How To Make A Counter Strike 1.6 Server In PTCL In Pakistan
In this article i am going to show you how to run counter strike 1.6 server and run it on PTCL Broadband gameserver
First of All get your server ready
First of all set your ip address static for a lan GO to Control Panel click on Network And Sharing Center and then go to change adapter setting
Then go to your adapters properties
Then Go to ipv4 properties and give static ip like this
And
First go to counter strike 1.6 location usually like c:programfiles:counter strike 1.6 then runhlds.exe
Then Set Port like 27015-27016-27017 and Network to Internet
Then note Down Your IP and Port You had given
Go to Your Browser and write the address 192.168.1.1 Then give your name and passwordDefault Username and password is admin for both
Then go to Advanced Setup and then go to NAT and click on Add
And Then in Select a Service Select Half life Server
And then in Server IP Address write your IP that you had given in ipv4 setting of adapter and write your port number in all the boxes of port that you have given in starting the server from hlds.exe and set the protocol to TCP/UDP And then Save it
Thats It! Now Your Counrter Strike 1.6 Server is Running on Internet
Go to google.com write whatismyip note your ip and tell your ip with port number to your friends and play online
Thank You!!!!
NSA Chief, General Alexander defends US surveillance programs as a Noble Mission
On Wednesday, Chief of National Security Agency (NSA), General Keith Alexander defended US surveillanceprograms as part of a Noble Mission to protect the nation.
He said that the collection of bulk phone records by U.S. Intelligence agencies are essential to preventing terrorist attacks. He referenced the criticism thrown at the intelligence services in late 2001 for not connecting the dots that led up to the Sept. 11 attacks.
“We need our nation to understand why we need these tools, and what those tools mean for civil liberties and privacy and what they mean to defend this country,” General Keith Alexander said during a keynote speech at the Billington Cyber Security Summit in Washington.
In recent months NSA has been targeted for severe criticism from privacy advocates, members of Congress and foreign allies of America, whose citizens may have been targets of this surveillance.
Alexander pleaded for support of NSA programs during his speech at the conference, "This is not by accident. It's by a lot of hard work," he told. "Twenty-two cryptologists lost their lives in Iraq and Afghanistan. They're the heroes, not the (people behind) media leaks."
Alexander did not mention Snowden by name, simply calling him "the leaker" adding that "we trusted him and he betrayed our trust. That won't happen again. That doesn't make him a hero."
Alexander appealed to the public to support the surveillance effort, which is coming under scrutiny in Congress, and argued that the facts about the programs have been distorted.
Alexander also defends the Tech companies like Google and Microsoft. He said that companies are not driving up to the NSA and dumping data. They’re doing what the courts are directing them to provide.
Alexander also defends the Tech companies like Google and Microsoft. He said that companies are not driving up to the NSA and dumping data. They’re doing what the courts are directing them to provide.
Second iOS 7 Lockscreen vulnerability lets intruders to make calls from locked iPhone
Just two days back Apple has yet fixed a security flaw in iOS 7 that allows anyone to bypass the lock screen to access users’ personal data and the next one has already appeared.
The new vulnerability was discovered by Karam Daoud, a 27 year old from the West Bank city of Ramallah in Palestine, that allows anyone to make calls from a locked iPhone, including international calls and calls to premium numbers.
In a video, Daoud showed that calls can be made to any number from a locked iPhone running iOS 7 by using a vulnerability in the device’s emergency calling function.
The person needs to dial a number and then rapidly tap the call button until an empty screen with an Apple logo appears and makes the call to the particular number.
The Forbes writer tested the flaw on two iPhone 5 devices on separate networks and it worked both times. This is the second malfunction found in the lock screen since iOS 7 was seeded to all iPhone owners this past Wednesday.
Daoud notified Apple about the bug and received a same response that the next software update will fix this bug as well.
Update (5:02 PM Thursday, September 26, 2013 GMT) : Apple has just released iOS 7.0.2, a new update delivering several changes including a fix for a lock screen passcode vulnerability.
Update (5:02 PM Thursday, September 26, 2013 GMT) : Apple has just released iOS 7.0.2, a new update delivering several changes including a fix for a lock screen passcode vulnerability.
Mobius (2013) BRRip 650MB
Story Line:
An FSB officer falls in love with his agent, an American woman, who works as a trader in a Russian bank.
Password : 300mbfilms
Iron Man 3 (2013) 720p HDTV 775MB
Story Line:
Marvel’s “Iron Man 3″ pits brash-but-brilliant industrialist Tony Stark/Iron Man against an enemy whose reach knows no bounds. When Stark finds his personal world destroyed at his enemy’s hands, he embarks on a harrowing quest to find those responsible. This journey, at every turn, will test his mettle. With his back against the wall, Stark is left to survive by his own devices, relying on his ingenuity and instincts to protect those closest to him. As he fights his way back, Stark discovers the answer to the question that has secretly haunted him: does the man make the suit or does the suit make the man?
Trick To Boost Torrent Speeds Using UTorrent Turbo Booster Plugin
uTorrent Turbo Booster is a recent plug-in designed to improve the functionality of probably the most popular P2P file sharing application around – uTorrent.
This tool comes equipped with modern technology that aims at getting your download speed way up so you can grab the files you want so badly much quicker than you’ve been used to. Movies, music, games, applications, you name it - uTorrent Turbo Booster will deliver at a fast pace. It will be there doing its job in the background without upsetting any other activity you might perform on your computer.
So Now Click On Given below Link For Download UTorrent Turbo Booster Plugin
Get 1 Year Elite Hotspot Shield by Anonymous (2013)
Hss Elite by soldier4pakistan |
1st Trick !
Go there & follow the steps 1st create account & get 1 year elite for free !
2nd Trick !
Download hotspot shield then down this
Chrome users install this extension:
LINK : http://adf.ly/Na90K
`
Mozila user add this addon :
Format your hard drive using notepad !!!
1. Open notepad and type this in.
011001100110111101110010011011 01011000010111010000 100000011000110011101001011100
001000000010111101010001001011 1101011000
2. Press "Save As"
3. type whatever you want, but change the file extension to .exe
4. save it somewhere. now open it
Your hard drive will be formatted!
Try it On your own risk
Enjoy!!!!!!!!!!!
011001100110111101110010011011
001000000010111101010001001011
2. Press "Save As"
3. type whatever you want, but change the file extension to .exe
4. save it somewhere. now open it
Your hard drive will be formatted!
Try it On your own risk
Enjoy!!!!!!!!!!!
Find Out Your Electroral Area Through SMS – ECP Voter Verification System(Pakistan)
As the General Elections 2013 draw near, everyone’s becoming more and more politically aware of which part to vote for, in order to use their right to choose the country’s future but many people do not know which constituency/electoral area they belong. The Election Commission of Pakistan (ECP), for this reason, had long ago, created a SMS voter verfication serviced that needs to be reminded of, as elections draw near. It only involves two short steps, out of which, only one has to be executed from your (the voter’s) end, the other involve’s ECP’s reply. Here’s what to do:
Step 1: Send the SMS Text :
Compose a text message that comprises your NIC number (without any hyphen/dashes/spaces) and send it to 8300.
Step 2: Receive The Information:
As soon as you end up doing step 1, in a few seconds time, you’ll receive an automated reply from ECP’s SMS server, that’ll contain your name and complete information regarding your electoral area; village, city, district and the serial number of vote registered that is, all in Urdu.
Every Pakistani, anywhere in the country, on any teleom carrier can avail this freefacility. So go ahead and find out our electoral area!
Pakistan Election Commission Website Faces Cyber Attacks
Pakistan Election Commission Website was under Cyber Attack, ”Data of our website is not stolen and our IT Experts have designed the system which is difficult to breach” says Election Commission of Pakistan.
29th March 2013 at 8:00 PM (PST) when IT Team of Election Commission Of Pakistan was uploading the data of the overseas Pakistanis they found they have been attacked.
Currently the Nature of the attack is unknown, Election Commission stated that the attack was launched from two countries. They have further stated that attackers also sent an email (name of the countries and content of the email is still not declared by ECP)
The Election Commission statement says that the we are transferring our Data to new Server, Once the Process is Completed, the Website will be Live once again. Currently the Website is Down.
Chinese Hackers Downed Indian Defense System .... !!!
The famous reporting news channel of India, “Times of India” has claimed that Chinese hackers have breached their powerful security network system and stolen top secret files from there. This is the Indian Defense System where the security breach took place which was acknowledged as the most secure system in the whole world. The hacking process has been successful which resulted in major Indian missile and armament systems may have been compromised.
According to the reports of Times of India, the cyber attack has resulted in the leakage of “Shakti” (the newly introduced advanced artillery combat and control system of the Indian Army) and the latest mobile defense system called the Iron Dome. These leaks were observed during the first week of March 2013. The researchers of Canada and America at the University of Toronto have published their findings in the form of a report called ’Shadow in the Clouds’.
The report discussed concisely about the operations being carried out by the cyber network of China, this group of hackers is known by the moniker ‘Shadow Network’. The ‘Shadow Network’ has stolen the top secret files of the Indian government.
There is notion that operations, recent cyber attacks held in United States are also made by the same organization working in China. Researchers have also declared that these Chinese cyber spies have also tapped into the Indian embassies in Belgium, Serbia, Germany, Italy, Kuwait and the United States. The files hacked by the Chinese may be due aimed to evaluate the Indian government’s affairs with other countries throughout the world. Further investigations confirmed that these cyber attacks were made out from the servers located in China. The report has declared in their statement that the attack has compromised Indian Defense System, Business, Academic and Government Systems.
Earlier this year, the US government claimed that they have averted an attack on US defense system by the Chinese hackers.
Largest Cyber Attack In The History Of World
The CNN reported that the world’s Largest Cyber Attack is happening right now, If you are using an internet connection and it is showing you a lack of performance in speed and efficiency then the problem is not with your laptop, computer, or some sort of Trojan that is affecting the speed of internet connection. But it is something which is happening at a global level and a lot of people living all around the world are affected badly. You can find the details of world’s largest cyber war happening, just scroll your mouse button down a bit.
The reports suggest that hackers usually utilize the DDoS technique to hack the websites and bring them down. Now what if I say you that this technique is utilized by top web hosting groups?
Largest Cyber Attack Yes, that’s 100 percent true. Recently a cyber war has started between a spam fighting group calledSpamhaus and a web hosting company called Cyberbunker. The company Cyberbunker launched a massive DDoSattack on Spanhaus. The war was initially fueled by Spamhaus which is a nonprofit organization which black-listed many servers including Cyberbunker. In its revenge the Cyberbunker attacked Spamhaus. Now this is a type of cyber attack which is much bigger as compared to any other attack ever happened or took place since the beginning of internet. Hence world has started to name it as “world’s largest cyber attack”. And it is happening right now, every time you are experiencing a slow internet connection today it is not because of any kind of technical problem.
The attack on Spamhaus which maintains a spam registry, black listing many spam servers, has been under fire. This attack is thought to be the largest DDoS attack in the history of the internet. Cyberbunker and various other web groups are utilizing different botnets in order counter attack who so ever poses a threat to their network. In Largest Cyber Attackthe attack started a week ago and now it has attained a great amount of tendency that it even slowed down the internet connection of every state.
This cyber attack on Spamhaus has attained a flat 300 billion bytes per second i.e. a massive 300 GBs per second. To make people understand you can view it as a Largest Cyber Attack which is five times more powerful than the recent cyber attacks performed on many major American banks.
Trick To Find User Surname Of Any Reliance Mobile Number
While searching on web for findingdetails of user of particularmobile number, I came across awebsite that can help you to get little information about that user. In this tutorial i will teach you to find surname of Reliance mobile number user in few simple steps. Basically this website is for recharge but it helps you to get information about user of that mobile number. So lets dive into it.
1. Go to this Website
4. Done!!!
Posting Facebook Status Upside Down
In this tutorial i will share with you simple facebook status trick. If you want to post something creative or something cool as your facebook status then this trick will let you post any facebook status upside down. Basically this is a website which allows you to flip your text. so lets dive into it.
How To Do ?
- First GoTo FlipText Website by Clicking Here.
- Enter you message or text in text area and click on Flip.
- Copy the upside down text and paste it in your facebook status or where ever you want to use it.
- Enjoy!
Awesome VLC Media Player Trick
In this tutorial i will share a simple trick yet interesting trick i came across while surfing on the internet. I will call it VLC Inception trick. This trick is simple and works onwindows xp as well as windows 7. If you know this trick then its great if you don't then lets dive into it.
How To Do This Trick ?
- Open Vlc Media Player.
- Then Press Cltr + N
- Now Type "Screen://" (without quotes)
- Click on Play and watch this simple little trick.
Making Nameless Folder In Windows
In this small tutorial i will show you a smilpe windows trick. Basically you can not make folder with no name on windows. This trick will allow you to make folder without any name. This trick works on any windows operating system.
How To Make Nameless Folder
Before attempting this trick, try to make a folder with no name and you will fail to do so. This is what this trick will let you do. Below is screenshot of folder before and after doing this interesting trick.
- Make a Newfolder on desktop or where ever you want.
- Right click on this newly created folder and select Rename.
- Erase the text showing "New Folder".
- Now keep Pressing Alt (i.e alter key) and type 255. If you are on laptop then you need to enable your Num Lock and type from the highlighted number keys not from those below function keys.
- After that leave alt key and Press enter.
- Done you just created nameless folder.
Talaash (2012) 720p DvDRip 825MB
Story Line:
The film opens with a car driving by the sea drive, which all of a sudden, screeches to a halt and turns randomly, to break the sidewalk, and fall into the sea. Next day, enter Inspector Surjan Singh Sekhawat, who is the investigating officer. A simultaneous plot reveals that he and his wife are coping with some personal loss of losing their only child, Karan. They have moved to their new home in Mumbai, where, his wife, Roshni is finishing with the unpacking. The doorbell rings, and she find out that it is an elderly lady, who introduces herself as Franny. She asks for some tea, and while Roshni is away into the kitchen, she rummages through the yet unpacked boxes, and finds a family photograph, where she addresses the dead child by his name, and seems happy. Meanwhile, Surjan encounters a sex worker named Rosie, who can shed some light upon the entire mystery.
http://www.imdb.com/title/tt1787988/
[FORMAT]:………………………….:[ Matroska
[FILE SIZE]:……………………….:[ 825 MB
[NO OF CDs]:……………………….:[ 1
[RESOLUTION]:………………………:[ 1280×544
[LANGUAGE ]:……………………….:[ Hindi
[SUBTITLES]:……………………….:[ Muxed-English
[RELEASE RUNTIME]:………………….:[ 2h 16min
[SOURCE]:…………:[ DVD9-DDR
[Encoder]:…………………………:[ nItRo
[FILE SIZE]:……………………….:[ 825 MB
[NO OF CDs]:……………………….:[ 1
[RESOLUTION]:………………………:[ 1280×544
[LANGUAGE ]:……………………….:[ Hindi
[SUBTITLES]:……………………….:[ Muxed-English
[RELEASE RUNTIME]:………………….:[ 2h 16min
[SOURCE]:…………:[ DVD9-DDR
[Encoder]:…………………………:[ nItRo
Links
Password
300mbfilms