Wednesday, 20 April 2016

Call On Any Number For Free

Here's a trick for android n iphone users only.
1. First, download CROWD CALL software on ur device n install it.
2. Now when u start this software it'll ask u to enter ur number n here just
fill your number.
3. Now enter destination number to which u want to call.
4. Within 5 sec. u'll get a call on ur number with an international number, now just attend the call n press
1, n wait for few seconds.
5. Now CrowdCall will connect u with ur friend.
P.S : u can make 10 calls per day for unlimited time.
Official Website : http://crowdcall.me/

Create Your Own Search Engine

Create Your Own Google Search Page..

Step 1: Open Your Browser.
Step 2: Go To www.goglogo.com.
Step 3: Type Your Name In Search Barr.
Step 4: Click On "Create My Search Page Now".

? Top 5 Security Tips To Protect Your Computer From USB Viruses ]]
With increasing anti-virus security in place against email-aware viruses and malware, hackers are turning
their attention to less well-defended routes such as USB drives. This is the latest method that’s used by
hackers to torment innocent users. However, there are ways you can protect your computer from USB and Pen
drive viruses.
Invest in an excellent anti-virus program that has built in USB virus scan and remover. These anti-USB virus
scan programs not only protect your computer from USB Autorun viruses but can also clean worms, Trojans and
viruses in your USB memory sticks.You can try anti-virus programs for USB virus such as USB Virus Scan, USB
Drive Antivirus and so on.
1.Block USB Viruses:
=========================================
2.Disable Your Computer’s Autorun Feature
When you plug in a USB drive stick into your system, the Autorun feature initiates automatically. If your USB
contains any virus programs, it’ll use the Autorun feature to infect your computer. To protect your computer,
disable the Autorun feature.You can disable the Autorun feature via the Control Panel.
Alternatively, you can use antivirus software to disable and enable the Autorun feature whenever you want.
Additionally, these USB blocking softwares allowsystem administrators to specify which removable storage
drives users can access.
Keeping your USB device driver updated is a good way to ensure greater stability for your USB drives. While
this won’t help eradicate USB viruses, USB device drivers are constantly updated to block viruses and deliver
timely warnings. You can update your USB device drive from your Windows Computer Management feature in the
Control Panel.
=========================================
3.Update Your Device Driver:
USB firewalls prevent Windows OS from processing malicious programs when a virus infected portable USB device
is opened. USB firewalls monitor only your USB devices, and not your CD and DVD drives. By using USB
firewalls, you’ll be enabling a basic level of protection from the autorun.inf viruses that spread from
portable USB devices.
=========================================
4.Use USB Firewall Software:
Viruses are sometimes created via damaged documents. If you are transferring a set of files to your USB drive,
make sure the transfer is complete before you eject the device. Always use the Safely Remove Hardware feature
of Windows OS. This is because partially transferred or damaged files can in turn corrupt other files on your
USB drive…

Tuesday, 19 April 2016

Use Free Internet In Airtel

Airtel SIM.
Step 1 : Put you Airtel SIM in dongle
connected it to the computer
.step 2: Go to Device Manager >Select the
Modem/ dongle > Advance . In Advance
simply type this
(+cgdcont=1,”IP”,”airtelmms.com” ).
Step 3: Create a Dial-up connection.
Step 4: It will connected but there will be
network access.
Step 5 : Go to connect it you will see
connected.
Step 6: Right click on connected and click on
properties.
Step 7 : Go to network tab and check all the
checkboxes.
Step 8: click on internet protocol version.
(TCP/IP)
Step 9: click on propeties.
Step 10: select the following DNS server.
Adresses
Step 11: Enter any free DNS server.
156.154.70.1
202.138.96.3
Step 12: Click ok.
Step13: Then again Click ok.
Step 14: A message will appear "Setting will
take palce next time you dial it" click ok.
Step 15: Again connect after Disconnecting.
Now your Internet is free!!

Monday, 18 April 2016

Facebook and Google Account Hacking

Hack facebook account and Gmail account using Backtrack 5

In this tutorial I am going to show you how to hack facebook account using backtrack 5. So just follow the
simple steps. First you must know what is backtrack?
Open your backtrack 5’s terminal and type cd /pentest/exploits/set
Only Local Area!
Now Open social Engineering Tool kit (SET) ./set
Just hit ENTER and SET will Open , Now just select 1st option (1 Social-Engineering Attacks) and hit enter
after that 2nd number (just type 2 as shown in snapshot)
Now Just select 4th Option “Tabnabbing Attack Method” and Hit ENTER
Then select 2nd option “Site Cloner” and Hit ENTER
Now here you need to add the URL of Facebook (if you want to hack gmail then just add the gmail’s URL)
Now just hit the enter.
Open new terminal and just type ifconfig and hit ENTER
Now just copy this IP address and open it in Browser.
Now here I am just typing test email and password to see whether it works or not.
Now just hit enter and switch back to our terminal and we found the Email and password !
Now give the ip address to victim and tell him to login and then his email and password will be in your hand.
Congratulations you have learnt Hacking.
This tutorial is just educational purpose only.

Methods Of Hacking a Facebook Account


1. Social Engineering
2. Facebook Phishing
3. Keylogging
4. Password Stealers
5. Brute Force Attacks
6. Dictionary Attacks
7. Exploiting Facebook's Trusted Friend
Feature
8. Fake SMS (To Hack Facebook Status)
9. Session Hijacking
10. Sidejacking
11. Clickjacking
12. Mobile Phone Hacking
13. DNS Spoofing
14. USB Hacking xD
15. Man In the Middle Attacks
16. Botnets
17. By Pass Security Question
18. Cookies Grabing

Facebook Tricks

Facebook Tricks You Might Not Know !!!
1) Facebook Status Trick Blue Color Status update:
Copy and Paste the following code and remove all + sign and also replace Type your text here with your status
@[+1: ]@+@[+1:[0:1: Type your text here]]
2) Trick For Scheduling A Status:
Login into ur Facebook account and go to the link http://laterbro.com/.
then click on Facebook select ur time zone and click on Next. Type ur status select the date and time to post
and finally click on Schedule button
3) Facebook Status Trick Update Facebook Status With Symbols:
It's cool to see our status message, sometimes we want to add some icons. Facebook status symbols do not have
to use the inbuilt facility.
Http://fsymbols.com/all/
Follow this link copy the desired symbol and update it as ur status.
4) Whoever opens the below link is redirected to their own profile
http / facebook.com / profile.php? = 73322363
click on this link to check the answer
You can play the some prank on ur facebook friends
5) 3D View Of The Status Of Facebook
https://apps.facebook.com/statusanalyze_fb/
6) Download Facebook Photo Album With A Single Click
Go to www.facebook2zip.com
Click On Login With Facebook
Then click on OK
Now here is the option whether u wanr to download ur own album or urs friend and click Next
Now select the album you want to download any

Hack A Facebook Account


How to: Hack Any FB Account
Today in this article I am going to
explain how to steal such
cookies of different accounts
using Cain – Abel and Wireshark
software and how to use it to
access our victim accounts.
First off I need to say that this
will NOT steal anyones password
unless they log in while you are
monitoring them. This will
however give you their cookies
which you can use to steal there
session and have full acess to
their account. This will work for
Facebook, a lot of emails (sorry
no gmail), and just about any
forum (except this one). If you
are familiar with SSLstrip you can
use this method to hijack any
session (paypal, bank websites,
any email, etc.)
Facebook Cookie Stealing And
Session Hijacking
Wireshark Software to capture
cookies:
Wireshark is the best free packet
sniffer software available today.
Actually, it was developed for
making a network secure. But,
the same software is now used
by hackers to test for
vulnerability and security
loopholes in the network and to
attack the network accordingly.
Cookie stealing being one of the
types of hacks implemented
using this Wireshark software.
Requirements:
Cain and Abel : http://
www .oxid. it /cain.html
Wireshark : http://
www . wireshark. org/
Firefox 3 (or one compatable
with add n edit) : http://
www. oldapps. com /firefox.php?
old_firefox=59
Add n Edit (cookie editor for
firefox) : https://
addons. mozilla. org /en-US/
firefox/addon/add-n-editcookies/
Acess to the network with user
you want to hack
Network traffic
Prerequisites: Download and
install all above programs. To add
“Add n Edit” to your browser just
open firefox, go to tools, then
click add-ons. you can drag and
drop the program from
wherever you saved it into the
little box that popped up and
install it from there.
Below, I have listed steps on how
to capture Facebook and other
accounts cookies. This will help
you to know how Wireshark and
Cain-Abel can be used to sniff
packets and capture cookies.
First: Gain acess to the Network.
Open networks or your own
network would be easy but if
you have a specific slave you
want you should be able to gain
acess using Backtrack.
Tip: use reaver to exploit WPS for
WPA/WPA2 encryptions, WEPs are
easy to crack given time and OPN
means there is no password.
Second: Right click Cain and
choose ‘run as administrator.’ on
the top bar go to ‘configure’ and
be sure to select your wireless
card/adapter. now click where it
says ‘Sniffer’ then this litte button
towards the top left:
Next click any empty white box
then the blue “+” symbol near
the button you pressed just
before. choose okay
Now we go to APR on the
bottom bar. Once again click any
empty white box then the blue
cross. It’s easiest to just go one
by one and choose all
possibilities.
Now we have to poison them so
we choose the little yellow
hazard symbol towards the top
left.
we are done here, just minimize
Cain for now.
Third: Run wireshark as
administrator. On the top bar
choose ‘Capture’ then ‘Interfaces.’
Here you will have to choose
your interface that is connected
to the Network we are sniffing
from. if you wait a few seconds
you might see some traffic being
collected,
just choose that interface b/c
thats most likely it.
Wireshark will list and color-code
all the traffic it sees for you. To
make this simpler we can use the
filter to only see the traffic we
want, Type “http.cookie” in the
filter. (Something to consider is
to just filter to “http” and scroll
through the entries looking for
ones that start with the word
“POST” this means that
information was submitted to
the webpage noted such as a
username and a password! so if
you see this just look through
the details and you should see
the info you want, most
passwords will be hashed but
use this site to decript them:
http://
www. md5decrypter. co.uk/ )
Here is an image:
You can either look through this
information manually or use the
search function to find what you
want. In my case i want to hijack
the session of a user on the
forum freerainbowtables.com so
i will use the search function
(press Ctrl+F, or go to edit ->
search) and type in the
information i know for sure will
be in the entry. if your hijacking
someones facebook put
‘facebook’ there. Most of the time
to be safe i do not use the first
entry i see b/c this will only work
if the person is auto logged in, so
just go down a few more until
you see one you think will work
(just use common sense).
Hope u like it

Google Secrets

20 Great Google Secrets
Google is clearly the best general-purpose search engine on web
But most people don't use it to its best advantage. Do you just plug in a keyword or two and hope for the
best? That may be the quickest way to search, but with more than 3 billion pages in Google's index, it's still
a struggle to pare results to a manageable number.
But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google's search
options go beyond simple keywords, the Web, and even its own programmers. Let's look at some of Google's
lesser-known options.
Syntax Search Tricks
Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or
characteristics of Web pages. Google has a fairly complete list of its syntax elements at
www.google.com/help/operators.html
. Here are some advanced operators that can help narrow down your search results.
Intitle: at the beginning of a query word or phrase (intitle:"Three Blind Mice") restricts your search results
to just the titles of Web pages.
Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth.
Intext: is perfect when what you're searching for might commonly appear in URLs. If you're looking for the
term HTML, for example, and you don't want to get results such as
www.mysite.com/index.html
, you can enter intext:html.
Link: lets you see which pages are linking to your Web page or to another page you're interested in. For
example, try typing in
link:http://www.pcmag.com
Try using site: (which restricts results to top-level domains) with intitle: to find certain types of pages.
For example, get scholarly pages about Mark Twain by searching for intitle:"Mark Twain"site:edu. Experiment
with mixing various elements; you'll develop several strategies for finding the stuff you want more
effectively. The site: command is very helpful as an alternative to the mediocre search engines built into
many sites.
Swiss Army Google
Google has a number of services that can help you accomplish tasks you may never have thought to use Google
for. For example, the new calculator feature
(www.google.com/help/features.html#calculator)
lets you do both math and a variety of conversions from the search box. For extra fun, try the query "Answer
to life the universe and everything."
Let Google help you figure out whether you've got the right spelling—and the right word—for your search. Enter
a misspelled word or phrase into the query box (try "thre blund mise") and Google may suggest a proper
spelling. This doesn't always succeed; it works best when the word you're searching for can be found in a
dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query.
(If you're searching for "three blind mice," underneath the search window will appear a statement such as
Searched the web for "three blind mice.") You'll discover that you can click on each word in your search
phrase and get a definition from a dictionary.
Suppose you want to contact someone and don't have his phone number handy. Google can help you with that, too.
Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number
matches the listing, you'll see it at the top of the search results along with a map link to the address. If
you'd rather restrict your results, use rphonebook: for residential listings or bphonebook: for business
listings. If you'd rather use a search form for business phone listings, try Yellow Search
(www.buzztoolbox.com/google/yellowsearch.shtml).
Extended Googling
Google offers several services that give you a head start in focusing your search. Google Groups
(http://groups.google.com)
indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your
shopping via two tools: Froogle
CODE
(http://froogle.google.com),
which indexes products from online stores, and Google Catalogs
CODE
(http://catalogs.google.com),
which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the
surface. You can get a complete list of Google's tools and services at
www.google.com/options/index.html
You're probably used to using Google in your browser. But have you ever thought of using Google outside your
browser?
Google Alert
(www.googlealert.com)
monitors your search terms and e-mails you information about new additions to Google's Web index. (Google
Alert is not affiliated with Google; it uses Google's Web services API to perform its searches.) If you're
more interested in news stories than general Web content, check out the beta version of Google News Alerts
(www.google.com/newsalerts).
This service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send
you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements
with Google News to limit the number of alerts you get.)
Google on the telephone? Yup. This service is brought to you by the folks at Google Labs
(http://labs.google.com),
a place for experimental Google ideas and features (which may come and go, so what's there at this writing
might not be there when you decide to check it out). With Google Voice Search
(http://labs1.google.com/gvs.html),
you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time
you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled
for this to work). Remember, this service is still in an experimental phase, so don't expect 100 percent
success.
In 2002, Google released the Google API (application programming interface), a way for programmers to access
Google's search engine results without violating the Google Terms of Service. A lot of people have created
useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as
Google Alert. For many applications, you'll need an API key, which is available free from
CODE
www.google.com/apis
. See the figures for two more examples, and visit
www.pcmag.com/solutions
for more.
Thanks to its many different search properties, Google goes far beyond a regular search engine. Give the
tricks in this article a try. You'll be amazed at how many different ways Google can improve your Internet
searching.
Online Extra: More Google Tips
Here are a few more clever ways to tweak your Google searches.
Search Within a Timeframe
Daterange: (start date–end date). You can restrict your searches to pages that were indexed within a certain
time period. Daterange: searches by when Google indexed a page, not when the page itself was created. This
operator can help you ensure that results will have fresh content (by using recent dates), or you can use it
to avoid a topic's current-news blizzard and concentrate only on older results. Daterange: is actually more
useful if you go elsewhere to take advantage of it, because daterange: requires Julian dates, not standard
Gregorian dates. You can find converters on the Web (such as
CODE
http://aa.usno.navy.mil/data/docs/JulianDate.html
excl.gif No Active Links, Read the Rules - Edit by Ninja excl.gif
), but an easier way is to do a Google daterange: search by filling in a form at
www.researchbuzz.com/toolbox/goofresh.shtml or www.faganfinder.com/engines/google.shtml
. If one special syntax element is good, two must be better, right? Sometimes. Though some operators can't be
mixed (you can't use the link: operator with anything else) many can be, quickly narrowing your results to a
less overwhelming number.
More Google API Applications
Staggernation.com offers three tools based on the Google API. The Google API Web Search by Host (GAWSH) lists
the Web hosts of the results for a given query
(www.staggernation.com/gawsh/).
When you click on the triangle next to each host, you get a list of results for that host. The Google API
Relation Browsing Outliner (GARBO) is a little more complicated: You enter a URL and choose whether you want
pages that related to the URL or linked to the URL
(www.staggernation.com/garbo/).
Click on the triangle next to an URL to get a list of pages linked or related to that particular URL. CapeMail
is an e-mail search application that allows you to send an e-mail to google@capeclear.com with the text of
your query in the subject line and get the first ten results for that query back. Maybe it's not something
you'd do every day, but if your cell phone does e-mail and doesn't do Web browsing, this is a very handy
address to know.

Sunday, 17 April 2016

Reason's For Crashing Up of PC

Top Reasons for Crashing Up of PC

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press
Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open
applications."
You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with
this. What can you do? More importantly, how can you prevent it happening?
1 Hardware conflict
The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other
devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.
For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy
disk drive IRQ 6. Each device will try to hog a single IRQ for itself.
If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same
IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if
your computer has a hardware conflict is through the following route:
* Start-Settings-Control Panel-System-Device Manager.
Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight
Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ
number appears twice, two devices may be using it.
Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be
ignored. The best way to fix this problem is to remove the problem device and reinstall it.
Sometimes you may have to find more recent drivers on the internet to make the device function properly. A
good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by
moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the
warranty).
When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal
surface to discharge any static electricity.
To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to
the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in
a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.
2 Bad Ram
Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal
Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged
and will need replacing.
But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond
(70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will
often crash the machine if the Ram is overworked.
One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can
make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the
motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When
handling Ram try not to touch the gold connections, as they can be easily damaged.
Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It
is best not to mix the two types, as this can be a cause of trouble.
EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free
memory problems often linked to old Dos-based programmes.
3 BIOS settings
Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way
to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.
Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the
settings that appear on the screen. That way, if you change something and the computer becomes more unstable,
you will know what settings to revert to.
A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a
CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up
and freeze the computer's display.
Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the
BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is
switched to 'yes' to allow Windows to do this.).
4 Hard disk drives
After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good
idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to
* Start-Programs-Accessories-System Tools-Disk Defragmenter
This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk
is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task
Scheduler.
The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the
desktop).
Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead
optimisation. This can be adjusted by going to
* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.
Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few
months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files
folder. Deleting the contents (not the folder) can free a lot of space.
Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors
or bad sectors. Go to
* Start-Programs-Accessories-System Tools-ScanDisk
Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.
5 Fatal OE exceptions and VXD errors
Fatal OE exception errors and VXD errors are often caused by video card problems.
These can often be resolved easily by reducing the resolution of the video display. Go to
* Start-Settings-Control Panel-Display-Settings
Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that
window. For most desktops, high colour 16-bit depth is adequate.
If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does
not have a hardware conflict. Go to
* Start-Settings-Control Panel-System-Device Manager
Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it
(make it blue) and press properties. Then select Resources and select each line in the window. Look for a
message that says No Conflicts.
If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of
everything you do in case you make things worse.
The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change
Settings button. You are searching for a setting that will display a No Conflicts message.
Another useful way to resolve video problems is to go to
* Start-Settings-Control Panel-System-Performance-Graphics
Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems
relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer
to communicate with a device).
Look up your video card's manufacturer on the internet and search for the most recent drivers for it.
6 Viruses
Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive,
making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to
* Start-Settings-Control Panel-Add/Remove Programs
Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.
A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures
are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software
manufacturer.
An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton
AntiVirus 2000, made by Symantec ( www.symantec.com).
7 Printers
The action of sending a document to print creates a bigger file, often called a postscript file.
Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a
document also uses a considerable amount of CPU power. This will also slow down the computer's performance.
If the printer is trying to print unusual characters, these might not be recognised, and can crash the
computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to
clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a
cold boot, will restore the printer's default settings and you may be able to carry on.
8 Software
A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by
uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an
application from your system properly. This will also remove references to the programme in the System
Registry and leaves the way clear for a completely fresh copy.
The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled.
Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on
Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.
Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry
is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org
Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see
the message "Starting Windows" press F4. This should take you into Safe Mode.
Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading
properly.
Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error
messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU
internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.
Remember to restore all the BIOS settings back to their former settings following installation.
9 Overheating
Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the
CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a
common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.
One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks
are available from www.computernerd.com or www.coolit.com
CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine
run more slowly, but it should also be more stable.
10 Power supply problems
With all the new construction going on around the country the steady supply of electricity has become
disrupted. A power surge or spike can crash a computer as easily as a power cut.
If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give
you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled
shutdown in case of a power cut.

Earn Money Online

Make Money Online !!!

1. Cost Per Click ( CPC )
This method is based on earning from click on ads published on your site, web pages, forum or any apps. I have
already discuss about cpc in my article about ads. If you want to learn more in details about cpc must read my
article about ways to make money from ads.
The following best cost per click networks which offers best rates for every click are
Google Adsense:- It one of biggest and popular trusted network by everyone. Google Adsense Offers Highest CPC
and CPM rates. But its earning is totally depend on your visitors location and CTR also. It not so easy to get
approval of adsense.
Media.net:- This is new network form by partnership of yahoo and bing with media.net. It is good competitor of
adsense. It offers good CPC rates as compare to others.
Chitika:- It is also most popular network for CPC. It also offers best revenue from ads but slightly lesser
than Adsense
Infolinks:- It is one the best program for text based ads. It offers good revenue for In-text link ads and for
other banner ads also.
Bidvertiser:- It is also relative good as compare to others but its is lesser as compare to above programs.
But Still it is best one.
2. Cost Per Mile ( CPM )
This method is based on earning from every impression made on ads published on your website or blogs. For
every 1000 unique impression you will earn money. But difficult task is to choose best network which offers
best rates. It is also known as CPM method.
Some best CPM networks are
Tribalfusion
BrustMedia
BuysellAds
Valueclickmedia
VibrantMedia
Adpepper
Cpxinteractive
MadadsMedia
3. Sell Affiliates Products
Affiliates marketing is commission based program. Means for every successful sale made buy you. Then you will
earn commission. In my recent article i discuss about Bigrock affiliates program which offers commission for
every sale of domains and hosting plans. If you want to learn more about affiliates then i suggest you read in
more detail about affiliates program.
Here are following Best affiliates which offers good commission
Google Affiliates
ClickBank
Commission Junction
E-junkie
Amazon Affiliates
eBay Affiliates
DigiResult
FreeLancer
4. Cost Per Action ( CPA )
In this method you will earn money for every successful action done by user which required on that spot. It is
just like an affiliates but in this network if their ads about filling any details or subscribing email
service or any other . If someone fill details required by ads then you will earn for every successful action.
ClickBooth
Peerfly
CPAWay
MaxBounty
CPALead
NeverBlue
Mgcash
5. Earn From Uploading
Their are many programs which based on download program. But in last few years their are many report about
increasing spam in these types of programs. It means for every successful download of your file will get earn.
some programs are on premium based but some offers free service.
Some trusted download networks are
ShareCash.org
CashFile.org
Uploadables
6. Write For Other Sites
If you are interested in writing online then this is best to make money . If have knowledge about any specific
topic or field. Then the best way is to write articles for other services or you can also hire yourself to
write for other blogs who want any author for their blogs.
Below Given are Some networks which gave you money to write for them
PayPerPost
Social Spark
Sponsored Review
RevewMe
Payu2Blog
7. Complete Online Surveys
This is one of the effective and easiest way for everyone who want to make money online because it don't
required any web knowledge or technical skills. In this network you have to fill the accurate information for
every question ask on survey. This is best way to make side earning for working 2,3 hours on internet.
Some Best survey programs are
MySurvey
Dollersurvey
SurveyMonkey
SurveySpot
Myview
ClearvoiceSurvey
Toluna
GlobalTestMarket
8. Online Projects / Freelance
It is freelancer job means like data entry jobs. Their are many programs in which you can apply your
application or as per rule. Then you have to complete specific project and task. For every successful
completing project you will get earn. Their are many programs which are based on freelancer services.
Some Networks which are based on freelancing are below
Microworkers
Elance
Fiverr
Odesk
BreakStudio
ConstantContent
9. Selling Products which you own
It is also an effective to way to make money online if you have any product and service which you feel that
peoples likes to buy. You can also put your product on online auction which is best idea to earn more. You can
also design any product which you own. you can also sell some services or plans online to get earn.
Amazon
eBay
Quikr
OLX
Sell.com
Gazelle.com
10. Selling Products which you don't own
It just like an affiliates marketing selling any product which you don't owns but you can sell them of any
direct advertiser or by using any network. You can also sell spaces on your website or blog for displaying ads
of any product. Which help to earn money for every product sale.
Amazon Associates
ebay
Shirtcity
CafePress
Above Mentions are 10 different ways to start working online.

True Facts About A Legend Bill Gates

1. Bill Gates earns $250 every SECOND, that's about $20 million a DAY and $7.8 billion a YEAR!
2. If he drops a thousand dollars, he won't even bother to pick it up
because in the 4 seconds it takes to pick it up, he would have already
earned it back.
3. U.S's national debt is about$5.62 trillion. If Bill Gates wants to
pay the debt by himself; he will finish it in less then 10 years.
4. He can donate $15 to everyone on earth and still be left with $5
million for his pocket money.
5. Michael Jordan is the highest paid athlete in the U.S. If he
doesn't drink and eat, and keep his annual income at $30 million,
he'll have to wait for 277 years to become as rich as Bill Gates is
today.
6. If Bill Gates were a country, he will be the 37th richest country on
earth.
7. If you change all of Bill Gate's money to $1 bills, you can make a
road from earth to moon 14 timesback and forth. But you will have to make that road non-stop for 1400years,
and use a total of 713 BOEING 747 planes to transport all the money.
8. Bill Gates will be 42 this year. If we assume that he still can
live for another 35 years, he has to spend $6

Top 6 Websites To Learn Coding

The below Websites will help you to learn CSS, HTML, PHP, JavaScript, CSS3, HTML5, Ruby, etc and it doesn't
require any skills .
#1. w3schools
#2. Codecademy
#3. Code avengers
#4. CodeSchool
#5.TeamtreeHouse
#6.Dreamincode

5 Websites To Learn Fast Typing

!!!!!!! 5 BEST WEBSITES TO LEARN FAST TYPING !!!!!!!!
1-> www.goodtyping.com
2-> www.10-fast-fingers.com
3-> www.typingweb.com
4-> www.typeracer.com
5-> www.typeonline.co.uk
enjoy

4 Ways To Be Anonymous Online

Want to be anonymous online to view blocked websites, protect your self from hackers or want to hack some one
and stay un-traced?. In the following post i will explain 4 easy ways by which you can stay anonymous online!
----------------------------------
1. Using Proxies
A proxy is an address ( IP address ) of a Server (proxy server) that is placed between your computer and the
Internet The advantage of a proxy is that your real IP address is Hidden so when you hack your giving the IP
address of the proxy sever and not your real IP address Same way if your a normal Internet user the hacker
won't get your real IP but the IP of the proxy server.You can use it to enter site or forum that you are IP is
banned. To know more about proxies les me know above this post and I will post a full tutotial about it.
2. Using Tor
Tor-proxy is a free proxy-server service that Internet users can use to hide their IP address while surfing
the Web. Tor (The Onion Router) is free software for enabling online anonymity. Tor directs Internet traffic
through a free, worldwide volunteer network consisting of more than three thousand relays to conceal a user's
location or usage from anyone. I have written a complete How to guide on how to use tor - just let me know if
you need it
3. SSH Tunneling
SSH tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to
tunnel unencrypted traffic over a network through an encrypted channel.In easy language,you can surf net
without being monitored and even surf blocked sites too. To know more about SSH and SSH tunneling let me know
if you would like to read: SSH tunneling guide.
4. Using VPN
Virtual Private Network. Basically it’s a private network which lets users to connect to other users or remote
sites using a public network usually internet. It uses “virtual” connections routed through the Internet from
the company’s private network to the remote site or employee instead of physical connections. In short, it is
private network constructed within a public network infrastructure, such as the global Internet. The Biggest
difference between proxy and VPN is everything in a VPN is encrypted which gives an additional layer of
security.

Call On Any Number For Free

Here's a trick for android n iphone users only. 1. First, download CROWD CALL software on ur device n install it. 2. Now when u start th...