HACK UNPROTECTED WEBCAMS
In this article I will show you how to use a simple google Dork to access unprotected webcams online.There are thousands of unprotected webcams available online, Since many Webcams use known protocols to transmit live vedio streams over the web, it's often very easy to search for publicly accessible webcams
1.First of all open your internet browser and visit Google.com
2.Search on Google for the following Keyword "inurl:/view.index.shtml"
3. Next Choose a webcam and Enjoy
Wednesday, December 29, 2010
GAIN ACCESS TO UNPROTECTED WEBCAMS
Sunday, December 26, 2010
Run the Trial Program Forever
TRIAL PERIOD IS EXPIRED, NOW WHAT I DO?
In this post I’ll show you how to hack a Software and run the trial program forever. Most of us are familiar with many softwares that run only for a specified period of time in the trial mode. Once the trial period is expired these softwares stop functioning and demand for a purchase. But there is a way to run the softwares and make them function beyond the trial period. Isn’t this interesting?
Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares. I’ll try to explain this in brief.
When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc. After installation every time you run the software, it compares the current system date and time with the installed date and time. So, with this it can make out whether the trial period is expired or not.
So with this being the case, just manually changing the system date to an earlier date will not solve the problem. For this purpose there is a small Tool known as RunAsDate.
RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.
RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify. It works with Windows 2000, XP, 2003 and Vista.
NOTE: FOLLOW THESE TIPS CAREFULLY
You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.
1. Note down the date and time, when you install the software for the first time.
2. Once the trial period expires, you must always run the software using RunAsDate.
3. After the trial period is expired, do not run the software(program) directly. If you run the software directly even once, this hack may no longer work.
4. It is better and safe to inject the date of the last day in the trial period.
WPA PROCESS
WINDOWS PRODUCT ACTIVATION PROCEDURE
Windows Product Activation or WPA is a license validation procedure introduced by Microsoft Corporation in all versions of it’s Windows operating system. WPA was first introduced in Windows XP and continues to exist in Windows Server 2003, Windows Vista, Windows Server 2008 and Windows 7 as well. WPA enforces each end user to activate their copy of Windows so as to prevent unauthorized usage beyond the specific period of time until it is verified as genuine by Microsoft. How WPA really works was a closely guarded secret until GmbH analyzed WPA using a copy of Windows XP RC1 and published a paper on their findings.
In this post you will find answers to some of the most frequently asked questions about Windows Product Activation.
Why activation?
Microsoft’s intention behind the activation is to limit the usage of it’s Windows operating system to only one machine for which the retail license is issued. Any other computer which runs on the same license must be disallowed from using the software. Thus WPA demands for activation of the product within 30 days of it’s installation so as to ensure that it is genuine.
What does “Genuine Windows” means?
The copy of Windows is said to be genuine only if the product key used during the installation is genuine. It means that a given product key (retail license) must be used to install Windows only on one computer for which the license was purchased. Thus if the same key is used for the installation on another computer, then it is said to be a pirated copy.
Exactly what information is transmitted during the activation?
When you activate your copy of Windows you are transmitting an Installation ID code to the Microsoft either by phone or Internet depending on the method you choose to activate. Based on this, the Microsoft’s licensing system can determine whether or not the installed OS is genuine. If it is said to be genuine, then the system will receive the Activation ID which completes the activation process. If the activation is done via telephone then the Activation ID needs to be entered manually to complete the activation process.
What information does the Installation ID contain?
This Installation ID is a 50-digit number which is derived from the following two data.
1. Product ID – It is actually derived from the 25-digit product key (the alphanumeric value that is printed on the sticker over the Windows CD/DVD case) that is entered during the installation of the operating system. The Product ID is used to uniquely identify your copy of Windows.
2. Hardware ID – This value is derived based on the hardware configuration of your computer.
The WPA system checks the following 10 categories of the computer hardware to derive the Hardware ID:
- Display Adapter
- SCSI Adapter
- IDE Adapter (effectively the motherboard)
- Network Adapter (NIC) and its MAC Address
- RAM Amount Range (i.e., 0-64mb, 64-128mb, etc.)
- Processor Type
- Processor Serial Number
- Hard Drive Device
- Hard Drive Volume Serial Number (VSN)
- CD-ROM / CD-RW / DVD-ROM
Thus the Installation ID which is a combination of Product ID and Hardware ID is finally derived and sent to Microsoft during the activation process.
How is the Installation ID validated?
The Installation ID needs to be validated to confirm the authenticity of the installed copy of Windows. So after the Installation ID is received by Microsoft, it is decoded back so as to obtain the actual product key and the hardware details of the computer involved in the activation process.
The Microsoft’s system will now look to see if this is the first time the product key is being used for the activation. This happens when the user is trying to activate his Windows for the first time after purchase. If this is the case then the Installation ID is validated and the corresponding Activation ID is issued which completes the activation process.
However Microsoft system will now associate this product key with the hardware ID of the computer and stores this information on their servers. In simple words, during the first use of the product key, it is paired together with the Hardware ID and this information is stored up on the Microsoft servers.
What if a computer running a pirated copy of Windows attempts to activate?
The activation fails whenever the copy of Windows installed is not said to be genuine. This usually happens when the product key used for the installation is said to have been used earlier on a different computer. This is determined during the activation process as follows:
During the validation of the Installation ID, the Microsoft’s system checks to see if the same product key was used in any of the previous activation processes. If yes then it looks to see the Hardware ID associated with it. The computer running a pirated copy of Windows will obviously have a different hardware configuration and hence the Hardware ID will mismatch. In this case the activation process will fail.
Thus for a successful activation, either of the following two cases must be satisfied:
- The product key must have been used for the first time. ie: The product key should not have been used for earlier activations on any other computer.
- If the product key is said to have been used earlier, then the Hardware ID should match. This happens only if the same computer for which the license was genuinely purchased is attempting for subsequent activation.
What about formatting the hard disk?
Each time the hard disk is reformatted and Windows is re-installed, it needs to be re-activated. However the activation process will be completed smoothly since the same computer is attempting for subsequent activation. In this case both the product key and the Hardware ID will match and hence the activation becomes successful.
What is I upgrade or make changes to my hardware?
In the above mentioned 10 categories of hardware, at least 7 should be the same. Thus you are allowed to make changes to not more than 3 categories of hardware. If you make too many changes then your activation will fail. In this case, it is necessary to contact the customer service representative via phone and explain about your problem. If he is convinced he may re-issue a new product key for your computer using which you can re-activate your Windows.
Some things WPA does not do
- WPA does not send any personal information at all about you to Microsoft. There is still an option to register the product with Microsoft, but that is separate and entirely voluntary.
- If you prefer to activate via phone, you are not required to give any personal information to Microsoft.
- WPA does not provide a means for Microsoft to turn off your machine or damage your data/hardware. (Nor do they even have access to your data). This is a common myth that many people have about Microsoft products.
- WPA is not a “lease” system requiring more payments after two years or any other period. You may use the product as licensed in perpetuity.
I have tried my best to uncover the secret behind the WPA. For further details and more technical information you can read the actual paper by Fully Licensed GmbH athttp://www.licenturion.com/xp/fully-licensed-wpa.txt. I hope you like this post. Pass your comments.
WHAT IS GMBH?(Gesellschaft mit beschränkter Haftung)
What is the full phrase for 'GmbH', and what do the words in this acronym mean in English?
In Germany, there are two types of companies: publicly traded and privately held.
The acronym 'GmbH', which is written after the name of the company, designates a company as private in Germany. The letters stand for Gesellschaft mit beschränkter Haftung which, translated literally, means a 'company with limited liability'. GmbH companies are incorporated and, as such, are legal entities unto themselves. These companies must have a minimum of two partners and may be, but do not have to be, owned by a public company.
German companies that are publicly traded are designated as such by the letters 'AG' after the company name. 'AG' is an abbreviation for the German word Aktiengesellschaft, which literally translates to 'corporation' in English.
The laws of a country determine which types of companies are legally recognized within the country's borders. One of the most commonly used acronyms is 'PLC', which is used throughout the United Kingdom to indicate a Public Limited Company, or a company that is publicly traded with owners having limited liability. Throughout the world, 'S.A.' is used to indicate a privately held company, though its meaning varies depending on the country in which the company is registered. The words translate broadly as 'anonymous society' in English.
In Germany, there are two types of companies: publicly traded and privately held.
The acronym 'GmbH', which is written after the name of the company, designates a company as private in Germany. The letters stand for Gesellschaft mit beschränkter Haftung which, translated literally, means a 'company with limited liability'. GmbH companies are incorporated and, as such, are legal entities unto themselves. These companies must have a minimum of two partners and may be, but do not have to be, owned by a public company.
German companies that are publicly traded are designated as such by the letters 'AG' after the company name. 'AG' is an abbreviation for the German word Aktiengesellschaft, which literally translates to 'corporation' in English.
The laws of a country determine which types of companies are legally recognized within the country's borders. One of the most commonly used acronyms is 'PLC', which is used throughout the United Kingdom to indicate a Public Limited Company, or a company that is publicly traded with owners having limited liability. Throughout the world, 'S.A.' is used to indicate a privately held company, though its meaning varies depending on the country in which the company is registered. The words translate broadly as 'anonymous society' in English.
GOOGLE CHROME OS
GOOGLE CHROME OS
SAN FRANCISCO: What if nearly everything you usually keep on your computer — photos, documents, music and software — was stored online? Your machine would be speedier and perhaps less vital because you could simply use another machine to recoup your digital life should you lose your laptop.
This premise — somewhat scary, yet liberating — is behind Google Inc.'s upcoming Chrome OS, which will make notebook computers more like netbooks than most actual netbooks.
The software powering Chrome OS, which is based on the search giant's eponymously named browser, serves mainly as a tool for connecting your computer to the Web. That's where nearly everything you use is housed and linked to your Google username and password. It's a concept known as cloud computing.
A peek at the upcoming operating system and its vision of cloud computing shows a promising idea that could make computing faster and more convenient. But it still needs a lot of work.
Google expects the first computers powered by Chrome OS to be released this summer, and initially they'll be made by Acer Inc and Samsung Electronics Co.
For now, though, Google is operating a pilot for some individuals and companies to test an unbranded laptop that runs Chrome OS. The company lent The Associated Press one of these machines, which aren't going to be sold to the public.
The laptop itself, called the Cr-48, doesn't really deserve to be critiqued, because it is a stripped-down machine that is chiefly a frame for Google's OS oeuvre. The shell is entirely matte black plastic, without a hint of branding. It has a webcam, a screen that is about 12 inches diagonally and a full-sized keyboard with a search key in place of the caps lock key.
The machine also has 16 gigabytes of flash memory for storing files, if you feel absolutely compelled to download something. Downloads are obviously discouraged, though; my music collection alone would nearly fill this allotment.
Moving on to the main event, Chrome OS brings a few clear benefits: Starting up the notebook takes just seconds — roughly 13 of them, according to my stopwatch — and waking the closed notebook from "sleep" mode is as quick as opening it up (almost too quick, as the notebook couldn't regain its wireless service quite as fast). By contrast, my Windows machine at work takes more than two minutes to boot up.
After you sign in with your Google account, the same username and password you would use to access Gmail, you can pull up a home page showing all the apps you've installed from the Chrome Web Store. Assuming you're connected to the Web, you can just start using apps and surfing the Web right away.
There were plenty of free and paid Web apps and browser extensions available when I tested the notebook. Some are only for the Chrome OS; others also work with Google's Chrome Web browser for other computers.
I installed a range of the free ones, some of which seemed to be just links to existing Web pages. The apps I snagged included Web-based office suite Google Docs, the chatting service Google Talk, Aviary's Advanced Image Editor and balloon-popping puzzle game Poppit.
As with smart phones and tablets such as Apple Inc iPad, publications are also making Chrome apps. USA Today, The New York Times and The Wall Street Journal are among them.
On my work computer, it can take ages to open up applications that are stored on my hard drive. With the Cr-48, I could immediately start editing a Google Docs spreadsheet or tweak the colors in a photo using Aviary because the programs are all running online. I only needed a strong Internet connection.
Surfing the Web was a pretty normal experience, with most websites loading speedily, though the Cr-48 was not that good at displaying Flash videos.
But I felt constrained because I had to use the lone browser that comes with the system and the Web-based apps I obtained. Apps loaded slowly when my Internet connection wasn't stellar. This wouldn't be a problem with programs stored on a regular computer's hard drive.
If a Chrome OS-based laptop becomes my primary computer, a data plan would be a must.
I feel anxious just thinking about the possibility that I couldn't access my documents at any time, and I don't even keep anything that important on my own laptop.
I mostly used the notebook with Wi-Fi at home and at the office, though I also tried out its 3G network service, which is provide by Verizon Wireless.
So what happens if you don't have any Internet access? The Cr-48 is pretty useless.
I could still write in an already-open Google Docs document, add notes in Scratchpad and look at photos I'd downloaded. But I couldn't use apps that are not yet opened because they're all connected to the Web.
If you lose your connection while using an app, you may be able to view some information that has been temporarily stored in memory, as I could when browsing The New York Times' app. But you'll need to get online as soon as possible to really use the machine. Faced with this situation, I'd probably just search frantically for an Internet connection or simply put away my laptop.
In its current state, the Chrome OS is far from ready to take over as my main computer, even if I were using it on a more powerful machine than the Cr-48.
Sure, I spend most of my time on the Web already, but I'm not quite ready to rely on having Internet access to do almost anything with my computer.
I can imagine getting comfortable with that in the not-so-distant future, though, and I'm curious to see if Google can make it happen.
PROTECT YOUR COMPUTER FROM KEY LOGGERS
Use a Good Antivirus
This is the first and basic step that you need to take in order to protect your computer from keyloggers. Use a Good antivirus such as Kaspersky, Norton or Mcafee and update it regularly.
Use a Good Antispyware
Since keyloggers are basically spywares, if you are a frequent user of Internet then you could be exposed to thousands of keyloggers and spywares. So you should use a good antispyware such as NoAdware.
Antilogger can be Handy
Antiloggers are programs that detect the presence of keyloggers on a given computer. Over past few years, I have tested a lot of anti-logging programs and have found Zemana Antilogger as the best antilogger.
Zemana
Normally a keylogger can be easily detected by a Good Antivirus program, but hackers use some methods such as hexing, binding, crypting and similar techniques to make it harder to be detected by antivirus programs. In this case Zemana Antilogger comes handy as the program is specially developed to protect your system against harmful keyloggers.
Online Scanning
When ever you receive a suspicious file, you scan it with online scanners such as Multi engine antivirus scanner which scans your file with 24 antivirus engines and reports it back to you if the file is recognized as a virus or spyware. This ensures that none of the malicious programs can escape from being detected as there are 24 different antivirus engines are involved in the scanning process.
Sandboxie
Sandboxie is another great program to help you protect your computer against harmful keyloggers and spywares. Sandboxie runs your computer in an isolated space which prevents your program from making permanent changes to other programs in your computer.
When ever you receive a file that looks suspicious, just run the program with Sandboxie so even if it is a keylogger or any other virus it will not make permanent changes to your computer system.
To run a program in Sandboxie follow the steps as mentioned below:
1. Open sandboxie and click on sandbox menu on the top
2. Now goto Default sandbox
3. Then click on run any program
4. Now select the file you wish to run in sandboxie and click open
Keyscrambler
Keyscrambler is one of the best protection against keyloggers that you can have, Keyscrambler is a small program which encrypts your typed keystrokes so even if the victim has installed a keylogger on your system, he or she will get encrypted keys. Keyscrambler currently supports Firefox, Internet explorer and other applications, however its premium version supports more than 160 applications.
IT EYES HIGH GROWTH
IT EYES HIGH GROWTH
BANGALORE: It's been a happy 2010 for the tech industry. It ushered in glimpses of recovery, while the second half of the year brought in growth,hiring and resilience, pumping in a sense of confidence back to the markets which were shattered by the global economic meltdown.
The highlight was the revival and the resilience it showed. IT companies posted good numbers clearly signalling that the risk of a double dip recession emerging and disrupting growth are now behind us. Besides, hiring plans and increments were back on board, demonstrating the feel good in the sector.
So while 2010 was characterized by restructuring, consolidation, pragmatic learning and smart budgeting, 2011 will continue to build on that and move ahead, say industry experts. "The outlook for 2011 is positive and promising and innovation would be the key going forward," they said.
Kris Gopalakrishnan, CEO of Infosys Technologies, says, "The year 2010 brought us out of the recession. Growth is back, hiring numbers have picked up. Next year, the focus will be on innovation around emerging technologies like cloud computing and various mobile technologies.
On the business side, companies will focus on new geographies, new industries and new ways of engaging clients." It's not going to be limited to new technologies though. Avinash Vashistha, CEO of Tholons Inc, says verticals like retail, healthcare and BFSI were key growth drivers during this year and these spaces will continue to remain sunshine sectors throughout the year ahead as well. "We expect IT and BPO sectors to grow in 30% and 20% range respectively. The outlook is positive for large players."
There is a word of caution for small and medium companies though. Vashistha says small and medium enterprises were not able to participate in the growth story of 2010 and their future will continue to be grim in 2011 too.
"That's why we see certain companies like i-gate are trying to quickly gain some weight and size," he said. Arup Roy, senior reserch analyst at Gartner India, echoes similar sentiments: "Though the industry is on a positive footing there are clear trends emerging that marginal players could face tough times and we can thus expect more consolidation next year.
According to Siddharth A Pai, managing director, TPI, 2010 was an year of recovery and restructuring of the markets and existing contracts. "Many large 5/7 year deals were restructured and re-negotiated and large Indian service providers were able to win some of these contracts this year.
Next year will bring in some incremental growth in such contracts won by domestic providers. That means more work will flow offshore, to India and other low cost destinations in 2011, which is good news."
Innovation truly is key to going forward in 2011. In the product front, it will be about the point of design having an impact as a business advantage in architecture, engineering and construction and manufacturing spaces.
"Customers today are no longer asking us if they should use a model-based design approach but how innovative solutions can help them solve challenges of creating sustainable designs, meeting the growing demand for infrastructure, and operating in a productive and profitable manner.
Similarly for the manufacturing sector and the vast number of SMEs in the segment in India, good design is connecting ideas and innovation; turning those ideas into a real inventions," says Jayant Keswani, head marketing, Autodesk India & SAARC.
On the end-user front, 2010 saw two fundamental shifts—mobile phones became more well rounded in terms of features/functionality across segments and the smart phone platform moved from being a privilege of the elite to more mainstream. As a result, users consumed a lot more infotainment services like music, email, and life enhancing services at the rural level. 2011 will be about smartphones demand soaring driven by 3G launch.
"Companies are investing in building a strong services portfolio and ecosystem partnerships across services whether it is infotainment or business productivity services for enterprises and SMBs or life enhancing services for rural and non urban consumers," says V Ramnath, director , operator channel, Nokia India.
BANGALORE: It's been a happy 2010 for the tech industry. It ushered in glimpses of recovery, while the second half of the year brought in growth,hiring and resilience, pumping in a sense of confidence back to the markets which were shattered by the global economic meltdown.
The highlight was the revival and the resilience it showed. IT companies posted good numbers clearly signalling that the risk of a double dip recession emerging and disrupting growth are now behind us. Besides, hiring plans and increments were back on board, demonstrating the feel good in the sector.
So while 2010 was characterized by restructuring, consolidation, pragmatic learning and smart budgeting, 2011 will continue to build on that and move ahead, say industry experts. "The outlook for 2011 is positive and promising and innovation would be the key going forward," they said.
Kris Gopalakrishnan, CEO of Infosys Technologies, says, "The year 2010 brought us out of the recession. Growth is back, hiring numbers have picked up. Next year, the focus will be on innovation around emerging technologies like cloud computing and various mobile technologies.
On the business side, companies will focus on new geographies, new industries and new ways of engaging clients." It's not going to be limited to new technologies though. Avinash Vashistha, CEO of Tholons Inc, says verticals like retail, healthcare and BFSI were key growth drivers during this year and these spaces will continue to remain sunshine sectors throughout the year ahead as well. "We expect IT and BPO sectors to grow in 30% and 20% range respectively. The outlook is positive for large players."
There is a word of caution for small and medium companies though. Vashistha says small and medium enterprises were not able to participate in the growth story of 2010 and their future will continue to be grim in 2011 too.
"That's why we see certain companies like i-gate are trying to quickly gain some weight and size," he said. Arup Roy, senior reserch analyst at Gartner India, echoes similar sentiments: "Though the industry is on a positive footing there are clear trends emerging that marginal players could face tough times and we can thus expect more consolidation next year.
According to Siddharth A Pai, managing director, TPI, 2010 was an year of recovery and restructuring of the markets and existing contracts. "Many large 5/7 year deals were restructured and re-negotiated and large Indian service providers were able to win some of these contracts this year.
Next year will bring in some incremental growth in such contracts won by domestic providers. That means more work will flow offshore, to India and other low cost destinations in 2011, which is good news."
Innovation truly is key to going forward in 2011. In the product front, it will be about the point of design having an impact as a business advantage in architecture, engineering and construction and manufacturing spaces.
"Customers today are no longer asking us if they should use a model-based design approach but how innovative solutions can help them solve challenges of creating sustainable designs, meeting the growing demand for infrastructure, and operating in a productive and profitable manner.
Similarly for the manufacturing sector and the vast number of SMEs in the segment in India, good design is connecting ideas and innovation; turning those ideas into a real inventions," says Jayant Keswani, head marketing, Autodesk India & SAARC.
On the end-user front, 2010 saw two fundamental shifts—mobile phones became more well rounded in terms of features/functionality across segments and the smart phone platform moved from being a privilege of the elite to more mainstream. As a result, users consumed a lot more infotainment services like music, email, and life enhancing services at the rural level. 2011 will be about smartphones demand soaring driven by 3G launch.
"Companies are investing in building a strong services portfolio and ecosystem partnerships across services whether it is infotainment or business productivity services for enterprises and SMBs or life enhancing services for rural and non urban consumers," says V Ramnath, director , operator channel, Nokia India.
LATEST FRESHER OPENINGS
Saturday, December 25, 2010
FRESHERS OPENINGS IN AOL
CAREERS
Career Development
This is a mutual investment for maximum return. We look at professional development through four lenses: Learning, Performance Management, Career Management and Leadership Development. If you come work with us, where would
Benefits
Our Total Rewards philosophy supports your lifestyle and gives you peace of mind-so you can focus on what's important to you: family, work, and life. We offer a wide range of benefit choices that enable you to design or select the
College Selection
We're focused on surprising our consumers and winning in our space through our technology, content and consumer experiences. Students have a unique insight on the world, especially when it comes to
Hiring Process
We take great care in hiring new AOLers. We want to match your unique talents and passions with a position that allows you to flourish professionally and personally. That is why we assess
Current Job Openings
You can search job openings by location, brand or keyword -- or just go wild and check out all of our opportunities. If you don't find an open position that matches your interests, just submit
Subscribe to:
Posts (Atom)
Labels
- .NET JOBS (1)
- 3G (1)
- 50TH POST (1)
- ACER (1)
- ANJELINA JOLI (1)
- ANTIVIRUS FULL (3)
- Ap News (1)
- APPLE (1)
- AUTOMOBILES (1)
- B.E/B.TECH JOBS (7)
- BAJAJ PULSAR (1)
- BIKES (8)
- BMW (1)
- CAPGEMINI (1)
- CARS (15)
- CHALLENGE (1)
- CHEVROLET (1)
- CREATE VIRUS (6)
- DIGITAL CAMERA (1)
- DUCATI (1)
- EARN ONLINE (2)
- FACEBOOK (2)
- FIAT (1)
- FORD (1)
- FRESHER (7)
- FUN (3)
- GADGETS (20)
- HACKING TIPS (5)
- HACKS (1)
- HONDA (2)
- HP LAPTOPS (2)
- HYUNDAI (1)
- IDM 6.08 (1)
- INDIA (3)
- INTERNET (2)
- INTERNET DOWNLOAD MANAGER 6.08 (1)
- JOBS (7)
- KASPERSKY (1)
- KINETIC (1)
- KIV 2011 (1)
- LAPTOPS (3)
- LENOVO (1)
- MAHINDRA (1)
- MARUTHI (1)
- MERCEDES (1)
- MOBILE HACKS (2)
- MOBILES (21)
- NISSAN (1)
- NOKIA (10)
- ORACLE TIPS (2)
- REAL FACTS (1)
- REAL LOVE STORIES (2)
- REGISTRY TIPS (1)
- ROYAL ENFIELD (1)
- SAMSUNG (9)
- SECURITY (4)
- SKODA (1)
- SOFTWARES FULL (7)
- SONY (1)
- SUZUKI (1)
- TATA INDICA (1)
- TECHNOLOGY (22)
- THEMES (1)
- TOP NEWS (7)
- TVS (1)
- VEHICLES (18)
- VOLKSWAGEN (3)
- WIKI LEAKS (3)
- WINDOWS HACKS (14)
- WINDOWS SEVEN TIPS (2)
- YAMAHA (1)