Related Websites

Monday 30 March 2009

My Shell List Price....


http:/www.blackout-tutorial.blogspot.com
====================================================
FOR MORE DETAIL JUST SEND ME EMAIL OR
ADD MY ID YAHOO MESSENGER..
contact person:
+6285830679974(blackout/V41)
send me first and put your name....

Friday 27 March 2009

# 26 posting - Although Download be more tighter

Thursday 26 March 2009

# 25 posting - Software in order to search serial,keygen,crack!!!!

SerialSearcher v0.2.3
Are you searching the web for hours for a simple serial / crack / keygen?
Are you sick and tired of all those websites which promise free cracks,
but you only get free trojans?
Do you want a quick and easy way to search 16 websites for serials and cracks?

Then don't wait any longer, because here is the solution: SerialSearcher!

SerialSearcher is:

Quick, easy and free
Free from spyware, adware, trojans and viruses
Multilingual (English, Dutch & German)
Supporting 16 different sources to find your serial / crack
Updateable trough it's own update-engine
Made so you don't get all those damn viruses & trojans from the internet

Download link :
Download SerialSearcher v0.2.3

# 24 posting - Flashdisck Protected

Try with this way....
- Right-click in My Computer and chose Manage
- Click in the Management Disk then
- Right click and choose "Change drive letter and paths"


if that way still cant, so i will teach you with another ways :
1.Open your Registry Editor ( Start Menu > Run, ketik : Regedit, then push Enter/click OK)
2.Then search key like this : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\StorageDevicePolicies
3. If in the right part panel was WriteProtect, double click and in the part value the data filled with 0 or removed WriteProtect this or also could remove key StorageDevicePolicies. Afterwards refresh (View > Refresh)
4. Please free USB Flash Disk and repeated copy the files


GOOD LUCK

# 23 posting - Foxit Reader 3.0 Build 1222 ( Although opening PDF became easy )

Foxit Reader is the only eligible alternative reader/viewer for PDF files (eBooks). It's free, smaller, faster, and cleaner. And it starts up immediately, so you don't need to wait the annoying "Welcome" screen to disappear. Foxit PDF Reader is extremely easy to use, just double click it to start and then click open button to open your PDF document. If you want to print, click on "Print" button. If you want to setup the page layout for printing, select "Print Setup" from "File" menu. Foxit Reader supports Windows 98/ Me/ 2000/ XP/ 2003/ Vista.

Unlike Adobe® Reader, this one has size about than 2.5 MB, needs no installation and opens up immediately. You don't need to go throught lengthy installation process to start using Foxit PDF Reader, just UNZIP the downloaded "pdfrd.zip" package into any place you want, then run PDFReader.exe. You can set Foxit PDF Reader as your default PDF reader, so you can double click on PDF files to open them within Foxit PDF Reader.

Now with Foxit Reader, you don't have to endure such pain any more. The following is a list of compelling advantages of Foxit Reader:
* Incredibly small: The download size of Foxit Reader is only 2.5 MB which is a fraction of Acrobat Reader 20 MB size.
* Breezing-fast: When you run Foxit Reader, it launches instantly without any delay. You are not forced to view an annoying splash window displaying company logo, author names, etc.
* Annotation tool: Have you ever wished to annotate (or comment on) a PDF document when you are reading it? Foxit Reader allows you to draw graphics, highlight text, type text and make notes on a PDF document and then print out or save the annotated document.
* Text converter: You may convert the whole PDF document into a simple text file.
* High security and privacy: Foxit Reader highly respects the security and privacy of users and will never connect to the Internet without users' permission. While other PDF readers often silently connect to the Internet in the background. Foxit PDF Reader does not contain any spyware.

Foxit Reader Pro is the professional version of Foxit Reader, the popular free PDF reader.

Foxit Reader Pro supports all features provided in Foxit Reader, and includes the following functions:
* Annotation
* Text viewer and text converter
* Form filler
* Spell checker
* Advanced editing tools, including loupe tool, measure tools, image tool, file attachment tool, link tools, annotation selection tool, and more

Actually without Pro Pack, you are still able to annotate a PDF document and print it out. However when you save the annotated document, it will be stamped with an evaluation mark on the top-right corner of the annotated pages. If you purchase a Pro Pack add-on, then there will be no evaluation mark.

What's new in Version 3.0:

New features:
* Enticing Multimedia Design. Now users can not only play multimedia in Foxit Reader, but also are empowered to add, edit or delete multimedia files with the incredible Movie Tool and Sound Tool.
* Attachment Panel. Lists all the attached files in the PDF document, and provides a number of common options that helps users manage the attachments, such as opening, deleting and adding description to the attachments. Users can also change the security settings when opening an attachment in this panel.
* Thumbnail Panel. Shows thumbnail images for each PDF page and allows users to quickly view relevant portions of a PDF file. Now users can navigate through PDFs with page thumbnails.
* Layout Panel. Lists PDF layers in the document, allows users to control the display of some certain content areas.
* Metric Unit Support. Within the preferences dialog box it gives users the option to set the unit of page dimension in either metric system or imperial system.
* Auto-scrolling with Middle Mouse Button. In the Hand Tool reading mode, users can perform auto-scrolling by holding the middle mouse button/wheel mouse button down.
* Awe-Inspiring Foxit OnDemand Content Management. This new add-on enables users to organize, share and collaborate on documents and forms online. Users can upload from Foxit Reader or send documents with ease. Advanced features include workflow driven document sharing, revisions of documents, CollabRoom for group collaboration.
* Firefox Support. With Firefox Plugin, users can view and work with PDF files loaded in Foxit Reader with Firefox web browser.

Enhanced features:
* Improved Select Text Tool. Not only used for selecting text, but also enables users to add most types of annotations, including highlight, strikeout, underline, squiggly, replacement, etc.
* Enhanced Print Setup. Supports printing separate pages or a range of pages by entering 1, 3, 7-10 or whatever in the Pages text box within the Print dialog box.
* Better Annotation Control. Allows users to align and center multiple annotations on PDF pages, including Notes, Drawing Markups and Typewriter Comments.
* Advanced Toolbar Control. Completely rearranges the toolbar layout and allows users to easily customize the tools that appear in Foxit Reader.
* Better Permission Control. Disables and grays out some UI elements when users are not allowed to perform the corresponding operations on the protected PDF document.
* Improved Upgrade Mode. Foxit Updater Preferences dialog box allows the user to configure the update settings. Foxit Reader supports the ability to check for updates automatically on a weekly or monthly basis.
* Improved Popup Note. A popup note turns transparent when it is open but not selected. Users can also cut, copy or paste text in the new popup note.
* Enhanced Shortcut Keys Input. Press F11 to enter or exit the full screen mode. Use keyboard shortcuts to fill PDF forms easily.
* Transferrable preferences Settings. Foxit Reader creates an INI file to save user's preferences settings so that it can be easily kept and transferred. Users can keep their own settings and don't have to configure them when Foxit Reader is updated or moved.
* Many Bug Fixes

Home Page - http://www.foxitsoftware.com/

Download Link:
Download Foxit Reader 3.0 Build 1222

# 22 posting - Top HOT 10 Virus

3 highest levels this time, were occupied by the virus import, successive was Conficker, Recycler, and Autoit. Conficker that was in the first place indeed had the capacity to spread that was extraordinary, and until this he was still continuing to be involved in infecting each computer all over the world, including Indonesia. His complete list as follows:

1)CONFICKER
Photobucket
The outside virus was high-technology this indeed spread extraordinary. His form that was file DLL. (Dynamic Link Library) distinguished him from most other viruses that took the form of EXE. Kemampuan that was had by him also could disetarakan with rootkit. As well as, his characteristics had polymorphic made him have the changing body. To the computer was infected, user can not open the site that “berbau” antivirius or Microsoft update. This virus also active spread in Indonesia by using the media removable the disk for example flash the disk. In flash the disk was infected, you will find file autorun.inf and the RECYCLER directory that inside was gotten the sub-directory by the name of for example S-5-3-42-2819952290-8240758988-879315005-3665, and to this directory was gotten file the Conficker virus by the name of usually jwgkvsq.vmx actual was file DLL..

2). RECYCLER varian
Photobucket
That became the typical characteristics of this virus was technical how he spread. That is “hidden” in the directory of Recycler/Recycler/Recycle Bin. He also it was known applied the technique code injection so that the virus code could “be 1” in explorer.exe. This the implementation to make more difficult user and the program antivirus although to kill him.

3).AUTOIT varian
Photobucket
Almost most variants from the virus import based script this used icon was similar like the folder. This virus had the capacity to do the car update to several sites. He could also make use of Yahoo! Messenger as his media of the spreading intermediary by sending the message contained link to every time contact person available in Y! M. casualties.

4). Yuyun.vbs
Photobucket
The virus that was created used Visual Basic Script this measuring around 9KB. Pada the computer was infected by him will make a great number file the duplicate in each folder that he found by the name of file autorun.inf, Thumb.db, in the condition had attribut hidden, and one shortcut by the name of Microsoft. If shortcut this was accessed, he will indeed head towards a folder, but was overturned that this virus will also be active. File Thumb.db here also not was file belonging to Windows, but but file script the virus. To the computer was infected also will be found by one file the message of the virus to the Temp directory user. In this directory also will be found file other that is script the virus that already in the condition tar-decrypt. Because of must be learnt by you that this virus indeed was present in the condition tar-enkripsi.

5). PISANG BAKAR
Photobucket
Icon that was used by this virus resembled the application WinAmp or file mp3. He was made used Visual Basic with the measurement of the body around 182KB, in-pack used UPX. When infecting the computer, he will search file .MP3 to afterwards be made his duplicate by resembling the same name, but with extension .EXE. So also during infected flash the disk, he will make a folder new by the name of “Lagu baru” that inside contained file “Marley-Bird Of Paradise.Exe”. In root drive C: will be found file “Info bananas Bakar.Txt” that contained the message from the manufacturer of the virus, moreover was also file “Pisang Bara.Exe”.

6). VIRES varian
Photobucket

7). WSAR.D
Photobucket

8). LABUNREKE
Photobucket

9). MAILINGSI varian
Photobucket

10). FREEMINE
Photobucket

Wednesday 25 March 2009

# 21 posting - PCMAV Express for Conficker

Photobucket

Was your computer infected by the Conficker virus (alias Kido or Downadup)? If yes, you used antivirus famous, but Conficker could not be cleaned completely? Not need to sad moreover disappointed. Currently PC Media, as market-leader the computer magazine in Indonesia, produced PCMAV Express for Conficker that at this time was *satu-satunya* antivirus especially Conficker supreme in the world that could give the complete solution in overcoming this virus. And this proved that PCMAV always to antivirus Indonesian pride, although that was dealt with was the foreign virus nan-sophisticated.
The NOTE: was caused so complex him the handling of this Conficker virus, especially resulting from the application of technology rootkit him that was quite neat and “indah”, architecture scan engine the PCMAV standard 2.0 available was not drafted and prepared to handle the new kind virus of this kind. It was for that purpose why PCMAV Express for Conficker this was present while being waiting for the appearance of the magazine PC the Media 05/2009 that will contain PCMAV the newest release.
Be different from antivirus other, PCMAV Express for Conficker was drafted specially and specially to be able to recognise accurately 100% and eradicated complete Conficker as far as “akar-akarnya”, although this virus had the technique antidebugging, anti-VM, double-layer obfuscated code and rootkit (siluman) that including sophisticated and complex.
Must be known, although PCMAV Express this could recognise accurately and settled 3 variants from Conficker (Conficker.A, B, & B-1) that was obtained by us from however many loyal readers the magazine of PC Media, but only 2 main variants (Conficker.A & B) that was known and was believed in by us spread so the width to hundreds of thousands of PC in the homeland. So untrue that at the moment the Conficker virus that entered Indonesia had hundreds as far as thousands of variants. Information sesat this an eye was the speculation of a small number of sides reseller/the seller/the manufacturer antivirus amatiran that in no way had adequate competence to analyse this virus that was really quite complex. Nevertheless, was not closed the possibility would the existence of the new Conficker variant. Please sent to editorial staff if you found him.
Moreover, if being antivirus other that as though could detect so many of them the variant of this virus (belasan as far as tens), then could be ascertained that the manufacturer antivirus this was deceived by the technique obfuscated code that was applied in this virus, or could also resulting from the technical inability of the manufacturer antivirus this that only understood the technique pendeteksian simple/the amateur with used hash (CRC, MD5, SHA). And technically, antivirus this kind would keok just as Conficker was active in memory.
First and the only one in Indonesia, PCMAV Express for Conficker was supplemented with technology RootScan newest nan-smart, that safely could penetrate as far as ring0 (kernel-mode) to detect the technology virus rootkit. This the main key so that antivirus could eradicate rootkit a kind of Conficker. Be as great as anything one antivirus in this world, while Conficker could be active and hiding in ring0, all the powers and efforts antivirus this to detect and cleanse him of most configurations system will be completely in vain. And our foreknowledge, just PCMAV Express this the only one antivirus especially Conficker in the world that used the sophisticated technique nan-unique this kind to chase this virus from memory safely.
Moreover, PCMAV Express this then could settle Conficker and cleaned settingan system that was infected and could restore him to the situation originally, including activated came back services that he turn off. Was difficult found antivirus Conficker other in the world that had the capacity like this: clean and complete!
As the addition, the complete analysis of this Conficker virus, that still was becoming the topic of warm discussions of the researchers antivirus all over the world, will be contained in the magazine PC the Media 05/2009 togethered with the PCMAV release newest that could overcome him. And the FAQ abstract the analysis of this virus will immediately be added in blog this. So, keep-in-touch!

The Use rule:
1. Confirmed user you had the right to be equal the Administrator.
2. Deactivated antivirus that terinstall in order to not disturb PCMAV Express.
3. Confirmed beforehand that your computer *tidak* terkoneksi to the network or the internet for the process scan.
4. After being finished, really was suggested to do restart and scan repeated (if necessary).
5. After the virus succeeded in being settled, immediately update/patch Windows Anda. PCMAV Express this then could detect if your computer not yet in patch.
6. Ascertain all of PC that has terhubung in the network also was free Conficker, before PC Anda came back terkoneksi to the network.
7. Confirmed password Administrator's right in PC Anda was not easy to be guessed, because Conficker had the capacity to infiltrate with did “tebakan” against password the Administrator with the public's available vocabulary in his dictionary. The substitute password you with the combination alphabet and numeric in order to be not easy to be guessed.
8. If the step 3-7 above was not followed by you well, then big the Conficker possibility could attack came back, was as good as anything antivirus that was used by you.

Download Here :
Download PCMav Express

Sunday 22 March 2009

# 20 posting - Generic Host For Win32 Sholved

Generic Host For Win32 Process Error has been haunting most of Windows PCs from a long time and is really one dreadful bug. The problem in my last fix was that it would cure the Generic Host Error Message from appearing but it would close the connection to the network PCs.

Here are 5 new solutions to the Generic Host For Win32 Error in Windows

Solution# 1:
1. Hop to ‘Run’ and open ‘Regedit’
2. Navigate to:
HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Services > Browser > Parameters
3. Find the Key
Name: IsDomainMaster
and set
Data: False
4. Restart Your PC


Solution# 2:
1. Go to ‘Run’ and open ‘cmd’
2. Type ‘netsh’ in command console then press enter
3. Then type ‘winsock’ and press enter and then type reset
4. Restart Your PC


Solution# 3:
Get the LSPFIX and follow the steps as directed


Solution# 4:
Get the Microsoft Update Patch and apply it.


Solution# 5:
Close Port 445:
1. Start Registry Editor (Regedit.exe) by clicking Start menu, and then click the Run icon.
2. In the small box that Opens, type: regedit then click the OK button. The Registry Editor will now have opened.
3. Locate the following key in the registry:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Servic es\NetBT\Parameters
In the right-hand side of the window find an option called TransportBindName.
Double click that value, and then delete the default value, thus giving it a blank value.

Friday 13 March 2009

# 19 posting - Eset Nod32 Antivirus 4.0.314.0 + Key

Photobucket

ESET NOD32 Antivirus System - Integrated, Real-Time Protection against viruses, worms, trojans, spyware, adware, phishing, and hackers. Best detection, fastest performance & smallest footprint.
NOD32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Mcft Windows, through a number of UNIX/Linux, Novell, MS DOS operating systems to Mcft Exchange Server, Lotus Domino and other mail servers.

ESET solutions are built on ESET’s one-of-a-kind ThreatSense technology. This advanced heuristics engine enables proactive detection of malware not covered by even the most frequently updated signature-based products by decoding and analyzing executable code in real time, using an emulated environment. By allowing malware to execute in a secure virtual world, ESET is able to clearly differentiate between benign files and even the most sophisticated and cleverly-disguised malware.

Users of Mcft® Windows® can experience the power and elegance of NOD32's ThreatSense Technology with ease and comfort. Our single optimized engine offers the best protection from viruses, spyware, adware, phishing attacks, and more. Keep tomorrow's threats at bay with our proactive detection technology.

If you are interested in computer security and would like to get a chance to influence the development of ESET's security systems, we invite you to join our Early Access program. Gain early access to the latest technology in beta and release candidate stages.

Changes in NOD32 Antivirus 4.0:
* Export/Import of root SSL certificate to well known web browsers (Firefox, Opera, Internet Explorer)
* Windows Live Mail v14 (Beta) is supported also
* Added support for including external programs to iso image (recovery CD function)
* Added possibility to edit user-defined servers for update module
* Support of SSL on Mcft Windows 2000 has been added
* Improved filtering of logs is available now(smart filtering)
* Support “Download Headers” mode in MS Outlook (Exchange, IMAP)
* Exclusions work for mapped network drives (there must be two exclusions: one for mapped path and one for UNC path)

Download in Here :
Download Eset Nod32 Antivirus 4.0.314.0 + Key

#18 posting - Mozilla Firefox 3 Hacker

Mozilla Firefox 3 Hacked Portable 10X TIMES FASTER!
Photobucket

Features:
The grand opening Firefox 3.0 Hacked Edition
This is one special Firefox 3,because is 10x times faster than the usual.There is added hack to that + skiping registering of some sites.
It has a auto-run who is showing some links and you're gonna run Mozilla from there.The size of this Firefox is about 8000KB because it's portable.

Download in Here :
Download Mozilla Firefox 3 Hacker

#17 posting - Crypto Chat 4 Skype 1.0.0.34

1. INSTALLATION:
After Crypto starts automatically post-installation, the following window appears:
Photobucket
It shows that Crypto is connecting to the Skype network. At the same time, Skype ™ displays the following dialog box in the bottom-right area of the screen near the Windows system tray:
Photobucket
This is Skype’s ™ way to ensure that the software accessing Skype ™ is legitimate. If you miss this window, you can accept this request later by clicking on the Red Flag indicating a missed event in the main Skype ™ screen.Click on "Click here to accept/deny..." to enable Crypto to access the Skype Network. This is required for Crypto to work. Skype’s ™ main window will like this:
Photobucket
Click on the " LFCryptoChat4Skype.exe...." link. The following window appears:
Photobucket
Select "Allow this program to use Skype" then click “OK”
Photobucket
Crypto can now access Skype’s ™ Network and you are ready to exchange Encryption Keys to start using CryptoChat4Skype.

Download :
Download Crypto Chat 4 Skype 1.0.0.3 in Here