Wednesday, February 18, 2015
Friday, February 6, 2015
SoMe CoMmOn pc Problems AnD sOlUtIoN
Hi guys ..
Here are some common PC errors and
the solutions for them...
Do have a look ..
1. MONITOR LED IS BLINKING
Check all the connections like Monitor
Cable, Data
cables,RAM, Display Card , CPU
connections.
2. CONTINUOS THREE BEEPS
Problem in RAM Connection.
3. THREE BEEPS ( 1 Long 2 Short)
Problem in Display Card Connection
4. THREE LONG BEEPS PERIOD WISE
Problem in BIOS or RAM (Basic Input
Output System)
5. CONTINUOS NON-STOP BEEPING
Key Board Problem (I.e.; Some Key is
pressed for
Longer time)
6. FDD LED IS GLOWING CONTINUOSLY
Data cable to be connected properly
(twisted cable).
7. NO DISPLAY ON THE SCREEN AT ALL
Hard Disk cable connected wrongly.
Connect rightly
seeing the Red mark (Faces power
supply) and then
Restart.
8. POWER LED IS OFF
a. Check main power cord
b. Check S.M.P.S.
c. Check Mother Board connection
9. SHOWING CMOS ERROR
Replace 3 Volt battery of Mother Board .
Set Original
Settings Manually.(Refer CMOS Setup
chart)
Enter your search termsSubmit search form
10. SHOWING FDD ERROR OR FLOPPY
DRIVE IS NOT
WORKING PROPERLY
Check Power cord of FDD , Data Cables ,
set CMOS &
Finally the Check drive.
11. SHOWING HDD ERROR OR HARD DISK
FAILURE
a. Check Power Cord
b. Check connection of HDD
c. Check Data cable
d. Check Hard Disk parameters in CMOS or Auto
detecting Setting Partitions by Fdisk
Command, then format it to set track 0.
12. MOTHER BOARD HANGS DUE TO
UNSTABILIZED
POWER SUPPLY
a. Check S.M.P.S
b. RAM not functioning properly.
c. Software problem (due to using pirated software)
d. CPU fan not functioning properly.
13. DANCING SCREEN
a. Check Display card connection
b. Virus Problem
c. Video Memory Problem
14. SHAKING SCREEN
a. Earthing problem
b. Magnetic waves comes around.
15. CPU CABINET SHOCK
a. Check Earthing
b. Check main power cord. 16. NON-SYSTEM DISK ERROR
a. Floppy Drive having different disk
(Non-Bootable
Disk) OR CMOS Parameters for Hard Disk
may not be
set properly. b. Hard Disk Partitions may not be
created.
c. Hard Disk may not be formatted.
17. MISSING OPERATING SYSTEM
The System files missing namely Ie;
command.com} -
User File IO.SYS & MS_DOS.SYS } - Hidden
Files. These
above three files required for Start up of the system
that can be transferred by using SYS C:
Command OR
While the time of formatting by using
Format c:/u/s
18. MISSING COMMAND INTERPRETOR
May the file Command.com is corrupted
OR Infected
by Virus OR Some one has Erased it.
19. SHOWING I/O ERROR
a. The type of Hard Disk in CMOS may
not be set
properly.
b. Operating system used for formatting
is not valid
20. SHOWING DIVIDE OVER- FLOW
MESSAGE
a. May some Directories or Files crash
with other files.
b. Use CHKDSK/F or SCANDISK
Command to correct it.
21. HARD DISK MAKING NOISE WHILE
PROCESSING
a. Unstabilized power supply.
b. Check for Loose Contact.
c. Do not use Y Connectors for Hard
Disk. d. It may create Bad Sector OR Weak
Hard Disk.
22. HARD DISK HANGS WHILE
PROCESSING
Check for Bad Sector by using CHKDSK
or SCANDISK
Command. If found format the Hard
Disk and set Partition before that area.(This is the
only procedure
to use Hard Disk with Bad Sector) OR
(To avoid Bad
Sectors use Standard Power Supply)
23. HARD DISK NOT DETECTED
a. Check Power Connector
b. Check Data Cables
c. Check Jumpers
24. PARTITION NOT SHOWN
Operating System where the Hard Disk
formatted is
not supported with present Mother
Board. For Eg:
Hard Disk formatted with Pentium System will hide
their partitions for 486 System.
25. MMX/DLL FILE MISSING
May the above files may be corrupted
due to power
failure or Virus. Make available above
files from other
Computer. OR Reinstall Windows 98 Operating
System. (This procedure will not make
any effect on
existing Data).
26. WINDOWS REGISTRY ERROR
This will happen due to sudden ON/OFF
of the
system. Final solution is to Reinstall
Operating System.
27. DISPLAY COLOUR DOES NOT MATCH
a. Configure Display Card properly with
their CD.
b. The Standard setting for Windows is
set it to
800x600 for better performance.
28. UNKNOWN DEVICE FOUND
May the Driver utility is not provided
with operating
system . Insert Driver CD and install
software for the
above Device...
Here are some common PC errors and
the solutions for them...
Do have a look ..
1. MONITOR LED IS BLINKING
Check all the connections like Monitor
Cable, Data
cables,RAM, Display Card , CPU
connections.
2. CONTINUOS THREE BEEPS
Problem in RAM Connection.
3. THREE BEEPS ( 1 Long 2 Short)
Problem in Display Card Connection
4. THREE LONG BEEPS PERIOD WISE
Problem in BIOS or RAM (Basic Input
Output System)
5. CONTINUOS NON-STOP BEEPING
Key Board Problem (I.e.; Some Key is
pressed for
Longer time)
6. FDD LED IS GLOWING CONTINUOSLY
Data cable to be connected properly
(twisted cable).
7. NO DISPLAY ON THE SCREEN AT ALL
Hard Disk cable connected wrongly.
Connect rightly
seeing the Red mark (Faces power
supply) and then
Restart.
8. POWER LED IS OFF
a. Check main power cord
b. Check S.M.P.S.
c. Check Mother Board connection
9. SHOWING CMOS ERROR
Replace 3 Volt battery of Mother Board .
Set Original
Settings Manually.(Refer CMOS Setup
chart)
Enter your search termsSubmit search form
10. SHOWING FDD ERROR OR FLOPPY
DRIVE IS NOT
WORKING PROPERLY
Check Power cord of FDD , Data Cables ,
set CMOS &
Finally the Check drive.
11. SHOWING HDD ERROR OR HARD DISK
FAILURE
a. Check Power Cord
b. Check connection of HDD
c. Check Data cable
d. Check Hard Disk parameters in CMOS or Auto
detecting Setting Partitions by Fdisk
Command, then format it to set track 0.
12. MOTHER BOARD HANGS DUE TO
UNSTABILIZED
POWER SUPPLY
a. Check S.M.P.S
b. RAM not functioning properly.
c. Software problem (due to using pirated software)
d. CPU fan not functioning properly.
13. DANCING SCREEN
a. Check Display card connection
b. Virus Problem
c. Video Memory Problem
14. SHAKING SCREEN
a. Earthing problem
b. Magnetic waves comes around.
15. CPU CABINET SHOCK
a. Check Earthing
b. Check main power cord. 16. NON-SYSTEM DISK ERROR
a. Floppy Drive having different disk
(Non-Bootable
Disk) OR CMOS Parameters for Hard Disk
may not be
set properly. b. Hard Disk Partitions may not be
created.
c. Hard Disk may not be formatted.
17. MISSING OPERATING SYSTEM
The System files missing namely Ie;
command.com} -
User File IO.SYS & MS_DOS.SYS } - Hidden
Files. These
above three files required for Start up of the system
that can be transferred by using SYS C:
Command OR
While the time of formatting by using
Format c:/u/s
18. MISSING COMMAND INTERPRETOR
May the file Command.com is corrupted
OR Infected
by Virus OR Some one has Erased it.
19. SHOWING I/O ERROR
a. The type of Hard Disk in CMOS may
not be set
properly.
b. Operating system used for formatting
is not valid
20. SHOWING DIVIDE OVER- FLOW
MESSAGE
a. May some Directories or Files crash
with other files.
b. Use CHKDSK/F or SCANDISK
Command to correct it.
21. HARD DISK MAKING NOISE WHILE
PROCESSING
a. Unstabilized power supply.
b. Check for Loose Contact.
c. Do not use Y Connectors for Hard
Disk. d. It may create Bad Sector OR Weak
Hard Disk.
22. HARD DISK HANGS WHILE
PROCESSING
Check for Bad Sector by using CHKDSK
or SCANDISK
Command. If found format the Hard
Disk and set Partition before that area.(This is the
only procedure
to use Hard Disk with Bad Sector) OR
(To avoid Bad
Sectors use Standard Power Supply)
23. HARD DISK NOT DETECTED
a. Check Power Connector
b. Check Data Cables
c. Check Jumpers
24. PARTITION NOT SHOWN
Operating System where the Hard Disk
formatted is
not supported with present Mother
Board. For Eg:
Hard Disk formatted with Pentium System will hide
their partitions for 486 System.
25. MMX/DLL FILE MISSING
May the above files may be corrupted
due to power
failure or Virus. Make available above
files from other
Computer. OR Reinstall Windows 98 Operating
System. (This procedure will not make
any effect on
existing Data).
26. WINDOWS REGISTRY ERROR
This will happen due to sudden ON/OFF
of the
system. Final solution is to Reinstall
Operating System.
27. DISPLAY COLOUR DOES NOT MATCH
a. Configure Display Card properly with
their CD.
b. The Standard setting for Windows is
set it to
800x600 for better performance.
28. UNKNOWN DEVICE FOUND
May the Driver utility is not provided
with operating
system . Insert Driver CD and install
software for the
above Device...
"Ginger" Auto Spell and Grammar Checker Software
Ginger Software is an Israeli start-up company that has developed language enhancement technology that uses statistical algorithms in conjunction with natural language processing, aiming to improve written communications, develop English speaking skills and boost smartphone productivity. The company was founded towards the end of 2007 by Yael Karov and Avner Zangvil. Ginger Software differentiates itself by recognizing words in the context of complete sentences.[1] In December 2011, Ginger Software was one of nine projects approved by the Board of Governors of the Israel-U.S. Binational Industrial Research and Development Foundation for a funding of $8.1 million.[2] The company also raised $3 million from private Israeli and US investors in 2009.[3]
Use Trial Software Forever Without Expiration
Method 1:
Method 2:
How to Reinstall Trial Version Again and Again
- Uninstall the software completely.
- Go to run
- Type regedit, hit enter
- Registry editor will be opened
- Press Ctrl+F or Edit->Find
- Type the software name
- Select Look at Keys, Values, Data
- and hit Find next
- If it finds any key or data then Delete that
- Hit F3 for Next find
- Keep finding next data, keys for the software and delete all one by one
Try different name of same software and delete its all data and keys from registry.
Now try reinstalling the software and in most cases, you will be able to reinstall the software again and use the trial period again.
Tuesday, February 3, 2015
Bypass Online Surveys
Tired of those idiotic surveys you have to complete before you can get to your file or download….
No more of that
No more of that
Well here are some ways to get past those irritating, time wasting unwanted scum….
METHOD 1 : USING ONLINE SITES – SURVEYBYPASS & HOWTOBYPASSSURVEYS
surveybypass and howtobypasssurveys are two popular sites to remove or bypass surveys completely for free.They allow survey bypassing for all the major hosts like Sharecash, Fileice, Cleanfiles, Cash-file, Adwork media, File fire, File flare, Dengee and Uploadables.
surveybypass and howtobypasssurveys are two popular sites to remove or bypass surveys completely for free.They allow survey bypassing for all the major hosts like Sharecash, Fileice, Cleanfiles, Cash-file, Adwork media, File fire, File flare, Dengee and Uploadables.
Using surveybypass Site:
You just need to go to surveybypass.com official website and there just paste the URL of the the page where you are getting the survey form and then just click on GO Button. It will now provide you with direct download link of the file which you want to download without asking for survey anymore.
You just need to go to surveybypass.com official website and there just paste the URL of the the page where you are getting the survey form and then just click on GO Button. It will now provide you with direct download link of the file which you want to download without asking for survey anymore.
Using howtobypasssurveys:
Unlike surveybypass site here in howtobypasssurveys.org you need to manually download the survey bypasser tool on your PC which is just of 1MB. Here in the ENTER LINK box just paste the URL of the the page where you are getting the survey form. Then select your File Host and select the Directory where you want to save the downloaded file. Click on the Download Button.
Unlike surveybypass site here in howtobypasssurveys.org you need to manually download the survey bypasser tool on your PC which is just of 1MB. Here in the ENTER LINK box just paste the URL of the the page where you are getting the survey form. Then select your File Host and select the Directory where you want to save the downloaded file. Click on the Download Button.
METHOD – 2 : USING SURVEY KILLER APP
Survey Killer is a free utility tool that lets you download or access the required content without filling up the surveys.You just need to put the URL in the Link Box and then Click on the Download File Button.That’s all and your file will be downloaded shortly.
PS: It works only on sharecash links….
Click Here Survey Killer App to Bypass Surveys Online Download
PS: It works only on sharecash links….
Click Here Survey Killer App to Bypass Surveys Online Download
METHOD – 3 : USING BROWSER EXTENSION
You can also use Survey bypass extensions on Your Web browsers i.e Google chrome or Mozilla Firefox.Here I am Providing you Bypass Surveys Extension for Google Chrome which gives you the Option to Block Surveys automatically whenever they are detected.It has been tested on several survey links and works fine but still there are cases when it fails in bypassing the Survey.
Only For Chrome – Install Bypass Surveys Extension
click here to Download
You can also use Survey bypass extensions on Your Web browsers i.e Google chrome or Mozilla Firefox.Here I am Providing you Bypass Surveys Extension for Google Chrome which gives you the Option to Block Surveys automatically whenever they are detected.It has been tested on several survey links and works fine but still there are cases when it fails in bypassing the Survey.
Only For Chrome – Install Bypass Surveys Extension
click here to Download
Well folks try out these methods….they’ll surely help you to get past those dumb surveys….Njoy
Here’s a tutorial on cracking ZIP files:http://adf.ly/y9w1n
how to Crack ZIP Password Files
What is FZC?
FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you’re gonna need a password to open the zip file and extract files out of it).
FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you’re gonna need a password to open the zip file and extract files out of it).
FZC uses multiple methods of cracking – bruteforce (guessing passwords systematically until the program gets it) or wordlist attacks (otherwise known as dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a “wordlist”, which is a text file that contains possible passwords. ( You can get lots of wordlists at www.theargon.com.)
FZC can be used in order to achieve two different goals: you can either use it to recover a lost zip password which you used to remember but somehow forgot, or to crack zip passwords which you’re not supposed to have. So like every tool, this one can be used for good and for evil.
The first thing I want to say is that reading this tutorial… is the easy way to learn how to use this program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all. You are also going to see the phrase “check name.txt” often in this text. These files should be in FZC’s directory. They contain more information about FZC.
FZC is a good password recovery tool, because it’s very fast and also support resuming so you don’t have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a character, which can be anything – a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn’t really matter, because in order to bruteforce a password with 32 chars you’ll need to be at least immortal..heehhe.. to see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information.
FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don’t require you to have anything, wordlist attacks require you to have wordlists, which you can get from www.theargon.com. There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist is, the more chances you have to crack the password.
Now that you have a good wordlist, just get FZC working on the locked zip file, grab a drink, lie down and wait… and wait… and wait…and have good thoughts like “In wordlist mode I’m gonna get the password in minutes” or something like this… you start doing all this and remember “Hey this guy started with all this bullshit and didn’t say how I can start a wordlist attack!…” So please wait just a little more, read this tutorial ’till the end and you can do all this “bullshit”.
FZC can be used in order to achieve two different goals: you can either use it to recover a lost zip password which you used to remember but somehow forgot, or to crack zip passwords which you’re not supposed to have. So like every tool, this one can be used for good and for evil.
The first thing I want to say is that reading this tutorial… is the easy way to learn how to use this program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all. You are also going to see the phrase “check name.txt” often in this text. These files should be in FZC’s directory. They contain more information about FZC.
FZC is a good password recovery tool, because it’s very fast and also support resuming so you don’t have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a character, which can be anything – a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn’t really matter, because in order to bruteforce a password with 32 chars you’ll need to be at least immortal..heehhe.. to see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information.
FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don’t require you to have anything, wordlist attacks require you to have wordlists, which you can get from www.theargon.com. There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist is, the more chances you have to crack the password.
Now that you have a good wordlist, just get FZC working on the locked zip file, grab a drink, lie down and wait… and wait… and wait…and have good thoughts like “In wordlist mode I’m gonna get the password in minutes” or something like this… you start doing all this and remember “Hey this guy started with all this bullshit and didn’t say how I can start a wordlist attack!…” So please wait just a little more, read this tutorial ’till the end and you can do all this “bullshit”.
We need to keep in mind that are some people might choose some really weird passwords (for example: ‘e8t7@$^%*gfh), which are harder to crack and are certainly impossible to crack (unless you have some weird wordlist). If you have a bad luck and you got such a file, having a 200MB list won’t help you anymore. Instead, you’ll have to use a different type of attack. If you are a person that gives up at the first sign of failure, stop being like that or you won’t get anywhere. What you need to do in such a situation is to put aside your sweet xxx MB’s list and start using the Brute Force attack.
If you have some sort of a really fast and new computer and you’re afraid that you won’t be able to use your computer’s power to the fullest because the zip cracker doesn’t support this kind of technology, it’s your lucky day! FZC has multiple settings for all sorts of hardware, and will automatically select the best method.
If you have some sort of a really fast and new computer and you’re afraid that you won’t be able to use your computer’s power to the fullest because the zip cracker doesn’t support this kind of technology, it’s your lucky day! FZC has multiple settings for all sorts of hardware, and will automatically select the best method.
Now that we’ve gone through all the theoretical stuff, let’s get to the actual commands.
Bruteforce
The command line you’ll need to use for using brute force is:
fzc -mb -nzFile.zip -lChr Lenght -cType of chars
Now if you read the bforce.txt that comes with fzc you’ll find the description of how works Chr Lenght and the Type of chars, but hey, I’m gonna explain this too. Why not, right?… (but remember look at the bforce.txt too)
fzc -mb -nzFile.zip -lChr Lenght -cType of chars
Now if you read the bforce.txt that comes with fzc you’ll find the description of how works Chr Lenght and the Type of chars, but hey, I’m gonna explain this too. Why not, right?… (but remember look at the bforce.txt too)
For Chr Lenght you can use 4 kind of switches…
- You can use range -> 4-6 :it would brute force from 4 Chr passwors to 6 chr passwords
- You can use just one lenght -> 5 :it would just brute force using passwords with 5 chars
- You can use also the all number -> 0 :it would start brute forcing from passwords with lenght 0 to lenght 32, even if you are crazy i don’t think that you would do this…. if you are thinking in doing this get a live…
- You can use the + sign with a number -> 3+ :in this case it would brute force from passwords with lenght 3 to passwords with 32 chars of lenght, almost like the last option…
For the Type of chars we have 5 switches they are:
- a for using lowercase letters
- A for using uppercase letters
- ! for using simbols (check the Bforce.txt if you want to see what simbols)
- s for using space
- 1 for using numbers
Example:
If you want to find a password with lowercase and numbers by brute force you would just do something like:
If you want to find a password with lowercase and numbers by brute force you would just do something like:
fzc -mb -nzTest.zip -l4-7 -ca1
This would try all combinations from passwords with 4 chars of lenght till 7 chars, but just using numbers and lowercase.
HINT
You should never start the first brute force attack to a file using all the chars switches, first just try lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because you can get lucky and find the password much faster, if this doesn’t work just prepare your brain and start with a brute force that would take a lot of time. With a combination like lowercase, uppercase, special chars and numbers.
You should never start the first brute force attack to a file using all the chars switches, first just try lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because you can get lucky and find the password much faster, if this doesn’t work just prepare your brain and start with a brute force that would take a lot of time. With a combination like lowercase, uppercase, special chars and numbers.
Wordlist
Like I said in the bottom and like you should be thinking now, the wordlist is the most powerful mode in this program. Using this mode, you can choose between 3 modes, where each one do some changes to the text that is in the wordlist, I’m not going to say what each mode does to the words, for knowing that just check the file wlist.txt, the only thing I’m going to tell you is that the best mode to get passwords is mode 3, but it takes longer time too.
To start a wordlist attack you’ll do something like.
To start a wordlist attack you’ll do something like.
fzc -mwMode number -nzFile.zip -nwWordlist
Where:
Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode.
File.zip is the filename and Wordlist is the name of the wordlist that you want to use. Remember that if the file or the wordlist isn’t in the same directory of FZC you’ll need to give the all path.
You can add other switches to that line like -fLine where you define in which line will FZC start reading, and the -lChar Length where it will just be read the words in that char length, the switche works like in bruteforce mode.
So if you something like
So if you something like
fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+
FZC would just start reading at line 50 and would just read with length >= to 9.
Example:
If you want to crack a file called myfile.zip using the “theargonlistserver1.txt” wordlist, selecting mode 3, and you wanted FZC to start reading at line 50 you would do:
fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50
Resuming
Other good feature in FZC is that FZC supports resuming. If you need to shutdown your computer and FZC is running you just need to press the ESC key, and fzc will stop. Now if you are using a brute force attack the current status will be saved in a file called resume.fzc but if you are using a wordlist it will say to you in what line it ended (you can find the line in the file fzc.log too).
To resume the bruteforce attack you just need to do:
To resume the bruteforce attack you just need to do:
fzc -mrAnd the bruteforce attack will start from the place where it stopped when you pressed the ESC key.
But if you want to resume a wordlist attack you’ll need to start a new wordlist attack, saying where it’s gonna start. So if you ended the attack to the file.zip in line 100 using wordlist.txt in mode 3 to resume you’ll type
fzc -mw3 -nzfile.zip -nwwordlist.txt -f100
Doing this FZC would start in line 100, since the others 99 lines where already checked in an earlier FZC session.
Well, it looks like I covered most of what you need to know. I certainly hope it helped you… don’t forget to read the files that come with the program