May 31, 2009

This collection is made from deviant art's some of the most beautiful wallpapers, you can download some of these from below by clicking on the wallpaper image and opening them in a new tab and other wallpapers come in a pack so they can be downloaded in a rar archive format:-1. Ultra Beam by Yethzart:-2. High Definition Nature wallpaper by CurtiXs:-...

Posted on Sunday, May 31, 2009 by Unknown

May 30, 2009

Intel's Nehalem architecture is utilized in their i7 Core processors for desktops and Nehalem based Xeon processors for servers and the following features tell you about what's new in them and why you should purchase one of these.High performance: The processors perform better than the amd's phenom and intel's core 2 extreme processors available in the market. The extra performance boost is always welcomed by gamers. When performance was tested on the game World of Conflict the phenom processor gave 136 fps, Core 2 extreme processors gave 220 fps...

Posted on Saturday, May 30, 2009 by Unknown

Many of you might have watched the hltv demos (.dem files) of many professional teams and may have liked the way the weapon switching looks in htlv videos. Well if you did enjoy that and would want to have those models while you play counter strike 1.6 then you can download those models from the following link. After you have downloaded the...

Posted on Saturday, May 30, 2009 by Unknown

Microsoft is in its final stages for launching its new search engine named "Bing" previously known as Kumo. Microsoft will be launching it for the public soon.Here's what the current site (www.bing.com) looks like which implies that this search engine will be out soon.The revamped search engine will contain the following added features:A left-hand...

Posted on Saturday, May 30, 2009 by Unknown

May 29, 2009

What is a Hash and why it is used?A hash produces a fixed length output given any message and the output depends on individual bits of the data, so a change to any bit may result in change of the hash output. It is used for indexing a particular item and due to the aforementioned property it is also used for verifying the integrity of data because...

Posted on Friday, May 29, 2009 by Unknown

May 27, 2009

PHLAK is a modular security distribution. It is a derivative of Morphix, created by Alex de Landgraaf. It can be used as a live cd by security professionals to perform security analysis, penetration testing, forensics, and security auditing on a system to check whether it has been compromised in terms of security.The thing i like the most about it...

Posted on Wednesday, May 27, 2009 by Unknown

May 26, 2009

What is Wolfram|Alpha ?First thing's first Wolfram|Alpha is not your conventional search engine but is a computational engine that provides you with answers related to probably anything that has numbers or digits attached to it. It computes the answers by utilizing the structured database on the fly.What can one do with Wolfram|Alpha ?With Wolfram|Alpha...

Posted on Tuesday, May 26, 2009 by Unknown

May 18, 2009

what is a ddos attack/ping flooding attack ?ddos attack or ping flooding attack is basically sending large and continuous ICMP (Internet control message protocol) echo packets to a target host and wait for the icmp reply message. Now what this does is, it floods the target host with large data segments and if ICMP service is not disabled by the target...

Posted on Monday, May 18, 2009 by Unknown

May 17, 2009

This guide will be a walk through on how to use usenet.What is Usenet ?Usenet is basically is a worldwide distributed internet discussion system containing wealth of information. It is basically based on client server architecture. Usenet information is spread across many servers across the world or internet so there is no central entity in managing it. It was heavily dominant before the existence and being of web and still provides knowledge not easily accessible through web. It is likely that you have not heard about it because web is now dominant...

Posted on Sunday, May 17, 2009 by Unknown

In this article i discuss about certain pitfalls and things to avoid while posting in Usenet groups.The following article explains Troll, flamer,kook,cross-poster(cascades) and how to avoid them before posting.1)Troll: It comes from the word that means ugly creature. What a troll basically does is that he posts messages intended to attract predictable responses and hence people should not fall for that and should not post response to their post.the troll basically is pulling your leg by publishing boring information and vying for responses so...

Posted on Sunday, May 17, 2009 by Unknown

In this article i provide you with a presentation file that explains Advanced and basic google search operators. The most obvious question is why i need to know about them?The answer is the following benefits that it provides:The advanced search operators and basic operators reduce your search time by a large extent and if you work for an organization you would know how often you have to search for resources on the net and most of us use google search engine.It also provides you with certain kinds of information you would be not able to access...

Posted on Sunday, May 17, 2009 by Unknown

Shell servers are unix based systems that provide access to the user and user is given storage space and ability to execute commands and work on unix shell, so if you want to try out operating system like unix you can use shell servers. Also they provide a user with a text based browser like lynx to surf the internet with complete anonymity, but they generally will not let you telnet from them to another server for free (those accounts are paid).Also if someone is working on windows and cannot install linux then he/she can work on these servers.They...

Posted on Sunday, May 17, 2009 by Unknown

What's a proxy server ?What a proxy server / proxy site does is it takes request from you and forwards it to the web server you are requesting resource from. Therefore the ip address of the proxy server/site is stored in the web server and not your ip address. So this helps in multiple ways:To protect your anonymity on the internet: As already mentioned that the web server you are requesting resource from will store the address of the proxy site/server so it protects your anonymity no one but the proxy site will know that you accessed the resource.To...

Posted on Sunday, May 17, 2009 by Unknown

In this article i discuss about how to secure windows xp by closing the compromised services and also thereby increasing the speed and performance of the pc. The following steps must be followed: Open run prompt (winkey+r). Type services.msc To disable the services right click on it then press stop button, then choose disable. You can disable the following services Tcp/Ip netbios helper : It makes your system vulnerable to the most easily accomplishable netbios hack . Print Spooler : It should not be disabled if you have the printer...

Posted on Sunday, May 17, 2009 by Unknown

This dem shows how to perform russian walk. Russian walk is used to walk fast without making sound and that is very important during tournaments.People use mouse wheel binding for control , but that is not allowed in professional tournaments. Its not that difficult to master it using ctrl key itself.Just press this sequence while walking ctrl ctrl pause(walk normally) ctrl ctrl pause ctrl ctrl.and voila ! you have learned the russian walk. just practice though :=) .Here is the dem download it from here or alternate link and open it using winrar...

Posted on Sunday, May 17, 2009 by Unknown

1.SK|Spawn: He is inarguably the best player of cs1.6, he is good at every counter strike weapon awp, ak, m4a1 and he owns the best cs players, too bad he does not play anymore. Also he can play with both weapon orientation that is both right handed and left handed. Here is an ace video of his versus one of the best cs1.6 clan fnatic. 2.neo[t]: He has consummate skills of cs 1.6 and he owns the best players in this game,he is a not a good awper though but with skills that he has with ak,m4a1 he does not need to be a good awper. Here is one...

Posted on Sunday, May 17, 2009 by Unknown

This article discusses a few things that can help your pagerank in search engines.What not to do? Don't make your site multimedia heavy i.e containing a lot of flash content, it looks attractive but search engines will not index your pages based on them, so don't use heavy flash based intros instead use more content and keywords in your site it is because search engines give very high importance to plain text and content because of their primitive nature of searching text.Javascript based navigation menus: Don't use javascript based navigation...

Posted on Sunday, May 17, 2009 by Unknown

This article provides in depth detail of hosting a website on your own pcwith virtually no limit of hosting space but with the requirement that you keep your pcon at all times.This article is divided into various sections So if you know about a section just skip it1.Dynamic Domain Name System2.PHP,Mysql,Apache Installation3.Configuring Apache for Website4.Web Publishing tools5.Configuring modem/router6.How to View Your Own Website1.Dynamic Domain Name System(DDNS): What it does is simple terms is to assign a dynamicdomain name to your pc, The domain...

Posted on Sunday, May 17, 2009 by Unknown

Changing of MAC/Physical address is salutary for following purposes:If your Internet Service Provider (ISP) does mac binding with your id (Almost all do).So in case your old modem/router is no longer usable and If you want to use a new modem then itwill result in authentication failure.For "MAC Spoofing" : That is showing you have a different address to what you actually have.The Steps are:1.Telnet to your modem/router i.eGo to Command prompt and type telnet 192.168.1.1 Enter your user name and press enter and then the password.2. A menu will be...

Posted on Sunday, May 17, 2009 by Unknown

May 16, 2009

Just follow these steps:- Create a new Folder. Choose the rename option and press "alt+255 " . Then right click the folder option go to properties-> customize-> change icon and choose none. ... and u have a invisible folder. You can select it by dragging mouse while holding down the right click and store anything and no one will ever be able to see it. (See the example snapshot below) ...

Posted on Saturday, May 16, 2009 by Unknown

May 5, 2009

Problem: You are getting blank lines between your content and the table ?Solution: This scenario happens because your blog editor will add the <br> tags at the end of each line in your html code. The editor adds the tags because the blog editor is set to convert line breaks.To get rid off this error, just copy the html code into a text editor like notepad and write the code in one line (Disable the word wrap feature), now as the code is all written in one line the editor will not add those extra break tags.How to add html tables in posts...

Posted on Tuesday, May 05, 2009 by Unknown

May 4, 2009

Why manage them? Well, the reason is quite obvious the more the number of processes at start-up more will be the start-up time of windows and in addition to that these processes will consume precious resources like the main memory and cpu. So it is always a wise idea to remove the extra processes from running at the start-up. How to manage them? To...

Posted on Monday, May 04, 2009 by Unknown

To manually kill a process that you believe is a spyware and is causing high cpu usage, firstly make sure that the process actually is a spyware, this can be done by using the tasklist command with /SVC switch. So first execute the following command: Tasklist /SVC The output will be like the following:- Note: for more information about...

Posted on Monday, May 04, 2009 by Unknown

May 2, 2009

Should you add flash content to your site?You should add flash content because it makes your web pages more livelier and flash content helps in grabbing site visitor's attention.However, you should not add flash content because search engines don't index any flash content and that is bad for your site's page rank in google. Read more [Link] . The choice is yours.How to add flash content to blogger/blogspot site?Create your flash content in adobe flash or any other automated menu or button generator.Copy the code(The code containing the object...

Posted on Saturday, May 02, 2009 by Unknown