Saturday, April 30, 2011

Cool trick - just try once.....



  • Grab a calculator. (You won't be able to do this one in your head)

  • Key in the first six digits of your mobile number

  • Multiply by 80

  • Add 1

  • Multiply by 250

  • Add the last 4 digits of your phone number

  • Add the last 4 digits of your phone number again.

  • Subtract 250

  • Divide number by 2

  • Press is equal to

    Do you recognize the answer?




    Ur Mobile number..........
     



  • Hide Any Drive In 3 Steps

    Hello.

    Most of you must have wondered if there exists a way without using software to Hide A Drive completely so that it cannot be viewed or accessed without unlocking it. Well for those who have and who haven't yet, here is a easiest method on How To Hide Any Drive In Just 3 Steps.

    Here we go, follow these 3 simple steps:

    01. Go To Start --> Run or use Win+R keys and type "cmd" and press Ok.

    02. This will open Command Prompt for you. Now type "diskpart" and press Enter:
    Once in Diskpart type "list volume" and press Enter:
    This will list all the partitions in ur system.



    Enter The Following Command

    "select volume 10".
    Remember to change 10 with the volume number of your partition you want to hide and press Enter:

    03. Now as in my example I am hiding drive G: so my last command is "remove letter G" and then press Enter:
    All done. Now open your computer and see that drive is made hidden

    Now to make a drive Unhidden

    Follow first 2 steps as such but in step 3 instead of remove letter G use "assign letter G"
        
     
    For Vista/Windows 7
    The commands becomes slightly different here:"assign letter=G" 

    Earthquake on ur machine!!!!

    Earthquake on ur machine!!!!
    do u want to have an EARTHQUAKE ON UR MACHINE??
    dont worry earthquake will take place for few seconds... copy the javascript code below and paste it into the address bar of your browser.. Listen it works only for mozilla and Internet Explorer browser..If u try plzz try on this browsers..

    The javascript code.....
    javascript:function flood(n) {if ( self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} flood(6); 

    How to access cmd if it is blocked!

    How to access cmd if it is blocked!

    1-Open notepad

    2-Type "command.com" in the text file

    3- Save the file as command.bat( or whatever you want, as long as it ends in .bat.)

    Make Ur Keyboard A live Disco

    Make ur keyboard a live disco.



    This code when executed makes your Caps, Num, Scroll lock keys flash..
    very attractive...i have tried it..trust me

    Instructions:
    *paste the code in notepad
    *Save as disco.vbs
    *Run the file
    This piece of code(in red color) makes your keyboard a live disco...

    Set wshShell =wscript.CreateObject("WScript.Shell")
    do
    wscript.sleep 100
    wshshell.sendkeys "{CAPSLOCK}"
    wshshell.sendkeys "{NUMLOCK}"
    wshshell.sendkeys "{SCROLLLOCK}"
    loop


    HOW TO REMOVE LIVE DISCO ON KEYBOARD WITHOUT CHANGING CODE.
    OPEN TASK MANAGER THEN IN PROCESSES DELETE WSCRIPT.EXE FILE

    Know About Hacking

    What are hackers?

    Technically, a hacker is someone who is enthusiastic about and all things relating to the technical workings of a computer. Under such a definition, I would gladly brand myself a hacker. (There is in fact more to it than that - hackerdom is an entire culture in its own right.) However, most people understand a hacker to be what is more accurately known as a 'cracker'. Worryingly, people tend to prefer to use the word 'hacker' over the more technically correct 'cracker'. This means that many are afraid to use the word for its correct meaning. On this website, when I refer to a hacker, I actually mean a cracker. This is because I prefer to use language that I feel most people understand, rather than language that is technically correct. If you want to know what a cracker is, please read ahead to the next section... 

    What are crackers?

    Crackers are people who try to gain unauthorised access to computers. This is normally done through the use of a 'backdoor' program installed on your machine. A lot of crackers also try to gain access to resources through the use of password cracking software, which tries billions of passwords to find the correct one for accessing a computer. Obviously, a good protection from this is to change passwords regularly. Another good move is the use of software that supports intruder lockout, where no further passwords are accepted after a certain number of bad passwords have tried. Even the correct password wouldn't allow access. Such blocks are normally released after a period of time has elapsed (eg 15 minutes). Of course, an even better idea is never to put security-sensitive resources on the Internet in the first place. If you don't want something to be accessed from the Internet, then make it so that it is only accessible from your local network, or even just from one computer. However, backdoor programs are programs that can expose files to the Internet that were never meant to be shared with other people. You can protect yourself from these by using a firewall and a good up-to-date anti-virus program. You would normally get such a backdoor program by opening an e-mail attachment containing the backdoor program. It is normal for such a backdoor program to send out more copies of itself to everyone in your address book, so it is possible for someone you know to unintentionally send you a malicious program. Note that this can normally only be done if you are using Microsoft Outlook or Outlook Express. A few backdoor programs can work with any e-mail program by sitting in memory and watching for a connection to a mail server, rather than actually running from within a specific mail program. If you do use Outlook or Outlook Express, and you do not have the correct security patches installed, it may be possible for a malicious program to be executed from an e-mail when you receive it, without the need for you to click on any attachments. Note that the same bug also affects Internet Explorer. A security patch is available for this, but personally I would advise that you use different mail and web browsing software.There are other ways of cracking as well, some more widespread than others. See How do hackers hack? for more information. Note that on most of this website, I refer to 'hackers' instead of 'crackers'. I mean 'crackers'. A cracker is someone too who does reverse eng. on programs and covers LL programming languages (like ASM 4 example) and modifies the program, mostly in aim of removing limitations ! 
    What damage can a hacker do?

    This depends upon what backdoor program(s) are hiding on your PC. Different programs can do different amounts of damage. However, most allow a hacker to smuggle another program onto your PC. This means that if a hacker can't do something using the backdoor program, he can easily put something else onto your computer that can. Hackers can see everything you are doing, and can access any file on your disk. Hackers can write new files, delete files, edit files, and do practically anything to a file that could be done to a file. A hacker could install several programs on to your system without your knowledge. Such programs could also be used to steal personal information such as passwords and credit card information. Some backdoor programs even allow a hacker to listen in on your conversations using your computer's microphone if one is attached! Hackers can do great damage to your computer. They could delete vital files from your hard disk, without which your computer could not work. However, you can re-install these from backups (you do keep backups, don't you?) In theory, the absolute worst damage a hacker could do is turn your computer into a large paperweight. It is possible - the CiH virusdemonstrated how. This virus attacked your computer using the then new Flash BIOS technology. This capability was intended to be used to upgrade your computer's BIOS. (The BIOS is a program stored on a chip inside your computer. It controls quite a lot of low-level stuff and is a very vital part of your computer. It is the BIOS that does all the memory checks when you turn on, and also performs the first stage in loading your operating system.) However, the virus used this 'feature' to destroy the BIOS. Without the BIOS, the computer can't work. The only way to recover from this would be to replace your computer's motherboard. At the time of writing this, there are no backdoor programs that can do the same thing, but it is easy enough for a hacker to install a virus that does. Since the CiH virus, many BIOSs have a "flash write protect" option in BIOS setup, and/or a jumper setting on the motherboard that has a similar effect. See your motherboard manual for details. 

    How does a firewall protect me?

    Basically, firewalls protect your computer from unauthorised access attempts. There are two kinds of firewall. Networked computers tend to be connected to the Internet through just one or two computers (hence only one Internet connection is required). These computers behave as firewalls by blocking any unauthorised packets. Any other packets are passed on to the computer they are intended for. This kind of firewall is called a corporate firewall. The kind of firewall you may be more familiar with is a personal firewall- this is a program that runs on your computer, and blocks any unauthorised incoming packets. Personally, I use ZoneAlarm. The great thing about ZoneAlarm is that it is easy to configure. Also, it only allows chosen programs to access the Internet- allowing you to block hackers that use standard protocols such as FTP. In case of emergency, it also has an emergency stop button, which allows you to block allfree by private individuals and charities. Businesses, governments, and educational institutions can download ZoneAlarm on the basis of a 60-day free trial. See ZoneLab's website for more information. access to the Internet immediately. ZoneAlarm can be downloaded and used for Remember that although a firewall stops hackers from getting in, it will not remove any existing 'backdoor' software from your machine. For this, you need a good anti-virus product like Norton or Sophos. Also make sure that you use your anti-virus software regularly, and that you keep it up-to-date. 

    How do I report hackers?

    When an access attempt occurs, if you have alert popups turned on, ZoneAlarm will tell you the IP address of the possible hacker. This looks something like 123.123.123.123 (example only). You can use this information to track down and report hackers to their ISP. Bare in mind that you are unlikely to get any response apart from a simple acknowledgement- they have to deal with hundreds of reports like yours every day. Here is a rough guide of how to report hackers (note: some of the programs referred to are only available in Windows):

    1. Make a note of all the information ZoneAlarm gives you. If possible, use ZoneAlarm's text log option- many ISPs prefer text log format (personally, I supply ZoneAlarm's text log and an English translation).
    2. Select Start, Run... In the Run box, type in "winipcfg" and then click OK. This will tell you what your IP address is (among other things). Write down the IP address.
    3. Use an Internet tool like SamSpade's address digger to look up which ISP uses the IP address given in your firewall's log.
    4. This will return a lot of technical information. Some ISPs add remarks to this information telling you where to send abuse reports to. Make a note of any such e-mail addresses. If there is no such information, look at the official name for the server (near the top), or the names of the domain name servers. To convert these to an e-mail address, remove everything before the first period, including the period itself, then add 'abuse@' in front of it.
    5. Now send an e-mail to the abuse address(es) you have. If the recipient obviously isn't English (eg if the e-mail address ends in .de (Germany) or .fr (France)), write it in their language, if you know it. If not, don't worry, most people speak at least a little English, and the technical language of computers is the same almost anywhere you go!
    6. Include in the message what ZoneAlarm told you. Also include your own IP address (this is what winipcfg told you), the date, the time, your time zone (in relation to GMT), and an indication of how accurate your computer's clock is (eg if you set it by the atomic clock every day, say so!)

    What is a port scan?

    A port scan is, quite simply, a test to see if a computer exists and responds to access attempts on a certain port (eg TCP port 80, used by the HTTP protocol). Port scans, on their own, are quite harmless and have many legitimate uses. However, they also have a malicious use, which is to test to see if any particular backdoor software is running on a computer for the purposes of then using such backdoor software. In my Internet logs, I include all unauthorised port scans of my computer. I tend to describe these port scans as hack attempts, since it is most likely that this is what they are. To be absolutely pedantic, I shouldn't really describe them as such, since there may be other explanations. 



    What is an IP address?

    An IP address is a number that can uniquely identify any computer on the Internet. With the current Internet protocol (IPv4), an IP address is a 32-bit number. That means that as a binary number, it would be stored as 32 ones and zeroes. There are 4,294,967,296 possible IP addresses. However, we humans tend to split IP addresses into four 8-bit numbers, express these numbers using our decimal number system, and separate them with dots. With 8-bit numbers, each number must be a whole number in the range 0 to 255, inclusive. For example, an IP address of 2,071,690,107 would probably be expressed as 123.123.123.123 (example only). Some people might express an IP address in hexadecimal as well (7B7B7B7Bh in this case). The dotted IP address is by far the most common, however. As the Internet grows, plans are being made to increase the size of IP addresses. (The "next" Internet protocol, IPv6, uses 128-bit IP addresses.) The problem with that, of course, is that quite a few Internet protocols would need to be rewritten, since they are designed to work with 32-bit IP addresses. This includes the Internet Protocol itself (IP). Thankfully, Internet packets include an IP version flag, so it would be possible to have both old and new implementations of the IP communicate with each other. (The newer implementation would use the older protocol when communicating with older implementations. Implementations of the IP would know whether a computer was using the older or newer protocol from the version flag. Unfortunately, older implementations would not be able to access anything outside of the 32-bit IP range.) IP addresses can be statically or dynamically allocated. Statically allocated IP addresses always refer to the same computer. However, dynamically allocated IP addresses can refer to different computers at different times. For example, if you have a dial-up Internet connection, your IP address doesn't become unused when you hang up- it is allocated to someone else. When you reconnect, you are allocated a new IP address. This is dynamic allocation. 

    How can I hack?

    I don't like that first person pronoun... I don't mind explaining how hackers hack, but I won't explain how you can hack. This is not a pro-hacking website. This is a computer security site. My aim is not to encourage or assist hacking in any way. I aim to try to inform people of the risks that they may be exposed to, so that they can better protect themselves from these risks. I also provide this website as a resource for those with an academic interest. If you want a rough idea of some of the cracking methods that other people (not you) use, just read on to the next section. 

    How can NetBIOS be harmful?

    NetBIOS hacks are the worst kind, since they don't require you to have any hidden backdoor program running on your computer. This kind of hack exploits a bug in Windows 9x. NetBIOS is meant to be used on local area networks, so machines on that network can share information. Unfortunately, the bug is that NetBIOS can also be used across the Internet - so a hacker can access your machine remotely. Not all Windows computers are vulnerable to this kind of attack. If you have a firewall that blocks incoming NetBIOS packets, you are safe. Some network configurations will also be immune. To find out whether you are vulnerable, visit GRC's ShieldsUP!, and click the "Test My Shields!" image half way down the page. Note that GRC will attempt to connect to your computer using NetBIOS - this is just to test whether your computer is vulnerable. GRC will not retain any information about your computer, nor will any damage be done. NetBIOS uses TCP port 139, UDP port 137 and UDP port 138. 

    How can ICMP Ping be harmful?

    ICMP is one of the main protocols that makes the Internet work. It standards for Internet Control Message Protocol. 'Ping' is one of the commands that can be sent to a computer using ICMP. Ordinarily, a computer would respond to this ping, telling the sender that the computer does exist. This is all pings are meant to do. Pings may seem harmless enough, but a large number of pings can make a Denial-of-Service attack, which overloads a computer. Also, hackers can use pings to see if a computer exists and does not have a firewall (firewalls can block pings). If a computer responds to a ping, then the hacker could then launch a more serious form of attack against a computer. People who do have firewalls normally don't bother to report pings, because they are innocent in themselves - allowing the hacker to continue hacking for quite a long period of time. 

    How can FTP be harmful?

    FTP is a standard Internet protocol, standing for File Transfer Protocol. You might use it for file downloads from some websites. If you have a web page of your own, you might use FTP to upload it from your home computer to the web server. However, FTP can also be used by some hackers... FTP normally requires some form of authentication for access to private files, or for writing to files. Hackers can get round this by using programs called "backdoor programs". You wouldn't know if you had one of these, unless you used an up-to-date virus scanner regularly. You could get a backdoor program by opening an infected E-mail attachment. FTP backdoor programs, such as Doly Trojan, Fore, and Blade Runner, simply turn your computer into an FTP server, without any authentication. Using a known protocol such as FTP is easier for hackers because the protocol is already defined - not so much new software needs to be written to use it (a normal FTP client could be used - the hacker wouldn't need any specialist software). Also, since FTP has legitimate uses, many firewalls do not block it. Luckily, ZoneAlarm does. 

    How can rpc.statd be harmful?

    This is a problem specific to Linux and Unix. I am not too sure with what precisely rpc.statd should be used for. I do, however, know that it is used by hackers. rpc.statd is typically used as a 'file locking status monitor' (whatever that is) on local area networks. Not all versions of Linux/Unix use it, and some versions have had the security glitch I am about to describe fixed. The problem is the infamous unchecked buffer overflow problem. This is where a fixed amount of memory is set aside for storage of data. If data is received that is larger than this buffer, the program should truncate the data or send back an error, or at least do something other than ignore the problem. Unfortunately, the data overflows the memory that has been allocated to it, and the data is written into parts of memory it shouldn't be in. This can cause crashes of various different kinds. However, a skilled hacker could write bits of program code into memory that may be executed to perform the hacker's evil deeds. That is the problem. rpc.statd uses TCP ports 111 and 9704. 

    How can lpr be harmful?

    This is a similar problem specific to Linux and Unix. lpr is typically used as a printing system. Not all versions of Linux/Unix use it, and some versions have had the security glitch I am about to describe fixed.The problem is the infamous unchecked buffer overflow problem (again). See rpc.statd for more information on this problem. Basically, the result of this problem is that data can be written into parts of memory it shouldn't be written to. A skilled hacker could write program code into memory to perform his evil deeds. lpr uses TCP port 515. 

    How can HTTP be harmful?
     
    HTTP stands for HyperText Transfer Protocol. It is one of the main protocols used on the Internet- it is what you are using right now to view this web page. HTTP hacks can only be harmful if you are using Microsoft web server software, such as Personal Web Server. There is a bug in this software called an 'unchecked buffer overflow'. If a user makes a request for a file on the web server with a very long name, parts of the request get written into parts of memory that contain active program code. A malicious user could use this to run any program they want on the server. The Code Red worm takes advantage of this. This worm even managed to infect the Microsoft Windows Update site at one point. Despite what I have just said, it is still possible for home users to become infected with such worms, since some people install Personal Web Server without knowing what it is. Some computers even have PWS pre-installed when you buy them. To see if PWS is running on your computer, hover your mouse over each of the icons in the bottom right corner of your screen, until a small description appears. If one of the icons is PWS, right-click it and choose to exit. Then, use Add/Remove Programs in Control Panel to remove the program from your system. Microsoft Personal Web Server is used to serve web pages directly from your computer to the rest of the world. Of course, you would need to be connected to the Internet 24 hours a day in order to do this. Most people will tend to upload Internet material to their ISP, rather than provide access to it directly from their own computer. And just to clear up any remaining confusion: Microsoft Personal Web Server is not required to surf the Internet- all you need to surf the Internet is a web browser and an Internet connection (such as dial-up). 
    HTTP uses TCP port 80. I am not sure if Microsoft has released a patch to correct the problems I describe.

    Some usefull Run Commands

    S0ME hidden RUN comnd for ur pc Just go start,then click on Run then type any comand below 
    0)cmd - comand prompt 
    1)compmgmt.msc - for computer managent 
    2)devmgmt.msc - device manager 
    3) regedit - registry editor 
    4) msconfig - system configuratn utility . . . 
    5) compmgmt.msc - Computer management 
    6) devmgmt.msc - Device manager 
    7) diskmgmt.msc - Disk management 
    8) dfrg.msc - Disk defrag 
    9) eventvwr.msc - Event viewer 
    10) fsmgmt.msc - Shared folders 
    11) gpedit.msc - Group policies 
    12) lusrmgr.msc - Local users and groups 
    13) perfmon.msc - Performance monitor 
    14) rsop.msc - Resultant set of policies 
    15) secpol.msc - Local security settings 
    16) services.msc - Various Services 
    17) msinfo32 - System Information 
    18) sysedit - System Edit 
    19) win.ini - windows loading information(also system.ini) 
    20) winver _ Shows current version of windows 
    21) calc - calculator

    Saturday, April 23, 2011

    Block or Unblock usb drives

    First of all

    GO TO --> START --> RUN

    Now type REGEDIT

    Now look for the key :
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\USBSTOR


    now find the key there called :-
    "Start"
    double click on it.
    now change the value data 3 --> 4

    where its base is Hexadecimal
    here you go

    U have done it
    now close the registry and you'll see the result. yours PC's all usb ports are disabled

    To Re-Enable/Unblock USB Ports just change the value data again 4 --> 3
    now your PC's all USB Ports are Re-Enabled

    Delete a GMAIL account

    I don't need my gmail account anymore.I do how to delete it.How to delete my gmail account?
    Follow the below steps for deleting your Google or Gmail Account.

    1. Login into your Gmail account & click settings.
    2. Now go to "Accounts and Import".
    3. Near the bottom of that page is the "Google Account Settings" area. Click on the "Google Account Settings" link and you'll be pushed to the Google Account area.
    4. That's the default setup: Gmail, iGoogle and Web Search history.
    5. Now click on "Edit" next to My Products.
    6. Now you can finally see what's going on! The question is: do you want to delete your Gmail account, or do you want to delete the entire account and all Google services?
    7. Select a option and delete services you wish to close.


    That's It

    Google Secret Search - Google Fun

    Google Search Engine is the Best Search engine.You have can have lots of fun with Google Search.Read my previous Post about Top 13 Different Styles of Google Search pages and
    Fun With Google Image Search and in this current post you can find additional Google Fun Stuff.

    Google Search Fun Trick 1:
    Just write it in google searchbar & "click i'm feeling lucky"

    Here are the words:
    1. elgoog
    2. google 133t
    3. google gothic
    4. google bsd
    5. google ester egg
    6. xx-piglatin
    7. google linux
    8. ewmew fudd
    9. xx-klingon
    10. answer to life, the universe and everything



    Google Search Fun Trick 2:
    Go to google then write "google gothic" and click i'm feeling lucky
    Go to google then type "google easter egg" and click i'm feeling lucky

    Google Search Fun Trick 3:
    Go to the below Link.you can find Google timeline
    http://www.google.co.uk/tenthbirthday/#start

    Friday, April 22, 2011

    Download as premium user in rapishare,megaupload,uploading,hotfile,etc

    http://www.gigaleecher.com
    just paste the link of your download and hit leech

    Easy way to Download youtube videos to your computer


    Using 
    1)www.KeepVid.com.
    2)http://www.zillatube.com/
    3)www.savevid.com

                         You’ve all probably wondered how you can download the videos you find on YouTube to your hard drive so that you can use them for other projects, such as PowerPoint presentations or video montages. Or, perhaps you’d like to take them with you to places where you might not have access to the Internet. While there are many ways to do that, most focus on extensions or add ons for the Firefox Web browser. And that may leave you wondering if you can do the same with Internet Explorer. Well, the answer is yes and it’s very simple to do. First, just direct your browser to 
    KeepVid is a Web based YouTube downloader that’s very easy to use! It can be used anywhere and accessed from any regular Web browser. The homepage looks like this:

    A Code To Clean All Temporary Files,Cookies,Temperary Internet Files !!!!

    Just use notepad....

    Use this 'tutorial' to clean your: *.tmp、*._mp *.log 、*.gid、*.chk、*.old、*.bak and ?Temporary Internet Files? ,etc...


    Step 1:
    Start with making a new txt file.

    Step 2:
    Paste this code in the txt file:
    Code:


    @echo off
    echo Webhog Cleaner
    echo waiting
    del /f /s /q %systemdrive%\*.tmp
    del /f /s /q %systemdrive%\*._mp
    del /f /s /q %systemdrive%\*.log
    del /f /s /q %systemdrive%\*.gid
    del /f /s /q %systemdrive%\*.chk
    del /f /s /q %systemdrive%\*.old
    del /f /s /q %systemdrive%\recycled\*.*
    del /f /s /q %windir%\*.bak
    del /f /s /q %windir%\prefetch\*.*
    rd /s /q %windir%\temp & md %windir%\temp
    del /f /q %userprofile%\cookies\*.*
    del /f /q %userprofile%\recent\*.*
    del /f /s /q ?%userprofile%\Local Settings\Temporary Internet Files\*.*?
    del /f /s /q ?%userprofile%\Local Settings\Temp\*.*?
    del /f /s /q ?%userprofile%\recent\*.*?
    echo complete!
    echo. & pause



    Step 3:
    Now save the file as "Cleaner.bat"

    After saving this file, Just open it and see for your self

    Beauty Of Maths


    Sequential Inputs of numbers with 8
    1 x 8 + 1 = 9
    12 x 8 + 2 = 98
    123 x 8 + 3 = 987
    1234 x 8 + 4 = 9876
    12345 x 8 + 5 = 98765
    123456 x 8 + 6 = 987654
    1234567 x 8 + 7 = 9876543
    12345678 x 8 + 8 = 98765432
    123456789 x 8 + 9 = 987654321

    Sequential 1's with 9
    1 x 9 + 2 = 11
    12 x 9 + 3 = 111
    123 x 9 + 4 = 1111
    1234 x 9 + 5 = 11111
    12345 x 9 + 6 = 111111
    123456 x 9 + 7 = 1111111
    1234567 x 9 + 8 = 11111111
    12345678 x 9 + 9 = 111111111
    123456789 x 9 + 10 = 1111111111

    Sequential 8's with 9
    9 x 9 + 7 = 88
    98 x 9 + 6 = 888
    987 x 9 + 5 = 8888
    9876 x 9 + 4 = 88888
    98765 x 9 + 3 = 888888
    987654 x 9 + 2 = 8888888
    9876543 x 9 + 1 = 88888888
    98765432 x 9 + 0 = 888888888

    Numeric Palindrome with 1's
    1 x 1 = 1
    11 x 11 = 121
    111 x 111 = 12321
    1111 x 1111 = 1234321
    11111 x 11111 = 123454321
    111111 x 111111 = 12345654321
    1111111 x 1111111 = 1234567654321
    11111111 x 11111111 = 123456787654321
    111111111 x 111111111 = 12345678987654321

    Without 8
    12345679 x 9 = 111111111
    12345679 x 18 = 222222222
    12345679 x 27 = 333333333
    12345679 x 36 = 444444444
    12345679 x 45 = 555555555
    12345679 x 54 = 666666666
    12345679 x 63 = 777777777
    12345679 x 72 = 888888888
    12345679 x 81 = 999999999

    Sequential Inputs of 9
    9 x 9 = 81
    99 x 99 = 9801
    999 x 999 = 998001
    9999 x 9999 = 99980001
    99999 x 99999 = 9999800001
    999999 x 999999 = 999998000001
    9999999 x 9999999 = 99999980000001
    99999999 x 99999999 = 9999999800000001
    999999999 x 999999999 = 999999998000000001

     
    Sequential Inputs of 6
    6 x 7 = 42
    66 x 67 = 4422
    666 x 667 = 444222
    6666 x 6667 = 44442222
    66666 x 66667 = 4444422222
    666666 x 666667 = 444444222222
    6666666 x 6666667 = 44444442222222
    66666666 x 66666667 = 4444444422222222
    666666666 x 666666667 = 444444444222222222

    Sunday, April 17, 2011

    TeamViewer full version - Windows



    Improved: Custom QuickSupport

      When you create your individual Custom QuickSupport, enter your partner list data. As soon as your customer starts QuickSupport, it appears in your partner list, and you can reach it directly with a single click – without having to exchange an ID and password via telephone or e-mail.

         Position a personal disclaimer in QuickSupport to be legally on the safe side.

          Now, you can define the password security yourself.

           You also have the option of exchanging chat messages via QuickSupport and before establishing your TeamViewer connection, even if your customer does not have a partner list account.


    ·         All new: QuickJoin 
             The new QuickJoin module is ideal for online presentations or meetings. With the invitation function, you can now send the session data to your participants ahead of the session. The participants now connect with you via the application and not the other way around. This saves you from entering the data of every single one of your participants. As the presenter, you also determine the time at which the participants can see your application windows, even if they have already established a connection.
             Alternatively you can customize the QuickJoin module, specify the session data additionally and send the file to your participants who can join your presentation easily with a single click.
             With QuickJoin, all the important functions for online presentations, such as VoIP, video, whiteboard and chat, are available.
              
    o    Additional Improved and New Functions
      Optimized performance: TeamViewer connections are now even faster and more stable - particularly to and between company networks.
      More user-friendly design: Navigate even faster and more easily! The new clear division between the remote maintenance and presentation modes is more user-friendly and convincing with its refreshing design.
      Automatic: Now, TeamViewer re-establishes the connection automatically after a remote reboot or an update.
      New language version: TeamViewer is now also available in Chinese. Overall, TeamViewer is now available in more than 30 languages. Additional language versions will follow.
      More secure: You can protect the TeamViewer options with a password.
    Remote support without installation
    With TeamViewer you can remotely control any PC anywhere on the Internet. No installation is required, just run the application on both sides and connect - even through tight firewalls.

    Remote access to unattended computers
    Easily get direct 24/7 access to unattended computers and servers. The best thing about it: no additional costs for permanent installation on your customer’s computer, office computer, or home computer.

    Highest security standard
    TeamViewer is a very secure solution. All versions feature completely secure data channels with key exchange and AES (256 Bit) session encoding, the same security standard used by https/SSL.

    File transfer
    TeamViewer comes with integrated file transfer that allows you to copy files and folders to and from a remote partner - which also works behind firewalls

    Visit  http://www.teamviewer.com/en/index.aspx



    Works behind firewalls
    The major difficulties in using remote control software are firewalls and blocked ports, as well as NAT routing for local IP addresses.
    If you use TeamViewer you don't have to worry about firewalls: TeamViewer will find a route to your partner.

    Browser based access
    On the road and need to control a remote computer? Why don't you use TeamViewer Web Connector? The purely html and flash based solution can be used from nearly any browser and operating system.

    Fast return on investment
    Inexpensive TeamViewer license fees will pay off very quickly due to time and cost savings. Private users can even use it for free!

    Optimized performance
    Whether you have a LAN or dial-up connection, TeamViewer optimizes display quality and speed depending on your network connection.


    For how to use      http://www.4shared.com/document/jYeRTNsY/teamviewer_manual.html?