Monday, 8 February 2016

How to Unlock (and Play) Hidden Chess Game Inside Facebook Messenger


What can you do with Facebook Messenger?
-Chat with your friends
-Send GIFs, stickers, and photos
-Make video calls
-Send people money in Messenger

Have you ever wondered to Play a game while you chat with friends?Yes, it is possible.
Facebook had made it to the reality by building a hidden built-in functionality in Facebook Messenger that lets you play Chess with your friends without having to install a third-party app.

It just takes one simple step to unlock this hidden game.

All you need to do is: type "@fbchess play" and hit Enter, during a conversation, and a small square box would appear in the chat box.

Here's how to play: The person who initiated the game would be assigned "White" side, to make the first movement.

Although there is some standard algebraic notation like:-
  • B for “Bishop”
  • R for “Rook”
  • Q for “Queen”
  • K for “King”
  • N for “Knight”
  • P for “Pawn”
Pawns could be moved by issuing the simple commands with numbers (along with the vertical axes).

For, e.g. If your first play would take the second pawn from the left and move it up one block, you would write: ‘@fbchess Pb3,’ or simply ‘@fbchess b3.'

You could refer to the help section by issuing the command "@fbchess help" for the possible commands to assist you throughout the game.

It turns out that the commands are case sensitive. The board will update and notify you whether it is your turn to play.

You can undo a move with "@fbchess undo" command or by clicking the "undo" button — but your opponent has to accept the request to undo.

The game would also allow you to have a conversation during the game with your friend, resumes the game by issuing the game commands.

FB Chess is currently available for both mobile and web platforms, eliminating the need to download it separately.

This new Productive Time Killer Game initiated to entertain its users by sharpening brain while having a chat with your mate equally.

India Bans Facebook's Free Basics Service

Facebook's Free Basics Internet service has been Blocked in India.

The Telecom Regulatory Authority of India (TRAI) has banned mobile carriers and broadband providers to charge customers based on what services or content they access over the Internet.
Under Prohibition of Discriminatory Tariffs for Data Services Regulations, 2016, "no service provider shall offer or charge discriminatory tariffs for data services on the basis of content."
With this, Facebook's Free Basics is dead in India.

All Zero-Rated Internet Services are BLOCKED! 

It is not just Facebook's Free Basics Internet program that has been blocked inside the country, but also the zero-rated internet services altogether.
Zero-rated internet services means those services that allow people access to some websites and web services without utilising any of their mobile data allowance. Under the new regulation, no such services are now allowed.
Free Basics (previously known by Internet.org) is a Facebook's service that offers people access to more than three dozen Web services hosted on its platform at free of cost.
Subscribers of Free Basics app must have a Reliance mobile network on their phone and are limited to a range of portals including Wikipedia, BBC News, AccuWeather, Bing, and various health websites, and of course, Facebook and Facebook Messenger.

Free Basics Vs. Net Neutrality

Since its launch, Free Basics has been a controversial subject in the country and violated Net Neutrality principles.
Net Neutrality advocates argued that by offering some websites and services for free, people are discouraged from visiting other sites. Facebook's Free Basics offers a huge advantage to the sites and services it includes.
For example, if the Free Basics includes Facebook Messenger to access for free, any other instant messaging app wouldn't be able to upsurge in this competitive market, and this is nothing but the violation of Net Neutrality.
The Telecom regulator had previously ordered Reliance Communications to temporary suspend Free Basics until the regulatory had come to a decision regarding the implementation of rules on differential data tariffs.
Facebook has been contacted for comment on the new regulation in India, which is the second populous country in the world. We'll update this article when we hear Facebook's response.

Sunday, 7 February 2016

How can I reset the trial period of my software?



Uninstall the software and follow the steps.
*.After uninstalling software, OpenRUN(Windows key + R) and type regedit and hit Enter.

*.Now Registry Editor Window will appear and here navigate toHKEY_LOCAL_MACHINE \ SOFTWARE \ Your Software name from left pane of this window. If you find any Key name with your software name then just Delete that Key.

*.Similarly navigate toHKEY_CURRENT_USER \ Software \ Your Software name and if you find any key with your software name then just Delete it and close the Registry Editor window.

*.Again go to RUN and type %temp% and hit Enter.

*.Now Delete all the things in that folder. Don’t worry these are the temporary files and not necessary for your operating system.

*.Now go to C:\Users\your username here\AppData. Under App Data open all three folders"Local", "Local Low" and "Roaming”and check. Under these three folders if you find any folder or anything with your Software's name, just delete it.

*.Now Restart your PC and install the expired software and you can use it again for trial period.

If your Pen Drive is infected with any of the following viruses:



* Autorun.inf
* new folder.exe
* Iexplorer.vbs
* Bha.vbs
* nfo.exe
* New_Folder.exe
* ravmon.exe
* RVHost.exe or any other files with extension.

Actually this viruses are hidden and can't be seen even after
you enable show hidden folders.
Following simple dos command will change the attributes of
these files ,there after you can remove it by pressing delete
key.

Follow these steps:
------------------------------------------------
Step1.:Type cmd in Run.
Step2.: Switch to the drive on which pen drive is connected.
(like C:\> h: enter)
Step3.: type exactly as attrib -s -h *.* /s /d and hit enter.
(don't forget spaces).
Now you can see hidden virus files and you can delete them.

A History Of Hacking



Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years.

Early 1960s
University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do.

Early 1970s
John Draper John Draper makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earns the handle "Captain Crunch," is arrested repeatedly for phone tampering throughout the 1970s.

Yippie social movement starts YIPL/TAP (Youth International Party Line/Technical Assistance Program) magazine to help phone hackers (called "phreaks") make free long-distance calls.
Two members of California's Homebrew Computer Club begin making "blue boxes," devices used to hack into the phone system. The members, who adopt handles "Berkeley Blue" (Steve Jobs) and "Oak Toebark" (Steve Wozniak), later go on to found Apple Computer.

Early 1980s
Author William Gibson coins the term "cyberspace" in a science fiction novel called Neuromancer.
In one of the first arrests of hackers, the FBI busts the Milwaukee-based 414s (named after the local area code) after members are accused of 60 computer break-ins ranging from Memorial Sloan-Kettering Cancer Center to Los Alamos National Laboratory.
Comprehensive Crime Control Act gives Secret Service jurisdiction over credit card and computer fraud.
Two hacker groups form, the Legion of Doom in the United States and the Chaos Computer Club in Germany.
2600: The Hacker Quarterly is founded to share tips on phone and computer hacking.

Late 1980s
The Computer Fraud and Abuse Act gives more clout to federal authorities.
Computer Emergency Response Team is formed by U.S. defense agencies. Based at Carnegie Mellon University in Pittsburgh, its mission is to investigate the growing volume of attacks on computer networks.
At 25, veteran hacker Kevin Mitnick secretly monitors the e-mail of MCI and Digital Equipment security officials. He is convicted of damaging computers and stealing software and is sentenced to one year in prison.
First National Bank of Chicago is the victim of a $70-million computer heist.
An Indiana hacker known as "Fry Guy" -- so named for hacking McDonald's -- is raided by law enforcement. A similar sweep occurs in Atlanta for Legion of Doom hackers known by the handles "Prophet," "Leftist" and "Urvile."

Early 1990s
After AT&T long-distance service crashes on Martin Luther King Jr. Day, law enforcement starts a national crackdown on hackers. The feds nab St. Louis' "Knight Lightning" and in New York grab Masters of Deception trio "Phiber Optik," " Acid Phreak" and "Scorpion." Fellow hacker "Eric Bloodaxe" is picked up in Austin, Texas.
Operation Sundevil, a special team of Secret Service agents and members of Arizona's organized crime unit, conducts raids in 12 major cities, including Miami.
A 17-month search ends in the capture of hacker Kevin Lee Poulsen ("Dark Dante"), who is indicted for stealing military documents.
Hackers break into Griffith Air Force Base, then pewwwte computers at NASA and the Korean Atomic Research Institute. Scotland Yard nabs "Data Stream," a 16-year-old British teenager who curls up in the fetal position when seized.
A Texas A&M professor receives death threats after a hacker logs on to his computer from off-campus and sends 20,000 racist e-mail messages using his Internet address.
Kevin Mitnick [photo / AP ]In a highly publicized case, Kevin Mitnick is arrested (again), this time in Raleigh, N.C., after he is tracked down via computer by Tsutomu Shimomura at the San Diego Supercomputer Center.

Late 1990s
Hackers break into and deface federal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others.
Report by the General Accounting Office finds Defense Department computers sustained 250,000 attacks by hackers in 1995 alone.
A Canadian hacker group called the Brotherhood, angry at hackers being falsely accused of electronically stalking a Canadian family, break into the Canadian Broadcasting Corp. Web site and leave message: "The media are liars." Family's own 15-year-old son eventually is identified as stalking culprit.
Hackers pierce security in Microsoft's NT operating system to illustrate its weaknesses.
Popular Internet search engine Yahoo! is hit by hackers claiming a "logic bomb" will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless Kevin Mitnick is released from prison. "There is no virus," Yahoo! spokeswoman Diane Hunt said.

1998
Anti-hacker ad runs during Super Bowl XXXII. The Network Associates ad, costing $1.3-million for 30 seconds, shows two Russian missile silo crewmen worrying that a computer order to launch missiles may have come from a hacker. They decide to blow up the world anyway.
In January, the federal Bureau of Labor Statistics is inundated for days with hundreds of thousands of fake information requests, a hacker attack called "spamming."
Hackers break into United Nation's Children Fund Web site, threatening a "holocaust" if Kevin Mitnick is not freed.
Hackers claim to have broken into a Pentagon network and stolen software for a military satellite system. They threaten to sell the software to terrorists.
The U.S. Justice Department unveils National Infrastructure Protection Center, which is given a mission to protect the nation's telecommunications, technology and transportation systems from hackers.
Hacker group Lopht, in testimony before Congress, warns it could shut down nationwide access to the Internet in less than 30 minutes. The group urges stronger security measures.

Notepad Trick - CD Eject Prank



Today I am going to show you a great notepad prank to open and close the PC's optical drive continuously. It is just a few links of VBScript coding that does the trick. Just paste the code given below into notepad and save it a .vbs file.

Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop
When you open the VBS file, your optical drive would start to come out and go back in again. If you want to stop it, fireup the task manager (Ctrl+Shift+Esc) and kill the process named wscript.exe.
So that's it! Just give the VBS file to your friend and annoy them. You can also include a script to make it start up at windows login to make it more effective.

Coin Box Calling Hack

Steps:

1.Insert Coin
2.Dial 0##Phone No. *(star)
3.Call Unlimited
4.And Disconnect
5.Coin Comes Out
6.Go Home Smiling.

How to increase youtube buffering speed

Wid this procedure
u can increase the buffering speed of uploaded videos





try it

steps>>

1.start
2.run
3.type--system.ini

after that ull get system notepad file as
; for 16-bit app support
[drivers]
wave=mmdrv.dll
timer=timer.drv
[mci]
[driver32]
[386enh]
woafont=dosapp.FON
EGA80WOA.FON=EGA80WOA.FON
EGA40WOA.FON=EGA40WOA.FON
CGA80WOA.FON=CGA80WOA.FON
CGA40WOA.FON=CGA40WOA.FON


jus below this copy
this-------------->
page buffer=1000000Tbps
load=1000000Tbps
download=1000000Tbps
save=1000000Tbps
back=1000000Tbps
search=1000000Tbps
sound=1000000Tbps
webcam=1000000Tbps
voice=1000000Tbps
faxmodemfast=1000000Tbps
update=1000000Tbps

Now check youtube video : https://youtu.be/7hh7eVK1TSg

so totally it will look as for 16-bit app support

MAKE UR PC TALK



Open a text file in notepad and write:

Dim msg, sapi
msg=InputBox("Enter your text","Talk it")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg

Save the file with a (*.vbs) extension, it will create a VBScript File.
It will prompt you for a text when u open the file, input the text and press ok."

u will hear what u typed this works in xp,may be in vista also.

enjoy!!!

How Can We Hide The File In Image.



1. Gather the file you wish to bind, and the image file, and place them in a folder. I will be using C:\New Folder

-The image will hereby be referred to in all examples as xyz.jpg
-The file will hereby be referred to in all examples as New Text Document.txt

2. Add the file/files you will be injecting into the image into a WinRar .rar or .zip. From here on this will be referred to as (secret.rar)

3. Open command prompt by going to Start > Run > cmd

4. In Command Prompt, navigate to the folder where your two files are by typing
cd location [ex: cd C:\New Folder]

5. Type [copy /b xyz.jpg + secret.rar xyz.jpg] (remove the brackets)

Congrats, as far as anyone viewing is concerned, this file looks like a JPEG, acts like a JPEG, and is a JPEG, yet it now contains your file.

In order to view/extract your file, there are two options that you can take

a) Change the file extension from xyz.jpg to xyz.rar, then open and your file is there
b) Leave the file extension as is, right click, open with WinRar and your file is there 

EnJoy HacKinG...

How To Trace Your Facebook Profile Visitors

Now here we found who recently visited your profile.
Follow below steps for get to know your FB recent visitors
.




Step 1) Go to your Facebook Profile Page.
Step 2) Now Press Ctrl + U from your keyboard for see source code of your profile page.
Step 3) Now press Ctrl + F from your keyboard to open search box.
Step 4) Now search this code {"list":
Step 5)  There are some Facebook Profile Ids of your friends who visited recently.
Step 6) The first one ID's are showing visits the most number of time. 
Step 7) Now if your want to findout, Open a new tab Enter below link :www.facebook.com/Facebook Profile Id
For Example : www.facebook.com/100001257992988
Enjoy The Trick.. :)

FACEBOOK: AVOID FRIEND REQUEST BLOCK

We usually send friend requests and if it's not accepted it is kept in pending. 
If there are lots of pending requests it may lead to block.



So this is a simple way to get those requests cancelled and protect your account from being blocked.

Follow below steps :-

1. Go to account settings.
2. Select `download a copy` option.
3. Choose `expanded archive` from the next page opened and enter your password and click continue.
4. Select `start my archive`.
5. After a few hours you'll get the download link in your email.
5. Download the file `facebook` and unzip it.
6. Open the folder html and then `friend_requests.htm­l`.
7. You can see the list of your friend requests and pending lists.
Now goto their accounts and click`cancel request.

That's all You are done now. Your account is safe.

How Can We Block Common Web Attacks And Protect Our Website..




A: SQL Injection
-->Types

Login Form Bypassing
UNION SQL Injection


B: Cross Site Scripting
--> Cross Site Request Forgery
C: File Inclusion
Types-> Remote File Inclusion and Remote Code Execution

On this post i am telling about five types of common web attacks, which are used in
most types of defacements or dumps of databases.
The five exploits listed above are SQL injection, XSS, RCE, RFI, and LFI. Most of the
time, we missed out some website code tags..
coz of this we get website attacks and allows the hacker for attack on vulnerable website.

----------------------------------------------------------------------------------------------------------------------------------
A: SQL Injection

--> LOGIN FORM BYPASSING



Here is an example of the vulnerable code that we can bypass very easily:

index.html file:
<form action="login.php" method="POST" />
<p>Password: <input type="text" name="pass" /><br />
<input type="submit" value="Authenticate" /></p>
</form>

login.php file:
<?php
// EXAMPLE CODE
$execute = "SELECT * from database WHERE password = '{$_POST['pass'])";
$result = mysql_query($execute);
?>


We can simply bypass this by using ' or '1=1', which will execute "password = ''or '1=1'';".

Alternatively, the user can also delete the database by executing "' drop table database; --".

PREVENTION:

Use mysql_real_escape_string in your php code.

Example:

<?php
$badword = "' OR 1 '";
$badword = mysql_real_escape_string($badword);
$message = "SELECT * from database WHERE password = "'$badword'";
echo "Blocked " . $message . ";
?>


--> UNION SQL Injection

UNION SQL injection is when the user uses the UNION command. The user checks for the vulnerability by
adding a tick to the end of a ".php?id=" file. If it comes back with a MySQL error, the site is most likely
vulnerable to UNION SQL injection. They proceed to use ORDER BY to find the columns, and at the end, they use
the UNION ALL SELECT command. An example is shown below.

http://www.site.com/website.php?id=1'

You have an error in your SQL syntax near '' at line 1 SELECT SUM(quantity)
as type FROM orders where (status='completed' OR status='confirmed' OR status='pending') AND user_id=1'


No error--> http://www.site.com/website.php?id=1 ORDER BY 1-- 

Two columns, and it comes back with an error! This means that there is one column.
http://www.site.com/website.php?id=1 ORDER BY 2-- 

Selects the all the columns and executes the version() command on the only column.
http://www.site.com/website.php?id=-1 UNION SELECT ALL version()-- 

SOLUTION:

Add something like below to prevent UNION SQL injection.

$evil = "(delete)|(update)|(union)|(insert)|(drop)|(http)|(--)|(/*)|(select)";
$patch = eregi_replace($evil, "", $patch);


>-------------------------------------------------------<

B: Cross Site Scripting

Cross site scripting is a type of vulnerability used by hackers to inject code into vulnerable web pages.
If a site is vulnerable to cross site scripting, most likely users will try to inject the site with malicious javascript or try to
scam users by creating a form where users have to type their information in.
Two types of XSS (cross site scripting) are persistent XSS and non-persistent XSS.

Example:
http://www.site.com/search.php?q=">

SOLUTION
(javascript) (Thank you, Microsoft!):

function RemoveBad(strTemp) {
strTemp = strTemp.replace(/\<|\>|\"|\'|\%|\;|\(|\)|\&|\+|\-/g,"");
return strTemp;
}


------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

C: File Inclusion

Types: Remote File Inclusion/Local File Inclusion, and Remote Code Execution

Remote File Inclusion allows a hacker to include a remote file through a script (usually PHP). This code is mostly patched on websites, but some websites are still
vulnerable to the vulnerability. RFI usually leads to remote code execution or javascript execution.

Example of the vulnerable code:

<?php
include($_GET['page']);
?>


Exploiting it would be something like this:
http://www.site.com/page.php?page=../../../../../etc/passwd or
http://www.site.com/page.php?page=http://www.site.com/xyz.txt?

SOLUTION:

Validate the input.
$page = $_GET['page'];
$allowed = array('index.php', 'games.php' 'ip.php');
$iplogger = ('ip.php');
if (in_array $page, $pages)) {
include $page {
else
{
include $iplogger
die("IP logged.");
}


For remote code execution, the site would have to have a php executing command. You would patch this by about doing the same thing.

----------------------------------------------------------------------------------------------------------------------------------

Note: Hope this post will helpful for your website to secure from these types of attacks..

Convert Youtube to Mp3 audio iPod iPhone and PSP

Bender Converter is an easy-to-use online application for downloading and converting videos from such services as YouTube, Daily Motion, Mega Video, Vimeo, TwitVid.com, Veoh, Google Video and many others. You can download video and audio in MP3, AVI, FLV Flash, iPod / iPhone and other popular formats. The service is fast and doesn’t require you to register. All that you need is a link to a page with a video and our software.




It works in four simple steps:

1) Choose the format in which you want to download the video / audio.
2) Enter the complete address of the webpage with the video (for example: http://www.youtube.com/watch?v=eCeahsbZk14).
3) Press the “Convert” button.
4) Press the “Download” button to save file to your computer and you ready to go.

Go to Bender Converter here

Convert youtube video to audio

5 ways to bypass surveys

When you searching for some programs or games activator or crack of file etc. is often with survey. You need to complete survey and then its give you download link. But its need long time. And there are some tricks to bypass surveys.

Method 1:
------------
With disabling JavaScript on Google Chrome.
Go to Google Chrome settings. Scroll very down and press on Show Advanced settings...
Click on Content Settings button and under JavaScript section choose Do not allow any site to run JavaScript.
Now when you go to website that asks for surveys and your bypass them.
Method 2:
------------
When you are prompted to take a survey, Right Click the title and Click on Inspect Element.
Now keep pressing Delete button to delete scripts on Inspect Element tab, until Complete a Survey disappear
After the bar disappear.
Now you can see full content or download link.
Method 3:
------------
There are a special website, that bypass surveys. Just open that website and paste that survey link and survey was unlocked. Open this Website.
http://surveybypass.com/
Method 4:
------------
There are a special program that bypass survey. just download that program, open, paste link of survey and survey was unlocked. Download this program.
http://howtobypasssurveys.com/download/
Method 5:
------------
There are an extension for Google Chrome for bypassing surveys. Download this Extension.
https://chrome.google.com/webstore/detail/bypass-surveys/cjakedkphmphnlilokfkgkdclmhakhjg?hl=en

Google Name is enough

Google backs an undersea cable that will give the internet a big speed boost
The internet is quickest when you have a direct connection to the sites you're trying to reach, but that's a daunting challenge in the Pacific -- undersea network cables can cost hundreds of millions of dollars. It's therefore good to hear that Google and a host of telecom giants (China Mobile, China Telecom, Global Transit, KDDI and SingTel) are backing FASTER, a $300 million fiber optic cable that runs between Japan and the US. As the name implies, it's all about speeding up data transfers between Asia and the Americas; the cable should offer a whopping 60 terabits per second of bandwidth between the two regions, which makes even Google's gigabit home internet service look puny by comparison. You won't see the difference until FASTER is finished in the second quarter of 2016, but it promises to improve the internet as a whole when it's ready. Don't be surprised if foreign multiplayer games and video streams get noticeably smoother within a couple of years.

Friday, 6 November 2015

Some Tricks For Window User



Trick 1> If your computer is slow? then clean up the ram..

>Open notepad
>type FREEMEM=SPACE(64000000)
>Save it as ram.vbs
now run the script.
Check out !!


Trick 2CracK BIOS Password

>Open the CPU
>Observe the Motherbord
>Remove the Silver Battery(3v)
>Wait 2 minutes and place the Battery
>>Restoring a Lost Desktop-
>Start
>Run 
Type a period " . " 
Then press Enter

Trick 3Create folder without name

>select any folder
>rename it
>press alt & type 0160 or 255
>enter

Trick 4Increase the speed of your file sharing

Simple Way to Share Multiple Folders :
Goto Run and Type SHRPUBW.EXE then press Enter
Select the folder you want to share and Set permissions, 
your share folder is ready now..... 

Trick 5AUTO DELETE TEMPORARY FOLDER.!!

what i prefer is %temp% " without quotes.. at Start -> Run.. this opens ur temp folder n den u cal erase it nearly
First go into gpedit.msc
Next select -> Computer Configuration/Administrative Templates/Windows Components/Terminal Services/Temporary Folder
Then right click "Do Not Delete Temp Folder Upon Exit"
Go to properties and hit disable. Now next time Windows puts a temp file in
that folder it will automatically delete it when its done! Note from Forum Admin: Remember, GPEDIT (Group Policy Editor) is only available in XP Pro.

Trick 6> Show your name in taskbar

Trick to Show Your name after time in taskbar...
Try this trick to add up ur name in place of AM and PM beside time Its simple

Step-1:- Navigate to -> Start -> Control Pannel -> Regional and Language Option -> Click on Customize -> Go to TIME Tab -> Change AM symbol and PM symbol from AM and PM to ur name -> Apply -> Ok ...
Did It change? If not, follow step-2 below.

Step2:- Now go to time in taskbar and Double Click it to open "Date and time property" ...Look place where time changes in digital form i.e. 02:47:52 AM , click to arrow to change the AM or PM by selecting and press arrow. It will Show ur name or name that was entered by u, Apply -> OK 
Done

Trick 7> Locking Folders:

Consider you want to lock a folder named XXXX in your E:\, whose path is E:\XXXX.
Now open the Notepad and type the following

[code]ren xxxx xxxx.{21EC2020-3AEA-1069-A2DD-08002B30309D}[/code]

Where xxxx is your folder name. Save the text file as loc.bat in the same drive.
Open another new notepad text file and type the following

[code]ren xxxx.{21EC2020-3AEA-1069-A2DD-08002B30309D} xxxx[/code]

Save the text file as key.bat in the same drive.

Steps to lock the folder:
To lock the xxxx folder, simply click the loc.bat and it will transform into control panel icon which is inaccessible.
To unlock the folder click the key.bat file. Thus the folder will be unlocked and the contents are accessible.

Enjoy :)

Thursday, 5 November 2015

Run Firefox inside Firefox


How to run Firefox inside Firefox.?

Yup you can run Firefox inside firefox just by typing following url.

How about Opening Firefox inside Firefox which is again in another Firefox..?
Not bad huh?
And its really easy too just type in this url in Firefox's address bar and there you go!
Firefox inside Firefox!

copy paste following url in a web browser (mozilla firefox).

chrome://browser/content/browser.xul

OPEN BLOCK WEB USING CALCULATOR

Now access the internet via your standard Microsoft Calculator using this trick.
You can do this for fun or when your browser is messed up for some unexplainable reason.



STEPS:

1. Open your MS Calculator. This is normally found in Start => All Programs => Accessories => Calculator.

2. Open the help-window by pressing the F1 key.

3. Click the top-left corner icon of the help window once (Standard is a Document with a Question mark).

4. Select 'Jump to URL'.

5. Type your address into the available field, but remember to type http://, and not just www. (or equivalent).

How to Shutdown PC with timer

Do you know that you can make your PC shutdown at a time u wish to?
Here is the trick!!
How To Make A Shutdown Timer!




********** METHOD 1 ***************
1. Right click on your desktop and choose "New=>shortcuts".
2. In the box that says "Type the location of the shortcut",
type in "shutdown -s -t 3600" without the quotation marks and click next. Note: 3600 are the amount of seconds before your computer shuts down. So , 60secs*60mins=3600secs.
3. Make up a name for the shortcut and you're done.
You can change the icon by right clicking=>properities=>change icon=>browse
TO ABORT:
To make an abort key to stop the shutdown timer just create another shortcut and make
the "location of the shortcut" to " shutdown -a" without the quotes.


********* METHOD 2 *************
Here is another trick to shutdown at a specific time, for example you wish to shutdown at 11:35am. Type this in

start=>Run
Type Code: at 11:35 shutdown -s

TO ABORT:
Code:shutdown -a