Thursday, March 17, 2011

Using Hamachi to Play LAN Games

Hamachi is a program that allows you to form connections over the internet that usually could only be done physically-basically making it computer networking software. It's free and is available for compatibility with Microsoft Windows (Vista included), Linux, and Mac OS X. 


Once Hamachi is downloaded and installed the rest of the process is relatively simple and anyone can set up a private server. Once Hamachi is opened up, there are three icons that show up along the bottom of the rectangular menu. Clicking on the triangular icon opens up the networking menu, where you can join a network if you have the proper information or set one up. Setting one up is as simple as choosing a name and creating a password.


Download free Hamachi here.

Saturday, March 12, 2011

Autocad tutorial


This web site consist of free AutoCAD Video Tutorial
This web site as one stop center for AutoCAD Tutorial in this planet. This web site consists
of online cad training, cad drawing ready for download, Auto CAD software, free dwg download,
dwg free viewer download, autocad tutorial, cad drawing, cad forum ,AutoCAD 2006,AutoCAD 2007,
AutoCAD 2008,AutoCAD 2009,AutoCAD 2010 and AutoCAD 2011 AutoCAD Tutorials.


Follow this link and read full tutorial how to use Autocad.

Sunday, March 6, 2011

How to morph photo

I recived one tutorial on my mail from my good friend Ange from Florida and its very simple and useful,check it out.

make all pics the same size,(view at 50 or 100%) center, add morph points in area/on main pic- move with the arrow in the other pics, then add more if needed/again move so you don't loose track of them.

When saving -Morph speed 100,
PERIOD *20 -30 The higher the period the slower the speed on saved version.

I always pick reverse in Morph so it will cycle and MORPH VERSION 2 instead of 1 or wild, but thats the basics. Have fun! Save as gif and if pic is too large reduce % when saving.





This is sample how it can looks at end.

Saturday, March 5, 2011

Protect your facebook account


1.10 privacy settings for Facebook users.  THIS SITE.
2.Protect Facebook account from hackers and phishing scams.  THIS SITE.
3.5 tips to protect your Facebook account :


1. Make your profile ‘PRIVATE”. You could do under the “Privacy setting tap” in your Facebook. When the “Private” option is on, only your friends that you are accepted will be able to see your photos and walls. This is a way that you could protect from people you don’t know to look at your information.
2. Block people that you don’t want to show your information to. You can simply go to their photograph and there should be a block option for you to choose. When this is activated, this person no longer to be able to see anything that related to your account and this a great options to avoid people that is bothering you.
3. When you block a person, there will be a window pops up and ask you for the reason. You must REPORT them if they have cyber stalking or harassment. It is important to REPORT if this is really happening, because people will not stop if no one reports.
4. Only add people that you really know and this is the best internet security in any ways. By building your list to 1000 of people doesn’t mean you really have a big group of friends. Think what is your purpose for using this Face Book, if you just want to keep on adding people, I am so sure you will not put any personal or photos in here, however, if you are use this as for your friends, then you should stop adding people you don’t know for security reasons.
5. Do not buy anything through Facebook. I know there are lots of applications that you need to pay for, but try to ignore it and use the “FREE” things they offers. It is not clever to give out your financial information to 3rd party just because you want to send a picture of a birthday cake to your friends

Follow those simple rules if you want to keep your facebook account safe.Obey the RULES and TERMS of Facebook.



In order to protect your Facebook account against hackers check this site for full info how to set up your settings.


DONT SHARE YOUR PERSONAL INFORMATION WITH ANYBODY NO MATHER HOW GOOD YOU KNOW THEM.THEY MIGHT NOT STEAL YOUR ACCOUNT BUT THEIR PC CAN BE INFECTED AND THAT MEANS BOTH ACCOUNTS ARE COMPROMISED !!!













Protect Your Computer from Spyware and Adware



Adware is software that displays advertisements on your computer. These are ads that inexplicably pop up on your display screen, even if you're not browsing the Internet. Some companies provide "free" software in exchange for advertising on your display. It's how they make their money.


Spyware is software that sends your personal information to a third party without your permission or knowledge. This can include information about Web sites you visit or something more sensitive like your user name and password. Unscrupulous companies often use this data to send you unsolicited targeted advertisements.



Is Your PC Affected by Spyware?


The main problem that most people notice with either kind of program is that they cause performance issues with their computers. For example, Internet Explorer might not work properly any more, your computer might hang more frequently, or your computer might slow down significantly. Removing spyware successfully is difficult enough to make preventing it in the first place a priority.
Unauthorized adware and spyware usually install on your computer covertly by using one of two methods:
Tricking you into clicking a link that installs it. Links to spyware can be deceptive. For example, a Web site that's trying to push spyware onto your computer might open a window that looks like a Windows dialog box, and then trick you by installing when you click a Cancel button to close the dialog box. Sometimes, spyware pushers will put a fake title bar in an empty window, and then install spyware when you try closing the window.
Installing freeware that includes it. For example, you might install a free file-sharing program that surreptitiously installs spyware on your computer. File-sharing programs can be a major conveyor of adware.
For full info and how to protect your pc from threats check this site.
Keep in mind some kinds of adware can break your anti-spyware tools.






PHP For the Absolute Beginner



This area is intended for everyone new to PHP. It opens with a series of informal, entertaining tutorials written by Vikram Vaswani, founder and CEO of Melonfire. These tutorials build on a previously-published 5-part series which has now been updated and extended to embrace PHP 5, making parts of it suitable for those of you who already have worked with PHP 4 in the past.


If you want to learn about elementary PHP 4 or basic PHP 5 visit this site for more info.

What is Aspect-Oriented Software Development?


Aspect-Oriented Software Development (AOSD), sometimes just called Aspect-Oriented Programming (AOP), is a new approach to software design that addresses modularity problems that are not handled well by other approaches, including Structured Programming and Object-Oriented Programming (OOP). AOSD complements, but doesn't replace those approaches.
Typical enterprise and internet applications today have to address "concerns" like security, transactional behavior, logging, etc.. The subsystems that provide these services can be implemented in a modular way. However, to use these services, you must insert the same "boilerplate" code fragments into various places in the rest of the application to invoke these services. This violates the "don't repeat yourself" (DRY) principle and it compromises the overall system modularity, because the same invocation code is scatteredthroughout the application.
For example, if you want to control access to certain services in your application, you could insert authorization-checking boilerplate at the beginning of every method that needs this control. Because this redundant boilerplate appears in many places in the code, it would now be difficult and error prone to modify or replace this security approach later, should that become necessary. Also, your application code is now tangled with code for the security (and probably other) concerns, which both compromises clarity and makes it hard to reuse your code in another context, since you would have to drag along the same security approach, which may not be appropriate.
Because concerns like security typically cut across a number of application module boundaries (e.g., classes). We call them cross-cutting concerns.
Note that the loss of modularity is at the intersection between the different concerns. AOP restores modularity by developing the cross-cutting concerns, or aspects, in isolation and then combining them with other modules using declarative or programmatic mechanisms that are modular. That is, the points of intersection are defined once, in one place, making them easy to understand and maintain. The other modules require no modifications to be advised by the aspects. This "intersection" process, sometimes called weaving, can occur at build or run time. AOSD weaving is a key innovation that provides very fine grained query and composition semantics. Where traditional code linking has the ability to resolve method and variable names, weaving adds the ability to replace method bodies with new implementations, insert code before and after method calls, instrument variable reads and writes, and even associate new state and behavior with existing classes, typically for adding "mixin" behaviors.

For more info check AOSD web site.

Friday, March 4, 2011

Iphone jailbraking !


Unlocking vs Jailbreaking

Jailbreaking and unlocking the iPhone are two different hacks which allow you to take control of your mobile device in different ways. Jailbreaking is a type of hack that lets you install unapproved third-party applications on your iPhone or iPod Touch from searchable repositories provided by apps like Cydia and Icy. Unlocking, on the other hand, is a hack that lets you use your iPhone on another cellular network. Here in the U.S., that means you can use the iPhone on T-Mobile instead of AT&T. You have to first jailbreak your phone before you can unlock it, but you don't have to unlock a phone in order to jailbreak it.
Unfortunately, what was once a relatively simple process has gotten more complex over time as new iPhone models were introduced and new hacking tools were being put out by multiple parties, often with confusing names like Pwnage Tool, Purplesn0w and redsn0w. With each release of iPhone firmware, it seems as if there's a whole new lexicon of terms to master and new procedures to follow. The 3.1.2 jailbreak is no exception. However, this jailbreak works on all versions of the iPhone and even on the latest iPod Touch

Full tutorial and software downloads you can find on this great site.

Thursday, March 3, 2011

Keylogger !

I know most of you are new to the concept of keyloggers. For some of you, this might be the first time you heard about the term “keylogger”.A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard.
FAQ about keylogger are:
What is a Keylogger?
How Keylogger works?
How to install the keylogger?
Can I be traced back if I install the keylogger on some other computer?
-- Answers on this questions you can find on great site i discovered here.




The most popular keyloggers you can find on this site and they are not free.Price is around 30$-100$ or you can download free one here.This free version is mostly for home use.
note: dont use it for criminal activity and i am sure you all already know that :)