Wednesday, April 27, 2011

WORTHY : Easily Share Large Files Directly Pc To Pc Using Web Browser Without Uploading Anywhere



Easily Share Large Files Directly PC To PC Using Web Browser Without Uploading Anywhere

FilesOverMiles is a tool for direct file sharing, fast and secure way to send files over the Internet. No setup or sign up and the file transfers are not stored anywhere. It will appeal to many professionals who want to share files securely and efficiently.

Step 1 : Go to FilesOverMiles website. Click "Browse" and select the file to transfer.
 

Step 2 : As soon as you select the file, the site will generate an unique URL which you have to share with the user to want to send the file to.


Step 3 (2nd User) : The PC on the receiving end of this file transfer must go this unique url which will show a download option from the file to be transferred PC to PC.



Note : The transfer file will continue to be available for download until the web page on 1st user’s browser is closed.

This way you can securely transfer files of any size through one pc to another from your browser. No need to upload anywhere.




 

USEFUL TWEAKS : How to Check If Your Antivirus Is Working?


 How to Check If Your Antivirus Is Working?

Hi users, here is a common method to determine that if your antivirus program is working properly or not. I think you may know it already, but for the beginner (noobs) this can be informative.

* Open Notepad and copy the Code given below.
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

* The text should be in one horizontal line.

* Then save file as "checkantivirus.com" including quotation-marks. (not necessary to be same as this file name, but save it in extension . com

* After some seconds saving this file, your Anti-Virus should come with the message that this file is infected with virus asking permission for its deletion/clean.

* This file is secure and it’s not going to infect your computer in whatever way. It is a standard text developed by the European Institute for Computer Anti-virus Research (EICAR). Every Anti-Virus is programmed to load this file as a virus.

* If your Anti-Virus will not hack this file as a virus, a program will appear as DOS window with this text EICAR-STANDARD-ANTIVIRUS-TEST-FILE.

* If this happens then you should probably find some other Anti-Virus up to date. It means that your PC might already being infected from viruses and your current Anti-Virus does not recognize them.


 

SECURITY : Better Way To Protect Your Website from Hackers


Better Way To Protect Your Website from Hackers

Hackers are ethical testers to find faults in systems so they can be corrected before unethical hackers (crackers) exploit them. So, this  is really about how to protect your website from crackers.

Keep your files up to date
If your site uses the popular SendMail script, please be sure your version is a current one. Visit Anti-Spam Provisions in Sendmail 8.8 to edit the FormMail script. We have the updated SendMail in use for the Harley Shopping Cart site. FormMail is another popular script used to send form results to an email address or database. We use that file for our website form. These scripts are located in the cgi-bin on the web host server.

Signing up for updates for scripts (programs) your site uses will let you know if there are any. You should use the latest update to protect yourself. This is often the reason the update is released. If you are unsure of the scripts used on your website, contact your web developer.

Remove unnecessary files
Your website changes, old files are ignored. They should be removed. Keep copies offline in case you wish to add them again, but remember to update any scripts. Old files are often indexed by search engines. So even if you do not link to those pages anymore, the search engines lists them for Internet users to find and visit. Automated programs to search for these files can find them to exploit them.

Implement passwords
Any sensitive files, databases or scripts should be protected. Please use passwords that are difficult to guess. Use letters AND numbers, but be careful to keep the number of characters within the programmed limits and remember that passwords are case-sensitive.

Include robots.txt 
Create a file to tell search engines not to index files that are restricted to certain users. You can also disallow indexing of images, so people who search for images to use illegal do not steal your images.

Check permissions of uploaded files 
Left-click each filename in your web host server, then right-click and select CHMOD to make sure files are set to the proper permissions. Check with your web host if you are unsure. Remember to upload images as binary and most other files as ASCII files. Choosing Auto for automatic selection may be incorrect if certain extensions are not specified.

Protect email addresses
 
If you ever got a strange email that tested your form or simply sent you an email to yourself, one of those spammer programs found your email address from your website or someone else’s. There are scripts to split up your email address, so spammer software programs cannot read them. Another way is to place your email address in an image or simply have an “Email us” link. I haven’t done this, but I didn’t have any problems until recently. I still want to make my contact information visible to my target audience.

If you sign guestbooks, go to forums or newsgroups, or share your email address with anyone else, your email address can be posted and shared all over the Internet. I often use several email addresses when making posts, because spammers look there first for email addresses. To spammers, a guestbook is an email address database. So use a Hotmail account for your email, but you can still include your web address in your signature. If the Internet user visits your site, the user can contact you using the link on your site. The spammers probably won’t visit your site, so the spam goes to the posted email address.

Protect your source code
Some people use that stupid right-click script to protect their source code. Not only does that not protect your code, you are disabling browser functions such as adding your site to their favorites or printing. Though many people have “borrowed” my source code, I would not want to disable functions that my target audience wants to use. There are scripts to make your source code hidden. This is more effective, but a pain for anyone who wants to edit your site. The preferred method is external files such as external style sheets or javascript files.

Include copyright information on the page and in the meta tags for every web page. Watermark all images. Keep copies of previous versions of your site with the last modified information intact. Save files on disks, so they can be retrieved. if necessary. Visit the WayBack Machineo find previous versions of websites, if you cannot find your files. Though the information is incomplete, it is better than nothing. Buy the copyrights to important files to protect yourself from competitors or other parties.
 
 
 

TRICK : Steps to Better Secure Your Wireless Network From Hackers



Steps to Better Secure Your  Wireless Network From Hackers

The reason we secure a wireless network is to stop people from using the services of our network who don’t have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna.

In order to secure a wireless network from hackers, we should take proper steps to save ourselves against security issues. If you don’t secure a wireless network from hackers, you might end up without its service. The consequence might also include the utilization of our network to attack further networks. To secure a wireless network from hackers, you should follow these simple wireless networking tips:

1) Strategic antenna placement:

The first thing you have to do is to position the access point’s antenna in a place which restricts the range of its signal to go further than the required area. You should not put the antenna close to a window because glass can’t obstruct its signals. Place it in a central location of the building.

2) Use WEP:

WEP stands for Wireless encryption protocol. It’s a customary technique for encrypting traffic on a wireless network. You should never skip it as that will allow hackers to get instant access to the traffic over a wireless network.

3) Change the SSID, disable the broadcast of SSID:

SSID stands for service set identifier. It is the recognition thread utilized by the wireless access point due to which the customers are capable of starting connections. For every wireless access point arranged, select an exclusive as well as unique SSID. Also, if it’s attainable, hold back the broadcast of the SSID out over the antenna. It wont appear in the listing of offered networks, while being able to provide services as usual.

4) Disable DHCP:

By doing this, the hackers will have to decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack your wireless network.

5) Disable or modify SNMP settings:

Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.

6) Utilize access lists:


For additional security of your wireless network, and if your access point support this feature, employ an access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers.

Enjoy.......
                                                      
                                                              
 
 
 

TRICK : Download TORRENTS Through IDM (Interned Download Manager)

1.       First download ur torrents file (.torents)
2.       Now open site torcache.com

3.       Select ur torrent file and hit cache..

4.       U’ll get a another .torrent file

5.       Now open http://torrific.com and past that new torrent file add in get bar and hit
Get. ul get an idm links for direct download without ratio tensions..

TRICKS : Live TV Streaming Links for 2G and 3G Phones.

IF YOU ARE FACING PROBLEM JUST DOWNLOAD COREPLAYER ACCORDING TO YOUR PHONE MODEL,SAVE ALL LINKS TRY THERE
[url=rtsp://59.162.166.216:554/STARONE_LOW.sdp]STARONE[/url]
[url=rtsp://217.146.95.166:554/live/ch28zqcif.3gp]ZING MUSIC[/url]
[url=rtsp://59.162.166.216:554/DISNEYHINDI_QVGA.sdp]DISNEY HINDI[/url]
[url=rtsp://59.162.166.216:554/UTVMOVIES_QVGA.sdp]UTV MOVIES 3G[/url]
[url=rtsp://59.162.166.216:554/UTVBINDASS_QVGA.sdp]UTV BINDASS 3G[/url]
[url=rtsp://217.146.95.166:554/live/ch20yqcif.3gp]AIR SPORTS[/url]
[url=rtsp://59.162.166.216:554/ANIMALPLANET_LOW.sdp]ANIMAL PLANET[/url]
[url=rtsp://121.14.129.221/broadcast/pushfeeder/rtpencoder/jbzq_m90.sdp]CCTV[/url]
[url=rtsp://59.162.166.216:554/CARTOONNETWORK_LOW.sdp]CARTOON NETWORK[/url]
[url=rtsp://59.162.166.216:554/DISCOVERYCHANNEL_LOW.sdp]DISCOVERY[/url]
[url=rtsp://59.162.166.216:554/DISCOVERYSCIENCE_LOW.sdp]DISCOVERY SCIENCE[/url]
[url=rtsp://59.162.166.216:554/DISCOVERYTURBO_LOW.sdp]DISCOVERY TURBO[/url]
[url=rtsp://121.14.129.221/broadcast/pushfeeder/rtpencoder/dongzdy-s.sdp]DONGZDY TV[/url]
[url=rtsp://59.162.166.216:554/ETVBANGLA_LOW.sdp]ETV
BANGLA[/url]
[url=rtsp://59.162.166.216:554/ETVBIHAR_LOW.sdp]ETV BIHAR[/url]
[url=rtsp://59.162.166.216:554/ETVORIYA_LOW.sdp]ETV ORIYA[/url]
[url=rtsp://59.162.166.216:554/TLC_LOW.sdp]TLC ENGLISH MOVIE[/url]
[url=rtsp://217.146.95.166:554/live/ch11yqcif.3gp]PDF TV[/url]
[url=rtsp://121.14.129.221/broadcast/pushfeeder/rtpencoder/tvs4-s.sdp]TVS4 MOVIE[/url]
[url=rtsp://video3.multicasttech.com/AFTVAdventure3GPP96.sdp]AFTV ADVENTURE[/url]
[url=rtsp://video3.multicasttech.com/AFTVClassics3GPP296.sdp]
AFTV CLASSICS[/url]
[url=rtsp://video3.multicasttech.com/AFTVComedy3GPP96.sdp]AFTV COMEDY[/url]
[url=rtsp://video2.multicasttech.com/AFTVCrime3GPP296.sdp]AFTV CRIME[/url]
[url=rtsp://video2.multicasttech.com/AFTVHorror3GPP296.sdp]AFTV HORROR[/url]
[url=rtsp://video2.multicasttech.com/AFTVMystery3GPP296.sdp]AFTV MYSTERY[/url]
[url=rtsp://video2.multicasttech.com/AFTVSciFi3GPP96.sdp]AFTV SCI-FI[/url]
[url=rtsp://59.162.166.216:554/NEBANGLA_QVGA.sdp]NE BANGLA 3G[/url]
[url=rtsp://59.162.166.216:554/STARANANDA_QVGA.sdp]STAR ANANDA 3G[/url]
[url=rtsp://59.162.166.216:554/STARJALSA_QVGA.sdp]STAR JALSA 3G[/url]
[url=rtsp://59.162.166.216:554/TIMESNOW_QVGA.sdp]TIMES NOW 3G[/url]
[url=rtsp://59.162.166.216:554/AAJTAK_QVGA.sdp]AAJTAK 3G[/url]
[url=rtsp://59.162.166.216:554/STARNEWS_QVGA.sdp]STARNEWS 3G[/url]
[url=rtsp://59.162.166.216:554/CHANNELV_QVGA.sdp]CHANNEL V 3G[/url]
[url=rtsp://59.162.166.216:554/ZOOM_QVGA.sdp]ZOOM TV 3G[/url]
[url=rtsp://59.162.166.216:554/ETNOW_QVGA.sdp]ETNOW TV 3G[/url]
[url=rtsp://59.162.166.216:554/CNN_QVGA.sdp]CNN TV 3G[/url]
[url=rtsp://59.162.166.216:554/KUBERMUSIC_QVGA.sdp]KUBER MUSIC 3G[/url]
[url=rtsp://59.162.166.216:554/BBCWORLD_QVGA.sdp]BBCWORLD 3G[/url]
[url=rtsp://59.162.166.216:554/IMAGINETV_QVGA.sdp]IMAGINE TV 3G[/url]
[url=rtsp://59.162.166.216:554/INDIANEWS_QVGA.sdp]
INDIA NEWS 3G[/url]
[url=rtsp://59.162.166.216:554/NDTVPROFIT_QVGA.sdp]NDTV PROFIT 3G[/url]
[url=rtsp://59.162.166.216:554/NDTVINDIA_QVGA.sdp]NDTV INDIA 3G[/url]
[url=rtsp://59.162.166.216:554/FTV_QVGA.sdp]FTV INDIA 3G[/url]
[url=rtsp://59.162.166.216:554/STARPRAVAH_QVGA.sdp]STAR PRAVAH 3G[/url]
[url=rtsp://217.146.95.166:554/playlist/ch26yqcif.3gp]i Music[/url]
[url=rtsp://217.146.95.166:554/live/ch15yqcif.3gp]iNDIE Music[/url]
[url=rtsp://217.146.95.166:554/playlist/wwf_coral_triangle_turtle_qcif1_ym1.3gp]TRIANGLE TV[/url]
[url=rtsp://59.162.166.216:554/GODTV_LOW.sdp]GOD TV[/url]

GAME : Portal 2-SKIDROW+Crack FIX |Mediafire+Duckload|



INFO :

Portal 2 draws from the award-winning formula of innovative gameplay, story, and music that earned the original Portal over 70 industry accolades and created a cult following. The single-player portion of Portal 2 introduces a cast of dynamic new characters, a host of fresh puzzle elements, and a much larger set of devious test chambers. Players will explore never-before-seen areas of the Aperture Science Labs and be reunited with GLaDOS, the occasionally murderous computer companion who guided them through the original game. The game’s two-player cooperative mode features its own entirely separate campaign with a unique story, test chambers, and two new player characters. This new mode forces players to reconsider everything they thought they knew about portals. Success will require them to not just act cooperatively, but to think cooperatively 







Crack FIX


Size : ( ~ 6.7  GB )


Password= dlgames4free.blogspot.com



OR

Duckload Single link





GAME : Operation Flashpoint Red River |Mediafire+Duckload|


info :

Between Afghanistan and China, the world's next flashpoint is about to erupt The valleys, towns and mountains of Tajikistan will become bloody frontlines for the might of the People's Liberation Army, insurgent guerilla fighters and the United States Marine Corps.You and your fireteam can make a difference. How much is up to you. It's not the soldier with the most expensive gun or the biggest heart who wins on the battlefield. It's the smartest. Semper Fi, Marine






Size : ( ~ 4.51  GB )



















Tuesday, April 26, 2011

GAME : SBK (2011) Superbike World Championship PC Game [Mediafire]







Info-
Publisher: Black Bean Games | Developer: Milestone S.r.l | Genre: Motorcycle Racing| Platform: PC | Size: 2.03 GB | Release Date: 04/2011

Description: SBK 2011 will feature a brand new artistic direction, an up-to-datedriving model to meet the gamers expectations following the most accuratefeedback collected so far on the web, as well as a more appealing presentationand side effects, due to an overall enhancement of the whole visual impact(menus, environments, 3D objects, lighting effects and much, much more)A simple side-by-side comparison with SBK X will allow the majorimprovements to stand out

Minimum System Requirements:
Operating System: Windows XP SP2, Windows Vista or Windows 7
Processor: Intel 2.4Ghz or similar
Hard disk space: 3 GB
RAM: 1GB
Video Card: NVIDIA Geforce 7600 or ATI X1600 or higher (it must be able to manage Pixel Shader 3.0) with at least 512MB of display memory











      



        PASSWORD : world4free.in
 

Software :Internet Download Manager 6.05 Build 14 Final WinALL-BRD/SND






              Internet Download Manager 6.05 Build 14 Final WinALL-BRD/SND


Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other paopular browsers to automatically handle your downloads.
You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.
Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.
Main Features:
• All popular browsers and applications are supported! Internet Download Manager has been tested with the following browsers: Internet Explorer, MSN Explorer, AOL, Netscape Communicator, Netscape 6, Netscape 7, Mozilla, Mozilla Firefox, Mozilla Firebird, Opera, NetCaptor, UltraBrowser, Slim Browser, Avant Browser, MyIE2, Optimal Desktop, Ace Explorer, Advanced Browser, 27 Tools-in-1 Wichio Browser, WindowSurfer, 550 Access Browser, FineBrowser Freeware, Kopassa Browser, Fast Browser Pro, Enigma Browser, GoSuRF, K-Meleon, Smart Explorer, The Off By One Web Browser, Smartalec Voyager, CrystalPort AppCapture, The Family Browser, XANA Web Browser, Bluto, AutoSurf, 32bit Web Browser, BrowseMan, WrestlingBrowser, Eminem Browser, UltraBrowser, Cygsoft LDAP Browser, and Net M@nager. Internet Download Manager supports all versions of popular browsers, and can be integrated into any 3rd party Internet applications.
• Easy downloading with one click. When you click on a download link in a browser, IDM will take over the download and accelerate it. IDM supports HTTP, FTP, HTTPS and MMS protocols.
• Download Speed Acceleration. Internet Download Manager can accelerate downloads by up to 5 times due to its intelligent dynamic file segmentation technology. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.
• Download Resume. Internet Download Manager will resume unfinished download from the place where they left off.
• YouTube grabber. Internet Download Manager can grab FLV videos from popular sites like YouTube, MySpaceTV, and Google Video.
• Simple installation wizard. Quick and easy installation program will make necessary settings for you, and check your connection at the end to ensure trouble free installation of Internet Download Manager
• Drag and Drop. You may simply drag and drop links to IDM, and drag and drop downloaded files out of Internet Download Manager.
• Automatic Antivirus checking. Antivirus checking makes your downloads free from viruses and trojans.
• Advanced Browser Integration. When enabled, the feature can be used to catch any download from any application. None of download managers have this feature.
• Built-in Scheduler. Internet Download Manager can connect to the Internet at a set time, download the files you want, disconnect, or shut down your computer when it's done.
• IDM includes web site spider and grabber. IDM downloads all required files that are specified with filters from web sites, for example all pictures from a web site, or subsets of web sites, or complete web sites for offline browsing. It's possible to schedule multiple grabber projects to run them once at a specified time, stop them at a specified time, or run periodically to synchronize changes.
• IDM supports many types of proxy servers. For example, IDM works with Microsoft ISA, and FTP proxy servers.
• IDM supports main authentication protocols: Basic, Negotiate, NTLM, and Keberos. Thus IDM can access many Internet and proxy servers using login name and password.
• Download All feature. IDM can add all downloads linked to the current page. It's easy to download multiple files with this feature.
• Customizable Interface. You may choose the order, and what buttons and columns appear on the main IDM window.
• Download Categories. Internet Download Manager can be used to organize downloads automatically using defined download categories.
• Quick Update Feature. Quick update may check for new versions of IDM and update IDM once per week.
• Download limits. Progressive downloading with quotas feature. The feature is useful for connections that use some kind of fair access policy (or FAP) like Direcway, Direct PC, Hughes, etc.
• IDM is multilingual. IDM is translated to Albanian, Arabic, Azerbaijan, Bosnian, Bulgarian, Chinese, Croatian, Czech, Danish, Dutch, Farsi, French, German, Greek, Hebrew, Hungarian, Italian, Japanese, Korean, Lithuanian, Macedonian, Norwegian, Polish, Portuguese, Romanian, Russian, Serbian, Slovak, Slovenian, Spanish, Thai, Turkish, and Uzbek languages.

                         


download FILESERVE