Sunday, 19 February 2012

              :: OM NAMHSHIVAY ::

Wish u very happy mahashivratrti

from Pprasoon Nigam


Computer Lab fun

Saturday, 11 February 2012

           ::Computer Lab Funs::

How to have some LOL funs in Computer Lab ?

Every one in college/schools/office have computer over there :: u can play pranks on ur friends and laugh out loudly

Now how to play tricks and pranks

Heres' the SECRET

There is a software name call ANGRY IP SCANNER

To download ANGRY IP SCANNER => Click on me :)

Now what to do

Sit down at the last computer in computer lab :: as we all know that all computers are connected to each other with the help of hub or LAN wire  ::
Now install angry ip scanner at the last computer u r sitting

Open ur cmd (command prompt) type ipconfig and get ur computer's ip so that u may not shutdown ur computer

Angry ip Scanner looks like this

When scanner is instal :: run the angry ip scanner u will get all the ips of the computer :: select all the ip (except the computer u r sitting) and give the command shutdown from the command option given in menu :: and vollaaaa all the computer vl shutdown :: and every one think y the computer turned off


Make a shutdown bactch file command

Or download the shutdown batch file command => Click on me :)

After making or downloading the file :: put this file in the startup folder
navigate to startup folder => C:/programdata/microsoft/windows start menu/programs/startup

Now when ever someone open this computer this file will be activated and computer will shutdown ::

More Tricks On Computer Shutdown => Click on me :)


Now open run window (window key + R )

Type this command

shutdown -s -t 15 -c "You are buffalo" Or what ever u want

this command is shutdown computer after 15 sec

and to shutdown computer at a particular time here is the command

at 11:45 AM or PM shutdown -s -t 00

now what this command does is this shutdown computer at particular time ::: so if someone is working on that computer and when this time comes the computer will shutdown and person will think for a while what had happen :: y the computer shutdown

To know more :: shutdown computer at particular time => Click one me :)

More Pranks => Cick on me :)
                           Click on me :))

©Pprasoon nigam


Friday, 10 February 2012

             :: Bluetooth and mobile hacking software in one place ::

What this Bluetooth hacking software do ?

Heres' the SECRET

Connect to to any mobile with the help of bluetooth then u can call to any person with ur mobile and and no. will be shown will the mobile u r connected to and and money will charged of the connected phone ::

U can send sms to the other mobile from the mobile u r connected ::
U can delete copy and even cut some items from his mobile to ur mobile ::

U can do bar code hacking  just insert bar code no.s and u get all the details
U have dictionary of computer science, Hindi to English and vice versa words converter and English to Hindi dictionary

U can send free sms joining to free sms websites
U can send sms at the time u want :: Fix the time and sms will be sent to the person

U can lock ur personal folders
U will have different types of music players

U will have opera mini
U have some useful things of SEX like kamasutra too

Enjoy more then 85 applications of mobile and Bluetooth hacking

TO download applications all in one time => Click on me :)

Countermeasures For Bluetooth hacking

* All the softwares works well in Nokia phones

** When someone asking for connection and ask for type in the pin :: here it hacking ur Bluetooth only samsung mobiles ask for pin

*** Always close ur Bluetooth when its not in use :: two things happens u will save 20% of battery and will save from hacking

**** always look into the person phone y is it asking, pin for ::

Some more interesting Things

To know how to spy mobile => Click on me

Check whether Nokia phone good quality or not => Click on me

How to track ur lost phone => Click on me

How to trace ur phone => Click on me

A Mans Life

Saturday, 4 February 2012

A Mans Life ::

God created the donkey
and said to him.
"You will be a donkey. You will work un-tiringly
from sunrise to sunset carrying burdens on your back.
You will eat grass, you will have no intelligence
and you will live 50 years."
The donkey answered:
"I will be a donkey, but to live 50 years is much. Give me only 20 years"
God granted his wish.

God created the dog
and said to him:
"You will guard the house of man. You will be his best Friend.
You will eat the scraps that he gives you and you will live 30 years.
You will be a dog.
The dog answered:
"Sir, to live 30 years is too much,give me only 15 years." God granted his wish.

God created the monkey
and said to him:
"You will be a monkey. You will swing from
branch to branch doing tricks. You will be
amusing and you will live 20 years.
The monkey answered:
"To live 20 years is too much, give me only 10 years." God granted his wish.

Finally God created man...
and said to him:
"You will be man, the only rational creature on the face of the earth.
You will use your intelligence to become master over all the animals.
You will dominate the world and you will live 20 years." Man responded:
"Sir, I will be a man but to live only 20 years is very little,
give me the 30 years that the donkey refused,
the 15 years that the dog did not want
and the 10 years the monkey refused."
God granted man's wish

And since then, man lives 20 years as a man,
marries and spends 30 years like a donkey,
working and carrying all the burdens on his back.

Then when his children are grown,
he lives 15 years like a dog taking care of the house
and eating whatever is given to him.

So that when he is old,
he can retire and live 10 years like a monkey,
going from house to house and from one son or
daughter to another doing tricks to amuse his grandchildren.

That's Life.                                                                                      [help of some site]


Friday, 3 February 2012

What is Steganography ?

Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient.

The advantage of steganography, over cryptography alone, is that messages do not attract attention to themselves. Plainly visible encrypted messages—no matter how unbreakable—will arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal.Therefore, whereas cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties.

Most imp advantage is ::

Somebody hacked ur id :: u want to send message to someone :: u know ur id is hacked :: hide that data and send it :: tell the password to the sender and he opens it and read the message ::

I know many were thinking y to hide it :: y not make a new id :: see if u forgot the id of the person send him in this way or may it will be ur imp id ::

Second advantage :: a employee can give a imp info to his boss in this way ::

How to use steganography ?Heres' the SECRET

To use steganography we have to use a software call as S-Tools

To Download S-TOOLS => Click on me

How to use S-Tool here is the video tutorial :: => Click on me