Most popular Top Six Ways to download Youtube videos on your pc for free

Posted by Laxman Kudva in

There are about numerous number of ways to download youtube videos but not all of them are good as some of them are nothing but a code embedded in the .php page which require page to be refreshed for each video.

So i am going to list most popular and fast ways to download yputube videos…

1.KissYoutube

It doesn’t have a lot of options, but it’s simple, and it works. Just add kiss before to youtube string the video path. All the files downloaded are called get_video, and you have to add the .flv extension manually.

2. KeepVid

It is another simple site. No hassle, works not only for YouTube movies but for a number of other sites, including Google Video, MySpace Video, DailyMotion and others. Again, you have to add the .flv extension manually.

3. Zamzar

It is an online file format conversion site which can do a lot more than just converting YouTube videos to another format and downloading them to your hard drive.

4. Orbit Downloader a freeware

It s a desktop application which can download videos from a wide variety of sites. The download process is very simple, just hover your mouse over the video and you’ll get a button that says «Get It»

5. Vidtaker

It is a Firefox-only plugin that can download videos from most streaming websites: Google Video, YouTube, MySpace, as well as a number of nasty adult SomethingTube spinoffs (Pornotube, YouPorn etc). It automatically converts the video to a DivX avi.

6. Video Downloader

This is again Firefox extension, which enables you to download videos from YouTube and several other video sharing web sites.

Download Youtube or Google video with FREE save2pc

Posted by Laxman Kudva in

Save2pc is another FREE utility which lets you download youtube videos in the most hassle free way and save the downloaded youtube or google videos as AVI or MPG files.

save2pc_download-youtube

Save2pc is simple and very easy to use software which grabs the videos and save the desired video in AVI or MPG format, you don’t need any technical knowledge to use it.

With save2pc you don’t need use any web scripts or any online web services as you can do it simply and the easy way through save2pc interface.

Save2pc is completely FREE software. It contains absolutely NO ADWARE, NO SPYWARE, NO REGISTRATION, NO POPUPS, NO MALWARE or other unwanted software.

Note: Save2pc will work with Windows 95, 98, Me, NT, 2000, XP, 2003, Vista operating systems.

Download FREE Save2pc | Download Save2pc Freeware Portable Version

How to make your name blank or invisible at orkut.

Posted by Laxman Kudva in

Follow the step by step procedure for making ur name blank or invisible at orkut.

How To Do It:

  1. Login to your orkut account.
  2. Now click on “edit profile” button.
  3. Now type ALT + 0173 in the textbox where you have to enter first name & last name.(i.e. Type 0173 while pressing the ALT key of your keyboard.)
  4. Update your profile.

Lock and Hide your USB drive contents with a password with Lockngo

Posted by Laxman Kudva in

Did you ever feel the need of protecting your pen drive with a password, here is the utility which lets you do this called Lockngo

Lockngo is a removable media protection software

You can download the demo version of Lockngo which lets you hide files on your removable drive for free but you cannot set the password protection over your files on your portable drive in the free version of Lockngo.

lockngo

Lockngo handles the data that is stored in the removable media in a way that makes it IMPOSSIBLE to retrieve even by using hacker’s low level raw reading utilities - it is that simple!

This software works for almost all the pendrives, memory cards and all other portable devices which lets you store the data.

How to install?

Download Lockngo from here, place it on your portable drive and double click to protect the files on the pen drive.

How to use?

Double click on lockngo.exe to hide or un-hide the files stored on your pen drive.

We hope you find this article interesting, Very soon we will be coming up with more articles on pen drive protection.

[ Download Lockngo | Application Homepage ]

Download free English offline dictionary tool

Posted by Laxman Kudva in

Word web is a powerful free one click English thesaurus and dictionary tool which has large collection of English words in a single program.

Word Web is a complete free offline dictionary for windows which can also look in web references such as Wikipedia.

You can find definitions, synonyms and meaning of around 150 000 words stored in the database of WordWeb.

wordweb

After installation WordWeb runs automatically and sits in the system consuming the very least resources and you can launch it any time by pressing the default key ctrl+alt+w which can be further customised.

At the time of installation of WordWeb lets you configure for American, British Australian and other nationalities.

Key Features of WordWeb

  • One click word look up from almost all programs
  • Find Related words for a particular word automatically
  • Solve and find anagrams
  • You can Bookmark words
  • Copy Results to clipboard
  • Reverse Definition
  • You can add your own custom glossaries
  • Lets you edit and add words to the database

In all WordWeb has much more to offer keep exploring you will find WordWeb really useful in your day to day use.

WordWeb FREE version contains absolutely NO ADWARE, NO SPYWARE, NO REGISTRATION, NO POPUPS, NO MALWARE or other unwanted software.

Download WordWeb English

Download free portable CDBurnerXP and burn cd/dvd any where

Posted by Laxman Kudva in

CDBurnerXP is well known free program which lets you burn cd, dvd and also including Blu-Ray and HD-DVD, you can burn data discs, music discs ISO images.

CDBurnerXP portable version includes all the features as compared to the original version with launching menu in which you can choose what do you want to do.

cdburner

CDBurnerXP portable version is properly arranged into USB sized packaged which will take around 8 MB of space.

Key Features includes:

  • Burn all kind of discs
  • can burn audio cd’s
  • data verification after burning process
  • supports windows vista, windows xp and windows 2000
  • multiple language interface

But the portable version is not updated as the original version, otherwise it has all the features packed and perform all the recording tasks.

Overall, CDBurnerXP Portable carry all the features of the powerful CDBurnerXP burning tool right in your pocket USB drive.

Download CDBurnerXP Portable

Convert Rapidshare links to direct download links

Posted by Laxman Kudva in

I used to download a huge number of files from my college days, when I had not premium account on rapidshare. Then I purchased a premium account which is now being mostly used by my brother to download new movies with their latest release.

So If you have a rapidshare account whether a premium or any other account, Rapid Assist lets you convert rapidshare indirect links to direct downloadable links which can be then feed to your internet download manager.

rapid-assist

Rapid Assist is quite useful when you have a premium account or collectors account or any other valid rapidshare account.

Rapid Assist does require installation, you just need to execute the standalone executable (RapidAssist.exe) to run it.

How to use RapidAssist with your download accelerator

1. Run RapidAssist and add rapidshare account by selecting Options >. Add account

add-account-rapid-assist

2. Enter your Username and Password for the rapidshare account and press Okay

account-information

After configuring, copy the indirect download links from rapidshare to the RapidShare Links section and get the direct download links for your download accelerator from Direct Download Links

Requirements:

You will need .Net Framework 2.0 installed

Download RapisAssist

Add / Remove programs from open with list with OpenWithView

Posted by Laxman Kudva in

OpenWithView is another cool free application recently released from Nirsoft, OpenWithView lets you enable or disable any program from your open with program list.

open-with-view

OpenWithView will display all the programs stored in your open with program list from which you can disable any program by pressing F8

If you wish to re enable a disabled program, click the program in OpenWithView program list and press F7

After enabling or disabling the selected program click the Save button save and then close OpenWithView and you will see the changes come into effect.

Download OpenWithView

Search Inside The File Contents with Everything Search Engine program

Posted by Laxman Kudva in

Searching on windows quite be messy some times using windows search, but windows default search is not the best way to search for files sometimes.

Everything search is a free and faster search programs among all the search programs which I had used for Windows XP, but you should go to for Everything for search only if you have hard disk partitions of NTFS type file system.

everything-search

Everything is not only fastest in searching but also in indexing, as at the moment you install it, you can start using it and it indexes files on your system at a very fast rate (1,000,000 files will take about 1 minute), but it only works with NTFS drives.

Everything also searches files with in the file that means you can search the text written inside a file, it performs the files indexing so fast as it uses the Master File Table.

I would give full score 10/10 to everything search among other search programs that I have ever seen. Moreover it uses very less amount of physical memory while running.

Requirements: It works with NTFS file system only.

Download Everything Search | Download Everything Search Beta | Download Everything Search Portable

Image Sequence Viewer – View Sequence Of Images As Video

Posted by Laxman Kudva in

Image Sequence Viewer allows you to view sequence of images as video, it is just like watching a stop motion video compiled from the sequence of images.

image-sequence-viewer

Image Sequence Viewer provides forward or backward frame by frame, possibly it could be a great software to view your webcam your webcam snapshots and notice your movements during video chat.

It could be perfect for viewing the sequence of images you clicked intentionally, you just need to locate the folder containing the images and click on Play button.

Image Sequence Viewer is a FREE software free from any Adware, Spyware, and Malware etc.

Download Image Sequence Viewer

Mov2Gif - Convert any movie to animated gifs

Posted by Laxman Kudva in

We all watch movies and many times we liked some great scenes of the movies we saw, here I mean some particular scenes which last a second or a minute

I was always wondering on how can I convert these awesome scenes of the movies into gif image so that I can actually cut out that scene from the movie in a different way.

movie2gif

Before converting any movie to animated gif make sure that the size of the movies your are going to convert to gif should be of small size, otherwise it will through some script error.

Movie2Gif can only convert following video formats mpg ,mpeg, avi and to animated gifs. It is completely a free program to use without any adware, spyware and malware etc.

Download Movie2Gif

Be Invisible In Gtalk

Posted by Laxman Kudva in

We all miss one of the great awaited feature of how to set invisible status in gtalk. Just like yahoo messenger invisible status in gtalk will allow you to be online without being bugged by gtalk friends when you are at work or don’t feel like to be annoyed by your gtalk friends.

But the regular gtalk version provided by google does not allow you to be in invisible mode when you are logged in.

gtalk-modes

As seen in the image above you can either set your gtalk to busy, show current music track or any custom message as your gtalk status message.

Today, we will tell you how you can be invisible using gtalk without being bugged by your gtalk contacts.

There are two approaches to be invisible in google chat, lets discuss about both of them.

Invisible In Google Talk With Google Talk Labs Edition

In order to get invisible with gtalk only then you need to install a some what different version of gtalk called gtalk labs edition.

What is Gtalk Labs Edition?

Google Talk, Labs Edition is an experimental release of the Google Talk client. It has many of the same great features as the Google Talk Gadget, including instant messaging, emoticons, and group chat. Google Talk Labs Edition also includes new desktop notifications from Gmail, Calendar and Orkut.

You will need to first download gtalk labs edition from here, and install it

After running and logged in to gtalk labs edition, you will find the option to set your status to invisible mode

invisible-gtalk-labs-edition

You can also set your status as invisible in google chat via gmail chat interface if you don’t want to use gtalk labs edition.

Invisible in Google Chat via Gmail

If you use google chat via gmail mail interface you can set your status as invisible,

Invisible-mode-gmail-chat

But by adopting this method you will need to sign out from gtalk and login through the gmail chat interface in the left sidebar, other wise you will see this error.

cannot-set-invisible-status

How To Enable Scrollbar In Gtalk To See All Online Friends

Posted by Laxman Kudva in

Everyone Loves gtalk, I can say on part at least, because from the time I have started using it. I found Gtalk a good and lightweight chat client as compared to the flashy and full of ads yahoo messenger. Gtalk on the other hand is the most clean chat client with out any ads and sufficient number of features required.

But one of feature I always wanted to see in gtalk is to see all of my friends online in one go, but in order to find out whether a gtalk contact is online you need to type the name of the contact in the search bar of firefox.

find-online-friends

So, In order to know whether a friend is online, I need to type the name of the friend, I know typing is fun but not always.

Then I found out another feature already embedded in gtalk which allow me to enable scrollbar in gtalk, with this scrollbar I can move the scrollbar up and down to see the all those friends online in one single go.

Let’s see how can be enable scrollbar in gtalk

1. Login to gtalk, at the bottom of the gtalk window you will see a button View

gtalk-view

2. Click on this button and unclick show in one page (you will need to click that option), that’s it you will see a scrollbar.

gtalk-with-sidebar

Launch Programs, Shutdown or Hibernate When Your Computer Becomes Idle

Posted by Laxman Kudva in

Idle Monitor is a FREE programs which will monitor your computer idle time based on the mouse movements. It can shutdown your computer if left attended for X minutes which you can specify.

Other than shutdown, Idle monitor can either run some specified program when your computer becomes idle.

idle-computer

You can set the idle time in minutes, and specify the program which you want to run if your computer is idle for x minutes.

But this program (Idle Monitor) does not allow you hibernate your computer, but we will tell you a little trick on how can you hibernate your computer when it is idle after X minutes with idle computer program.

Hibernate Computer When Idle

1. Right click on the desktop, click New >> Shortcut

2. A wizard will open up, you will need to copy and paste the path given below in the target path box

target-path-hibernate

rundll32.exe PowrProf.dll, SetSuspendState

3. Name the shortcut as Hibernate

hibernate

4. Open Idle Monitor and Set the idle time in minutes and click on the option which says Run a program or open a website when computer becomes idle, now click the browse button on the bottom right

hibernate-with-idle-computer

5. That’s it, let Idle Monitor run if you want to hibernate your computer when it becomes idle.

Idle Monitor is a completely FREE program which is free from any adware, spyware and malware etc.

Download Idle Monitor

Speed Up Windows XP Boot (SLIGHTLY)

Posted by Laxman Kudva in

Here’s another tip for speed demons, determined to shave the last few nanoseconds off their Windows XP boot up times.

Truth be told this one probably won’t save more than a second or so but every little helps.

The idea is that XP wastes time and resources checking to see if there are any devices connected to empty IDE slots on the PC’s motherboard.

To stop this happening open Device Manager (Winkey + Break > Hardware > Device Manager) and click on the plus sign next to the IDE ATA/ATPI listing to expand the tree.

Right click on Primary IDE Channel and select Properties then the Advanced Settings tab. If either Device 0 or Device 1 is ‘Device Type’ box is empty (not greyed out) change the drop down menu setting for this box to ‘None’ and click OK.

Repeat for the Secondary IDE Controller listing. Note that if you add a new IDE device you will have to go back and change the Device Type drop down menu back to Auto Detect.

Recover (Faster) From a Windows Explorer Hang

Posted by Laxman Kudva in

Every once in a while, Windows Explorer hangs on my machine. (I’m running Windows XP. ) I’ll be able to switch between programs using alt+tab and all my running software still runs, but nothing I do will get Windows Explorer going again. In previous versions of Windows I could kill the Explorer using the task manager and the operating system would restart it. XP doesn’t do that anymore, which really surprised me the first time I did this. “Now what?” I thought. The only thing left to do is hard reboot, right? Nope!

It turns out that logging off and logging back on is enough to re-initialize the Windows Explorer, but I’m getting ahead of myself.

Kill Explorer: First, the unresponsive instance of Windows Explorer needs to be killed, in the usual way:

1. Open the Task Manager by pressing ctrl+alt+delete.
2. Select the “Processes” tab and find “explorer.exe”. I usually sort by Image Name to find things easier. Just click on the column header named “Image Name” and it will sort ascending. You can also click it twice to sort descending if the item you’re looking for is at the end of the alphabet.
3. Once you’ve located explorer.exe, click on it to highlight it.
4. Then click the “End Process” button to kill it.
5. A warning will appear about undesireable results, but things are already pretty hosed to have gotten you here anyway. So, just click Yes.

You may have to repeat this process a few times, but eventually you’ll notice that your toolbar at the bottom of the screen is gone. At this point you can’t do much of anything. Now what?

Close All Other Open Windows: Now, shut down whatever programs you still have running. Press alt+tab to get to each one and close it as usual. Don’t forget to save!

Re-Log In: Pop open the the task manager again. Click on the “Shut Down” menu and select the “Log Off _user_” menu item.

This will log you off and get you back to your log-in screen. If you don’t normally have a log-in screen you’ll still get one. All you have to do is click on your user name (probably the only one). For me, logging off and back on is way faster than rebooting the machine entirely — which can take three to four minutes at the very least.

How to Remove Windows XP's Messenger

Posted by Laxman Kudva in

Theoretically, you can get rid of it (as well as a few other things). Windows 2000 power users should already be familiar with this tweak.

Fire up the Windows Explorer and navigate your way to the %SYSTEMROOT% \ INF folder. What the heck is that thingy with the percentage signs? It's a variable.

For most people, %SYSTEMROOT% is C:\Windows. For others, it may be E:\WinXP. Get it? Okay, on with the hack! In the INF folder, open sysoc.inf (but not before making a BACKUP copy first). Before your eyes glaze over, look for the line containing "msmsgs" in it. Near the end of that particular line, you'll notice that the word "hide" is not so hidden.

Go ahead and delete "hide" (so that the flanking commas are left sitting next to one another). Save the file and close it. Now, open the Add and Remove Programs applet in the Control Panel. Click the Add / Remove Windows Components icon. You should see "Windows Messenger" in that list. Remove the checkmark from its box, and you should be set.

NOTE: there are other hidden system components in that sysoc.inf file, too. Remove "hide" and the subsequent programs at your own risk.

Some Windows Error messages and means to avoid them

Posted by Laxman Kudva in

While we working in computer you may get a black blank screen with white words at that time we get confusion about, whether the file, which is not saved, may get erased so we restart the system. At that time we won’t get tension just read the message and follow the action. These errors are happening with out the CPU knowledge, some of the errors and reasons and how to avoid this are given below.

This program is not responding End now cancel

These types of errors are occurring while we get transfer the data’s frequently from program to computer. If the program got crash means you got the message as End now/ Cancel. These errors are occurs on old type of computers. When we use our pcs on hard task we got this message at that time you may click Cancel and got continue on program else press End Now and got close the program and open once again it to work.

Non system disk or disk error. Replace and press any key when ready

When computer can’t get read the booting disk at the time you got this error message. If you may not take the floppy from the CPU means you may go this problem. So you would take away the system and restart the system. If you wont get cure means switch off the current and open the CPU cabin and find whether any cables get disconnected means connect it even though you may no got cure means bring your computer to a hardware mechanic.

An Exception OE has occurred

For each program it may need memory these memory are allocated by the computer automatically. When a program access the unauthorized memory these type of errors are displayed, if you got these type of errors frequently occur means you may get delete the recently installed file either if we change any setup means re modify it. This process is called as System Restore.

An error has occurred in your program to keep working anyway, click ignore and save your work to a new file. To quit this program click close.

If you got any bug errors on running program mean you got these message. You may also continue running the program even these error displayed now you give ignore and save the file into new name. Because the old file can be get corrupt.

Duplicate name exists

These type of message displays on the networking, because in network each system contain separate names so if any tow system have same name means it will display it. Without the separate we wont access the network at once you right click the My computer icon and select Computer name => change and give the new name to it and use the computer.

A runtime error has occurred. Do you wish to debug?

You got these message while using internet explorer these error are happen due to the website that you have accessing it. You wont debug it debugging is software developer work. If you want to avoid this messages means do the following steps. Go to Tools => Internet options => Advanced => Browsing => Disable script debugging and put a tick mark on it

The margins of section … are set outside the printable area of the page. Do you want to continue? in Word

Some printers work print on full page they take margin space on four types. If you got about message in Microsoft word means please give No and go to document page setup and change the margin and paper size and also view print preview before printing through this way we can avoid this error.

Turn off Indexing to speed up XP

Posted by Laxman Kudva in

Windows XP keeps a record of all files on the hard disk so when you do a search on the hard drive it is faster.

There is a downside to this and because the computer has to index all files, it will slow down normal file commands like open, close, etc.

If you do not do a whole lot of searches on your hard drive then I suggest turnning this feature off:

1. Control Panel

2. Administrative Tools

3. Services

4. Disable Indexing Services

Adjust Graphics for Speed

Posted by Laxman Kudva in

Windows XP has a lot of new cool looking visual elements, however, those new elements take up more RAM and cause your computer to be less responsive. By tweaking your graphics settings, you can increase the performance of your computer.

To get started, Let’s reduce the color quality. This setting determines how many colors are displayed on your screen.

1. Right click on your desktop and select properties.

2. Click on the settings tab and adjust the color quality drop down box to Medium (16 Bit).

3. Click OK.

Next, let’s use the windows performance settings to optimize your computer for performance. This will revert back to the old Windows 2000 look as well as take away a lot of the fancy graphics effects. However, if you are really into performance, this is the price you have to pay.

1. Right click on the My Computer icon on your desktop or in your start panel and select properties.

2. Next, Click on the Advanced tab and hit the setting button under performance.

3. On the visual effects tab, select Adjust for Best Performance and hit OK.

4. Hit OK once more to exit system properties.

Now your computer will run slightly faster!

Modify the Windows XP System Properties logo

Posted by Laxman Kudva in

The Windows XP System Properties logo is often changed by computer manufacturers. Hardware vendors use this general system information dialog to brand your computer with their own logo and support contact information.

In this tip you can learn how you can insert your own logo in the system properties dialog and complete it with your own contact information.

To invoke the system properties dialog, click the Start button, right-click “My Computer” and select “Properties”.

This will open up your general system information dialog. On our Fujitsu-Siemens Amilo Pro laptop, the Windows XP System Properties logo looks like this :



If you want to put your own graphic in there, you should create your image in a .bmp graphic file. It’s also a good idea to create this bitmap image with the same background shade of gray (RGB: 192, 192, 192) used in the Properties dialog. Otherwise, you risk letting Windows make its own judgments regarding color contrast and background shading.

The next thing to consider is the image size. The system properties dialog only offers enough real estate for an image of about 180 (wide) x120 (high) pixels. Make sure that you can fit your logo in this area.

Once you have created your logo and saved it as a .bmp file, copy it over to the system32 subfolder of your Windows system folder. If you don’t know where your system folder is :

- Click the Start button and select “Run”
- In the “open” field, enter “cmd” (without the quotes) and click ok
- Windows will open up a dos command window
- In the command window, type “set system” (without the quotes)
- Look for the line that contains “SystemRoot”, this is where your system directory is (generally, the Windows XP system folder is c:\windows)

Now that you know where your system folder is, copy your logo image file over to the system32 subfolder of your system folder. Then rename your logo image file to oemlogo.bmp

Additionally you can create a new file in this same folder and name the new file oeminfo.ini

In this file you can enter your contact information like in the example below :

[General]
Manufacturer=Your Company Name
Model=ShowCase

[Support Information]
Line1=” ”
Line2=” For support, sales, upgrades or questions:”
Line3=”"
Line4=” Some text to demonstrate the XP System Properties logo”
Line5=” Windows XP PC ”
Line6=” Your Company Name”
Line7=”"
Line8=” +1 (888) 888-888 (voice)”
Line9=” +1 (888) 888-889 (fax)”
Line10=”"
Line11=”"
Line12=” http://www.Your Company Name.com/”

Save and close the file and you are ready. From now on, if someone opens up the system properties dialog, your own Windows XP System Properties logo is in there.

Picasa Tip: How to Create an Account and Start Uploading Photos

Posted by Laxman Kudva in

One of the many wonders of the world wide web is Picasa Web Album, and I think everyone should have an account.

It is both an online-tool and a FREE downloadable, client-side tool made by Google, allowing you to easily upload photos. I for one find it really easy to use, I think Google tools are built that way. One can quickly use those photos for other online websites like blogs and the like. I use it to store my personal private photo library too.

The free account allows one to have 1024MB of photo space. An upgraded full account are separated into 4 general plans:

1. 10GB for $20/year
2. 40GB for $75/year
3. 150GB for $250/year
4. 400GB for $500/year

For those who do not have a Picasa Web Album account yet, here are 5 easy steps to start with one of your own and begin your online photo library.

1. Create an account or sign into your Google account using your GMail username and password
at http://picasaweb.google.com.

2. At the upper left corner you'd see My Photos, My Favorites, & My Public Gallery. You can click any of these links when you've got photos uploaded into your account.

3. To begin uploading your first sets of photos, click the upload button on the upper-right side of the website.

4. You then must first choose to create a new album and/or to upload your photo into an existing album.

5. And the fifth step is to choose the actual photos and click OK/Upload.

New Attack on orkut! User gets logged out by just opening scrapbook!

Posted by Laxman Kudva in

Hackers discovered most serious bug on orkut and that’s too orkut’s most accessed area - scrapbook!

What makes it most serious is that this time user do not need to click or perform any action anywhere to trigger vulnerable codes.

Many users suffered from this. Most of them getting logged out of orkut by just visiting their own scrapbook. Worst they can not delete blank or suspicious scraps either! :-(

The bug is not fixed yet and this can be used by malicious hackers to gain access victims orkut account so details about this bug will be posted after it gets rectified, till then lets use following solution to save yourself!

Objective: Blocking flash content [on orkut atleast] Flashblock

# Firefox User:

Internet Explorer:

  • Go to the Tools Menu -> Internet Options
  • Click on the Security tab
  • Click on Custom Level
  • Disable Run ActiveX controls and plug-ins

image

Additionally delete scraps from your scrapbook if you are getting logged out of orkut on just visiting your own scrapbook!

Terrorists used Google Earth during Mumbai attacks?

Posted by Laxman Kudva in

It is too scary to know that some free web services can help the terrorists and anti social elements to create havoc around the world. Recently, I came across an article in PcWorld which revealed, according to investigations terrorists used Google Earth to get familiar with streets of Mumbai and learn the roads around them during recent Mumbai attacks. Everyone knows, with growing technologies there must be some disadvantages too, but such a heavy loss to the national heritage and resources can ever be compensated by these technologies that make our life easier? It is really a big question..

The article also said that, in the year 2005 our ex-president Mr. Abdul Kalam warned people about how Google earth can be misused. Further the article goes as follows:

Indian security agencies have complained that Google Earth exposed Indian defense and other sensitive installations. Other nations, including China, have made similar complaints regarding military locations.

Don’t know what exactly Indian government is going to do after such a heavy loss of life and resources of the country. But I am sure that these scary situations will bring some problems for the launch of India based satellite mapping service - “ISRO Bhuvan“.

Source: PCWorld

Gmail now on your desktop!

Posted by Laxman Kudva in

Every alternative days Google is coming out with cool new features in its network of services, may it be Orkut, Gmail, Google Calendar or Google search. Truly speaking I don’t have any words left to thank Google for all their efforts towards improving its service. As such I am directly coming to the point. ;) It is not more than a few hours that Google announced the launch of its all new gadget for Google desktop - Gmail gadget.

I personally tried my hands on this new gadget, and I have simply one word to say - "Awesome"!!.. As this is start, I don’t have any complaints about it. But one bad this is that, as of now, Gmail gadget is available only for windows users and mac or Linux users cannot use it. :( Windows users if you have Google desktop installed, just download the Gmail gadget from here, else you will need to download and install Google desktop first.

gmail gadget

So, like me, if you too check your mails frequently, then I would say you to download this cool gadget without waiting any more. :-)

Hardware Troubleshooting Tips

Posted by Laxman Kudva in

Hardware Troubleshooting Guide

Troubleshooting Tips for New Monitors

Here is some basic trouble shooting tips for new monitors:

1. The picture does not appear

* Check to make sure the signal cable is firmly connected in the socket.
* Check to see if the computer system's power is ON.
* Check that the Brightness Control is at the appropriate position, not at the minimum.

2. The Screen is not synchronized

* Check to make sure the signal cable is firmly connected in the socket.
* Check that the output level matches the input level of your computer.
* Make sure the signal timing of the computer system is within the specification of the monitor.

3. The position of the screen is not in the center

* Adjust the H-Size, H-Phase or V-Size, V-Center controls.
* Check if the signal timing of the computer system is within the specification of the monitor.

4. The screen is too bright or too dark

* Check if the Brightness or contrast control is at the appropriate position, not at the maximum or minimum.
* Check if the specified voltage is applied
* Check if the signal timing of the computer system is within the specification of the monitor.
* Especially, check the horizontal frequency.

5. The screen is shaking

* Move all objects that emit a magnetic field, such as a motor or transformer, away from the monitor.
* Check if the specified voltage is applied.
* Check if the signal timing of the computer system is within the specification of the monitor.

Wireless Internet Tips

Posted by Laxman Kudva in

Wireless Internet Sharing

If you plan on sharing your wireless Internet access, you will need to have that option turned on in your settings. However, if you do not have other computers hooked up to the network at this time, for security purposes, you should leave the setting turned off until the need arises to share the wireless Internet access.

Wireless Internet Speeds

Coming in at the slowest is Bluetooth, followed by 802.11b, 802.11a and topping the charts currently is 802.11g. 802.11b is roughly equivalent to the traditional wired 10BaseT Wired Ethernet networks. Therefore, switching to Wi-If should not considerably slow down your wireless Internet connection .

Wireless Network Equipment While Traveling

You will need to have a wireless network card, either an adapter or integrated in your laptop. If you do not have an available slot on your PC, there are adapters you can purchase that plug into a USB port on the computer.

Finding a Wireless Internet Hot Spot

There are several stores and restaurants that offer wireless Internet access, such as Starbucks. If you have a particular destination in mind, you can call the hotels to see if they offer the service. There are also hot spot directories that you can search to find wireless Internet access.

Wireless Internet - WiFi Standards

802.11 is the Wi-If standard, however there are other standards which are variations of the 802.11. These include:

* 802.11a
* 802.11b
* 802.11g
* 802.11i.

The differences among these standards includes speed, transmission frequency, and price. 802.11g is backwards compatible with previous products, but that is not the case with 802.11a. Make sure you check on compatibility issues prior to purchasing products.

Wireless Internet and Dial up

It is possible to share a wireless Internet connection with dial up, but it is not a very good idea. Some access points, such as the airport extreme base station from Apple, will allow this. However, there is some slow down time with sharing a wireless Internet connection, and if you decide to share a dial up connection, you won't be surfing anything fast.

Finding a Wireless Internet Hot Spot in a Chain

If you are traveling and know that you will be stopping at Starbucks, for example, and want to access the Internet, you can check out their website to see what specific franchises offer wireless Internet access.

Paying for Wireless Internet Access

Most likely, you will need to pay for the high speed wireless Internet access when you travel. Starbucks for example uses T-mobile as their wireless Internet provider. You will need to have a t-mobile account in order to access WI-if at Starbucks. There are some restaurants that may advertise free Wi-If, but in general, you should expect to pay a fee.

Nationwide Wireless Internet Service

There are a plethora of national wireless high speed Internet services available. AT&T, Sprint PCS, T-mobile, and Verizon are a few which offer nationwide service. You will want to check out various pricing, roaming policies and fees for the various networks.

Mixing Apples and PC's to Share Wireless Internet Connection

You can mix apple and PC on a wireless network and share a wireless Internet access. For example, Apple makes an access point called the AirPort Extreme Base station. Even though it is made by Apple, it still uses the Wi-If standard, and PC computers with a wireless adapter on the network will be able to share the wireless Internet connection

Mixing Wireless Internet and Wired Internet

You can easily share a wireless Internet access while still maintaining a wired network. There are many wireless routers on the market which offer both wired and wireless network capabilities. It is also possible to add on an access point after a wired router for wireless access.

Configuring Wireless Access Point to Share Wireless Internet Connection

Once you install the drivers on your computer for the access point, you will be able to open up the configuration software that comes with the router. The IP address 192.168.0.0 is the lowest in the network and should be dedicated to the router. Make sure to follow the specific configuration instructions that come with your wireless router, as each product will be slightly different from one another.

Wireless Internet Equipment

The beauty of the WI-FI is that it set a standard for wireless networking. Because of this, you do not need to have equipment from all the same venders in order to run a successful wireless network. You will be able to share wireless Internet access as well without having equipment from all the same venders.

Configuring Wireless Internet Card

You will need to use the configuration software that comes with your network card to configure your computer to work at various hot spots. Simply type in the hotspot network name (various depending on the service you are using) and state the type of network, such as access point. You can also scan available wireless broadband internet access in the area and choose which network you wish to connect with.

Wireless Internet WIFI

WI-FI, the 802.11 standard, is important for a variety of reasons. Having a standard in the industry ensures that anyone using wi-fi will be using the same standard, therefore equipment and connections are interchangeable. Having a set standard makes setting up wireless networks, sharing wireless internet access and working with wireless equipment more users friendly.

Changing Drive Letters in Windows 2000

Posted by Laxman Kudva in

If you find the need to change a drive letter, Windows 2000 makes this possible. Here's how:
In the Control Panel, select Administrative Tools. The Administrative Tools folder will pop up.

In that folder, select Computer Management.
Click on Disk Management and wait for the Logical Disk Manager Service to finish scanning your system's drives. You will then see a list of the drives available in your system. 1. Click on the drive with the drive letter you want to change.

2. Right click and select the Change Drive Letter and Path… option.

3. All drive letters linked to that drive will be listed on this popup screen.

4. Click on the drive letter you want to change and click on Edit.

5. Click on the drive letter and a whole list of available drive letter choices will now appear.

6. Select the drive letter you want for this drive.

7. Click OK and your drive will have a new drive letter.

Notes: You will not be able to change the drive letter of your system or boot volume. However, the drive letters of all other drives and drive volumes are changeable.

If you want to change the drive letter of a CD/DVD-ROM or ZIP drive, make sure you insert a disk first. The drive letter cannot be changed unless there's a disk in the drive.

Some software may not work properly if you change any drive letter. So, you may need to do some registry editing to get that software to work with the new drive letter. If that doesn't work, you will have to reinstall the software using the new drive letter or reset the drive letter back to its original drive letter.

Microsoft Excel Shortcut keys

Posted by Laxman Kudva in

Auto sum shortcut key : Quickly create a Microsoft Excel formula to get the sum of all cells by highlighting the cells you wish to know the value of and pressing ALT and = .

Create hyper links in Excel : Quickly create hyper links in your Microsoft Word, Excel, or Front Page document by highlighting text and pressing "CTRL + K".
Close all open files at once : Close all open Microsoft Word and/or Excel files by holding down the shift key and clicking "File" and then "Close All".

Quickly open recently opened files : Quickly open the recent files by first pressing "ALT + F" to open the file Menu and press 1, 2, 3, or 4.

Create underlines without any text : This tip works with the majority of Microsoft Office applications. Easily create an underlined space by pressing CTRL + U to start the underline, then press SHIFT + Space for each underlined space you wish to create. An example of how this could be used is for printable forms, for example: Name: .

Print only sections of a document : Save on your printer ink by selectively printing in Windows programs such as Microsoft Word, Internet Explorer, WordPad, Outlook, etc. To do this highlight portions of text you wish to print and click print. In the printer dialog window under Page Range choose the option Selection. It is important to realize that not all programs or printer drivers support this feature.

Repeat recent action : Using the F4 key in Microsoft Office 2000 and above allows the user to repeat the last used action. For example, if you have changed the font of a selected text and wish to change another portion of text to the same font, pressing F4 will do this for you automatically.

Quickly undo : Quickly undo mistakes in the majority of most PC Windows program by pressing CTRL + Z.

Quickly above cell contents : In Microsoft Excel press CTRL + SHIFT + " to copy the above cells contents.

Using the Microsoft Excel Auto filter : Organize cells quickly by using Microsoft Auto filter. Columns that contains long listing of data can be easily sorted by using the Auto filter option, to use this option select the top rows of the columns you want to be used and select Data / Filter and Auto Filter. Once successfully completed you can use drop down arrows to filter the data automatically.

How to Protect Worksheets in Excel

Posted by Laxman Kudva in

The best use of the Excel protection system is to prevent a data entry person from accidentally damaging formulas or formatting in your spreadsheet file. Passwords aren't needed for this purpose.

Worksheet protection

There are two different menu locations that together control worksheet protection:

* Format, Cells, Protection, with a check box labeled Locked, to choose which cells the user will be able to modify when the sheet is protected
* Tools, Protection, Protect Sheet to toggle sheet protection on and off In a new blank worksheet all cells are formatted Locked, but worksheet protection is off (Tools menu) so the locked cell formats have no effect. This is the part that confuses some people; it seems to work backwards to expectations, but the way it works actually makes it less work to use, once you get used to it.

Here's what you do: select all the cells you want the user to be able to edit, either one range at a time or all together using the Control key, and go to Format Cells Protection and uncheck Locked. Then you can go to Tools Protection and turn on sheet protection. The user will only be able to type in the cells you formatted unlocked; if they try to change a locked cell, deliberately or by accident, they'll get an error dialog.


Workbook protection

To prevent the user from deleting or inserting worksheet tabs, go to Tools, Protection, Protect Workbook. In both this dialog and the Protect Sheet dialog, most of the time you won't need to change any check box options.

When either sheet or workbook protection is on, the submenu item at Tools Protection (pictured above) will say "Unprotect Sheet" or "Unprotect Workbook" instead of "Protect."

Multiple Logins of Gmail and Orkut through firefox

Posted by Laxman Kudva in

Just follow the following steps and you will be able to login in gmail and orkut with multiple accounts. Through this you will be able to make profiles in your firefox.

Step 1:
Open system properties(by right clicking my computer), choose tab advanced, click to environment variables button. in system variables section, click new. type this information to each textbox.

Step 2:
variable name: moz_no_remote (should be all small letter).

variable value: 1

Step 3:
open firefox icon’s properties(from desktop and quick launch). add extension -p to command line(like “c:\program files\mozilla firefox\firefox.exe” -p). press ok.
When you will open firefox it will prompt for profile selection create a profile,open firefox login to orkut open once more use another profile login.

Orkut Messenger (Scrapy boy)

Posted by Laxman Kudva in

Hi friends……..this is link for Orkut Messenger called Scrapy boy…..
Scrapy boy enables you to send and receive instant scraps in the Orkut website without a web browser and scrapy boy also gives a ultimate interface……..so download it and enjoy:

Link : http://www.scrapboy.com/en/

Scrapbook Flooder for New Orkut (Working)

Posted by Laxman Kudva in

Hello Guys, Below is the new script for flood anyone scrapbook…and gus news is tat it is also working on New Orkut

First open ur scrapbook or other friends scrapbook.Type content u want to flood in textarea and then paste this in ur address bar , then press enter…..Wow!!! U have done u see that scrapbook page continuously loading again and again…To stop this click on other link on page. After that go to scrapbuk again and see….What u have done!!!!

For script Click on link Below

Orkut Scrap Flooder

Easiest ways to save images from orkut albums

Posted by Laxman Kudva in

Since a few days right click on pictures in orkut album is disabled, so we cant not save the images from orkut albums using the save image option, also saving the entire page wont help you. Here are two simple ways to save images in orkut albums.

Using print screen (Screen Capture)

  • open the pic which you want to save
  • Press f11, this will hide the tool bars and gives extra room for the image.
  • now press the “print screen” key on your keyboard
  • Open paint or any other similar program
  • To open paint, press (win+r) and type “mspaint” or click on start >all programs>accessories>paint

  • Now press ctr+v and save the image.

Dragging the image :

Drag the image and drop it on address bar.It will be opened in a new page where right click is enabled

Using “save frame as” option in firefox

This is a very simple method to save the image campared to the previous one. Lets do it with an example.

so i open this page in firefox and click on File and then select save frame as option and save it with the name cute and then browse to the folder cute_files to find the pic i wanted.

Get your orkut scraps delivered to your mobile

Posted by Laxman Kudva in

Get orkut feeds on your mobile

This article provides you with a very simple method to get orkut scraps delivered directly into your mobile phone as sms messages. The pages you may subscribe are scrapbook, community pages or even community messages. All the messages will be delivered free of cost. Following are the steps to get any orkut page as sms to mobile :

  1. Register your mobile phone to MyToday. MyToday supports almost all networks in India.
  2. Login to your orkut account and navigate to the page to which you wish to subscribe.
  3. Copy the URL of the above page. It should be copied completely including http://. URL can be found in the address bar (where you enter www.orkut.com) of your browser.
  4. In other window/ tab, open the orkutfeeds site and in the field provided, paste the above orkut URL and click on subscribe.
  5. Now, copy the URL of subscription page as said above.
  6. Open your MyToday account, and navigate to a page as seen in the snap in the following way.
    a. Under My tab, click on feeds.
    b. Under My Folders, click on Manage feeds.
    c. Under Folders tab, click on SMS.
    d. You will now get into a page.
  7. Enter the name as you wish. Say, “My scraps” and at the URL field, paste the URL which you have copied from orkutfeeds subscription page, check Send SMS, click Create.
  8. You’re done! Now, you can expect your scraps delivered into your mobile phone as and when your scrapbook updates.

You may use following methods to get your scrap directed to your mobile phone.
1. Determine your cell phone’s email id and use RSSFWD to send scrapbook feed updates to your mobile phone. Easiest way to determine your mobile phone’s email id is to send an email from your cell phone to your mail id (it costs you ) and look for from address in mail. In RSSFWD, you need to enter your cell phone’s mail id instead of your email id.
2. Yahoo! Alerts:
This is quite simple, you need to register your mobile for Yahoo! Mobile or Yahoo! Messenger. Goto Yahoo! Alerts page for feeds. Enter the feed url for your orkut scrapbook and select your mobile device to receive alerts. This trick did not work for me when I used my messenger phone (Spice, Karnataka, India.) to receive alerts. My network is compatible with messenger but did not work for alerts. For detailed description of using Yahoo! Alerts, I recommend you reading this post.
3. We have few more sites like SendMeRss or MyToday(India) or any other applicable for your geographic location. Just use the same trick, use the feed generated by orkut feeds and subscribe to that using any services like the ones above mentioned. Or use your cell phone’s email address and signup for that mail notification.

Spoofing Via telnet

Posted by Laxman Kudva in

Get a smtp server ( i use mx1.hotmail.com)

they’re normally likemx1,mx2 etc..thehost.com.

Now, go to Start>Run>cmd then in the cmd window,

Type telnet mx1.hotmail.com 25

then HELO hotmail.com then MAIL FROM : (fake email here)

then RCPT TO: (person)then DATA then type your message,

you can press enter for a new line, finish the message by a full stop (.) on a new line, press enter!

spoofed.

For Educational purpose only

officepoltergeist | Play pranks on your friends with this open source software

Posted by Laxman Kudva in

Have you ever thought of having a software which would do the following on your friends comp???

  • Play spooky sounds
  • Open or close cd drives
  • Transmit text through your victim’s keyboard
  • Make windows shake
  • Turn monitors on and off
  • Move windows slightly left and right
  • Send popup alert messages

I found a software which exactly does all these stuff, all thanks to developers of OfficePoltergeist

How does OfficePoltergeist work?

OfficePoltergeist sets up a small server running on the victim’s machine. The program, which hides in memory while it runs, waits silently for a connection on port 666.

With the OfficePoltergeist Controller, you can be the poltergeist:

OfficePoltergeist controller

When you’re done, shutdown the server on the remote victim’s computer.

Leave no trace… just like a real poltergeist!

If you want to give it a try on your own machine before unleashing it on your friends and coworkers, it should work just fine. Hit some buttons… play around. You’ll figure it out. Believe me, it ain’t rocket science.

How do I download OfficePoltergeist?

Version 1.1 of OfficePoltergeist was released on October 21, 2005.

Run it straight from our site or right click on the link and use “Save Target As…” (or whatever) to keep a copy permanently on your computer.

Please use OfficePoltergeist responsibly.

Rememeber — ghosts are often mischievous, but never evil.

How do I know that OfficePoltergeist does what it says it does…
… and nothing more?

To prove to yourself that OfficePoltergeist is all treats and no tricks, you can download the source.

As of October 21, 2005, when version 1.1 was released, OfficePoltergeist required a beta version of AutoIt v3 to compile properly… presumably, that’ll change as AutoIt continues to get more and more awesome.

OfficePoltergeist was built by jon roig and released under the GPL license.

How do I trick someone into downloading OfficePoltergeist?

OfficePoltergeist really isn’t set up that way.

The idea is this: when your coworker is out smoking crack (or whatever he or she does on “break”), take that opportunity to go to the victim’s machine, fire up officepoltergeist.com and run the mem86control.exe program straight off the website. When the OfficePoltergeist server first loads, it’ll tell you the ip address of the victim’s computer, then continue to run silently in the background. (You’ll want to write the ip address down — you’ll need it to connect with the OfficePoltergeist controller.)

Once your stealth mission is completed, go back to your computer, start the OfficePoltergeist controller, connect to your victim’s machine, and find your inner poltergeist.

Does OfficePoltergeist work behind a firewall?

Yes. As long as port 666 is open, that is.

Does the WindowsXP Firewall mess with the OfficePoltergeist server?

It can… but since you’re there when you install the OfficePoltergeist server, why not hit the “unblock” button when the alert pops up?

When’s the best time of year to use OfficePoltergeist?

Let’s face it… any time is a good time to play computer pranks on coworkers. April Fool’s Day, Halloween… they are an excellent time to play office pranks. Your coworkers might be expecting you to strike, but it’s all good.

Is there a version for OS X/Linux/Whatever?

Yes! Check out the Mozilla Extension.

My virus scanner identified OfficePoltergeist as a trojan. What’s up with that?

OfficePoltergeist IS a trojan.

Well, kind of. Not in bad way…

It cracks us up that we ended up on some poor, overworked project manager’s spreadsheet somewhere as a trojan horse, but it seems reasonable that OfficePoltergeist is identified that way.

I don’t think they’re implying that OfficePoltergeist has any secret hidden functions or anything…

OfficePoltergeist Home page

Block The Annoying Ad Servers

Posted by Laxman Kudva in

If you want to remove those nasty ads from the pages which waste lot of time and bandwidth then here is something for you I believe it will help you a lot.

How it works:
It’s possible to set up a name server as authoritative for any domain you choose, allowing you to specify the DNS records for that domain. You can also configure most computers to be sort of mini-nameservers for themselves, so that they check their own DNS records before asking a nameserver. Either way, you get to say what hostname points to what IP address. If you haven’t guessed already, the way you block ads it to provide bogus information about the domains we don’t want to see - i.e, all those servers out there that dedicate their existence to spewing out banner ads.

The hosts file:

Probably the most common way people block ads like this is with something called the “hosts file”. The hosts file is a simple list of hostnames and their corresponding IP addresses, which your computer looks at every time you try and contact a previously unknown hostname. If it finds an entry for the computer you’re trying to reach, it sets the IP address for that computer to be whatever’s in the hosts file.

127.0.0.1 is a special IP address which, to a computer, always means that computer. Any time a machine sends a network request to 127.0.0.1, it is talking to itself. This is very useful when it comes to blocking ads, because all we have to do is specify the IP address of any ad server to be 127.0.0.1. And to do that, all we have to do is edit the hosts file. What will happen then is something like this:

1. you visit a web page
2. the web page contains a banner ad stored on the server “ads.example.com”
3. your computer says “ads.example.com? never heard of it. wait a second, let’s see if I’ve got the number on me…”
4. your computer finds its hosts file and checks to see if ads.example.com is listed
5. it finds the hostname, which points to 127.0.0.1
6. “great”, says the computer, and sends off a request to 127.0.0.1 for the banner ad that’s supposed to be on the page
7. “oh”, says the computer, and fails to show anything because it just sent a request to itself for a banner ad

Where’s my hosts file?

* Windows 95 / 98 / ME: C:\Windows (I think)
* Windows NT: C:\WinNT\hosts
* Windows 2000: C:\WinNT\system32\drivers\etc\
* Windows XP: C:\Windows\System32\drivers\etc
* FreeBSD / Linux / Mac OS X / Unixish operating systems: /etc/hosts
* Classic Mac OS: please read this helpful information submitted by David “iNerd” B
* Mac OS 9: Marcia Skidmore sent in details that hopefully explain what you need to know

The format of the hosts file is very simple - IP address, whitespace, then a list of hostnames (except for older Macs; please see above). However, you don’t need to know anything about the format if you don’t want to as you can just view the list hosts file.

Of course, that’s not the only way to use the list, but it’s probably the most simple for most people.

Here is the hosts list which are serving you the ads just append it to your hosts file and enjoy ad free surfing makes things faster. If you want ad from certain site then just remove it from the list below.

QUOTE
127.0.0.1 007arcadegames.com
127.0.0.1 101order.com
127.0.0.1 123banners.com
127.0.0.1 123found.com
127.0.0.1 180searchassistant.com
127.0.0.1 180solutions.com
127.0.0.1 247media.com
127.0.0.1 247realmedia.com
127.0.0.1 ads.cimedia.com
127.0.0.1 ads.clearchannel.com
127.0.0.1 ads.collegclub.com
127.0.0.1 ads.com.com

Just like this the list of ad servers is literally to long which I don’t think I can post here.
But still you can block all ad servers by this method. You can go search on google for list of ad servers and you can do the same procedure to block them all.

Telnet lessons - Part 3

Posted by Laxman Kudva in

Carolyn’s note: just means hit return. In case you can’t see that little
period between the s, what you do to end composing your email is to hit enter,
type a period, then hit enter again. Anyhow, try typing:

This is a test.
.
250 Requested mail action okay, completed
quit
221 Service closing transmission channel

Connection to host lost.

Using techbroker’s mail server, even if you enable full headers, the message we just composed looks like:

Status: R
X-status: N

This is a test.

That’s a pretty pathetic forged email, huh? No “from”, no date. However,
you can make your headers better by using a trick with the data command. After you give it,
you can insert as many headers as you choose. The trick is easier to show than explain:

220 Service ready
helo santa@northpole.org
250 host ready
mail from:santa@northpole.com
250 Requested mail action okay, completed
rcpt to:cmeinel@techbroker.com
250 Requested mail action okay, completed
data
354 Start main input; end with .
from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.
.
250 Requested mail action okay, completed
quit
221 Service closing transmission channel
Connection to host lost.

The message then looks like:

from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.

The trick is to start each line you want in the headers with one word followed by a colon,
and the a line followed by “return”. As soon as you write a line that doesn’t begin this way,
the rest of what you type goes into the body of the email.

Notice that the santa@northpole.com from the “mail from:” command didn’t show up in the header.
Some mail servers would show both “from” addresses.

You can forge email on techbroker.com within one strict limitation. Your email has to go to someone at techbroker.com.
If you can find any way to send email to someone outside techbroker, let us know,
because you will have broken our security, muhahaha! Don’t worry, you have my permission.

Next, you can read the email you forge on techbroker.com via telnet:

C:\>telnet techbroker.com 110

+OK <30961.5910984301@techbroker.com> service ready

Give this command:
user xyz
+OK user is known

Then type in this:
pass test
+OK mail drop has 2 message(s)

retr 1
+OK message follows
This is a test.

If you want to know all possible commands, give this command:

help
+OK help list follows
USER user
PASS password
STAT
LIST [message]
RETR message
DELE message
NOOP
RSET
QUIT
APOP user md5
TOP message lines
UIDL [message]
HELP

Unless you use a weird online provider like AOL, you can use these same tricks to send and receive your own email.
Or you can forge email to a friend by telnetting to his or her online provider’s email sending computer(s).
With most online providers you need to get the exact name of their email computer(s).
Often it is simply mail.targetcomputer.com (substitute the name of the online provider for targetcomputer).
If this doesn’t work, you can find out the name of their email server with the DOS nslookup program,
which only runs from cmd.exe. Here’s an example:

C:\ >nslookup
Default Server: DNS1.wurld.net
Address: 206.61.52.11

> set q=mx
> dimensional.com
Server: DNS1.wurld.net
Address: 206.61.52.11

Telnet lessons - Part 2

Posted by Laxman Kudva in

The simplest use of telnet is to log into a remote computer. Give the command:

C:/>telnet targetcomputer.com (substituting the name of the computer you want to telnet into for targetcomputer.com)

If this computer is set up to let people log into accounts, you may get the message:

login:

Type your user name here, making sure to be exact. You can’t swap between lower case and capital letters.
For example, user name Guest is not the same as guest.

****************
Newbie note: Lots of people email me asking how to learn what their user name and password are.
Stop laughing, darn it, they really do. If you don’t know your user name and password, that means whoever
runs that computer didn’t give you an account and doesn’t want you to log on.
****************

Then comes the message:

Password:

Again, be exact in typing in your password.

What if this doesn’t work?

Every day people write to me complaining they can’t telnet. That is usually because they try to telnet into a computer,
or a port on a computer that is set up to refuse telnet connections. Here’s what it might look like when a computer
refuses a telnet connection:

C:\ >telnet 10.0.0.3
Connecting To 10.0.0.3…Could not open connection to the host, on port 23.
A connection attempt failed because the connected party did not properly respond after a period of time,
or established connection failed because connected host has failed to respond.
Or you might see:

C:\ >telnet techbroker.com
Connecting To techbroker.com…Could not open connection to the host, on port 23. No connection could be
made because the target machine actively refused it.

If you just give the telnet command without giving a port number, it will automatically try to connect on port 23,
which sometimes runs a telnet server.

If telnet failed to connect, possibly the computer you were trying to telnet into was down or just plain no longer in existence.
Maybe the people who run that computer don’t want you to telnet into it.

Even though you can’t telnet into an account inside some computer, often you can get some information back or
get that computer to do something interesting for you. Yes, you can get a telnet connection to succeed -without doing
anything illegal –against almost any computer, even if you don’t have permission to log in.
There are many legal things you can do to many randomly chosen computers with telnet. For example:

C:/telnet freeshell.org 22

SSH-1.99-OpenSSH_3.4p1

That tells us the target computer is running an SSH server, which enables encrypted connections
between computers. If you want to SSH into an account there, you can get a shell account for free at
http://freeshell.org . You can get a free SSH client program from http://winfiles.com .

Sometimes a port is running an interesting program, but a firewall won’t let you in. For example, 10.0.0.3,
a computer on my local area network, runs an email sending program,
(sendmail working together with Postfix, and using Kmail to compose emails).
I can use it from an account inside 10.0.0.3 to send emails with headers that hide from where I send things.
If I try to telnet to this email program from outside this computer, here’s what happens:

C:\>telnet 10.0.0.3 25
Connecting To 10.0.0.3…Could not open connection to the host, on port 25.
No connection could be made because the target machine actively refused it.

However, if I log into an account on 10.0.0.3 and then telnet from inside to port 25, here’s what I get:

Last login: Fri Oct 18 13:56:58 2002 from 10.0.0.1
Have a lot of fun…
cmeinel@test-box:~> telnet localhost 25
Trying ::1…
telnet: connect to address ::1: Connection refused
Trying 127.0.0.1… [Carolyn's note: 127.0.0.1 is the numerical address meaning localhost,
the same computer you are logged into]
Connected to localhost.
Escape character is ‘^]’.
220 test-box.local ESMTP Postfix

The reason I keep this port 25 hidden behind a firewall is to keep people from using it to try to break in or to forge email.
Now the ubergeniuses reading this will start to make fun of me because no Internet address that begins with 10.
is reachable from the Internet. However, sometimes I place this “test-box” computer online with a static
Internet address,
meaning whenever it is on the Internet, it always has the same numerical address.
I’m not going to tell you what its Internet address is because I don’t want anyone messing with it.
I just want to mess with other people’s computers with it, muhahaha.
That’s also why I always keep my Internet address from showing up in the headers of my emails.
Want a computer you can telnet into and mess around with, and not get into trouble no matter what you do to it?
I’ve set up my techbroker.com (206.61.52.33) with user xyz, password guest for you to play with.
Here’s how to forge email to xyz@techbroker.com using telnet. Start with the command:

C:\>telnet techbroker.com 25
Connecting To Techbroker.com

220 Service ready

Now you type in who you want the message to appear to come from:

helo santa@techbroker.com
Techbroker.com will answer:

250 host ready

Next type in your mail from address:

mail from:santa@techbroker.com

250 Requested mail action okay, completed

Your next command:

rcpt to:xyz@techbroker.com
250 Requested mail action okay, completed

Your next command:
data
354 Start main input; end with .