Sunday, March 21, 2010

WiFi Hack AIO 2010




This time we bring you the best software to hack the WiFi networks 2010. El compilado incluye potente software en detecci?n y cifrado de redes ideal para hackear Redes WiFi. The compilation includes powerful encryption software in network detection and ideal for hacking WiFi networks. Descargar Programas para Hackear Redes WiFi Full Gratis. Download Programs to hack Free Full WiFi networks.


This AiO contains:
Windows Tools 1
WiresHark
AirSnare
WirelessKeyView
Wifi Monster
NetStumbler
Easy Wifi Radar
SmartSniff
Ettercap
WinPcap
CommView

Windows Tools 2
Nmap
Wirelessmon
PocketWarrior
Inssider
RemoteAnyWhere
PmoniPacketMon
ApTools
WiFiFoFum
Advanced Port Scanner
NetSurveyor

Backtrack
Enlace de descarga para BackTrack 4 Pre Release
Enlace de descarga para BackTrack 4 Beta Release
Enlace de descarga para BackTrack 3 VmWare Image
Enlace de descarga para BackTrack 3
Enlace de descarga para BackTrack 3 USB Version

PDF s and Tutorials
Hacking Wireless Networks
Cracking WEP and WPA WiFi
Wifi Hacking
Hacking Asus WL520gU
BackTrack PDFs
WiFi Advanced Fuzzing
Wifi Security
Wireless Sniffing WiresHark
Wireless Hacking Tools

Bonus Software
Net Tools
WepGen
Cantennator
Anchorfree
Cain and Abel
Wifi Drivers
Brutus
VmWare Keygen
LanHelper


here is the link:

http://hotfile.com/dl/27443546/027c035/b1u3eyes.AIO.Wifi.rar.html

Windows Keygen Pack




Microsoft Business Network Professional v1.0 SP1 -kEyGeN-
Microsoft CRM Server v1.2 -kEyGeN-
Microsoft ISA Server v2004 Enterprise -kEyGeN-
Microsoft ISA Server v2004 -kEyGeN-
Microsoft kEyGeN 2000
Microsoft Office Communicator 2005 v1.0.559 -kEyGeN-
Microsoft Office Professional v2003 -kEyGeN-
Microsoft Operations Manager 2005 -kEyGeN-
Microsoft Plus! Digital Media Edition -kEyGeN-
Microsoft Visual FoxPro v9.0 -kEyGeN-
Microsoft Windows Longhorn -kEyGeN-
Microsoft Windows Media Center Edition 2005 -Activator-
Microsoft Windows Server 2003 -kEyGeN-
Windows Multi kEyGeN
Windows Server 2003 Enterprise VLK -kEyGeN-
Windows Server 2003 x64 Edition VOL -kEyGeN-
Windows XP Activation Patch
Windows XP Activator
Windows XP Product Key Viewer and Key Changer
Windows XP Professional -kEyGeN-
Windows XP Professional x64 Corporate -kEyGeN-
Windows XP Service Pack 1a -kEyGeN-
Windows XP Service Pack 2 -kEyGeN-
Windows XP SP2 Home and Pro Activation -cRaCk-
Windows.Genuine.Advantage.Validation.v1.5.526.0.CR ACKED-ETH0


here is the link:
http://hotfile.com/dl/21332215/79098c7/WinKeygens.rar.html

How to Bypass Windows Verification to Install Windows Media Player 11



Well, there are many programs which we can download by micrososft, but we can't really install them, because some of our Windows XP versions aren't original and therefore do not pass the Windows verification test.
Here's a TUT on how you can install Windows Media Player 11 on your PC and bypass Genuine Advantage verification.

1)First, download windows media player. Download it through THE LINK BELOW, because the microsoft link will verify BEFORE letting you download.
Windows Media Player 11


2) Once the download is completed, use WinRAR to unzip the .exe file, onto a new folder.

3) Go inside the unzipped folder. You will find the whole .exe package here.


Now goto
And download LegitLib.dll
^^ That's the main file that will trick your system into thinking that you have an original copy.
Download that , and replace it inside the unzipped .exe folder.

5) Hit "setup_wm".
And that's it!

You just bypassed Genuine Windows Advantage check and installed Windows Media Player 11 on your XP.


link for legitlib.dll
http://www.multiupload.com/K1W6DT19DH

Add A Photo To My Computer Properties




Here is simple windows tip, which will show you how to add a photo and name to my computer properties.
To do it, open notepad and type the following
[General]
Manufacturer=Your Name Here
[Support Information]
Line1=Your Name Here
Line2=Your Address Here
Line3=Your Email Address Here

Save as OEMINFO.INI in the C:\WINDOWS\system32 folder.
Then create a .bmp photo and save it the System32 folder as oemlogo.bmp


The size of the image should be 180 x120 pixels.
Make a right click on my computer, Properties and you’ll see the changes.
It looks like this:

Ardamax KeyLogger Tutorial









Hello and welcome to my Ardamax KeyLogger Tutorial. This tutorial is for the keylogger starters. I will be showing you how to send your logs using Email/Ftp



follow the pictures from bottom to top..

Saturday, March 20, 2010

About Hackers: Hackers – Who r they? What do they do? What they r looking for?




The Term Hacker has several definitions. Habitually Hacker is a person who are enthusiasts in digital computing, they have more knowledge than that of the normal user. It doesn’t matter that a hacker should master only in computers, they may master any thing like mobile phones, PDA’s, Digi- Cam’s, Signals, Hand held devices and so on.

In Computing hackers are clever programmers. In Security Terminology Hackers are the person who really enjoys computing, Programming and the one who deals more with any electronic devices, most often computers by exploring new techniques and tweaking them.

Hackers are skilled person who are good programmers with a good attitude but, Nowadays the term hacker is used with negative connotation because of media’s. Lemme make it clear why the term ‘Hacker’ Such a bad impression among public or its vague.

In security terminology hackers are further classified into three main types based upon how they use their skills in the real world.

1. White Hat
2. Black Hat
3. grey hat


White Hat:

They are skilled programmers who knows more about computer security. They know both the good and evil, Pros and cons in security aspect and more over these guys will use their positive attitude to fix a bug or security loopholes that can be exploited by bad guys. They were good in network troubleshooting and use their skills in a positive way to protect and guard nodes in a network. These guys are basically pen testers and also can be called as ‘Ethical Hackers‘, since they do it legally.

Black Hat :

These guys are mere opposite to White Hat Hackers who creates havoc in a network by spreading malwares, breaking into computers by compromising the security, gaining unauthorized access, defacing websites, stealing credentials, money from victim’s credit cards and these guys will do some other clumsy stuffs, also can be referred as a ‘Cracker‘. Even these guys knows what the White Hat knows, but will have a poor attitude and will use their skill in darkside.

Grey Hat :

It doesn’t require much technical skill to become a Grey Hat hacker, and these guys often are not good in programming but, will search and use someone’s program or coding from the internet to exploit a known vulnerability, also can be referred as ‘Script Kiddies‘. They often try trial and error method to exploit or compromise the security and are ‘wannabe hackers’. Incase of grey hat, they will try to deface websites only upto their level and will not try to learn new techniques, and mostly their attempt will be unsuccessful, where as this is not the case with the black hat, they are ambush attackers who waits even for years to deface the target site and the target’s are most often a reputed and esteemed corporation.

Even hackers can be classified into more crew’s like cyber terrorist, script kiddies but, all of them comes under the three main category thats given above.

Why Hacking ?

Just for Fun :

Most of them will hack just for fun by exploiting the known vulnerabilities and will be script kiddies. Novice hackers will some times steal their comrades E-mail credentials for fun using some key loggers and other techniques for playing pranks, fun and so on.

Raise their status in Communities :

Since there a mushrooms of underground communities available on the internet, just a defacement of any reputed or well known site will fetch them respect among the underground crew.

Political Purpose :

Cyber terrorists will deface victims website, shutdown power, create havoc and outrage in the country and they will get paid for this.

Revenge :

This occurs often by a disgruntled employee of any organization and may try to disclose company’s confidential information and will deface the company’s web resource to degrade its reputedness.

Self-testing :

These guys are Novice hackers who have started learning new techniques from the web or other source and will test themselves whether they are capable of compromising the security or defacing a web resource.

Accidental :

Hacking that occurs without any intention or without their knowledge, and this is due to the poor security policies that’s been followed in that organization or what ever it may be.

Financial Gains :

Hackers might crack into a system for financial gains hence forth they steal credit card informations, Social security numbers and might construct a phishing site to trap victims to make them believe that they are using a legitimate resource for money transaction.

Further Attack :

Hackers Might take over computers all around the world to spread malware, make them as zombies, botnets which can be later used to launch a DDOS ( Distributed Denial of Service ) attack, which may down the victim’s website down by eating up its bandwidth.

IP Theft :

They crack into computers to launch another attack by spoofing their identity by stealing the victim’s identity such as IP Address, E-Mail address, MAC Address, organizations name and stealing bandwidth and so on.

You might be thinking that you know everything about your mobile but there few things that you don’t know. I have made a list all these secret codes that can be Used on your Nokia Mobile for Different Purpose.

1. *3370# : Activate Enhanced Full Rate Codec (EFR) – Your phone uses the best sound quality but talktime is reduced my approx. 5%
2. #3370# : Deactivate Enhanced Full Rate Codec (EFR) OR *3370# ( Favourite )
3. *#4720# : Activate Half Rate Codec – Your phone uses a lower quality sound but you should gain approx 30% more Talk Time.*#4720# : Deactivate Half Rate Codec.
4. *#0000# : Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type. ( Favourite )
5. *#9999# : Phones software version if *#0000# does not work.
6. *#06# : For checking the International Mobile Equipment Identity (IMEI Number).
7. #pw+1234567890+1# : Provider Lock Status. (use the “*” button to obtain the “p,w”and “+” symbols).
8. #pw+1234567890+2# : Network Lock Status. (use the “*” button to obtain the “p,w”and “+” symbols).#pw+1234567890+3# : Country Lock Status. (use the “*” button to obtain the “p,w”and “+” symbols).
9. #pw+1234567890+4# : SIM Card Lock Status. (use the “*” button to obtain the “p,w”and “+” symbols).
10. *#147# : (vodafone) this lets you know who called you last.
11. *#1471# : Last call (Only vodofone).
12. *#21# : Allows you to check the number that “All Calls” are diverted to
13. *#2640# : Displays security code in use.
14. *#30# : Lets you see the private number.
15. *#43# : Allows you to check the “Call Waiting” status of your phone.
16. *#61# : Allows you to check the number that “On No Reply” calls are diverted to.
17. *#62# : Allows you to check the number that “Divert If Unreachable (no service)” callsare diverted to.
18. *#67# : Allows you to check the number that “On Busy Calls” are diverted to.
19. *#67705646# : Removes operator logo on 3310 & 3330.
20. *#73# : Reset phone timers and game scores.
21. *#746025625# : Displays the SIM Clock status, if your phone supports this power saving feature “SIM Clock Stop Allowed”, it means you will get the best standby time possible.
22. *#7760# Manufactures code.
23. *#7780# Restore factory settings.
24. *#8110# Software version for the nokia 8110.
25. *#92702689# Displays – 1.Serial Number, 2.Date Made, 3.Purchase Date, 4.Date of last repair (0000 for no repairs), 5.Transfer User Data. To exit this mode you need to switch your phone off then on again. ( Favourite )
26. *#94870345123456789# Deactivate the PWM-Mem.
27. **21*number# Turn on “All Calls” diverting to the phone number entered.
28. **61*number# Turn on “No Reply” diverting to the phone number entered.
29. **67*number# Turn on “On Busy” diverting to the phone number entered.
30. 12345 This is the default security code.
31. press and hold # Lets you switch between lines NOKIA 5110/5120/5130/5190 IMEI number: * # 0 6 #
32. Software version: * # 0 0 0 0 #
33. Simlock info: * # 9 2 7 0 2 6 8 9 #
34. *#746025625#This shows if your phone will allow sim clock stoppage

Read Scratched CD using BadCopy




Having problem with scratch CD
Computer Getting hanged when a scratch CD is inserted
Having important data on CD which become unreadable due to schratches

We have came up with the solution .

Use BADCOPY software which allows you to recover data from a scratch unreadable CD.

Bad Copy allows you to store the the data from CD with out your computer getting hang.
It will allow to view all the files and folders.

Just insert CD and open BAD COPY it will show you all the Content of your CD
Just select the important files and start rescue it will take some time but will then as you to save the content,just give the path and the important file will get saved.

How to use Keyloggers – Detailed Tutorial




WARNING: I highly recommend that you read this post completely since every single piece of information is important.


I know most of you are new to the concept of keyloggers. For some of you, this might be the first time you heard about the term “keylogger”. So to give you a clear picture and make you understand better I would like to take up this post in the form of FAQs (Frequently Asked Questions). Here we go…

1. What is a Keylogger?

A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.

2. How Keylogger works?

Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the victim on that PC. Let’s take up a small example: The victim goes to http://mail.yahoo.com and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password” and will also tell you that they were typed in the Yahoo login page. Thus the keylogger loads upon every startup, runs in the background and captures each and every keystroke.

3. How to install the keylogger?

A keylogger can be installed just like any other program. Just follow the screen instructions and you’re done.

4. Do I need any special knowledge to install and use the keylogger?

Absolutely NOT! Anyone with a basic computer knowledge can install and use the keylogger. It requires no special skills.

5. Once I install the keylogger can the victim come to know about it’s presence?

No. The victim will never come to know about the presence of the keylogger on his/her computer. This is because, once installed the keylogger will run in total stealth mode. Unlike other programs it will never show up in start-menu, start-up, program files, add/remove programs and task manager. So the victim can no way identify it’s presence on his/her PC.

6. Can I be traced back if I install the keylogger on some other computer?

No, it’s almost impossible to trace back to you for installing the keylogger on other’s PC.

7. Which keylogger is the best?

Today there exists hundreds of keyloggers on the market and most of them are no more than a scam. So I tested some of the top keyloggers and conclude that the following is the best one.
SniperSpy



8. How SniperSpy works?

I will try to explain the working of Sniperspy in simple steps.

1. After you purchase Sniperspy, you’ll be able to create the installation module using easy set-up program. You need to email this module to the remote user as an attachment.

2. When the remote user runs the module it’ll get installed silently and monitoring process will begin. The keystrokes are captured and uploaded to the SniperSpy servers continously.

3. You can login to your Sniperspy account (you get this after purchase) to see the logs which contains the password.

9. I don’t have physical access to the traget computer. Can I still use SniperSpy?

Yes you can. SniperSpy supports REMOTE INSTALLATION feature which allows you to remotely install the program on any PC even if you have no physical access to it. For remote installation all you need to do is just place the module (refer FAQ-8) in a .zip/.rar file and send it as an attachment to the target email address (for which you need the password).

10. Can I install SniperSpy on a local computer?

If you need to install to your local (current) computer instead of your remote computer, then the process is simple. Simply navigate to the folder in which you saved your module ( Refer FAQ-8). Double-click the module filename to execute it. Nothing will appear on the screen as the software is installed.

11. What if the antivirus block from sending it as an email attachment?

Instead of sending the keylogger as an email attachment, it is recommended that you place the file in .ZIP/.RAR format and upload it to www.hotlinkfiles.com. After uploading, just send the direct download link to the victim via email. Once he downloads the file from this link and run it, the keylogger will get installed automatically.

12. Why SniperSpy is the best?

* SniperSpy supports REMOTE INSTALLATION feature. This feature is not present on most of the keyloggers.
* SniperSpy is fully compatible with Windows 98/ME/2000/XP/Vista and bypasses ANY Firewall.
* SniperSpy is more reliable than any other keylogger program. You need not rely on your email account to receive the logs. Instead you can just login to your online SniperSpy account to receive the logs.
* SniperSpy captures full-size screenshots of the activities on the target PC.
* Records BOTH sides of chats / IMs in Google Talk, Yahoo IM, Windows Live and more.
* SniperSpy is more easy to install and requires no extra knowledge.
* SniperSpy is recognized by BBC, CNN, CBS and other news networks. Hence it is reputed and trustworthy.

13. How safe is to use SniperSpy?

Sniperspy is completely safe to use since all the customer databases remain confidential and private. SniperSpy do not collect any information from your system other than the information required for the product’s successful operation. They will not contact you in any way unless you request assistance.

14. Is my online order 100% Safe and Secure?

Absolutely Yes! All the e-commerce transactions for SniperSpy is handled by Plimus – they are a trusted online retailer specializing in digitally delivered products. All your information remains private and secure. The safety and protection of your personal information is 100% guaranteed. So you can place your order for SniperSpy with no worries of scam!

SniperSpy is completely reliable, safe and best keylogger out there. It is really worth the price that you pay for it. I promise that you cannot get a better keylogger than this. So what are you waiting for? Go grab SniperSpy now! Visit the following link for more informaion.

How to use Keyloggers – Detailed Tutorial

China Mobile Secret Codes




The china mobile codes are very difficult to get.

As per the user demand i m posting the secret codes for china mobiles which work on all the chinese phones

Here are the codes for china mobiles try it
1)Default user code : 1122, 3344, 1234, 5678
2)Engineer mode : *#110*01#
3)Factory mode : *#987#
4)Enable COM port : *#110*01# -> Device -> Set UART -> PS Config -> UART1/115200
5)Restore factory settings : *#987*99#
6)LCD contrast : *#369#
7)Software version : *#800#
8)Software version : *#900#
9)Set default language : *#0000# Send
10)Set English language : *#0044# Send
11)Set English language (new firmware) : *#001# Send
12)Default user code : 1122, 3344, 1234, 5678

Inside GOOgLe – A Collection of Strange Links on Google

1.If you ever wondered all the misspellings of Britney Spears and their volume, you must check this out. http://www.google.com/jobs/britney.html

2.These two links are to fun Google games
http://www.google.com/Easter/feature_easter.html
http://www.google.com/heart/heart01.html

3.Quench your thirst for knowledge with Google Gulp
www.google.com/googlegulp/

4.Check out Google’s latest ideas
http://www.google.com/experimental/

5.If you are fond of puzzles
http://www.google.com/puzzles/

6.Tribute to Moms
http://www.google.com/moms01/

7.Google Mobile maps
http://www.google.com/mobile/gmm/index.html

8.http://www.google.com/tofc/

9.Are you scary smart?
http://www.google.com/scarysmart/

10.Google press center
http://www.google.com/press/

11.Google apps
http://www.google.com/a/help/intl/en/var_0.html

12Mind-racing problems.
http://www.google.com/indiacodejam/

13.Doodle 4 Google
http://www.google.com/doodle4google/

14.The virgle
http://www.google.com/virgle/

15.Google Alerts
http://www.google.com/alerts

16.Urchin Software from Google
http://www.google.com/urchin/

17.Google dictionary
http://www.google.com/translate_dict

18.Inside google
http://www.google.com/plex/

19.Movie reviews
http://www.google.com/reviews

20.GOOGLE MARS
http://www.google.com/mars/

21.GOOGLE SKY
http://www.google.com/sky/

22.Google’s next Coding Competition site
http://www.google.com/codejam/

23.http://www.google.com/pda
24.http://www.google.com/m
25.http://www.google.com/imode/
26.http://www.google.com/jsky

27.Blog search
http://www.google.com/blogsearch

28.Microsoft on google
http://www.google.com/microsoft

29.GOOGLE MOON
http://www.google.com/moon/

30.Google Linux
http://www.google.com/linux

30.http://www.google.com/ie

31.Google tour
http://www.google.com/tour/services/

32.Google TOS
http://www.google.com/accounts/TOS

33.Google trends
http://www.google.com/trends/hottrends

34.Google arts
http://www.google.com/Top/Arts/

35.Google 3d warehouse
http://www.google.com/sketchup/3dwh/

36.Google Adult content
http://www.google.com/Top/Adult/

37.Google & Dilbert Doodle
http://www.google.com/dilbert.html

38.Google in Kannada
www.google.com/intl/kn/

29.Google strange logos
http://www.google.com/doodle8.html
http://www.google.com/doodle9.html

30.Win Registry files in google
www.google.com/google_rsearch.reg

31.Google Universities Search
http://www.google.com/options/universities.html

Change the Title of Yahoo Messenger

Here’s how you change the title text that appears at the top of the Messenger window. By default, this is “Yahoo! Messenger”, followed by your status. Simply edit the ymsgr.ini file, which you will find in the same folder as the Messenger program, in your Program Files folder. Locate the file and open it in Notepad. Then, at the end, add the following:

[APP TITLE]
caption=YOUR TEXT

Here, “YOUR TEXT” is whatever you want in the title bar. Save the file and close Messenger. When you restart it you will see your text in the title bar.

How to Trace Any IP Address

Just go to http://www.ip2location.com/demo.aspx and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address.

1. Country in which the IP is located

2. Region

3. City

4. Latitude/Longitude

5. Zip Code

6. Time Zone

7. Name of the ISP

8. Internet Speed

9. Weather Station

10. Area Code and

11. Domain name associated with the IP address.

check out this link for more visual link :
http://www.yougetsignal.com/tools/visual-tracert/

Password Protected Folder

Step-1: Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance I name it as ABC.

Step-2: Now in this folder place all the important files, documents or any folders that you want to password protect.

Step-3: Now Right-click on this folder (ABC) and select the option Send To -> Compressed (zipped) Folder.

Step-4: Now a new compressed zipped folder gets created next this folder (ABC) with the same name.

Step-5: Double-click on this compressed zipped folder and you should see your original folder (ABC) here.

Step-6: Now goto the File menu and select the option Add a password.

ie: File -> Add a password

Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus you have now created the password protected folder.

How to Copy Locked Photos from Orkut

1. Login into your Orkut Account.

2. Goto your friend’s album and open the photo that you need to copy.

3. Once the photo is loaded to it’s full size just place the mouse cursor on the photo.

4. Press the left click button and drag and drop the photo onto the ADDRESS BAR. I think this trick is no longer working. So I have a new trick….

Just DRAG and DROP the PHOTO onto the current/new TAB (If you have IE 7). Alternatively you can also Drag and Drop the photo onto the Desktop. That’s it. This trick is working now!!

4. Now the photo gets displayed separately on your browser.

5. You can Right-Click and select the Save As option to save the photo onto your PC.

The browser also displays the direct link to the photo. This link can be used to share the Orkut photos with your friends without the need to login to your Orkut account to access photos.

Turn Your Account Into a Virtual Drive

WINDOWS SKYDRIVE

create account in hotmail : follow the link

http://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1269109316&rver=5.5.4177.0&wp=MBI&wlcxt=title&wreply=http:%2F%2Fcid-64ff379013abbb97.skydrive.live.com%2Fwelcome.aspx&lc=1033&id=250206

Removing Windows Genuine Advantage From the Registry

#
Step 1

Click on the "Start" button and then the "Run" icon.
#
Step 2

Type "regedit" without the quotation marks in the "Run" text field and click "OK." Your register editor program will now display.
#
Step 3

Navigate to the following registry file: "My Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify." You can find that key by first clicking on "My Computer," then "HKEY_LOCAL_MACHINE," then the "Software" folder, followed by the "Microsoft" folder, which brings you to the "Windows NT" folder, then the "Current Version" folder, followed by "WinLogon" and finally the "Notify" folder.
#
Step 4

Find the "WgaLogon" folder inside the "Notify" folder and right-click on it. Choose the "Delete" option and left-click on it. You have now removed the program files from the registry.
#
Step 5

Restart your computer for the changes to take effect. The program should now be removed from your registry.

Chat with Friends through ms dos Command Prompt

All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3) Now save this as "Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) You would then see something like this:

7) Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:

8) Now all you need to do is type your message and press Enter.
Start Chatting.......!

Rapidshare Hack

Here’s how to do it in windows:
1) Click Start
2) Click run
3) In the run box type cmd.exe and click OK
4) When the command pr
ompt opens type the following. ENTER after each new line.
ipconfig /flushdns
ipconfig /release
ipconfig /renew
exit
5) Erase your cookies in whatever browser you are using.
6) Try the rapidshare download again.
Frequently you will be assigned a new IP address when this happens.
Sometime you will, sometimes you will not. If you are on a fixed IP address, this method will not work.
If this works for you, you may want to save the above commands into a batch file, and just run it when you need it.