Saturday, August 11, 2012

For the gamers!

1. Due to the graphical limitations of arcade hardware at the time, Miyamoto clothed the character in red overalls and a blue shirt to contrast against each other and the background. A cap was added to let Miyamoto avoid drawing the character's hairstyle, forehead, and eyebrows, as well as to circumvent the issue of animating his hair as he jumped. To make him appear human onscreen despite his small size, he was given distinct features, prominently a large nose and a mustache, which avoided the need to draw a mouth and facial expressions on the small onscreen character. Who are we talking about? (easy one!)

2.This variety of games dates back to the arcade game Blockade, developed and published by Gremlin in 1976. The first known personal computer version , titled Worm, was programmed in 1978 by Peter Trefonas of the US on the TRS-80 computer, and published by CLOADmagazine in the same year. This was followed shortly afterwards with versions from the same author for the Commodore PET and Apple II computers. What is this variety of popular game?

3. 'Genetic Lifeform and Disk Operating System' better known as?


Recognise.
4.


5. Xs are powerful and extremely versatile combat armor originally proposed in the intention of enabling humans to operate in previously hostile environments which would otherwise be substantially lethal. This is permitted through the X's ability to adapt and absorb energy in a myriad of forms ranging from heat, solar, radiation, static, kinetic, and even carbon. In addition, the X's Artificial muscle fibers can be programmed for a variety of purposes (Such as hardening to absorb more damage, muscle augmentation, or invisibility), leading to drastically enhanced combat and physical performance, allowing the operator to execute super-human feats. identify X.

Ans in the comment pls...

Friday, August 10, 2012

The Brands Quiz!

1. In 1982, forty-something programmers John Warnock and Charles Geschke quit their work at Xerox to start a software company. They named it X, after a creek that ran behind Warnock's home. Their first focus was to create PostScript, a programming language used in desktop publishing .They asked family and friends to help out: Geschke's 80-year-old father stained lumber for shelving, and Warnock's wife Marva designed X's first logo. Identify X.

2.Rumor has it that the bite  was a nod to Alan Turing, the father of modern computer science who committed suicide by eating a cyanide-laced apple. Janoff, however, said in an interview that though he was mindful of the "byte/bite" pun. What are we talking about?


3. 

   Significance of this image?

4. In 1865, Knut Fredrik Idestam established a wood-pulp mill in Tampere, south-western Finland. It took on the name X after moving the mill to the banks of the Nokianvirta river in the town of X. The word "X" in Finnish, by the way, means a dark, furry animal we now call the Pine Marten weasel.  What is X?




5. Identify the Company from its old logo...


Answer in the comments pls....

Tuesday, August 7, 2012

In X,  two armed military commandos named Bill "Mad Dog" Rizer and Lance "Scorpion" Bean, who are sent on a mission to neutralize a terrorist group called the Red Falcon Organization that is planning to take over the Earth. What is X?

These two companies joined together to form a very famous company today known as __________.

Monday, April 23, 2012

3 cool computer pranks!


Today , I will show you 3 great computer pranks make over 1,000 folders in few second ,microsoft word prank and cool windows prank that will frustrate your “friends” very much.

1)Make over 1,000 folders in few seconds

Here I will teach you simple prank that will make an unlimmited amount of folders in any place you want.



Step 1

Open notepad and type :

@echo off
:top
md %random%
goto top

@echo off makes it so that it appears to be a blank screen but actually its making hundreds of folder.
md %random% is command that creating folders with random names.
goto top – return to label :top , infinite loop

Use Date Cracker to bypass trial periods!

 Data Cracker 2000 is an application which can easily remove the date protection(i.e. trail protection) from many software. It is very useful for shareware or trial versions of software which expire after a specific date. When you crack the software with Date Cracker 2000, the software will always show something like “There are 90 days remaining in your trial period” and the software will actually last forever :). Some programs have good protection and it isn’t possible to remove their date protection . Date Cracker->



How to use Date Cracker? It is very simple.Just follow these instructions:

1. Download Date Cracker from this link and install it

2. When you open Date cracker you will see on the right side Add button , click it

3. NOw a window will appear where you must type the Program Description ( for example Folder Lock 6), as shown below



4. In Simulated Run Date type the expiration date, like 25. 11.  2009 ;


5. On the bottom of Date Cracker window , you will see … , click it , and choose executable files as shown below


6. Click Run , that is it !

Sunday, April 22, 2012

How to get logs of premium accounts you want

There are many sites where you need to login or wait for a long time if you dont have a premium account. These are very irritating. To bypass such cases here is a trick you can use! Tricks like these using google are known as google dorks.

First, go to google.com.

Then, type copy the following code and hit enter. Here I want password of mega upload you can replace it with any other site-

Program:     Url/Host:http://www.megaupload.com     Login:        Password:  Computer:     Date:      Ip: 


And thats it. You will get login names and password of your required site! 

Saturday, April 21, 2012

Top 10 torrent sites!

Last year I posted the best p2p software clients and here again I've listed the world's most popular BitTorrent sites. At the start of 2012 The Pirate Bay continues to pull in the most visitors, followed by Torrentz and KickassTorrents.

This list is based on traffic rank and reports from Compete and Alexa, though we are all aware that Alexa isn't perfect and that Compete has plenty of flaws, but putting the two services to use at the same time on similar niche proved worthwhile.

So here we are, a compiled list of the 10 most-visited torrent sites at the start of the new year.

1. The Pirate Bay

The Pirate Bay (commonly abbreviated TPB) is a Swedish website that hosts magnet links, which allow users to share electronic files, including music, computer games and software, via BitTorrent. The Pirate Bay bills itself as "The world's most resilient BitTorrent site" (as of 2012, "The galaxy's most resilient...") The Pirate Bay is currently ranked as the 78th most visited website in the world and 20th in Sweden by Alexa Internet, has over 5.5 million registered users and, as of February 2012, hosts more than 4 million torrent files. According to the Los Angeles Times, The Pirate Bay is "one of the world's largest facilitators of illegal downloading" and "the most visible member of a burgeoning international anti-copyright or pro-piracy movement".

2. Torrentz

Torrentz is a Finland-based[2] meta-search engine for BitTorrent that is run by an individual known as Flippy. It indexes torrents from various major torrent sites such as yourBittorrent and offers compilations of various trackers per torrent that are not necessarily present in the default .torrent file, so that when a tracker is down, other trackers can do the work. It was the second most popular torrent website after The Pirate Bay in 2010[3], and it currently has a traffic rank of 145 on Alexa.

Speed your browser by changing DNS

Most people use the default DNS settings provided by their ISP, and while they are usually sufficient for most purposes, there are plenty of free options out there, like OpenDNS and Google DNS. Namebench is a free app that checks to see whether your current settings are optimized and, if not, which free option is best for you. Here's how to use it: 

Download and install Namebench.

Fire it up and choose your settings. Keep the top two boxes checked. If you're concerned about network censorship, check the third box, and if you want to help the developers, check the last box. You can tweak the rest if you're outside U.S. or want to experiment with different browsers. 

NameBench Dns

24 awesome Facebook tricks and hacks!

1. Hide Your Online Status From Selected Friends:

So you want to use Facebook chat but don’t want some people to see your online status? Simply open up the Facebook Chat and click on Friends List. Start creating a new list calledBlockList.

Once the list is created, add those friends to the list that you want to appear offline to. When the list is complete, hover your mouse to the little green icon adjacent to the list and click Go Offline. Bingo! You will now appear offline to everybody in the BlockList.

2. View a Friend’s Profile Without Messy Applications:

If you are like me, you often get annoyed by the dozens of silly applications that people have added to their profile. Here’s a Grease Monkey script that allows you to view any profile without all those applications. Remember: the Mozilla Firefox web browser is a prerequisite for running Greasemonkey.

3. Display Your Facebook Status On Your WordPress Blog:

Want to display your Facebook status updates on your WordPress blog? There is a plugin that does exactly that. StatusPress lets you display your status updates to a widget on your WordPress blog.

4. Access Facebook Chat Through Your Desktop:

Tips to protect Facebook account from hackers


Facebook, the social networking or we can say our virtual world. Most of the people live more in this virtual world than their real world. We share our photos, moods and thoughts with our friends. But with the increase in use of Facebook, Hackers are also very active and they always try to hack innocent people's facebook account.




Many people do not care about this. According to them, "There is no loss to me if my facebook account is hacked." But they easily forget that they also have some of their private information. And if there is no private information, the account represents you. These are the people who never care about their account security and then request me to help in getting back their facebook account because some one is using it and doing abusive things. 




Why should you always try to protect your account: Facebook is your online identity. If you account is hacked, you will have to face following problems:
1. Now someone else is living your life in Facebook. All the abusive and criminals activities done by hacker will represent you.
2. He will ruin your reputation.
3. Your private photos can be misused in porn industry.
4. Your personal data wil be sold to the internet marketing firms
5. If you are a girl, then i do not think i have to explain the problem.

How to choose a secure password!




Seeing many cases where my friend's passwords were compromised i have written this article! Password is the only thing which keeps your data secure in this virtual digital world. So it is necessary to choose a smart password which is hard to guess and hard to crack. We should always take care while choosing passwords and select the one which is private and hard to crack.

Before writing some tips to create a strong password, i want to give an advice to all readers not to use same password on every website. I saw many people who use same password on all other websites. You're likely to have dozens of accounts across the web, and you can't guarantee the security of all of those accounts. Many smaller companies don't have security technology capable of guarding your data from cyber criminals. This allows hackers to access your important accounts if they manage to steal your password from a less secure website. So you should keep your banking and email passwords different from the common password which you use on all other websites.

You must follow these simple tips. These will help you to choose a strong password.
Use a unique password for all your important accounts
Use a password with a mix of letters, numbers, and symbols
Create a password that is hard for others to guess
Make sure your password recovery options are up-to-date and secure
Keep your passwords in a secret place that is not easily visible

Only having a smart and hard to crack password is not enough. You must have some recovery options to recover your account in case of hacked. The best recovery option is phone call or sms recovery. You must enable all security options as much website offers. On Gmail and Facebook, you can also use 2-step verification to make your account more secure.

Thursday, April 19, 2012

10 Great NotePad Tricks To Scare Your Friends


Most of you must be aware about a tool called notepad. It is a simple text based editor. But today I am going to discuss some cool tricks which you can perform on your computer using notepad. You can also use these tricks to scare your friends.
notepad tricks
Cycle a message in your friend’s computer.
Type :
@ECHO off
:Begin
msg * Hi
msg * Are you having fun?
msg * I am!
msg * Lets have fun together!
msg * Because you have been o-w-n-e-d
GOTO BEGIN
Save it as pc.bat and send it to your friends.
Make Keyboard Keys Type Continuously:
Type :
MsgBox “stop me..! if you can”
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop
Save it as pc.vbs and send it to your friends.
Convey your friend a message and shut down his/ her computer.
Type :
@echo off
msg * I don’t like you
shutdown -c “Hahahah You are Doomed” -s
Save it as pc.bat and send it to your friends.

How to increase your boot up speed


A faster boot up seems to be an elusive goal more than a reality. However, you can decrease the time it takes to start up your computer in Windows by minutes in some cases. With just a few tweaks, you can get your boot up time down to 30 seconds and not 20 minutes. This article will give some quick and easy tips for faster boot up times.
Step 1: Hard Disk Check Up
Over time, your hard drives gets degraded both physically and digitally. It’s important to monitor your drives health. An error or damaged sector can throw software loading into an infinite loop causing long load times. To check your drive health:
1. Click Start
2. Choose Computer
3. Right Click your Hard Drive
4. Choose Properties
5. Click Check Drives Health. After, the check up gives you repair options or a clean bill of health.
6. Restart to get a faster boot up.

See All Live Webcams with a Google Trick


Here’s  a trick that will blow your mind. You can get access to all open public webcams through Google. There are many tricks by which one may get accessed to all the webcams running currently at a particular position and at particular time. However the Google Webcam trick seems to be one the easiest. Here are a simple few steps by which one may do the same.
Step 1: Log on google.com
Step 2: Type ‘inurl:/view.shtml’ as a query
Step 3: You may also try using intitle:”Live View / – AXIS” | inurl:view/view.shtml^ as a query.
Step 4: This would redirect you to a page with the home pages of these urls.