Get FREE lessons from "Hack It Easy Hacking Course"

Enter your email and instantly receive the lessons in your inbox for free

Tuesday, June 23, 2009

How to hack a website

Many of you have asked me on how to hack a website, so when i got an email from a reader i decided to post the message to my blog to be read by others as well.

So here is the reply,

To, the reader,

So you need to hack a website, see hacking a site is really very hard and very easy at the same
You may hack a site in just few minutes or sometime some days and sometimes never.

To hack some site first know about it.
Do a whois of it on google, know what server they use, what hosting platform and the language the site is built in.
Then learn about SQL injections, they are the easiest way to hack a site. But mastering over that is really tricky. So i suggest u first learn languages such as C, HTML these are the basic that u must know, then go ahead and learn "pyhton", java, SQL.

See hacking is not easy and requires a lot of hard work. Hackers are guys who have a strong commitment to not giving up. I Know that for sure, and you must have the mind to try new stuff. Like go and browser the site, look for the sitemap. See what sort of structure they use. How they edit their site, do they have a login account and many more....

Even though you may not be able to hack the site even on thousands tries but surely you will gain a lot of knowledge how stuff work around on the web.

For any further queries do reply, i love helping people.


Shashank Agarwal

We have moved to

We now have a .com domain , we have moved to and all my further posts will be there only. I have moved all of my posts to as well.

Please do subscribe to the new blog to keep getting such great posts.
Subscribe to the new blog

Sunday, June 14, 2009

Get IP address from mail ID

Hello Freinds, I am back with some more cool tricks this time that can save you from various security threats.

Now i am gonna just tell you, how easy it is to find the IP address of the person who has sent a mail in Yahoo.

(The information is meant only for security use and any misuse can be liable to punishment)

* Login to your account and Open the mail.

* On the right-top corner, click Options ==> Select "Standard Headers".

* There you are with all the ip addresses of the person who sent you the mail.

Check the ip address aside to the from:

But the mail sometimes may not come directly from his/her pc. Inorder to deviate the user the mail is passed through many gateways and then finally sent. And to trace out the IP address in such a case find the last "From :" and check the IP there.

Delete Recent Documents history

Any document that you open in Windows is added to the Recent Documents list. Now with this simple trick you can stop that!!!

* Start ==> Run ==> Type "Regedit"

* [HKEY_CURRENT_USER\Software\Microsoft\Windows\

* Right Click on the right Pane and create a new DWORD value.

* Assign Value Name as "NoRecentDocsHistory"

* Data Type as "REG_DWORD (DWORD Value)"

* If Value Data = 0 : disable restriction
1 : enable restriction

Delete Recent Documents history

Any document that you open in Windows is added to the Recent Documents list. Now with this simple trick you can stop that!!!

* Start ==> Run ==> Type "Regedit"

* [HKEY_CURRENT_USER\Software\Microsoft\Windows\

* Right Click on the right Pane and create a new DWORD value.

* Assign Value Name as "NoRecentDocsHistory"

* Data Type as "REG_DWORD (DWORD Value)"

* If Value Data = 0 : disable restriction
1 : enable restriction

Auto Complete passwords

Hi Techies!!
Remember the Windows "Password Remember" prompt, each time you login to a new website?? Here's some freaking information about the magic box.

For some sites, we don't require the auto login , and so might choose "No" in the dialog box. This may end with the dialog box not being displayed ever. So just follow the steps below if you want the prompt back.

* Enter the site and double click the login field

* This displays a list of usernames that are Auto saved.

* Highlight the Username and click "Delete".

Now try logging in and you are again with the same dialog box.

This can also be acheived with a simple registry setting, if the above isn't working for you....

* Start ==> Run ==> Enter "Regedit"

* HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\IntelliForms\SPW

* You can see a list of encrypted passwords.

* Now select the SPW key and click "Delete".

Every password that you enter is saved with a unique SPW key, whether you select "YES" or "NO".

But the Auto complete data is saved in a different storage:

HKEY_CURRENT_USER\Software\Microsoft\Protected Storage System Provider

Each of the passwords can be decrypted with various tools available.

Access folders from taskbar

Tired browsing to the Windows Explorer to find your files?? Then try this simple trick that can add your explorer to the task bar.

* Right-click on the taskbar on the space between Start Menu and the Tray

* Click "Toolbars" ==> "New Toolbar"

A New Window opens with a list of folders

* Select the desired location and click "OK"

* The task bar now displays an icon for the access of your selected destination, just with a click.

Wasn't that Cool and Simple!!

Change the Letter for the Hard- Disk partition

Bored of the same old C, D, E, F drive letters? Here is a simple way to change the drive alphabets.

* Right-Click on "My Computer" ==> "Manage"

* In the "Computer Management" screen click on "Disk Management"

* Now Right-click the drive you want to change and select "Change Drive Letters and Paths.."

* Click on "Change" ==> Select from the list of alphabets in the drop down

* Click "OK"

Now check your "My Computer"........;)

Please Comment!!

Change the Letter for the Hard- Disk partition

Bored of the same old C, D, E, F drive letters? Here is a simple way to change the drive alphabets.

* Right-Click on "My Computer" ==> "Manage"

* In the "Computer Management" screen click on "Disk Management"

* Now Right-click the drive you want to change and select "Change Drive Letters and Paths.."

* Click on "Change" ==> Select from the list of alphabets in the drop down

* Click "OK"

Now check your "My Computer"........;)

Please Comment!!

Shut Down Remote Computer

Shock your colleague or surprise your friend by restarting or Turn Off their PC with this simple pack

Windows NT comes with a Resource kit with the files SHUTCMD.exe.

This can be used in a variety of ways to play with your enemies computer. Just download and install the resource kit in the "Service Pack 6a".

Follow the below commands to start off:

* SHUTCMD \L -- Shuts down the local computer

* SHUTCMD \\Computer Name /Y -- Shuts down the remote computer specified their IP address

Some cool and funny tricks...

Funny Computer Tricks: Check out these tips and funny tricks
(1)Fun With Browswer :
Copy and paste the java script code in the following red lines to the address bar of your browser

javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)
Press enter and watch your window's |shaking it" You can change the value of i if you wish :-)
(2)Cool DOS Commands
Command #1: By typing in 'tree' into Dos, you can view all of the folders (not files) on the computer or User. Pretty cool but then again pretty worthless. Just a cool thing to know.

Command #2: By typing in 'ipconfig' you can view your default gateway ip adress for your router. This is really only useful if you are good with the computer and are trying to fix your internet connection, you can look at what's wrong.

Command #3: By typing in 'format c:' you can delete all the information on your hard drive, if you want to start new or something, but dont do that just to be an idiot.

Command #4: By typing in 'netstat' or 'nbtstat' (both similar) you can view the TCP/IP network of your computer.

Command #5: By typing in 'title whatever' the blue bar at the top where it is command prompt will be replaced with whatever you typed after title.

(3)Renaming the Recycle Bin
Ever wanted to rename your recycle bin? Who wouldn't?
Well, it's pretty simple, the bare bones of it are just typing in commands to the registry.
Ok, what you do is, copy this information (in bold) to notepad or something similar. (Start-->All Programs-->Accessories-->Notepad).




Once you have that copied into NotePad, save it as something like "Recyclebin.reg" (without the quotations).
Then, find whereever you saved it, click on it, say yes, and BAM!

Friday, June 12, 2009

Bluetooth Hacking Software for your mobile-

Everyone of you who owns a mobile must be aware of bluetooth and might know the possible things that can be done with bluetooth hacking. So here we give you a bunch of bluetooth hacking software that would let you do a lot more than you are supposed to. Just see the list and install these software on your bluetooth enabled mobiles and have fun...

MagicBlueHack v. 1.0 1. MagicBlueHack v. 1.0 Freeware 2008 May 26 / 2009 Feb 17 6.68
(61 votes)

MagicBlueHack is a Mobile Hacking software.By using this Software on your mobile you can access another Bluetooth mobile such as make Call(Free), Send SMS(Free), Read Phone Book and Read SMS Inbox from another Mobile without notifying the owner...

Total downloads: 3,099,055
Downloads last week: 73,850

X2Blue v. 1.3 2. X2Blue v. 1.3 Adware 2007 Aug 15 / 2007 Aug 15 6.28
(38 votes)

X2Blue provides the control of other mobile devices through bluetooth.

Total downloads: 911,158
Downloads last week: 7,828

BS Hacker - Mobile Console v. 1.0 3. BS Hacker - Mobile Console v. 1.0 Demo 2005 May 18 / N/A 4.75
(4 votes)

Experience the unique feeling of being a hacker on the move, int this hacking simulation game.

Total downloads: 25,756
Downloads last week: 100

BT File Manager v. 1.3.2 4. BT File Manager v. 1.3.2 Freeware 2008 Nov 26 / 2009 Mar 7 8.87
(8 votes)

Application to browsing and copy files from other phones connected via Bluetooth.

Total downloads: 553,545
Downloads last week: 16,415

Tictactoe over Bluetooth v. 1.0 5. Tictactoe over Bluetooth v. 1.0 Freeware 2009 Mar 5 / 2009 May 31 10.00
(1 votes)

The game that can be played alone or with other people over Bluetooth on any Nokia series 60 3rd edition handsets
GJ SUPPORTED Total downloads: 2,970
Downloads last week: 57

My Secrets v. 1.0 6. My Secrets v. 1.0 Demo 2009 Jan 4 / N/A N/A
Keep your notes protected with industry-standard 256-bit AES encryption. Organize your data the way you like. Enjoy stylish interface. Features: - clean user interface; - strong anti-hacker options; - "if found return to" information on the start-up

Total downloads: 366
Downloads last week: 3

BT Guard v. 2.2 7. BT Guard v. 2.2 Demo 2007 Dec 21 / 2009 Apr 1 9.00
(1 votes)

BT Guard application is a security application that secures your mobile from unauthorized Bluetooth access. BT Guard changes your Bluetooth status automatically according to your settings, making your phone unvulnerable and saves your battery life.

Total downloads: 73,777
Downloads last week: 157

Mobilewitch Bluetooth Remote Control v. 1.8.0 8. Mobilewitch Bluetooth Remote Control v. 1.8.0 Freeware 2009 May 4 / N/A 8.13
(8 votes)

Mobilewitch Bluetooth Remote Control is a free of charge program that can be used to control your computer from distance. The main purpose of this software is to turn your mobile phone into a universal PC remote control.

Unzip RAR files Online

Open Rar File is an on-the-fly archive creater and extractor. They support zip, tar and tgz file archives. To unzip a file, simply go to the unzip section and upload your archive. Alternatively, you can create a file archive. Simply go to the zip section and upload up to 10 files and specify which compression format you want. They will then zip up your files and provide you with the download link.

How to read/open data from .nbu files

.nbu files are the backup files created when you create the backup for your Nokia Mobile. It is created using Nokia PC suite and later can be restored to your phone. Only problem is we can’t open the .nbu files without any nokia device.

To overcome this problem we have one software called NOKI. From their site:

Noki is a utility to explore and extract Phone book, SMS, Calendar, Memo, Bookmark and other user files from the backup file of Nokia phone (using Nokia PC Suite).


  • Supports .nbu, .nfb and .nfc.
  • contacts.cdb: Symbian Contacts Database for all Symbian phones (include Nokia, Siemens, Sony Ericsson etc.).
  • backup.arc: mass storage/SD card backup file.
  • Softpedia security certified.



This is a small trick that many Dos might already know. The trick just shows you how to run a Dos command and instead of displaying the outputs on the screen, it saves the outputs into a file.

This trick is very helpful when you want to save the result of a dos command to a file to email it or read/print it later. For example, you can print out your network configuration data and email it to a technical support.

Here’s how

simply put a “>” and the destination file at the end of the dos command. Examples:

This command outputs the IP configurations to the file “ipdata.txt” in “C” drive:
ipconfig /all > C:\ipdata.txt

This command outputs the “Path” configurations to the file “pathdata.txt” in the floppy drive “A“:
path > A:\pathdata.txt

This command outputs help text of the command “copy” to the file “copyhelp.txt” in “C” drive:
copy /? > C:\copyhelp.txt

Thursday, June 11, 2009

Add Shortcut to The Device Manager To Your Desktop

Adding a link to your device manager
This allows you to quickly see all the devices attached to your computer. The conventional method is to go to it from the Control Panel or you can access the device manager by Right clicking on My Computer icon and then selecting Device Manger from it. Here is a simple trick that puts this in shortcut.

This way you do not need to restart the computer. To add the Device Manager Icon:
1. Right click on an open area of your desktop.
2. Select New / Shortcut.
4. Replace C:\WINDOWS with whatever directory you installed Windows95.
5. Click on the Next box.
6. At the next dialog box type in Device Manager.
7. Click on the Finish when you are done.
Note: Replacing the 1 with a 3 will bring up the Performance Status.

Change Startup and Shutdown SOUNDS in windows

Have you ever felt bugged-up with the Start-up and Shutdown jingle of your Windows XP or Vista ? If yes, here is the solution, now you use any of your favorite voice or music or dialogue as your PC’s shutdown and start up.

It’s a simple 4 step process.

Step 1.

Choose the track which you want to play at start-up and shutdown jingles,

Limitations are

* It should be in .WAV format.
* The size of file should not be large, prefer keeping them within in 1 Mb, otherwise your startup will take a bit longer.

If the file you want to make your start-up or shutdown is not in .WAV format, you can easily convert them using Jet Audio 7, or any other converter.

Step 2.

Now rename these files as “Windows XP Startup.WAV” and “Windows XP Shutdown.WAV” respectively.

Step 3.

Now Go to “C:\WINDOWS\MEDIA”, here you will find files “Windows XP Startup.WAV” and “Windows XP Shutdown.WAV”, move them to some other locations, this step is required for, in case you need to revert back these sounds, else you can ignore this step.

Step 4.

Now the files you have chosen and renamed, just copy-paste or cut paste them in “C:\WINDOWS\MEDIA”, here you go, now you can enjoy the new Start-up and shutdown.

Renaming the Windows Logon Box

Rename the Windows Logon box, just follow the simple steps. Mail me if any problem!!

Run regedit and go to HKEY_Local_Machine\Software\Microsoft \Windows\CurrentVersion\Winlogon
Then add or change the key:
LegalNoticeCaption REG_SZ="(Title for Box)"

And the same for this key:
LegalNoticeText REG_SZ="(Message to be displayed in the box)"

Some cool tricks i just discovered

This is a complimation of computer tricks, mainly security and privacy related.

Getting Ip’s:–

To see the ip all computers you are connected to (web servers, people attempting to **** into your computer). Go to dos (start>run>type command) and run the netstat command. Type netstat /? for details.

Type netstat -r at the command prompt to see the ip of all computers you are connected to

In MSN (and other programs) when you are chatting to someone everything you type goes through the MSN servers first (they act as a proxy) so you see their ip rather than who you are chatting to. You can get round this by sending them a file as MSN doesn’t send file through its proxy.When you type the netstat -r (or -a for a different view) the ip’s are under the foreign address table. The ports are seperated by a : . Different programs use different ports, so you can work out which ip’s are from which program.

Connecting to other computers and what ports are:–

Servers send information. Clients retrieve. Simple. Windows comes with a built in program to connect to other computers called telnet. To start Windows telnet Start menu> Run> type Telnet. Click connect> remote system Ports are doors into computers. Hosts are computer names (ip number or a name that is translated into the ip automatically) Different programs open different ports, but they always open the same ports so other computers know which port to connect to. You can get a port list listing all the different ports, but a basic one is: 11 :- Sends info on the computer 21 :- FTP (File transfer program) 23 :- Telnet (Login to the computers command line) 25 :- Smtp (Sends mail) 80 :- Http (Web pages) There are thousands of different programs using different ports. You can get programs called portscanners which check a computer for all ports up to a certain number, looking for ways in. You can portscan a computer looking for ways-in. Anyway, back to telnet. Type as the host and port as 80 the click connect. If nothing happens, you’re in. Wow. You are connected to Yahoo’s server. You can now type http commands (you are connected to an http server, so it supports http commands). Ie. on an ftp server you can type open and it will do something. On an http server it will just wonder what the hell you are on about. Type get / http/1.0 then press enter twice to get the file on the server at / (try /index.html) etc.)

Making undeletable, unreadable folders

Tested on Windows 95/98 By holding down alt, then typing numbers on the number pad (right of the keyboard) you can create special characters. If you hold down alt, then press 1, then let go, you got the ascii character 1. You try some randomn numbers. This goes all the way up to 255. Open a dos prompt, and type md (alt+1+9+4)someword. md is the dos command to make a directoy, now try and open the directory in Windows, you can’t. To open it, type ren (alt+1+9+4)someword someword (ren is the dos command to rename)


Proxies are computers that you connect through, hiding your computer. Most aren’t anonymous, they give away your ip. Some are. Good anonymous proxies: and programs require different ways of using proxies. To do it in internet explorer 5 go to tools, internet options, connections, settings. In the above proxies they are in the format host:port

Password files

If you lock yourself out of Windows stuff, all passwords are stored in files called *.pwl in C:windows. In Unix, passwords are normally stored at etc/passwd. This can be viewed using the cat command (prints a file to screen): cat etc/passwd. Make sure you’re passwords are shadowed (not actually in etc/passwd). Also make sure they aren’t in a file called shadow, especically not in a file called etc/shadow.Unix passwords are encrypted far better than Windows one’s (to be fair, Windows 95 isn’t designed for users), but can still be cracked through a program called jon.

Wednesday, June 10, 2009

10 amazing things to do with a USB pendrive

Any ordinary USB memory device can do a lot more than you probably thought it could. It can carry programs, encryption and even a full installation of Windows XP! Here is our tenlist for the coolest things you can do with a USB thumb drive:

Take your programs with you

We all know how frustrating it is when we take your files to another computer just to discover that the software required to read the files is not installed.

Here’s the simplest solution - take your programs with you - on your USB thumb drive. Here’s how to do it with Portable Apps:

1. Go to the Portable Apps website and download the installer, choosing the software you want to carry along.

2. Run the installer and install the software to the root of your USB thumb drive.

And you’re done! As soon as you connect your thumb drive into a computer, Portable Apps will open up automatically.

Surf anonymously

With Portable Apps and Firefox, you can surf the web without leaving any trace on the computer you are using. If you want extra security, install a Firefox security plugin such as FoxyProxy. To iput Firefox onto the drive, just copy-paste the Firefox folder from you computer, or install Firefox onto the thumb drive.

Set a program to run automatically (autorun)

Using autorun, you can set a program to start up automatically when you connect the drive to a computer. You can also use the same script for a data CD-ROM. Note that some computers have autorun disabled for security purposes. [Here's how to disable autorun.]

Open up notepad and paste the following script:





Make sure you replace filename with the full path to the file. For example, a file called program.exe in a folder called “programs” on the thumb drive would be /programs/program.exe

Replace description with a short description of the program, for example, My Jukebox or Mozilla Firefox.

Save the file as autorun.inf, making sure you select “All Programs” from the save menu, not “Text document”!

Help! I’m lost!

Ever lost a USB drive? Even if you haven’t, there’s a pretty good chance you’ll lose a few during your life. And with all the important information on it, it could be a disaster to have it fall into someone’s hands.

A good idea is to encrypt all the information on the drive, but you would still want it back, wouldn’t you? Luckily, the folks at the Daily Cup Of Tech have come up with a solution.

Save a program called “Help! I’m Lost!” on the drive, that a finder just can’t get around opening. The program opens a message box with your personal “I’m lost” message. It’s a good idea to offer the finder a bigger reward than the drive itself, so that they’ll be interested in contacting you.

Hide the drive inside something

Why not surprise your friends and co-workers by sticking something that looks like a broken USB cable into the computer’s USB drive?

You’ll be sure to get a few shocked faces when you start to play a movie from it.

The guys from show us how to do it. (You are gonna need an unbelievably small thumb drive for this…)

Secure your PC

Just like with an RFID badge, you can use a USB drive to lock and unlock a PC. Insert it to begin working and pull it out when you’ve finished, locking the computer. There are several programs for this . Rohos, a commercial program and WiKID, a semi-open source one.

If you really need to secure your computer with a USB drive, I suggest you give Rohos a try, as WiKID is rather complicated.

Portable jukebox

Don’t just carry the music with you, also carry the player! You can install audio programs such as WinAmp and CoolPlayer+ on your thumb drive. Just unextract the ZIP folders to the USB drive.

If you want the jukebox to start up automatically when you connect the memory stick to the computer, use the autorun feature shown tip 3 and point it to the exe of your audio player.

Encrypt your data

If you carry any sensitive indormation on your USB memory stick, a good idea is to encrypt it. Hardware-level encryption will help, but it will cost extra. You can get a free program to encrypt your data just as securely. For this I recommend TrueCrypt, but most others will also do.

You will need admin access on the computer you want to use your encrypted thumb drive on, so this it’s usability a little.

Run a standalone OS for dedicated tasks

The easiest OS to boot from a USB drive is probably Linux. There are many small capacity Linux versions out there that will fit on your drive. The best 3 are Puppy Linux, Damn Small Linux and Webconverger.

Make sure you select a version that needs less space than your USB drive’s maximum, so you have room for files and software.

And this leads us nicely to the final tip…

Run Windows itself from a USB thumb drive
Modifying Windows to work on a USB drive is quite difficult, but luckily there are some tools that will do it for us. Note that you will need a separate Windows license for this, as Microsoft only lets you use one for each single computer, and a USB drive is treated by them like a computer…

What you’ll need:

  1. A licensed copy of Windows
  2. A USB device, min. 1GB (We recommend a USB hard disk, as a flash memory stick will become unusable after 100000 writing processes. Assuming that only 2 processes are used per second, the drive will last only 60 days with 8 hours of work each day… A hard disk doesn’t have this problem.)

Custom Orkut Toolbar Generator From makes an awesome application for Orkut users. They call it the Orkut Toolbar Generator.

Orkut Toolbar Generator

Custom Orkut Toolbar Generator is their second orkut app which will allow any orkut user to set their favorite links in the orkut navigation bar or orkut linkbar or orkut toolbar..or whatever you want to call that linky bar in a couple of clicks. :P

The app is amazing as it will not only serve orkut geeks and orkut hackers with immense customization but also the masses on orkut who are not familiar with complicated orkut customizations.

Custom Orkut Toolbar Generator - The App

Do leave your comments on what you think about this app. Suggestions and Criticism Welcomed.. :)

Tuesday, June 9, 2009

Errors on Hack It Easy

Sorry for errors........
We are soon going to move on some private host and abandon blogger for ever...
We have been facing problems with blogger for many days now, and when my blog's background turned black , i was just too much, so very soon we will move on to some hosting company...
And also we will move the blog to

During this porcess the domain may be closed for some days.. But you can still access the blogspot blog from

How to Unlock a mobile phone

There are many websites which simply list codes for your phone without charge. Many people believe the practice of locking phones is anti-competitive and thus there's a lot of information to help consumers fight back against this.

Who is this for?

The free method works best for older Nokia phones and some other older handsets. Yet its worth everyone quickly trying to see if you can find a code for your phone, though after trying that, go to Method 2.

Step 1. Get your facts right.

To find a working unlocking code for your handset, you need three pieces of info; its brand/model number, the network, and the IMEI code. Here's how to find them.
  • Brand and model number. Chances are you already know this, as it's likely to be written on the handset, it's box, and any documentation you got when you bought it, so I'll move on.

  • The network. This is simply the network the phone's currently locked to, not the one you want to get on.

  • The IMEI. The International Mobile Equipment Identity is a unique number given to all mobile phones, which gets marked as invalid when phones are reported lost or stolen. To find your IMEI, simply type *#06# into your handset, and note down the number that appears.

Step 2. Find an unlocking code.

There are a raft of websites dedicated to phone unlocking. Which you should head for first depends on your handset brand.

  • Nokia phones. The easiest way to unlock older Nokias is via codes found on sites like Trycktill, Unlock Nokiafree or Unlockitfree.

  • Other brands. Both Trycktill and Unlockitfree do list a few codes for other brands, though no where near as many as for Nokias. Some handsets by other manufacturers are not unlockable by freely-available codes, but it's still worth running a quick Google search to see if yours is one of the few that is (though do check it's a legitimate source). Also you'll find a full discussion of other phone in the Unlocking non-Nokia phones discussion in the Mobile Phone Forum.

    If it transpires that you can't unlock your phone with a free code go to Method 2.

Step 3. Use it!

The sites above will generate a code based on the info you provided, so double check it's right first. The code will look something like this. #pw+2746763089+1# (Nokia phones), or *2767*637# (Other makes).

To unlock, take the Sim card out of the phone and put in a different network's Sim. Now you can put the code in...

How to enter the code.

Rather than using the regular text keys you need to use the * key if you want to produce letters as opposed to numbers. To produce a ‘p', press the * button three times within two seconds; to produce a ‘w', press the * button four times within two seconds; to produce a ‘+', press the * button twice within two seconds.

You should now get a message saying ‘phone restriction off' (or words to that effect). You only have five attempts to enter the correct code so be extremely careful. If none are successful, the phone will still work, but you'll have to go to the network or a retailer to get it unlocked instead.

Also you may use this site as well for nokia unlocking-

Hacking someone by knowing his IP (many tricks packed in one)

Hi guys. First of all, I want to say that I didn't make this tutorial myself, I found it on Hacking Library This is really a long tutorial. Initially i didn't wanted to post this, but on a lot of requests i finally decided to post this. If it's not authorized to post this kinda tutorials here, or if it has already been post, then I'm sorry to say useless things : )
the tutorial looks like that :

1. Welcome to the basic NETBIOS document created by aCId_rAIn. This document will teach you some simple things about NETBIOS, what it does, how to use it, how to hack with it, and some other simple DOS commands that will be useful to you in the future. THIS DOCUMENT IS FOR NEWBIEZ ONLY!!! If you are NOT a newbie then don't go any farther reading this because if you're smart enough you probably already know it all. So don't waste yourt time reading something that you already know.

1. Hardware and Firmware

1a. The BIOS
The BIOS, short for Basic Input/Output Services, is the control program of the PC. It is responsible for starting up your computer, transferring control of the system to your operating system, and for handling other low-level functions, such as disk access.
NOTE that the BIOS is not a software program, insofar as it is not purged from memory when you turn off the computer. It's
firmware, which is basically software on a chip.
A convenient little feature that most BIOS manufacturers include is a startup password. This prevents access to the system until you enter the correct password.
If you can get access to the system after the password has been entered, then there are numerous software-based BIOS password extractors available from your local H/P/A/V site.
NETBIOS/NBTSTAT - What does it do?

2. NETBIOS, also known as NBTSTAT is a program run on the Windows system and is used for identifying a remote network or computer for file sharing enabled. We can expoit systems using this method. It may be old but on home pc's sometimes it still works great. You can use it on your friend at home or something. I don't care what you do, but remember, that you are reading this document because you want to learn. So I am going to teach you. Ok. So, you ask, "How do i get to NBTSTAT?" Well, there are two ways, but one's faster.
Method 1:Start>Programs>MSDOS PROMPT>Type NBTSTAT
Method 2:Start>Run>Type Command>Type NBTSTAT
(Note: Please, help your poor soul if that isn't like feeding you with a baby spoon.)
Ok! Now since you're in the DOS command under NBTSTAT, you're probably wondering what all that crap is that's on your screen. These are the commands you may use. I'm only going to give you what you need to know since you are striving to be l33t. Your screen should look like the following:

NBTSTAT [ [-a RemoteName] [-A IP address] [-c] [-n]
[-r] [-R] [-RR] [-s] [-S] [interval] ]
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
-c (cache) Lists NBT's cache of remote [machine] names and their IP addresses
-n (names) Lists local NetBIOS names.
-r (resolved) Lists names resolved by broadcast and via WINS
-R (Reload) Purges and reloads the remote cache name table
-S (Sessions) Lists sessions table with the destination IP addresses
-s (sessions) Lists sessions table converting destination IP addresses to computer NETBIOS names.
-RR (ReleaseRefresh) Sends Name Release packets to WINS and then, starts Refresh
RemoteName Remote host machine name.
IP address Dotted decimal representation of the IP address.
interval Redisplays selected statistics, pausing interval seconds between each display. Press Ctrl+C to stop redisplaying
The only two commands that are going to be used and here they are:
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
Host Names

3. Now, the -a means that you will type in the HOST NAME of the person's computer that you are trying to access. Just in case you don't have any idea what a Host Name looks like here's an example.
there are many variations of these adresses. For each different address you see there is a new ISP assigned to that computer. look at the difference.
these are differnet host names as you can see, and, by identifying the last couple words you will be able to tell that these are two computers on two different ISPs. Now, here are two host names on the same ISP but a different located server.
IP Addresses
4. You can resolce these host names if you want to the IP address (Internet Protocol)
IP addresses range in different numbers. An IP looks like this:
Most times you can tell if a computer is running on a cable connection because of the IP address's numbers. On faster connections, usually the first two numbers are low. here's a cable connection IP.
on dialup connections IP's are higher, like this:
notice the 208 is higher than the 24 which is the cable connection.
Some companies make IP addresses like this to fool the hacker into believing it's a dialup, as a hacker would expect something big, like a T3 or an OC-18. Anyway This gives you an idea on IP addresses which you will be using on the nbtstat command.
Getting The IP Through DC (Direct Connection)
5. First. You're going to need to find his IP or host name. Either will work. If you are on mIRC You can get it by typing /whois (nick) ...where (nick) is the persons nickname without parenthesis. you will either get a host name or an IP. copy it down. If you do not get it or you are not using mIRC then you must direct connect to their computer or you may use a sniffer to figure out his IP or host name. It's actually better to do it without the sniffer because most sniffers do not work now-a-days. So you want to establish a direct connection to their computer. OK, what is a direct connection? When you are:
Sending a file to their computer you are directly connected.
AOL INSTANT MESSENGER allows a Direct Connection to the user if accepted.
ICQ when sending a file or a chat request acception allows a direct connection.
Any time you are sending a file. You are directly connected. (Assuming you know the user is not using a proxy server.)
Voice Chatting on Yahoo establishes a direct connection.
If you have none of these programs, either i suggest you get one, get a sniffer, or read this next statement.
If you have any way of sending thema link to your site that enables site traffic statistics, and you can log in, send a link to your site, then check the stats and get the IP of the last visitor. It's a simple and easy method i use. It even fool some smarter hackers, because it catches them off guard. Anyway, once you are directly
connected use either of the two methods i showed you earlier and get into DOS. Type NETSTAT -n. NETSTAT is a program that's name is short for NET STATISTICS. It will show you all computers connected to yours. (This is also helpful if you think you are being hacked by a trojan horse and is on a port that you know such as Sub Seven: 27374.) Your screen should look like this showing the connections to your computer:
Active Connections
Proto Local Address Foreign Address State
The first line indicated the Protocol (language) that is being used by the two computers.
TCP (Transfer Control Protocol) is being used in this and is most widely used.
Local address shows your IP address, or the IP address of the system you on.
Foreign address shows the address of the computer connected to yours.
State tells you what kind of connection is being made ESTABLISHED - means it will stay connected to you as long as you are on the program or as long as the computer is allowing or is needing the other computers connection to it. CLOSE_WAIT means the connection closes at times and waits until it is needed or you resume connection to be made again. One that isn't on the list is TIME_WAIT which means it is timed. Most Ads that run on AOL are using TIME_WAIT states.
the way you know the person is directly connected to your computer is because of this:
Active Connections
Proto Local Address Foreign Address State
Notice the host name is included in the fourth line instead of the IP address on all. This is almost ALWAYS, the other computer that is connected to you. So here, now, you have the host name:
If the host name is not listed and the IP is then it NO PROBLEM because either one works exactly the same. I am using host name as an example. Ok so now you have the IP and/or host name of the remote system you want to connect to. Time to hack!
Open up your DOS command. Open up NBTSTAT by typing NBTSTAT. Ok, there's the crap again. Well, now time to try out what you have leanred from this document by testing it on the IP and/or host name of the remote system. Here's the only thing you'll need to know.
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
Remember this?
Time to use it.
-a will be the host name
-A will be the IP
How do i know this?
Read the Statements following the -a -A commands. It tells you there what each command takes.
So have you found which one you have to use?
Time to start.
Using it to your advantage
6. Type this if you have the host name only.
NBTSTAT -a (In here put in hostname without parenthesis)
Type this is you have the IP address only.
NBTSTAT -A (In here put in IP address without parenthesis)
Now, hit enter and wait. Now Either one of two things came up
1. Host not found
2. Something that looks like this:
NetBIOS Local Name Table
Name Type Status
GMVPS01 <00> UNIQUE Registered
WORKGROUP <00> GROUP Registered
GMVPS01 <03> UNIQUE Registered
GMVPS01 <20> UNIQUE Registered
WORKGROUP <1e> GROUP Registered
If the computer responded "Host not found" Then either one of two things are the case:
1. You screwed up the host name.
2. The host is not hackable.
If number one is the case you're in great luck. If two, This system isn't hackable using the NBTSTAT command. So try another system.
If you got the table as above to come up, look at it carefully as i describe to you each part and its purpose.
Name - states the share name of that certain part of the computer
<00>, <03>, <20>, <1e> - Are the Hexidecimal codes giving you the services available on that share name.
Type - Is self-explanatory. It's either turned on, or activated by you, or always on.
Status - Simply states that the share name is working and is activated.
Look above and look for the following line:
GMVPS01 <20> UNIQUE Registered
See it?
GOOD! Now this is important so listen up. The Hexidecimanl code of <20> means that file sharing is enabled on the share name that is on that line with the hex number. So that means GMVPS01 has file sharing enabled. So now you want to hack this. Here's How to do it. (This is the hard part)
7. There is a file in all Windows systems called LMHOST.sam. We need to simply add the IP into the LMHOST file because LMHOST basically acts as a network, automatically logging you on to it. So go to Start, Find, FIles or Folders. Type in LMHOST and hit enter. when it comes up open it using a text program such as wordpad, but make sure you do not leave the checkmark to "always open files with this extension" on that. Simply go through the LMHOST file until you see the part:
# This file is compatible with Microsoft LAN Manager 2.x TCP/IP lmhosts
# files and offers the following extensions:
# #PRE
# #DOM:
# \0xnn (non-printing character support)
# Following any entry in the file with the characters "#PRE" will cause
# the entry to be preloaded into the name cache. By default, entries are
# not preloaded, but are parsed only after dynamic name resolution fails.
# Following an entry with the "#DOM:" tag will associate the
# entry with the domain specified by . This affects how the
# browser and logon services behave in TCP/IP environments. To preload
# the host name associated with #DOM entry, it is necessary to also add a
# #PRE to the line. The is always preloaded although it will not
# be shown when the name cache is viewed.
# Specifying "#INCLUDE " will force the RFC NetBIOS (NBT)
# software to seek the specified and parse it as if it were
# local. is generally a UNC-based name, allowing a

# centralized lmhosts file to be maintained on a server.
# It is ALWAYS necessary to provide a mapping for the IP address of the
# server prior to the #INCLUDE. This mapping must use the #PRE directive.
# In addtion the share "public" in the example below must be in the
# LanManServer list of "NullSessionShares" in order for client machines to
# be able to read the lmhosts file successfully. This key is under
# \machine\system\currentcontrolset\services\lanmans erver\parameters\nullsessionshares
# in the registry. Simply add "public" to the list found there.
# The #BEGIN_ and #END_ALTERNATE keywords allow multiple #INCLUDE
# statements to be grouped together. Any single successful include
# will cause the group to succeed.
# Finally, non-printing characters can be embedded in mappings by
# first surrounding the NetBIOS name in quotations, then using the
# \0xnn notation to specify a hex value for a non-printing character.
Read this over and over until you understand the way you want your connection to be set. Here's an example of how to add an IP the way I would do it:
Pre will preload the connection as soon as you log on to the net. DOM is the domain or IP address of the host you are connecting to. INCLUDE will automaticall set you to that file path. In this case as soon as I log on to the net I will get access to on the C:/ drive. The only problem with this is that by doin the NETSTAT command while you are connected, and get the IP of your machine. That's why it only works on simple PC machines. Because people in these days are computer illiterate and have no idea of what these commands can do. They have no idea what NETSTAT is, so you can use that to your advantage. Most PC systems are kind of hard to hack using this method now because they are more secure and can tell when another system is trying to gain access. Also, besure that you (somehow) know whether they are running a firewall or not because it will block the connection to their computer. Most home systems aren't running a firewall, and to make it better, they don't know how operate the firewall, therefore, leaving the hole in the system. To help you out some, it would be a great idea to pick up on some programming languages to show you how the computer reads information and learn some things on TCP/IP (Transfer Control Protocol/Internet Protocol) If you want to find out whether they are running a firewall, simply hop on a Proxy and do a port scan on their IP. You will notice if they are running a firewall because most ports are closed. Either way, you still have a better chance of hacking a home system than hacking Microsoft.
Gaining Access
7. Once you have added this to you LMHOST file. You are basically done. All you need to do is go to:
Once you get there you simply type the IP address or the host name of the system. When it comes up, simply double click it, and boom! There's a GUI for you so you don't have to use DOS anymore. You can use DOS to do it, but it's more simple and fun this way, so that's the only way i put it. When you open the system you can edit, delete, rename, do anything to any file you wish. I would also delete the command file in C:/ because they may use it if they think someone is in their computer. Or simply delete the shortcut to it. Then here's when the programming comes in handy. Instead of using the NBTSTAT method all the time, you can then program you own trojan on your OWN port number and upload it to the system. Then you will have easier access and you will also have a better GUI, with more features. DO NOT allow more than one connection to the system unless they are on a faster connection. If you are downloading something from their computer and they don't know it and their connection is being slow, they may check their NETSTAT to see what is connected, which will show your IP and make them suspicious. Thats it. All there is to it. Now go out and scan a network or something and find a computer with port 21 or something open.

hacking yahoo ID with IP address hack

This is only for education purpose.So who ever try this is at his risk.
I am not sure that this will work 100 %.But yes will work almost 70 percent of the times.But before that you need to know some few things of yahoo chat protocol
leave a comment here after u see the post lemme know if it does works or not or u havin a problem post here

Following are the features : -
1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.
2) When we send files yahoo has 2 options
a) Either it uplo— the file and then the other client has to down load it.
b) Either it connects to the client directly and gets the files
3) When we use video or audio:-
a) It either goes thru the server
b) Or it has client to client connection
And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remeber i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.
So lets —-yse
1) Its impossible to get a Attackers IP address when you only chat.
2) There are 50 % chances of getting a IP address when you send files
3) Again 50 % chances of getting IP when you use video or audio.

So why to wait lets exploit those 50 % chances.I will explain only for files here which lies same for Video or audio
1) Go to dos
type ->
netstat -n 3
You will get the following output.Just do not care and be cool
Active Connections

Proto Local Address Foreign Address State

Active Connections

Proto Local Address Foreign Address State

Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->

2) Try sending a file to the Target .
if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is established
HMMMM then the first attacker first phase is over
This is the output in your netstat.The 5101 number port is where the Attacker is connected.
Active Connections

Proto Local Address Foreign Address State

Thats what is highlighted in RED. So what next
3) Hmmm Ok so make a DOS attack now
Go to dos prompt and
Just do
nbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.
C:\>nbtstat -A

Local Area Connection:
Node IpAddress: [] Scope Id: []

NetBIOS Remote Machine Name Table

Name Type Status
EDP12 <00> UNIQUE Registered
SHIV <00> GROUP Registered
SHIV <20> UNIQUE Registered
SHIVCOMP1 <1e> GROUP Registered

MAC Address = 00-C0-W0-D5-EF-9A

Ok so you will ask now what next.No you find what you can do with this network than me explaining everything.

So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.

Is you Orkut account hacked or problem signing in

Orkut hack
Have you forgotten your password, is your account hacked... Don't worry Hackiteasy comes to the rescue.
First always choose a strong password, see our guide to making a good password.

Firstly, a few things you should NOT do if you don’t want your account to be hacked into:-

* Don’t run any scripts (javascript codes etc) that are forwarded to you on your Orkut account or GMail.
* Don’t ever paste any link or code in your browser’s address bar if you aren’t completely sure about it.
* Don’t choose passwords which are too easy and similar to the username. For example, if your username is, your password shouldn’t contain similar letters or sequences such as “xyz1”. These are easy to guess and hence easier to hack into.
* Don’t save your passwords anywhere on your hard drive or browser’s history in case you’re on a public computer.
* If you are planning to get Windows reinstalled from a professional, make sure you delete all cookies and history because you never know what the computer guy would wanna do.
* Don’t add people you don’t know because you can never be sure which hot looking girl can turn out to be a coke drinking chip munching hacker.
* If you do think you got hacked, DON’T PANIC immediately.

Now, some things you should do to keep your account safe:-

* Use difficult passwords which contain alphanumeric as well as numeric fields and characters such as “_” and “.” if they are permitted. I know you’ve heard it millions of times but it helps, trust me it does.
* Always sign out when you’re done checking e-mails and using your account. Closing your browser when you’re still signed in is the worst thing you can do.
* Another neat trick would be to use a separate Google ID for Orkut so that even if that does get hacked into, you don’t lose much important stuff. You will only need to inform the people that the account has been hacked and hence they shouldn’t open or send any e-mails to the concerned ID. However, if you’re using the same ID that is used for Blogging, other purposes, then you’ll be stuck badly. This is because if some service sends you a notification message and the hacker opens that, it’s probable that he would be able to enter the other account without having to know the username or password for that because the services assume that the person using your e-mail ID is actually you.
* Don’t share e-mail ID’s. Your girlfriend wants to know the password for your e-mail ID and you tell her. The other day, you break up and your girlfriend finds a new guy and they hack your account as revenge. You’re dead dude. If you’re a girl, be even more careful. Guys are crazier, over possessive and revenge prone so don’t give him the password to the account which contains vital information. If though you have shared, make sure you change the password the day you have a break up.
* Read the instructions of the website on which you are making an account. Orkut clearly states that you should NOT paste any scripts in your browser’s address bar. I hadn’t read that and so I pasted one. That’s why I’ve been thinking my account will be hacked for the past couple of days. All the people who clicked on that link had their accounts hacked, well except me. Orkut’s help is here.
* Backups are helpful. You can download your contacts and your Google Reader items from your Google account in different formats and these can be used in the new account.

Now, what to do when you know your account has been hacked? I’ll tell ya. But first step is, DON’T PANIC!

There can be two possibilities if your account gets hacked into. They are:-

* You still have access to the account.
* You don’t have access to the account.

If you still have access to the account, consider yourself lucky and immediately do the following things:-

* Go to your account settings page and change your password. Set it to something difficult and make sure it’s different from the one you had earlier. It should not be guessable incase somebody knows your old password.
* Change your security question and set it to something only you know. For example, don’t use questions like “What’s my pets name?” because anybody who knows you might know your pet’s name too and hence can hack into your account.
* Change your alternate e-mail address to another account.
* Check the “Sent Items” folder. If the hacker is careless enough, you’ll get to know what they’ve been doing to your account from here. Read all the sent e-mails and try to manually reverse the things that have been done. First step would be to e-mail all the people and tell them to not open the previous e-mail incase they haven’t already.
* Log into your account regularly and keep an eye around to make sure it isn’t being compromised still. If it is, it would be logical to give this account up and slowly shift to a new one. But you’ll have to do this in a way the hacker doesn’t notice. For example, make sure the account looks exactly the same as it used to when you’ve shifted. You can always outsmart a foolish hacker and you should know that.

If you don’t have access to your account, there are still chances you’ll get it back without much damage. So firstly, DON’T PANIC!

* When you are trying to log in, click on the “Forgot Password” option. You will be asked the secret question, answer that and the new password will be sent to your alternate e-mail account.
* GMail has the “I cannot access my account” option. In case some clever hacker used Javascript to disable that option, you can reach the password recovery page indirectly. For example, if I try to click that link in my Firefox, it automatically shuts Firefox down. You can go to their main help page by clicking here.
* There are chances that the hacker captured your account, changed your password, security question and alternate e-mail ID. In this case, you would think the account is gone but there are still ways to get it back. This can be done by asking GMail to conduct an inquiry into your account. Instructions and links are in the following points.
* You might remember that when you created your GMail ID, you got a code verifying the creation. If you still have that code saved in your alternate e-mail account somewhere, you can use this link to ask the Google people to conduct an inquiry based on the information you provide to them. In case you don’t have the verification code, you don’t need to worry because that isn’t necessary. If you do have it, it’s good because that will help them make sure you’re the real owner. Enter all the information and tell them all about how you’ve been using the account and which websites are associated with it in the “additional information”. The more information you give them, the more are the chances of you getting your account back safe and sound.

If you’re an advanced user and need to know how exactly your account was hacked, I can tell you as much as I know. There are two basic ways in which your account can be hacked:-

* Someone managed to get your password. In this case, changing the password will solve your problem.
* Somebody used advanced techniques to hack into your account. This is dangerous because even if you change your password, you are still at risk. This is done by using Javascript. There are chances you got tempted into pasting some javascript code into your browsers address bar and your account got hacked. In this case, immediately open your browser, clear all private data including history, cache and cookies. This way, the browser will forget the code and the hacker *might* not able to hack into your account anymore. However, you can never be sure so it’s better to be secure.

If your account is still hacked, well then you can safely PANIC!!

Orkut hacked accountOrkut hacked accountOrkut hacked account

Monday, June 8, 2009

Crack the BIOS password

This is the most simple and most useful hack that you must know. It lets you hack the BIOS and gain entry into any system that stores passwords in the BIOS.

Just Do the following :

Open the CPU
2. Now, observe the motherboard.
3. You notice a coin like silver Battery(3V).

--------------- NOTE --------------------------------------------------------
This battery is 24 x 7 power supply for the BIOS, which is used to run the system clock will the main power is off. It also initiates the booting process when power is switched on.

4. Remove the battery from the motherboard
(It is safe to remove the Battery)
5. Wait 30 seconds and place the battery back on the motherboard.
6. Now, when you start your system you won't be prompted for the BIOS password.

Enjoy !!!
------------------------------------ CAUTION -----------------------------------------------
Perform on your own risk !
You have to set the time of your computer when you start again.

Programs for fun does no harm just to entertain.

While surfing the net just came across this cool programs, made just for fun. These are completely made for fun and does not harm your computer at all.

I also found a fake virus program - "Haunt.exe" that does not harm your computer and acts like a virus. No danger is using it
Download the file and have fun !

File Size Description
Bush and Blair - Endless 4.37MB A very funny clip made by a spoof foreign TV channel about Bush and Blair's relationship set to the song "Endless Love".
Cartman Screen Saver.exe 454KB (Self Extracting Zip File) A 3D Eric Cartman screen saver. Watch as Cartman from Southpark bounces around your screen, cursing with his well known phrases whenever his head hits the edge of your screen. An essential for any Southpark fan. By default, the self extracting zip file will extract the screen saver to your system folder in order for you to be able to select the screen saver in Display Properties > Screen Saver.
Cillit Bang.swf 5.7MB An amusing remix of the Cillit Bang advert in the UK. Pure class. Requires Flash Shockwave plugin.
Coke Gift.exe 263KB An amusing gift from those people at Coca-Cola.
Dots.exe 73KB Or more commonly known as "boxes". This is a clever little program that can take the boredom away from waiting for those endless projects to print!
Elf Bowling.exe 860KB (Self Extracting Zip File) An extremely fun program that sees you - Santa - bowling with elves as the pins! They themsleves are not pleased, and do their best to put you off. To bowl, press space bar once the game has started.
Elf Bowling 2.exe 1,287KB (Self Extracting Zip File) The best download available on MundayWeb. This is the sequel to Elf Bowling. In this excellant game, you are on a ship playing shuffleboard with elves against your brother. A 2-player option is also available. Be careful not to knock your elves of the end of the ship or off the side and have fun shooting the penguins in the background to get extra points!! To fire your elf, click him and then click him to release him.
Football Aid.exe 384KB A very addictive program. How long can you play "keep-me-up"? 7.83MB Gollum from Lord of The Rings acceptance speech at the MTV Film awards. Extremely funny. Warning: contains strong language.
Haunt.exe 222KB Takes over your PC and does some scary stuff! Sit back and be amazed.
Jurassic Fart.wmv 1.01MB A very funny animation depicting the exinction of the dinosaurs.
Monster Eyes.exe 53KB A weird face that follows your every mouse move.
Saddam.exe 297KB Another clever program that allows you to take out your anger on said person.
Snow Game.exe 1,034KB (Self Extracting Zip File) A brilliant program that sees you in command of three snow fighters. You have to defeat the green snow fighters who increase in number as the game proceeds. Simply left click and hold any of your fighters to move them around the screen. Then let got to release the snow ball.

McAfee Site Advisor
Website and downloads verified by McAfee Site Advisor


   First Name:
* Your Email Address:


Twitter Delicious Facebook Digg Stumbleupon Favorites More