Tuesday, April 14, 2009

hacking hotel626.com

so here it is.. hotel626.com
its a good game. this is just simple. the game requires you to play at night
but if you want to play hotel626.com at daytime. then all you have to do
is change your system clock from AM to PM. then reload the page in your browser.

and for the unlock code. the madame say tree, light, spider.
then you have to count the red-ones. its all up to you.. so what are you waiting for
try to play www.hotel626.com
make sure you have webcam enabled.. :D

Saturday, April 11, 2009

AT&T $50 Netbooks

A $50 Netbooks, wow thats cool..

AT&T will begin selling netbooks with integrated wireless Internet cards, selling them for as low as $50 — with a data plan contract, of course. The rollout will begin in Atlanta and Philadelphia.

AT&T is also looking to enter the e-book market, according a company exec quoted by Bloomberg at the recent trade show in Las Vegas hosted by industry organization CTIA Wireless:

Verizon has also expressed interest in entering the e-reader fray, saying it had been approached by five (undisclosed) companies interested in a wireless connection like that of the Kindle.

The takeaway: AT&T's netbook announcement, along with an earlier one from Verizon, suggests these tiny laptops are increasingly being positioned as much as an additional mobile network-connected device as a supplemental computer.

It's unclear if the AT&T exec's remarks on e-readers are anything more than an off-the-cuff response to the success of the Kindle. But the notion of another carrier joining Sprint — the carrier the Kindle uses — in the e-book business is intriguing. Wireless access to content is one of the most compelling aspects of the Kindle, giving it the edge over competitors like the Sony Reader (which we've covered in the past). The other is access to the huge library of e-content — Amazon's 250,000 Kindle titles in the case of the Kindle. And to offer a compelling option to the Kindle, AT&T, Verizon, or any other carrier, will need to find a content partner with a competitive library. It isn't immediately clear who might be able to offer that (perhaps other than Sony, with its Reader library.)

Consumer Reports has no relationship with any advertisers on Yahoo!

Copyright © 2005-2009 Consumers Union of U.S., Inc.

SOURCE: http://shopping.yahoo.com/articles/yshoppingarticles/221/att-to-offer-50-netbooks/

Friday, April 10, 2009

how to remove domino.exe

how to remove domino.exe

the file domino.exe

c:\windows\domino.exe
or
c:\windows\system32\domino.exe

Domino.exe is not a Microsoft Windows file. The program has no visible window. The program starts upon

Windows startup (see Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run,

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders). The file is an

unknown file in the Windows folder. There is no information about the maker of the file.

the file domino.exe comes from a webcam installer.
either you delete it or not, its up to you, but some virus may hide in domino.exe filename..
so be carefull. some may hide in c:\windows\system32 folder.

To remove domino.exe

on your desktop,. press CTRL + del - this will bring up the task manager
find the process domino.exe the select it the click the end task command button
this will terminate the application domino.exe
now browse from your my computer to c:\windows and find the file domino.exe
from there you can delete the file.

you may need to run a registry scanner to download a registry scanner and cookie removal tool
follow this other haktech guide.

http://haktech.blogspot.com/2009/04/how-to-remove-cookies.html

Haktech guide by mark sheldon wong
http://www.nsfive.net

Wednesday, April 8, 2009

how to remove cookies

how to remove cookies - cleaning a cookie

Everyone has heard of cookies, most people love them, especially with milk. But these cookies have got some bad press. But don't worry, the cookie monster won't get you. Here's everything you need to know about removing cookies: Cookies are a technology that enables Web sites to store small bits of information on your hard drive, and then ask for that information back at a later time. They are very small, the maximum allowed is 4 kb per cookie and one site can give you no more than 20 cookies.

To remove cookies from your computer, i am writing this guide, its very simple to do so.
all we need is just a tool available for download here all in 1 cookie cleaner download

Cleans the following:

Internet Explorer
Temporary files, history, cookies, Autocomplete form history, index.dat.
Firefox
Temporary files, history, cookies, download history, form history.
Google Chrome
Temporary files, history, cookies, download history, form history.
Opera
Temporary files, history, cookies.
Safari
Temporary files, history, cookies, form history.
Windows
Recycle Bin, Recent Documents, Temporary files and Log files.
Registry cleaner
Advanced features to remove unused and old entries, including File Extensions, ActiveX Controls, ClassIDs, ProgIDs, Uninstallers, Shared DLLs, Fonts, Help Files, Application Paths, Icons, Invalid Shortcuts and more... also comes with a comprehensive backup feature.
Third-party applications
Removes temp files and recent file lists (MRUs) from many apps including Media Player, eMule, Kazaa, Google Toolbar, Netscape, Microsoft Office, Nero, Adobe Acrobat, WinRAR, WinAce, WinZip and many more...
100% Spyware FREE
This software does NOT contain any Spyware, Adware or Viruses.

-all you need to do is download and install, once installed just run the software and boom, you got an all in 1 cleaner..

this is another guide by Haktech.blogspot.com - by: mark sheldon wong
www.nsfive.net

Tuesday, April 7, 2009

Anonymity of Proxy

Anonymity of Proxy

The exchange of information in Internet is made by the "client - server" model. A client sends a request (what files he needs) and a server sends a reply (required files). For close cooperation (full understanding) between a client and a server the client sends additional information about itself: a version and a name of an operating system, configuration of a browser (including its name and version) etc. This information can be necessary for the server in order to know which web-page should be given (open) to the client. There are different variants of web-pages for different configurations of browsers. However, as long as web-pages do not usually depend on browsers, it makes sense to hide this information from the web-server.

What your browser transmits to a web-server:
a name and a version of an operating system
a name and a version of a browser
configuration of a browser (display resolution, color depth, java / javascript support, ...)
IP-address of a client
Other information

The most important part of such information (and absolutely needless for a web-server) is information about IP-address. Using your IP it is possible to know about you the following:
a country where you are from
a city
your provider?s name and e-mail
your physical address

Information, transmitted by a client to a server is available (accessible) for a server as environment variables. Every information unit is a value of some variable. If any information unit is not transmitted, then corresponding variable will be empty (its value will be undetermined).

These are some environment variables:

REMOTE_ADDR ? IP address of a client

HTTP_VIA ? if it is not empty, then a proxy is used. Value is an address (or several addresses) of a proxy server, this variable is added by a proxy server itself if you use one.

HTTP_X_FORWARDED_FOR ? if it is not empty, then a proxy is used. Value is a real IP address of a client (your IP), this variable is also added by a proxy server if you use one.

HTTP_ACCEPT_LANGUAGE ? what language is used in browser (what language a page should be displayed in)

HTTP_USER_AGENT ? so called "a user?s agent". For all browsers this is Mozilla. Furthermore, browser?s name and version (e.g. MSIE 5.5) and an operating system (e.g. Windows 98) is also mentioned here.

HTTP_HOST ? is a web server?s name

This is a small part of environment variables. In fact there are much more of them (DOCUMENT_ROOT, HTTP_ACCEPT_ENCODING, HTTP_CACHE_CONTROL, HTTP_CONNECTION, SERVER_ADDR, SERVER_SOFTWARE, SERVER_PROTOCOL, ...). Their quantity can depend on settings of both a server and a client.

These are examples of variable values:

REMOTE_ADDR = 194.85.1.1
HTTP_ACCEPT_LANGUAGE = ru
HTTP_USER_AGENT = Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
HTTP_HOST = www.webserver.ru
HTTP_VIA = 194.85.1.1 (Squid/2.4.STABLE7)
HTTP_X_FORWARDED_FOR = 194.115.5.5

Anonymity at work in Internet is determined by what environment variables "hide" from a web-server.

If a proxy server is not used, then environment variables look in the following way:

REMOTE_ADDR = your IP
HTTP_VIA = not determined
HTTP_X_FORWARDED_FOR = not determined

According to how environment variables "hided" by proxy servers, there are several types of proxies
Transparent Proxies

They do not hide information about your IP address:

REMOTE_ADDR = proxy IP
HTTP_VIA = proxy IP
HTTP_X_FORWARDED_FOR = your IP

The function of such proxy servers is not the improvement of your anonymity in Internet. Their purpose is information cashing, organization of joint access to Internet of several computers, etc.
Anonymous Proxies

All proxy servers, that hide a client?s IP address in any way are called anonymous proxies

Simple Anonymous Proxies

These proxy servers do not hide a fact that a proxy is used, however they replace your IP with its own:
REMOTE_ADDR = proxy IP
HTTP_VIA = proxy IP
HTTP_X_FORWARDED_FOR = proxy IP

These proxies are the most widespread among other anonymous proxy servers.

Distorting Proxies

As well as simple anonymous proxy servers these proxies do not hide the fact that a proxy server is used. However a client?s IP address (your IP address) is replaced with another (arbitrary, random) IP:

REMOTE_ADDR = proxy IP
HTTP_VIA = proxy IP
HTTP_X_FORWARDED_FOR = random IP address
High Anonymity Proxies

These proxy servers are also called "high anonymity proxy". In contrast to other types of anonymity proxy servers they hide a fact of using a proxy:

REMOTE_ADDR = proxy IP
HTTP_VIA = not determined
HTTP_X_FORWARDED_FOR = not determined

That means that values of variables are the same as if proxy is not used, with the exception of one very important thing ? proxy IP is used instead of your IP address.
Summary

Depending on purposes there are transparent and anonymity proxies. However, remember, using proxy servers you hide only your IP from a web-server, but other information (about browser configuration) is accessible!

-Haktech

Monday, April 6, 2009

How to move XP harddrive to new Motherboard

really easy. but this only works if the original motherboard and harddrive still work. so put it back together. for newbies, go to control panel, double-click the system icon, go to hardware tab, and click device manager button. find the IDE ATA/ATAPI CONTROLLERS and expand the tab. not the primary or secondary controller, but right-click the first controller. choose update driver. choose the option to install from a list or specific location. click next. now choose the (don't search. I will choose the driver to install) option. click next. now highlight the Standard Dual Channel Pci Ide Controller. click next. the Standard controller will install. now reboot. log in. the standard controller is completely installed. you can now shutdown the computer, remove your harddrive, and it will boot with the new motherboard. i've done this 24 times on 12 different computers. it works.

-Haktech guides

tags

Friend Connect