Thursday, May 26, 2016

Perfect Uninstaller Ultimate Version+


What Perfect Uninstaller can do for you ?
Uninstall any unwanted or corrupted program on your PC.Forcibly uninstall corrupted programs that cannot be uninstalled from Add/ Remove Programs.Cln all registry entries and drivers that the programs left over.Show detailed information of a certain program installed in your computer.Back up PC system files whenever you boot PC to restore system sily once PC crashes.Ftures And Benefits
Uninstall programs faster than the Add/Remove Programs that comes with Expert on Force Uninstall any corrupted programs stuck on PC.Forcibly display and uninstall hidden programs which may run on PC without your permission.Uninstall programs that could not be removed completely from Add/Remove Program.Completely cln the empty / corrupted registry entries that a certain program left over.Protect your registry from empty / corrupted errors and improve your PC performance.Backup registry so as to restore system sily when NT/2000/2003/XP/VISTSA32/VISTA64/WINDDOWS 7 crashes.Fast navigate to the folder where you install the programs to uninstall.Simple, there are just several buttons.Provide different ways of program view style: by Icons, by List, by Details.Show details of currently installed program
Perfect Uninstaller-Install
:AI9BB-F40FW-APZPI-NELDE

USB Security 6.0.0.126+


USB Security is the best software to block thrts that can damage your PC or compromiseyour personal information via USB storage.

Benefits and Ftures :

Block known and unknown thrts from removable media

Best solution to protect offline computer

Prevent unauthorized persons from stling your data

Compatible with other security software

Compatible with all popular platforms

Fastest and lightest security software

Free upgrades


How to Install It........... Follow My Instructions......
1.Unzip downloaded file 2. install "Setup.exe" file (exit USB Guard on Taskbar) 3. After install click start button OR right click on USB scan shortcut andclick on openfileloion 4. Copy file in downloaded zip file and paste in that loion 5. Click on "over right" 6. Run USB antivirus 7. Enjoy Unlimited full USB antivirus
USB Antivirus -Install

AVG Internet Security 2013 +


New Ftures in Version 2013:
* Improved scanning using enhanced scanning aorithms for faster scanning.
* Improved compatibility with a detected 3rd party Firewall.
* Refined threshold for browser memory consumption.
* Boot accelerator optimizes time needed for boot up.
* Fresh and new user interface for sier navigation and better user experience.
* AVG 2013 is fully compatible with 8.
Fixes & Impmrovments
* Anti-Rootkit: Improved reporting of corrupted sections.
* Anti-Spam: Improved configuration of all Anti-Spam components.
* DNT: Fixed crash in urlmon.dll in 8.
* eral: Alert Manager component has been removed.
* eral: Update selection dialog has been removed.
* eral: System Tools component has been removed.
* Outlook Addin: Fixed possible freeze and compatibility issue with Kerio OutlookConnector.
* Safe Surf: Fixed issue with upload speed while Safe Surf is running.
* Safe Surf: Fixed issue with occasional crash when analyzing *. Swf content.
* Scheduler: Only one scheduled scan can be running at the same time.
* Setup: Driver installation logging has been extended to provide enhanced information.
* Setup: Srch Shield component will not be installed by default, but only after having been selected for installation.
* Update: Fixed problem with rollback of failed update.

INSTALL NOTES:
Step 1: unpack rar archive
Step 2: run the setup
Step 3: Use the given to activate

AVG Internet Security 2013 - Download : Untill 2018:8MEH-RW2ZU-29S4F-26QCR-WT482-BEMBR-ACED8MEH-RNZLL-2Y4QX-79PPA-MMOKE-AEMBR-ACED8MEH-RREY3-L2LQA-LUMOR-UDTZ4-6EMBR-ACED8MEH-RF3MY-BZ7CJ-9LUAR-ST99N-CEMBR-ACED8MEH-RMXLW-HN44A-BABPA-S9NQF-PEMBR-ACED8MEH-RGM33-K474L-6FGRR-8RR7K-UEMBR-ACED8MEH-RREY3-L2LQA-LUMOR-UJXN3-6EMBR-ACED8MEH-RJXR4-2CKYP-2GB3A-DBMAD-PEMBR-ACED

Bitdefender Total Security 2013 build 16.0.16.1348 Full Version +



The Advantages of a Security SuiteSecurity suites give you a lot more than a single program. If you use your computer to engage in high risk activities and websites, a security suite is probably your best option. Risky activities can include online banking or shopping, online gaming, and the exchange of any of your personal information. Even if you are using your information on a safe website, there are ways for the unscrupulous to into your system. A single program can do a grt dl to protect you from basic and viruses, but a suite goes several steps further.A security suite condenses all of your security software into one program, which makes running it both fast and sy-to-use. Also, there are several ftures included in a suite that make the upgrade worth it. With a suite you get basic protection of all your online activities, in addition to which you get parental controls, automatic filtering of spam, a 2-way firewall to protect you from s, backed up and encrypted files, as well as a function to permanently delete files beyond retrieval.Basic protection only gets you so far. If your computer were a house, you would not want to lock the front door while lving the back door and all the open. A security suite locks your house and ensures that all the valuables inside are nailed to the floor.
Download Bitdefender Total Security 2013-32 bit
-Download

Avast! Free Antivirus 8.0.1488 full version with 100% working


Free download Avast! Free Antivirus 8.0.1488, a powerful antivirus doing a grt business in global market. Avast! Free Antivirus is the free edition provided from the grt going company Avast!. This antivirus is best in prevention from malware and spyware. It will provide you firewall protection along with web security so that you can safely execute your online work. It is recommended to use this software for at lst once.

Avast! Antivirus-Download

: 25 yrs e ----W9740570R9942A0910-8NB2E62T UP TO Avast 2038-------C34087194R9983U1147-LZLJDJ9V

Avira Internet Security 2013 +Full


AviraInternetSecurity 2012 Ftures:AntiSpam filtersout unwanted and phishing emails.AntiPhishing protects you againstidentity theftattacks.AntiAd/Spyware shuts out online spies and annoying pop-upsRootkit Protection keeps you safe from hidden malware that conventional antivirus can’t find.FireWall adds an extra layer of defense against intrusions.Web Protection stops you from landing on malicious websites.AntiDrive-by blocks unwanted software downloadwhile you surf.

Click Here to Download Avira Internet Security 2013
Click Here to Download

ARDAMAX LOGGER V3.8.9 LATEST [FULL] [FREE] [] [ ]



Ardamax logger is a troke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the logger is protected. Besides, Ardamax logger logs information about the Internet addresses the user has visited.
This invisible spy appliion is designed for 2000, XP, 2003, Vista and 7.


logger Ftures:
* Email log delivery - logger can send you recorded logs through e-mail delivery at set times - perfect for remote monitoring!* FTP delivery - Ardamax logger can upload recorded logs through FTP delivery.* Network delivery - sends recorded logs through via LAN.* Clipboard logging - capture all text copied to the Clipboard.* Invisible mode makes it absolutely invisible to anyone. Ardamax logger is not visible in the task bar, system tray, 2000/XP/2003/Vista/ 7 Task Manager, process viewers (Process Explorer, WinTasks etc.), Start Menu and Startup list.* Visual surveillance - periodically makes screenshots and stores the compressed s to log.* Chat monitoring - Ardamax logger is designed to record and monitor both sides of a conversation in following chats:o AIMo Live Messenger 2011o ICQ 7o Skype 4o Yahoo Messenger 10o Google Talko Mirandao QiP 2010* Security - allows you to protect program settings, Hidden Mode and Log file.* Appliion monitoring - logger will record the appliion that was in use that received the troke!* Time/Date tracking - it allows you to pinpoint the exact time a window received a troke!* Powerful Log Viewer - you can view and save the log as a HTML page or plain text with logger Log Viewer.* Small size – Ardamax logger is several times smaller than other programs with the same ftures. It has no additional modules and libraries, so its size is smaller and the performance is higher.* Ardamax logger fully supports Uni characters which makes it possible to record trokes that include characters from Japanese, Chinese, Arabic and many other character sets.* It records every troke. Captures s and all other invisible text.
Other Ftures:
* 2000/2003/XP/Vista/ 7 support* Monitors multi-user machines* Automatic startup* Friendly interface* sy to install
Enjoy;)
Download: This file is full Ardamax (Latest) logger with no needed, downloaded from their official site. Just Downlaod and ENJOY ;)

:
==========

Name: Luiz Ricardo P Oliveira
: 3F1A-54F8-032C


ARDAMAX 3.8.9 ::: HERE (without remote package)

Download

INTERNET DOWNLOAD MANAGER 6.07 AND




Internet Download Manager : The fastest download accelerator

Internet Download Manager is everyone's Favourite Download Managing Software, but like all good soft it is not freeware so I have this and that will make your Trial Software free and it will have no 30 Days Limit! Multilingual: English, Spanish, French, Italian, Deustch, Japanese, Portugues, etc Compatible with: 95/98/Me/2000/NT/XP/2003/Vista/Server 2008/7 (32/64-bit)





HOW TO USE IT! ::
Internet Download Manager v6.07 Build 15>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
1) Install idman607.exe2) Exit the program. (Right click on the green icon of IDM found in the system tray --> Exit) 3) Copy the file "IDMan" from the folder , in install folder, by default:C:\Program Files\Internet Download Managerand confirm to overwrite existing file.4) Run the file "reg" from folder "" to register the program.
** If after install you get the message "Fake ...", uninstall IDM, run "Unregister.IDM" to remove any previous from registry, reboot PC, install IDM again, use the & regfile to activate it.
DOWNLOAD

Thrded Mode | Linr Mode [FUD 0/35] ►(z) PE Crypter ◄ FUD your .NET\Native files sily > Many Options > FREE




Ftures :
DOM Based Cryptersy to Use with minimum need of knowledgeEffective StartUp on rebootCustom StartupSmall Stub sizeTwo totally separate RunPEsFile BinderBlock Reflector ViewMeltCustom Assembly ChangeIcon Changer


Tested & Working With :BlackShadesCyberGateDarkCometSpy-NetCerberusiStler 6.0iStler 6.3Turkojan 4 Gold
DOENLOAD

Shell Uploading With Live HTTP Hders



For this tutorial you need :
Mozilla Firefox
Live HTTP Hders -> https://addons.mozilla.org/en-US/firefox...p-hders/
Find an website which allows you to upload .jpg , .png or any other extension
So now once you have found a website , we are going to try and upload .p file
For example if i try to upload inj3ct0r.p
The server rejects the file and says wrong extension
Now we are going to rename our shell to
:inj3ct0r.p.jpg
Now try opening the , Right click on it and open in new tab
Now go to the upload spot and click browse
Go to the Live Http Hders and run it
The Capture Box should be checked
Now upload the shell , Wait for it to load completely and our inj3ct0r.p.jpg should come up on the Live Http Hders
Highlight the shell name and click on the replay button
A new should popup , now we have to find our shell name for example inj3ct0r.p.jpg and rename is to inj3ct0r.p
Now when you have done that click the replay button again
The page should refresh
Now right click on the picture you upload and open in new Tab

's pcAnywhere Source














" has been lying to its customers. We exposed this point thus sprding the world that ppl need" - #AntiSec #Anonymous
Sprd and share!



DOWNLOAD



source:r00tw0rm.com



Maxing out your Dropbox referrals (how I got 16GB for less than $10)




A friend of mine a while back shared a cool little with me. How to max out your bonus space on Dropbox by using Adwords. (Note: I am on the 50GB plan, where you can max out and additional 16GB by having 32 friends sign up and install Dropbox.)
Sign into your Google Adwords account and crte a new campaign.
First select the countries, I went with all, but took out China and a couple other ones – honestly I don’t think this made much of a difference.
For languages I chose: English, French, Japanese, German and Spanish. Select all Networks and all Devices. Your budget should max out at $20/day (you won’t need to run this campaign for more than 1-2 days).



For the words, I ran with the following list: dropbox, free online storage, online backup free, online backup, online backup data, and dropbox space:

I maxed out all CPC at $.05. As you can see above the average CPC was actually $.03.I ran two different ad copies which you can see below. I focused on the word ‘free’ and the ’2.25GBs’ that one would get with signing up.


This campaign ran for roughly one and a half days and ended up costing a whopping $9.80. So this now gets me an extra 16GB for life for less than $10, I’ll take it! Check out the data below. You’ll see that actually a lot more people signed up, but not everyone made it through the process of installing and getting Dropbox up.



Proof of the pudding:














source: rootworm.com

TheHex Workshop Professional 6.5.0.5019 incl .rar



The Hex Workshop Hex Editor by BrkPoint Software is a complete set of hexadecimal development tools for . Hex Workshop integrates advanced binary editing and data interpretation and visualization with the se and flexibility of a modern word processor. With the Hex Workshop, you can edit, cut, copy, paste, insert, fill and delete binary data. You can also work with data in its native structure and data types using our integrated structure viewer and smart bookmarks. Data editing is quick and sy with our extensive ftures that allow you to: jump to file or sector loion, find or replace data, perform arithmetic, bitwise, and logical operations, binary compare files, erate checksums and digests, view character distributions and export data to RTF or HTML for publishing.


DOWNLOAD

Acunetix Web Vulnerability Scanner 8 Consultant Edition Full +





Acunetix Web Vulnerability Scanner 8 Consultant Edition Full + | Anyone know the software Acunetix Web Vulnerability Scanner 8 Full + (Consultant Edition). This is a security software to secure your website. Acunetix Web Vulnerability Scanner 8 (Consultant Edition) is commonly used by website developers to see the gaps that exist on their website for more security is assured.

Acunetix Web Vulnerability Scanner first identifies web servers from a particular IP or IP range. After that, it crawls the whole site, gathering information about every file it finds, and displaying the entire website structure.




After this discovery stage, it performs an automatic audit for common security issues. Acunetix Web Vulnerability Scanner is a software automatically detects file inclusion That.

The Port Scanner and Network alerts allow you to perform a port scan against the web server where the scanned website is running. When open ports are found, Acunetix WVS will perform complex network level security checks against the network service running on that port, Such as DNS Open recursion tests, badly configured proxy server tests, wk SNMP community strings and many other network level security checks

SQL Injection is one of the many web attack Mechanisms used by s to stl data from organizations. Perhaps it is one of the most common appliion layer attack techniques used today. It is the type of attack takes advantage of That improper coding of your web appliions allows s to inject That SQL commands into say a login form to allow them to gain access to the data held within your database.

In essence, SQL Injection arises Because the fields available for user input allow SQL statements to pass through and query the database directly.



Web appliions allow legitimate website visitors to submit and retrieve data to / from a database over the Internet using a web browser Their preferred. Databases are central to modern websites - They store data needed for websites to deliver specific content to visitors and render information to customers, suppliers, employees and a host of stakeholders.

User credentials, financial and payment information, company statistics may all be resident within a database and accessed by legitimate users through off-the-shelf and custom web appliions. Web appliions and databases allow you to regularly run your business.

SQL Injection is the technique the which attempts to pass SQL commands (statements) through a web appliion for execution by the backend database. If not sanitized properly, web appliions may result in SQL Injection attacks allow s to view That information from the database and / or even wipe it out.



Such ftures as login pages, support and product request forms, feedback forms, srch pages, shopping carts and the eral delivery of dynamic content, shape modern websites and Provide businesses with the mns Necessary to Communie with prospects and customers. These website ftures are all examples of web appliions the which may be either purchased off-the-shelf or developed as Bespoke programs.

These website ftures are all susceptible to SQL Injection attacks the which Arise Because the fields available for user input allow SQL statements to pass through and query the database directly.

Acunetix AcuSensor Technology is a new security technology allows you to identify to That vulnerabilities more than a traditional Web Appliion Scanner, whilst erating less false positives. In Addition it indies exactly where in your the vulnerability is. The Incrsed accuracy is Achieved by combining black box scanning techniques with dynamic analyzes while the source is Executed



Advantages of using Acunetix AcuSensor Technology:

· Allows you to loe and fix the vulnerability faster Because of the ability to Provide more information about the vulnerability, Such as source line , stack trace, affected SQL query.
· We can significantly Reduced false positives when scanning a website internally Because we can better understand the behavior of the web appliion.
· Can alert you of the which the web appliion configuration problems Could result in a vulnerable appliion or expose internal appliion details. E.g. If 'custom errors' are enabled in. NET, Could this expose sensitive appliion details to a malicious user.
· Detect many more SQL injection vulnerabilities. Previously SQL injection vulnerabilities Could only be found if database errors were reported or via other common techniques.
· Ability to detect SQL Injection vulnerabilities in all SQL statements, SQL INSERT statements Including ins. With a black box SQL injections scanners Such vulnerabilities can not be found.
· Ability to know about all the files present and accessible though the web server. If an attacker will gain access to the website and crte a backdoor file in the appliion directory, the file will be found and scanned when using the AcuSensor Technology and you will be alerted.
· AcuSensor Technology is Able to intercept all web appliion inputs and builds a comprehensive list will all possible inputs in the website and tests them.
· No need to write URL rewrite rules when scanning web appliions use the which srch engine friendly URL's! Using the scanner is AcuSensor Technology Able to rewrite SEO URL's on the fly.
· Ability to test for crting and arbitrary file deletion vulnerabilities. E.g. Through a vulnerable scripta malicious user can crte a file in the web appliion directory and execute it to have privileged access, or delete sensitive files a web appliion.
· Ability to test for email injection. E.g. A malicious user may append Such additional information as a list or recipients or additional information to the message body to a vulnerable web form, to spam a large of recipients anonymously.



Fture:

Acunetix Web Vulnerability Scanner automatically detects the vulnerabilities in web appliions Following:
· Cross site scripting
· SQL injection
· CRLF injection
· execution
· Directory traversal
· File inclusion
· Script source disclosure
· Discovers files / directories That may contain sensitive information
· Looks for common files (Such as logs, appliion traces, CVS web repositories), back-up files or directories
· Finds directory listings
· Discovers directories with wk permissions
· Discovers available web server technologies (Such as WebDAV, FrontPage, etc.)
· Determines if dangerous HTTP methods are enabled on the web server (eg PUT, TRACE, DELETE)
· Inspects the HTTP version banners and looks for vulnerable products
· Tests strength of appliions.




Extend attacks:
· With Acunetix Web Vulnerability Scanner, you can construct HTTP / HTTPS requests and analyze the responses using the HTTP editor.

Connection spy:
· By enabling you to log, intercept and modify all HTTP / HTTPS traffic, Acunetix Web Vulnerability Scanner Gives you an in-depth insight into what data your web appliion is sending.

Test strength:
· To test the strength of your s, you can perform a dictionary attack on basic HTTP, NTLM or form-based authentiion.

Test database editor:
· Acunetix Web Vulnerability Scanner includes a text editor database That permits you to add additional attacks to the test database (Enterprise & Consultant versions only).

Supports all major web technologies:
· Appliions utilizing CGI, P, ASP, ASP.NET can all be tested for vulnerabilities.

Scanning profiles:
· Acunetix Web Vulnerability Scanner Quickly scan allows you to sites with different options and identities.

Reporting:
· You can save scan sessions to MS SQL Server / Access databases and erate complex reports from previous scan sessions using information stored in the database.

Requirements:

· 128 MB of RAM (256MB or higher recommended)
· 200 MB of available hard- space
· Internet Explorer 5.1 (or higher)
· SQL Server / Access if database is enabled (optional)

download Acunetixdownload
download

Advanced Archive Recovery Full Version



Unlock -Protected Archives
Advanced Archive Recovery recovers protection s or unlocks encrypted ZIP and RAR archives crted with all versions of popular archivers. Recover s for plain and self-extracting archives crted with PKZip and WinZip, RAR and WinRAR automatically or with your assistance. Guaranteed of archives crted with WinZip 8.0 and rlier in under one hour is possible by ing an implementation flaw.Advanced Archive Recovery ftures ultimate compatibility among the various types of archives, knows wknesses of certain types of protection, and provides best-in-class performance in all types of archives.Ftures and Benefits
Supports all versions of ZIP/PKZip/WinZip, RAR/WinRAR, as well as ARJ/WinARJ, and ACE/WinACE (1.x)Guaranteed recovery of archives in under 1 hour for ZIP archives crted with WinZip 8.0 and rlier and containing at lst 5 filesSupports archives over 4 GB and self-extracting archivesSupports strong AES encryption found in WinRAR and the new versions of WinZips all known vulnerabilities and implementation flaws in the various compression aorithms for faster recoverySpeedy known-plaintext attack recovers certain ZIP and ARJ archives in minutes (user must supply at lst one unprotected file from that archive)Interrupt and resume operation at any timeSupports background operation by utilizing idle CPU cycles onlyDictionary and brute-force attacks with user-defined masks and advanced templatesHighly optimized low-level for optimum performanceUniversal Compatibility
Supporting a wide range of compression and encryption aorithms, all versions of popular archivers and multiple archive formats, Advanced Archive Recovery comes as close to being a truly universal recovery tool as no one else.Advanced Archive Recovery unlocks archives compressed with various methods from legacy Shrinking, Reducing, Imploding, and Tokenizing to modern Inflating and recent WavPack, BZip2 and PPMd.Recover Archives in Minutes: Special Cases
Certain ZIP and ARJ archives can be unlocked and decrypted in just minutes, provided that you have at lst one unprotected file from that archive at your discretion. It does not matter how long and complex the is! If you have a file from the encrypted ZIP archive in your hands, the whole archive can be usually unlocked in minutes by applying the known-plaintext attack. Similar ARJ archives are unlocked instantly. Fast recovery available only in case of "classical" encryption, not AES.Guaranteed Recovery: Special Cases
After carefully analyzing the aorithms and implementations of protection in different versions of WinZip, ElcomSoft developed a work-around solution to allow quick guaranteed decryption of certain ZIP archives instd of performing lengthy attacks. If an encrypted ZIP archive was crted with WinZip version 8 or rlier, and if the archive contains 5 or more files, Advanced Archive Recovery can unlock the archive and decrypt its content – guaranteed! A modern PC takes just under one hour to finish the job. Guaranteed recovery available only in case of "classical" encryption, not AES.Advanced Archive Recovery is well aware of the various methods of protection, and implements all the tricks that allow you to recover protected archives as quickly as possible.Strong AES Encryption Support
Advanced Archive Recovery supports latest encryption technologies, including the complex AES encryption used in WinRAR and the recent versions of WinZip. Advanced Encryption Standard (AES) is a strong cipher used as an encryption standard by the U.S. government, military and Special Forces. AES has been extensively analyzed by cryptography specialists worldwide, and is a proven international standard for strong data protection.If nothing else helps, Advanced Archive Recovery performs a range of attacks on a protected archive in order to obtain the original . Even then you’re not left without options! If you remember something about the , that information will be used to speed up the recovery. Don’t take anything for a given! Just specifying your company security policy can incrse the speed of the attack tenfold. Remember how many characters your had, or that it was certainly longer than a certain length? Sure your had s or letters, or both? Maybe you can recollect the first or the last character, or remember whether it was a letter or a ? Every little bit of extra information helps to speed up the recovery.Dictionary Attack
Most s used by human beings are based on a single word or a combination of words from a certain language. Before reverting to the brute force attack, Advanced Archive Recovery performs a full-scaled comprehensive attack based on a dictionary. Use a small built-in dictionary or specify your own dictionaries no matter the language, and Advanced Archive Recovery will attempt single words and word combinations in different cases and variations.Brute Force Attack
If you’re blank about the , Advanced Archive Recovery will revert to the last resort: the brute force attack. Thanks to the highly optimized low-level , Advanced Archive Recovery provides the best-in-class performance for the brute-force recovery, attempting millions different combinations per second on a typical ZIP archive with a modern CPU. As many people tend to choose short, simple s, the brute-force attack remains a viable option for recovery.

download

Acunetix 7 Consulting Edition Full Version download










The Acunetix Web Vulnerability Scanner is an automated black box scanner that checks websites and web appliions for vulnerabilities such as SQL injection, Cross Site scripting and other vulnerabilities.The product fture set includes:An automatic client script analyzer allowing for security testing of Ajax and Web 2.0 appliionsSQL injection and Cross site scripting testingPenetration testing tools, such as the HTTP Editor and the HTTP FuzzerVisual macro recorder to test web forms and protected arsAbility to test pages with CAPTCHA, single sign-on and Two Factor authentiion mechanismsReporting facilities

DOWNLOAD

Facebook Extractor




Revl Facebook s in a ClickInstantly see Facebook s free of charge! Facebook Extractor revls Facebook s stored in popular Web browsers in just a click. No matter what browser you used and how many Facebook accounts you have, Facebook Extractor will show them all.Ftures and BenefitsShows Facebook s cached or stored in a variety of browsersRevls stored login and information instantly in just a clickSupports all versions of Internet Explorer, including IE7, IE8 and IE9Supports all versions of Mozilla Firefox including Firefox 4Supports all versions of Opera including Opera 11Supports all versions of Google Chrome including Chrome 11Supports all versions of Safari including Safari 5Revls Facebook logins and s for all supported browsersBts enhanced security model of Internet Explorer 7, 8 and 9Instant Facebook RecoveryFacebook Extractor takes no guessing. It works instantly no matter how many browsers you have installed or how many Facebook accounts you use. Just launch Facebook Extractor, and it’ll display all Facebook logins and s cached or stored in IE, Firefox, Safari, Chrome, and Opera browsers.How it WorksIt’s actually pretty simple. When launched, Facebook Extractor automatically detects Web browsers installed in your system and analyzes their cache and stored auto-login forms. If Facebook was ever accessed from that computer, the chances the correct can be recovered are pretty high.Seriously, is it That Simple?It’s not exactly just as sy. All cached forms and stored s are securely encrypted. Latest versions of Internet Explorer put security pretty high, making it difficult to extract cached s without possessing special skills. We have the skills required, so Facebook Extractor can dl with encryption faster than you can blink an eye.Facebook Extractor
DOWNLOAS

safe3si automatic SQL injection and database takeover tool Safe3SI v8.6.




IntroductionSafe3SI is one of the most powerful and sy usage penetration testing tool that automates the process of detecting and ing SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche ftures for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

FturesFull support for http, https website.Full support for Basic, Digest, NTLM http authentiions.Full support for GET, Post, Cookie sql injection.Full support for MySQL, , PostgreSQL, SQL Server, Access, SQLite,Firebird, Sybase and SAP MaxDB database management systems.Full support for four SQL injection techniques: blind, error-based, UNION query and force guess.Powerful AI engine to automatic recognite injection type, database type, sql injection best way.Support to enumerate databases, tables, columns and data.Support to rd,list and write any file from the database server underlying file system when the database software is MySQL or SQL Server.Support to execute arbitrary commands and retrieve their standard output on the database server underlying operating system when the database software is or SQL Server.Support to ip domain query,web path guess,md5 etc.Support for sql injection scan.Download

WebCruiser - Web Vulnerability Scanner Personal Edition



WebCruiser
WebCruiser is:* The first SQL Injection Tool for 7, Vista;
* A Web Vulnerability Scanner;
* A SQL Injection Scanner;
* A Cross Site Scripting Scanner;
* A XPath Injection Scanner;
* An Automatic SQL Injection Tool (POC);
* A Cross Site Scripting Tool (POC);
* A XPath Injection Tool (POC);
* A Post Data Resend Tool;
download


Havij v1.13 Pro CracKed.rar



Description:Havij is an automated SQL Injection tool that helps penetration testers to find and SQL Injection vulnerabilities on a web page.It can take advantage of a vulnerable web appliion. By using this software user can perform back-end database fingerprint, retrieve DBMS users and hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system.The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij.The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it sy to use for everyone even amateur users.

download

Display Song Lyrics in Media Player


HifriendsLooking for a way to find song lyrics? Today we look at a very simple method to accomplish this with Lyrics Plugin for Media Player.

Download and run the Lyrics Plugin install. (See download link below).
Begin playing your song or playlist then switch toNow Playingmode.

You should now see the full song lyrics of the currently playing track.



To toggle the lyrics on and off, selectToolsfrom the Menu in Library view, choosePlug-ins, and clickLyrics Plugin.



If you don’t see the Menu bar, you can enable it by going toOrganize,Layout, andShow Menu Bar.

Download Lyrics Plugin for Media Player 12.

Now you can enjoying music with lyrics..

Keil (Uv3)


Hi All Embedded Friends.

Now you can access keil without 2kb error.

Step 1 : justdownloadform this link
Step 2 :and for SFX is : ramoliyabiren
Step 3 :install Keil 3
Step 4 :and go to C:\Keil\UV3
Step 5 : and Uv3.exe send to desktop

Download Keil 3


enjoy...

Change background of folder in 7


Hi friends

u like to change background of folder in 7 like XP.
for that u need to download small appsFolderBG_For_7.rar
extract this file, u got this file


now install.bat run with administrator.

enjoy.

Hide files in


Did you know that you can hiding your files in ? Here I will show you how. But before we can proceed, prepare our tools first.

Tools :



WinRAR
Command Prompt
Hidden files (Eg: abc.txt)
A JPG file (Eg: 123.jpg)

Ok, now we move on how to do this trick. here is 123.jpg is


1. Put your hidden file and your file in the same folder. Here I havbc.txtand123.jpg. Both I put in a folder I named it tmpin drive C.



2. Put all these files into a RAR archive. I named this archive asabc.rar.

3. OpenCommand Promptand go to the folder where you place the files. Type the following command,
c:\tmpcopy /b _name.jpg + file_name.rar new__name.jpg
4. Now you will have4 filesin the folder. 123.jpg, abc.txt, abc.rar and 12.jpg

5. If you open12.jpgfile, you will see the same like 123.jpg.

6. If you open 12.jpg file with WinRAR, here is what you will get.
7. Below is my 12.jpg file. Try open the file with WinRAR and rd what I wrote in the abc.txt file.
THX...

Download file with IDM


Hi friends.

I know download is very difficult and also slow. for that i am give one trick that will give IDM support to your Downloading If your file less than 1GB.


step-1: Go towww.zbigz.comthis link.


step-2: Upload your file and click on GO.




step-3: Then Click on Free button.



step-3: Wait for some mites to download file tozbigzServer.


step-6: after that u can download file that you won't and you can download also zip file of all this your file.



Now enjoy with IDM.

LED blinking with 8051



LED blinking with 8051 (P89V51RD2) (using keil and BASCOM)
Hey embedded lovers from today I started to post series of 8051 tutorials and first post is use port as output using led interfacing with keil, BASCOM,Proteus.
This post is introduces you the very basic phenomena of taking an output from the microcontroller8051,
Hrer we are use P89V51RD2 which is made by using 8051 core which belongs to the family of 8051 series of microcontrollers, is very commonly used by a large community of hobbyist and engineers. Its simplicity and se of programming with inbuilt ftures sily makes its position in the top preferred list ofmicrocontroller for both beginners and advanced user.
LEDs are by far the most widely used mns of taking output. They find huge Appliion as indiors during experimentations to check the validity of results at different stages. They are very c and sily available in a variety of shape, size and colours.
The principle of operation ofLEDs is simple. The commonly availableLEDs have a drop voltage of 1.7 V and need 10 mA to glow at full intensity.The value of resistance R can be calculated using the equationSince most of the controllers work on 5V,470 ohm is commonly used substitute in case 330 ohm, because 330 ohm is not available.
P89V51RD2is a 40 pin microcontroller which belongs to 8051 series of microcontroller. It has four ports ch of 8 bits P0, P1, P2 and P3.TheP89V51RD2has 64K+8K FLASH bytes of programmable flash. The port P0 covers the pin 39 to pin 32, the port P1 covers the pin 1 to pin 8, the port P2 covers the pin 21 to pin 28 and the port P3 covers the pin 10 to pin 17. Pin 9 is the reset pin. The reset is active high. Whenever the controller is given supply, the reset pin must be given a high signal to reset the controller and bring the program counter to the starting address 0x0000. The controller can be reset by manually connecting a switch or by connecting a combination of resistor and capacitor as shown in the circuit diagram.A 11.0592 MHz crystal is connected between pin 18 pin 19. Pin 40 is Vcc and pin 20 is ground. Pin 40 is connected to Vcc.
LEDs are connected to the port P0.LEDs need approximately 10mA current to flow through them in order to glow at maximum intensity. However the output of the controller is not sufficient enough to drive theLEDs, so if the positive leg of theLEDis connected to the pin and the negative to ground as shown in the figure, theLEDwill not glow at full illumination.To overcome this problemLEDs are connected in the reverse order and they run on negative logic i.e., whenever 1 is given on any pin of the port, theLEDwill switch off and when logic 0 is provided theLEDwill glow at full intensity.As soon as we provide supply to the controller, theLEDs start blinking i.e., they become on for a certain time duration and then become off for the same time duration. This delay is provided by calling the delay function.


ü Circuit diagram:
ü with Keil: /* * Description : Source file to use c pin as output. * File Name : main.c * hder files Name : /REG51F.H , delay.h * compiler : keil uVision4 * Author : Biren Ramoliya ( "http://ramoliyabiren.blogspot.com" ),( "Computer Zone" ) * Last Update : 11.09.2012, 08:00 AM */
/* system file include */ #include </REG51F.H> #include "delay.h"
/* define pin and port */ #define led P0 //port P0 as output
/* main */ void main() { led = 0x00; //led off while(1) { led = ~led; //toggle led sdelay(1); //wait 1s } }

ü with BASCOM:
'------------------------------------------------------------------------------- '* Description : Source file to use c pin as output. '* File Name : main.bas '* compiler : BASCOM 8051 '* Author : Biren Ramoliya ( "http://ramoliyabiren.blogspot.com" ),( "Computer Zone" ) '* Last Update : 11.09.2012, 08:00 AM '-------------------------------------------------------------------------------
'==================== syastem configrasen ======================================
'To use crystalfrequency 11.0592mhz = 11059200hz $crystal = 11059200
'==================== define Pin and Port ====================================== Led1 Alias P0
'==================== main fxn =================================================
Do
Led1 = 255 'all led off Wait 1 'delay of 1 second
Led1 = 0 'all led on Wait 1 'delay of 1 second
Loop 'contenuas loop
End
'==================== end main fxn =============================================


ü
You can download all and simulate from hr.


BASCOM for 8051 Basic Compiler


hiembeddedlovers now 8051 issythan u think. with BASCOM.
no need anyhderfile no need anycomplex flow. just go with BASCOM - 8051

This is the first Basic compiler on MCU project at few yrs ago and till now it is still my favourite. Simple, sy to use and FREE (demo version can run 4K ). and i am also provide for that.

I am work with P89V51RD2 using BASCOM-8051 and keil4, i think BASCOM is moresimplethan keil.




Benefits


Structured BASIC with labels.Structured programming with IF-THEN-ELSE-END IF, DO-LOOP, WHILE-WEND, SELECT- CASE.Fast machine instd of interpreted .Variables and labels can be as long as 32 characters.Bit, Byte, Integer, Word, Long, Single and String variables.Compiled programs work with any 8051 uP such as AT89C1051, AT89C2051, 8031, 8032, 8051, 8052, 80552, 80535 and 80537 m Processors.Statements are highly compatible with ’s VB/QB.Special commands for L-displays , I2C chips and 1WIRE chips.Integrated terminal emulator with download option..Integrated simulator for testing.Integrated flash programmer and support for SPI, PG2051, PG302, SE512, SE514, TAFE. (hardware can be purchased separately)Editor with statement highlighting.Context sensitive help.For compatibility with BASCOM LT, there is also a 32-bit version of the BASCOM LT compiler.

The following statements are supported :

Decision and structures
IF, THEN, ELSE, ELSEIF, END IF, DO, LOOP, WHILE, WEND, UNTIL, EXIT DO, EXIT WHILE, FOR, NEXT, TO, DOWNTO, STEP, EXIT FOR, ON .. GOTO/GOSUB, SELECT, CASE.

Input and output
PRINT, INPUT, IN, PRINTHEX, INPUTHEX, L, UPPERLINE, LOWERLINE,DISPLAY ON/OFF, CURSOR ON/OFF/BLINK/NOBLINK, HOME, LOE, SHIFTL LEFT/RIGHT, SHIFTCURSOR LEFT/RIGHT, CLS, DEFLCHAR, WAIT, INPUTBIN, PRINTBIN, LHEX, OPEN, CLOSE, DEBOUNCE, SHIFTIN, SHIFTOUT.

Numeric functions
AND, OR, XOR, INC, DEC, MOD, NOT, ABS, B.

I2C
I2CSTART, I2CSTOP, I2CWBYTE, I2CRBYTE, I2CSEND and I2CRECEIVE.

1WIRE
1WWRITE, 1WRD, 1WRESET.

SPI
SPIINIT, SPIIN, SPIOUT.

Interrupt programming
ON INT0/INT1/TIMER0/TIMER1/, RETURN, ENABLE, DISABLE, PRIORITY SET/RESET, COUNTERx, CAPTUREx, INTERRUPTS, CONFIG, START, LOAD.

Bit manipulation
SET, RESET, ROTATE, BITWAIT.

Variables
DIM, BIT , BYTE , INTEGER , WORD, LONG, SINGLE, STRING , DEFBIT, DEFBYTE, DEFINT, DEFWORD.

Miscellaneous
REM, ' , SWAP, END, STOP, CONST, DELAY, WAIT, WAITMS, GOTO, GOSUB, POWERDOWN, IDLE, DECLARE, CALL, SUB, END SUB, MAKEDEC, MAKEB, INP,OUT, ALIAS, DIM , ERASE, DATA, RD, RESTORE, INCR, DECR, PEEK, POKE, CPEEK, GETRC5.

Compiler directives
$INCLUDE, $NOINIT, $BAUD and $CRYSTAL, $OBJ, $INPUT, $OUTPUT, $ROMSTART, $RAZE, $RAMSTART, $MONSTART, $IRAMSTART, $DEFAULT XRAM, $ASM-$END ASM, $L.

Conditional compilation
#IF, #ELSE, #ENDIF

String manipulation
STRING, SPACE, LEFT, RIGHT, MID, VAL, HEXVAL, LEN, STR, HEX, LCASE, UCASE

To make a program takes just a few steps :


Write the program in BASICCompile it to fast machine binary Test the result with the integrated simulator(with additional hardware you can simulate the hardware too)Program the chip with one of the integrated programmers.(hardware must be purchased separately)
L
:

you candownload this from this link.

and enjoe 8051 with BASCOM.

Keil uVision4 Portable



Hi keil lovers i think you might beenjoyingkeil4with .this you can use keil4 anywhere from yourpan drive, with this downloading Portable keil uvision4 from below.

The µVision4 IDE is a window-based software development platform that combines a robust and modern editor with a project manager and make facility tool. It integrates all the tools needed to develop embedded appliions including C/C++ compiler, macro assembler, linker/loor, and a HEX file . µVision4 helps expedite the development process of embedded appliions by providing the following:
Full-fturedsource editor.Device Database®for configuring the development tool.Project Managerfor crting and maintaining your projects.IntegratedMake Utilityfunctionality for assembling, compiling, and linking your embedded appliions.Dialogsfor all development environment settings.True integrated source-level and assembler-levelDebuggerwith high-speed CPU and peripheralSimulator.Advanced GDI interface for software debugging on target hardware and for connecting to a Keil™ ULINK®Debug Adapter.Flash programming utilityfor downloading the appliion program into Flash ROM.Links tomanuals,on-line help,device datasheets, anduser guides.µVision4 offers numerous ftures and advantages that help the programmer to develop embedded appliions quickly and successfully. The Keil toolsare sy to use, and are guaranteed to help you achieve your design goals in a timely manner.
TheµVision4 IDE & Debuggeris the central part of the Keil development tool chain. µVision4 offers aBuild Modnd aDebug Mode.InBuild Modeyou maintain the project, the project files, write your ,select the target hardware and device, and erate the appliion. InDebug Modeyou verify and debug your program with the integrated, powerful Simulator or directly on target hardware with theKeil ULINK family of Debug Adapters(or other AGDI drivers), or analyze the appliion behaviour. TheKeil ULINK Adaptersallow youto download your appliion into Flash ROM of your target system.
Downloadthe portable version of the uvision keil from here.
Download

Keil uVision4


Hi my all embeddedprogrammerfriends.

you enjoy keil3u now time to go ahd.

Now u can access keil uVision4 without 2kb error. and alsoassess all new ftures of kail4.



The new KeilµVision4IDE has been designed to enhance developer's productivity, enablingfaster, more efficient program development.µVision4 introduces a flexible window management system, enabling you to drag and dropindividual anywhere on the visual surface including support forMultiple Monitors.µVision4builds on the popular µVision3 IDE with the addition of:
New Ftures in µVision4Numerous new ftures have been added to µVision4§ Multiple Monitorand flexible window management system
§ System Viewer- display device peripheral register information
§ Debug Restore Views- crte and save multiple debug window layouts
§ Multi-Project Workspace- simplify working with numerous projects
§ Source and Disassembly Linking- the Disassembly Window and Source are fully synchronized making program debugging and cursor navigation sier
§ Memory Window Freeze- store the current Memory Window view allowing sy comparison of memory contents at different points in time
§ Device Simulation- updated to support many new devices such as Infineon XC88x, SiLABS C8051Fxx, Atmel SAM7/9, and Cortex-M3 MCUs from Luminary, NXP, and
§ Support for Hardware debug adapters- including ADI miDAS-Link, Atmel SAM-ICE, Infineon DAS, and ST-Link.
§ New Data and instruction trace- for ARM and Cortex MCUs
§ XML based Project files- crte, view and modify projects as sily rdable XML text files
§ Window- extended to provide a basic VT-100 terminal, ASCII Mode, Mixed Mode, and Hex Mode views
§ Drag & Drop File Opening- files dragged into the µVision4 project space are automatically opened
§ Watcoints and Logic Analyzer- variables are now sier to set


Procedure for installing KeilµVision4 with .
Download KeilµVision4 with from this link.And for download goto this link.Install KeilµVision4.Open file.Open management from file> management.Copy CID from management.Past this to the .Select c51 from from target.Select product detail.Click to erate.Now copy this .And past this to LIC.Click to AddLIC.Close KeilµVision4.


Download this from here.

Download Keil this fromhere.

enjoy free exploring on embedded.

and don'tforgettocomment.

Custom characters on 16x2 L





Hi,today we aredisplayCustom characters on 16x2 L.hr we are using tow good softwarekeilandproteussame as older postl interfasing.

Most of the alpha numeric L like 16x2 char or 16x4 char has ability toerate few custom characters. In this example i will show you how to make and display these custom characters on a 16x2 char led.



THEORY FOR CUSTOM CHARACTER ERATION

thebasic technology of l based on 3 type of memory
CG ROM: this the memory which holds the permanent fonts you call to be displayed . thisholdsthe pattern foreverysingle character of predefined l font. and you call the content of this memory by the placingcorresponding ascii value on the l port . like for retrieval of 'A' you have to send the ascii value of 'A' which is 0x41 to the l. CGROM can also be seen as computer hard drive from where you load your required program into ram to start working. but it is not modify able because it's rom.
DD RAM :DDRAM is the memory which holds only those characters which are currently on the screen . mns if there is a message is currently being displayed on thescreen then it has to beon the DDRAM for example if you want to display "hello" on the screen thenyou have load pattern of h from the CG ROM TO DD RAM then do the same for 'e' ,'l' ,'l' and 'o'.

the address of cg ram is totally depends on the size of the l like for16 x 2 LRow1 0x80 0x81 0x82 0x83 0x84 0x85 0x86 through 0x8F Row2 0xCO 0xC1 0xC2 0xC3 0xC4 0xC5 0xC6 through 0xCF
20 x 1 L Row1 0x80 0x81 0x82 0x83 through 0x93 20 x 2 L Row1 0x80 0x81 0x82 0x83 through 0x93 Row2 0xCO 0xC1 0xC2 0xC3 through 0xD3
20 x 4 L Row1 0x80 0x81 0x82 0x83 through 0x93 Row2 0xCO 0xC1 0xC2 0xC3 through 0xD3 Row3 0x94 0x95 0x96 0x97 through 0xA7 Row4 0xD4 0xD5 0xD6 0xD7 through 0xE7
40 x 2 L Row1 0x80 0x81 0x82 0x83 through 0xA7 Row2 0xCO 0xC1 0xC2 0xC3 through 0xE7
CG RAM :this memory works same as CG ROM but as this is ram we can modify it's content any time . so this is the place where whe have to first store our custom character pattern. then that pattern can be sent to display. the HD44780 has total 8 CG RAM memory loion . so we canerateonly up to 8 custom characters . but you can always change the content of CG RAM on the fly toeratenew characters. the addresses of 8 CG RAM loion goes from 0x00 to 0x07.WHEN Ever we want something of these fonts to be displayed on the screen we write them to the DD RAM.
HOW TO DECIDE AND WRITE CUSTOM FONT TO CG RAM ?
A standard 5x8 dots font is being shown in the as you can see there are total 8 bytes of data on the whole to decide pattern of the font. As you can see all you need to do is decide the first row pattern like in the example in first row the first pixel is off so lsb bit 0 is 0 and pixel 1 is on so bit1 is 1 and pixel 2 is on so bit 2 is 1 this method apply on ch row of the font ( 8 rows ). which gives us total 8 bytes of data first msb 3 bits are always 0. you can also use BASCOM AVR to decide this pattern and .









Program:
L.h
#ifndef _leddatas_H#define _leddatas_H
#include <reg51.h>
sbit l_en = P3^3;sbit l_rs = P3^2;
void l_delay(unsigned char ms){ unsigned char n; unsigned int i; for (n=0; n<ms; n++) { for (i=0; i<1272; i++); }}
void l_enable(){ l_en = 0; l_delay(1); l_en = 1; }
void l_command(unsigned char command){ l_rs = 0; P2 = (P2 & 0x0f)|(((command>>4) & 0x0F)<<4); l_enable(); P2 = (P2 & 0x0f)|((command & 0x0F)<<4); l_enable(); l_delay(1);}
void linit(){ l_en = 1; l_rs = 0; l_command(0x33); l_command(0x32); l_command(0x28); l_command(0x0C); l_command(0x06); l_command(0x01); l_delay(25);}
void l_datac(unsigned char ascii){ l_rs = 1; P2 = (P2 & 0x0f)|(((ascii>>4) & 0x0F)<<4); l_enable(); P2 = (P2 & 0x0f)|((ascii & 0x0F)<<4); l_enable(); l_delay(1);}
void lrow(unsigned char no){ if (no == 1) { l_command(0x80); } if (no ==2) { l_command(0xC0); }}
void ldatas (unsigned char row,unsigned char *lstring){ lrow(row); while (*lstring) { l_datac(*lstring++); }}
void lblink(unsigned char no,unsigned char *lstring){ unsigned char j; for(j=0;j<no;j++) { l_command(0x01); l_delay(50); ldatas(1,lstring); l_delay(50); }}
void lrotade(unsigned char no,unsigned char dir,unsigned char *lstring){ unsigned char i; ldatas(no,lstring); if (dir == 'l') { for (i=0;i<16;i++) { l_delay(100); l_command(0x18); } } if (dir == 'r') { for (i=0;i<16;i++) { l_delay(100); l_command(0x1C); } } } void special_char(unsigned char cgram_loc, unsigned char l_loc, unsigned char *datas){ unsigned int i=0; l_command(cgram_loc); while(i<8) { l_datac(datas[i]); i++; } l_command(l_loc); l_datac((cgram_loc-64)/8); }
#endif
L.c
#include <reg51.h>#include "l.h"
unsigned char data1[]={28,2,2,28,8,4,3,32}; unsigned char data2[]={16,16,16,16,16,16,16,16};unsigned char data3[]={17,9,5,31,21,29,1,32}; unsigned char data4[]={4,4,4,28,4,4,4,4};
void main( ){ linit(); l_command(0x85); l_datac('"'); special_char(64,0x86,data1); special_char(72,0x87,data2); special_char(80,0x88,data3); l_command(0x889); l_datac('"'); while(1) {}}

U can also download all sourcodaand alsoemulationfile fromhere.
so keep exploring 8051.....
see of emulation


L 16x2 interfacing with 8051 4-bit mode




Hi,today we are interface L(16x2) with 4 bit mode.hr we are using tow good software keil and proteus same as older post l interfasing.




This article explains interfacing ofLwith8051using 4-bit mode. In this mode only four pins are used for sending data and command instructions. This mode has the advantage over the 8-bit mode as it uses less of pins. The remaining pins of the controller are available for normal use.
The Data or command is sent in nibble form (1 nibble= 4 bit) in the 4-bit mode. The higher nibble is sent first followed by the lower nibble. The function of RS, RW and EN pins remains similar to 8-bit mode.
Circuit description:Connections of L with 8051 are shown in circuit diagram. In 4-bit mode, the Data lines must be connected with D4, D5, D6 and D7 pins of L module.
Initialization:The L can be configured in 4-bit mode by sending appropriate instruction which is called “Function set” to it. The Function set is hexadecimal instruction for L MPU unit, which selects working modes of L. The “Function Set” is mentioned infollowing table:
Instruction Rs Rw D7 D6 D5 D4 D3 D2 D1 D0 Function set 0 0 0 0 1 DL N F - - Description:DL - Data Length (DL = 1 8bit, DL = 0 4bit)N - No. of Lines (N = 1 2Lines, N = 0 1Lines)F - Fonts (F = 1 5x10 dots, F = 0 5x7 dots)
According totable,the value of Function Set for 4 –bit mode will be 0010 0000(0x20) because DL=0. The value “Function Set” for the L configuration 2 line (N=1), 5X7 dots (F=0) and 4-bit (DL=0) mode will be 0010 1000(0x28).
When the power supply is given to L, it remains in 8-bit mode. Now, if 0x20 is sent, lower nibble will not be received by L because four data lines (D4-D7) are connected, so 0x02 is sent instd of 0x20.
nowsimple program for L :
L.C
#include <reg51.h>#include <l.h>
void main(){
linit();ldatas(1,"ramoliyabiren");ldelay(50);lrotade(1,'r',"ramoliyabiren.blogspot.com");lblink(5,"Computer Zone");while(1) {}
}
L.H
/*
Hi I am Ramoliya Biren.this program is open use.for using this hader file.u need to add this l.h in you are source group in keil.for using fxn
ldatas(row no,"DATA which u need to desplay"); for desplay string on l
ldata("data(only single char) which u need to desplay on l")
lblink(no of time u wont to blink data,"data which u wont to blink"); hr data desplay on row 1 only
lrotade (row no,'direction of rotaed l or r',"data which u wont to rotaed");
visit : http://ramoliyabiren.blogspot.com/
*/
#ifndef _leddatas_H#define _leddatas_H
#include <reg51.h>
sfr ldata = 0xA0;sbit rs = P3^2;sbit rw = P3^3;sbit en = P3^4;
void ldelay (unsigned int itime){unsigned int i,j;for(i=0;i<itime;i++)for(j=0;j<1275;j++);}
void lcmd(unsigned char value){ldata = value;rs = 0;rw = 0;en = 1;ldelay(1);en = 0;}
void ldata (unsigned char value){ldata = value;rs = 1;rw = 0;en = 1;ldelay(1);en = 0;}
void linit(){lcmd(0x0e);lcmd(0x01);lcmd(0x80);ldelay(50);}
void lrow(unsigned char no){if (no == 1){ lcmd(0x80);}if (no ==2){ lcmd(0xC0);}}
void ldatas (unsigned char row,unsigned char *lstring){lrow(row);while (*lstring){ ldata(*lstring++);}}
void lblink(unsigned char no,unsigned char *lstring){unsigned char j;for(j=0;j<no;j++){lcmd(0x01);ldelay(50);ldatas(1,lstring);ldelay(50);}}
void lrotade(unsigned char no,unsigned char dir,unsigned char *lstring){unsigned char i;ldatas(no,lstring);if (dir == 'l'){ for (i=0;i<16;i++) { ldelay(100); lcmd(0x18); }}if (dir == 'r'){ for (i=0;i<16;i++) { ldelay(100); lcmd(0x1C); }} }
#endif

U can also download all sourcodaand alsoemulationfile fromhere.
so keep exploring 8051.....
see of emulation

BASCOM-AVR



Bascom-AVR - a software environment for crting executable for AVR microcontrollers close high-level language to the basic rule. The structure includes the Bascom compiler programs, editor, debugger line simulator, a simplified terminal emulator, the system of contextual information and services freight hardware emulators and programmers.
provides asfollows:
- the range of data representations numeric variables little s in floating point format (24 bit mantissa)- Working with string variables;- Operations with variables indexed arrays;- A complete suite of data format conversion;- Logical operations and arithmetic with signed s (two's complement) and unsigned;- Arithmetic operations with s in floating point format;- All standard test conditions of operation, loops, hits and subroutine call;- Support for devices hardware. operators are working with devices loed on-chip microcontroller and external devices, the most commonly used in microprocessor systems. The strongest support offered to work with port and the indior of character. BASCOM-AVR operators designed to work with data from internal and external memory (RAM). BASCOM offers significant cost reductions in programming time. Moreover, strong integrated support of many common physical devices provide additional comfort. Compared with the C language compilers, Bascom gives a much more compact . The compiler allows you to crte programs for all models of AVR microcontrollers. Intended compiler settings in any model of the microcontroller. All names of the records used in the program are determined by an external file that describes their addresses. As a result of the compilation can be obtained from executable files in binary or hexadecimal format.
Download BASCOM-AVR from here.
Download of BASCOM-AVR from here.

How To Convert Files with VLC




Sometimes you might want to convert a file to an to take with on an iPod or to just listen to the audio without the or may be inantherformat. Today we take a look at how to use the free program VLC to convert formats to an .
Note: For this article we are using VLC version 1.0 on Open up VLC and select Media and Convert / Save.
Now in the Open Media window click on the Add button and browse to the loion of the file you want to convert and after you have it click the Convert / Save button.When the Convert window opens you should see the source of the file you want to convert and you will need to browse for a destination for the .Explorer will open so you can choose a loion and here is where you want to label the file with an extension and hit Save.Now in the Convert window you should see the source file and destination path fields filled in. Now click on the Edit Selected Profile button.Under the Encapsulation tab select WAV.Now under the Audio c tab choose the c, choose a Bitrate, amount of channels, Sample Rate, and then click the Save button.Click on Start to begin the encoding process.You will see a countdown timer on the main interface while the conversion is taking place.You will find the converted file in the destination loion you chose before and now you can play your on any compatible media player or portable device.
We successfully converted MOV, MPEG, and AVI files to . FLV files would convert but unfortunately had horrible sound quality. This is not a preferred method those who are discerning about audio quality, but hopefully it can help someone out in a pinch.

How to Flash Using Phoenix Service Software



Disclaimer
1. This article is forEduion Purposeonly.2. This tutorial isNOTfor Dummies and Non-professional users.
3. This tutorial was tested in " XP" &" 7".(Better use" XP")
4. This tutorial is based on "Phoenix 2009". It may be different in other versions.
5. Idon'tbeing held responsible for any damage causes to your mobile phone. Try it at your own risk.

Tools and Requirements :
1. PC withWin XP or7installed. (I didn't test on Vista yet)
2. USB cable. (came with the phone!)
3. Phoenix 2009 or 2010 or later Versions (available in the end of article)
4. Offline firmware for your type. *(Size vary 30 MB - 300 MB)
- Check your current firmware by pressing*#0000#in your mobile phone.Write down somewhere.
- VisitHEREto download latest firmware for your phone.
- Choose your type or Srch the Site.
- Choose yourlatest firmwarewith region on your country and download.

APAC= stand forAsia and Pacific
EM= stand forEurope, Middle st and Africa
EURO=stand forEurope
M=stand forMiddle st and Africa
LTA=stand forLatin America
SP=stand forSouth st Asia Pacific


Here is little info about Firmware Pack APAC, EM, EURO, LTA. By this info you can identify which firmware pack you have to download according to your own state.


APAC and Asia-Pacific


- Asia-Pacific Regional:
Australia, Bangladesh, China, Hong Kong, India, Indonesia, Japan, Kor, Malaysia, New Zland, Philippines, Singapore, Taiwan, Thailand, Vietnam


EM and Europe/Middle-st/Africa

- EUROPE Regional:
Austria, Beium, Buaria, Croatia, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Israel, Italy, Laia, Lithuania, Luxembourg, Netherlands, Norway, Poland, Portugal, Romania, Russia, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Tur, Ukraine, UK


- Middle-st Regional:
Pakistan, Iran, Lebanon, Oman, Afghanistan, Bahrain, Iraq, Israel, Kuwait, Lebanon, Palestinian, Territories, Qatar, Kingdom of Saudi Arabia, Syria, UAE, Yemen


- Africa Regional:
Aeria, Angola, Benin, Botswana, Burkina Faso, Burundi, Cameroon, Cape Verde, Central African Republic, Chad, Comoros, Congo, Dem. Republic of Congo, Djibouti
Equatorial Guin, Eritr, Ethiopia, Ivory Coast, Egypt, Gabon, Gambia, Ghana, Guin Republic, Guin-Bissau, Kenya, Lesotho, Liberia, Libya, Madagascar, Malawi, Mali, Mauritania, Mauritius, Mayotte, Morocco,Mozambique, Namibia, Niger, Nigeria, Reunion, Rwanda, Sao Tome and Principe, Senegal, Seychelles, Sierra Leone, Somalia, South Africa , Sudan, Swaziland, Tanzania, Togo, Tunisia, Uganda, Zambia, Zimbabwe


EURO and Europe/Europa


- Europe/Europa Regional:
Austria, Beium, Buaria, Croatia, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Israel, Italy, Laia, Lithuania, Luxembourg, Netherlands, Norway, Poland, Portugal, Romania, Russia, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Tur, Ukraine, UK


LTA and Latin America

- Latin America Regional:
Artina, Brazil, Caribbn, Chile, Colombia, Mexico, Venezuela


Preparation

1.In your PC :

*. Crterestore pointthroughStart>All Programs>Accessories>System Tools>System Restore. Name it 'Before flashing' click crte.
*. Remove PC Suite, Software Updater, Care Suite, Modem Drivers, Connectivity Drivers through Control Panel > Add/Remove Programs, butDO NOT REMOVE PC Connectivity Solution and - Modem.

*. Restart your PC.
*. Do not connect your phone before installing Phoenix software.
*. Disable all antivirus, firewall, anti-spyware, anti-malware etc.
*. Disable screen saver.
*. CheckC:Program filesPhoenixProductsIf you have those folder in there delete all.


2.In your mobile phone :




*. Backup all your mobile phone content since all your data will be lost after flashing. (If you phone is dd, skip this step!)
*. If you protect your memory card with , then remove it.
*. Remove your memory card from your mobile phone.
*. Go toTools>Settings>Security>Phone and SIM.

- Set Pin request toOff.
- Set Autolock period toNone.
- Set Lock to default which is12345.
- Set Lock if SIM changed toNo.

*. Uninstall your mobile antivirus. (if you have any)
*. Charge your phone battery toat lst 70%and keep charging. (Although flashing takes only 7-10 minutes.)

Begin Flashing

1.Install Phoenix Service Software 2009 or later :

*. First Extract the archive you have downloaded which containsPhoenix Service Software 2009or later
*. Install the software.Be patient, it may take some minutes to install all the components.
*.Don't run Phoenix software after installation.
*. Connect your handset to your PC withUSB cableinPC Suite mode.
*. will start installing the connectivity drivers as soon as you connect the phone. Let it install completely.

- If this process failed then you must be remove PC Connectivity Solution. But don't worry we crted restore point rlier remember.
- Restore your system and start remove component again but do not remove PC Connectivity Solution.

2.Install Offline Firmware Package You Downloaded :

- If your firmware file is in.RARformat, first extract it usingWinRaron desktop.
- On desktop you will find.EXEfile of your firmware file.
- Install theEXEfile.Do not change its path. It will install it to default loion ofC:Program filesPhoenixProducts

- If you have downloaded a firmware file which doesn't have an auto setup, then just copy your Extracted folder Manually in the directoryC:Program filesPhoenixProducts
- Be sure you install updated firmware. You cannot downgrade your phone's firmware in BB5 which includes all new including N-Series. (N82, N90, ....)(But there is still some tricks!)
- Phoenix allows downgrading but your phone doesn't allow it as your phone has some special security built into. So no use of trying it. You'll get an error message.

3. Flashing Procedure(Updating to latest firmware version) :

- OpenPhoenix Service Softwareby double click on the icon from your desktop.
- Connect your phone in PC Suite Mode.
- In Phoenix, clickFile>Manage Connections.
- Now clickNew.

- Now select the type of cable you are using. If you are using DKE-2, CA-53 [N-Series] cable, select USB.



- ClickNext. It will find your product and sayFOUND. If it doesn't find any, you can try changing your cable type by clicking Back.
- ClickNextand thenFinish.

- Now your cable type (USB) apprs in the connection list. Select it. ClickAPPLYand thenCLOSE.
- Now selectFile>Open Product.

- A list of RM will open. Select your phone's RM . LikeRM-133for N73orRM-84for N70and other 's with there corresponding Rm Types but choose the one which corresponds to your phone! ClickOK. At this steps if you receive an error itsokay. Just ignore it.

- Now selectFile>Scan Product.
- Your phone's firmware info will appr at the extreme bottom of the Phoenix window.
- Now go toFlashing>Firmware Update.
- A window will open.
- On that window click Browse button(the one with three dots)

- A window will open with various products and various regions. Choose the region or country of your choice according to the language pack you want to install.
- ClickOK.
- ClickRefurbish.- Now your actual flashing has started.
At the end Phoenix will tell you to remove your phone as the flashing has finished.
- Now wait for your phone to reboot into latest firmware.
- The flashing procedure takes7-10minutes
4.Flashing Dd [Which show only white screen on startup] :
Note:You can install any firmware in dd whether it is latest and or the old one.
Note (Again):You can make a dd phone if you want! Just unplug your cable while flashing!

The procedure is almost same as regular flashing.

- StartPhoenix. Connect your phone with USB Cable(phone is off at this time).
- ClickFile>Open Product. Select your RM from the window that apprs. ClickOK.
- ClickFile>Manage Connections. SelectNo Connection. ThenAPPLYandCLOSE.
- Now straight away clickFlashing>Firmware Update.


- A window will open. Click onBrowsebutton.(the one with 3 dots)
- A window will open with various products and various regions. Choose the region or country of your choice according to the language pack you want to install.
- Here is different part, check the option"Dd Phone USB Flashing".
- ClickRefurbish.
- Flashing has started.

- After some seconds flashing will pause and asking you to turn your phoneON. (Or maybe not, It depends on phone)
- PressPOWERbutton of your phone until backlight comes up.Remember not to remove your cable or even remove it accidentally will switching on your phone!!- Flashing will proceed.- Your phone will automatically start when the flashing finishes.


After finish you can safely remove your data cable from Phone.FINISHED!!!
5.Extra
If you want to install another update to your phone after some months, first remove the previous version you installed in"C:Program filesPhoenixProducts"Delete all the contents of Products folder before installing a new firmware.



Latest version

Download Phoenix_Service_Software_2011.24.002.46258(99.6 MB)
: .txt

L 16x2 interface with 8051


Hi,
today our task ishow to interface L(16x2) with 8051.hr we are using tow good software keil and proteus which will given on same blog.


The L Module can sily be used with an 8051 microcontroller . The L Module comes with a 16 pin connector. This can be plugged into connector 16 pin. The pins on the 16 pin connector of the L Module are defined below.



The L Character standard requires 3 control lines as well as either 4 or 8 I/O lines for the data bus. The user may select whether the L is to operate with a 4-bit data bus or an 8-bit data bus. If a 4-bit data bus is used the L will require a total of 7 data lines (3 control lines plus the 4 lines for the data bus). If an 8-bit data bus is used the L will require a total of 11 data lines (3 control lines plus the 8 lines for the data bus).
The three control lines are referred to as EN, RS, and RW.
The EN line is called "Enable." This control line is used to tell the L that you are sending it data. To send data to the L, your program should make sure this line is low (0) and then set the other two control lines and/or put data on the data bus. When the other lines are completely rdy, bring EN high (1) and wait for the minimum amount of time required by the L datasheet (this varies from L to L), and end by bringing it low (0) again.
The RS line is the "Register Select" line. When RS is low (0), the data is to be trted as a command or special instruction (such as clr screen, position cursor, etc.). When RS is high (1), the data being sent is text data which sould be displayed on the screen. For example, to display the letter "T" on the screen you would set RS high.
The RW line is the "Rd/Write" control line. When RW is low (0), the information on the data bus is being written to the L. When RW is high (1), the program is effectively querying (or rding) the L. Only one instruction ("Get L status") is a rd command. All others are write commands--so RW will almost always be low.
Finally, the data bus consists of 4 or 8 lines (depending on the mode of operation selected by the user). In the case of an 8-bit data bus, the lines are referred to as DB0, DB1, DB2, DB3, DB4, DB5, DB6, and DB7.
An Example Hardware ConfigurationAs we've mentioned, the L requires either 8 or 11 I/O lines to communie with. For the sake of this tutorial, we are going to use an 8-bit data bus--so we'll be using 11 of the 8051's I/O pins to interface with the L.

L command coad:

nowsimple program for L :
L.C
#include <reg51.h>#include <l.h>
void main(){
linit();ldatas(1,"ramoliyabiren");ldelay(50);lrotade(1,'r',"ramoliyabiren.blogspot.com");lblink(5,"Computer Zone");while(1) {}
}
L.H
/*
Hi I am Ramoliya Biren.this program is open use.for using this hader file.u need to add this l.h in you are source group in keil.for using fxn
ldatas(row no,"DATA which u need to desplay"); for desplay string on l
ldata("data(only single char) which u need to desplay on l")
lblink(no of time u wont to blink data,"data which u wont to blink"); hr data desplay on row 1 only
lrotade (row no,'direction of rotaed l or r',"data which u wont to rotaed");
visit : http://ramoliyabiren.blogspot.com/
*/
#ifndef _leddatas_H#define _leddatas_H
#include <reg51.h> sfr ldata = 0xA0;sbit rs = P3^2;sbit rw = P3^3;sbit en = P3^4;
void ldelay (unsigned int itime){ unsigned int i,j; for(i=0;i<itime;i++) for(j=0;j<1275;j++);}
void lcmd(unsigned char value){ ldata = value; rs = 0; rw = 0; en = 1; ldelay(1); en = 0;}
void ldata (unsigned char value){ ldata = value; rs = 1; rw = 0; en = 1; ldelay(1); en = 0;}
void linit(){ lcmd(0x0e); lcmd(0x01); lcmd(0x80); ldelay(50);}
void lrow(unsigned char no){ if (no == 1) { lcmd(0x80); } if (no ==2) { lcmd(0xC0); }}
void ldatas (unsigned char row,unsigned char *lstring){ lrow(row); while (*lstring) { ldata(*lstring++); }}
void lblink(unsigned char no,unsigned char *lstring){ unsigned char j; for(j=0;j<no;j++) { lcmd(0x01); ldelay(50); ldatas(1,lstring); ldelay(50); }}
void lrotade(unsigned char no,unsigned char dir,unsigned char *lstring){ unsigned char i; ldatas(no,lstring); if (dir == 'l') { for (i=0;i<16;i++) { ldelay(100); lcmd(0x18); } } if (dir == 'r') { for (i=0;i<16;i++) { ldelay(100); lcmd(0x1C); } } }
#endif

U can also download all sourcodaand alsoemulationfile from hr.
so keep exploring 8051.....
see of emulation


Share board and Mouse Between Two Computers Connected with LAN Cable



I have a laptop and a desktop and I use them simultaneously for my work. But the problem arises with moving around my hands to ch mouse-board set while working on both computers.


If you use multiple computers in your workplace, sharing one board and a mouse between the computers may be life saving approach for you.



InputDirector can be right choice for those who use multiple computers and want to share only one board-mouse set across them.
How to setup your computers to share one mouse-board set
First of all you have to have your computers connected with a network via LAN cable or other network connector. Here, I will show how to configure computers to connect via LAN cable and share a mouse and board set.
How to connect two computers through LAN cable
Insert the plugs into the LAN ports of the both computers. The lights in the ports should blink. If you are in 7, go to Control Panel > Network and Internet > Network and Sharing center in ch computer and click on Change adapter settings from the left sidebar. Then right-click on the Local Ar Connection icon and choose Properties. Select Internet Protocol Version 4 (TCP/IPv4) and click on the Properties button.


Now, switch to Use the following IP address field by selecting the radio button and put 192.168.0.1 at the IP address field in one computer and put 192.168.0.2 in another. In both computer, the Subnet mask should be 255.255.255.0. Click OK while you are done.

That’s all to configure your computers to connect them via a LAN cable. The rl fun starts now!!
Here, I will use two terms: “Master” and “Slave”. Say, Computer 1 (whose mouse and board you want to share with other) is master and Computer 2 is slave. Both of them are connected trough a Local Network Connection and you can use only one set of board and mouse with both of them; more over you can share files, documents and also the clipboard which allows you to copy-paste any thing between those computers. Following are the steps in details.
1. Install InputDirector in both computers.
2. Open InputDirector in the Master computer and hd to the “Global Preferences” tab. Select “On Start: Input Director is Enabled as Master” as well as the check box “Share Clipboard” to copy files quickly across the computers. Also change the Preferred Network Interface by clicking on the Change button and select the right entry for your LAN card from the drop-down list.


3. Flip to the “Master configuration” tab and click on the Add button to add the Slave computer name. You can get the slave computer’s name by Right-clicking on Computer then choosing Properties at the slave computer. Once you get the computer name, put it at the Host name field, then click OK.

After adding the name, it will appr in the Slave systems list.
4. Go to the slave computer and open InputDirector. Flip to the Global Preference tab and select the option “On start:” as Input Director is enabled as a Slave, Change the Preferred Network Interface in a similar way that you did in your Master computer

5. Hd to the Slave Configuration tab and you should see the master computer’s name at the Master hostname list. Select the radio button saying Allow any computer to take control.



Once you are done, you will see a system notifiion saying “The Slave system is now available”.
How to share the mouse
After a successful configuration of InputDirector, move the mouse to the edge of your Master computer and it will appr in the Slave computer’s monitor. Now you can do everything by the mouse as if it is connected separately with it.
How to Share the board
The board will work in that computer in which the mouse apprs. Suppose, you are in the master computer and want to type some thing in the salve computer; just move your mouse to the edge of your screen and get in into the slave computer. The board automatically gets activated for the slave computer and you cam type everything at everywhere with the board.
Download InputDirector

Virus that Toggle board Button Simultaneously




Using Notepad (and VB) you can set different on your board to toggle continuously.Following are the 3 tricks using which different can be set to toggle simultaneously. Follow the steps given under ch hd to try out the tricks.


1. Caps Lock
Open Notepad.
Paste the following in the notepad file:


Set wshShell =wscript.CrteObject(“WScript.Shell”) do wscript.sleep 100 wshshell.send“{CAPSLOCK}” Loop

Save the file with anyname and .vbs extension. and close it.
Now open the newly crted file and see how the caps lock behaves on your board!
you can download file from hr.


2. Hit Enter Continuously
Open Notepad.
Paste the following in the notepad file:


Set wshShell=wscript.Crteobject("WScript.Shell") do wscript.sleep 100 wshshell.send"~{enter}" Loop
Save the file with any name and .vbs extension and close it.
Now open the newly crted file and see how the enter behaves!
you can download file fromhr.


3. Hit Backspace Continuously
Open Notepad.
Paste the following in the notepad file:

Set wshShell=wscript.Crteobject("WScript.Shell") do wscript.sleep 100 wshshell.send"{bs}" Loop
Save the file with any name and with .vbs extension and close it.
Now open the newly crted file and see how the behaves!
you can download file fromhr.


In order to end the vbs script (stop continuous presses), open task manager and end the wscript.exe process as shown in below.





Shut-down The Computer After Conveying Any Message




This one is kind of an trick and if used unknowingly can certainly cause problems (am serious).
What this trick does is, after conveying a (any) message it shuts down the computer without any confirmation. In order to crte the Shutdown file, follow the below mentioned steps:


Step 1 :Open Notepad.


Step 2 : Paste the following in it:




@echo off msg * Its time to get some rest. shutdown -c “Error! You have to take rest! Byeeeeee” -s



Save the file with any name but with .bat extension and close it.For eg. TakeRest.bat
U can download from hr.
NOTE : Use this carefully. If you are playing then keep in mind that this may ld to loss as it shuts down the computer forcefully.

Virus that Constantly Rept Messages





Using this notepad trick you can annoy anyone and can actually force them to log off or lve the computer (LOL….).
This notepad trick will crte an infinite cycle of a message in the computer. Follow the steps to know more:


Step 1 : Open Notepad.


Step 2 : Paste the following in the notepad file:



For i = 0 to 10000 msg * Hi msg * Are you having fun? msg * I am! msg * Lets have fun together! msg * Because you have been o-w-n-e-d next
Save the file with any file name but with .vbs as extension and close it.


For eg. msg.vbs


After saving the file just open it (by double clicking) and see what happens.


You can piss of your friends by sending it as an email attachment asking them to try it out !


download example from hr.

Make A Personal Diary with Notepad






Did you know that you can also use Notepad as a simple digital diary or a personal Log-Book ?
Well, if youdidn'tthen follow the below mentioned steps to make one for yourself !


Step 1 : Open Notepad.


Step 2 : Type .LOG (in capital letters) and hit enter.


Step 3 : Save it with any name and close it.


Step 4 : Open it again.


When you open the file again you will see the current date and time being inserted automatically after the .LOG line. This will happen automatically every time you reopen the the notepad file.

Free virtual COM port software


Free software forvirtual COM port is a VSPE.


You can download fromhr.

Lrn Batch File programming



Batch File programming refers to a batch file which are essentially sequences of DOS commands and are stored in a text file with an extension of “.BAT”.Usually batch files are used to do repted tasks i.e To do a regular task you do not need to type in the commands over and over again, instd you can crte a batch file which consists set of commands, So when you execute it it will do your task automatically!
Why Do You Need to lrn Batch Programming ?
Yes every user will get to this question because they don't know the rl power of Batch Coding and many of them think that its only a funny thing which can do a few notepad tricks....You have to believe that Batch Coding is widely used by s for some attacks like DNS poisoning, Crting Viruses, service Disabler, Bombers, Extension Changer, logger remapper etc.., So if you rlly want to become a specialist in security stuff get to the basic and lrn Batch File Programming.
So what are you waiting for Just download it now for FREE!
Download...

Add "Open with Notepad" to the Context Menu for All Files



The default method of opening unknown files forces you to go through a list of known appliions and is erally a pain to dl with. That’s why I like to have a context menu option for “Open with Notepad” so that I can quickly open up files without having to go through a lot of trouble.This registry is nothing new, it’s been around forever… think of this as a refresher course. Also note that you can use this same technique to substitute any other appliion that you’d like by adjusting the path in the registry to point to the different editor.
Manual Registry :
Open regedit.exe through the start menu srch or run box, and then browse down to the following :
H_CLASSES_ROOT\*\shell




Right-click on “shell” and choose to crte a new , calling it “Open with Notepad”. Crte a new below that one called “command”. Double-click on the (Default) value in the right-hand pane and enter in the following:notepad.exe %1

he change should take effect immediately… just right-click on any file and you’ll see the next menu entry.Download Registry Just download, extract and double-click on the OpenWithNotepad.reg file to enter the information into the registry. There’s also an uninstall script included.Download OpenWithNotepad registry



Use Virtual COM port in your Laptop




Now aday's in laptop you not have a COM port, but u need todevelopappliion on bases of COM port and u need to test it then.


I have asolutesfor that.


Virtual Port Kitcrtes virtual ports and connects ch pair of them via a virtual -modem cable. So, all the data written to one virtual port can be immediately rd from the other one, and vice versa.

UsingVirtual Port Kityou can emulate unlimited of ports and connect ch pair of them via a virtual -modem cable.So, your appliions can exchange data just like they do via hardware ports and rl -modem cables.

For example, using VSPK, you can crte pair of virtual ports (e.g. COM7 and COM8) and connect two appliions to them. All data that the first appliion writes to COM7 is rd from COM8 by the second appliion, and vice versa.

ExampleIt is sy to test. You can run two copies of terminal program (e.g. standard HyperTerminal) and connect them to COM7 and COM8.So, all you type in the first HyperTerminal will appr in the second and vice versa. You can also transfer files between HyperTerminals and do whatever you want.
You can download from hr.

Offline assess any website




HTTrack is afrend sy-to-use offline browser utility.

It allows you to download a World Wide Web site from the Internet to a local directory, building ecursively all directories, getting HTML, s, and other files from the server to your computer. HTTrack arranges the original site's relative link-structure. Simply open a page of the "mirrored" website in your browser, and you can browse the site from link to link, as if you were viewing it online. HTTrack can also update an existing mirrored site, and resume interrupted downloads. HTTrack is fully configurable, and has an integrated help system.


WinHTTrack is the 2000/XP/Vista/Seven relse of HTTrack, and WebHTTrack the Linux/Unix/BSD relse. See thedownload page.





Install Ubuntu form usb flash drive




Ubuntu is one of the best OS which is based on Linux kernel , In this tutorial we are going to lrn how to install Ubuntu from USB drive. This procedure is very handy for portable notebooks etc.., which do no have / drive and it will be also useful when your / dive has been malfunctioned.
I just don't want to be too long, so lets get straight to the work.


Requriments:


1) A small appliion called UNetbootin which you can download from here.
2) USB drive.
3) Ubuntu ISO, if you dont have ubuntu iso download one from here.


Step #1: plug-in your USB drive and make a blank of it because your drive will be formatted in this procedure.


Step #2: Launch UNetbootin by double clicking it.


Step #3: Now select "" and browse to the ubuntu iso and select it.


Step #4: Make sure that the "Type" is selected as "USB drive" and also make sure that the drive letter belongs to your USB drive.


Step #5: Now click "OK" and pay some patience till the procedure is completed.


Once the procedure is completed click "EXIT", from now you can install or enjoy live right from your USB drive.