Saturday, April 30, 2011

Increase Your uTorrent Download Speed By 80%[With Pics]

Increase Your uTorrent Download Speed By 80%[With Pics]

    Increase your Utorrent speed by 80%

Lets get started. If you dont have Utorrent, Download it from here Remember to increase torrent speed please disable firewall before you use it. Now Open it up and follow these screenshots tutorial:
[Image: utorrent1.jpg]
[Image: utorrent2.jpg]
[Image: utorrent3.jpg]
For connection setting I Here checked enable upnp port mapping, enable NAT-PMP port mapping and i use 45682 for random port.
[Image: utorrent4.jpg]
Checked use additional upload slots if upload speed <90% and follow the value setting like screenshot.

[Image: utorrent5.jpg]

Checked for enable dht network, enable dht for new torrent, enable local peer discovery, ask tracker for scrape information, enable peer change, allow incoming legacy connections and enable outgoing protocol encryption.

[Image: utorrent6.jpg]

[Image: utorrent7.jpg]
Setup net.max_halfopen to 90
[Image: utorrent8.jpg]
[Image: utorrent9.jpg]
That is it, You have just tweaked the speed of Utorrent by 80%
Remember, If the torrent has no seeds, This will not work!
Any Suggestions and replies would be appreciated 
Friday, April 29, 2011

How to Hide your identity online [Extremely DETAILED]

Hello everyone, it's been a few months since I posted a tutorial and I thought it'd be a good time now before the year ends since I do this for a living and I'm annoyed hearing it from the TV news exaggerating on the matter without being very detailed, and instead confuse their viewers even more since they are too misinformed themselves as well.
I will not guarantee 100% assurance that if you follow my tips, you will be entirely untraceable, but your percentage will increase dramatically.
I will be covering:
1) History - Hackers
2) Website owners
3) Your name
4) Your e-mail
5) What you sign up to
6) Information you expose unknowingly
7) Keeping you safe
You hear it on the news, you read it on the newspaper, you live with it everywhere without even acknowledging its existence.
"Hackers have stolen identities" I have heard that line so many times this year, it is ridiculous.
Companies promising to "defend" your identity, memberships giving their words to keep your information to themselves only, the government reassuring that they will only have access.
All this is a lie as information ALWAYS gets leaked or there is an inside worker providing information out into the black market.
Not only that, but securities on big companies are always exposed and hackers always find their way in.
1) History - Hackers
I will explain briefly on the type of hackers that there are out there for the sake of academical knowledge. These descriptions are not in dept, instead they are meant to slightly touch the subject and educate those are who are unaware of these titles on the cyber world.
1) Black Hat Hackers - These are the most infamous hackers there are. These are the guys you hear about it on the news due to committing crimes. These people are whose purpose is to gain information and use for their own need. They could be anyone.
-Black Hats tend to be professionals at what they do and are extremely well informed on everything related with the cyber world and crimes.
-Black Hats tend to be educated people who have worked many years to accumulate all the knowledge they hold. They are not your kid who uses "hacking tools" to scare their gaming buddies online.
-Black Hats is the image typically portrayed on movies.
2) White Hat Hackers - These are the lesser known hackers simply because they do the clean up work that goes behind the scenes cleaning up the messes from Black Hat Hackers.

Saturday, April 23, 2011

How to Crack Any Software/Applications into Full-version or Make Registered For Free..

Hey Guys If you have any software but UNREGISTERED  or a TRAIL-VERSION , no problem, register is within minutes...

Wednesday, April 20, 2011

How to Dual Boot Mac OS X and Windows 7 – A Complete Walkthrough


This is a complete walkthrough in general on how you can install Mac OS X (Leopard) onto your desktop or laptop along with Windows 7. I know we are a Windows 7 topic specific blog, but lately there are an increasing interest in people who want to have their PC to run both Windows 7 and Mac OS X simultaneously. So let me share some of my 2-year of experience of building and installing hackintosh (warning: if you are not computer savvy user you may not want to try this :) )

Snow Leopard Dual Boot Windows 7Here are some of the prerequisite:
Tuesday, April 19, 2011

How to Flash a cell phone...& FLASH YOUR DEAD NOKIA CELL PHONE(EXCLUSIVE)....

What is Cell Phone Flashing ?
If you are like most people today you have a cell phone and like most of us you don't stick with the same carrier forever. When you change carriers you need a phone that will work on their network so you have two choices, buy a phone through your new carrier and get locked into a one or two year contract or use your current phone on their network. For most people the cheapest and best solution is to use your current phone. Thus phone Flashing. Flashing is the process of loading Carrier specific files to handsets from other carriers in order to connect the phone to the new carrier.

Saturday, April 16, 2011

Windows Tiny(for NetBooks & Low Config. Pc) Activated CD (x86) ISO COPY..

This guide is split into the following
sections: But I listed only the main ones..

- RIGHT-CLICK "Computer"
- REMOVED COMPONENTS (in 3 stages)
- Special note from eXPerience
- Forum url


Best Portable Easy Recovery Professional Software ...


EasyRecovery� Professional data recovery software is the complete solution for your data recovery, file repair and disk diagnostic needs. EasyRecovery Professional incorporates all the features and benefits of EasyRecovery� DataRecovery, EasyRecovery EmailRepair� and EasyRecovery FileRepair� into one simple product, plus adds superior disk diagnostics including Data Advisor� and advanced data recovery capabilities and options.

EasyRecovery Professional can recover all file types, plus it has added viewing capabilities to allow you to preview recovered files. For the most severe recovery situations, EasyRecovery Professional contains added raw recovery support for over 290 specific file types including document files, MIDI music files, voice files, digital media files, and more! Plus, you can utilize the Emergency Boot Media to recover data from systems that cannot boot to Windows. If, however, your hard drive or system is damaged or failing, or you would prefer that a professional service performs the recovery because of time constraints or the critical nature of the data.

# The most advanced data recovery, file repair, and disk diagnostic capabilities available.
# EasyRecovery� Professional includes: All the features and benefits of EasyRecovery� DataRecovery and the added repair capabilities of EasyRecovery FileRepair� and EasyRecovery EmailRepair�.
# Superior disk diagnostic tools including Ontrack Data Advisor�.
# Improved file type searching capabilities.
# EasyRecovery Professional recovers all file types, plus includes added raw recovery capabilities for over 290 specific file types including document files, MIDI music files, voice files, digital media files, and more!
# Added viewing capabilities support providing a view identical to the display of the file in its native application.


How to Install Any 3rd party Appications on Nokia Symbian^3 & S60 3rd, 5th ...

Many people face problem while Installing Anonymous 3rd party Applications,,  who are getting certificate errors during installation of Applications / Games and Themes on Symbian S60 3rd, 5th and Symbian^3. Follow these simple and detailed steps to get rid of certificate errors for ever. You have to get your Certificate and key file against your smart phone's IMEI number (*#06#) and sign your sis/sisx files with that certificate and key file. First you need to learn how to apply for your OPDA certificate and key file then you can use POT SIGN TOOL to sign sis/sisx files.
Hear is the easiest way in Detailed Tutorial
Step 1:- Point your browser towards:
It will open the website as shown below:

Thursday, April 14, 2011

Microsoft launches IE10 platform preview


Microsoft launches IE10 platform preview
, April 13, 2011,
Barely a month after the launch of IE9, Microsoft has announced
the IE 10 platform preview, which is a developer build of the browser.
 Microsoft launched the browser at their developer event Mix 11 in Las Vegas.
With competition from Mozilla's Firefox and Google's Chrome,
 Microsoft is certainly picking up the pace in releasing new browser versions.

IE9 platform preview was launched about a year after IE8 and it took
12 more months for IE9 to make it to the final launch. Microsoft has cut
 down the launch cycle already by 11 months.

Dean Hachamovitch, Corporate Vice President, Microsoft Internet Explorer
 wrote in a blog post, "We built IE9 from the ground up for HTML5 and for
 Windows to deliver the most native HTML5 experience and
the best Web experience on Windows. IE10 continues on IE9's path,
 directly using what Windows provides and avoiding abstractions, layers,
 and libraries that slow down your site and your experience."

  1. internetexplorerfeatured
The new browser promises to embrace HTML5 even more and adds support to emerging standards like CSS3.

Mr. Hachamovich added, "We also demonstrated additional standards support (like CSS3 Transitions (link) andCSS3 3D Transforms (link)) that will be available in subsequent platform previews of IE10, which we will update every 8-12 weeks."

You can also download the IE10 platform preview here.
Wednesday, April 13, 2011

Full version Application for Nokia N8,C7....Etc

1.Microsoft Office

The Picsel Smart Office™ experience is consistent across all operating systems. Thus, the following feature set is consistent across all implementations.

View and Edit Microsoft® Word, Excel and PowerPoint documents
View Adobe PDF documents and Images
Fun, Drag & Drop Touch-based UI
Fast and Unrestricted Zooming and Panning
Rich page layout with styling, colours, pictures and charts
Live update of Excel charts and formulae
Edit text, font, colours, styling and layout
Save in original format for export to other devices
Undo / Redo
Select and move text and images in MS Word documents
Visual Scrapbook for Copy and Paste, for text and images
3D stereoscopic view of normal documents
Create new documents
International language support


Supported Document formats
Microsoft Word 97, 2000, 2003, XP, 2007: .doc .docx
Microsoft Excel 97, 2000, 2003, XP, 2007: .xls .xlsx
Microsoft PowerPoint 97, 2000, 2003, XP, 2007: .ppt .pptx
Adobe Acrobat PDF 1.0 to 1.7: .pdf *
Images: .jpg (.jpeg) .png .bmp .wmf .emf .gif

2- Kaspersky Mobile Security 9.0.19 Patched 2010


he product provides the following options:
» Scanning of the file system for viruses and other types of malware on » Demand or according to a preset schedule;
» antiviral scanning of files on access;
» quarantining of infected files and the remedying of some of them;
» updating of databases on demand or according to a preset schedule via GPRS-Internet, Wi-Fi, EDGE or ActiveSync (for the Windows Mobile version);
» Blocking f unwanted SMS’s and calls;
» Blocking of the user’s data if the device is lost or stolen;
» Deletion of the user’s data if the device is lost or stolen;
» Protection of the device against TCP/IP protocol network attacks;
» Creation of folders in which to store encrypted files;
» allows the location of the phone to be remotely identified (if the device is equipped with a GPS receiver);
» Blocking of outgoing calls and SMS’s to specific numbers;
» allows the temporary concealment/restoration of personal information.

The easy-to-use intuitive interface helps the user to manage the product.
The product is installed in the main memory of the mobile device only.

Product components:
Kaspersky Mobile Security 9.0 includes the following components:
» Anti-Virus
» Anti-Spam
» Anti-Theft
» Firewall
» Encryption
» Parental control
» Privacy Protection
System requirements:
The product is aimed at mobile devices which support the sending and receiving of SMS’s and operate under the following Operating Systems:
» Symbian OS 9.1, 9.2, 9.3, 9.4 Series 60 (Nokia smartphones only).
The product has been tested on the following mobile devices:
» Nokia: E61, 5500, N95, 3250, E50, E60, N71, N80, E71, N96, N78, 6220, 6110, 5800, n82, n97, e90, n76б 5530, 5730
» HTC: 710S, S620, Touch Diamond, Touch Pro2
» HP: iPaq 514, S100, HW 6915
» Eten: m600, x800
» Toshiba: G900
» ASUS P750
» Samsung SGH i200, i900
» Glofish DX900


Symbian OS 9.1/9.2/9.3 (3250, 5320, 5500, 5630, 5700, 5730, 6110, 6120, 6121, 6124, 6210, 6220, 6650, 6710, 6720, E50,
E51, E55, E60, E61, E61i, E62, E63, E65, E66, E70, E71, E75, E90, N71, N73, N75, N76, N77, N78, N79, N80, N81, N82, N85, N86, N91,
N91, N92, N93, N93, N95, N96. Samsung - i550, i560, i7110, i8510 Etc.

Size: 1.40 MB

How To Install

1. Unpack
2. Install Kaspersky Mobile Security into your phone (KMS_v9.0.49.sisx)
3. Open full access to drive C:/ You can do this by app HelloOX, HelloCаrbide, ROMPаtcher (Open4Аll.rmp) etc.
4. Install Kaspersky v9 Patcher (KMS_v9_Pаtch.sis). When install will complete, you'll can patch your license by opened app (will open automaticly)
Done. Now you have a patched license until Y2049
P.S. Patcher signed by BiNPDA root cert

More Full version Apps on the go...
Friday, April 8, 2011

WINDOWS 8 with Installation Instruction & Download Link....

WINDOWS 8 Touch the Future....
Below are the Screenshots & Installation Instructions with Download  LINK.... 



What is Windows 8 xTreme ™? Windows 8 xTreme ™ its a System based on
Windows 7 Final- Windows 8 xTreme ™ doesn't have any components removed from
Original Windows 7 Image so you wont lose any compatibly with software hardware or
miss any stuff at all.

- Windows 8 xTreme ™ its a Clean Windows 7 Image with a compilation of the best
tweaks and a new integrated look ... keeping all new features like superbar, etc ...
- Windows 8 xTreme ™ has been tested in a real machine with a compilation of over
200 softwares ...
- All default applications are silently installed before StartUp ...

* UAC Disabled
* Take Ownership
* Show File Extensions
* Automatic Defragmentation with Diskeeper
* New Cmd File to Right Click
* Enabled Search System Folders in Search
* ClearType
* Windows Will Tell You Exactly What it is Doing When it is Shutting Down or is Booting
* Increase Network Throughput
* ... many tweaks for IE8
* ... many more tweaks for W7 ...

* New Windows 7 Themes
* New Start Button
* New Cursor 3D
* New Hd Wallpapers
* New Hd System Icons Integrated In System
* New User *** Pics
* New Windows Scheme Sounds
* New Logon Screen
* ... and more

Extra Toos Integrated In System:

* Cursor Fx + Cursor 3D (separate optional)


Is this new version released by Microsoft?

NO, This isn't any new version released by Microsoft, It's based on Final version of
windows 7 Ultimate

Why is it called windows 8 extreme?

Cause, its based on the new upcoming version by microsoft, basically the themes etc looks like the upcoming version, or that's what its told!

I have downloaded the files, what am i supposed to do?

Using nero, burn the iso file in a dvd, at the lowest speed.

Change your Bios Setting, make the boot device priority of DVD as first.

When it asks for boot from Cd...

Press enter.

IMPORTANT: When will request serial/cdkey leave empty and press next

Uploader Note: Not tested by me but from our torrent providers and some goo gle
search looks to be a clean-working x86/x64 windows 7 tweaked so by a special
request of an torrent user i've decided to upload it,for the rest downloaders search
more informations about this and take it or leave it
Tuesday, April 5, 2011

Apple Confirms MACBOOK Nano..


A few weeks ago LG leak that Apple had asked them to start the making of OLED Screen because they developed a technology that prevents smudges and stains on an OLED screen. Today it has came to our understanding that those screen may be for the rumored Apple Touchscreen MacBook Nano.

It is said that Apple has already made a prototype of this netbook. There is no word if it will look exactly like the photo above.
Monday, April 4, 2011

How to Run ANDROID 3.0 OS on PC, Laptop,,


The folks at How-to-geek have managed to run Android OS on PC! Would you also like to try out the Google’s Android OS on your netbook or desktop? Here’s how you can run Android from a flash drive!
1. Download Android from here or Download Android 3.0 Honey Comb Download .

the Android SDK (either ZIP or EXE) on Windows PC. You can choose to download for Mac or Linux as well. If you are already having the previous SDK installed on your computer and skip this step.
- Installation of packages – Whether you have just downloaded SDK or have the previous one, now you need to install the available packages which includes Android 3.0 API and other updates related to that and other versions. To do that, go into the “Tools” folder in the downloaded SDK Unzipped folder and click on “android” application. A window will open where you need to select the option “Installed Packages” from the left menu.

Very Important Issue....Check This out....

"Agd_Scorp"(Turkish Hacker) arrested by Cyber cops in turky...
he is best friend of our past enemies.

He hacked
many more...
checkout his list

Use your knowledge for goodthings...Dont make crime...
Be ethical hacker...
never make any crime...

Remember again...
This community is not for spreading illegal activities.Its for spreading "acceptable" knowledge...

Hack to learn...Dont learn to hack....

Again...Never do illegal stuff in forum or outside the forum....

Its not a big issue to track u,in todays technology...(even u use proxies)
Dont cross limits else u will busted for sure.....

What to Do When Your Email Account is Hacked?How to Recover Hacked Email Account

How to Recover Hacked Email Accounts?

It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.

For Gmail:

It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.

Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
Gmail Password Reset Link

If you cannot find success from the Step-1 then proceed to Step-2.

Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like

1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…

You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link
Account Recovery Form

For Yahoo and Hotmail:

Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option.

To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.

I hope this post will help you recover the lost account. I highly recommend that you also read my post on How to protect your email account from being hacked and Tips to find unauthorized activity on your Gmail account so that you always stay protected

For more information on recovering your email address kindly visit -

Saturday, April 2, 2011

Adobe Photoshop For IPAD 2 & IPHONE


Adobe Photoshop Express 1.5 for iPhone and iPad released.


Adobe has pushed out a new version of Photoshop Express for iOS, v1.5, which promises support for the iPhone 4′s Retina Display, multitasking in iOS 4.2, and in-app photo taking using the iPhone and iPod touch’s camera. The free download [iTunes link] comes in iPhone and iPad versions, and supports basic editing – including crop, straighten, rotate and flip – together with effects and filters.
Thanks to the multitasking support it’s now possible to queue uploads to and Facebook while using the iOS device for something else. Effects include Vibrant, Pop, Border, Vignette Blur, Warm Vintage, Rainbow, White Glow, and Soft Black and White, while there are optional Rectangle, Rounded, Oval, Soft Edge, Vignette, Rough Edge, Halftone, and Film Emulsion borders.

While all these apps work very well they have limited functionality, as heavy-duty image editors require lots of processing power. Hopefully, Adobe will combine all the features available in separate apps. The new found processing power of tablets can only help in making this possible.


iHack: Google Algorithm Exposed...


Google Algorithm Exposed...


Google Algorithm Exposed : SearchToons

The Google Algorithmic manner of ranking and serving relevant online and indexed documents to specific Google queries has been a mystery to many over the past decade, with search marketers and mathematicians working to expose the way Google ranks sites.

Here we look at two disciplines of figuring out the workings behind Google, and two concise calculations.