Tapptoons Animation Studio FREEWARE

Tapptoons Animation Studio FREEWARE
Tapptoons 2d animation software enables you to combine live action video with 2d animation, create snow & rain special effects, moving backgrounds, puppet animation for clay or jointed puppet models. It features twain connection for flatbed scanner image input as well as firewire and usb camera input for still image capture from video camcorders, webcams or digital stills cameras.
Tapptoons can be used for stop frame 3d animation and can accept input from graphics tablets.
Tapptoons animation studio can also be used for single frame time lapse recordng , as line test software or to make your own complete cartoons
The Animation Studio uses traditional 2D Cel animation methods to enable you to produce complete animated movies from images. The images can be drawn directly into the program or drawings imported via TWAIN based scanners or from Webcams and Video Cameras using Firewire, USB or compatible analogue Video Capture devices. You can add camera tracks and pans, moving backgrounds, transparency fx, snow and rain fx and modify the images with reduction and rotation facilities.
Main features
  • FREEWARE !!!!!
  • Firewire or usb single frame video capture
  • Twain-based scanning for drawn animation
  • Ten animation levels which can be viewed seperately or merged together
  • 50 undo levels
  • Comprehensive editing of the Dope Sheet
  • Images can be scanned, drawn or captured from a video camera (using a compatible video capture card)
  • You can choose your line colour and comprehensive paint facilities are available
  • Images can be flipped, rotated or reduced in size
  • Snow and rain weather effects can be generated within the programme
  • Levels can be made transparent for `ghost` effects
  • Moving backgrounds can be created, continuous repeating backgrounds can be made
  • Individual animation levels can be moved North, South, East or West or a combination of two directions
  • Completed scenes can be made into AVIs completed with soundtrack using `wav` files either imported or created within the programme
  • Anti-Aliasing option when creating AVIs
  • new High Definition resolution for HDTV production 1920 x 1080 pixels format
  • a range of 1.5:1 resolution settings to suit some digital still camera formats
  • newly added 10 frames per second running speed
  • scene deletion provision
  • Transitions between scenes can be created using wipe or dissolve effects
  • Fade-in or fade-out effects can be added to scenes
  • Track-in and track-out shots can be made with an option to blur the backgrounds for 3D effects
  • Microsoft Windows 98/98SE/ME/XP (XP is recommended for larger animation resolutions)
  • DirectX 8 or later
  • Screen resolution 1024 x 768 or larger
  • 24 or 32bit True Colour 16.8M colours graphics card settings (16 colour, 256 colour or HiColour not recommended)
  • 500MHz Pentium II, AMD K6-2 or better processor
  • 256 MB RAM or more
  • A large capacity hard drive
  • TWAIN compliant flatbed scanner
  • Firewire or USB inputs for DIGITAL VIDEO CAPTURE
  • ANALOGUE VIDEO CAPTURE with MCI compliant video capture card

Download Tapptoons Animation Studio
Size – 2.97 MB

What is Rundll32.exe and Why it is running ?

What is Rundll32.exe and Why it is running ?
What is Rundll32.exe and Why it is running ?
You are no doubt reading this article because you've looked in task manager and wondered what on earth all those rundll32.exe processes are, and why they are running… So what are they?
If you've been around Windows for any amount of time, you've seen the zillions of *.dll (Dynamic Link Library) files in every application folder, which are used to store common pieces of application logic that can be accessed from multiple applications.
Since there's no way to directly launch a DLL file, the rundll32.exe application is simply used to launch functionality stored in shared .dll files. This executable is a valid part of Windows, and normally shouldn't be a threat.
Note: the valid process is normally located at \Windows\System32\rundll32.exe, but sometimes spyware uses the same filename and runs from a different directory in order to disguise itself. If you think you have a problem, you should always run a scan to be sure, but we can verify exactly what is going on… so keep reading.
Using Windows Vista's Task Manager
One of the great features in Windows Vista's Task Manager is the ability to see the full command line for any running application. For instance, you'll see that I have two rundll32.exe processes in my list here:
Windows Vista - rundll32
If you go to View \ Select Columns, you'll see the option for "Command Line" in the list, which you'll want to check.
Windows Vista - rundll32
Now you can see the full path for the file in the list, which you'll notice is the valid path for rundll32.exe in the System32 directory, and the argument is another DLL that is actually what is being run.
Windows Vista - rundll32
If you browse down to locate that file, which in this example is nvmctray.dll, you'll usually see what it actually is when you hover your mouse over the filename:
Windows Vista - rundll32
Otherwise, you can open up the Properties and take a look at the Details to see the file description, which usually will tell you the purpose for that file.
Windows Vista - rundll32
Once we know what it is, we can figure out if we want to disable it or not, which we'll cover below. If there isn't any information at all, you should Google it.
Using Process Explorer on Vista or XP
Instead of using Task Manager, we can use the freeware Process Explorer utility from Microsoft to figure out what is going on, which has the benefit of also working in Windows XP.
Simply launch Process Explorer, and if you are using Vista you'll want to choose File \ Show Details for All Processes.
Windows Vista - rundll32
Now when you hover over the rundll32.exe in the list, you'll see a tooltip with the details of what it actually is:
Windows Vista - rundll32
Or you can right-click, choose Properties, and then take a look at the Image tab to see the full pathname that is being launched, and you can even see the Parent process, which in this case is the Windows shell (explorer.exe), indicating that it was likely launched from a shortcut or startup item.
Windows Vista - rundll32
You can browse down and view the details of the file just like we did in the task manager section above. In my instance, it's a part of the NVIDIA control panel, and so I'm not going to do anything about it.
Disabling the Process
Depending on what the process is, you won't want to necessarily disable it, but if you would like to, you can type msconfig.exe into the start menu search or run box and you should be able to find it by the Command column, which should be the same as the "Command line" field we saw in Process Explorer. Simply uncheck the box to prevent it from starting automatically.
Windows Vista - rundll32
Sometimes the process doesn't actually have a startup item, in which case you'll likely have to do some research to figure out where it was started from. For instance, if you open up Display Properties on XP you'll see another rundll32.exe in the list, because Windows internally uses rundll32 to run that dialog.

SOURCE – How to Geek. XERO


Street Fighter IV is a fighting game and the next installment in Capcom's long-running Street Fighter series.Being released after 10 years from the last Street Fighter game – Third Strike,Street Fighter 4 is one of the most highly anticipated games on the run.The game is multi platform and will be released on Windows,PS3,XBOX 360 and Arcades.
Features and Gameplay
Street Fighter IV features fighters and backgrounds rendered in 3D, while the gameplay is on a traditional 2D plane, thus creating a "2.5D" effect. Producer Yoshinori Ono has stated that he wanted to keep the game closer to Street Fighter II than its sequels, and as such the "parry system" from Street Fighter III has been dropped. A new system called "Focus Attacks" ("Saving Attack" for the Japanese version) has been introduced, as well as Ultra moves. The traditional six-button control scheme returns, with new features and special moves integrated into the input system, mixing classic gameplay with additional innovations. The game has a very similar feel to Super Street Fighter II Turbo, but also has several features from Street Fighter III 3rd Strike.Pressing both light attack buttons is still for throwing, and both heavy attack buttons are for the personal action or taunts. Both medium attack buttons are for the saving strike. Dashes and quick standing are also in the game.Saving system (Focus attacks) and Super attacks, officially dubbed "Super Combos", return in Street Fighter IV. Similar to Super Street Fighter II Turbo, each character has one set super move.Along with the Super Combo, Ultra Combos are one of the only times the camera breaks from its normal fixed position to show a more dynamic, cinematic view of the gameplay.Street Fighter IV will feature online gaming and is the sixth game in the series to do so image
The characters and environments will be rendered in 3D computer graphics and use a stylized cel-shading effect to give the characters and environments a hand-drawn look.
Home versions
Street Fighter IV has been officially announced for Xbox 360, Playstation 3 and Microsoft Windows. A release date has not been announced, but it is expected to be released either late 2008 or early 2009.
Trust Me..I M not gonna miss this one :)


This is a small trick for those who are pissed with pages which say -
Okay..You wanna that excellent content of that Blog/Website/Forum post and you cant just copy that because some stupid message box pops up everytime you right click that page..Worse,Some times even you cant left click and drag select the content to copy it by some other means..
Fine..Knight in the Shiny Armour to the rescue :)
Here is the code to disable COPY PASTING in your website -

<!-- Disable Copy and Paste-->
<script language='JavaScript1.2'>
function disableselect(e){
return false
function reEnable(){
return true
document.onselectstart=new Function (&quot;return false&quot;)
if (window.sidebar){

As you can see,its a javascript code.What if we disable the javascript functionality in our browser and then surf the net ? and then view that website you wanna see/copy ?
Yup,just disable the javascript in your browser and you can happily right click/copy paste/just bpass every javascript restriction on that page.

go to Tools –> options –> Open Content Tab –> Uncheck ENABLE JAVASCRIPT –> Click on OK
  • Open Internet Explorer.
  • On the Tools menu, click Internet Options.
  • On the Security tab, click Internet.
  • Click Custom Level.
  • Scroll down to Active scripting.
  • Click Disable (on Prompt).
  • Click OK.
  • Click Yes.
  • Click OK.

Happy Surfing :) and Use Mozilla or Opera – FREE,Open Source and Customisable !

Latest Airtel Free GPRS Unlimited Using Browser Hack

Latest Airtel Free GPRS Unlimited Using Browser Hack
Latest Airtel Free GPRS Unlimited Using Browser Hack
So another hack been found out for free Unlimited Gprs for Airtel live users.The new trick for Airtel free internet is by using a browser called teashark or Ucweb.Follow the steps below for unlimited mobile browsing.
Download Teashark browser(for MIDP 2.0 handsets only) from here or from here if you are using mobile browser( Wap link also given below )
Install the browser and select Airtel Live as the access point and start browsing absolutely free.(Don't worry airtel won't charge you ......:)
If Teashark browser doesn't work then go for Ucweb browser which can be downloaded from here.They also have many features like inbuild download manager,search function,email service and also page saving options.
Teashark Browser[http://teashark.com/download.html]
Ucweb Browser[http://www.ucfly.com/English/download.shtml]

Complied By XERO 

The 3Wplayer/DompLayer Scam

The 3Wplayer/DompLayer Scam
3wPlayer is a rogue media player software application bundled with trojans that can infect computers running Microsoft Windows.Its a rogue media player which encrypts the media files in a way that they can only be played using the 3wplayer.See it by this example - You downloaded a movie by torrent,and when after long hours of waiting you played It shows a screen like this-
It instructs you to download the 3wmedia player.The 3wPlayer employs a form of social engineering to infect computers. Seemingly desirable video files, such as recent movies, are released via BitTorrent or other distribution channels. These files resemble conventional AVI files, but are engineered to display a message when played on most media player programs, instructing the user to visit the 3wPlayer website and download the software to view the video. The program is bundled with malware that has various undesirable effects.Further,the movie you downloaded may not be the movie you downloaded.It maybe a hardcore porn flick or that of a completely different movie.

According to Symantec, 3wPlayer "may download" a piece of adware they refer to as Adware.Lop,which "adds its own toolbar and search button to Internet Explorer"
The DomPlayer and DivoCodec and 3wPlayer. Users are also instructed to download the player in order to view an AVI file.

What is a 3w-encoded AVI file?
As debunked by Kenneth Sörling (nevershaveyourduck@gmail.com)

In a nutshell, it is two movies baked together, back to back. The first is the short clip you've seen, displaying the screen above. The second one is further into the file, hidden and encoded.
This is another case where you are promised features which simply aren't there. They claim that a 3w-encoded file offers superior compression (using a new, advanced codec (compression algorithm)), but in effect it doesn't. Once decrypted, it turns out the hidden movie uses one of a common set of compression standards, such as DIVX or XVID. In other words, they are lying through their teeth.
3wplayer can be removed by scanning with an antivirus.Popular antivirus like Norton,Avast and Kaspersky can be employed to remove it.
 XERO . Thanks to Kenneth Sorling.

Comodo Personal Firewall Review

Comodo Personal Firewall Review
Comodo technologies is renowned for their security products and comodo Firewall is no different.Its a very good firewall and monitors every bit of your system.Here is how I evaluated it-

Microsoft Windows 2000 Professional SP4, Intel Pentium 4 2.66 GHz, 768 MB of RAM, and 128 MB ATI Radeon 9200.
   1. All unused ports are hidden.
   2. Tracks Everything in network traffic both inbound and outbound.
   3. Runs a background Windows service with a client application that lets you interact with the service in order to view reports or adjust the settings, for example.
   4. Warns about every program which tries to access Internet or network resources,especially useful in case of Trojans.
  5. Provides a wizard to scan all computers in a network.
   6. Autoupdate enabled.
   7. Summary view, which is the default screen you see when opening the application, displays usage of the network resources so that you can know your computer’s status at a glance.
  8. Gives the user the power to define minute and strict rules for network communication.
   9. Keeps logs for later inspection.
  10. Simple user interface with nice colors.
  11. Technical support is available through emails in addition to a community forum.

   1. NO Password protection,everybody has access to main control panel.
   2. Defining Rules or filters for network access is very hard as compared to other paid firewalls.
   3. Scanning Wizard is not so intutive as norton Firewall.
   4. The auto-update feature is only accessible from the program’s main window ie each component of Comodo has its own autoupdate feature.

Comodo Firewall is a world class protection suite for ur PC for FREE !!!

CFP 3.0 System Requirements
   * Windows XP (SP2) 32 bit version
    * Windows XP 64 bit version
    * Windows Vista 32 and 64 bit versions
    * 64 Mb RAM
    * 55 MB hard disk space for 32-bit versions and 75 MB for 64-bit versions

Download Comodo Firewall by clicking on Picture

Nokia N96 Review - Multimedia Mobile Monster

Nokia N96 Review - Multimedia Mobile Monster

Nokia N96 Review - Multimedia Mobile Monster
Nokia N96 review
No Nokia N96 review worth its salt would be complete without referring to its spiritual daddy, the hugely popular Nokia N95. The Nokia N96 offers similar features and a similar form factor to the N95, but with a much more mature platform (in other words, unlike the N95, it actually works without crashing!). However, it's not, apparently, designed as the N95's successor (largely because the N95 is still on sale!) Rather, it's a video and mobile TV phone that just happens to include much of the N95's functionality!
However, whereas the N95 was a revolutionary phone, the N96 is more evolutionary. The features of the N96 aren't as world-shattering as they were when they first appeared a year earlier on the N95, leading some to question whether it was actually a boring phone.
Boring? GPS, 5 megapixel camera, mobile TV, video, HSDPA, WiFi, etc., etc., and we call that boring?! The N95 really did set the bar high!
Still, if you're going to buy a new mobile phone, you need to know whether it's going to be the phone for you. Only one way to find out - read on for our comprehensive Nokia N96 review!

Nokia N96 Review

Nokia N96 review showing N96 closed
The Nokia N96 can be thought of as a classic Nokia phone, with the call connect and disconnect buttons surrounding the touch pad at the bottom of the phone. Offering 16GB of storage, the phone looks sleek and elegant, with a large 2.8" QVGA screen capable of displaying over 16 million different colours dominating its front. It looks good. It looks classy in an understated way. But you get no hint of the power that lies underneath!
Personally, I think this is a good thing, as I'd much rather impress people with unexpectedly-glorious features than be all bling and shouty with chrome and dazzling lights and not much else going on underneath!
So what is this power that I'm going on about?
The Nokia N96's camera
Nokia N96 camera phone
Let's start with the camera. It's a 5 megapixeller with Carl Zeiss optics, and comes complete with both auto-focus (which is essential in a camera phone) and auto-exposure. You also get a flash, but not just any old flash. The N96 comes equipped with a dual LED flash that can actually light up a room, just like normal camera flashes do (unheard fo for a camera phone!). Although not as bright as a Xenon flash, the dual flash enables continuous illumination, which can be used not just for still photography, but also for shooting video, too.
You can also adjust the flash, colour tone, white balance, and self-timer settings, and there's even anti-shake technology built-in. Not bad for a camera phone. Better still, though, is the combination of the camera and the on-board GPS unit, which will automatically GeoTag your photos with the exact co-ordinates of where they were taken. This seems such an obvious thing to do with photos, it's amazing that the digital camera manufacturers didn't routinely equip their cameras with GPS units years ago!
Video recording with the Nokia N96
The Nokia N96 comes with 30fps DVD-quality video recording, just like the N95. Being a video-oriented phone, though, it adds support for more video formats, including H.264, Flash video, ensuring you can watch YouTube clips on the phone, and Windows Media Video (WMV) version 9. More importantly, the N96 also includes dedicated DSPs and video acceleration chips, which ensures the video performance of both playback and video capture are much improved over the N95.
Another advantage of the video acceleration chip is the improvement in performance of 3D games that can be played on the N96, courtesy of Nokia's new N-Gage platform.Nokia N96 mobile phone showing 3D game
DVB-H Mobile TV on the Nokia N96
Nokia N96 mobile TV
Perhaps the biggest differentiator between the N96 and the N95 is the inclusion of DVB-H mobile TV. DVB-H is a broadcast technology, meaning that the phone picks up the TV signal from the airwaves in the same way that your old pre-digital TV used to. As such, there's no need for TV programmes to be sent via the mobile phone network, and so such annoyances as delay and jitter that could cause your TV picture to break up are not an issue.
Better still, with a 2.8" QVGA screen capable of displaying 16 million colours, the picture quality is superb (although small, obviously!). Nokia also add an Electronic Programme Guide (EPG), and Tivo-like time slicing for rewinding live TV programmes (up to 30 seconds' worth).
GPS on the Nokia N96
It's interesting to see that the Nokia N96 has the same aGPS functionality as the N95, but whereas the N95 was pitched as a Sat-Nav phone, the N96 is being pitched as a multimedia phone that just happens to have GPS! Another example of how revolutionary the N95 was when it first came out, I guess, and how we've all now got used to have such advanced features as GPS on our phones.
The N96 does improve on the N95's GPS functionality, though, as it includes Nokia's new Maps 2.0 application, which adds a new pedestrian mode, improved mapping and satellite imagery to the mix, along with improved city guides.
Of course, high-end mobile phones need to come fully loaded with al manner of connectivity options, and the N96 is no exception. You get quad-band GSM, dual-band WCDMA, HSPDA and Wi-Fi, plus Blutooth 2.0, USB (which is now five times faster than on previous Nokia devices), and UPnP, for connecting to all manner of other UPnP equipped home media devices, such as TVs and Hi-Fi. The only omission is infra-red, but that shouldn't really be a problem.

Nokia N96 Reviews across the Web

So that's the Nokia N96 in a nutshell. Time to see what other reviewers are saying about this great looking multimedia phone.
AllAboutSymbian have a comprehenisve review of the Nokia N96, and they love it. "It is easy to get blasé about the N96 as it is an evolutionary, not a revolutionary device - it is not going to have quite the same impact as the N95. But the fact remains that the N96 is, from a technical standpoint, an amazing device. In particular, the PVR in your pocket functionality means that the N96 stands out from the crowd. As with its Nseries predecessors, it takes us further down the road of convergence than ever before. With a GPS, 5 megapixel camera, multiple connectivity options, comprehensive software suite and now a mobile TV receiver built into a single phone, you'll be hard pressed to find anything that competes with it."
UnwiredView checked out a prototype at the MWC 2008 conference back in February, and they were excited by it too. "All- in-all, Nokia N96 is a great, feature packed mobile handset." They've got some extensive video coverage of the N96 as well, which is worth checking out.
Finally, we have a hugely comprehensive review from Mobile-Review.com, who also tested an early prototype. They don't offer a conclusion, as apparently mobile TV is not an option in Russia, so they somewhat petulantly say that "This phone is heavy both on video and television, that's why its feats won't be particularly craved here, in Russia. And given that there are other offerings to come that will offer similar specs under their hoods (USB speed, memory structure), there is no point in paying a premium for the Nokia N96 and getting a bunch of pretty much useless abilities for good measure." Fortunately, their review is extremely comprehensive, so if you can ignore the sulking, it's well worth reading!

Nokia N96 Specifications

The Nokia N96 specs are as follows:
    • WCDMA2100/900 (HSDPA) / EGSM900, GSM850/1800/1900 MHz (EGPRS) connectivity
    • DVB-H Class C, 470-750 MHz
    • S60 3rd edition, FP2 UI
    • 2.8” QVGA (240 x 320 pixels) LCD TFT display with up to 16 million colors
    • 5 megapixel camera with auto-focus and auto-exposure
    • Dual-LED camera flash, video light, recording indicator, auto-focus assist light
    • Secondary VGA (640 x 480 px) camera for video calls
    • Video capture in MPEG-4 up to VGA at 30 fps
    • Digital Video Stabilization
    • Built-in GPS/A-GPS
    • WLAN - IEEE802.11 g/b
    • Stereo FM radio (87.5-108MHz, 76-90MHz) with RDS
    • Hi-Speed USB 2.0 with Micro USB type B interface
    • 3.5mm stereo headset plug , TV-out support (PAL/NTSC)
    • Bluetooth 2.0 A2DP stereo/EDR
    • 950 mAh battery with up to 220 min talk, 220 hrs standby time, 5 hrs video, 14 hrs music or 4 hrs TV playback
    • Dimensions: 103×55x18 mm
    • Weight: 125 g
Mmmm, tasty!


The Nokia N96 is set to be yet another super high-end mobile phone from Nokia's famed N-Series. More a sister to the N95 than a successor, the N96 focuses strongly on multimedia, and yet does all the things the N95 did so much better. It'll be expensive, of course, when it debuts - around 550 Euros is the current estimate, with a release date of August/September - but as a high-end do-everything phone with unrivalled features, the Nokia N96 is going to be a hard phone to beat.

How to Read Email Headers and Find Internet Hosts

How to Read Email Headers and Find Internet Hosts
Now some of you may think that headers are too simple or boring to waste time on. However, a few weeks ago I asked the 3000+ readers of the Happy Hacker list if anyone could tell me exactly what email tricks I was playing in the process of mailing out the Digests. But not one person replied with a complete answer -- or even 75% of the answer -- or even suspected that for months almost all Happy Hacker mailings have doubled as protests. The targets: ISPs offering download sites for email bomber programs. Conclusion: it is time to talk headers!
In this Guide we will learn:
· what is a header
· why headers are fun
· how to see full headers
· what all that stuff in your headers means
· how to get the names of Internet host computers from your headers
· the foundation for understanding the forging of email and Usenet posts,
catching the people who forge headers, and the theory behind those email bomber programs that can bring an entire Internet Service Provider (ISP) to its knees
This is a Guide you can make at least some use of without getting a shell account or installing some form of Unix on your home computer. All you need is to be able to send and receive email, and you are in business. However, if you do have a shell account, you can do much more with deciphering headers. Viva Unix!
Headers may sound like a boring topic. Heck, the Eudora email program named the button you click to read full headers "blah blah blah." But all those guys who tell you headers are boring are either ignorant -- or else afraid you'll open a wonderful chest full of hacker insights. Yes, every email header you check out has the potential to unearth a treasure hidden in some back alley of the Internet.Now headers may seem simple enough to be a topic for one of our Beginners' Series Guides. But when I went to look up the topic of headers in my library of manuals, I was shocked to find that most of them don't even cover the topic. The two I found that did cover headers said almost nothing about them. Even the relevant RFC 822 is pretty vague. If any of you super-vigilant readers looking for flame bait happen to know of any literature that *does* cover headers in detail, please include that information in your tirades!Lacking much help from manuals, and finding that RFC 822 didn't answer all my questions, the main way I researched this article was to send email back and forth among some of my accounts, trying out many variations in order to see what kinds of headers they generated. Hey, that's how real hackers are supposed to figure out stuff when RTFM (read the fine manual) or RTFRFC
(read the fine RFC)doesn't tell us as much as we want to know. Right?One last thing. People have pointed out to me that every time I put an email address or domain name in a Guide to (mostly) Harmless Hacking, a zillion newbies launch botched hacking attacks against these. All email addresses and domain names below have been fubarred.
Newbie note: The verb "to fubar" means to obscure email addresses and
Internet host addresses by changing them. Ancient tradition holds that it is
best to do so by substituting "foobar" or "fubar" for part of the address.
If you are new to hacking, the headers you are used to seeing may be incomplete. Chances are that when you get email it looks something like this:
From: Cool Guy<coolguy@ifi.foobar.no>
Date: Fri, 1 March 2002
To: hacker@techbroker.com
But if you know the right command, suddenly, with this same email message,
we are looking at tons and tons of stuff:
Received: by o200.fooway.net (950413.SGI.8.6.12/951211.SGI)
    for techbr@fooway.net id OAA07210; Fri, 1 March 2002
Received: from ifi.foobar.no by o200.fooway.net via ESMTP
    for <hacker@techbroker.com> id OAA18967; Fri, 1 March 2002
Received: from gyllir.ifi.foobar.no (2234@gyllir.ifi.foobar.no
[129.xxx.64.230]) by ifi.foobar.no with ESMTP (8.6.11/ifi2.4)
    id <UAA24351@ifi.foobar.no> for <hacker@techbroker.com> ; Fri, 1 March 2002
From: Vegbar Fubar <fooha@ifi.foobar.no>
Received: from localhost (Vegbarha@localhost) by gyllir.ifi.foobar.no ; Fri,
1 March 2002
Date: Fri, 1 March 2002
Message-Id: <199704111809.13156.gyllir@ifi.foobar.no>
To: hacker@techbroker.com
Hey, have you ever wondered why all that stuff is there and what it means? We'll return to this example later in this tutorial. But first we must consider the burning question of the day:
Why bother with those "fucking" headers? They are boring, right? Wrong!
1) Ever hear a wannabe hacker complaining he or she doesn't have the addresses of any good computers to explore? Have you ever used one of those IP scanner programs that find valid Internet Protocol addresses of Internet hosts for you? Well, you can find gazillions of valid addresses without the crutch of one of these programs simply by reading the headers of emails.
2) Ever wonder who really mailed that "Make Money Fast" spam? Or who is that klutz who email bombed you? The first step to learning how to spot email forgeries and spot the culprit is to be able to read headers.
3) Want to learn how to convincingly forge email? Do you aspire to write automatic spam or email bomber programs? (I disapprove of spammer and email bomb programs, but let's be honest about the kinds of knowledge their creators must draw upon.) The first step is to understand headers.
4) Want to attack someone's computer? Find out where best to attack from the headers of their email. I disapprove of this use, too. But I'm dedicated to telling you the truth about hacking, so like it or not, here it is.

So you look at the headers of your email and it doesn't appear have any good stuff whatsoever. Want to see all the hidden stuff? The way you do this depends on what email program you are using.The most popular email program today is Eudora. To see full headers in Eudora, just click the "blah, blah, blah" button on the far left end of the tool bar.
The Netscape web browser includes an email reader. To see full headers, click on Options, then click the "Show All Headers" item.Sorry, I haven't looked into how to do that with Internet Explorer. Oh, no, I can see the flames coming, how dare I not learn the ins and outs of IE mail! But, seriously, IE is a dangerously insecure Web browser because it is actually a Windows shell. So no matter how often Microsoft patches its
security flaws, chances are you will be hurt by it one of these days. Just say "no" to IE.Another popular email program is Pegasus. Maybe there is an easy way to see full headers in Pegasus, but I haven't found it. The hard way to see full headers in Pegasus -- or IE -- or any email program -- is to open your mail folders with Wordpad. It is included in the Windows 95 operating system and is the best Windows editing program I have found for handling documents with lots of embedded control characters and other oddities.
The Compuserve 3.01 email program automatically shows full headers. Bravo,
We'll start by taking a look at a mildly interesting full header. Then we'll examine two headers that reveal some interesting shenanigans. Finally we will look at a forged header.OK, let us return to that fairly ordinary full header we looked at above. We will decipher it piece by piece. First we look at the simple version:
From: Cool Guy<coolguy@ifi.foobar.no>
Date: Fri, 1 March 2002
To: hacker@techbroker.com
The information within any header consists of a series of fields separated from each other by a "newline" character. Each field consists of two parts: a field name, which includes no spaces and is terminated by a colon; and the contents of the field. In this case the only fields that show are "From:," "Date:," and "To:".
In every header there are two classes of fields: the "envelope," which contains only the sender and recipient fields; and everything else, which is information specific to the handling of the message. In this case the only
field that shows which gives information on the handling of the message is the Date field.When we expand to a full header, we are able to see all the fields of the header. We will now go through this information line by line.

Received: by o200.fooway.net (950413.SGI.8.6.12/951211.SGI)for
techbr@fooway.net id OAA07210; Fri, 1 March 2002
This line tells us that I downloaded this email from the POP server at a
computer named o200.fooway.net. This was done on behalf of my account with
email address of techbr@fooway.net. The (950413.SGI.8.6.12/951211.SGI) part
identifies the software name and version running that POP server.

Newbie note: POP stands for Post Office Protocol. Your POP server is the
computer that holds your email until you want to read it. Usually your the
email program on your home computer or shell account computer will connect
to port 110 on your POP server to get your email.
A similar, but more general protocol is IMAP, for Interactive Mail Access
Protocol. Trust me, you will be a big hit at parties if you can hold forth
on the differences between POP and IMAP, you big hunk of a hacker, you!
(Hint: for more info, RTFRFCs.)
Now we examine the second line of the header:
Received: from ifi.foobar.no by o200.fooway.net via ESMTP
(950413.SGI.8.6.12/951211.SGI)for <hacker@techbroker.com> id OAA18967; Fri,
1 March 2002
Well, gee, I didn't promise that this header would be *totally* ordinary. This line tells us that a computer named ifi.foobar.no passed this email to the POP server on o200.fooway.net for someone with the email address of hacker@techbroker.com. This is because I am piping all email to hacker@techbroker.com into the account techbr@fooway.net. Under Unix this is done by setting up a file in your home directory named ".forward" with the address to which you want your email sent. Now there is a lot more behind this, but I'm not telling you. Heh, heh. Can any of you evil geniuses out there figure out the whole story?"ESMTP" stands for "extended simple mail transfer protocol." The "950413.SGI.8.6.12/951211.SGI" designates the program that is handling my email.Now for the next line in the header:

Received: from gyllir.ifi.foobar.no (2234@gyllir.ifi.foobar.no
[129.xxx.64.230]) by ifi.foobar.no with ESMTP (8.6.11/ifi2.4) id
<UAA24351@ifi.foobar.no> for <hacker@techbroker.com> ; Fri, 1 March 2002 

This line tells us that the computer ifi.foobar.no got this email message from the computer gyllir.ifi.foobar.no. These two computers appear to be on the same LAN. In fact, note something interesting. The computer name
gyllir.ifi.foobar.no has a number after it, 129.xxx.64.230. This is the numerical representation of its name. (I substituted ".xxx." for three numbers in order to fubar the IP address.) But the computer ifi.foobar.no
didn't have a number after its name. How come?Now if you are working with Windows 95 or a Mac you probably can't figure out this little mystery. But trust me, hacking is all about noticing these little mysteries and probing them (until you find something to break, muhahaha -- only kidding, OK?)But since I am trying to be a real hacker, I go to my trusty Unix shell account and give the command:

>nslookup ifi.foobar.no
Server:  Fubarino.com

Non-authoritative answer:
Name:    ifi.foobar.no
Address:  129.xxx.64.2 

Notice the different numerical IP addresses between ifi.foobar.no and gyllir.ifi.foobar.no. Hmmm, I begin to think that the domain ifi.foobar.no may be a pretty big deal. Probing around with dig and traceroute leads me to discover lots more computers in that domain. Probing with nslookup in the mode "set type=any" tells me yet more.

Author:- Tabish Ali Rizvi (tab_here@hotmail.com)
Nick:-     Neo


Identify a Music/Song by Sound

Identify a Music/Song by Sound
Identify a Music/Song by Sound
Ever heard a song you liked and don’t know who sung it ? or who composed it ? There’s also a cool way you can identify a song and that’s by having a piece of software listen to it, identify it within a few seconds and then tell you what it is!I was delighted to stumble upon this clever little app called Tunatic. It’s a free program or kind of a search-engine to identify songs and it’s available for Windows 2k/XP and Mac OS X.Tunatic listens to audio input (through microphone) and sends it back to the Tunatic server for analysis. After the tune has been looked up, it displays the matching song title and artist’s name.Tunatic is a freeware application for Windows and Mac OS X that will listen to a song and transmit the song’s features to the Tunatic servers to search for a matching song.
To run Tunatic on your computer, you’ll need the following:
  • A PC running Windows 2000, XP or better
    or A macintosh running Mac OS X v10.2 or better
  • Internet access
  • A microphone plugged into your computer. Alternatively, you can plug your sound source directly to your computer.
Tunatic identify any type of music? It can identify music from any genre except for classical. Also, Tunatic can only identify songs that are in it’s database, which is kept-up-to-date by a community of Tunatic users using a program called Tunalyzer. If someone is not showing up, you can add it to the Tunalyzer database easily. Tunatic can even recognize streamed music and moreover you can do that without using your microphone,a boon for Internet radio station listeners :)
Download Tunatic

Recovering Scratched CD's

Recovering Scratched CD's
Recovering Scratched CD's
Here's an easy home remedy, which might give you the desired results. Rub a small amount of toothpaste on the scratch and polish the CD with a soft cloth and any petroleum-based polishing solution (like clear shoe polish). Squirt a drop of Brasso and wipe it with a clean cloth.
Technology to the rescue:
There are many softwares available on the net, which enable the recovery of the CD data. BadCopy Pro is one such software, which can be used to recover destroyed data and files from a range of media.
Just a few clicks is all it requires to recover the disc from almost all kind of damage situation; be it corrupted, lost data, unreadable or defective.
DiskDoctors is another popular company, which offers both software and solutions to recover data from a scratched CDs and DVDs
General Tips:
* Always wipe the CD from the center outward with straight spoke-like strokes. Wiping CDs in circles will create more scratches.
* Do not scratch the graphics layer as you cannot repair the disc.
HINT: Hold the disc up to a light with the graphics layer facing the light source. If you can see light thru the scratches at any point then the disc may be irreparable and or exhibit loading or playing errors.
* Clean your Disc players lens regularly with a suitable product to ensure optimal viewing pleasure.
* Make sure to use a soft, lint-free cloth to clean both sides of the disc. Wipe in a straight line from the centre of the disc to the outer edge.
* If wiping with a cloth does not remove a fingerprint or smudge, use a specialized DVD disc polishing spray to clean the disc.

System32/drivers/fastfat.sys Is Corrupted Or Is Missing

System32/drivers/fastfat.sys Is Corrupted Or Is Missing
System32/drivers/fastfat.sys Is Corrupted Or Is Missing
Q: My computer shut off one day and I had to restart it. When it came back up it said “System32/drivers/fastfat.sys” is corrupted or is missing so I tried to reinstall but the system shuts down midway through the install. What should I do?
A: The error you are getting, has number of causes attached with it, few noteworthy reasons of this are as follows:
* The fastfat.sys file is really jinxed or missing.
* The error may also arise due to damaged or improperly installed RAM.
* The CD from which you are reinstalling may be damaged or corrupt.
* This error may also linked to NTFS formatting.
Now the probable solutions of the above mentioned causes are described below:
1. Check out whether the RAM is installed properly or not. This can be verified by following the given steps:

* Shut down your computer.
* Gently remove the memory modules leaving enough RAM to start and turn off your system.
* Restart your computer and if you are getting the same error then remove the second memory module from CPU. Continue this process until you find out the corrupt RAM module.
* Once you obtain the damaged RAM, replace it by an efficiently functioning one. If the issue is resolved then stop the further proceedings.
* Note: RAM should be removed with minimum possible force otherwise the memory module could get damaged during removal/insertion. Don’t perform this operation if you are not well versed with required technical knowledge. It is advised to go for an efficient technician to handle this issue

2. If the problem is not resolved by applying the above procedure then please make sure that the CD from which you are reinstalling is correct. Thoroughly clean the CD and reinstall again.

3. If your system is operating with NTFS formatting then you should go for an aligned installation of Windows 2000. This parallel installation will recover the lost fastfat.sys file system.
The above discussion will assist you in solving the given problem. If the issue persists further then get your system checked by highly skilled engineers.
XERO . Sanchit Hacking tips :)


Max Payne was an Excellent game,far superior than the games of its time.Max Payne 2 followed the footsteps of original and made a mark in the gaming history.the noir story by Sam lake,the voice overs by McCaffrey and the “Late Goodbye” theme all wrapped into an explosive package.
now the game has made into a Hollywood debut,Director John Moore with 20th Century Fox carries on to take the Violent Sad and noir story to the big screen.The Plot synopsis as of now -
Maverick cop Max Payne (Wahlberg) is hell-bent on revenge against those responsible for the brutal murder of his family and partner. His obsessive investigation takes him on a nightmarish journey into a dark underworld. As the mystery deepens, Max is forced to battle enemies beyond the natural world and face an unthinkable betrayal.
20th Century Fox even released a teaser trailer which you can view here
The Cast

  • Mark Wahlberg as Max Payne, a cop haunted by the murder of his family and who disregards rules to investigate their deaths.Wahlberg described his role, "It's probably one of the edgier roles I’ve played but also the most layered. Here's a very happy guy who worked a dismal job, had a beautiful family. But the beauty in his life was taken away. He just goes on a rampage. It's all driven by emotion."
  • Beau Bridges as B.B. Hensley, a former cop and Max Payne's mentor.
  • Mila Kunis as Mona Sax, an assassin who seeks revenge for the murder of her sister.
  • Ludacris as Jim Bravura, an internal affairs agent.
  • Chris O'Donnell as Jason Colvin, an executive and Nicole Horne's "right-hand man".
  • Nelly Furtado as Christa Balder, wife of Alex Balder who is Max Payne's partner and best friend
  • Kate Burton as Nicole Horne, CEO of Aesir corporation

  • Mean while,Rockstar and take two interactive is giving cues about MAX PAYNE 3.The Gamespot has shown the game as TBA status.

    What is ctfmon.exe And Why Is It Running?

    What is ctfmon.exe And Why Is It Running?
    You are no doubt reading this article because you are frustrated with the ctfmon.exe process that just won't stop opening no matter what you do. You remove it from the startup items and it just magically reappears. So what is it?
    Ctfmon is the Microsoft process that controls Alternative User Input and the Office Language bar. It's how you can control the computer via speech or a pen tablet, or using the onscreen keyboard inputs for asian languages.
    If you are using any of the above, you should leave it enabled. For everybody else, we'll get to the job of disabling this annoying service.
    Depending on your system configuration, there are a number of different steps to disable it. I've tried to list all the methods below.
    Step 1: Disabling in Microsoft Office 2003
    We can remove the alternative text input from Microsoft Office 2003 by just removing that feature in the setup.
    Note: I haven't figured out where the equivalent setting is for Office 2007 (if there is one), but we can also disable it a different way below.
    Go to Add/Remove programs, choose to Change your installation of Microsoft Office and make sure you check the box for "Choose advanced customization of applications" before you hit next.
    Find "Alternative User Input" in the list and change the dropdown to "Not available" so it looks like this:
    Step 2a: Disabling in Windows XP
    There's an additional step we can take to make sure it gets turned off in Windows XP, which really seems to be the best answer for XP users.
    Open up Control Panel and choose Regional and Language Options.
    Choose the Languages tab and then click on Details in the top section.
    Now on the Advanced tab you can choose to "Turn off advanced text services", which should immediately close ctfmon.
    You'll also want to take a look at the first Settings tab, and make sure that your "Installed Services" box looks similar to this one:
    If you have more than one Installed service then ctfmon might come back… For instance on my system there was an input for my drawing tablet so I could use it as a text input… which I don't care about, so I clicked Remove on it.
    Step 2b: Disabling in Windows Vista
    The setting above for completely disabling text services doesn't seem to exist in Windows Vista as far as I can tell, but we can remove the additional input services using a similar method.
    Open Control Panel, choose Regional and Language Options and then find "Change keyboards or other input methods".
    On the Keyboards and Languages tab, you can select Change keyboards.
    Now you'll finally be at the same screen as in Windows XP. You'll again want to remove the extra installed services in the list other than your default keyboard language.
    Step 3: Remove From Startup
    You won't want to perform this step before doing the others, because it will just be overwritten again. Open up msconfig.exe through the start menu run or search box, and then find the Startup tab.
    Find ctfmon in the list and disable it by unchecking the box. Just remember that if you haven't disabled ctfmon through one of the other settings this won't help you a lot.
    Step 4: If all else fails
    You can just completely unregister the dlls that run the alternative input services by running these two commands from run box (one at a time)
    Regsvr32.exe /u msimtf.dll
    Regsvr32.exe /u msctf.dll
    If you perform this step, you should also use Step 3 to get rid of the startup entries.
    Step 5: Reboot
    Reboot your computer and then open a Microsoft Office application if you do have that installed. Verify that ctfmon.exe is not running.



    INCREASE YOUR HARDDISK SPEED To speed up your hard disk speed we need to configure a special buffer in the computer's memory in order to enable it to better deal with interrupts made from the disk.
    This tip is only recommended if you have 256MB RAM or higher.
    Follow these steps:
    • Run SYSEDIT.EXE from the Run command.
    • Expand the system.ini file window.
    • Scroll down almost to the end of the file till you find a line called [386enh].
    • Press Enter to make one blank line, and in that line type
    Note: This line IS CASE SENSITIVE!!!
    • Click on the File menu, then choose Save.
    • Close SYSEDIT and reboot your computer.
    • Done. Speed improvement will be noticed after the computer reboots.

    The most speed improvement is visible with IDE drives, however there are reports that this tweak also does good for SCSI disks.

    DimensionEX Multiplayer Game Developer

    DimensionEX Multiplayer Game Developer
     DimensionEX Multiplayer Developer is a Freeware kit written in Java for quickly developing and running true multiplayer adventure games. Sample games and documentation are included, once you have it working on your PC you can easily develop a role-playing adventure game with the scenes and characters you like and, as soon as you are connected, your game works as an online multiplayer game so you can invite friends to play! Use it also to create a graphic and interactive chat environment! However, if you just want to play, we have some sample games and worlds built and running on DimensioneX servers! No downloads are required to play, you just need your browser, and all DimensioneX games are fully compatible with Internet Explorer, Netscape, Opera.

    Features of DimensioneX games

    If you use the DimensioneX kit, your game - right from its simplest version - will feature:
    • Online Multiplayer capability: Unlimited users can play simultaneously connecting via the network.
    • Compatibility with any browser: Users don't have to download anything to play!
    • Multimedia: graphics, icons, messages are used to make the game realistic.
    • Audio support: Sound and music can be used in the games to add dynamism.
    • Save game feature. Players can save, exit and come back to continue their game.
    • Customisable avatars, graphic buttons, skins and events.
    • Support for game map (with player tracking!)
    • Supports any image format, support for panoramic and 360° images (QuickTime VR)
    • Support for Day/Night cycles.
    • Can include banners. Useful if you wish to earn from them (we don't)
    • If you want you can go straight to Games Showcase and to Multiplayer Demos Showcase

    Features of DimensioneX game server

    • Runs anywhere even on cheap hardware: A normal Pentium with a 56K modem is sufficient to act as a game  development server. Runs also on Linux and the Macintosh.
    • Free hosting: We host your project if you cannot afford one.
    • True interactivity: A scripting language similar to Basic lets you bind code to game objects for high interactivity.
    • On-screen debugging. Scripting errors are directly shown in your browser.
    • Multi-area worlds (clustering). Make you game project grow by adding independent modules and share and reuse code by means of the Include directive.
    • Free documentation and support. Step-by-step Installation guide, a growing knowledge base and WIKI, Developer's Reference and forum based support service. Powerpoint slides also available for game programming course teachers!
    • Develop games in any national language. Built-in support for: English, Italian, Spanish, French, Russian and Ukrainian, Traditional Chinese, Polish, Dutch. Any language in the world can be supported with minimal effort.
    • Word filter for preventing the use of bad words in chat
    • Optionally working with any mySQL relational database for data storage.
    • Java Sources available: DimensioneX is Open Source - distributed under the GNU General Public License.
    • It's completely free: Fantastic, isn't it?


    A Dream within a Dream

    A Dream within a Dream

    Edgar Allan Poe 

    Take this kiss upon thy brow!
    And, in parting from you now,
    Thus much let me avow—
    You are not wrong, to deem
    That my days have been a dream;
    Yet if hope has flown away
    In a night, or in a day,
    In a vision, or in none,
    Is it therefore the less gone?
    All that we see or seem
    Is but a dream within a dream.
    I stand amid the roar
    Of a surf-tormented shore,
    And I hold within my hand
    Grains of the golden sand—
    How few! yet how they creep
    Through my fingers to the deep,
    While I weep—while I weep!
    O God! can I not grasp
    Them with a tighter clasp?
    O God! can I not save
    One from the pitiless wave?
    Is all that we see or seem
    But a dream within a dream?

    Delete An - Undeletable" File

    Delete An - Undeletable" File
    Ever had such an annoying message given by Windows?
      It has many other flavors: Cannot delete file: Access is denied There has been a sharing violation. The source or destination file may be in use. The file is in use by another program or user. Make sure the disk is not full or write-protected and that the file is not currently in use.

    Method 1
    Open a Command Prompt window and leave it open.
    Close all open programs.
    Click Start, Run and enter TASKMGR.EXE
    Go to the Processes tab and End Process on Explorer.exe.
    Leave Task Manager open.
    Go back to the command prompt window and change to the directory the AVI (or other undeletable file) is located in.
    At the command prompt type DEL <filename> where <filename> is the file you wish to delete.
    Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the GUI shell.
    Close Task Manager.
    Method 2
    You can try this
    Open Notepad.exe
    Click File>Save As..>
    locate the folder where ur undeletable file is
    Choose 'All files' from the file type box
    click once on the file u wanna delete so its name appears in the 'filename' box
    put a " at the start and end of the filename
    (the filename should have the extension of the undeletable file so it will overwrite it)
    click save,
    It should ask u to overwrite the existing file, choose yes and u can delete it as normal

    Method 3
    Here's a manual way of doing it.
    1. Start
    2. Run
    3. Type: command
    4. To move into a directory type: cd c:\*** (The stars stand for your folder)
    5. If you cannot access the folder because it has spaces for example Program Files or Kazaa Lite folder you have to do the following. instead of typing in the full folder name only take the first 6 letters then put a ~ and then 1 without spaces. Example: cd c:\progra~1\kazaal~1
    6. Once your in the folder the non-deletable file it in type in dir - a list will come up with everything inside.
    7. Now to delete the file type in del ***.bmp, txt, jpg, avi, etc... And if the file name has spaces you would use the special 1st 6 letters followed by a ~ and a 1 rule. Example: if your file name was bad file.bmp you would type once in the specific folder thorugh command, del badfil~1.bmp and your file should be gone. Make sure to type in the correct extension.

    Method 4
    Download Unlocker from Here .
    Install it .Now go to folder where the “Undeletable” file is located.

      1. Simply right click the folder or file and select Unlocker

      2. If the folder or file is locked, a window listing of lockers will appear

      3. Simply click Unlock All and you are done! Enjoy !!!


    Google secrets - Some Cool Google Dorks

    Google secrets - Some Cool Google Dorks

    Method 1

    put this string in google search:
    "parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
    "parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
    "parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
    "parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
    "parent directory " MP3 -xxx -ht
    ml -htm -php -shtml -opendivx -md5 -md5sums
    "parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
    Notice that i am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.

    Method 2

    put this string in google search:
    ?intitle:index.of? mp3
    You only need add the name of the song/artist/singer.

    Example: ?intitle:index.of? mp3 jackson

    Finding IP address in Gmail/Yahoomail/Hotmail

    Finding IP address in Gmail/Yahoomail/Hotmail
    When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The Tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.

    First of all, the IP address is generally found in the headers enclosed between square brackets, for instance, []

    Finding IP address in Gmail

    • Log into your Gmail account with your username and password.
    • Open the mail.
    • To display the email headers,
    • Click on the inverted triangle beside Reply. Select Show Original.
    • Manually find the IP address, proceed to 5.
    • Look for Received: from followed by the IP address between square brackets [ ].

    Received: from [] by web4587.mail.***.yahoo.com

    • If you find more than one Received: from patterns, select the last one.
    • Track the IP address of the sender
     Finding IP address in Yahoo! Mail

    • Log into your Yahoo! mail with your username and password.
    • Click on Inbox or whichever folder you have stored your mail.
    • Open the mail.
    • If you do not see the headers above the mail message, your headers are not displayed. To display the headers,

    * Click on Options on the top-right corner
    * In the Mail Options page, click on General Preferences
    * Scroll down to Messages where you have the Headers option
    * Make sure that Show all headers on incoming messages is selected
    * Click on the Save button
    * Go back to the mails and open that mail
    • You should see similar headers like above
    Or if you want to manually find the IP address, proceed to 6.
    • Look for Received: from followed by the IP address between square brackets [ ]. Here, it is
    That is be the IP address of the sender.

    If there are many instances of Received: from with the IP address, select the IP address in the last pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP.
     Finding IP address in Hotmail

    • Log into your Hotmail account with your username and password.
    • Click on the Mail tab on the top.
    • Open the mail.
    • If you do not see the headers above the mail message, your headers are not displayed. To display the headers,

    * Click on Options on the top-right corner
    * In the Mail Options page, click on Mail Display Settings
    * In Message Headers, make sure Advanced option is checked
    * Click on Ok button
    * Go back to the mails and open that mail
    • You should see the email headers now.
    • Manually find the IP address, proceed to 7.
    • If you find a header with X-Originating-IP: followed by an IP address, that is the senders IP address

    Hotmail headers
    In this case the IP address of the sender is [].
    • If you find a header with Received: from followed by a Gmail proxy like this

    Hotmail headers
    Look for Received: from followed by IP address within square brackets[]

    In this case, the IP address of the sender is [].

    • Or else if you have headers like this

    Hotmail headers
    Look for Received: from followed by IP address within square brackets[].
    In this case, the IP address of the sender is [] (Spam mail).
    • If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.
    • Track the IP address of the sender

    By ultimaterinks200... WAREZSHARES.COM . COMPILED BY XERO .View Source

    Best Hacking Tools -85in1-

    Best Hacking Tools -85in1-
    Best Hacking Tools -85in1-

    Audio theme: Sean Paul - Temperature
    Size : 43.2MB Compress ,29.7MB UnCompress

    Main page:


  • Page 1 :

    MSN Chat Monitor And Sniffer
    MSN Password Retriever
    MSN Hacker DUC
    Head Fuck HotMail HAck
    HotMail Hacker XE Edition
    HotMail HAck
    HotMAil Hacker
    MSN Passwords
    MSN Flooder
    MSN Sniffer
    MSN SPY Lite
    HotMail Hacker Gold
    HotMail HAcker Final
    Give me Ur Pass
    HotMail Brute Forcer
    MSN PAssword Finder
    MSN Password Grabber
    Hack MSN Password
    Hack HotMAil Evolution
    MAgic Password Sender
    MSN Locker
    HotMail Killer
    Hot Freeze
    HotMAil Hack !
    Ice Cold Reload
    HotMail Killer 2
    Nuke MSN

    Page 2:

    Yahoo Messenger Login Screen
    MSN Messenger 7 Login Screen
    MSN Messenger 5 Login Screen
    MSN Messenger 4.6 Login Screen
    HotMail Login Screen
    Fake Web Pages 2
    Fake Eeb Pages 1
    AOL Killer
    Fake Login HotMail
    B-S Spy
    Saria Fake Logins

    Page 3:

    Yahoo Password Retrieval
    Yahoo Cracker
    Yahoo Booster
    Yahoo Hack!
    Yahoo Password Stealer
    S-H Yahoo Password Sender

    Page 4:

    NetWork Password Recovery
    NetBIOS Name Scanner
    FTP Password Hacker
    Cable Modem Sniffer
    Port Listening XP
    Blue Port Scanner
    www 2 IP
    XP Killer
    Sniff Password
    Port Scanner
    Fast Resolver
    Domain Scan
    Whois Domain
    NetRes View
    PHPbb Defacer
    Angry IP Scanner
    FTP Brute Forcer

    PAge 5:

    Hook Tool Box
    Smart HAck UpLoader
    Remote Anything
    Post Sage
    PHPbb Attacker
    Page 6:
    MSN Bomber Man
    Ultimate Nick PopUpz
    MSN 7 Universal Patcher
    Emoticons Creator
    MSN Picture Crawler
    Anti Status Bomb
    MSN Detector
    Multi MSN Loader
    Protect Lithium
    Tray It!
    MSN Block Checker
    MSN Auto Responder
    MSN Virus Cleaner
    MSN Dondurucu


    Basic Assembly for Crackers

    Basic Assembly for Crackers
    Hey, This is a very basic guide to assembly for all those people who couldn't be bothered learning the in's & out's of their computer just to be able to use mIRC without having to click on some guys face. :)
    I'll basically go through the most necessary stuff that you need to know before you can begin to crack.
    Registers are basically default places in which to store data. The only ones we need to worry about are: (E)AX,(E)BX,(E)CX,(E)DX
    ( The (E) is only significant when debugging 32-bit code )
    Also the register pairs:
    DS:SI    ; Can be used as the source for string operations
    ES:DI   ; Used as the target for string operations
    To understand registers isn't very important for cracking, generally just to know that they're variables for data storage is enough to get you started :)
    Flags are essentially like registers except that they can only be true or false ( ie 0 or 1 ) These are set by commands such as CMP, and are used to check the outcome of such a call, ie:
    CMP   AX, BX    ; Compare AX to BX, if equal the zero flag is set to 1
    JZ    00124531    ; If the zero flag is set, jump to 001254531.
    To understand this properly you'll probably have to read on and then come back... :P
    The Stack & Push/Pop
    Before any function call, a program must 'push' any parameters that the function expects onto the stack. Think of it as a stack of plates, the first plate on the stack is the last one to be taken off-- the stack is exactly the same.  It's important to remember this 'first on/last off' principal when looking at a call, as this means that the parameters will be  passed in reverse order...
    In case my babbling has confused you, lets look at this example:
    The windows api function GetDlgItemText requires the following parameters:
    (1) Handle of dialog box
    (2) Identifier of control
    (3) Address of buffer for text
    (4) Maximum size of string
    Therefore these could be passed like so:
    MOV  EDI,[ESP+00000220]        ; Get Handle of dialog box in EDI
    PUSH 00000100            ; PUSH (4) Max size of string
    PUSH 00406130            ; PUSH (3) Address of buffer for text
    PUSH 00000405            ; PUSH (2) Identifier of control
    PUSH EDI            ; PUSH (1) Handle of dialog box
    CALL GetWindowText        ; CALL the function
    Easy eh? This can be one of the simplest ways of cracking a serial number app, if you know the address of the buffer for the serial number, in this case 00406130, just breakpoint it, and you'll usually end up in or around the procedure that generates the real serial!! :)
    POP is simply used to remove the first item from the stack, there are usually a lot of them before a function returns to the program...
    USAGE   : AND dest,src
    PURPOSE : Performs a logical AND of the two inputs, replacing the dest with the result
    EXAMPLE : AND BX, 03h
    There's not very much that can be said about this call, it does what it says.
    USAGE   : CALL address
    PURPOSE : Executes a function at the address 'address'
    EXAMPLE : CALL 10284312
    Calls the function at address 'address', once the function has finished, the code with continue the line after the call.
    CMP :
    USAGE   : CMP dest,src
    PURPOSE : Subtracts src from dest and updates the flags.
    EXAMPLE : CMP AX,03h
    This is an important instruction as far as we ( crackers ) are concerned :). Somewhere in the program for it to verify something, ie. to compare the real serial to the one we enter, or to check if a program is registered etc.
    This instruction usually preceeds a jump instruction of some kind.
    INT :
    USAGE   : INT interrupt_number
    PURPOSE : Calls a default function ( usually coded in the BIOS )
    EXAMPLE : INT 10h
    You won't really see this command much ( if at all ) when debugging windows programs, but they turn up all over the place in DOS. Usually the parameters are passed in the default registers ( AX,BX,CX etc. )
    There are far too many INT calls to list here, better to get a copy of an interrupt list. Ralph Browns is very good! :)

    USAGE   : JMP address
    PURPOSE : Equivalent to a basic GOTO, jumps to a section of code
    EXAMPLE : JMP 00402011
    JMP is an unconditional jump to a section of code. As simple as that! :)
    There are tons of variations on this instruction, the most important ones are:
    JZ   - Jump if the zero flag is set. ( Same as JE )
    JNZ  - Jump if the zero flag is not set. ( Same as JNE )
    These usually follow a CMP instruction, ie:
    CMP    RealSerial,BadSerial    ; Compare the real serial to our serial
    JNE    GoAwayBadCracker        ; If Not Equal then exit.
    MOV :
    USAGE   : MOV dest,src
    PURPOSE : Copies byte or word value from the source to the destination
    You will see this a *lot* when you're stepping through code, it basically means ( to use BASIC terms ;) ) LET dest = src
    There are quite a few variants including MOVSX, but they all basically do the same thing. It might help to get the intel programming specs from their website.
    If you can't understand this one, you're screwed! ;)
    OR :
    USAGE   : OR dest,src
    PURPOSE : Performs a logical OR on the two inputs replacing the dest with the result
    Does what it says.
    RET :

    USAGE    : RET
    PURPOSE : To return from a function
    You will usually see this at the end of a function, and it simply instructs the processor to return to the address of the call to the function.
    Useful Stuff
    The specs for programming intel processors : www.intel.com
    Ralph Browns interrupt list
      : search for it
    Win32 Programmers Reference: comes with any visual language
    Written by Corn2 .UNKNOWN COMPILATION . XERO