Saturday

Hacking Passwords Of Protected Sites

There are many ways to defeat java-script protected websites. Some are very simplistic, such as hitting
[ctl-alt-del ]when the password box is displayed, to simply turning offjava capability, which will dump you into the default page.You can try manually searching for other directories, by typing the directory name into the url address box of your browser, ie: you want access to www.target.com .
Try typing www.target.com/images .(almost ever y web site has an images directory) This will put you into the images directory,and give you a text list of all the images located there. Often, the title of an image will give you a clue to the name of another directory. ie: in www.target.com/images, there is a .gif named gamestitle.gif . There is a good chance then, that there is a ‘games’ directory on the site,so you would then type in www.target.com/games, and if it isa valid directory, you again get a text listing of all the files available there.
For a more automated approach, use a program like WEB SNAKE from anawave, or Web Wacker. These programs will create a mirror image of an entire web site, showing all director ies,or even mirror a complete server. They are indispensable for locating hidden files and directories.What do you do if you can’t get past an opening “PasswordRequired” box? . First do an WHOIS Lookup for the site. In our example, www.target.com . We find it’s hosted by www.host.com at 100.100.100. 1.
We then go to 100.100.100.1, and then launch \Web Snake, and mirror the entire server. Set Web Snake to NOT download anything over about 20K. (not many HTML pages are bigger than this) This speeds things up some, and keeps you from getting a lot of files and images you don’t care about. This can take a long time, so consider running it right before bed time. Once you have an image of the entire server, you look through the directories listed, and find /target. When we open that directory, we find its contents, and all of its sub-directories listed. Let’s say we find /target/games/zip/zipindex.html . This would be the index page that would be displayed had you gone through the password procedure, and allowed it to redirect you here.By simply typing in the url www.target.com/games/zip/zipindex.html you will be onthe index page and ready to follow the links for downloading.
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
(DISCLAIMER)XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
The Info Above Is Lame!!!. I Dont Condone The Use Of This Document In A Malisous Manner. I Suggest That U Dont Do it But U Do What Ever U Want. I Will Not Be Responsible For Any Thing That Might Happen To U If U Use This.

Share your PC’s internet connection using Bluetooth

GnuBox is a small, free software that allows you to access the internet from your phone using your computer’s internet connection – without paying any fees (like GPRS) to your operator, and at speeds up to 400 kbit/sec. You can use Bluetooth or the USB cradle for connecting to the PC.
This has existed for Nokia phones for a while, but not for SonyEricsson P800/P900/P910. Now a new version is available for devices using UIQ 2.0 and up.
Some 3rd party apps (like Opera) were working out-of-the-box with PC suite, but not the bundled applications (Messages, SyncML, etc.) They do work with GnuBox.
Below you can find an unsigned sis file for 3rd edition devices. You need to sign this file with a proper certificate (DevCert, etc) to be able to install it. Otherwise, it won’t work.
Please read all the steps in document carefully
I have successfully tested GnuBox For 3rd Edition on Nokia n73 n80 with WIDCOMM Bluetooth Driver.
Download here ::
read me : http://rapidshare.de/files/38763618/How_to_setup_an_internet_connection_on_Symbian_phones_using_Bluetooth.zip
Download here ::
GnuBOX : http://rapidshare.de/files/38763609/gnubox_s60v3.zip

Restart Your Friends Phone Using Sms !!

you or your friends might have received a sms with something written at the top and after pressing the down key 2 or 3  times the cellphone gets restarted.everyone thinks this is because of some virus infection or something like that…this sms works only in certain Nokia cellphones.its not at all a virus infection or something its a bug in the phone that makes it to restart itself
here is the trick to restart ur friends mobile via sms; with this trick only 1110,1110i,1112,1100,2100 can be restarted. just type 79 inverted commas in text msg and send it to ur friend having cells mention above and see what happens.
Post to Twitter

HACKING ON YAHOO MESSENGER

This tutorial will tell you how to hack yahoo messenger while you are engaged in chatting with some person.While you are chatting through yahoo messenger, Yahoo will hide the IP addresses of all the computers that are connected through the Yahoo messenger application to the chat room.So it is not possible to directly find out the IP of the person you want to hack.Then how to get the IP address? Yes it is still possible to Hack the IP address during the Yahoo messenger chat.The procedure to Hack Yahoo messenger is discussed in detail below.
While you are chatting via yahoo messenger the communication between you and the person you want to hack, takes place indirectly via Yahoo server and not directly.It is not possible to hack Yahoo messenger directly to get the IP address.So to hack his IP, you must establish a direct communication with him.So,how to do this? It’s easy.Just start chatting with some one via Yahoo messenger.During the process of chatting send him a big file.Now the file transfer takes place directly between your computer and the victim’s computer(via yahoo messenger application).So now, you are ready to go. Here’s the step-by-step process to hack Yahoo messenger and get the IP address of the person .
  • Go to the COMMAND PROMPT (START>>>RUN>>>Type CMD).
  • Here Type “netstat -n” (without quotes).
  • Here local address is your own IP and the foreign address is the IP address of the recipient with whom you are connected via yahoo messenger (There may be multiple recipients and hence multiple foreign addresses).
  • Now send him the file.
  • Check the output by typing the command “netstat -n” (without quotes).
  • Assume the output is something like this.
TCP 127.0.0.10:5101 124.55.23.11:1246 ESTABLISHED
Here 124.55.23.11 is the IP address of the person with whom you are chatting and 1246 is the port number where connection is established.That’s It! You have now hacked Yahoo messenger to get his IP address.
Once you hack Yahoo messenger and get his IP address you can use any of the Remote Administration tools or perform NETBIOS HACKING.
NOTE: Some times there are chances where in the file transfer gets encrypted (takes place via yahoo server itself).So in this case the above hack may fail to work.

Downloading Locked Contents From Scribd

In Scribd, If the uploader disabled the download option, you will not be able to download files for offline use and they can only be accessed online. How do you download locked or restricted files or documents from Scribd? There is a workaround using which you can get any locked files from any website. Downloading restricted Flickr Photos will be the next one…
Here is an example for the locked file..its a powerpoint presentation…

If you don’t know about Scribd, it is a best place to search for any e-books, Documents or presentations etc on a particular topic. it has a huge data base of Documents and files which are free to download and share.
You cannot download these files if they are locked by the user. But using a simple virtual printer software, you can create PDF files out of online data by printing the online document in PDF format. Primo PDF  and Universal Document Converter are the best software to do this job. Get it here..

Universal Document Converter

Primo PDF

  • Download and Install the software, go to the document you want to download
  • choose the tiled view option

  • Click on the Print option.
  • In the resultant window, choose Primo PDF or Universal Document Converter as printer and and then click Print.

That’s it and you are done. You will get the file in the PDF format if you are using Primo PDF  and in UDC you can choose the extensions and file types..
I personally prefer UDC to Primo…
This trick can be useful for people who are not registered in Scribd and want to download files on the fly. If you encounter any problem downloading the document, get Microsoft XPF Document Viewer and select it instead of PDF and the .XXPF file can be converted into different formats using Zamzar

Friday

Remove The New Autorun.inf Infection Mannualy..

Here we will discuss how to remove autorun.inf virus which is cause of opening of your drives in separate window when u click on the drive name in my computer or shows up different icons for the drives other than the default..
There is a Trojan/virus (either the Win32/Pacex virus or the Win32/PSW.Agent.NDP trojan) that uses those two files.
Here is how you can get rid of them:
1) Open up Task Manager (Ctrl-Alt-Del)
2) If wscript.exe is running, end it.
3) If explorer.exe is running, end it.
4) Open up “File | New Task (Run)” in the Task manager
5) Run cmd
6) Run the following command del #:autorun.* /f/a/s/q with other drives in turn
where # is replaced by drive name e.g-C, D, E..etc
Be careful with this command it can delete your all data one by one from your hdd if executed wrongly, so place your mouse on x position of cmd prompt windows and if it starts deleting your files close it…

11 Best URL Shortening Services

Tiny.cc
Customizable URL: Yes
Tracking: Yes
301 Redirect: Yes
Unique Features: Highly customizable and easy to handle


tinyurl.com
Customizable URL: Yes
Tracking: No
301 Redirect: Yes
Unique Features: Toolbar button


cli.gs
Customizable URL: Yes
Tracking: Yes
301 Redirect: Yes
Unique Features: Stats are private, real time and very detailed, geotarget URLs based on country of visitor, bookmarklet.


zi.ma
Customizable URL: Yes
Tracking: Yes
301 Redirect: Yes
Unique Features: Stats are private, real time and very detailed, geotarget URLs based on country of visitor, bookmarklet.


bit.ly
Customizable URL: Yes
Tracking: Yes
301 Redirect: Yes
Unique Features: Saves copy of page linked to, tracks “conversations”, Twitter search fo uses of shortened URL, bookmarklet, import to Google spreadsheets


twurl.nl 
Customizable URL: No
Tracking: Yes
301 Redirect: No
Unique Features: Most popular items linked in last hour, bookmarklet, built in to Twhirl


is.gd
Customizable URL: No
Tracking: No
301 Redirect: Yes
Unique Features: Really bleeping short URLs, bookmarklet, Firefox plugin, built in to Twhirl


snipurl.com 
Customizable URL: Yes
Tracking: Yes
301 Redirect: Yes
Unique Features: Popular snips, snip search, RSS feed for snips, export to Excel, claim snips before you registered, edit snips


poprl.com
Customizable URL: No
Tracking: Yes
301 Redirect: No
Unique Features: Most POPular links, top domains, public stats, search, must register with Twitter account


ad.vu 
Customizable URL: No
Tracking: Yes
301 Redirect: No
Unique Features: Optional ads that share revenue, scheduled Tweeting, *use your own domain name as the link URLs, bookmarklet, Option to use ad.vu


tr.im
Customizable URL: Yes
Tracking: Yes
301 Redirect: Yes
Unique Features: Uses Twitter or identi.ca info for login, bookmarklet


budurl.com
Customizable URL: Yes
Tracking: Yes
301 Redirect: No
Unique Features: Detailed, real time stats (*if you upgrade) this is the only service with fees but there is a free version, **uses 307 redirect

Download As Premium User From Many Filehosting Sites..!!

This summary is not available. Please click here to view the post.

Crack Windows XP Password


Windows Password Crack
Have you ever tried to log into a Windows computer for a few minutes and you finally realize that you forgot the password?
There’s a way to crack the password and it doesn’t involve reformatting and reinstalling Windows.
The solution is called @stake LC4 (formerly L0phtCrack), however since Symantec stopped development of L0phtcrack, I’m going to let you in on a program called LC5.
Just like L0phtCrack, LC5 attacks your Windows machine with a combination of dictionary and brute force attacks.
LC5 can crack almost all common passwords in seconds. More advanced passwords with numbers and characters takes longer.
The main purpose of the LCP program is user account passwords auditing and recovery in Windows NT/2000/XP.
I haven’t tested it against Windows Vista yet, so I’m not sure if it will work. Your mileage may very either way.
How it works:
Windows NT, 2000 and XP passwords are stored as encrypted hashes. LC5 attacks these hashes with hundreds of passwords per minute.
Eventually the correct password will be sent and then displayed to the screen.
Good intentions:
  • System administrators can find weak passwords within minutes. Sys admins can then change the passwords to make them more secure.
  • LC5 can be used to access computers of users who forget passwords.
  • In companies, it can be used to access computers of employees who have left the company.
Bad intentions:
  • Hackers can use LC5 to
    sniff passwords over networks.
  • Hackers can install this application onto a primary domain controller and steal hundreds of passwords within minutes.
Please note that I am not the author of this software. Be advised that if you use this software, you do so at your own risk without any warranty.
Download LC5 (v5.04):
Software License: LCP is a freeware program. The program may be distributed under condition of saving all files contents and structure of installation package.
Instant Solution to Login To Windows
There is another solution that works instantly to remove all Windows Passwords.  It will Remove, Unlock and Bypass lost/forgotten passwords including Administrator for Windows Vista, 2000, 2003 XP and NT.

Copy and Paste Faster



Are you getting the best perfomance out of your system? Let CopyFaster bring out the best in your hard drive!CopyFaster is a software utility that enables Windows Explorer to copy big files faster when copying to and from the same hard drive. CopyFaster is faster because: • Less seeking – CopyFaster’s finer control over the copying process causes less time-consuming movement of the hard disk head. CopyFaster will try to read from the same section of the hard disk (where the head is positioned) multiple times before causing the head to move to another position (which is time consuming). • Uncached file access – CopyFaster bypasses Windows 2000’s file cache which normally speeds up repeated access to the same file, but is less useful for big files. Bypassing the file cache prevents extra wasted memory-to-memory copying from occurring

Facts : Bill Gates [copied from a source...thought itz usefull for u guys...]


1. Bill Gates earns US$250 every SECOND, that’s about US$20 Million a DAY and US$7.8 Billion a YEAR!
2. If he drops a thousand dollar, he won’t even bother to pick it up bcoz the 4 seconds he picks it, he would’ve already earned it back.
3. The US national debt is about 5.62 trillion, if Bill Gates were to pay the debt by himself; he will finish it in less then 10 years.
4. He can donate US$15 to everyone on earth but still be left with US$5 Million for his pocket money.
5. Michael Jordan is the highest paid athlete in US. If he doesn’t drink and eat, and keeps up his annual income i.e. US$30 Million, he’ll have to wait for 277 years to become as rich as Bill Gates is now.
6. If Bill Gates was a country, he would be the 37th richest country on earth.
7. If you change all of Bill Gate’s money to US$1 notes, you can make a road from earth to moon, 14 times back and forth. But you have to make that road non-stop for 1,400 years, and use a total of 713 BOEING 747 planes to transport all the money.
8. Bill Gates is 40 this year. If we assume that he will live for another 35 years, he has to spend US$6.78 Million per day to finish all his money before he can go to heaven.
Last but not the least: If Microsoft Windows’ users can claim US$1 for every time their computers hang because of Microsoft Windows, Bill Gates will be bankrupt in 3 years !!!!!!! !!!!

Installing Windows Xp/Vista/seven From USB

So Windows 7 beta is out the door and you are ready to begin your beta experience.  Over the next few months there will be additional builds for Windows 7 (x86 and x64) as well as Windows Server 2008 R2 and that leads to a lot of installs and a lot of DVD burning and useless DVDs as soon as a new build is out.  So why not install from USB or whatever other removable media your computer can boot from?  Insert your removable media into a Windows XP or Vista PC and run the following commands from an elevated command prompt.
  1. diskpart
  2. list disk (find the disk number for the removable media)
  3. select disk #
  4. clean
  5. create partition primary
  6. select partition 1
  7. active
  8. format fs=fat32 quick
  9. assign letter=y (or any free drive letter)
  10. exit
Once that is complete mount the ISO and run the following command.
xcopy x:\*.* /s/e/f y:\
Where “x” is the drive letter of the mounted ISO.  Once complete boot off the device and install the OS.  When a new Windows 7 or 2008 R2 build is released, simply delete the contents, rerun the xcopy command and you are ready to go again.  As a note this also works for Windows Vista and Server 2008 but you already figured that out :)
You can grab the Windows 7 and Server 2008 beta (as of January 9th, 2009) at http://www.microsoft.com/windows/windows-7/ and there are plenty more Windows 7 resources coming to the TechNet Springboard site as well!

Top 10 Windows Hacking Tools-Must Have Collection

This is the Collection of Best Windows Hacking Tools:
1. Cain & Abel – Cain & Abel is a password recovery tool for the Microsoft Windows Operating System. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.
2. SuperScan – SuperScan is a powerful TCP port scanner, pinger, resolver. SuperScan 4 (Current Version) is a completely-rewritten update of the highly popular Windows port scanning tool, SuperScan.
3. GFI LANguard Network Security Scanner – GFI LANguard N.S.S. is a network vulnerability management solution that scans your network and performs over 15,000 vulnerability assessments. It identifies all possible security threats and provides you with tools to patch and secure your network. GFI LANguard N.S.S. was voted Favorite Commercial Security Tool by NMAP users for 2 years running and has been sold over 200,000 times!
4. Retina – Retina Network Security Scanner, recognised as the industry standard for vulnerability assessment, identifies known security vulnerabilities and assists in prioritising threats for remediation. Featuring fast, accurate, and non-intrusive scanning, users are able to secure their networks against even the most recent of discovered vulnerabilities.
5. SamSpade – SamSpade provides a consistent GUI and implementation for many handy network query tasks. It was designed with tracking down spammers in mind, but can be useful for many other network exploration, administration, and security tasks. It includes tools such as ping, nslookup, whois, dig, traceroute, finger, raw HTTP web browser, DNS zone transfer, SMTP relay check, website search, and more.
6. N-Stealth – N-Stealth is a commercial web server security scanner. It is generally updated more frequently than free web scanners such as whisker and nikto, but you have to pay for the privilege.
7. Solarwinds – Solarwinds contains many network monitoring, discovery and attack tools. The advanced security tools not only test internet security with the SNMP Brute Force Attack and Dictionary Attack utilities but also validate the security on Cisco Routers with the Router Security Check. The Remote TCP Reset remotely display all active sessions on a device and the Password Decryption can decrypt Type 7 Cisco Passwords. The Port Scanner allows testing for open TCP ports across IP Address and port ranges or selection of specific machines and ports.
8. Achilles – The first publicly released general-purpose web application security assessment tool. Achilles acts as a HTTP/HTTPS proxy that allowsa user to intercept, log, and modify web traffic on the fly. Due to a cyber squatter, Achilles is no longer online at its original home of www.Digizen-Security.com…OOPS!
9. CookieDigger - CookieDigger helps identify weak cookie generation and insecure implementations of session management by web applications. The tool works by collecting and analyzing cookies issued by a web application for multiple users. The tool reports on the predictability and entropy of the cookie and whether critical information, such as user name and password, are included in the cookie values.
10. Netcat (The Network SwissArmy Knife) – Netcat was originally a Unix utility which reads and writes data across network connections, using TCP or UDP protocol. It is designed to be a reliable “back-end” tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities.
Stay Updated With Hackersorigin!!!!!

How to remove shared documents folder from My Computer

Have you ever wondered how to remove “Shared Documents” from your My Computer window in Windows XP? If you don’t use that feature, it seems rather silly to have it wasting space on the screen when all you really want to do is open up your hard drive or flash drive.
We can disable the shared documents icon easily using a registry hack or through TweakUI, the only problem is that it will also remove the regular user documents from the folder as well…
image
Once the setting is applied, you’ll no longer see either document folder:
image
If you are fine with that, then continue reading.
Manual Registry Hack
Open up regedit.exe through the Start Menu Run box, and then browse down to the following path, creating the keys if they don’t exist.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
image
On the right-hand side, create a new DWORD value with the following values:
  • Name: NoSharedDocuments
  • Value: 1
You’ll have to logoff and back on for the settings to take effect.
The Easy Method
Instead of bothering with the registry, you can simply use Microsoft’s Tweak UI utility… click on “My Computer” on the left-hand pane, and then uncheck “Files Stored on This Computer” from the right side, and click Apply.
image
That’s pretty much all there is to it.
Note: If you are using XP Professional, you could also use the Group Policy editor… the setting is found under User Configuration \ Administrative Templates \ Windows Components \ Windows Explorer, and it’s called “Remove Shared Documents from My Computer”

Send Fake Sms From Your Nokia Phone

There is a loop hole in Nokia mobile phone using which you can send fake SMS messages. i.e you can send a SMS to your friend by changing the from address to some random e-mail address.
Nokia has a feature called SMS e-mail
This feature is used to send e-mail by SMS. You network operator will have a SMS e-mail server.
You are supposed to send a SMS to the SMS mail server with the To address, subject and e-mail body as a partof the SMS text body by following the conventions provideded by your Network operator.
You SMS server will read the To address, Subject and the Body of e-mail from the SMS message and forwards the mail to the corresponding e-mail address.
If im confusing you, better take a look at this example
Compose a SMS with the following text
“to:xyz@gmail.com sub:hello body: hi test msg” excluding the double quotes
send the SMS to 9915 which is the SMS server for Airtel network, India.
Airtel will forward the SMS to the corresponding mail address xyz@gmail.com
Some Nokia phones have a seperate feature for this e-mail. So we can use this feature to send Fake messages
Fake Message steps:
step 1:
Compose a SMS msg with the text you want to send
Step 2:
Go to sending Options-> Send to E-mail
Step 3:
in the text box that appears key in an e-mail address which has to be a fake from address in your message.
Step 4:
Subject text box appears. Leave it blank or type in something you want
Step 5:
E-mai Server text box
This is the place where spoofing happens.
Instead of typing your e-mail server number 9915
Type in the mobile number of your friend/enemy you want to spoof
Then send the message
yipee !!!! You are done !!!! You ve sent a fake SMS message
Your friend/enemy will receive the message.
But the Sender number will be replaced with the e-mail address you gave.
Your number will not be displayed in the sender part.
I tried this trick in Nokia 6060 and Nokia 6610.
In other phones also the steps must be the same but the menu layout might change.

Converting FAT or FAT 32 partition to NTFS

Your hard drive must be formatted with a file system such as FAT, FAT32 or NTFS so that Windows can be installed on to it. This system determines how files are named, organised and stored on the drive. If you’re not using it already, NTFS (New Technology File System) is recommended for Windows XP because of the additional functionality it offers. If your PC came with Windows XP pre-installed then there’s a chance that you’re already using NTFS. If you’ve upgraded from Windows 98 or Windows Me you may still be using FAT or FAT 32. The option to change over to NTFS would have been available during the upgrade process. Don’t worry if you skipped this as it’s possible to convert at any time from within Windows XP without losing any data.
The recommended option
There are a number of features in Windows XP that will only work if the NTFS file system is present, which is why it’s suggested you make use of it. File and folder permissions, encryption and privacy options are just some of those you’ll be able to access. In particular, those of you who have set up user accounts will find NTFS invaluable. For instance, if you continue to use FAT or FAT32 anyone with physical access to the drive will be able to access the files and folders that are stored there. However, with NTFS you’ll be able to use a level of encryption (Professional Edition only) that will enable you to protect your data.
You’ll also find NTFS more reliable in that it’s more able to recover from disk errors than its FAT or FAT32 counterparts. A log of all disk activity is kept so should a crash occur, Windows XP can use this information to repair the file system when your PC boots up again. To find out what file system you’re using, open My Computer, right-click your main hard drive and choose Properties. Take a look at the General tab to see confirmation of the file system that’s in use.
Convert now
You can use the convert tool in Windows XP to change the file system on your hard disk from FAT or FAT32 to NTFS. The whole process is safe and your existing data won’t be destroyed. To begin, click Start -> Run, type cmd and press [Return]. At the command prompt type convert c: /fs:ntfs and press [Return] (where ‘c’ is the letter of the drive you’re converting). When you try and run the convert utility, it’s likely that Windows XP will be using your paging file so the process won’t be completed immediately. Therefore, you’ll see a brief message on screen informing you that the conversion will take place instead the next time Windows starts up. Having restarted, the Check Disk utility will run, the conversion will be performed automatically and you may find that your PC will reboot twice more.
The benefits
With your drive now running NTFS, it’s time to take advantage of the new options that are available. Having created a number of different user accounts you can now control the level of access that’s granted to individual users. For example, there are going to be certain files and folders that you’ll want some users to be able to access but not others. If you have Windows XP Professional Edition you can do this immediately.
Right-click any file or folder, choose Properties and select the Security tab. A dialog will be displayed showing the names of all your users. Alongside will be two columns which enable you to select levels of access for each of them, the permissions include Full Control, Modify, Read and Write. You can then check the appropriate box to determine whether or not to Allow or Deny a particular permission. For Windows XP Home Edition users, the Security tab won’t be immediately available. To access this option you’ll need to restart your PC, pressing [F8] until a menu appears. Next select Safe Mode and wait for Windows XP to start up. You can then set your options in the same way.
Another feature is NTFS compression. It’s quick and seamless as your file or folder is decompressed automatically when you access it. (Don’t confuse this with a Zip compression utility where the files need to be extracted before they can be accessed.) Although you may have used NTFS compression on a file or folder, there’s no way of telling just by looking at it. To remedy this, open My Computer, click Tools -> Folder Options and select the View tab. Under Advanced settings, scroll down and check the option ‘Show encrypted or compressed NTFS files in color’, then click Apply and OK. Take a look at your compressed items in My Computer and you’ll see the text label has changed from black to blue. Something else that’s exclusive to Professional Edition users is the Encrypting File System (EFS). You can use this to protect your important data so that no one else can read it. Your encrypted files and folders will only be accessible when you have logged into your user account successfully.

Google URL Shortener: goo.gl

URL shortening services were initially popular because web addresses started to get long and links would break when sent in an email.   However, as microblogging services like Twitter have become popular, an increasing number of services and applications, including tracking & metrics, have been added to the basic URL shortening features.
Now at the latest..There was a news about Google’s new url shortening service..
The core goals of this service are:
  • Stability – ensuring that the service has very good uptime
  • Security – protecting users from malware and phishing pages
  • Speed – fast resolution of short URLs
Google URL Shortener is currently available for Google products and not for broader consumer use.