Nov 10, 2008

Use Rapidshare without any wait

In our daily life we download a lot of stuff from the,but sometime it shows you have to wait for sometime.But now you can download anything without any wait.

After you put up your download - or someone else along go to the download page, click Free - on this next page where the timer comes one - view source.Go down the view source to the end - grab the gobbly gook looking text (I cant get to it right now cause I am locked out for an hour otherwise I would show an example - its obvious - near the bottom).

go to CODE

paste it on the third line down (bottom line) hit submit - second line down will now have an actuall link.

You have requested the file phpscripts_01.rar (18627251 Bytes). This file has been downloaded 450 times already.
IMPORTANT: Download-accelerators
are only supported with a PREMIUM-Account!

ERROR: Please enable JavaScript.


You want just that part

It's quite simple, when you want to download something that's on rapidshare, do the following:

1. go to the rapidshare link and click 'free' (so not the premium thing)
2. on this page, there's a counter that counts down from a specific amount of time before it displays the download link, view the source of this page
3. at the end of the source, there's a line with lots of numbers and % symbols, copy this line
4. go to and paste the line you copied, onto the line
5. click encode now
6. direct link is shown


Oct 22, 2008

Add URL bar to your Windows XP taskbar

You can add an Internet URL address bar to your Windows XP taskbar. Doing so will let you type in URLs and launch Web pages without first launching a browser. It will also let you launch some native Windows XP applications in much the same way as you would via the Run menu (so you could type in calc to launch the calculator or mspaint to launch Microsoft Paint. Here's how you add the address bar:

1. Right-click on the taskbar, select Toolbars, and then click Address.

2. The word Address will appear on your taskbar.

3. Double click it to access it.

4. If that doesn't work, your taskbar is locked. You can unlock it by right-clicking on the taskbar again and uncheck Lock the Taskbar.

NOTE: You may also need to grab the vertical dotted lines beside the word Address and drag it to the left to make the Address window appear.

Oct 17, 2008

Boost up your firefox speed

Yes, firefox is already pretty damn fast but did you know that you can tweak it and improve the speed even more.That's the beauty of this program being open source.

Here's what you do:
In the URL bar, type “about:config” and press enter. This will bring up the configuration “menu” where you can change the parameters of Firefox.

Note that these are what I’ve found to REALLY speed up my Firefox significantly - and these settings seem to be common among everybody else as well. But these settings are optimized for broadband connections - I mean with as much concurrent requests we’re going to open up with pipelining, you’d better have a big connection.

Double Click on the following settins and put in the numbers below - for the true / false booleans - they’ll change when you double click.

browser.tabs.showSingleWindowModePrefs – true
network.http.max-connections – 48
network.http.max-connections-per-server – 16
network.http.max-persistent-connections-per-proxy – 8
network.http.max-persistent-connections-per-server – 4
network.http.pipelining – true
network.http.pipelining.maxrequests – 100
network.http.proxy.pipelining – true
network.http.request.timeout – 300

One more thing,Right-click somewhere on that screen and add a NEW -> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0”. This value is the amount of time the browser waits before it acts on information it receives. Since you’re broadband - it shouldn’t have to wait.

Now you should notice you’re loading pages MUCH faster now.

Oct 13, 2008

Create your own shortcuts for shutdown and rebooting:

First, create a shortcut on your desktop by right-clicking on the desktop, choosing New, and then choosing Shortcut. The Create Shortcut Wizard appears. In the box asking for the location of the shortcut, type shutdown. After you create the shortcut, double-clicking on it will shut down your PC.But you can do much more with a shutdown shortcut than merely shut down your PC. You can add any combination of several switches to do extra duty, like this:

shutdown -r -t 01 -c "Rebooting your PC"

Double-clicking on that shortcut will reboot your PC after a one-second delay and display the message "Rebooting your PC." The shutdown command includes a variety of switches you can use to customize it. Table 1-3 lists all of them and describes their use.

I use this technique to create two shutdown shortcuts on my desktop—one for turning off my PC, and one for rebooting. Here are the ones I use:

shutdown -s -t 03 -c "Bye Bye m8!"
shutdown -r -t 03 -c "Ill be back m8 ;)!"

What it does

Shuts down the PC.

Logs off the current user.

-t nn
Indicates the duration of delay, in seconds, before performing the action.

-c "messagetext"
Displays a message in the System Shutdown window. A maximum of 127 characters can be used. The message must be enclosed in quotation marks.

Forces any running applications to shut down.

Reboots the PC.

Hope you found this post useful

Oct 9, 2008

Hack Windows Screen Saver Password

This is an interesting hack and not many people know about it.This requires no canned hacking tool, we will crack the password manually!!! First of all, why do we need to crack the Windows Screen Saver? How does it restrict us? If a Screen Saver is password protected, then whenever it is turned on, then in order to turn it off, you need to enter a password.It does not allow us to do anything on a system until and unless we enter the password. We will keep seeing the screen saver until we authenticate ourselves by entering the password.No not even CTRL+ALT+DEL works in this case. Windows stores the Screen Saver password in the user.dat file in the Windows directory.

If you have multiple profiles on your system then it is stored in the user.dat file in the c:\windows\profiles\username directory.(On Win 3x systems it is stored in the control.ini file The user.dat file constitues the registry of the Windows system, thus we can say that the Windows Screen Saver Password is stored in the registry.First of all, you need to change the attributes of this file and make it editable by right clicking on it and unselecting the Read Only Option else you will not be able to edit it.Once this is done, open this file in WordPad (Any text editor will do except MS WORD And Notepad.)Now look for the string: ScreenSave_Data You will find an even number of characters after Data, this is the Screen Saver Password encrypted and stored in the hex system.Each pair or hex values represent a single ASCII plaintext character.This means that if there are 10 hex values then the password is of 5 characters, each pair of Hex values standing for a single plaintext ASCII character.So in order to get the Plaintext password you just need to decrypt these hex values into ASCII.

Oct 7, 2008

Cracking Windows Password

Cracking The Windows Login Password:The Windows ( 9x) password is passed through a very weak algorithm and is quite easy to crack.Windows stores this login password in *.pwl files in the c:\windows directory.The .pwl files have the filename which is the username coresponding to the password stored by it.A typical .pwl file would be as follows:

Note: This .pwl file has been taken from a Win98 machine running IE 5.0

###############CUT HERE##############


p u.ÐX+|rÐq”±/2³ Êå¡hCJ‚D × `ÍY¥!íx}(qW¤ãƱ
4+\¾õ+%E°ËÔýmÇÔ ÞI»‚ B àלøÐ…'@

############CUT HERE#############

Lets go through the contents of this .pwl file.I am not sure what the first line signifies, but my guess would be that it is the Name to which the computer is registered to.The next four lines have just been entered by Windows and are not readable.The last two lines is the password but in the encrypted form.There is no way to get the plaintext password by just studying the Windows algorithm and these lines.To actually crack the password you need a simple but mewl cracker coded in C called Glide.I have included the code below.If you have a sound C knowledge you can study the code and actually experience how a password cracker works and how a password is encrypted in Windows i.e. more about the Windows encryption algorithm.

Newbie Tip: All exploits, crackers, mail bombers practically everything related with Hacking has been written in either Perl or C. If you really want to be considered an elite hacker, you have to know how to program, without a sound knowledge of either C (C++) or Perl you cannot hack successfully.Almost all exploits available on the net have an important part edited or missing, without which it has no use.Some exploits may be needed to be edited in order to be run in your platform.In order to do all this programming is needed.

If anybody needs this program then he or she can post your e-mail id as a comment.I will sent it to your id.

Oct 5, 2008

Cracking Password

Hello friends in the last post i gave you some knowledge about the passwords and in this post I am going to tell you some ways with the help of which you can easily crack password and became a password cracker.But all of this requires patience.

The most common method of password cracking is password guessing, although it requires a lot of luck, it can be successful sometimes.To start to guess the password, you first need to gather all kinds of info about the victim.(See the Guidelines of keeping a password for more details.)The most common and the most successful method of password cracking is the use of password crackers.Now what exactly are password crackers? Now to understand what a password cracker is and how it works, you first need to understand how a person is authenticated.

When you are creating a new account or registering or running the setup(basically whenever you create a new account by entering the Username and Password.) you might be asked for the Username and Password.The username is mostly stored in plain text, but the password that you enter is stored in an encrypted form.Now when you enter the password, it is passed through a predefined algorithm and is thus encrypted and is stored on the hard disk.

So next time when you use the account and enter the password, the text (password) you type is passed through the same algorithm and is compared with the earlier stored value.If they both match, the user is authenticated else the authentication fails.The algorithm that is used to encrypt the password is a one way algorithm, by that I mean that if we pass the encrypted password through the reverse algorithm, we will not get the original plain text password.

Lets take an example to make it more clear: Say your plain text password is xyz123 and it is passed through an algorithm and stored in the a file as 0101027AF. Now if you get his encrypted password and know the algorithm which xyz123 is passed through to get 0101027AF, you cannot reverse the algorithm to get xyz123 from 0101027AF.

When you are typing in your password, the computer does not display it in plaintext but instead shows only stars i.e. ******** so that if someone is shoulder surfing, he cannot find out the password.The text box has been programmed in such a way.On most forms Unix you will not even see the asterisk marks and the cursor will not move, so that neither does a person shoulder surfing, find out the password nor does he find out the length of the password.

Password Crackers are of two types-:
Brute Force and Dictionary Based.

Dictionary Based password Crackers try out all passwords from a given pre defined dictionary list to crack a password.These are faster but more often than not are unsuccessful and do not return the password.As they do not try out all combinations of possible keys, they are unable to crack those passwords which have symbols or numbers in between.

Brute Force Password Crackers try out all combinations of all keys which can be found in the keyboard (i.e. Symbols, Numbers, Alphabets) both Lower Case and Upper Case.These kinds of Password Crackers have a greater success rate but take a long time to crack the password.As they take all possible keys into consideration, they are more effective.Now that you know the two main types of password crackers lets see how they work.As passwords are encrypted by a one way algorithm, password crackers do not extract the password from the file but instead take the combination of letters, encrypt them by passing the characters through the original algorithm and compare this value with the stored encrypted value.If these two match, then the password cracker displays the password in plain text.

Oct 3, 2008

Introduction to Password

First of all, what exactly is a password.A password is best described as a verification or an authentication tool or object. Passwords are used to ensure legal and proper access to only those people who have the authority or the permission to view the data.A password is required in many places,you are required a password, to access your Inbox, you are required a password to dial up to your Internet Service Provider and in some organisations you also need to enter a password to start the system.At all places the Username and Password pair is used to authenticate the user.Usernames are used to identify the user and the password is used to authenticate the user and for every unique username there is a unique password.Take the example of the Lock and Key, for every lock you need a unique key to open it and enter.Here the Lock acts as the Username and the password would be the key.So passwords are as important as the key of your house.

Your house remains safe as long as only you who is the rightful owner has the key and no one else finds it.Similiarly, the concept behind passwords is that it is only the rightful owner who knows the password and no one else knows it.Everyday we hear about password stealing,computer break ins etc.Sometimes the user chooses very lame passwords which are easily guessed by hackers.There are certain guidelines which I would like to tell you which you must keep in mind while choosing a password:

1. Never keep your password same as your Username
2. Never choose your own name, Date of Birth, spouse's name, pet's name, child's name etc as your password, those are the first ones which are tried by a hacker.
3. Some people are so lazy that they keep their password to be 'Enter' (Carriage return).
4. Try to choose a word which is not in the dictionary and contains both numbers and alphabets,and if possible use both Lower Case and Upper Case alphabets and also symbols like
(#,$,%,^ etc) as they can be cracked only be brute force password crackers which take too long a time to crack.
You may say that choosing of weak passwords is responsible for the large number of hacks, but people themselves are the weakest chain in the whole authentication process.Most people usually use lame passwords like those I mentioned above, and those who use excellent passwords are not able to remember them and then write the password down on a piece of paper and stick it on their monitor.One should try his level best to remember weird passwords if he wants to keep his system secure.The best places where you can find the passwords, would be beneath the keyboard, behind the CPU or even on the sides of the monitor.Some people have trouble remembering the large number of passwords that they are asked for,while using various services, as a result they use the same password everywhere.Thus knowing even a single password might help in some cases.

Oct 1, 2008

Beginners guide to Hack UNIX Part-2

Things to do when you are in: Some of the commands that you may want to try follow below:

who is on (shows who is currently logged on the system.)
write name (name is the person you wish to chat with)
To exit chat mode try ctrl-D.
EOT=End of Transfer.
ls -a (list all files in current directory.)
du -a (checks amount of memory your files use;disk usage)
cd\name (name is the name of the sub-directory you choose)
cd\ (brings your home directory to current use)
cat name (name is a filename either a program or documentation your username has written)

Most Unix programs are written in the C language or Pascal since Unix is a programmers' environment.
One of the first things done on the system is print up or capture (in a buffer) the file containing all user names and accounts. This can be done by doing the following command:

cat /etc/passwd

If you are successful you will a list of all accounts on the system. It should look like this:

root:hvnsdcf:0:0:root dir:/:
joe:majdnfd:1:1:Joe Cool:/bin:/bin/joe
hal::1:2:Hal Smith:/bin:/bin/hal

The "root" line tells the following info :
login name=root
hvnsdcf = encrypted password
0 = user group number
0 = user number
root dir = name of user
/ = root directory

In the Joe login, the last part "/bin/joe " tells us which directory is his home directory (joe) is.
In the "hal" example the login name is followed by 2 colons, that means that there is no password needed to get in using his name.

Conclusion: I hope that this file will help other novice Unix hackers obtain access to the Unix/Xenix systems that they may find. There is still wide growth in the future of Unix, so I hope users will not abuse any systems (Unix or any others) that they may happen across on their journey across the electronic highways of America. There is much more to be learned about the Unix system that I have not covered.
I will try to cover them in few next post.

Beginners guide to Hack UNIX Part-1

Hello friends in this post all references made to the name Unix, may also be substituted to the Xenix operating system.

Brief history: Back in the early sixties, during the development of third generation computers at MIT, a group of programmers studying the potential of computers, discovered their ability of performing two or more tasks simultaneously. Bell Labs, taking notice of this discovery, provided funds for their developmental scientists to investigate into this new frontier. After about 2 years of developmental research, they produced an operating system they called "Unix".

Sixties to Current: During this time Bell Systems installed the Unix system to provide their computer operators with the ability to multitask so that they could become more productive, and efficient. One of the systems they put on the Unix system was called "Elmos". Through Elmos many tasks (i.e. billing,and installation records) could be done by many people using the same mainframe.
Note: Cosmos is accessed through the Elmos system.

Current: Today, with the development of micro computers, such multitasking can be achieved by a scaled down version of Unix (but just as powerful). Microsoft,seeing this development, opted to develop their own Unix like system for the IBM line of PC/XT's. Their result they called Xenix (pronounced zee-nicks). Both Unix and Xenix can be easily installed on IBM PC's and offer
the same functions (just 2 different vendors).

Note: Due to the many different versions of Unix (Berkley Unix, Bell System III, and System V the most popular) many commands following may/may not work. I have written them in System V routines. Unix/Xenix operating systems will be considered identical systems below.

How to tell if/if not you are on a Unix system: Unix systems are quite common
systems across the country. Their security appears as such:

Login; (or login;) password:

When hacking on a Unix system it is best to use lowercase because the Unix system commands are all done in lower- case.

Login; is a 1-8 character field. It is usually the name (i.e. joe or fred) of the user, or initials (i.e. j.jones or f.wilson). Hints for login names can be found trashing the location of the dial-up (use your CN/A to find where the computer is).

Password: is a 1-8 character password assigned by the sysop or chosen by the user.

Common default logins:

login; Password:

root root,system,etc..
sys sys,system
daemon daemon
uucp uucp
tty tty
test test
unix unix
bin bin
adm adm
who who
learn learn
uuhost uuhost
nuucp nuucp

If you guess a login name and you are not asked for a password, and have accessed to the system, then you have what is known as a non-gifted account. If you guess a correct login and pass- word, then you have a user account. And, if you guess the root password, then you have a "super-user" account. All Unix systems have the following installed to their system: root, sys, bin, daemon, uucp, adm.Once you are in the system, you will get a prompt. Common prompts are:




But can be just about anything the sysop or user wants it to be.

In the next post we will see its remaining part.

Sep 30, 2008

10 reasons why PCs crash Part-2

Now here are the remaining reasons for the crash of your PC and their solution.

5.Fatal OE exceptions and VXD errors:Fatal OE exception errors and VXD errors are often caused by video card problems.These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.
If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

* Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.
Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).
Look up your video card's manufacturer on the internet and search for the most recent drivers for it.
6.Viruses:Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.
A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus programme is McAfee VirusScan by Network Associates ( Another is Norton AntiVirus 2000, made by Symantec (

7.Printers:The action of sending a document to print creates a bigger file, often called a postscript file.Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.
8.Software:A common cause of PC crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.
9.Overheating:Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from or
CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10.Power supply problems:With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

If you followed on these solutions then i am definitely sure that you can save your PC from being crashed.

Sep 29, 2008

10 reasons why PCs crash

Hello friends this is my first post and in this post i am going to tell you about the reasons why your PC crash down and in addition to this i also provide you their solution so that by following them you can prevent your PC from crash.

Fatal error: The system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1 .Hardware conflict:The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity. To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2 .Bad Ram:Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 .BIOS settings:Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4 .Hard disk drives:After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

* Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).
Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

In the next post i will told you remaining reasons for the PCs crash.

Introducing Blog

Hello friends this is my first blog and this blog is for all those that love the hacking and want to know more about hacking like what is hacking,how it did and how can i became the expert in this field.The answers to all these problem is here,in this blog i will told you about hacking on various operating systems like on XP,UNIX and Linux.Here i will also told you how to hack passwords,how to hack networks and many other things.In addition to this if you are a regular internet user then i will told you some interesting tips that will definitely make your surfing a great fun.