or commonly
the '0' operator. She will never question you as long as you are within her
dimension (service) area. She can only be reached by a mighty Blue Box
(discussed in up and coming tutorial) or another operator.

  DIRECTORY ASSISTANCE OPERATORS:
     (DOA?DAO?)

This is the operator you get when you call directory assistance (555-1212).
All she can do is either tell you a listed number or tell you if a number is
unlisted. Waste of time.

  DEAF D.A.O.'S

This neat little operator is set up to help with directory assistance for deaf
people (who would they want to talk to?). She's reachable by dialing
800-855-1155. She talks to the deaf via Teletypewriters (terminals). If your
modem can transfer baudot (Oh those sweet Apple Cats can) then you can talk to
her. You might find her alot more friendly, more talkitive, and alot easier to
manipulate a number out of. However, she does use abbreviations like GA for go
ahead (pretty tricky huh).

About Facebook and Instagram

About Facebook and Instagram

Telex II, as you can see above there are 5 TWX machines. They are all owned by
Western Union. Normally these babes may only be accessed by other TWX
machines, however, if you do not wish to go and purchase one you can access
them by use of the Easylink, by Western Union. For more on this I would
suggest reading The Bioc Agents, and Tucs article on 'Hacking Western Union's
Easylink.'

   700:

This is a new service for employees of AT&T in which someone (one of the
special employees) can call his own 700 number (say 700-292-9876), enters
his/her code, and where he is staying and then hangs up. If there is any new
info on the case he is working on, the computer will call him back and tell
him all the latest updates.

   800:

There are basically two types of Watts Lines, Inward Watts and Outward watts.
These are probably some of the nicest of the special area codes since they
allow you to call for free. Here's an explanation of the two:

 INWARD WATTS:

Inward Wide Area Telecommunications Service is probably the one your most
familiar with. MA has developed it so there are 6 different levels of Inwatts.
Level 6 being the whole U.S. (all 50 states) level 5 being all 48 contienental
states etc. all the way down to 1, only one state. Usually a company will get
a level 6 and then a level 1 because all though level 6 allows you to call
from anywhere in the U.S. it excludes the state where the call is terminated
at, so the company usually buys a level 1 for that state.

Interstate Inwatts are less common but still exist. These are the ones you can
only call from say one state. You can tell one quite easily for they all have
a 2 for the last central office number, or the 6th number (ie. 800-XY2-XXXX).

About LinkedIn and Twitter

About LinkedIn and Twitter

Well, examine a phonecard - preferably a used one if you are going to 
scratch it or dissect it. If you look on the printed surface (the green 
side - which is the front) you will find two lines which form a thick band. 
Underneath this area is a "track" which holds the information about the 
number of units used up and how many are left. A used phonecard will have 
some tiny bars marked on the track near one end.

On the reverse side of the phonecard (the black side) you can see a shiny 
black strip in contrast to the matt black which has text on it (on older 
phone cards the whole of this side is shiny black). Anyway, this shiny strip 
is "opposite" the band on the front and acts as a "window" to the information 
on the track - for the simple reason that it is no ordinary shiny black 
plastic. This special black plastic is not like all the others (which do 
not let normal light or infra-red light pass through) but is transparent to 
infra-red light. When a phonecard is in the machine, an infra-red beam is 
shone through the back of the card and the reflected beam is checked to 
detect the time units remaining.

Now to explain the track itself which is protected by a layer of paint that 
also serves as the base for printing text and figures visible to the user. 
On a 20-unit card, the track has 20 tiny rectangular areas (called 
diffraction gratings - you might have come across them if you took physics) 
which affect the light reflected by the cards. As the time units are used up, 
the ares are destroyed by an eraser head. The design of the assembly enables 
the progress of the erasing operation to be checked. in fact, the 20 
rectangular areas touch each other and form a continuous strip on the card.

The area which is read is wider than the track. This makes it possible to 
detect a reduction in track width.

Each unit is separated from its neighbour by a distance of 0.6mm. the erase 
area is greater than the width of the track so that the unit is always 
completely erased. The dimensions of both the card and the time units 
suggest 140 as the theoretical maximum number of units possible.

The read-and-erase mechanism consists of a moving carriage on which are 
fixed the eraser head and the optical components for reading. the carriage 
is driven by a stepping device which moves along the track to determine 
whether each unit is god or erased. when a unit has been consumed by the 
cardphone, the area is erased in its turn and the carriage moves on one step.

OK, for those that weant to know, here is an ascii graphical representation 
of the read and erase geometry : 

Friday, 3 February 2017

Newly launched latest cars and bikes

Newly launched latest cars and bikes

incoming from a step-by-step office. Trunks from such offices are often

referred to as "bylink" trunks even when incoming to noncrossbar offices; they

are more properly referred to as "dc incoming trunks." Such high-speed means

are necessary to assure that the first incoming pulse is not lost.



Cable Vault: The point which phone cable enters the Central Office building.



CAMA: Centralized Automatic Message Accounting - Pronounced like Alabama.



CCIS: Common Channel Interoffice Signaling - Signaling information for trunk

connections over a separate, nonspeech data link rather that over the trunks

themselves.



CCITT: International Telegraph and Telephone Consultative Committee- An

International committee that formulates plans and sets standards for

intercountry communication means.



CDO: Community Dial Office - A small usually rural office typically served by

step-by-step equipment.



CO: Central Office - Comprises a switching network and its control and support

equipment. Occasionally improperly used to mean "office code."



Centrex: A service comparable in features to PBX service but implemented with

some (Centrex CU) or all (Centrex CO) of the control in the central office. In

the later case, each station's loop connects to the central office.



Customer Loop: The wire pair connecting a customer's station to the central

office.

Cheap domain registration hosting

Cheap domain registration hosting

ACD: Automatic Call Distributor - A system that automatically distributes calls

to operator pools (providing services such as intercept and directory

assistance), to airline ticket agents, etc.



Administration: The tasks of record-keeping, monitoring, rearranging,

prediction need for growth, etc.



AIS: Automatic Intercept System - A system employing an audio-response unit

under control of a processor to automatically provide pertinent info to callers

routed to intercept.



Alert: To indicate the existence of an incoming call, (ringing).



ANI: Automatic Number Identification - Often pronounced "Annie," a facility for

automatically identify the number of the calling party for charging purposes.



Appearance: A connection upon a network terminal, as in "the line has two

network appearances."



Attend: The operation of monitoring a line or an incoming trunk for off-hook or

seizure, respectively.



Audible: The subdued "image" of ringing transmitted to the calling party during

ringing; not derived from the actual ringing signal in later systems.



Backbone Route: The route made up of final-group trunks between end offices in

different regional center areas.

Online shopping with cheap cost

Mesothelioma law firm 


 IN THE TELEPHONE SYSTEM, THE TWO-YWA COMMUNICATION IS CARRIED BY EITHER A
TWO-WIRE OR A FOUR-WIRE SYSTEM. IN THE FOUR-WIRE SYSTEM ON PAIR OF WIRES IS
CONNECTED FROM THE TRANSMITTER AT TELEPHONE A TO THE RECEIVER AT TELEPHONE B,
AND THE OTHER PAIR OF WIRES IS CNNECTED FORM THE TRANSMITTER AT TELEPHONE B TO
THE RECEIVER AT TELEPHONE A. IN THE TWO-WIRERE SYSTEM, WHICH USES ONE-HALF OF
THE WIRING OF THE FOUR-WIRE SYSTEM AND THEREFORE IS LESS COSTLY, BOTH
TRANSMITTER AND RECEIVERS AT TELEPHONES A AND B SHARE THE SAME PAIR OF WIRES FOR
THE TWO-WAY COMMUNICATION. THE POWER FOR THE COMMUNICATION IS PROVIDED BY A
BATTERY (OR AN APPROPRIATE POWER SOURCE WITH BATTERY BACKUP). THE BATTERY IS
USUALLY PROVIDED AT THE CENTRAL OFFICE IN COMMERCIAL TELEPHONE NETWORKS, THOUGH
IT CAN BE PROVIDED AT THE TRANSMITTER IN A PRIVATE OR SPECIAL PURPOSE FOUR-WIRE
SYSTEM.

     THE TRANSMISSION LINKS IN MODERN TELEPHONE SYSTEMS MAY TAKE SEVERAL
DIFFERENT FORMS, SUCH AS OVERHEAD WIRE, BURIED CABLE, MICROWAVE LINKS, SATELLITE
LINKS, AND SO ON. WHICH OPTION IS USED FOR A GIVEN COMMUNICATION DEPENDS
LAREGELY ON WHERE A AND B ARE LOCATED. IF A AND B ARE LOCATED CLOSE TO EACH
OTHER, THE INFORMATION WILL BE CARRIED OVER WIRES ON TELEPHONE POLES OR IN
OVERHEAD OR UNDERGROUND CABLES. IF A AND B ARE LOCATED ON THE SAME LAND MASS BUT
A LARGE DISTANCE APART, THE INFORMATION COULD BE TRANSMITTED OVER TELEPHONE
LINES, CABLES, MICROWAVE LINKS, OR EVEN SATELLITE LINKS). IF A AND B ARE
SEPARATED BY AN OCEAN, THE TRANSMISSION MUST BE THROUGH TRANSOCEANIC CABLE,
RADIO, OR SATELLITE LINKS, SINCE THESE ARE THE ONLY FEASIBLE WAYS TO GET
INFORMATION FROM ONE CONTINENT TO ANOTHER. WHICHEVER APPROACH IS USED, A MEANS
MUST BE PROVIDED FOR SELECTING THE PROPER PATHS OVER WHICH THE INFORMATION IS TO
TRAVEL. THIS REQUIRES SOME WAY TO CONNECT CIRCUITS THROUGH SWITCHES CALLED
NETWORK SWITCHING.

FURTHERMORE, THE NETWORK ALSO PROVIDES DETECTION CIRCUITS FOR ALL OF THE
SIGNALLING WHICH DETERMINES THE CALLING AND CALLED TELEPHONES AND ALL OF THE
LINE CHECKING REQUIRED TO ESTABLISH THA THE LINES AND TELEPHONES ARE CLEAR TO
COMPLETE THE COMMUNICATION. THESE SIGNALLING REQUIREMENTS DEPEND ON THE
CHARACTERISTICS OF EACH TELEPHONE SET AND ON THE SIGNALLING SEQUENCE REQUIRED TO
MAKE A TELEPHONE CALL.

Donate car for tax credit

Donate car for tax credit 

            There Are 3 Possible        We try to make sure
            Reasons Why:                that all of the files
                                        are correctly linked on
               * Hack-Net.Com is still  the archives, but
                 debugging the site,    sometimes we do make an
                 and it has been        error. If you are
                 removed from the       clicking on a file and
                 archive's to be        this same page is
                 re-indexed!, if this   appearing for more than
                 is the case then       3 days, then please
                 please wait a few days Email Us and tell us
                 until it is put back   which file is not
                 up!                    working and it will be
               * The File Never         corrected. Without your
                 Existed, (meaning that feedback we cannot help
                 Hack-net.Com have made you in your quest for
                 a small error in the   knowledge!
                 file name entry)
                 please Email Us if the Shann�rz and the
                 file is still not      

Life insurance co Lincoln

Life insurance co Lincoln

      Ok this is nothing big, it's my third text file for 1988 from cDc
  communications.  Here goes.

                                Time Zones
                                ----------

 Atlantic
 --------

 Newfoundland  Nova Scotia  New Brunswick

 Eastern
 -------

 Maine  New Hampshire  Vermont  Massachussets  New York  Rhode Island 
 Connecticut  Pennsylvania  New Jersey  Delaware  Maryland  Ohio  Indiana
 Michigan  West Virginia  Virginia  Kentucky  North Carolina  Tennessee
 South Carolina  Georgia  Florida  Quebec  Ontario

 Central
 -------

 Manitoba  North Dakota  South Dakota  Minnesota  Wisconsin  Michigan  Iowa
 Nebraska  Illinois  Kansas  Missouri  Kentucky  Tennessee  Arkansas  Oklahoma
 Texas  Louisiana  Alabama  Mississippi  Indiana

 Mountain
 --------

 Alberta  Saskatchewan  Montana  Idaho  Wyoming  South Dakota  Nebraska
 Utah  Colorado  Kansas  Oklahoma  Arizona  New Mexico  

 Pacific
 -------

 British Columbia  Washington  Montana  Oregon  Nevada  California  Utah


                            Area Code Listing
                            -----------------

   205 - Alabama              907 - Alaska                602 - Arizona
   501 - Arkansas             714 - California (Orange)   818 - California
   213 - California (LA)      916 - California            619 - California
   415 - California (SF)      408 - California (San Jose) 303 - Colorado
   203 - Connecticut          302 - Delaware              904 - Florida
   305 - Florida (Miami)      404 - Georgia (Atlanta)     808 - Hawaii 
   208 - Idaho                312 - Illinois (Chicago)    317 - Indiana
   219 - Indiana (Souend)     515 - Iowa (Des Moines)     316 - Kansas
   502 - Kentucky             504 - Lousiana (N. Orleans) 207 - Maine
   301 - Maryland             617 - Massachusetts         313 - Michigan 
   616 - Michigan             612 - Minnesota             601 - Mississippi
   816 - Missouri (Kansas C)  314 - Kansas (St. Louis)    406 - Montana
   402 - Nebraska             702 - Nevada                603 - New Hampshire
   201 - New Jersey (Newark)  609 - New Jersey (I'm here) 505 - New Mexico
   718 - NYC (Brooklyn, S.I.) 212 - NYC (Bronx, Mhattan)  518 - NY (Albany)
   716 - NY (Buffalo)         516 - NY (Long Island)      315 - NY (Syracuse)
   914 - NY (White Plains)    704 - North Carolina        919 - North Carolina
   701 - North Dakota         513 - Ohio (Cincinnati)     216 - Ohio
   614 - Ohio (Columbus)      419 - Ohio (Toledo)         405 - Oklahoma
   918 - Oklahoma (Tulsa)     503 - Oregon                215 - Philadelphia PA
   401 - Rhode Island (cough) 803 - South Carolina        605 - South Dakota
   901 - Tennessee (Memphis)  615 - Tennessee (Nashville) 806 - Texas(Cow Hell)
   214 - Texas (Dallas)       817 - Texas (Forth Worth)   713 - Texas (Houston)
   512 - Texas (San Antonio)  801 - Utah                  802 - Vermont
   703 - Virginia (Arlington) 804 - Virginia (Richmond)   202 - Washington DC
   206 - Washington (Seattle) 304 - West Virginia         608 - Wisconsin
   307 - Wyoming              666 - Where do you think

        Well that will make a nice printout for your wall, won't it.  Now
    you know where you're calling...

Annuity settlement


 Annuity settlement

b4 i get started, just remember i did not rite this phile 
so you people can learn preform telecommunications fraud!
contrary to popular beleafs phreaking is still an art form.
phreaking is a form of intelectual advancement. is just like
hacking, if u think of it this way: when hacking you type
certain commands in phreaking, you play certain MHz tones.
blue boxing is just like gaining r00t access of a unix sys.
by gaining r00t access you be come the 'system operator'.
the blue box utelizes 'system operator' tones. see what i'm sayn? 
just cuz phreaking is intelectual it dousnt mean it cant be fun. 

_`'-.,_,.-'`_`'-.,_,.-> [ definitions ] <-.,_,.-'`_`'-.,_,.-'`_

Phreak    ["free"k]  Verb--1. The act of "Phreaking"  
2. The act of making telephone calls without paying money 
[the word phreak is a combination of phone, freak, and free]

Phreaker ["free"-k-er]  Noun--1. One who engages in the act of 
"Phreaking" 2.One who makes telephone calls without paying 
money 

_`'-.,_,.-'`_`'-.,_,.-> [fone systems in the world today] <-.,_,.-'`_`'-.,_,.-'`_

               [1] Step by Step
               [2] Crossbar
               [3] ESS Electronic Switching System
 
 
                         Step by Step
                         ~~~~~~~~~~
 
First switching system used in America, adopted in 1918 and until 
1978 Bell had over 53% of all exchanges using Step by Step [SxS].  
A long,and confusing train of switches is used for SxS switching.
 
                         [> Disadvantages <]

 [A] The switch train may become jammed : Blocking call.
 [B] No DTMF [Dual-Tone Multi-Frequency]["Touch-tone"].
 [C] Much maintanance and much electricity.[0;36;40m
 [D] Everything is hardwired
 
                        +> Identification<+

 [A] No pulsing digits after dialing or DTMF.
 [B] Phone Company sounds like many typewriters.
 [C] No:  Speed calling, Call forwarding, and other services.
 [D] Pay-phone wants money first before dial-tone.

Wednesday, 1 February 2017

What to do if caught A Virus?

What to do if caught A Virus?


If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.


Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.

You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing.

It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon.

For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes."

Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.

Is Your PC "Owned?"

I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program's presence. People who write commercial software put icons all over your desktop. Who's going to work harder to go unnoticed?

Other indicators that may, in fact, indicate that there's nothing that you need to worry about, include:

* An automated e-mail telling you that you're sending out infected mail. E-mail viruses and worms typically come from faked addresses.
* A frantic note from a friend saying they've been infected, and therefore so have you. This is likely a hoax. It's especially suspicious if the note tells you the virus can't be detected but you can get rid of it by deleting one simple file. Don't be fooled--and don't delete that file.

Cant See Secure Sites

Cant See Secure Sites


Fix the problem with seeing them secrue sites (banks or online stores) i found this very usefull to me at my work (isp backbone support lol, at the time i was regular support  )

Any way... what u need to do is make a new notepad file and write in it the followng DLL's.. just copy-paste these



regsvr32 SOFTPUB.DLL
regsvr32 WINTRUST.DLL
regsvr32 INITPKI.DLL
regsvr32 dssenh.dll
regsvr32 Rsaenh.dll
regsvr32 gpkcsp.dll
regsvr32 sccbase.dll
regsvr32 slbcsp.dll
regsvr32 Cryptdlg.dll


and save it as > all file types, and make it something like securefix.bat.

then just run the file and ur problem shuld be gone.

How to gain weight in 30 days and how to lose weight fast

How to gain weight in 30 days and how to lose weight fast

Because of the security features built into Windows XP, it is virtually impossible to get back into the system without the password.
You have several options to try and get around this problem.


If you have access to another user account with administrator rights, you can use that account to change the password
of the account that is locked out. You can also use the default Administrator account that is built into Windows XP.

First you need to boot the system into Safe Mode.
1.Restart your system.
2.When you see the blue Dell globe or screen, press the ( F8 ) key about 3 times a second.
3.You should get the Windows startup menu. Use the (Up or Down) arrow keys to highlight (SafeMode)
4.Press (Enter) on (Safe Mode), then press (Enter) on (Windows XP).
5.The system should boot to Safe Mode.

Once you are at the Account Log on Screen, click on the icon
for the user account with administrator rights, or click on the icon
for the administrators account.
Note: For Home the Administrator account isn't normally shown & in Safe Mode you have to press Ctrl+Alt+Delete keys twice to show.
For PRO you can do this in normal mode

When the system has booted to the desktop, use the following steps to change the accounts password.
1.Click Start, Control Panel, Administrative Tools.
2.Click Computer Management.
3.Double click Local Users and Groups, double click the folder Users.
4.Right click on the account name that is locked out, and click on Set Password.
5.You may get a warning message about changing the password, simply click proceed.
6.Leave the New Password box blank, also leave the Confirm Password box blank.
7.Click OK, and OK again.
8.Then close all Windows, reboot the system and try to log in.

Calculating Offsets

How to make kiss and how to make French fries

 Introduction


This tutorial is more of a tip than a tutorial. It just explains how to calculate offsets for jumps and calls within the program you are patching.

Types of Jumps/Calls

Here I will just describe the different types of jumps and calls which you will come across:

Short Jumps
Short jumps be they conditional or unconditional jumps are 2 bytes long (or 1 nibble if your Californian ;-). These are relative jumps taken from the first byte after the two bytes of the jump. Using short jumps you can jump a maximum of 127 bytes forward and 128 bytes backwards.

Long Jumps
Long jumps if they are relative are 6 bytes long for conditional jumps and are 5 bytes long for unconditional jumps. For conditional jumps 2 bytes are used to identify that it is a long jump and what type of jump (je, jg, jns etc) it is. The other 4 bytes are used to show how far away the target location is relative to the first byte after the jump. In an unconditional jump only 1 byte is used to identify it as a long unconditional jump and the other 4 are used to show it's target's relative position, as with the conditional jumps.

Calls
There are two different types of calls which we will use. The normal type of call works the same as the long jumps in that it is relative to it's current position. The other type gives a reference to a memory location, register or stack position which holds the memory location it will call. The position held by the later is direct e.g. the memory location referenced may contain 401036h which would be the exact position that you would call, not relative to the position of the call. The size of these types of calls depends on any calculations involved in the call i.e. you could do: 'call dword ptr [eax * edx + 2]'. Long jumps can also be made using this method, but I didn't say that earlier as to avoid repetition.

Tables
Here is a brief list of all the different types of jumps/calls and their appropriate op-codes. Where different jumps have the same Op-Codes I have grouped them: