Sunday, 26 July 2015

Interesting Computer and Internet tricks



(1) Maintain a personal diary with notepad or create a log with notepad

You can now maintain your personal diary with notepad. I will tell you a really beautiful trick which will save the current system time when you close it. This is really a hidden trick. Very few persons know this. Do as per the instruction.

I. Open a notepad and write .LOG in capital letter and save it in any name.

II. Now the next time when you will open it you will see the time and date information has been automatically saved in to the file.

III. This will be helpful when you need to track the date and time information. No need to save the date and time manually.




(2) Easily translate a website into your own language
Go to Google translator and type the website URL you want to translate in the left side text area. Then choose the language according your need. Google will create an link to the website in the right side text area. Click on it, you will see that the entire website has been converted to your language.






(3) It is not mandatory to type the URL in browser's address bar

You can also open Google by typing the URL in your windows explorer instead of Internet Explorer. Open your My Computer and type your URL in the address bar, press enter and surprisingly you will see the website will open in INTERNET explorer. This is not so much amazing but still a hidden trick which we did not know.







(4) See your entire directory structure in command prompt

Open your command prompt and type tree , then press enter and see what happens. Your entire directory structure will be displayed in a beautiful tree view.




(5) Save your command prompt output in a text file


If you feel bore to read a lengthy output in command prompt then here is very good trick by which you can save the output of command prompt in a text file.


Enter your command, then provide one greater than symbol and then write the path of the text file where you want to save the output.
Example: ipconfig > d:\saveData.txt
If you want your output to be appended in an existing file then provide the greater than symbol 2 times.Example: systeminfo >> d:\saveData.txt




(6) How to view your detail system information

You can see your detail system information including Hardware information, Different components, Display, Drivers, Ports, Storage, USB, Printing, Software environment, Network, Sound device, Modem, CD-ROM and many more. Just type System Information in start menu and click on the search result. You will get the detail information about your PC.

Top 10 Best Free Keylogger Software to Monitor Keystrokes in Windows

A key logger can be either a piece of software or a small hardware device that is used to capture the keystrokes that are typed on the keyboard. The hardware based keylogger can be easily detected because the physical device needs to be connected in between the keyboard and the USB/PS2 port. However, as for a software keylogger, it can be run while being completely invisible and not get noticed by average computer users. They’ll have to fully depend on security software such as anti-keyloggers or antivirus packages to tell them that a keylogger is present on the system, or else they have no idea that everything that they do on the computer is being monitored.
There are many legitimate uses for a keylogger such as monitoring your children, making sure that they stay safe on the Internet especially when chatting and making friends with strangers. Or maybe even monitoring your employees making sure that they do not copy or leak out any confidential files. However it can also be used for illegal purposes such as stealing your friend’s password and etc.
There are many software based keyloggers found on the Internet, some are freeware while others are shareware that require a paid license to use. Generally speaking, a shareware version of a keylogger normally has better invisibility to prevent being detected by advanced users, maybe security software and also has more features. As for the free keyloggers, they are often very limited in functionality and stealthiness. After testing nearly 2 dozen free keyloggers, we’ve picked what we thought were the best and sorted them into a top 10.10. Free Keylogger
It is able to log keystrokes, clipboard data and site addresses without the screen capture which is fine for people who don’t want to capture screenshots. There are a couple of invisibility settings such as the hidden mode hotkey (default Ctrl+Shift+Alt+U), removing shortcuts from start menu and uninstall list.
Free Keylogger
Ironically the most downloaded keylogging tool from CNET download.com barely made it to this top 10 list because the most important stealth feature which is starting the program in hidden mode is disabled in the free version. You can set it to automatically start the program with Windows but it will show a tray icon at notification area and anyone can access to it because there is no password protection feature. You can however manually hide it by clicking the “Apply & Spy” button to keep it running as invisible until the next reboot.


9. REFOG Free Keylogger
REFOG is a very popular company that offers a range of keyloggers catering for home, business and corporate use but unfortunately the free version is very basic as most of the important features have been disabled. The free version of REFOG keylogger can only monitor keystrokes, visited websites, clipboard, ran programs and computer activities.
REFOG Free Keylogger
The biggest drawback would be the inability to run totally invisible because it shows a noticeable tray icon in the notification area and fortunately the program can at least be password protected. We also found out how to remove the full version of REFOG Keylogger, which turns out to be quite easy.


8. DanuSoft Free Keylogger
DanuSoft is a simple and easy to use free tool to capture keystrokes. The only way to hide and unhide the program is by typing a chosen keyword, for example the default hide keylogger keyword is “HIDEKEY” while to show is “SHOWKEY”. You can configure DanuSoft to automatically run as stealth during system startup from the Startup settings tab.
DanuSoft Free Keylogger
It doesn’t have the ability to protect the program by setting a password, although it runs as invisible in Windows but not in task manager or explorer. This author of this keylogger seems to have abandon this project because it is not found on the official DanuSoft’s website but can still be downloaded from CNET.


7. Real Free Keylogger
After installing Real Free Keylogger to log the keystrokes, running it the first time will prompt you to set a password to protect the program so that only you can access the settings and view the logs. You can set a hotkey (default Ctrl+Alt+X) to launch the program when it is running in stealth mode. It comes with a scheduler to automatically start logging and the log files can be exported as a HTML file.
Real Free Keylogger
The program folder is set as system attribute and is only visible when the Hide protected operating system files is unchecked in Folder Options.


6. Revealer Keylogger Free
Revealer Keylogger Free is the second most downloaded monitoring tool in CNET Download.com. After testing, we found that it is very responsive and light on system usage. It can record keystroke, has multiple language support, startup settings, ability to run with elevated privileges, hotkey support (default Ctrl+Alt+F9) and automatic log cleanup. Screenshot capture, automated delivery options and additional stealth features are disabled.
Revealer Keylogger Free
The program can be protected with a password, and is invisible in the taskbar and in add/remove programs. To uninstall, you can do it by running the program, click on the question mark icon at the top right, go to Program end and select Uninstall. Pay attention during the installation because it prompts to install adware.

5. KidLogger
KidLogger is an absolutely free and open source user activity monitoring tool. Other than just logging keystrokes and clipboard, it can also record USB drives/files/folders usage, sound from microphone and taking screenshots including Skype videos. You’re able to set keywords as an alert during capture. The log files can either viewed locally or from your KidLogger’s online account. KidLogger can be installed on Windows, Mac OS X, Android, Symbian, BlackBerry and iOS.
KidLogger
KidLogger runs hidden in background but visible in task manager and explorer. There’s no hotkey or run command to launch the program so you’ll need to run the shortcut or from the executable file itself. KidLogger can be password protected.


4. BlackBox Express
BlackBox Express is a free security monitoring software that can be used as a keylogger. The way BlackBox works is slightly different compared to the rest on this list because it can monitor 1 local PC and up to 200 remote computers on the network. It can log keystrokes, web searches, ran programs, visited websites, email client programs, webmails, instant messaging chat programs and capture screenshots. Other than that, you can exclude the user that you don’t want to monitor on the computer. Alert notification and the ability to generate report that can be printed, saved as a HTML or emailed.
BlackBox Express
BlackBox Express runs as a service and hidden by default that does not show up in the taskbar nor display an icon at notification area. However you can still find the process in task manager and the only way to launch the program is from the shortcut or alternatively running the executable file from the unhidden program folder. Password protection is supported. You need to register for a free account to download the installer.


3. Spyrix Free Keylogger
Spyrix Free Keylogger is the free version of the paid Spyrix Personal Monitor. It is able to capture keystrokes, clipboard and take screenshots but advanced features such as social network & IM capture, visited webpages, log delivery and alerts are not available. When Spyrix is hidden, it can be launched with either a hotkey (Ctrl+Alt+A) or run command (runkey) and can be protected with a password.
Spyrix
Spyrix Free Keylogger has a lot of potential to take the higher spots if the capabilities of hiding itself are improved. Although Spyrix appears to be hidden from normal eyes, it can be easily spotted from the task manager with the process seen running as system user when hide in task manager option is checked. The program’s folder is not hidden as well.


2. G³ iSam
iSam is the free keylogger that’s packed with features such as the ability to capture keystrokes and take screenshots, set a hotkey (default T+G+Enter) to run the program, password protection (default 1234), automatic emailing log files, keywords marking, displaying banner to alert the user, scheduler, blocking URLs and exclusion filtering system.
G3 iSam
The configuration window runs in full screen with a dark background with options that are not really that user friendly and requires a bit of usage and time to get used to. Microsoft .NET framework 4.0 must be installed before you can install iSam. Although the program is hidden when running, it shows up in task manager, program’s folder and uninstaller list.


1. Actual Keylogger
Actual Keylogger used to be totally free but the current version has turned into a shareware with the program renamed to Actual Spy. Although the last freeware version 2.4 was released back in 2006, it worked perfectly when we tested it on our Windows 7 32-bit operating system. It can only capture keystrokes and allows you to access the program in two methods which is hotkey (Ctrl+Shift+Alt+F7) and run command (akstart).
Actual Keylogger
Out of all 9 free keyloggers mentioned above, Actual Keylogger has the strongest stealth features and runs totally invisible including during Windows startup. You won’t find the process in task manager, the program folder is hidden, shortcuts are removed, and it doesn’t show up in the Windows uninstallation list. As an additional security feature, Actual Keylogger can be password protected to prevent unauthorized users from accessing the program and log file. You can still download the free version of Actual Keylogger from CNET 


Top Ten Internet Safety Tips - Ensuring Online Safety For Your Family

  1. First educate yourself, then your child.

    Banning a child from certain sites may only motivate them to spend more time on them, whereas educating your child on how to keep safe will give them the tools they need to navigate their online world without being hurt; from not posting personal information to a site to understanding that people they are talking to may not actually be who they are. If the parents know the dangers themselves, this sets an example to the child to understand them as well.
  2. Teach children the obvious identity rules.

    Tell your children NOT to put photos of themselves on the Internet or to give out their names, addresses, phone numbers, schools, or other personal information online.
  3. Install an Internet filter or family safety software.

    Family safety software is becoming extremely advanced and an effective way to filter dangerous content. Additionally, this software usually comes with tools like time management, remote monitoring and reporting, and keystroke recognition, giving families greater peace of mind and manageability.
  4. Know the dangers associated with sites your children frequent.

    An ounce of prevention is worth a pound of cure. Whether it's MySpace, Facebook or another social networking site, by knowing what people are doing on your children's favorite sites that could put them in harm's way, parents can educate their children and show them the warning signs of potentially dangerous situations.
  5. Teach children what to do if they encounter pornography on a home or public computer, such as at a school or a library.

    In a similar fashion to the fire warning of "stop, drop and roll," you can teach children to quickly turn off power to the computer monitor and go to get an adult. This can prevent a child from attempting to stop the situation by clicking more buttons (and thereby spreading the attack and being exposed to more porn).
  6. Manage your children's time on the Internet.

    Scheduling times when a child can be on the Internet and the amount they can be online ensures that you know when they are on the Internet and how long. By not allowing them to have free reign reduces their chances of being exposed to inappropriate content.
  7. Set specific Internet guidelines for your children to live by and consistently enforce consequences, if they are not being followed.

    Giving your children specific guidelines to follow will ensure they know where they stand when it comes to how they use the Internet as well as the consequences when they breach the rules. If a parent enforces consequences consistently, their children will be more likely to follow the rules.
  8. Keep computers out of children's bedrooms and in open areas.

    With PCs in the open, children will be less inclined to view and access material that may not be acceptable.
  9. Create a relationship with your children that is conducive to open communication.

    Open communication and trust is extremely valuable. By letting children know what is expected from them and that their safety is a top priority, they will feel that if something happens --whether they are approached by a cyber stranger or bully or receive an inappropriate e-mail - they can approach a parent to resolve the issue without feeling they are in trouble.
  10. Understand Internet Privacy Policies as they apply to your child.

    According to the FTC (http://www.ftc.gov/privacy/privacyinitiatives/childrens.html), parents should be aware of the following as it pertains to protecting their childrens' privacy on the web:

What Website Operators Must Do:

Post their privacy policy.

Websites directed to children or that knowingly collect information from kids under 13 must post a notice of their information collection practices that includes:
  • types of personal information they collect from kids-for example, name, home address, email address or hobbies.
  • how the site will use the information-for example, to market to the child who supplied the information, to notify contest winners or to make the information available through a child's participation in a chat room.
  • whether personal information is forwarded to advertisers or other third parties.
  • a contact at the site.

Get parental consent.

In many cases, a site must obtain parental consent before collecting, using or disclosing personal information about a child.
Consent is not required when a site is collecting an email address to:
  • respond to a one-time request from the child.
  • provide notice to the parent.
  • ensure the safety of the child on the site.
  • send a newsletter or other information on a regular basis as long as the site notifies a parent and gives them a chance to say no to the arrangement.

What Parents Should Do:

Look for a privacy policy on any website directed to children.

The policy must be available through a link on the website's homepage and at each area where personal information is collected from kids. Websites for general audiences that have a children's section must post the notice on the homepages of the section for kids.
Read the policy closely to learn the kinds of personal information being collected, how it will be used, and whether it will be passed on to third parties. If you find a website that doesn't post basic protections for children's personal information, ask for details about their information collection practices.

Decide whether to give consent.

Giving consent authorizes the website to collect personal information from your child. You can give consent and still say no to having your child's information passed along to a third party.
Your consent isn't necessary if the website is collecting your child's email address simply to respond to a one-time request for information.

Tuesday, 14 July 2015

Windows 8 Password Recovery

How to Unlock Windows 8 Password with or without Software?


Are you searching for an easy technique to unlock your Windows 8 forgot password? Indeed, it is really frustrated when you lost Windows 8 password and locked out of computer. Just take it easy, let me first assure you that unlocking Windows 8 password is not only very possible, it’s not even that hard.

Well, we can unlock Windows 8 password with program or without software. Generally speaking, most people prefer to apply some common tricks to unlock password Windows 8 without software when they have enough time. While others would like to use Windows Password Recovery Tool 3.0 to operate it as them seek for less time and 100% data security. 



Unlock Windows 8 Password from Safe Mode

It seems to be the best way to unlock Windows 8 password from Safe Mode. This requires a built-in administrator. This administrator account was disabled by default when you install Windows 8 for the first time. In this situation, when you forgot Windows 8 user password, you can boot into Safe Mode and login with Windows 8 Administrator account and reset win 8 user password. Good to know and this technique do look relatively easy.

1. Press on the F8 key while you start Windows 8 until your PC displays the boot menu.
unlock windows 8 password from safe mode
2. Select Safe Mode option and press the Enter key
3. Then a login box appears, click on Administrator in the username box and leave the password field as blank, click on OK to login.
4. Now you can open Control Panel, then in User Accounts you can reset any user password easily.

Tips:
Note that these 2 methods will lead to lose the encrypt files etc. Is there a way can unlock Windows 8 password easily without any data loss? Yes, Windows Password Recovery Tool 3.0 is designed for those who lost Windows 8 password and have no idea how to unlock it. Please go on part two.

 

How to Unlock Password Windows 8 with Software


With Windows password recovery Tool 3.0, you can unlock your forgotten Windows 8 password as easy as 1-2-3. This method is easy enough for newbies to follow as it doesn't require any Recovery Console or complicated commands. The process of Windows 8 password unlocker is completely safe and non-destructive with 100% Windows 8 password reset rate.

Step 1: Download and install this Windows 8 password unlocker on an accessible PC.
Step 2: Insert a blank CD/DVD or a USB Flash device in computer, next you'll be able to burn a Windows 8 password reset disk in a few seconds.
burn windows 8 password reset disk
Step 3: Boot the locked computer from the burned disk, and then you can reset Windows 8 password under WinPE within a few clicks.


Monday, 13 July 2015

Download torrents using IDM.

Hello, I am telling you a simple trick of downloading your torrents without using any bit Torrent client.

I know its very difficult to download torrent using utorrent,bitTorrent etc. because the speed of downloading depends upon seeders,peers etc.

I am going to tell you some steps by which you can download torrents using idm or any other download manager you wish.

So, here are the simple steps:-


1. Go to this link Zbigz.(For mobile users m.zbigz.com)

2. Now go to a torrent site and choose your torrent which you want to download.

3. Right Click on download torrent and select copy link address.


4. Paste the link in the box in zbigz and hit Go!


5. Now choose Free option.


6. Wait for some time while zbigz servers download the torrent for you.

7. When download completes in zbigz hit the download button.


And That's it your file will be downloaded at a speed depending upon your ISP and not on the seeders of torrent.

BUT Remember the seeders of torrent must be above 10 or 15 so that zbigz servers can download the file for you.


Mobile users can also use this trick with same steps.

I tried it on UC Browser and it works Superbly.

Wednesday, 8 July 2015

How to Make Free Calls (online) From PC to Mobile -Top 3 Best Ways

Have you ever thought to make free calls form PC to your mobile? Sounds good right! If you are the one who addicted to your to talking in mobile then definitely this article is for you.Now you can make Free calls from PC to mobile and Mobile to PC.
By using some online services and apps you can make free calls from your computer to any mobile.This helps to save your money.As you know that telecommunication services  are increasing call cost day by day.


Must Check: How to Make Free Calls from Mobile




Site2SMS comes in first category because of its main advantages like Site2SMS delivers your 98% of messages in 15 Seconds.Means the delivery time is very less.I also used this website to send free voice SMS to friends.And i also recommended you to use this website to send free voice sms online.

Also this website provide us Text Messaging Service and Live voice calling in free.But the disadvantage i see in this website is that it is only for Indian Users.So if you are indian use this websites.




Web based free SMS provider, Site2SMS has announced free calling service for its users in India. Under this new service users can make up to 20 calls per day to mobile phone users across the country for free. These 20 calls can be of a maximum of up to 2 minutes each, after which the call will be automatically disconnected. But users are free to use the service as every day they will get up to 20 calls of 2 minutes each.
To use these service new users will have to register with Site2SMS before they can start using the service. All they need is a registered mobile number in their name that is what the service will be utilizing to make calls. To make calls all they need to do is enter the number and following that they will gate a call from Site2SMS on their registered mobile number, following that the server will connect the same call to the desired mobile number to which the user wished to talk to. Same can be carried on to 20 calls per day.
But in any case a single call cannot exceed 2 minutes, at the end of which the call will be automatically disconnected, but users can again generate a call request in the similar fashion and can call the same number again as well.







Numbertank- Make Free Call to Any Mobile with Android app


Update: Apparently, NumberTank website is not working. It’s asking users to download their Android app to use their service.  Thanks

Advantages of using Numbertank
  • Free calls from android app to any mobile phone
  • Phone that receive the calls, don’t need to have internet
  • You get 100 free minutes everyday
  • Voice clarity is decent that VoIP
Limitation of Numbertank
  • You can only call to members of Numbertank, who are on your contact list
  • Voice clarity is not very good like cellular networks

 Conclusion

Numbertank is good way to make long calls with your close friends, loved once and business partner. I use it to make 30-40 min calls. Voice clarity is not extremely good but easily get the job done. And the best part is, the recipient don’t require to have a smartphone or internet connection.

For Free Call, Free Recharge & SMS!

Fcall.in is India's first website to provide Free Calls to anywhere in India with Crystal clear voice, we also pay Highest Free Recharge for playing fun games and you can send 460 chars Free SMS to your loved ones anywhere in India 



What Services Fcall.in Provides (Brief Description) :-

Tuesday, 7 July 2015

Free Download Internet Download Manager 6.14.5 with Patch Full Version

Internet Download Manager 6.14.5 + patch

                                                                           




Need Only Serial Number (Registration Code) or Crack & Keygen or Activator of Internet Download Manager 6.14 Build 5 Final? Get it Full Free here. Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download accelerators and managers that segment files before downloading starts, Internet Download Managersegments downloaded files dynamically during download process. Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads.