Warung Bebas

Selasa, 30 Oktober 2012

Cameyo - Portable Apps Maker

Cameyo is a free application virtualization product or portable Apps Maker. It combines best-of-breed application virtualization technology with simplicity.

Application virtualization technology packages entire applications into a single standalone executable, eliminating the need to install.
virtual application packages
While application virtualization technology has been around for years, good application virtualization products have been expensive and complex to learn. Whether you are a home user or an enterprise IT administrator, take your applications with you or deploy them easily.

Download Now From Techno-Trickz

tags: Cameyo latest Version, Cameyo 2.3.4, Cameyo 3.9 free Full version Download, Portable Application Maker Free Download, Torrent Download

Rabu, 24 Oktober 2012

New Facebook message Outfit Help And keyboard Shortcuts

As Some Of you May Have Seen, Facebook Has Released it's new Outfit For Messages And Conversations. if Not, Click See all Messages. 
 
What's New in Facebook Messages



Message anyone you know
Reach friends of friends and other people in your life, and know who's seen your message.
Bring conversations to life
Add multiple photos to any message, and see them inline. You can even include a .
Easily find any message
Scroll through a conversation to see the full history of your messages and chats. Or just use search.
 
 
Here Are Some keyboard Shortcuts To Help you With it


Search and Help
ALT+gSearch conversations
ALT+qShow/hide keyboard shortcuts
Conversations
ALT+DeleteArchive/unarchive conversation
ALT+rMark message as read/unread
                                                                         Getting Around
ALT+c                                      Start a new message
ALT+i                                        Go to Inbox
ALT+u                                          Go to Other

How to Hack an Ethernet ADSL Router

How to Hack an Ethernet ADSL Router

Hack ADSL RoutersAlmost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability in it which can easily be exploited by anyone with a basic knowledge of computer.
In this post, I will show you how to exploit a common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings and ISP login details.
Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in the Default username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later.
This makes it possible for the attackers to gain unauthorized access to the router and modify it’s settings using a common set of default usernames and passwords. Here is how you can do it. Before you proceed, you need the following tool in the process:
Here is a detailed information on how to exploit the vulnerability of an ADSL router:
  1. Go to www.whatismyipaddress.com. Once the page is loaded, you will find your IP address. Note it down.
  2. Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.
  3. Suppose your IP is 117.192.195.101, you can set the range something as 117.192.194.0 to 117.192.200.255 so that there exists at least 200-300 IP addresses in the range.
  4. Go to Tools->Preferences and select the Ports tab. Under Port selection enter 80 (we need to scan for port 80). Now switch to the Display tab, select the option “Hosts with open ports only” and click on OK.
  5. IP Scanner Settings
    I have used Angry IP Scanner v3.0 beta-4. If you are using a different version, you need to Go to Options instead of Tools
  6. Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open as shown in the below image:
  7. Angry IP Scanner
  8. Now copy any of the IP from the list, paste it in your browser’s address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the default username-password pair will be admin-admin or admin-password.
Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below:
Router Settings Page Hacked!
If you do not succeed to gain access, select another IP from the list and repeat the step-5. At least 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.

What can an Attacker do by Gaining Access to the Router Settings?

By gaining access to the router settings, it is possible for an attacker to modify any of the router settings which results in the malfunction of the router. As a result the target user’s computer will be disconnected from the Internet. In the worst case the attacker can copy the ISP login details from the router to steal the Internet connection or play any kind of prank with the router settings.If this happens, the victim will have to reconfigure/reset the router settings in order to bring it back to the action.

The Verdict:

If you are using an ADSL router to connect to the Internet, it is highly recommended that you immediately change your password to prevent any such attacks in the future. Who knows, you may be the next victim of such an attack.
Since the configuration varies from router to router, you need to contact your ISP for details on how to change the password for your model.

Warning!
All the information provided in this post are for educational purposes only. Please do not use this information for illegal purposes.

Use HOSTS File to Block or Redirect Unwanted Websites

Use HOSTS File to Block or Redirect Unwanted Websites

Block Websites Using Hosts FileThe hosts file is one of the interesting and useful feature of both Windows and Linux operating systems that provides many handy options in addressing network nodes. For instance, you can use the hosts file to block annoying ads, pop-ups, banners, porn sites, or even redirect one website to another.
In this post I will show you how to play around with the hosts file to accomplish some of the above mentioned jobs.

What is a hosts File?

The hosts file is just like any other computer file that is used by the operating system to map hostnames and domain names on to their corresponding IP addresses.
In other words, when you type “google.com” on your browser’s address bar, your computer will look for the hosts file to see if it contains the corresponding IP address for the domain name you typed (google.com). In case if no entry is present in the hosts file, the request is then passed on to the DNS (Domain Name System) server to obtain the IP address.

hosts File vs. DNS

When it comes to resolving the hostnames, the hosts file is given the first priority over the Domain Name System. In most cases, the hosts file remains unconfigured on the operating system and hence the DNS is used by the computer to resolve the domain names to their corresponding IP addresses.
However, if the hosts file is found to contain a valid entry for a given hostname or domain name, then this is picked up and used by the operating system.

Where is the hosts File Located?

Windows: In case of the Windows operating system, the hosts file is located at:
%systemroot%\system32\drivers\etc\hosts
NOTE: In most cases this should be: C:\Windows\System32\drivers\etc\hosts
Unix/Linux: In case of Linux it is located at:
/etc/hosts

How to Block a Website?

To block a specific website, all you have to do is just add a new entry for that site in the hosts file. I would prefer to backup the original file and create a new one instead of modifying it. So, if something goes wrong, you can just delete it and restore the original one! Well, here is a step-by-step procedure on how to create a new hosts file on Windows:
  1. Go to “My Computer” and you should see the “Menu bar” on top. In case of Vista and Win 7, just click “Alt” to unhide the “Menu bar”.
  2. Now in the menu bar, click on “Tools -> Folder Options”. In the “View” tab uncheck the option that says: “Hide extensions for known file types” and click on “OK”.
Windows Folder Options
  1. Open a new text pad (New Text Document.txt) and rename it to: hosts. You will get a pop-up message with a warning. Just click on “Yes”.
    Please note that the renamed file hosts should not have any extension such as hosts.txt.
  2. Open the hosts file using the notepad. Now let us assume that you want to block the sites Facebook and Youtube on your computer. For this all you have to do is add the following lines to your hosts file:
    127.0.0.1       facebook.com
    127.0.0.1       www.facebook.com
    127.0.0.1       youtube.com
    127.0.0.1       www.youtube.com
    Each entry should be placed on an individual line. The IP address and the hostname should be separated by a space or a tab. In this way, you can block any given website by just pointing it to the IP address 127.0.0.1.
  3. Navigate to %systemroot%\system32\drivers\etc. Here you should see the original hosts file, rename it to hosts_bak. Just copy and paste the new hosts file that you have created. That’s it. You’ve now successfully blocked those websites from loading on your computer.
    If you are using Vista/Win 7 you may have to take ownership of the original hosts file before renaming it.

How to Redirect a Website?

Suppose you want to redirect Friendster.com to Google.com, all you have to do is just add the following lines to your hosts file:
74.125.236.72       friendster.com
74.125.236.72       www.friendster.com
Here 74.125.236.72 is the IP address of Google.com. To find out the IP address of any given website, just go to command prompt and ping it. For example: ping google.com. You should get a ping response that displays the IP address as shown below:
Ping Test
From now on, whenever you type “friendster.com” on your browser, you will be redirected to “google.com”.

How does a hosts File work?

Whenever you block a website using the hosts file, you point it to the IP address 127.0.0.1 which in fact is the IP address of your own computer. In other words, the IP 127.0.0.1 points to your own computer and doesn’t exist outside.
So, whenever you type the URL of a website for which an entry is present in the hosts file, your computer will load the IP as 127.0.0.1 instead of the actual one and tries to establish a connection with this IP address (127.0.0.1) but fails. As a result the website doesn’t load at all.
The redirection of the website works by pointing the domain name of one website to the IP address of another website (as configured by the hosts file) instead of it’s original IP address. So, whenever you type friendster.com, it is pointed to Google.com’s IP address and thus, the Google page loads up instead of the actual page from friendster.com.

How to Block the Annoying Ads?

I have found a great solution to keep all the annoying ads, banners, pop-ups and other parasites at bay by using a pre-configured hosts called MVPS hosts file. This hosts file contains a long list of entries to block all those annoying ads and pop-ups that usually load while you are surfing the Internet. You can also receive regular updates on this to stay up-to-date. You can download MVPS hosts file from the link below:
If you are playing around with the hosts file and something goes wrong, just delete the hosts file itself and rename the original file from hosts_bak to hosts. This should bring back everything to normal. I hope you like my post after a long gap. Waiting for your comments. :)

Access Your Facebook Account with 3 Passwords

Access Your Facebook Account with 3 Passwords

Access Facebook with 3 PasswordsDid you know that you can login to your Facebook account using 3 different passwords? Seems interesting isn’t it? Yep! Unlike any other online account which has only one password to access, Facebook lets you log in using 3 different variants of your password.
Only a few Facebook users are aware of this fact, but for many others, this might seem a bit surprising. Facebook accepts the following forms of your password:

1. Your Original Password

Let me explain this to you with the following example. Assume that your default Facebook password that you created during the sign-up process is:
Facebook-Password-1

2. Password with the Case Toggled

In the above password the letters ‘F’ and ‘P’ are in uppercase and the remaining are in the lowercase. If you TOGGLE the case where all the UPPERCASE characters are converted into the lowercase and vice versa, your default password “myFacebookPass” would become:
Facebook-Password-2
Now if you log in using the above toggled password, your Facebook will accept it and welcomes you! This is the first variation of your default password which is accepted by Facebook.

3. Password with the First Letter Capitalized

If the first character of your password is in the lowercase, you may just change that first letter to UPPERCASE and Facebook will again accept it and let you in. As in case of the above example where your default password is “myFacebookPass”, if you just change the first letter to UPPERCASE, your password would be “MyFacebookPass” and this should work fine as well:
Facebook-Password-3
Please note that this option will work only for the Mobile uers!

Why 3 Passwords?

Now, you all know that Facebook can be accessed using 3 different passwords. But you may be curious to know the actual reason behind it.
Well, this is definitely not because Facebook has a bug or a serious vulnerability. In fact, this is just an option provided by Facebook itself to make the sign-in process easier for the users. Here’s how:
The most common reason for the authentic logins to be rejected is when the CAPS LOCK is ON. This is where the first variation comes in handy. That means, when the CAPS LOCK is ON the case gets reversed (toggled) for your password but Facebook will accept this as well.
In case of mobile users, it is a common for the first letter of the password to get capitalized which often leads to the login failure. So, in order to tackle this issue, Facebook will also accept the password where only the first letter is capitalized.
Thus if the CAPS LOCK is accidentally enabled, the toggled password feature would still let you log in to your account!

Tags; Facebook Hacks, Facebook Profile Hack, Facebook Password Retrieve, Software For Facebook Account Hacking, Auto Poke In Facebook, Auto Accept Friend Request in Facebook.

8 Registry Hacks to Tweak Your Windows PC

8 Registry Hacks to Tweak Your Windows PC


Registry Hacks to Tweak WindowsMicrosoft Windows offers a feature-rich interface and several customization options that make it one of the most user friendly operating systems in the world. However, computer geeks would still love to hack the Windows Registry so as to add more extra features and functionalities to their operating system.
If you’re one such geek who would like to customize Windows in your own way, here is a list of 8 interesting registry hacks that you need to try:

1. Disable USB Devices:

Disabling USB ports can be a smart idea to add security to the computer. This can be really handy if the computer is on a public place where the chances of virus and other malware infection is really high. You can easily disable access to USB ports with the following registry hack:
  1. Open the Registry Editor (Start -> Run -> Type regedit and hit Enter)
  2. In the registry, navigate to the following key:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor
  3. In the right-side pane, double-click on “Start”.
  4. In the “Value data” field enter 4 and click on “OK”.
  5. Close the Registry Editor and reboot.
To enable USB devices, follow the same procedure as above except in the step-4 enter 3 in the “Value data” field.
Works on Windows XP, Vista and 7.

2. Disable Notification Balloons in Windows 7 and Vista:

You can now disable the annoying notification balloons that keeps popping up frequently with warning messages and reminders. Here is a step-by-step procedure to do that:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
  2. Right-click on the right-hand pane, and create a new “DWORD”.
  3. Rename it to EnableBalloonTips, double-click on it and set the “Value data” to 0. Reboot the computer to see the changes in effect.

3. Add “Recycle Bin” to My Computer in Windows 7 and Vista:

Would you like to add the “Recycle Bin” icon to My Computer so that you need not go back to the desktop to access it when required? Well, here is how you can do that:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\ NameSpace
  2. Right-click on “NameSpace” and select New -> Key. Name the key with the following name:
    {645FF040-5081-101B-9F08-00AA002F954E}
  3. Now, open “My Computer” and hit F5 to refresh the screen. This should show up the “Recycle Bin” icon.

4. Disable the Windows Task Manager:

Need to limit access to your computer by disabling the Task Manager? Here is a simple registry hack to do this:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies
  2. Right-click on “Policies”, select New -> Key and name the key as System.
    If you are on Windows XP, you need not create the new key “System” as it is already present in it. So, you can directly navigate to: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\System in the Step-1 itself.
  3. Right-click on “System”, create a new “DWORD” and name it to DisableTaskMgr.
  4. Double-click on the DWORD “DisableTaskMgr” and set the “Value data” to 1 (0=Enable, 1=Disable).
  5. To enable the Task Manager, Set the “Value data” back to 0.
Works on Windows XP, Vista and 7.

5. Change the Registered Owner and Organization Name:

Here is a simple hack to change the name of the Registered owner on your computer:
  1. Open the Registry Editor and navigate to:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
  2. On the right-side pane, find the keys RegisteredOwner and RegisteredOrganization. Double-click on them to change the names to whatever you want.
  3. To see the changes, right-click on “My Computer” and select “Properties”.
Works on Windows XP, Vista and 7.

6. Add Programs to Windows Startup:

You can now add your favorite programs to Windows Startup without the need for using the start-up folder. Here is a way to do this:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
  2. On the right-side pane, create a new “String Value” and rename it to the name of the program that you want to add (you can give any name, it doesn’t matter).
  3. Double-click on the “String Value”, in the “Value data” field add the path of the executable program that has to execute at startup.
  4. Reboot the computer to see the changes in effect.
Works on Windows XP, Vista and 7.

7. Add “Pin to Start Menu” Option for Folders in Windows 7 and Vista:

Ever wanted to pin a folder to the start menu to gain faster access to it? Well, it is possible to add the “Pin to Start Menu” option so that you can plug your favorite folders to Start Menu. Here is a step-by-step procedure:
  1. Open the Registry Editor and navigate to:
    HKEY_CLASSES_ROOT\Folder\shellex\ContextMenuHandlers
  2. Right-click on “ContextMenuHandlers” and select New -> Key. Name the key as follows:
    {a2a9545d-a0c2-42b4-9708-a0b2badd77c8}
  3. Now, whenever you want to add a folder to Start Menu, hold down the Shift key and right-click on the folder. You should see the “Pin to Start Menu” option in the context menu”.

8. Disable “Aero Shake” in Windows 7:

One of the new additions to Windows 7 is the “Aero Shake” feature using which it is possible to grab a window using it’s title bar and shake it. This will minimize all the other open windows if any. It is really a handy feature! However, if you ever wanted to disable this feature, here is a solution:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows
  2. Now, right-click on “Windows” key and create a new Key called Explorer.
  3. Right-click on the “Explorer” key and create a new “DWORD” called NoWindowMinimizingShortcuts and set it’s value to 1.
  4. Close the Registry Editor and reboot the computer to see the changes in effect.
I hope you enjoyed this post. Try the hacks and share your experiences.

How to Hack Yahoo Messenger

How to Hack Yahoo Messenger

How to Hack Yahoo MessengerYahoo Messenger is one of the highly popular and most widely used instant messaging service in the world offering a wide variety of features to it’s users, all for free. This has made it the right choice for all those who are waiting to chat and communicate with their far away friends and relatives.
However, while some people use Yahoo Messenger only to chat with their friends and known ones, many others use it to have fun by joining the chat rooms and chatting with the strangers. If you’re a similar person who would like to have fun during the chat, this post if for you!
In this post, I will show you some really interesting Yahoo Messenger hacks using which it is possible to play pranks with your friends and strangers during the chat. Below is a list of some cool hacks that you’re sure to enjoy:

1. Chat with Multiple Names Simultaneously

How about chatting with your friend with two or more different names at a time? Well, do not think that this is impossible! This can easily be done with a simple workaround which enables you to chat with as many different names as you can with the same or different people.
For example, you may chat with Person-A using one name and with Person-B using the other. You can also chat with the same person using different names or any other combination. All of this goes really unnoticed by the user on the other side, while you are sure to have some real fun.
Here is a step-by-step procedure to implement this hack:
  1. Sign in to your Yahoo Messenger. From the top, click on Messenger -> My Account Info. You will be taken to a web page where you need to log in to your account.
  2. Now, you should be on the Profile Settings page. Scroll down to see the option Account Settings as shown below. From there, click on the link which says: “Manage your Yahoo! aliases”.
    Create Aliases in Yahoo
  3. From the Aliases page, click on: “Add an alias”. You can create as many aliases you want. Choose unique names for your alias and once you’re done, click on “close”.
  4. You need to sign out of Yahoo Messenger and sign in again to see the changes. Once you have done this, double-click on any name from your contact list or chat room to open a new chat window. You should now see a list of your aliases appearing in the chat window to choose from.
    Yahoo Chat with Multiple Names
  5. To chat with multiple names with a single person, just follow the steps below:
    • Double-click on the name of the person in the chat room or contact list.
    • Select any name from your “alias” list and ping the user with that name. Immediately close the chat window before you get a reply from that person.
    • Again double-click on the same person’s name and ping him/her with another name from your “alias” list. This time do not close the window.
    • Just wait a few seconds! When the person replies to both your pings, you will have two tabs in the same chat window from where you can chat with the same person using two different names. Enjoy!!!
Before you try this hack, make sure that you have not set any display image for your profile. If not, there are chances of other person identifying your prank.
To disable the display image, just click on Messenger -> My Display Image from the top menu of your YM window and set the option to “Don’t share a display image”.
I hope you like this hack. Now let us move forward to our next hack that is even more exciting!

2. Play Prank with Your Friends Using a Fake Webcam

Ever wanted to fool your friends with a fake web camera? If so, here is a cool hack using which it is possible to fool users on Yahoo Messenger with a fake webcam on your computer. Below is a step-by-step procedure to configure the fake webcam on your computer:
  1. Download Fake Webcam software from the following link:
  2. Install Fake Webcam on your computer and configure it as follows.
  3. From your Yahoo Messenger window, click on “Messenger” at the top and select the option “My Webcam”.
  4. You should now get a blank Webcam Broadcast window. From there, click on File -> Preferences to open the “Yahoo! Messenger Preferences” window as shown below. From the “Category” list, select the option “Webcam Broadcast”.
    Configure Fake Webcam
  5. As shown in the above snapshot, click on “Camera Source”, select “Fake Webcam Source” as your source of camera and click on “OK”.
  6. Now, open the Fake Webcam application, load your favorite video and click on play button. You should now see the same video appearing on the Yahoo Messenger video broadcast window as show below:
    Fake Webcam in Action
  7. Click on “Broadcast” button on the Yahoo Messenger webcam window to start broadcasting the video.
If you are using aliases, you can change your webcam profile from File -> Change Profile option on the webcam window to enable the webcam for the current alias.
That’s it! You now have the fake webcam running on your computer.

3. Yahoo Messenger Invisible Hack

Most users on Yahoo Messenger hide their presence by activating the “invisible mode”, so that they appear as offline to everyone. But, how do you find out their true status? Well, here is a Yahoo Messenger invisible hack to catch those users who are hiding their true status by activating the “invisible mode”.
There are many tools out there to do this job, but most of them are found to have been infected with trojan and other malware. However, I have found some of the free online services that help you identify the true status of Yahoo users:
Just visit any of the above mentioned websites, enter the target Yahoo ID or screenname that you want to check and press the search button. With in a few seconds you will find out the true status of the user.
I hope you all enjoy this post. Pass your comments and share your experiences.

Sabtu, 20 Oktober 2012

Stencyl Game Maker Download And Review

Game Studio in a Box

Productivity delivered.

Welcome to Stencyl, web and mobile game creation done right.
Stencyl isn't your average game creation software; it's a gorgeous, intuitive toolset that accelerates your workflow and then gets out of the way. We take care of the essentials like physics and native APIs so you can focus on what's important—making your game yours.
Publish to the App Store, desktop and the web in record time with Stencyl.

Download Stencyl Now!

Design in a "Snap"

No coding (unless you want to).

Our drag-and-drop gameplay designer pays homage to the successful MIT Scratch project. We extend Scratch's simple block-snapping interface with new functionality and hundreds of ready-to-use blocks, including special blocks for native iOS features.
Power users can create and share their own blocks, import existing code libraries and create custom classes that interact seamlessly with block-based Behaviors.

Download Stencyl Now!

Direct a Masterpiece

You're in full control.

Quickly gather resources and bring your ideas to life.
Drop in graphics from your computer to create Actors on the fly. Then use Stencyl's Actor Editor to tweak your Actors' appearances, behaviors and physical properties, and to get them ready for showtime.
If you're used to graphics editors like Photoshop, you'll feel right at home in the Scene Designer. Familiar features, such as a selection tool, zooming, grid-snapping and flood fill, will help you quickly craft complex worlds out of Actors, Tiles and Terrain.

Download Stencyl Now!

Play Everywhere

Publish to iOS, Flash, Windows, Mac & the Chrome Web Store.

Let us worry about the technology so you don't have to.
With extensive platform support, including iOS, Flash, desktop and the Chrome Web Store, you can rest assured that players will have access to your game no matter where they are.
Android and HTML5 support are on their way!

Download Stencyl Now!

Make Money

Get paid to do what you love.

Sell your game via the Apple App Store, with the potential to reach hundreds of millions of devices. We've got full support for iAds, too!
Generate ad revenue from your web games by integrating ads and APIs from web portals like Mochi, Newgrounds and Kongregate.

Stencyl Incubator

If you're serious about your craft, we offer dedicated support and a formal incubation program to advance your game to its fullest potential. These games have scored up to 5 figure sponsorships with game portals and big media companies alike.

Download Stencyl Now!

Show and Tell

Hit the ground running with StencylForge.

When it comes to game development, most of us aren't Jacks of all trades. But thanks to StencylForge, our integrated marketplace, we don't have to be.
Choose from a carefully curated selection of resources to get your game up and running quickly and avoid reinventing the wheel. If you feel like giving back, help spread the fun by sharing your own creations, too.

Download Stencyl Now!

Selasa, 16 Oktober 2012

Angry Birds Rio PC Game Full Version Free Download Redeem Code + Serial Key

Angry Birds Rio PC Game Full Version Free Download Redeem Code + Serial Key



Angry Birds Rio
Today I will enlighten you with Angry Birds Rio V1.2.2 Game Redeem Code + Serial Key Free Download
Angry Birds - As you know that Angry Birds is a very popular games especially since it have download and installed by 100 million users even more from all of the world. In earlier post you have got an Angry Birds Pc Portable and Angry Birds Rio V1.1.0 full version for Windows, But this time I will share with you guys the Angry Birds updates which is the final of Angry Birds Rio v1.2.2.
If you seen in the previews version of Angry Birds, you just only seen there's 3 from 6 rooms could opened, then the seas of 3 rooms it says "Coming Soon". Well, if you're curious with the seas of 3 rooms, then Angry Birds Rio v1.2.2 Full Patch have the answers, it is also brings you more updates:
Sytem Requirments to Play Angry Birds Rio v1.2.2 Full Patch
OS Supports: Windows XP / Vista / Windows 7
Processor: Minimal 1 GHz
Memory: 256 MB RAM
Angry Birds Rio

                                                        DOWNLOAD NOW                                                        

 

How To Use Patch

1. Install Angry Birds Rio 1.2.2 (When finish to install exit the game)

2. Run Patch then Go to patch on C:\Program files\Rovio\Angry Birds Rio

or

Copy the patch.exe to installation folder (the one with Angry Birds Rio)
on my computer it's "C:\Program Files\Rovio\Angry Birds Rio" run the patch.

4. Start Angry Birds Rio. Click on the "Redeem Code" at the bottom of the main menu level
Copy & paste the code from the text file.
That's it.

Kamis, 11 Oktober 2012

Recover Data On Formatted Memory Card


How To Recover Data On Formatted Memory Card                                                                                                                                                                              Free memory card recovery software to recover lost photos

If you happened to have any memory card data loss, like SD card, Compact Flash card, Memory Stick, Multi Media Card, Secure Digital Card, Smart Media, xD-Picture Card, where to download free memory card recovery software? How to recover corrupted memory card photos? Or is there any reliable free memory card data recovery software? How can you perform memory card recovery after format? All these issues can be properly addressed by single free memory card recovery software - EaseUS Data Recovery Wizard free. EaseUS Software also offers excellent Mac data recovery software to support data recovery from Memory card. If you work with Mac OS, you can check the article how to recover data from memory card on Mac OS.

What is memory card and memory card recovery?

Before introducing free memory card recovery software to recover lost photos, let's get some basic knowledge of memory card: a memory card or flash memory card is a solid-state electronic flash memory data storage device used in digital cameras, handheld and mobile computers, telephones, music players etc. They have high re-record-ability, power-free storage, highly compacted and stable under rugged environment.
There are many different types of memory cards. Some common places to use it include digital cameras, game consoles, cell phones, and industrial applications. It makes our life so much easier and comfortable. However, the photos or your important business/personal data also may be lost due to various reasons, such as deletion, format, partition loss, etc. Data Recovery Wizard freeware can help you recover memory card photos and important files. It easily recovers lost files due to deletion, formatted, partition loss, logical drives damage, virus infection, software crash, unexpected shutdown and other unknown reasons.

How to use free memory card recovery software?

The free memory card recovery software to recover photos, EaseUS Data Recovery Wizard free edition, devotes to serve as user-friendly software. There are seldom technical terms in the dialogs; you do not have to possess in-depth knowledge of computer to perform memory card recovery with this photo recovery freeware. That the only thing you really need to tell it is which module to use according to the reasons of data loss.
There are three modules on Data Recovery Wizard as the picture below. "Deleted File Recovery" is for recovering deleted data; "Partition Recovery" for recovering files due to partition loss or damage and "Complete Recovery" for recovering lost files or unformat memory card, etc.
Free memory card recovery software

Tips of using free memory card recovery software

Memory card recovery, like any other data recovery, the rule is applicable: you lost, and then you recover. Please do not do any change to the memory card which you want to recover files from since all these operations may damage or over-write the data on that memory card and thus cause permanent data loss.
The quicker you perform memory card recovery, the more chance you will get your files back. Once your memory card is overwritten, you will lose the chance to recover files, photos, media files, image files etc., from memory card forever.
This free memory card recovery software - EaseUS Data Recovery free, can recover up to 1 GB files, photos, image files, media files or whatever files it recovered. While if you want to recover more data, you can also download and follow the instructions to recover formatted files from memory card as an evaluation before purchasing EaseUS Data Recovery Wizard.
If you are running Mac OS X 10.7 (Lion) & 10.6 (Snow Leopard) & 10.5 (Leopard), please go to see EaseUS Mac data recovery software which supports memory card data recovery on Mac OS.
Do not forget to backup your data! Reliable Windows backup software for business and home users.
  • System, file backup and disaster recovery.
  • Backup system state or save important data.
  • Automatic backup and much more.
   Read More   Download                                                                                                                                   Posted By: Gautham Haridas, via http://www.wiki-trickz.blogspot.com

Samsung Galaxy S4 Release


samsung galaxy s3 red
The handset is apparently set to hit retailers shortly after in March – just nine months after the release of its predecessor.
In news that’s unlikely to surprise anyone on nodding terms with prevailing trends in smartphone upgrades, Samsung’s new kit will purportedly pack a larger five-inch OLED screen – up from the S3’s 4.8-inches - and international 4G LTE support.
An unnamed deepthroat said: “Samsung wants to keep its one-year product schedule and the Galaxy S4 will be the first to match that strategy.
“The S4 will see some external changes but retain its popular rectangular shape with rounded corner concept.”
News of Samsung’s plans comes as it recently announced that the S3 has now sold some 20 million units, making it the company’s fastest-selling phone ever.
Posted By: Gautham Haridas, via http://wiki-trickz.blogspot.com                                                                                                                                             

Taking a screenshot on a Windows PC


Taking a screenshot on a Windows PC is easy. Taking a screenshot (also called a screen grab, or print screen) can be done in one of several ways. Try any of the techniques listed below.

Steps

Snipping Tool Method

The Snipping Tool method works with Windows 7 Home Premium, Professional and Ultimate, and with Windows Vista editions except Starter and Home Basic. For other versions of Windows, use the Print Screen method described below. For a more detailed tutorial on using the Snipping tool, see How to Take a Screenshot with the Snipping Tool.
  1. 1
    Open the Snipping Tool. The Snipping Tool is found in Start/All Programs/Accessories/Snipping Tool.



    • The Snipping Tool is only found in Windows 7 Home Premium, Professional, and Ultimate, and in all Windows Vista versions except Starter and Home Basic. If you don't have the snipping tool, use the Print Screen method instead.
  2. 2
    Choose the kind of screenshot (snip) you would like to take. "Rectangular Snip" is chosen by default.


    • "Free-form Snip" lets you draw an area of any shape. Only the area you drew will be snipped.
    • "Rectangular Snip" lets you select a rectangular area, which will be snipped.
    • "Window Snip" lets you choose a window to snip.
    • "Full-screen Snip" snips the whole screen, with all windows (except the Snipping Tool window) included.
  3. 3
    Select the area that you want a screenshot of. If you chose "Window Snip", select a window instead. If you chose "Full-Screen Snip", go to the next step.


  4. 4
    Save the screenshot by clicking the floppy disk icon in the window that pops up. Type in a name for the screenshot and change the "Save as type:" field if desired. Read the "Tips" section for information on file types. You can now send the screenshot by email or put it on a website.

    Posted By: Gautham Haridas, via http://wiki-trickz.blogspot.com

Widget Setup for Blogger


Widget Setup for Blogger


Step 1. 
Get your widget code

Go to your Blog's profile (eg: on NetworkedBlogs), click the "Get Widget" link. Copy the text in for Option 1.
Screen_shot_2012-01-16_at_5.43.46_PM.png

Step 2. 
Navigate to Layout > Page Elements, then click "Add a Gadget"

help_blogger2.png

Step 3. 
From the pop-up list, select "HTML/Javascript"

help_blogger3.png

Step 4. 
Paste the HTML code you copied from Foreign Websites into the text area and click save. 

help_blogger4.png

Step 5. 
You're done...


                                                                                                                                                              Posted By: Gautham Haridas, via http://wiki-trickz.blogspot.in/

Selasa, 09 Oktober 2012

Download Adobe Reader 10.1.4 Offline Installer for Windows and Mac

Download Adobe Reader 10.1.4 Offline Installer for Windows and Mac

All the Ebooks and online study materials, Applications forms, and such things are published in PDF formats.  Unfortunately, Windows doesn’t have a built-in PDF reader.  There are many third party PDF viewers or converters are available in the market as free or paid version.
Adobe® Reader® software is the free global standard for reliably viewing, printing, and commenting on PDF documents. It's the only PDF file viewer that
can open and interact with all types of PDF content, including forms and multimedia.
View and interact with PDF files that contain a wide variety of content types, including drawings, email messages, spreadsheets, videos, and other multimedia
elements.
Make notes and share your feedback with others by marking up PDF documents using the Sticky Notes and Highlighter tools. 
Take advantage of the security of Protected Mode in Reader, which helps safeguard your computer software and data from malicious code.
Directly access online services at Acrobat.com
from within Reader X. Perform common tasks such as creating PDF files, securely sharing and storing documents, and screen-sharing.
You can convert the text from PDF files which can be readable by screen readers.  Then it can be saved as text format for further use if needed.  All the menus are accessible by screen readers, it allows us to use it with independently opening, saving, even printing documents.

Download:

Click the following link to download the latest version of Adobe Reader 10.1.4 offline installer (Full Installer) from FileHippo.com (48.5 MB)
Download Full Installer.
If you have already installed Adobe Reader 10, Then download the updates for this version for Windows and Mac
From Here

Sabtu, 06 Oktober 2012

Bug On Windows 8 phones

Windows 8 phones home, tells Microsoft every time you install a program



Close-up of a lock icon on a computer keyboard button.  Blue-toned.



Security researcher and blogger Nadim Kobeissi has uncovered evidence that Windows 8 doesn’t just keep a local log of installed programs — it phones home to tell Microsoft every time you install an application. This is a significant expansion of a technology Microsoft introduced in Internet Explorer 9, called SmartScreen. In IE9, Smartscreen was an optional feature that would warn users if they ran a program that wasn’t whitelisted/ lagged with a positive reputation according to Microsoft’s servers. It was part of a wider initiative to encourage developers to sign their code, and MS claimed that SmartScreen significantly reduced the chances of downloading and installing malicious malware.
Redmond decided to up the ante in Windows 8. SmartScreen is now a system-wide defense technology, enabled by default, and it tracks every program/application install on every PC. Since that data is sent to MS using a hashed value that contains the app installer and the code signature. Your IP information is also included, which makes it trivial for MS to trace back which IP addresses installed which software.
If the application has a high reputation, the install proceeds normally. If not, users are greeted with an explanation like this:
Windows 8 Smartscreen
Or this:
win8smartscreen
If the system is offline, Smart Screen apparently tosses you a warning that gasp your machine is no longer protected, and Windows can’t – clutches pearls — help you decide if a program is safe to run!
No Internet
Security advocates, thinking people, and everyone who isn’t Microsoft naturally find this troubling. For one thing, MS now has a database of what every IP is installing. Even if the company takes steps to make that information anonymous, there’s no way the government will ignore a centrally maintained database of activity once it believes it can link an IP address to particular users. Second, there’s the temptation to use this information for targeted advertising. If Microsoft sees an IP address installing video games or Xbox Live content, it know that’s probably a gamer. If you’re downloading cooking apps, you might like to see some ads for recipe websites.
This strikes at one of the problems with so-called anonymous data — it’s not actually anonymous. If I know your IP, the apps you install, and the websites you visit, I know an awful lot about you. I may not retain that data, but you can bet that governments and corporations will both want to get their hands on it. The earnings from monetizing the information, and the associated temptation, are potentially huge.
Then there’s the fact that the server Windows 8 communicates with supports an insecure version of SSL (SSLv2), the OS never warns users that SmartScreen is spying on them, and the certificate security model has some known problems and has been prominently compromised in recent memory. Even if you don’t care that Microsoft has the data, the lack of transparency is deeply troubling.

How to blow your street cred in three easy steps

Step 1: Take a principled stand for user privacy, even when that stance will anger advertisers and companies like Google.
Step 2: Stick to your guns. Declare that enabling Do Not Track by default is the best way to respect users’ right to privacy. Create perception that you are doing this on behalf of users, not because you want to screw your biggest advertising competitor and market leader.
Step 3: Blatantly ignore user privacy. Send a report of all system activity back to headquarters via IP address, possibly with a flawed cryptographic protocol. Don’t tell users what you’re doing. Imply that if they disable this service, they’ll be making a terrible mistake.
That whoosh you hear is Microsoft’s burgeoning credibility on privacy and user rights flushing down the drain. SmartScreen can be disabled in user settings, but the default implementation raises serious concerns.
Microsoft has since reached out to us with the following statement: Although Windows SmartScreen is part of the Windows 8 Express Settings during the first-run experience and we recommend it be enabled, if users are concerned about sending this data to Microsoft, they can choose to not enable the feature.
We can confirm that we are not building a historical database of program and user IP data. Like all online services, IP addresses are necessary to connect to our service, but we periodically delete them from our logs. As our privacy statements indicate, we take steps to protect our users’ privacy on the backend. We don’t use this data to identify, contact or target advertising to our users and we don’t share it with third parties.
With respect to the claims of SSL security and data interception risk posed by the SSL2.0 protocol, by default Windows 8 will not use this protocol with our service. Windows SmartScreen does not use the SSL2.0 protocol.
The one part of this statement we take issue with is the “Users can choose not to enable this feature.” At present, the W8 setup screen does not tell the user that the feature sends data to MS on every application install. The downside and privacy concerns are not presented at all. This is odd considering that MS made such a point of pushing for consumers to be notified regarding Do Not Track.                                                                                                                         Posted By : Gautham Haridas
 

Hot Thread Copyright © 2012 Fast Loading -- Powered by Blogger