Tuesday, 4 March 2014

എല്ലാ ഫയലും(Extension) ഓപണ്‍ ചെയ്യുന്ന ഒരൊറ്റ സോഫ്റ്റ്‌വെയര്‍ !

എല്ലാ ഫയലും(Extension) ഓപണ്‍ ചെയ്യുന്ന ഒരൊറ്റ സോഫ്റ്റ്‌വെയര്‍ ! 

ദിനേന നമുക്ക്‌ പലതരത്തിലുള്ള ഫയലുകള്‍ കമ്പ്യൂട്ടറില്‍ ഓപ്പണ്‍ ചെയ്യേണ്ടതുണ്ടാവും. അതിനു പലതരത്തിലുള്ള സോഫ്റ്റ്‌വെയര്‍ ഇന്സ്ടാല്‍ ചെയ്‌താല്‍ കമ്പ്യൂട്ടറിന്റെ സ്പീഡ്‌ കുറയാനും ഇടവരും. അതിനു ഒരു പരിഹാരമായി ഒരേയൊരു സോഫ്റ്റ്‌വെയര്‍ ഉപയോഗിച്ചാല്‍ എങ്ങനെയുണ്ടാവും? ഏകദേശം 75ല്‍ അധികം ഫയലുകള്‍ ഈ ഒരൊറ്റ സോഫ്റ്റ്‌വെയര്‍ ഉപയോഗിച്ച് ഓപ്പണ്‍ ചെയ്യാന്‍ കഴിയും.. അവകള്‍ താഴെ വിവരിക്കുന്നു..

Supported File Formats

Code Files (.vb, .c, .cs, .java, .js, .php, .sql, .css, .aspx, .asp)
Web Pages (.htm, .html)
Photoshop Documents (.psd)
Images (.bmp, .gif, .jpg, .jpeg, .png, .tif, .tiff)
XML Files (.resx, .xml)
PowerPoint  Presentations (.ppt, .pptx, .pps)
Media (.avi, .flv, .mid, .mkv, .mp3, .mp4, .mpeg, .mpg, .mov, .wav, .wmv, .3gp, .flac)
Microsoft  Word Documents (.doc, .docx)
SRT Subtitles (.srt)
RAW Images (.arw, .cf2, .cr2, .crw, .dng, .erf, .mef, .mrw, .nef, .orf, .pef, .raf, .raw, .sr2, .x3f)
Icons (.ico)
Open XML Paper (.xps)
ML Paper (.xps)
Torrent (.torrent)
Flash Animation (.swf)
Archives (.7z, .gz, .jar, .rar, .tar, .tgz, .zip)
Rich Text Format (.rtf)
Text Files (.bat, .cfg, .ini, .log, .reg, .txt)
Apple Pages (.pages)
Microsoft Excel Documents (.xls, .xlsm, .xlsx)
Comma-Delimited (.csv)
Outlook Messages (.msg)
PDF Documents (.pdf)
vCard Files (.vcf)
EML Files (.eml)
ഇവിടെ ക്ലിക്ക് ചെയ്തു ഈ സോഫ്റ്റ്‌വെയര്‍ ഡൌണ്‍ലോഡ് ചെയ്യൂ.. അഭിപ്രായം അറിയിക്കൂ..

Monday, 3 March 2014

Hide your Real IP Location and Browse Anonymously ?

Hide your Real IP Location and Browse Anonymously ?
Today i am going to show you How Easily you can Hide your Real IP Location and Browse Anonymously.
I worked with many software for Hide your real IP address, i find SafeIP is best software for this job.
Anonymous Web Surfing :-
Knowing your online privacy is maintained is priceless. Internet connection records containing personal information are collected and stored of from billions of Internet users around the world every day. Even with information is collected legally, it could inadvertently fall into the wrong hands and be used for tracking your online behavior, stealing your payment information, identity, or malicious purposes. SafeIP can be used for free to protect your Internet connection from such threats by concealing your location securing your Internet connection.
Unblocking Websites :- 
Sites like Facebook, YouTube, Gmail, Twitter, and thousands of others are blocked by many schools, universities, offices, ISPs, or even countries. Even most of Google’s services were blocked by China. SafeIP can be used to unblock any website, bypassing filters and firewalls, allowing for a free Internet. SafeIP uses anti-blocking measures to prevent the software itself from being blocked by any Internet Service Provider.
SafeIP is best solution for :-
  • Online Privacy (Hide your Real IP and Surf Anonymously)
  • Internet Freedom (Unblock websites and bypass firewalls)
  • Streaming Support (Access streaming movie, TV, or radio sites)
  • Wireless Mode Protection :- Safe surfing on WiFi networks.
  •  Malware Protection 
  • Block infected malware and phishing sites.
 .Download and Install it. Open your SafeIP and choose your location
Hide your Real IP Location and Browse Anonymously
Now Click on the Setting tab to configure other protection
Hide your Real IP Location and Browse Anonymously
Hope you like my post Hide your Real IP Location and Browse Anonymously

Sunday, 2 March 2014

എല്ലാ ഓഫീസ്‌ ഫയലുകളും കണ്‍വര്‍ട്ട് ചെയ്യുന്ന ഒരൊറ്റ സോഫ്റ്റ്‌വെയര്‍!

എല്ലാ ഓഫീസ്‌ ഫയലുകളും കണ്‍വര്‍ട്ട് ചെയ്യുന്ന ഒരൊറ്റ സോഫ്റ്റ്‌വെയര്‍!


ജോലിക്കിടയില്‍ പലപ്പോഴും പല ഫയലുകളും നമുക്ക്‌ വേറെ ഫോര്‍മാറ്റിലേക്ക് കണ്‍വര്‍ട്ട് ചെയ്യേണ്ടതായി വരാറുണ്ട്. അതിനു പറ്റിയ പ്രൊഫഷണല്‍ സോഫ്റ്റ്‌വെയര്‍ പലപ്പോഴും നമ്മുടെ കമ്പ്യൂട്ടറില്‍ ഉണ്ടാവണമെന്നില്ല. എല്ലാതരം ഓഫീസ്‌ ഫയലുകളെയും ഫോട്ടോസും വേറെ ഫോര്‍മാറ്റിലേക് മാറ്റാന്‍ കഴിയുന്ന ഒരു സോഫ്റ്റ്‌വെയര്‍ പരിചയപ്പെടുത്താം
അതില്‍ താഴെവിവരിക്കുന്നതെല്ലാം ചെയ്യാന്‍ കഴിയും
 Scan Image or documents to Microsoft Word, PDF /Image to Microsoft word, Photo to Word , Photo to Pdf , Scan to Html , Photo to Html and Scan to other formats

ആ സോഫ്റ്റ്‌വെയര്‍ന്‍റെ പേര് Abbyy Fine reader 11 Corporate edition ( http://finereader.abbyy.com/corporate/ ) ആണ്.

ചിത്ര സഹിതം താഴെ:


























































അത് ഡൌണ്‍ലോഡ് ചെയ്യാന്‍ ഇവിടെ  ക്ലിക്ക് ചെയ്യുക. എന്നിട്ട് ഇന്സ്ടാല്‍ ചെയ്യുക. അഭിപ്രായം അറിയിക്കാന്‍ മറക്കില്ലല്ലോ

Saturday, 1 March 2014

നിങ്ങളുടെ കമ്പ്യൂട്ടര്‍ ആണാണോ അതോ പെണ്ണാണോ !?

നിങ്ങളുടെ കമ്പ്യൂട്ടര്‍ ആണാണോ അതോ പെണ്ണാണോ !?

നോട്ട്‌പാഡില്‍ കൊച്ചു കൊച്ചു പ്രോഗ്രാമുകള്‍ ചെയ്യുന്നവര്‍ക്ക് വേണ്ടി ഒരു ഫണ്ണി ട്രിക്ക്നോകാം..

 താഴെ വിവരിച്ചിരിക്കുന്ന കോഡ് ഒരു ബ്ലാങ്ക് നോട്ട്പാടില്‍ ടൈപ്പ് ചെയ്യുക

CreateObject("SAPI.SpVoice").Speak"Hi! I am Indian"

എന്നിട്ട് ആ ഫയലിനെ കമ്പ്യൂട്ടറില്‍ എവിടെയെങ്കിലും സേവ് ചെയ്യുക . ഉദാഹരണം:  computer_gender.vbs (you can save the file with any name like anything.vbs)

അതിനു  ശേഷം ആ ഫയല്‍ ഡബിള്‍ ക്ലിക്ക് ചെയ്തു ഓപ്പണ്‍ ചെയ്തു നോക്കൂ...
അപ്പോള്‍ പുരുഷ ശബ്ദത്തിലോ സ്ത്രീ ശബ്ദത്തിലോ നിങ്ങള്‍ ആദ്യം ടൈപ്പ് ചെയ്ത പേര് പറയുന്നത് കേള്‍ക്കാം..
അതില്‍ നിന്നും മനസ്സിലാക്കാം സ്ത്രീയാണോ പുരുഷനാണോ എന്ന്!

പല  കമ്പ്യൂട്ടറുകളും വെത്യാസപ്പെട്ടിരിക്കും

Friday, 28 February 2014

How to Protect Your Facebook Account from Hackers

How to Protect Your Facebook Account from Hackers :-Facebook is one of the most used Social networking site on the internet with Alexa World traffic rank number 2 in the world after Google. If you check any Facebook group there is one common question ” How to hack a  Facebook ID ” . However it,s not easy to hack Facebook account if user is aware about Facebook account protections.
Today i am going to show you How to Protect Your Facebook Account from Hackers ?

1. Enforce Strong Password :-
One of the best and first defense against any web-based protection is enforce strong password protection. However it,s not easy to remember strong password. For the remembering Strong password use Password manager like LastPass.
Open http://passwordsgenerator.net/ and choose your password length 128.
How-to-Protect-Your-Facebook-Account-from-Hackers2
Go to the Account Settings > General Account Settings > Password. Change your password here.
How-to-Protect-Your-Facebook-Account-from-Hackers2

2. Enable Secure Browsing :-
One of the other protection is use HTTPS instead of HTTP. Because in the HTTP traffic, it,s easy to sniff the username and password.
Navigate to Account Setting > Navigate to Security Setting. Enable the Secure browsing from here.
How-to-Protect-Your-Facebook-Account-from-Hackers1


3. Enable Trusted Contacts :-

Facebook introduces Trusted Contacts for recovering hacked account ?
Facebook updated the feature that allows users to recover the hacked account with the help of three Facebook friends.  In the past, Facebook sent secret code to 3 facebook friends you choose.  Using those secret codes, you can retrieve your account.
But this feature was abused by BlackHat hackers to compromise the victim’s account by becoming  friend from three different profiles.
To overcome this problem, Facebook introduced a new feature called Trusted Contacts” that allows users to select 3 to 5 friends to receive the secret code to recover your account.


Facebook introduces Trusted Contacts for recovering hacked account

Simple steps to add trusted contacts to your account:-
Step 1 :- Open Account SettingSelect the Security Tab
Facebook introduces Trusted Contacts for recovering hacked account
Step 2 :- Now click on the trusted contacts option and choose your trusted friends.
Facebook introduces Trusted Contacts for recovering hacked account


4. Add Antivirus Protection for Your Account :- 
Few months ago Most of Facebook account is going affected with four virus. where we seen a Friends is posting about porn materials on the wall. to prevent your account with this worse situation is use the security apps like Eset Social media scanner , Bitdefender Safe GO or Norton Safe Web.

5. Turn on Login and Password Change notification :-
Turn on Login and password change notification is really important in the case of your account activity.
Navigate to Settings > Notification Settings and Enable the Account related notifications.
facebook protections4
Now Facebook will notify you in the case of password change and login activity.

6. Enable Two-Factor Authentication :-
Two-factor Authentication is one most awesome security feature used by Facebook, Google , Twitter etc. In the Two factor authentication You need a one time generated code along with Your passwords. In general, if any one gets your password but without your code it,s useless.
Navigate to Account Setting > Login Approvals > You need to be register your phone here.
How-to-Protect-Your-Facebook-Account-from-Hackers2

7. Review your Recognized and Active Sessions :-
When you login with Facebook username and password on any device it will summarize as Recognized device and Facebook will also show you Active Sessions for your account.
Navigate to Account Setting > Security
How-to-Protect-Your-Facebook-Account-from-Hackers2
Enjoy your Social activity securely with Facebook.

Thursday, 23 January 2014

How to Reset/Recover Forgotten Windows 8 Password

How to Reset/Recover Forgotten Windows 8 Password ?
It's too common for people to forget their windows password. Today i am going to Show you How to Reset/Recover Forgotten Windows 8 Password ?
You need a HirenBootCD ( Download ) for this job. Burn ISO in CD or Create Bootable USB.
Lets start, Boot your Windows 8 from the CD . Select the Mini Windows XP Option. it will not install XP in your system. it,s just running live.
now Double click on the HBCD Menu Option.
now Click on the Programs in the Hirens Boot CD program launcher menu. then go to Password/Keys > Windows Login > then Select the NTPWEdit (Reset XP/Vista /7 User password ) option.
it will open the NTPWEdit wizard. By deafult it,s taking the current Windows root drive.
If your root drive is different is different, you need to be change it. Open My computer, you will find the disk information.
Now click on the Reopen option. it will show you the available users. Select your user and click on the Reset password option.
now put your new password.
Now click on the Save Change option. Now reboot your windows.
Now your are able to login in windows with your new password.
Enjoy your New Windows 8 password. This method will work on Windows XP/Vista and Windows7 also.
Hope you like my post.How to Reset/Recover Forgotten Windows 8 Password.

Saturday, 28 December 2013

How to install windows 7 or Linux on preinstalled windows 8

How to install windows 7 or Linux on preinstalled windows 8 :
Windows 8 comes with a new feature named Secure boot, which is preventing other OS like Windows old versions , Linux distributions on the Pre-installed Windows 8 certified PC. Any other OS without the proper signing key will be deemed as “unauthorized” and won’t be able to boot up. The way to go about it is either install an OS that comes with the appropriate signing key or disable the secure boot feature altogether.
Today i am going to show you How to install windows 7 or Linux on preinstalled windows 8 ?
To install Windows 7 or Linux, you have to disable Secure Boot from BIOS ,disabling secure boot requires tweaking your own computer’s BIOS.
1. Access your Charms bar (Win+C). Click the “Settings” charm
How-to-install-windows-7-or-Linux-on-preinstalled-windows-81
Within the “Settings” charm, click “Change PC Settings.” Select “General,” then click “Restart Now” under “Advanced Startup.”
How-to-install-windows-7-or-Linux-on-preinstalled-windows-81
Now you have the Choose an option window, here select the Troubleshoot option.
How-to-install-windows-7-or-Linux-on-preinstalled-windows-81
Now select the Advanced Options here.
How-to-install-windows-7-or-Linux-on-preinstalled-windows-81
Now here select the UEFI Firmware Settings option.
How-to-install-windows-7-or-Linux-on-preinstalled-windows-81
now in the UEFI Firmware Settings, click on the Restart to restart.
How-to-install-windows-7-or-Linux-on-preinstalled-windows-81
Now you have the BIOS option, Select the Computer Setup option.
How-to-install-windows-7-or-Linux-on-preinstalled-windows-81
now navigate to Security  and select the ” Secure Boot Configuration ” option. this setting will be depend upon your manufacturers. if your BIOS don’t have same setting then search for secure boot.
How-to-install-windows-7-or-Linux-on-preinstalled-windows-81
here press the F10 key to accept it.
How-to-install-windows-7-or-Linux-on-preinstalled-windows-81
now you have disable Secure boot option here and Enable the Legacy Support option here.
How-to-install-windows-7-or-Linux-on-preinstalled-windows-81
Now navigate to Storage > boot order and select your Boot device.
How-to-install-windows-7-or-Linux-on-preinstalled-windows-81
now you are able to install Windows 7 or Linux on preinstalled Windows 8 PC. :-)
How-to-install-windows-7-or-Linux-on-preinstalled-windows-81

Wednesday, 11 December 2013

NetBIOS : Hacking into other Computers

NetBIOS Hacking-What is it?-

Net BIOS Hacking is the art of hacking into someone else’s computer through your computer. Net BIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.


-How can this be of use to me?-

Most people don’t even know, but when they’re on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.



-What do I need?-
Windows OS
Cain and Abel (http://www.oxid.it/)
 

-[Step 1, Finding the target.]-
So first off we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross

 

Another window will pop up, make sure “All host in my subnet” is selected, and then click ok.

 

It should begin to scan

 

Then IP’s, computer names, and mac addresses will show up.
Now remember the IP address of the computer you are going to be breaking into.
If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok.
During the next step we will begin our trial and error.



 

-[Part 2, Trial and Error]-


Now, we don’t know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN.
If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on.

Click on the start menu and go to run, type in cmd, and click ok.
This should bring up the command prompt.
From here we will do most of the hacking.
Now I will be referring to certain commands that need to be inputted into the command prompt.
I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt.
I am only doing this to avoid confusion.
Let’s get back to the hacking.
Type in “ping (IP address of the target).” For example in this tutorial, “ping 192.168.1.103.”
This will tell us if the target is online.
If it worked, it will look something like this (note, I have colored out private information):

If the target is not online, either switch to a different target, or try another time. If the target is online, then we can proceed. 

-[Part 3, Gathering the Information.]-
 
Now, input this command “nbtstat –a (IP address of target).” An example would be “nbtstat –a 192.168.1.103.”
This will show us if there is file sharing enabled, and if there is, it will give us the: currently logged on user, workgroup, and computer name.
 

Ok, you’re probably wondering, “What does all this mean to me?” Well, this is actually very important, without this, the hack would not work. So, let me break it down from the top to bottom. I will just give the first line of information, and then explain the paragraph that follows it.
 


The information right below the original command says: “Local Area Connection,” this information tells us about our connection through the LAN, and in my case, I am not connected through LAN, so the host is not found, and there is no IP.

The information right below the “Local Area Connection,” is “Wireless Network Connection 2:” It gives us information about the connection to the target through WAN. In my case I am connected through the WAN, so it was able to find the Node IpAddress. The Node IpAddress is the local area IP of the computer you are going to break into.

The NetBIOS Remote Machine Name Table, give us the workgroup of our computer, tells us if it is shared, and gives us the computer name. Sometimes it will even give us the currently logged on user, but in my case, it didn’t. BATGIRL is the name of the computer I am trying to connect to. If you look to the right you should see a <20>. This means that file sharing is enabled on BATGIRL. If there was not a <20> to the right of the Name, then you have reached a dead end and need to go find another IP, or quit for now. Below BATGIRL is the computers workgroup, SUPERHEROES. If you are confused about which one is the workgroup, and the computer, look under the Type category to the right of the < > for every Name. If it says UNIQUE, it is one system, such as a printer or computer. If it is GROUP, then it is the workgroup

-[Step 4, Breaking In]-

Finally it’s time.
By now we know: that our target is online, our target has file sharing, and our target’s computer name.
So it’s time to break in.
We will now locate the shared drives, folders, files, or printers. Type in “net view \(IP Address of Target)”
An example for this tutorial would be: “net view \192.168.1.103”


We have our just found our share name. In this case, under the share name is “C,” meaning that the only shared thing on the computer is C. Then to the right, under Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person’s hard drive. 

All’s that is left to do is “map” the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in “net use K: \(IP Address of Target)(Shared Drive). For my example in this tutorial, “net use K: \192.168.1.103C.” Ok, let’s say that you plan on doing this again to a different person, do u see the “K after “net use?” This is the letter of the drive that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be “net use G…,” for a different


As you can see, for my hack I have already used “K,” so I used “G” instead.
You may also do the same for multiple hacks.
If it worked, it will say “The command completed successfully.”
If not, you will have to go retrace you steps.
Now open up “my computer” under the start menu, and your newly created network drive should be there.




Now, if you disconnect from the WAN or LAN, you will not be able to access this drive, hence the name Network Drive.
The drive will not be deleted after you disconnect though, but you won’t be able to access it until you reconnect to the network.
So if you are doing this for the content of the drive, I recommend dragging the files and folders inside of the drive onto your computer,
because you never know if the target changes the sharing setting.
If you are just doing this to hack something, then go explore it and have some well deserved fun!



Congratulations! You’re DONE!

-Commands used in this tutorial:
PING
NBTSTAT -a (IP Address of Target)
NET VIEW \(IP Address of Target)
NET USE K: \(IP Address of Target)(SHARENAME)

Wednesday, 11 September 2013

How to stop Facebook from sharing your location on Android Device

How-to-stop-Facebook-from-sharing-your-location-on-Android-DeviceHow to stop Facebook from sharing your location on Android Device :-
Facebook is one of the most used social network used on the internet. if you are also Facebook user, you have to maintain your privacy on internet. Recent days android is one of the most used mobile OS and people are using  Facebook on the android devices. By-default, Android is showing your your location on your chat or shares.
Today i am going to show you How to stop Facebook from sharing your location on Android Device ?
Open your Facebook app in your Android device and navigate to settings and tap App Settings option.
How-to-stop-Facebook-from-sharing-your-location-on-Android-Device1
here you have the “ Messenger location services ” option. it,s on by-default.
How-to-stop-Facebook-from-sharing-your-location-on-Android-Device1tap on it and unchecked the on option and click on the OK.
How-to-stop-Facebook-from-sharing-your-location-on-Android-Device1
it,s done on Facebook App. If you are using Facebook messenger then open the Facebook messenger then click on the setting, here you have the Location option, just unchecked it.
How-to-stop-Facebook-from-sharing-your-location-on-Android-Device1
Done. :-) Now no any one is able to view you location on Facebook.