Tuesday, May 31, 2011

How to Crack a Wi-Fi Network’s WEP Password with BackTrack

http://lifehacker.com/286607/intermediate-guide-to-bittorrent?utm_source=Lifehacker+Newsletter&utm_campaign=eb4e813a91-UA-142218-1&utm_medium=email...

Wireless Tether Turns Your Phone into a Wi-Fi Hotspot

Finally, Wireless Tether. For many users, this feature is the single most important thing in the world of mobile devices, so having the ability to use it is a must. Wireless Tether turns an...

Friday, May 27, 2011

How do you enable Registry Editing again if it has been disabled by your administrator

First Method: Click Start -> Run -> gpedit.msc -> User Configuration -> Administrative Templates -> System -> Prevent access to registry editing tools -> Right Click Properties -> Set it to Not Configured. Second M!...

Wednesday, May 25, 2011

Trace route and path ping in network trouble shooting

http://www.ghacks.net/2011/05/24/network-troubleshooting-basics-tracert-pathping/...

Collection of Tools and Tricks to bypass Megavideo 72 Minutes Time Limit

http://www.blogsolute.com/megavideo-time-limit-tricks-addons-scripts-tools/8242/...

Watch the video on MegaVideo even if the link gets deleted.

Yes, what you read is right. While browsing for some videos , there appears a message that the video is deleted. Ex : http://www.megavideo.com/?v=BH6VMIAP Luckily, there is a solution to watch the same video which was...

Friday, May 20, 2011

JDBC

This article deals with JDBC completely. What is JDBC? Posted on: April 13, 2007 at 12:00 AM JDBC is Java application programming interface that allows the Java programmers to access database management system from Java...

Wednesday, May 18, 2011

Difference between Pointer and reference

In OOP like Java, guys often speak that there are no pointers but there are references. Here the reference or a reference pointers like as follows. Dog d; d.setName(); Here d is reference. Actual concept of pointers is not...

Java automatic memory management from Wikipedia

" One of the ideas behind Java's automatic memory management model is that programmers can be spared the burden of having to perform manual memory management. In some languages, memory for the creation of objects...

Monday, May 16, 2011

Lock Your Computer With USB Flash Drive

1.  Launch the predator. 2. Now Insert your USB. 3. Set the password when prompted. 4. Check that the drive letter displayed under “USB key drive” actually matches your flash drive or choose the correct letter...

Disable Create, Rename Function For Files Folders Inside a Directory

PathLock is a small utility that lets you take full control of the actions of users on each path of the system, in two moves you can decide which directories users can rename files and...

Sunday, May 15, 2011

Create Torrent of any File already Hosted on Web and Download it faster

Downloading a file from Internet using Bittorrent and direct FTP / HTTP are two different things. Torrents use Peer to Peer Technology where the load isn’t on single server instead file is served by...

Tuesday, May 10, 2011

Top 10 MySQL Mistakes Made by PHP People

A lot of developers would choose PHP than any other programming languages. Why? Because PHP is commonly said to be faster and more efficient for complex programming tasks and trying out new ideas, and is...

Sometime during the year of 2008, NRG businessman Subhash Shihora’s wife and six-month-old baby were not granted to board a flight from Delhi to Ahmedabad Irrespective of having a valid ticket because of a technical...

Saturday, May 7, 2011

Fast Voip now offers Free calls to 13 countries including India

FastVoip announced their best ever deal to make India calls totally free along with other 12 countries where you can make free calls.FastVoip, a leading VOIP company from Europe has just announced their biggest ever...

Hack into a Live Security Camera

This is a part of Google Hacking. I already posted different keywords to use in Google search engine and get many hidden results. The link is here. Now this post is latest.  Just search these...

Bing in Blackberry

“Blackberry devices will use Bing as the preferred search provider in the browser, and Bing will be the default search and map application for new devices presented to mobile operators, both in the United States...

Evolution of Email (1965 – 2011*)

Source : MicrosoftFeed...

Page 1 of 49123»