Ads 468x60px

Showing posts with label Other tricks. Show all posts
Showing posts with label Other tricks. Show all posts

View Real URL Behind Short URL Using Untiny

View Real URL Behind Short URL visit this site and paste the shorten URL .

Link:Untiny.com

Why Untiny?

The main reason of Untiny is
that some of the tiny services
are blocked in some countries
although the original long URL is
not blocked.

Untiny retrieves the
original URL so you can access it
- if it is not blocked too. Untiny is
NOT a proxy breaker!

Example: Try
http://tiny.pl/htk
which is a tiny URL for
http://
www.google.com

Supported Tiny Services

Untiny supports 237
tiny
services:
.tk, 1u.ro, 1url.com, 2pl.us, 2tu.us,
3.ly, a.gd, a.gg, a.nf, a2a.me,
abe5.com, adjix.com, alturl.com,
atu.ca,awe.sm, b23.ru, bacn.me,
bit.ly, bkite.com, blippr.com,
blippr.com, bloat.me, bt.io,
budurl.com, buk.me, burnurl.com,
c.shamekh.ws, cd4.me, chilp.it,
chs.mx, clck.ru, cli.gs, clickthru.ca,
cort.as, cuthut.com, cuturl.com,

decenturl.com, df9.net, digs.by,
doiop.com, dwarfurl.com,
easyurl.net, eepurl.com,
eezurl.com, ewerl.com, fa.by,
fav.me, fb.me, ff.im, fff.to,
fhurl.com, flic.kr, flq.us, fly2.ws,
fuseurl.com, fwd4.me, getir.net,

gl.am, go.9nl.com, go2.me,
golmao.com, goo.gl,
goshrink.com, gri.ms, gurl.es,
hellotxt.com, hex.io, href.in,
htxt.it, hugeurl.com, hurl.ws,
icanhaz.com, icio.us, idek.net,
is.gd, it2.in, ito.mx, j.mp, jijr.com,
kissa.be, kl.am, korta.nu, l9k.net,

liip.to, liltext.com,
lin.cr, liurl.cn, ln-
s.net, ln-s.ru, lnkurl.com, loopt.us,
lru.jp, lt.tl, lurl.no, memurl.com,
migre.me, minilien.com,
miniurl.com, miniurls.org,
minurl.fr, moourl.com, myurl.in,

ncane.com, netnet.me, nn.nf, o-
x.fr, ofl.me, omf.gd, ow.ly,
oxyz.info, p8g.tw, parv.us,
pic.gd, ping.fm, piurl.com,
plurl.me, pnt.me, poll.fm, pop.ly,
poprl.com, post.ly, posted.at,

ptiturl.com, qurlyq.com, rb6.me,
readthis.ca, redirects.ca,
redirx.com, relyt.us, retwt.me,
ri.ms, rickroll.it, rly.cc,
rsmonkey.com, rubyurl.com,
rurl.org, s3nt.com, s7y.us,
saudim.ac, short.ie, short.to,
shortna.me, shoturl.us,

shrinkster.com, shrinkurl.us,
shrtl.com, shw.me, simurl.net,
simurl.org, simurl.us, sn.im, sn.vc,
snipr.com, snipurl.com,
snurl.com, sp2.ro, spedr.com,
starturl.com, stickurl.com,
sturly.com, su.pr, t.co,
takemyfile.com, tcrn.ch, thrdl.es,
tighturl.com, tiny.cc, tiny.pl,

tinyarro.ws, tinytw.it,
tinyurl.com, tl.gd, tnw.to, to.ly,
togoto.us, tr.im, tr.my, trcb.me,
tumblr.com, tw0.us, tw1.us,
tw2.us, tw5.us, tw6.us, tw8.us,
tw9.us, twa.lk, twd.ly, twi.gy,

twit.ac, twitthis.com, twiturl.de,
twitzap.com, twtr.us, twurl.nl,
u.mavrev.com, u.nu, ub0.cc,
updating.me, ur1.ca, url.co.uk,
url.ie, url.inc-x.eu, url4.eu,
urlborg.com, urlbrief.com,
urlcut.com, urlhawk.com,
urlkiss.com, urlpire.com, urlvi.be,
urlx.ie, uservoice.com, ustre.am,

virl.com, vl.am, wa9.la,
wapurl.co.uk, wipi.es, wkrg.com,
wp.me, x.hypem.com, x.se,
xav.cc, xeeurl.com, xr.com, xrl.in,
xrl.us, xurl.jp, xzb.cc, yatuc.com,
ye-s.com, yep.it, yfrog.com, zi.pe,
zz.gd

Enjoy!
Read more ...

ATM tips to keep it safe

How we select an ATM?
There is no such defined formula
that can assurance you about
the security of the ATM selection.
Therefore, the ATM user needs to
exercise some carefulness when
selecting an ATM.
There are some steps to fellow:
1)Always go for banking in
daylight hours and specially
avoid to visiting ATM at weekend
night.
2)Always choose ATM location
which you are most familiar,
most nearest point from your
home or heavily traveled areas.
3)First observe the surroundings
of ATM before make any
transaction, if there are any
person looking you then tries to
avoid using ATM this time.
4)The best practice is that always
go for ATM with any family
member or with your best
friend.
5)Avoid using if you find any
other machine or code reader
attached with the ATM machine.
6)Always select the ATM that is
monitored by bank security or
with security camera.
Using an ATM
1)Be careful when any strangers
offer to help you at an ATM, even
if your card is block by machine
or you are experiencing
difficulty with the transaction.
2)Check your surrounding any
other person in the queue keep
an acceptable distance from you.
3)Stand very close to the ATM
and shield the keypad with your
hand when keying in your PIN
code otherwise any other
person can guess your number.
4)Press the Cancel key on
keyboard when you find the
ATM is not working properly and
withdraw your card. Avoid force
your card into the card slot.
5)Always keep your printed
transaction record so that you
can compare your ATM receipts
to your monthly statement.
6)If your card jammed in ATM,
report this immediately to the
bank.
Manner to use your ATM
1)Try to memorize your PIN code
and avoid writing it down on
public access book, doing so on
secret book.
2)Never tell your PIN to any third
person, whether to family
member, office staff.
3)using easily guessable
numbers for your PIN code for
example your date of birth, your
phone number and others.
4)Change your PIN code on
weekly basis.
5)Weekly check your account
balance and bank statements if
you find any problem, contact to
your bank immediately.
Read more ...

How to print webpage without images and background colors

Today tip will help you to print any website page in readable form (only text) without any extra graphics or images. There is a option on many websites "Print" to print a page in text format only, but if there is no print option then you can print out any webpage without its background colors and images using Internet Explorer setting. Generally Internet Explorer setting "Print background colors and images" is disable, another advantage of printing webpage without background colors, you can speed up your printing process and also save printer ink. But important thing to always preview WebPages before you print, in Internet Explorer go to File menu, then click on Print Preview option.

To enable or disable print background colors option, open your system Internet Explorer.

Click the Tools menu and then go to Internet Options and open it.

Here click the Advanced tab then scroll down to find the option Printing section.



Now check the option "Print background colors and images" then Apply and press Ok button.

Read more ...

Linux hacking

Since Microsoft has a huge chunk of the operating system's market in the world, it is the first victim of hackers.

But that doesn't mean that Linux hacking doesn't exist.

Although is less common than it's close sourced companion, there are several reasons why hackers try to hack machines with Linux.

Many corporations use Linux as their server on the web as it is cheaper and easier to deploy.

Its security is also better when compared to Microsoft operating systems.

No wonder that network hacking tools for this open source operating system have proliferated in the last years.

What Are The Issues With Open Source Linux?

The main difference between Linux and Windows is that Linux is open source and windows are closed source.

So? Well, that means that only Microsoft is authorized to change any part of the code of the Windows operating system.

While in Linux, anyone can change it.

The other problem is that the Linux Operating System doesn't receive the same level of support as Windows does.

That means that updates and security packages are released with each new version of the Operating System (OS), but not as periodic updates as in the case of Windows XP's Windows Update.

That means that the user will have to be the one responsible for checking for the updates instead of trusting this matter to an organization.

So, a user could pass long periods of time without knowing that his OS has an important security failure that could compromise his work or even the security of his network.

The only way to contra rest this inconvenient, is buying support from a determined Linux OS provider, like Red Hat.

For an annual fee, they will provide you with important information on the different bugs that have been found in the OS and that need to be fixed.

If you choose otherwise, you will spend a long time inside forums talking to Linux experts around the world.

If that isn't the core competence of your business, why should you spend that time doing it? That's one of the main arguments that Microsoft uses when comparing it's OS with open source OS's.


Linux operating system

What Are The Vulnerabilities? The main vulnerability of Linux OS is that anyone can access the code of the operating system. And, if you are not savvy enough with the programming code like hackers are. You only need to search for the correct free Linux hacking tool and you will be able to get inside in no time.

The other problem is that many of the drivers made for determined hardware. Let's say, a printer is not created by people who have security in mind. This is specially important for a company who do not wish to find it's intellectual property is stolen each time they send something to the printing room.

So, after all of these possible loopholes inside Linux OS, you should consider using a version that has been designed with security in mind.
Check www.engardelinux.com and find more about this variation of Linux OS.

What Is Kernel Hacking?

The kernel is the software inside a computer that is in charge of maintaining an adequate communication between the hardware and the rest of the software. One of the strong points among the Linux community is that the kernel of a Linux OS can be altered. And for what reason? The two main motives are fixing any problem that may arise and increase the efficiency of a driver responsible for managing a determined piece of hardware.

Hacking Runescape

Runescape is a massively multiplayer online role-playing game that was launched in 2001 by Jagex Limited. The marvelous thing about this online game is that it is independent of the operating system that you are using since it works over the web using JAVA (JAVA is a platform that can work in any kind of computer since it creates a virtual machine for its own use)

But as in any online game, you will find people who are hacking Runescape. Although it is free to use and only requires some basic information for it's subscription, some hackers are willing to spend their time trying to find a backdoor or any other scheme that will permit them obtain an advantage over other players. One could say that it is inevitable due to the competitive nature of our species.

So, Runescape hacking, hacking programs for Runescape, free password hacking programs for Runescape, files for hacking Runescape and hacking Runescape accounts has become quite common among players. Although some could say that there is no grace in doing this since it is basically cheating, hackers don't think the same. For them, using any method for being the best in the game isn't only good; it's what is expected from any human being.

Thanks to free network hacking tools, hackers from around the world with a basic knowledge of English and some practice with computers, can start lurking networks everywhere, waiting for their chance to success and increase their reputation inside the hacking community. Although right now Windows is the preferred platform, Linux hacking will become a favorite amongst hackers.
Read more ...

Usb Steals PC passwords


USB Steals Pc Passwords

Tweaked USB that steals every passwords including licences.

Instructions:

1.Decompress the archive and put all the files located in the folder "USBThief"into a USB.

2.Insert the USB in your victims computer.

3.View folder "dump" to see the passwords.

DOWNLOAD LINK:
http://rapidshare.com/files/87198710/USBThief_zarksentinel_www.cw-network.info.rar


Password: www.cw-network.info
Read more ...

Increase the printing speed of your printer

You can improve the printing
speed of your printer with
managing the print spooler
option.

Basically printer spooler holds
your prints for some time then
send to printer for print out.

By default on most printers,
printer spooler option is enabled
but you turn off to specify that
the file should be sending to the
printer and not spooled.

Here
printer spooler option might be
different location in your printer
but on most printers you can
turn off by going to Start, Setting
then Printers.

Now right click on the icon of the
printer that you are using.

Click Properties and select the
Advanced tab.

Here click on “Print directly to
printer” option.

This will tie up your application
until the printer has all the data,
but your print job should finish
more quickly.

Printing directly to the printer
will also come in handy if your
print spooler crashes and you
need to print before you reboot your PC.
Read more ...