Google
 

HACKING E-MAIL Ids IS EASY

HACKING AN E-MAIL ID is very very easy, you need not be a high-level programmer, no need any skills in programming languages and there is no need of any HACKING SOFTWARES or Tools.

Even a 8th std school kid can hack a e-mail using the following steps. All you need is :COPY & PASTE" skill, if you how to copy and paste, then you can HACK e-mails easily.

STEP:1 open he website of ORKUT or HOMAIL or REDIFF MAIL or YAHOOMAIL, its your wish. if you want to HACK yahoo id, then go o www.yahoomail.com

STEP2: Now press "CTRL+U", you will get the source code of yahoo page. NOw press "CTRL+A" copy all the text.

step3: Open NOTEPAD, now paste it here. SAVE it as YAHOOFAKE.HTML

STEP4: Now open the the file yahoofake.html using noepad, here you ll find a code which starts with (form action="xxxxxxxxxxxxxxxxxxxxxxxxxxxxx")

delete the above code and paste the following code
click here to see the codes

got the codes???

step 5: In the place of "israransari007@yahoo.co.in" type your mail id.

step6: NOw save the file.

WE ARE ALL MOST DONE!!!

you can test whether its working or not. just open the yahoofake.html file and in the place of user name and password, type some thing and sign in. you will get the passwords in your mail id.. check out..

STEP7: NOW UPLOAD the yahoofake.html page using GOOGLE PAGE Creator or using www.50webs.com

step7: after uploading i give the link to your friends, once they sign in you ll get the passwords of your friends id.

you too can become a hacker!!! HAPPY HACKING!!!

NOTE:This is strictly for educaional purpose, am not responsible for any theft of passwords. :)

Job Tips For The Frustrated Job Seeker

There is nothing more frustrating and depressing when you are out of work and trying to find a job and your job search is going no where. Don't feel bad, you are not alone and there is a good reason why searching for a new job can be so difficult. There is no doubt the job market has changed. 30 years ago when I applied for my first job I remember answering an ad in the paper, calling and speaking to a real person, going in for the interview, filling out a application, had the interview and was offered the $3.75 and hour shipping job. Things are not that simple today. Back then there was no voice mail, no email, you mailed in a typed resume, who had a fax at home? You called and talked to a real person. You may of filled out a application but not the dozen forms you need to today. And you never had to prove you were legally allowed to work in the United States.

Today if you are looking for a job how to you stand out in the impersonal hiring environment that exists in most companies. If you apply online you are competing against dozens if not hundreds of others. Competition is stiff for a most jobs and a human may never even see your resume. Are there steps you can follow that will improve your chances? After being unemployed for several months after 3 years of self employment and becoming more depressed and frustrated in not finding a job, I took my job search to a new level which finally paid off in a new job.

I had been self employed for 3 years but after a divorce and starting life over, my self employment was no longer working. I had to bite the bullet and start looking for a job. The first mistake I realized was my resume was not working. I had updated it to reflect my self employment which was not related to my previous career. I was trying to find a position similar to my previous career in the graphics and computer support industry. By starting my work history with my self employment it made it look like I had been out of the industry even longer and my skills even more outdated. I was just shooting myself in the foot. I changed my self employment to reflect my computer skills so while I had been out of the industry for awhile I wasn't out of touch. Some employers have doubts about people who have been self employed. They think they are going to go back to their own business or worse they only want a job so they can use company resources for their own gain. In my case I was able to explain that I had an opportunity to work at home and spend time with my preschool son, it had been for family reasons. Most employers respect that.

To begin with you really need to take a hard look at your resume. If you have always worked in one area and are applying for a position similar to those you have had in the past then your resume may just need some updating and polish. There are a number of good books and websites on resume writing. If you really need help then a resume service may be money well spent.
How many resumes do you have? There is no reason you can't have several. I was applying for a variety of unrelated positions. I would of looked "over qualified" or my experience would of been too unrelated for the position if I stuck with just one standard resume. I created a "general" resume that listed a variety of skills that could fit any number of non specific jobs. You can have one that is very specific for the industry you are applying for and there is no reason you can't change it to a specific company especially if it will be scanned in and checked for "keywords" Some companies scan for keywords or buzzwords related to the position, their company or industry. Even if you are the most qualified person for that position, if your resume doesn't have those keywords, it will never get seen.

In addition to having a few different resumes you should have it in several different formats also. If you need to mail it in then a nice easy to read printed resume is in order. Same if you will be faxing it in. If you email your resume then your cover letter will be the body of your email and your resume will be attached. Most employers request it be in a word .doc format or text but you can also use a pdf format. If you have your own website why not post it online with a link in your email. That way if your attachment can't be read they can print it off the internet. For example the link could be http://www.yourwebsite.com/yourresume.html. You should also have a unformatted text only resume for uploading to online job sites.

Be sure to include several ways to contact you. Home phone, cell phone, email. I had the unfortunate luck of having my cell phone and my home phone cut off for non payment within a few days of each other. As luck would have it someone I sent a resume to tried to contact me and couldn't get through. They did send me a email saying they couldn't reach me. I was able to call them and get a interview. Don't leave anything to chance. And if they leave you a message get back to them ASAP while your resume is still on their desk. When you get a interview, be on time, be prepared, do your research about the company you are interviewing with. You can usually find most everything you need off their company website. Come prepared with extra resumes, helpful if you have to fill out a application. Also have copies of your updated references. It is best to have more than 3. Some companies want professional references including past employers, others want personal references of persons not related to you. Be prepared for both.

Where to find a job? Dig! And keep digging! You may never know where one will show up. In some ways the internet has made job searches easier with a variety of job sites to search. You should probably set up accounts at the large sites like hotjobs and monster which will allow you to post your resume and apply directly to postings Also take a look at sites like indeed.com. They are a search engine of sorts for jobs. They search several jobs sites at once. Saves time from going to each site. Post your resume so employers can find you. ASK! Don't be afraid to let everyone you know that you are looking for a job. Drop a email to anyone who might know someone who might have a job opening. You might be surprised how many people really do want to help you. Network your pants off! If you don't ask no one can help you. Search everyday. Try and send out at least one resume a day if not more. Pick up the early edition of the Sunday paper. Send out 5-10 at a time. And keep sending them even after you have interviews set up. You can easily fall behind two or three weeks if you stop sending resumes in hopes of that job offer coming through. Nothing better than telling someone, "I'm sorry I accepted another position" Apply for every job you are remotely interested in even if you don't think you are qualified. Every job listed always has a laundry list of qualifications and requirements. In a perfect world they would find the perfect person that would match every requirement. But employers know that person doesn't exist and they are looking for someone who closely matches and they feel will be a good fit. At the worst you will never hear from them. At the best they will offer you a job or maybe something different within their company. You can always turn it down. Even if it turns out to be something you really don't want to do, it might help you get by for awhile until a better position comes along. Never be afraid to apply to any job!

Most of all don't give up hope, the right job will happen at the right time. Remember to take care of yourself. Go for a walk, get plenty of rest, do something you enjoy just for yourself. As long as you keep moving in a forward direction, if someone asks you what you have been doing to find a job you can proudly say "this is what I have been doing" Persistence will pay off. Good luck.

Tips for Saving Money on Car Insurance

Car insurance is required by all licensed drivers but many of them don’t know how to find the best rates available. Being complacent and purchasing car insurance without carefully investigating your options or maintaining the same car insurance for the remainder of your life could mean that you are paying too much for your car insurance. Comparison shopping, ensuring that you are receiving all the discounts you qualify for and maintaining a clean driving record are just a few of the money saving tips that can save you a fortune on car insurance.

Comparison shopping for car insurance, even after you are already insured, cannot be underestimated. It is critical that you investigate all of your options before choosing an insurance provider to ensure that you are getting the best possible rate on your car insurance. There are so many factors considered in car insurance policies such as where you live, your driving record, your age and the type of car you drive just to name a few. With all of these factors to consider, it is very possible that you will find that there is a car insurance provider who will offer you a considerably lower rate than other providers.

Even after you have secured insurance for your car, it is wise to periodically check the rates that other providers will offer you. Car insurance as well as your circumstances are perpetually changing and you may find that the provider who is willing to offer you the best car insurance rate varies periodically. Many car insurance providers offer a host of discounts to their clients who qualify for these discounts. These discounts can relate to your driving record, safety features of your car, your age or other factors.

These discounts can result in a tremendous cost savings on your car insurance policy but while many insurance providers offer these discounts, they don’t always advertise them. This means that you may have to do research to determine what type of discounts you may qualify to receive. Carefully, review your car insurance policy to determine which discounts you are already receiving and then contact your car insurance provider to inquire about other discounts that may be available. For example if your driving record is devoid of accidents or tickets, you may qualify for a good driver discount.

Also, if your car has certain safety features such as daytime running lights, you may also qualify for car insurance discounts. Your age can also qualify you for certain car insurance discounts. Some insurance providers also offer discounts to those who insure their house with the same company as they insure their car. Taking advantage of this type of discount can save you money on both your car and home insurance. Being aware of the discounts that are available and ensuring that you are receiving these discounts, can save you a great deal of money on your car insurance.

Finally, maintaining a clean driving record is very important to receiving the best available car insurance rate. While it is true that each car insurance provider is unique in the factors that contribute to lower rates, the one factor that is consistent among all providers of car insurance is that a clean driving record is critical to your rate. Although accidents are sometimes unavoidable, it is imperative that you adhere to all traffic regulations and that you drive safely at all times. This will reduce the number of traffic violations that you incur as well as the number of accidents that you cause. Following these tips will help you to maintain a clean driving record that will keep the cost of your car insurance low.

Many drivers lament paying their monthly car insurance bill because they feel as though the insurance isn’t necessary. Although car insurance is a financial burden that seems superfluous, it does pay off if you are ever in a serious car accident that has significant financial ramifications. For this reason, you should never consider allowing your car insurance to lapse and it is recommended that you search diligently to find the best available rate on your car insurance.

MP3 Encoding Technology

The MP3 is a complete godsend for anyone who enjoys and appreciates good music. Not only does it afford users the convenience of purchasing music online and ripping from purchased CDs, it also provides the utmost ease in portability. There are more MP3 players on the market than I can name. These players allow you to download hundreds and in some cases thousands of MP3’s to take along with you anywhere. I create MP3 CD’s containing up to 120 of my favorite songs for my listening pleasure in my car. But how can so many audio files get stored on my 800MB (Megabyte) CD?

MP3 Encoders and MP3 converters are the software that creates MP3s by using an MP3 compression and decompression algorithm. For example, an average 3 minute WAV file can be as large as 15MB. Using MP3 encoders and MP3 converters, a large WAV file can be cut down to a much smaller and more portable MP3 file of about 3MB.

MP3 stands for MPEG Audio Layer 3. At layer 3, psychoacoustics principles are used to find and remove all unnecessary sound data, leaving behind only the crucial audio data. By unnecessary sound data I mean all of the stuff that we humans don’t hear anyway. Most people can’t hear sounds above 16 kHz so why would you want it hogging your disk or hard drive space? Non-music audio such as speeches, sermons, audio books and comedy albums, can be reduced even less based on this.

Compression occurs after the essential data has been separated from the redundant data. At this stage, the same amount of data can be stored using fewer bits and less space. The bit rate is the ratio of the number of bits transferred between two devices per second. The higher the bit rate, the higher the sound quality. The lower the bit rate ratio, the lower the sound quality. 192 Kb/s is the most popular bit rate used in peer-to-peer networks. For the most part, MP3 converters and encoders today use variable bit rates. This allows for much better quality audio because the bit rate conforms to the dynamics of the audio frames being stored which in turn keeps more of the important music data.

There are dozens of MP3 compressor and encoder software programs available online and at stores. Some of the main encoding engines are: LAME, Blade Enc, Fraunhofer Encoders and Xing. Deciding which MP3 encoding engine technology is right for you depends on your individual needs and preferences. Blaze Media Pro is an excellent option if you're looking for a powerful, yet easy to use, all-in-one multimedia solution.

Where To Find Free Wedding Music Downloads!!

Do you have everything finalized for the wedding except for the
music? If you're one of those people then this is the article
for you to help determine where to find the music. No more
worrying about what song to play for the first dance, or what
song to play during the father/bride dance. There are numerous
sites that have free wedding music downloads for each situation
during the ceremony and reception party.

When thinking of songs to play at a reception, people often
forget all of the events that occur during a reception. There
are certain songs that are best for cocktail hour or group dance
music and so on. It may not be the biggest deal in the world to
find a certain song for each situation, but it will definitely
help the party flow better if the songs coordinate with the
events.

At wedalert.com, you will find wedding music downloads for each
situation broken down into each category. As you click on a
category, it then brings up a list from A-Z on all the songs and
who they are by. You can watch a music video for some, download
the song, or even purchase certain ones on CD.

By going to this site,
http://www.wedalert.com/songs/cocktail/index.asp, you'll find
all the best wedding songs to keep the party running all night
long. Also on the site, there is a wedding music checklist
provided to make sure that you have a song for all the events
during the ceremony and reception. The great thing about this
site is that you can preview all the songs for free and decide
on which songs suite you best.

Most of the sites on the internet simply try to sell you their
products. There are many sites that allow you to preview
various songs and compile a list of your favorite songs. Then
after that, you can purchase songs individually or buy a whole
CD that has some of the classic wedding songs.

At Brilliant Wedding Pages, there is a list of approximately ten
sites that offer sound clips for wedding songs. This site
consists of links to the ten sites as well as a brief
description of what you will find at the sites. With the link
below, you can view all of these great websites and receive a
list of songs to be played at the joyous occasion:

http://www.bwedd.com/CEBride/CEBNewsletter_67.asp

Included in the list of sites is www.new-wedding-traditions.com
and www.amazon.com. At amazon.com you can simply type in a song
or artist that you're looking for. Or you can even type in a
few keywords such as wedding music, and you'll receive a list of
songs. The great thing about amazon.com is that this site
allows you to preview songs and find the ones you like, and then
save them to your computer after downloading them so you can
listen to them over and over. Then you can collect a list of
free wedding music downloads that fulfill your needs and make a
CD of your own.

Now that you have the tools to find the songs for you, start
searching so that you can be at peace knowing your wedding will
be filled with songs that you chose. There is no other
satisfaction then knowing that your wedding is the way that you
want it.

Top 3 Tips For Buying An LCD TV

I want a larger screen and so do you. There is absolutely no reason for this wanting except for the feeling of power that a large screen gives you. I have no idea why it is, but we all seem to want a larger screen for our TVs these days. The question is, how to get a good deal on an LCD TV without paying a fortune. Let’s give you our top 3 tips on buying an LCD TV.

1)Don’t buy a used one if you don’t have to. The funny thing about these TVs is that their prices drop significantly every month and that if you just wait a little longer, the price you’ll pay for a new TV is probably not going to be too far off from the price that you are going to pay for a used one. A little patience might actually save you some dollars here.

2)Compare features, not just prices. One of our favorite places to go to compare prices on LCD Tvs is ConsumerReports.org. Consumer Reports was rating different items way before the internet even become popular. Remember buying your first real car? I do. And I went straight to Consumer Reports to find out that the Honda Accord was the car to buy (and still is according to CR). Shopping for a high end LCD Tv shouldn’t be any different than shopping for a new car. All the resources are at your disposal, so give it a try. I’m sure you can find some gems of information at CR regarding your LCD Tv purchase.

3)HD is coming, don’t miss out. High definition television has allegedly been “right around the corner” for years. Well, that time may finally have arrived. Some LCD Tvs come HD ready and some do not. Make sure your new LCD TV supports HD so that when it is finally popularized, you can watch the programs utilizing this latest technology.

And by the way, why would someone want to buy an LCD TV over a “Plasma”. And what is a plasma? Are they different than LCDs? Basically yes. The big difference is that they use different technologies to deliver a picture. Both have pros and cons. However, both deliver a large screen experience to the user.

3 Simple Ways To Save A Bunch Of Money When Buying A New Computer!

Looking to buy a new computer?

Overwhelmed by all of the options available to you?

Stressed by the high cost of computers today?

For most people, buying a new computer does not have to be as stressful as buying a new car. Nor does it have to be as expensive. If you’re like most people, and you have a limited budget for buying a computer, then you need to try to get as much computer for your money as possible.

Here are 3 simple ways anyone can save money when buying a new computer:

1) Shop around for best deal.

Sounds pretty obvious. But many people don’t realize they don’t need the fastest, most expensive computer with the most “extras”. In fact, if you are already using an older computer, even the least expensive new computer will be a big upgrade. If you don’t know a lot about computers, you can learn a lot by shopping around. Ask lots of questions, compare prices, compare features, then find the best price. Shop at your local electronics store, and look for the best deals online. You’ll be surprised at how much money you can save by shopping around!

2) Install your own “extras”

Many computers you will find in a store have a lot of extra software already installed. While this is convenient, it is not always the best way for you to save money. Also, while many of these extras sound good, you don’t always need them. You can often find better deals by shopping around separately for your own software extras (such as a word processor, anti-virus, popup blocker, spyware removal, games, etc). And some of these you can get for free. So before you buy the “fully loaded” computer, ask yourself if you really need all the extras, then shop around to see if you can buy a scaled down computer - and get the extras yourself for much less!

3) Don’t buy extended warranty

If you are not a computer “techie”, the extended warranties offered by the computer retailers often sound like a good idea. After all, who wants to be bothered paying for service on a computer after you buy it. But keep in mind that most computers come with a warranty, and most computer problems will either happen at the beginning (when you still have the warranty in effect) or much later (when it might be cheaper to buy a new computer). Technology changes very quickly these days. So consider whether or not it’s worth the inflated price of the extended warranty. And, if you really feel you need the extended warranty, then ask to purchase it at a lower price. Not all retailers will negotiate on the warranty, but some will. And whether you buy the extended warranty or not, make sure you back up all your files periodically, just in case!

If you have an unlimited budget, consider yourself lucky. And if you do business on the computer, make sure you get what you need, while trying to keep the price down. At any price, buying something that does not fit your needs is not a good deal.

Hope you find these tips helpful, and happy computer shopping!

Buying E-books On E-bay: E-bay The One-stop E-book Shop

On September 1995, one of the most prestigious online shopping sites was founded. eBay is unique because it allows online shoppers, either as individuals or as a group, a wide variety of merchandise that they can buy, sell or trade within their community, their nation or even other with other countries.

eBay's merchandise reaches to 44 million things on sale at any given time and is added with more than four million of other things to be sold everyday. Their categories include antiques, collectibles, photography, computers, art, toys, electronics, stamps, jewelry, magazines, comics, pottery, e-books and many more.

Electronic books or more popularly known as e-Books are text materials designed to be portable. They are special books that uses a program that enable readers to read it through their hardware devices - like Personal Computers, laptops, palmtops and/or even mobile phones. They are so accessible and can be transferred from one computer to another using a network.

Since e-Bay is one of the country's leading online shopping site, they also provide a selection on must have e-Books. Shopping for e-Books is fairly easy, but one must need some basic online shopping knowledge before they are able to do so. A great recommended book would be eBay Bargain Shopping for Dummies (can be found at eBay) by Marsha Collier. This book would help all online shoppers who to discover the treasure of eBay shopping. Her book spills the beans on how to outwit and outbid your competition - which is a good way to find discounts on all the items up for grabs.

e-Books can be ordered online and delivered electronically to your computer (or mobile phone). This way, there is no shipping and tax expenses and you get your e-Book at a very low price. There are numerous sites that sell e-books in this manner

On the other hand, Instant e-Books do not require additional software or other readers for customers to be able to immediately start reading their e-Books after installing it. And aside from that, there are many free e-Books and other articles written by "eBay gurus."

With eBay, e-Books are just a click away. What could be greater news to all book lovers out there?

LCD Touch Screen Computer Monitor

Liquid Crystal Display Touch Screen Computer Monitor is a widely used monitor as compared to its counterpart Cathode Ray Tube Computer Monitor. LCD Touch Screen Computer Monitor offers exceptional performance at a fairly reasonable price. This high contrast LCD Touch Screen Computer Monitor is brighter than a normal desktop. LCD Monitors feature a standard interface with a power switch to extend the life of the monitor and a reliable internal power supply for easy hook-up via a standard power cord.

LCD Touch Screen Computer Monitors have a sturdy aluminum case and sealed glass construction. It gives LCD Computer Monitors protection against dirt and moisture. All this makes LCD Touch Screen Computer Monitor the ideal choice for a wide variety of applications. If you just plug the LCD into your Touch Screen Computer in place of a CRT, you’d end up running in minutes. The LCD Touch Screen Computer Monitor is the easiest monitor you can use.

LCD Touch Screen Computer Monitors are very popular for eye pleasing clarity and stunning image quality. Many manufacturers produce lots of designs for a wide array of customer monitor solutions, including desktop, touch screen, and open frame units. LCD Touch Screen Computer Monitors are compact, visually impressive, and offer many different touch screen models to fit your needs. Moreover you can get most of these designs at affordable prices.

LCD Touch Screen Computer Monitor was designed to address the key needs of touch applications, resulting in a product that can truly be called "designed for touch." LCD Touch Screen Computer Monitor has a unique combination of flexibility, reliability, performance, easy installation and a distinctive visual appeal. Most of the LCD Touch Screen Monitors have high quality panel with 140°x140° viewing angle, analog and digital (DVI-D) video inputs.

Broadband Internet for High Speed Download of images and dat

Broadband Internet

What is Broadband Service?

Broadband refers to a connection that has capacity to transmit large amount of data at high speed. Presently a connection having download speeds of 256 kbps or more is classified as broadband. When connected to the Internet such a connection allows surfing or downloading much faster than a dial-up or any other narrowband connections.

What are the benefits of broadband

Fast downloads
At least 4.5 times and upto 140 times faster than dial-up connection
Always on connection
Telephone and Internet access can be used together
No telephone call charges
Cost effective way to access Internet
A host of free content on the web can be downloaded faster

What kind of PC do I need to run broadband

The following minimum is, however, recommended:
Processor 200 MHz (or better)
Operating System Windows 98SE (or higher)
RAM (memory) 32 MB RAM
Free Disk Space 125MB
SVGA monitor
CD-ROM Drive
Network Interface Card(NIC) with 10/100 Mbps Ethernet port with RJ45 socket

What is Broadband

Defining broadband can get complicated

There are many different takes on how to actually define the word: broadband. The first and most obvious way to define it is a transmission medium that allows for multiple pathways and types of data, far exceeding simple voice communication devices. Simply, put it is the ability to access a variety of data through one connection at a reasonable speed.

Where a phone line severely limits the amount of information it can transmit, a broadband line, which has bandwidth greater than 2 mbps, unlike a standard dial-up connection which will only have 56kbps, can allow for a variety of different frequencies and channels to travel down its wide pathway. This makes it optimal for those who play video games on the Internet or are involved in heavy graphics work that they need to import, send and receive along the information superhighway.

The minimum width of a broadband line has become a matter of debate. While initially, the broadband definition was a line that was greater than 2 mbps in width, other experts began asserting that it should be at least 3 mbps wide. Still others complain that at least 20 would be appropriate. But now, broadband services start as low as 1 mbps, for those who are trying out broadband for the first time. So who really knows what the minimum level of bandwidth is needed in order for it to be called broadband? One thing is certain though. DSL service which an range from 256 kbps capacity on the downstream and upstream side up to 1.5mbps, or even higher, is considered a broadband service as well. So are cable television modems, which have similar speeds. So, in reality anything with greater capacity than a narrow line, like a telephone line, which can only hold up to 64 kbps, is technically considered a broadband service.

Broadband services have become all the craze in the past few years. When the Internet started to become more mainstream in the 1990s people were content with simple dial-up Internet services, which used only narrow lines. But as the need for speed became important, especially as files and Web pages became more elaborate, requiring more computer storage space and memory, the need for larger bulks of information being able to be sent and received at a quicker pace became essential. Hence, we have the broadband revolution. Today, hardly anyone uses narrow band service, or dial-up. Broadband Internet access is the name of the game. And if you work in an office it is absolutely essential, as larger chunks of information are frequently sent to and from businesses on a regular basis. Simply put, if you don’t have broadband today, you are probably a person who does not need the Internet for a living. With the number of telecommuting jobs available today, the need for broadband services is only likely to expand greatly.

VoIP QUESTIONS AND ANSWERS

1. What is VoIP and what does it stand for?
2. How do I make a VoIP phone call?
3. What equipment do I need for VoIP phone calls?
4. Are there any differences between making a local call or a long distance call?
5. Who can I call if I am using a VoIP service?
6. Are there any advantages in using VoIP phone service?
7. Will I be able to dial 911 emergency services?
8. Will I be able to use my computer while making a VoIP phone call?
9. Will I be able to take my phone adapter with me while traveling?
10. Does my computer need to be running in order to use VoIP service?
11. How will I know when I receive a phone call over my VoIP service?
12. Who regulates VoIP services?
13. What are the computer system requirements for VoIP?
14. Are free trials normally available?
15. How can I improve the sound quality?

1. What is VoIP and what does it stand for?

VoIP stands for Voice over Internet Protocol and it allows you to place telephone calls over a data network like the Internet. It operates by converting your voice signal from your telephone into a digital signal that can then be transmitted over the Internet. The digital signal is then converted at the other end back to a voice signal that the other party can hear. When you use a phone with an adapter the calls are placed just like a regular telephone. You first hear a dial tone then the call is made. You are also able to place a call directly from your computer using a conventional telephone or microphone.

2. How do I make a VoIP phone call?

Making a VoIP phone call is no different from using a regular land line telephone. You pickup the receiver and listen for the dial tone. You can then dial your number as you always have in the past. The call connects to your high-speed Internet connection and travels to your local telephone company's equipment to a VoIP provider which transport the signal through the Internet to the local provider of the party you are calling. They relay the signal to your parties telephone. As an alternative, you may also place the call using your computer's hardware and software, entering the number through your keyboard. The signal is then sent through your cable modem to your local telephone carrier.

3. What equipment do I need for VoIP phone calls?

Your existing incoming high-speed Internet connection should be sufficient but the higher the connectivity the better the signal.
In terms of hardware, you can hook up an inexpensive microphone to your computer or connect a phone directly to a VoIP telephone adaptor (ATA). Or you can use a phone specially made to work with Internet Voice. This is called an SIP phone. Each SIP phone is a network endpoint, and voice is routed via its IP address. It allows a DID (direct inward dialing) number to move with a user. You can move, add or remove stations and never have to call your interconnect/PBX service company. SIP phones also allow full use of advanced features like voice mail to e-mail and auto attendant.

4. Are there any differences between making a local call or a long distance call?

There are many different calling available for VoIP. The calling rates and fixed plans will vary from one vendor to another depending on the service you select. Please make sure to read all of the fine print associated with any plan that you choose.
One thing to keep in mind, however, is that VoIP can blur the difference between local and long distance by issuing a local number for your Internet phone. This allows you to make LOCAL calls to your home area code from that phone, regardless of where you are geographically. All you need is an Internet connection to plug in your phone, it doesn't matter what Internet provider you use, and you can call your local area code from anywhere in the world without paying long distance rates.

5. Who can I call if I am using a VoIP service?

Your calls can be made to any local telephone number, mobile phone, long distance number, or any international number. You may even use the service to speak with more than one person at a time. More importantly, the person you are calling does not need any special equipment; just a regular telephone.

6. Are there any advantages in using VoIP phone service?

If you are using a broadband internet connection, you don't need to maintain and pay the additional cost for a regular land line just to make telephone calls.
With VoIP you're able to talk to many people at the same time. You can set up conference calls with your colleagues, staff, family and friends.
VoIP allows you to reduce interconnect/PBX fees by enabling you to add, move and remove stations from your network without calling your service provider. In addition, you don't have to buy an expensive phone switch to set up your network. VoIP also offers many advanced calling features from caller ID and call forward to voicemail and distinctive ringing to call tracing and reminder calls, among many others. You can also manage your features through the Internet; log-in and customize services that normally you would have to rely on your provider to change - for a fee of course.
Voice over Internet can lower long-distance fees by assigning a local telephone number to your VoIP phone. You will then be able to take your phone anywhere in the world, plug it into any broadband connection regardless of specific provider, and you can make LOCAL calls to your home area code. Parents can keep in touch with children at college; churches can contact missionaries all over the world; and businesses can connect branch offices in different cities.

7. Will I be able to dial 911 emergency services?

Some Internet Voice services have difficulty seamlessly connecting with the 911 dispatch center or identifying the location of Internet Voice 911 callers. Check with your local VoIP provider to determine if they can provide this service in your area.

8. Will I be able to use my computer while making a VoIP phone call?

Yes you most certainly will be able to use your computer while making calls on your VoIP network.

9. Will I be able to take my phone adapter with me while traveling?

You should be able to use your VoIP service wherever you travel as long as you have a high-speed Internet connection available. Your adaptor should work the same as when you are at home or in the office as long as you have access to a high-speed Internet connection.

10. Does my computer need to be running in order to use VoIP service?

Your computer does not need to be turned on but your broadband connection must be active in order for VoIP to function properly. However, if you are not using an adapter and choose to use a microphone or headset with your computer then your computer must be on.

11. How will I know when I receive a phone call over my VoIP service?

Your VoIP phone will ring like any other telephone.

12. Who regulates VoIP services?

The Federal Communications Commission (FCC) has worked to create an environment promoting competition and innovation to benefit consumers. Historically, the FCC has not regulated the Internet or the services provided over it. On February 12, 2004, the FCC found that an entirely Internet-based VoIP service was an unregulated information service. On the same day, the FCC began a broader proceeding to examine what its role should be in this new environment of increased consumer choice and what it can best do to meet its role of safeguarding the public interest. In November 2004 they ruled that States do not have the jurisdiction to impose taxes on VoIP services, another victory for the consumer.

13. What are the computer system requirements for VoIP?

The specific requirements of any VoIP system must be checked with each individual VoIP provider.

14. Are free trials normally available?

You need to check with your selected VoIP provider to determine if a free trial is available. Most VoIP providers will provide some kind of free trial or conditional free trial period. If you are dissatisfied for any reason you should return the equipment in their original packing boxes together with all shipping paperwork and packing slips to ensure they will honor their warrantee.

14. Will I be able to use VoIP behind a firewall?

You need to ask your network administrator regarding any special setting that are required to function through the firewall.

15. How can I improve the sound quality?

* Speak with a headset instead of a microphone. Better still, use a phone with an adaptor.
* If you are using a microphone, hold it away from the speakers to avoid having the sound from your speakers recirculate into your microphone causing feedback.
* Lower the volume on your speakers.
* Check with your sound card manufacturer to be sure you are using the latest drivers.
* Use a direct phone jack. A split line or extension cord between your phone jack and computer can distort the sound causing an echo.

What is VOIP

VoIP stands for; Voice Over Internet Protocol.

What VoIP does is it converts the voice signal from your telephone into a digital signal that travels over the Internet.

This means NO phone charges! And this is why VoIP is such a buzz word today.

VoIP presents businesses and consumers a like with an option to save on their phone bills.

It is very simple to set up and use, and requires very little equipment.

For instance...If you are calling a regular phone number, the signal is then converted back at the other end. Internet Voice can allow you to
make a call directly from a computer.

If you make a call using a phone with an adaptor, you’ll be able to dial just as you always have,and the service provider may also provide a dial tone.

If your service assigns you a regular phone number, then a person can call you
from his or her regular phone without using special equipment.

What Do You Need To Get Started?

A broadband Internet connection is required to make VoIP calls. Some services
allow you to use a regular telephone, as long as you connect it to an adaptor.

Some companies allow you to make calls from a computer or a VoIP phone that doesn’t require an additional adapter.

If you are calling a regular telephone number, the person you are calling does not need any special equipment, just a phone.

More and more companies are entering the VoIP arena everyday. The two most popular are Vontage and SKYPE.

For a low monthly fee you can make unrestricted calls anywhere without incurring any long distant charges. As you can see VoIP can be a real money saving opportunity for smart consumers and businesses.

It is important to compare plans when considering a VoIP provider. Depending on the plan you might be limited only to other subscribers to the service, or you may be able to call any phone number, anywhere in the world. The call can be made to a local number, a mobile phone, a long distance, or an international number.

What Are Some Advantages of VoIP?

Because VoIP is digital, it may offer features and services that are not available with a traditional phone. If you have a broad band Internet connection, you need not maintain and pay the additional cost for a line just to make telephone calls.

Administrator like account

1-Introduction

This article introduce very simple way to get Administrator like account and do the job and after finish recover your way, after that Get Admin Password later in your home by Cracking, After get the Admin Password Create a hidden user account and do all your jobs free, and Explain how to make a USB Storage Device Bootable corresponding to any system boot, and how to bypass Mother Board password by Default Passwords, and how to extract it if you are in the system

2-To Hackers / Security Systems Engineers

First All must know that both Hackers / Security Systems Engineers Are 2 faces to the same coin Any way, I try this on Windows XP SP2 I want all to try it on Windows Server 2003, Windows Vista Any Windows NT and POST a Message to make all know what versions exactly this idea can apply for

3-Close Look to hole

Microsoft stores all Security Information in many files but the main file is the SAM file (
Security Accounts Manager)! this file contain critical information about users account you can explore the folder
$windir$\system32\config
You will find all things and may discover some thing new, but what amazing here is that the file is available, so we can apply our idea
shot1 You will Not be able To copy them Under XP

4-Dose Microsoft Know and Why!?

Yes Microsoft Know all things, and done on purpose why? I always for many years ask my self why Microsoft doesn’t do real security on their systems from the CD setup to all security aspects In the system, I found(my opinion may wrong)that they need to achieve 2 strategic things

1-They need their software spread and all depend on it and in one day when they feel that they are the One The security will done and all money will go to One Pocket

2-They Forced/Like to Make Some Organizations Hack other systems

Proof:
They can make this File SAM Unavailable by storing the information in FAT, FAT32, NTFS Areas (Sectors reserved by The Operating SYSTEM to Store the Addresses of the files on the HardDisk File Allocation Table) So that it is hard to extract. But they don't!!!!!

5-Understand the Idea

The Idea is simple I will explain it manually and it can then be programmed it is so easy here is the idea

The SAM file is available and the SAM file contain a Security Information, so I created a Free Windows XP SP2 Logon account (Administrator Account without password) that means when windows Lunch it Will enter directly to the system without asking about any password And windows will store this Account in The SAM file on My PC So the SAM file on My PC contain an Account will Make you enter Directly to the Windows, so I will take My SAM File and Replace (by renaming, we will need the original file to recover our way) It with the other SAM File in The Other System or Machine So When you restart It will make you enter directly to the Windows With Administrator Like Account ,do what you need and then back all things to the previous state. All These Steps will be under other system bootable DOS, Knoppiex, Windows Live CD, Because Windows XP will not make u able to copy the Files

6-Get Admin Like Account (The Simple Way)


1- Download My 2 SAM files I Include them in Downloads
2- Go to the target Machine , and try to Access it and Boot from any device CD-ROM, Floppy.
3- After Get Access to the Boot Command prompt c:> or Boot Live OS CD, Go to the windows folder $windir$\system32\config And Copy the SAM File and System File (we will need it later) To other folder, Then go to $windir$\repair copy SAM file
And then Rename the 2 SAM Files to SAM1 in their original places
4- Copy My SAM/config File and Paste it in the windows folder $windir$\system32\config Copy My SAM/Repair File and Paste it in the windows folder $windir$\repair (may this step not required)
5- Reboot and Make windows enter Normally
6- Yeah, No You are in The System
7- Copy the files in step 3 to Floppy Disk or Flash Stick Or Send it to your mail via Internet
8- After finish repeat step 2 and delete My SAM files and Rename Both SAM1 to SAM
9- Reboot , Congratulation you recover your way

7-Crack the SAM-Know the real Admin Password and Apply Hint 8

There is many ways I will introduce 2 ways and explain 1 After you get the SAM File and System File there are Programs That extract the Accounts and their passwords, depending on the idea of cracking the HASH (the HASH is one way encryption method) so that The program will generate random passwords and convert them to HASH and then compare it with the HASHES in the SAM File , so it may take a long time but for fast you will pay more money for ready made HASHES with their user names and passwords the 2 program are

1-L0phtcrack v4.0 (LC4 alternate name) the most famous on the NET
2-SAMInside http://www.insidepro.com/I include on the Downloads

I will explain fast SAMInside

shot1
This is the main window press Ctrl+O or by mouse click Import SAM and SYSTEM

shot1
Window will open to import the 2 files and the program will start to crack the Accounts and get them, and then display users names and their passwords

Any other tool will do the job try all and select your best I Explain here SAMInside because he give me results with 6 character only password and get it FAST

8-Creat a Hidden User Accountn

Windows NT / Windows 2000 and Windows XP has a security setting to hide accounts from the Logon Screen/Control panel users accounts
shot1 Press
Ctrl+Alt+Delet
Give you another Access Dialog


Steps:

1-After getting Admin Password enter to the system
2-create an Account with password
3-click start - > Run - > type Regedit press Enter
4-Go to
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\ CurrentVersion\Winlogon\SpecialAccounts\UserList

shot1

5- Create a new DWORD Value on the UserList
6-Name it with Name of Account to be Hidden
7-set the Value Data of this DWORD Value to 0 to hide it /1 to appear it
8- close Regedit and Reboot
9- Press Ctrl+Alt+Delete when logon Screen Appear another login dialog appear type You hidden user name and password and press Enter

Note:

1- the account profile will be visible in \Documents and Settings, But it will be hidden from Logon Screen and User Account in the control panel

2-there is other method that
Inject your Account directly to the Admin SAM without know the Admin Pass, but believe me you don't Expect the result, so if you want try it (if the password hard to get)

9-USB Boot for FAT32, NTFS or any File System


HP Always amazing me to do this we need 2 tools

1- HP USB Disk Storage Format Tool v 2.0.6 I include in Downloads If u want to find more go to http://www.hp.com/
2- NTFSDOS Professional Boot Disk Wizard I include in Downloads If u want to find more go to http://www.winternals.com/
shot1
Just connect your USB Storage
steps:
1- Prepare a Startup Disk or Startup CD , Or any Equivalent
2- In the HP tool select the Device->your USB Storage
3- Select File System FAT or FAT32
4- Check "create a DOS startup disk" checkbox and then select option "using DOS System Files Located at"
5- brows your location
6- Click Start
7- Now you have a Bootable USB Storage Device
8- Now in the NTFSDOS Professional Boot Disk Wizard follow the wizard and you will get a NTFS bootable USB Storage

Why we need NTFS ?
If the Partition of the Windows System is NTFS so with normal Startup you will not be able to access any files because the File System is not Recognized by MS-DOS when we install NTFSDOS Professional on the bootable disk it will allow you To Access any File Under NTFS

Note:
Make sure that the option in Mother board Setup of First Boot "USB-Hard Disk" if you want to boot from a USB

Xp Tricks Contd.. More of Dem

Make your folders invicible...:)


1)Right Click on the desktop.Make a new folder
2)Now rename the folder with a space(U have to hold ALT key and type 0160).
3)Now u have a folder with out a name.
4)Right click on the folder>properties>customize. Click on change icon.
5)Scroll a bit, u should find some empty spaces, Click on any one of them.

click ok


Easily Disable Messenger


Go into: C:/Program Files/Messenger. Rename the Messenger folder to "MessengerOFF".
Remove Messenger

· Go to Start/Run, and type: "rundll32 setupapi,InstallHinfSection BLC.Remove 128

%SystemRoot%\INF\msmsgs.inf"

Turn Off Autoplay for Program CDs


How can you stop Windows XP from launching program CDs?
· Click Start, click Run, type GPEDIT.MSC to open Group Policy in the Microsoft
Management Console.

· Double-click Computer Configuration, double-click Administrative templates,
double-click System, and then click Turn off autoplay.

· The instructions on your screen describe how to configure this setting. Click
Properties to display the setting dialog.

· Click Enabled, and choose CD-ROM drives, then click OK, to stop CD autoplay.
This setting does not prevent Autoplay for music CDs.

Change Drive Letters in Windows XP

When you add drives to your computer, such as an extra hard drive, a CD drive, or a
storage device that corresponds to a drive, Windows automatically assigns letters to the
drives. However, this assignment might not suit your system; for example, you might have
mapped a network drive to the same letter that Windows assigns to a new drive. When you
want to change drive letters, follow these steps:

· Right-click My Computer, and then click Manage.

· Under Computer Management, click Disk Management. In the right pane, you'll see
your drives listed. CD-ROM drives are listed at the bottom of the pane.

· Right-click the drive or device you want to change, and then click Change Drive
Letter and Paths.

· Click Change, click Assign the following drive letter, click the drive letter you
want to assign, and then click OK.


Do Not Highlight Newly Installed Programs

Tired of that annoying little window that pops up to tell you that new software is
installed? If it gets in the way when you're logging off, turn it off completely. To do
this:

· Click Start, right-click at the top of the Start menu where your name is displayed,
and then click Properties.

· In the Taskbar and Start Menu Properties dialog box, on the Start Menu tab, click
Customize.

· Click the Advanced tab, and then clear the Highlight newly installed programs check
box.

· Click OK, and then click OK again

Change the Default Opening Folder in Windows Explorer

By default, Windows Explorer opens showing the My Documents folder. To change the
default setting so that all top-level drives and folders are shown, follow these steps:

· Click Start > Programs > Accessories, then right-click Windows Explorer, and click
Properties.

· Under Target field, which reads %SystemRoot%\explorer.exe, add to make the line
read:

%SystemRoot%\explorer.exe /n, /e, /select, C:\

Close Multiple Windows

If you just opened a number of separate, related windows (a folder inside a folder,
and so on), there's an easier way to close them all than one-at-a-time:
· Hold down the shift-key as you click the X caption button in the upper-right corner
of the last window opened. Doing so closes that window and all windows that came before it

change fat -> ntfs

To change ur File system from command prompt
type: convert c:/fs:ntfs(ex:'c' is the drive letter)

20 things you didn't know about Windows XP

You've read the reviews and digested the key feature enhancements and operational changes. Now it's time to delve a bit deeper and uncover some of Windows XP's secrets.




1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type 'systeminfo > info.txt'. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).

2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run... and type 'gpedit.msc'; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care -- some may stop your computer behaving as you wish. (Professional Edition only).

3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll,LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.

4. XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.

5. For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options -- they're all far too baroque to go into here.

6. XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (it's OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry and don't bother.

7. You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.

8. XP will treat Zip files like folders, which is nice if you've got a fast machine. On slower machines, you can make XP leave zip files well alone by typing 'regsvr32 /u zipfldr.dll' at the command line. If you change your mind later, you can put things back as they were by typing 'regsvr32 zipfldr.dll'.

9. XP has ClearType -- Microsoft's anti-aliasing font display technology -- but doesn't have it enabled by default. It's well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry HKEY_USERS/.DEFAULT/Control Panel/Desktop/FontSmoothingType to 2.

10. You can use Remote Assistance to help a friend who's using network address translation (NAT) on a home network, but not automatically. Get your pal to email you a Remote Assistance invitation and edit the file. Under the RCTICKET attribute will be a NAT IP address, like 192.168.1.10. Replace this with your chum's real IP address -- they can find this out by going to www.whatismyip.com -- and get them to make sure that they've got port 3389 open on their firewall and forwarded to the errant computer.

11. You can run a program as a different user without logging out and back in again. Right click the icon, select Run As... and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.

12. Windows XP can be very insistent about you checking for auto updates, registering a Passport, using Windows Messenger and so on. After a while, the nagging goes away, but if you feel you might slip the bonds of sanity before that point, run Regedit, go to HKEY_CURRENT_USER/Software/Microsoft/Windows/Current Version/Explorer/Advanced and create a DWORD value called EnableBalloonTips with a value of 0.

13. You can start up without needing to enter a user name or password. Select Run... from the start menu and type 'control userpasswords2', which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK. An Automatically Log On dialog box will appear; enter the user name and password for the account you want to use.

14. Internet Explorer 6 will automatically delete temporary files, but only if you tell it to. Start the browser, select Tools / Internet Options... and Advanced, go down to the Security area and check the box to Empty Temporary Internet Files folder when browser is closed.

15. XP comes with a free Network Activity Light, just in case you can't see the LEDs twinkle on your network card. Right click on My Network Places on the desktop, then select Properties. Right click on the description for your LAN or dial-up connection, select Properties, then check the Show icon in notification area when connected box. You'll now see a tiny network icon on the right of your task bar that glimmers nicely during network traffic.

16. The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.

17. You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetised groups by View, Arrange Icon By... Show In Groups.

18. Windows Media Player will display the cover art for albums as it plays the tracks -- if it found the picture on the Internet when you copied the tracks from the CD. If it didn't, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.

19. Windows key + Break brings up the System Properties dialogue box; Windows key + D brings up the desktop; Windows key + Tab moves through the taskbar buttons.

20. The next release of Windows XP, codenamed Longhorn, is due out late dis month The next big release is codenamed Blackcomb and will be out in 2010/2011

TopTricks for Windows Xp-ETHICAL HACKING

Disabling Scandisk


When Windows is not shut down correctly, it will perform an AutoCheck
using CHKDSK on the next restart.

AutoCheck is executed after a short time delay. AutoCheck can be
disabled or delayed by tweaking a few Registry settings.
Run ‘Regedit’ from ‘Start Menu|Run...’
Go to ‘HKEY_LOCAL_MACHINE|SYSTE
M|CurrentControlSet|Control|Session
Manager’.
Create a new DWORD value, or
modify the existing value, called
“AutoChkTimeOut” and set it according
to the value data below.
Value Name: AutoChkTimeOut.
Data Type: REG_DWORD (DWORD Value).
Value Data: Time in Seconds or 0 to disable
(default = 10).
Exit your registry, you may need to
restart or log out of Windows for the
change to take effect.

Monitoring the system


There are various applications you can use to monitor the state of your
system at any given time. One of them is a program called CoolMon (www.coolmon.org) where you can monitor about 22 of
the most geekiest system parameters like the temperature and speed of your system fans, the number of processes running, the total available memory on your hard disk and RAM, CPU utilization, etc. Each
of these can be individually con. gured to appear on the interface. Best of all, this monitoring happens in real time. Better still, the program is free.
If you need more details than what is offered by Windows System Information or the Device Manager, try out an application called Everest Home Edition (www.lavalys.com). This application hunts through your hardware and software setup and extracts every piece of information you might need about your processor, motherboard, graphics card,
hard disk and any other piece of hardware or software information that you might care to know about your computer.

Compress drive to save disk space


its not possible to increase ur memory size but u can compress ur data to save ur disk space, this feature is available in NTFS drive..
if u have a fat or fat32 drive, u can convert it to ntfs by running a command on dos:
for c drive:
convert c:/fs:ntfs
for d drive:
convert d:/fs:ntfs
for e drive:
convert e:/fs:ntfs
run the command similarly if u have more drive...

Compresing data in NTFS

* open my computer
* select any drive(drive with NTFS format)
* right click and select properties
* click on general tab
* select "compress drive to save disk space"
* Apply and OK

ur data will remain safe...

- Changing the Location of Special Folders

You can modify the registry to change the location of special folders like:
  • My Documents
  • Favorites
  • My Pictures
  • Personal
  1. Start Regedit
  2. Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
  3. Double click on any locations you want to change and alter the path
  4. Logoff or restart for the changes to go into effect

Eliminating the Right Click on the Taskbar

To eliminate the right click on the taskbar:
  1. Start Regedit
  2. Go to HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer
  3. Add a DWORD and give it a name of NoTrayContextMenu
  4. Give it a value of 1
  5. Reboot

Eliminating the Right Click on the Desktop

To eliminate the right click on the desktop:
  1. Start Regedit
  2. Go to HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer
  3. Add a DWORD and give it a name of NoViewContextMenu
  4. Give it a value of 1
  5. Reboot
These are only three tricks…..there are many more available on net…..the idea here is not to teach you how to disable right click or how to change the color, fonts, looks, etc…..The basic reason why we post this chapter is to teach that if registry is the place where all the information is stored then why cant we brake passwords from here???
E.g. I install a software on my system to guard some folders which contain material which I want to hide. In order to access the folder I have to input a password, and if it is right only then I can see the content of the folder. From this example it is clear that the password is stored somewhere in the system from where the software compares the value which I enter in the password field. For this example as well as for every other software which asks for password to access the system features including the windows login password, all these values are stored in windows registry. Whenever the user enters a password, it is compared with the value stored in the system registry, and if it is found correct only then the user is allowed to access the feature. In Windows registry we can search for specific items, keys, values or software’s using the search function in edit menu. But there is one problem the password is not stored in its original form, it is converted to some other format so that no one can recognize it. E.g.; If I set the password as “hacking” it is stored as “6167453291” or may be some other form depending upon the software. In such cases what we can do is reset the password i.e. delete the value (whatever it is). Once the value is deleted there is no password and our purpose is solved.

XPHacking With Windows XP - ETHICAL HACKING

So you have the newest, glitziest, "Fisher Price" version of Windows: XP. How
can you use XP in a way that sets you apart from the boring millions of ordinary
users?

The key to doing amazing things with XP is as simple as D O S. Yes, that's
right, DOS as in MS-DOS, as in MicroSoft Disk Operating System. Windows XP (as
well as NT and 2000) comes with two versions of DOS. Command.com is an old DOS
version. Various versions of command.com come with Windows 95, 98, SE, ME,
Window 3, and DOS only operating systems.

The other DOS, which comes only with XP, 2000 and NT, is cmd.exe. Usually
cmd.exe is better than command.com because it is easier to use, has more
commands, and in some ways resembles the bash shell in Linux and other Unix-type
operating systems. For example, you can repeat a command by using the up arrow
until you back up to the desired command. Unlike bash, however, your DOS command
history is erased whenever you shut down cmd.exe. The reason XP has both
versions of DOS is that sometimes a program that won?t run right in cmd.exe will
work in command.com

note : m not comparing bash to dos


DOS is your number one Windows gateway to the Internet, and the open sesame to
local area networks. From DOS, without needing to download a single hacker
program, you can do amazingly sophisticated explorations and even break into
poorly defended computers.


****************
You can go to jail warning: Breaking into computers is against the law if you do
not have permission to do so from the owner of that computer. For example, if
your friend gives you permission to break into her Hotmail account, that won't
protect you because Microsoft owns Hotmail and they will never give you
permission.
****************
****************
You can get expelled warning: Some kids have been kicked out of school just for
bringing up a DOS prompt on a computer. Be sure to get a teacher's WRITTEN
permission before demonstrating that you can hack on a school computer.
****************

So how do you turn on DOS?
Click All Programs -> Accessories -> Command Prompt
That runs cmd.exe. You should see a black screen with white text on it, saying
something like this:

Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\>

Your first step is to find out what commands you can run in DOS. If you type
"help" at the DOS prompt, it gives you a long list of commands. However, this
list leaves out all the commands hackers love to use. Here are some of those
left out hacker commands.

TCP/IP commands:
telnet
netstat
nslookup
tracert
ping
ftp

NetBIOS commands (just some examples):
nbtstat
net use
net view
net localgroup

TCP/IP stands for transmission control protocol/Internet protocol. As you can
guess by the name, TCP/IP is the protocol under which the Internet runs. along
with user datagram protocol (UDP). So when you are connected to the Internet,
you can try these commands against other Internet computers. Most local area
networks also use TCP/IP.

NetBIOS (Net Basic Input/Output System) protocol is another way to communicate
between computers. This is often used by Windows computers, and by Unix/Linux
type computers running Samba. You can often use NetBIOS commands over the
Internet (being carried inside of, so to speak, TCP/IP). In many cases, however,
NetBIOS commands will be blocked by firewalls. Also, not many Internet computers
run NetBIOS because it is so easy to break in using them. I will cover NetBIOS
commands in the next article to XP Hacking.

The queen of hacker commands is telnet. To get Windows help for telnet, in the
cmd.exe window give the command:

C:\>telnet /?

Here's what you will get:

telnet [-a][-e escape char][-f log file][-l user][-t term][host
[port]]

-a Attempt automatic logon. Same as --l option except uses the currently logged
on user's name.
-e Escape character to enter telnet cclient prompt.
-f File name for client side logging
-l Specifies the user name to log in with on the remote system. Requires that
the remote system support the TELNET ENVIRON option.
-t Specifies terminal type. Supportedd term types are vt100, vt52, ansi and vtnt
only.
host Specifies the hostname or IP address of the remote computer to connect to.
port Specifies a port number or service name.


****************
Newbie note: what is a port on a computer? A computer port is sort of like a
seaport. It's where things can go in and/or out of a computer. Some ports are
easy to understand, like keyboard, monitor, printer and modem. Other ports are
virtual, meaning that they are created by software. When that modem port of
yours (or LAN or ISDN or DSL) is connected to the Internet, your computer has
the ability to open or close any of over 65,000 different virtual ports, and has
the ability to connect to any of these on another computer - if it is running
that port, and if a firewall doesn?t block it.
****************
****************
Newbie note: How do you address a computer over the Internet? There are two
ways: by number or by name.
****************

The simplest use of telnet is to log into a remote computer. Give the command:

C:/>telnet targetcomputer.com (substituting the name of the computer you want to
telnet into for targetcomputer.com)

If this computer is set up to let people log into accounts, you may get the
message:

login:

Type your user name here, making sure to be exact. You can't swap between lower
case and capital letters. For example, user name Guest is not the same as guest.

****************
Newbie note: Lots of people email me asking how to learn what their user name
and password are. Stop laughing, darn it, they really do. If you don't know your
user name and password, that means whoever runs that computer didn't give you an
account and doesn't want you to log on.
****************

Then comes the message:

Password:

Again, be exact in typing in your password.

What if this doesn't work?

Every day people write to me complaining they can't telnet. That is usually
because they try to telnet into a computer, or a port on a computer that is set
up to refuse telnet connections. Here's what it might look like when a computer
refuses a telnet connection:

C:\ >telnet 10.0.0.3
Connecting To 10.0.0.3...Could not open connection to the host, on port 23. A
connection attempt failed because the connected party did not properly respond
after a period of time, or established connection failed because connected host
has failed to respond.

Or you might see:

C:\ >telnet hotmail.com
Connecting To hotmail.com...Could not open connection to the host, on port
23. No connection could be made because the target machine actively refused it.

If you just give the telnet command without giving a port number, it will
automatically try to connect on port 23, which sometimes runs a telnet server.

**************
Newbie note: your Windows computer has a telnet client program, meaning it will
let you telnet out of it. However you have to install a telnet server before
anyone can telnet into port 23 on your computer.
*************

If telnet failed to connect, possibly the computer you were trying to telnet
into was down or just plain no longer in existence. Maybe the people who run
that computer don't want you to telnet into it.

Even though you can't telnet into an account inside some computer, often you can
get some information back or get that computer to do something interesting for
you. Yes, you can get a telnet connection to succeed -without doing anything
illegal --against almost any computer, even if you don't have permission to log
in. There are many legal things you can do to many randomly chosen computers
with telnet. For example:

C:/telnet freeshell.org 22

SSH-1.99-OpenSSH_3.4p1

That tells us the target computer is running an SSH server, which enables
encrypted connections between computers. If you want to SSH into an account
there, you can get a shell account for free at http://freeshell.org . You can
get a free SSH client program from http://winfiles.com .

***************
You can get punched in the nose warning: Your online provider might kick you off
for making telnet probes of other computers. The solution is to get a local
online provider and make friends with the people who run it, and convince them
you are just doing harmless, legal explorations.
*************

Sometimes a port is running an interesting program, but a firewall won't let you
in. For example, 10.0.0.3, a computer on my local area network, runs an email
sending program, (sendmail working together with Postfix, and using Kmail to
compose emails). I can use it from an account inside 10.0.0.3 to send emails
with headers that hide from where I send things.

If I try to telnet to this email program from outside this computer, here's what
happens:

C:\>telnet 10.0.0.3 25
Connecting To 10.0.0.3...Could not open connection to the host, on port 25. No
connection could be made because the target machine actively refused it.

However, if I log into an account on 10.0.0.3 and then telnet from inside to
port 25, here's what I get:

Last login: Fri Oct 18 13:56:58 2002 from 10.0.0.1
Have a lot of fun...
cmeinel@test-box:~> telnet localhost 25
Trying ::1...
telnet: connect to address ::1: Connection refused
Trying 127.0.0.1... [Carolyn's note: 127.0.0.1 is the numerical address meaning
localhost, the same computer you are logged into]
Connected to localhost.
Escape character is '^]'.
220 test-box.local ESMTP Postfix

The reason I keep this port 25 hidden behind a firewall is to keep people from
using it to try to break in or to forge email. Now the ubergeniuses reading this
will start to make fun of me because no Internet address that begins with 10. is
reachable from the Internet. However, sometimes I place this "test-box" computer
online with a static Internet address, meaning whenever it is on the Internet,
it always has the same numerical address. I'm not going to tell you what its
Internet address is because I don't want anyone messing with it. I just want to
mess with other people's computers with it, muhahaha. That's also why I always
keep my Internet address from showing up in the headers of my emails.

***************
Newbie note: What is all this about headers? It's stuff at the beginning of an
email that may - or may not - tell you a lot about where it came from and when.
To see full headers, in Outlook click view -> full headers. In Eudora, click the
"Blah blah blah" icon.
****************

Want a computer you can telnet into and mess around with, and not get into
trouble no matter what you do to it? I've set up my techbroker.com
(206.61.52.33) with user xyz, password guest for you to play with. Here's how to
forge email to xyz@techbroker.com using telnet. Start with the command:

C:\>telnet techbroker.com 25
Connecting To Techbroker.com

220 Service ready

Now you type in who you want the message to appear to come from:

helo santa@techbroker.com
Techbroker.com will answer:

250 host ready

Next type in your mail from address:

mail from:santa@techbroker.com

250 Requested mail action okay, completed

Your next command:

rcpt to:xyz@techbroker.com
250 Requested mail action okay, completed

Your next command:
data
354 Start main input; end with .


just means hit return. In case you can't see that little
period between the s, what you do to end composing your email is to hit
enter, type a period, then hit enter again. Anyhow, try typing:

This is a test.
.
250 Requested mail action okay, completed
quit
221 Service closing transmission channel

Connection to host lost.

Using techbroker's mail server, even if you enable full headers, the message we
just composed looks like:

Status: R
X-status: N

This is a test.

That's a pretty pathetic forged email, huh? No "from", no date. However, you can
make your headers better by using a trick with the data command. After you give
it, you can insert as many headers as you choose. The trick is easier to show
than explain:

220 Service ready
helo santa@northpole.org
250 host ready
mail from:santa@northpole.com
250 Requested mail action okay, completed
rcpt to:cmeinel@techbroker.com
250 Requested mail action okay, completed
data
354 Start main input; end with .
from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.
.
250 Requested mail action okay, completed
quit
221 Service closing transmission channel

Connection to host lost.

The message then looks like:

from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.

The trick is to start each line you want in the headers with one word followed
by a colon, and the a line followed by "return". As soon as you write a line
that doesn't begin this way, the rest of what you type goes into the body of the
email.

Notice that the santa@northpole.com from the "mail from:" command didn't show up
in the header. Some mail servers would show both "from" addresses.

You can forge email on techbroker.com within one strict limitation. Your email
has to go to someone at techbroker.com. If you can find any way to send email to
someone outside techbroker, let us know, because you will have broken our
security, muhahaha! Don't worry, you have my permission.

Next, you can read the email you forge on techbroker.com via telnet:

C:\>telnet techbroker.com 110

+OK <30961.5910984301@techbroker.com> service ready

Give this command:
user xyz
+OK user is known

Then type in this:
pass test
+OK mail drop has 2 message(s)

retr 1
+OK message follows
This is a test.

If you want to know all possible commands, give this command:

help
+OK help list follows
USER user
PASS password
STAT
LIST [message]
RETR message
DELE message
NOOP
RSET
QUIT
APOP user md5
TOP message lines
UIDL [message]
HELP

Unless you use a weird online provider like AOL, you can use these same tricks
to send and receive your own email. Or you can forge email to a friend by
telnetting to his or her online provider's email sending computer(s).

With most online providers you need to get the exact name of their email
computer(s). Often it is simply mail.targetcomputer.com (substitute the name of
the online provider for targetcomputer). If this doesn't work, you can find out
the name of their email server with the DOS nslookup program, which only runs
from cmd.exe. Here's an example:


C:\ >nslookup
Default Server: DNS1.wurld.net
Address: 206.61.52.11

> set q=mx
> dimensional.com
Server: DNS1.wurld.net
Address: 206.61.52.11

dimensional.com MX preference = 5, mail exchanger =
mail.dimensional.com
dimensional.com MX preference = 10, mail exchanger =
mx2.dimensional.com
dimensional.com MX preference = 20, mail exchanger =
mx3.dimensional.com
dimensional.com nameserver = ns.dimensional.com
dimensional.com nameserver = ns-1.dimensional.com
dimensional.com nameserver = ns-2.dimensional.com
dimensional.com nameserver = ns-3.dimensional.com
dimensional.com nameserver = ns-4.dimensional.com
mail.dimensional.com internet address = 206.124.0.11
mx2.dimensional.com internet address = 206.124.0.30
mx3.dimensional.com internet address = 209.98.32.54
ns.dimensional.com internet address = 206.124.0.10
ns.dimensional.com internet address = 206.124.26.254
ns.dimensional.com internet address = 206.124.0.254
ns.dimensional.com internet address = 206.124.1.254
ns.dimensional.com internet address = 209.98.32.54
ns.dimensional.com internet address = 206.124.0.32
ns.dimensional.com internet address = 206.124.0.30
ns.dimensional.com internet address = 206.124.0.25
ns.dimensional.com internet address = 206.124.0.15
ns.dimensional.com internet address = 206.124.0.21
ns.dimensional.com internet address = 206.124.0.9
ns-1.dimensional.com internet address = 206.124.26.254
ns-2.dimensional.com internet address = 209.98.32.54
ns-3.dimensional.com internet address = 206.124.1.254
ns-4.dimensional.com internet address = 206.124.0.254
>

The lines that tell you what computers will let you forge email to people with
@dimensional.com addresses are:

dimensional.com MX preference = 5, mail exchanger =
mail.dimensional.com
dimensional.com MX preference = 10, mail exchanger =
mx2.dimensional.com
dimensional.com MX preference = 20, mail exchanger =
mx3.dimensional.com

MX stands for mail exchange. The lower the preference number, the more they
would like you to use that address for email.If that lowest number server is too
busy, then try another server.

Sometimes when you ask about a mail server, nslookup will give you this kind of
error message:

DNS request timed out.
timeout was 2 seconds.
DNS request timed out.
timeout was 2 seconds.
*** Request to [207.217.120.202] timed-out

To get around this problem, you need to find out what are the domain servers for
your target online provider. A good place to start looking is
http://netsol.com/cgi-bin/whois/whois . If this doesn't work, see
http://happyhacker.org/HHA/fightback.shtml for how to find the domain servers
for any Internet address.

****************
Newbie note: A domain name server provides information on the names and numbers
assigned to computers on the Internet. For example, dns1.wurld.net and
dns2.wurld.net contain information on happyhacker.org, techbroker.com,
securitynewsportal.com, thirdpig.com and sage-inc.com. When you query
dns1.wurld.net about other computers, it might have to go hunting for that
information from other name servers. That's why you might get a timed out
failure.
***************

Once you know the domain servers for an online service, set one of them for the
server for your nslookup program. Here's how you do it:

C:\ >nslookup
Default Server: DNS1.wurld.net
Address: 206.61.52.11

Now give the command:

> server 207.217.126.41
Default Server: ns1.earthlink.net
Address: 207.217.126.41

Next command should be:
> set q=mx
> earthlink.net
Server: ns1.earthlink.net
Address: 207.217.126.41

earthlink.net MX preference = 5, mail exchanger = mx04.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx05.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx06.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx00.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx01.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx02.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx03.earthlink.net
earthlink.net nameserver = ns3.earthlink.net
earthlink.net nameserver = ns1.earthlink.net
earthlink.net nameserver = ns2.earthlink.net
mx00.earthlink.net internet address = 207.217.120.28
mx01.earthlink.net internet address = 207.217.120.29
mx02.earthlink.net internet address = 207.217.120.79
mx03.earthlink.net internet address = 207.217.120.78
mx04.earthlink.net internet address = 207.217.120.249
mx05.earthlink.net internet address = 207.217.120.31
mx06.earthlink.net internet address = 207.217.120.23
ns1.earthlink.net internet address = 207.217.126.41
ns2.earthlink.net internet address = 207.217.77.42
ns3.earthlink.net internet address = 207.217.120.43
>

Your own online service will usually not mind and may even be glad if you use
telnet to read your email. Sometimes a malicious person or faulty email program
will send you a message that is so screwed up that your email program can't
download it. With telnet you can manually delete the bad email. Otherwise tech
support has to do it for you.

If you think about it, this ability to forge email is a huge temptation to
spammers. How can your online provider keep the bad guys from filling up a
victim's email box with garbage? The first time a bad guy tries this, probably
nothing will stop him or her. The second time the online provider might block
the bad guy at the firewall, maybe call the bad guy's online provider and kick
him or her and maybe get the bad guy busted or sued.

**************
You can go to jail warning: Sending hundreds or thousands of junk emails to bomb
someone's email account is a felony in the US.
***************

***************
You can get sued warning: Spamming, where you send only one email to each
person, but send thousands or millions of emails, is borderline legal. However,
spammers have been successfully sued when they forge the email addresses of
innocent people as senders of their spam.
****************

Now that you know how to read and write email with telnet, you definitely have
something you can use to show off with. Happy hacking!

Oh, here's one last goodie for advanced users. Get netcat for Windows. It's a
free program written by Weld Pond and Hobbit, and available from many sites, for
example
http://www.atstake.com/research/tools/#network_utilities . It is basically
telnet on steroids. For example, using netcat, you can set up a port on your
Windows computer to allow people to telnet into a DOS shell by using this
command:

C:\>nc -L -p 5000 -t -e cmd.exe

You can specify a different port number than 5000. Just make sure it doesn't
conflict with another port by checking with the netstat command. Then you and
your friends, enemies and random losers can either telnet in or netcat in with
the command:

C:\>nc -v [ipaddress of target] [port]

Of course you will probably get hacked for setting up this port. However, if you
set up a sniffer to keep track of the action, you can turn this scary back door
into a fascinating honeypot. For example, you could run it on port 23 and watch
all the hackers who attack with telnet hoping to log in. With some programming
you could even fake a unix-like login sequence and play some tricks on your
attackers.

How to Look Good to a Girl

While there's no sure-fire way to guarantee that you'll have girls' heads turning when you walk down the street, there are plenty of things you can do to increase your chances...

Steps

  1. Be healthy. A good complexion and healthy glow shows the opposite sex that you take care of yourself. Eat 5 or more portions of fruits and vegetables a day and drink plenty of water (8 glasses). Drinking orange or other fruit juices are good ways to achieve both goals.
  2. Stay fit. Lift weights for at least 20 minutes a day. This only works for girls who like buff, athletic guys. If you're more the brainy type, just keeping relatively fit (no flab) is enough. Also, regardless of your body type, "six-pack" abs seem to be universally considered good looking. Work on that as a priority by mixing aerobic exercise with crunches.
  3. Be well-groomed:
    • Shave regularly unless you like the scrubby look.
    • Shaving only below the jawline not only makes a beard look neat and groomed, it makes stubble look masculine rather than ungroomed.
    • Trim your fingernails and toenails.
    • Take care of your teeth. Brush, floss, and use mouthwash daily. See your dentist on a regular basis. Don't let your teeth get stained (with coffee and cigarettes, especially) and use whitening treatment if you still need help.
    • Shower every day. Girls might notice that you dont shower alot and its a big turn off to them.
    • If you have oily skin, be sure to rinse your face at least once a day to prevent a greasy shine and acne.
    • Use a deodorant with little scent or get a "matched" product that goes with a specific product line. Unscented soaps and lightly scented shampoos won't clash with colognes. Use an anti-perspirant if you sweat excessively. Also trimming (not shaving) body hair may help control body odor.
    • Spraying cologne into the air and walking through the cloud is a waste. Apply two sprays to the chest, one on either wrist, followed by pressing them together (rubbing breaks down the oils,) and one to the back of the neck just below the hairline to create "spillage," a very light scent trail that lasts for five to ten seconds after you walk through an area.
  4. Take mints with you. Avoid bad breath foods like garlic and onions. (Note: some girls don't like minty breath so also look into non-minty alternatives like orange or cinnamon Tic-Tacs.)
  5. Ask others for feedback. Be aware that you may get conflicting feedback, especially with things such as clothing styles, hairstyles, and colognes. Work their opinions into your style, but ultimately, choose what makes you feel the most confident.
  6. Be very aware of your posture: good posture will give you a confident aura. It can also make you look taller.
  7. Dressing right can be very important to girls, but you don't have to go spending hundreds of dollars on the latest and greatest styles. A nice shirt and a clean pair of jeans is more than enough. Try a polo shirt, and some cool some what baggy, worn-looking jeans. Just be sure it's comfortable for you or else she'll pick up on your discomfort and think it's her.
  8. Get a good amount of sleep! Looking tired and bleary eyed all the time is very unattractive, and tends to detract from the rest of your appearance as well. Not to mention, no one likes a cranky guy.
  9. Learn to dance. If you show girls you know how to move, they're likely to be impressed with your skills and think you know how to do lots of other things. Even if you're not a great dancer, she'll be impressed with your confidence and lack of embarrassment.
  10. Be confident about yourself! Confidence and other moods show through in your body language, and if you can't make the to effort and learn to love yourself, why should she?
  11. Smile, especially if you have nice teeth. A positive attitude is a definite turn on, and most girls love a good grin.
  12. Comfort her if she's having a bad day or simply needs a hug. If she cries in front of you it means that she trusts you with her feelings. Never tell her what she's worrying about is "stupid," though you should point it out gently if she's wrong.
  13. A girl will be won over by subtle compliments, but be careful here. Only give compliments that you actually believe. She can usually tell if you're just making up lies to sweet talk her.


Tips

  • Looking good to a girl is more about good hygiene than anything else. If you think about that, it just makes sense. If a man doesn't take proper care of himself, how can he be expected to take care of her, or anything/anyone else?
  • Looks aren't everything. Find a girl who likes you for who you are, not your clothes, white teeth, and six-pack abs.
  • Show some class. Don't swear every other word, and don't make crude gestures.
  • Read the news, keep up on the latest books, so you can converse intelligently. While clothes may make the man, an interesting and caring man will get the girl. Be sensitive, but not too sensitive.
  • For crying out loud, have fun. You'll be at your most attractive point when you're enjoying yourself and her company. Take her somewhere that makes you feel comfortable and even energetic. You don't have to wow her your first time hanging out with a fancy restaurant; for some of us, cheap Chinese food and a walk through the park bring out the best.
  • Get to know her friends; they'll help do some of the tough work for you by letting her know how cool you are, but don't get too close to them. She might think you only wanted her to get one of her freinds.
  • Moving forward with a girl is a lot like rock-climbing, yes, rock-climbing. Take your time and make sure that both of you are comfortable with each other, and the state of your relationship before taking the next step.
  • It's usually not a good idea to ask a girl out on a date when she's only just getting to know you. Go out with groups of friends, so she can see you in a comfortable, relaxed setting. If she starts showing an interest (e.g. talking to you more than the other people there, pulling you away from the group, appearing really interested in what you say, laughing at your jokes, etc.) then it's time to ask her out. Now that you've got her attention, you've just got to be yourself!


Warnings

  • Some girls are just not interested in you no matter what you do or say, so do not get discouraged, just move on.
  • Don't go overboard on the cologne. No matter how good it smells, too much of anything is bad. There are also many essential oils that are quite masculine, these can normally be used straight, dabbed below and behind ears. Remember, girls like guys to be natural, so less is more here.
  • Some girls are allergic to scents and colognes will turn them off.
  • Never be loud and obnoxious unless the situation calls for it.
  • Never insult her unless you're flirting.
  • Always make sure she's comfortable with the conversation you're in, and comfortable around you, never make her feel scared to talk to you, make her feel like she can trust you and tell you anything, or else, you're toast.
  • Never compete with a guy-friend for a girl, it's a tricky situation and usually ends in bitterness and could end up in you losing a very good friend...
  • NEVER TALK ABOUT THEIR STOMACH OR BODY WEIGHT NEVER NEVER NEVER
  • Do not, and I mean DO NOT, go after your best friends sister, unless you really like her. Then by all means pursue the secretive romantic relationship. It could work out like in Harry Potter, even if you're not a wizard.