WDL Demo Rss

Hack BSNL 3G For Free GPRS - Unlimited Internet

After BSNL India launched 3G for mobile phone , there were , many loopholes found in the system that were exploited by hackers to access free internet on their mobile phones. With this trick you can get Free Unlimited internet surfing on your 3G enabled mobile phone with BSNL 3G connection. I have tried this method on my Nokia 5800 Xpress Music phone.

Steps to connect BSNL 3G Free GPRS Trick:


  1. First of all you have to select GSM mode on your mobile.
  2. Go to settings then network settings and then select network mode GSM.
  3. After that go to your web browser and open any webpage , say m.google.com .
  4. After opening any website goto network settings and choose UMTS mode.
Thats it. Your 3G net is free now. This trick works for high end symbian phones like 5320, 5800, n95 etc and E series full support.

Note: When you enters from GSM to UMTS 1 paisa or 2 paise will be deducted from your account.


www.filesdesk.blogspot.in

How to set specified folder view to all Folder Views in windows XP and Vista?


How to set specified folder view to all Folder Views in windows XP and Vista?

Today tip will help you to manage the specified view of all folders in windows XP and Vista. By default, you have options to choose the view of folders contents as thumbnails, titles, icons, list or display with details. But this change will apply on the folders that you are currently working in. On the other hand, with the just few more clicks, you can change the view of all the folders on your computer.
Follow the given steps to accomplish this task through the Folder Options dialog box.
First of all open any folder, click "View" and choose the view you would most like to use.
Now from the Tools menu, click on Folder Options" to open the Folder Options dialog box.
Here on Folder Options dialog box, select the View tab.
At the top of the dialog box, click Apply to all folders button.
Now a new confirmation message will appear as "Set all the folders on your computer to match the current folders view settings (except for toolbars and folder task)? Change will occur the next time you open them."
Click OK in the Folder Options window to save the changes.
Now all the folders on your computer should display contents in your chosen view. As before, you can still change the view in individual folders via the "View" button.


www.filesdesk.blogspot.in

Wireless Router Tips


There are a wide variety of wireless routers on the market today. The features you need will depend on the extent of your network. In general it is good to look for one that has a built in firewall for security, decent speed and the ability to act as both a wired and wireless router, and good range. Belkin routers and Linksys routers are two popular brands. For the best range and speed, look for a wireless router which uses 802.11g technology.

Sharing an internet connection with a wireless router 
A wireless router hooks up directly to your cable or DSL modem via a cable. The wireless router will then transmit the broadband single to the computers with a wireless card in the range of the network. You will need to make sure that the cards are configured for the home network, same as with a wired network, but after that, you will be wire free!
Linksys wireless routers are an excellent brand which offers many benefits to users. Linksys makes routers which use 802.11g technology, which offers increased speed and range over older standards. They offer wireless routers in a variety of price ranges so they are affordable and functional for a wide variety of wireless networks. You can also purchase a linksys router with speed booster technology to further increase network speed and productivity.

Wireless Router 
A router is a device which connects one network to another. It is most used for connecting the internet (one large network) with a home or business network. Wireless routers allow you to share a broadband internet connection between several computers.

Wireless Router with Firewall 
Not all wireless routers come equipped with a firewall, but it is worth investing in a router that has one. Linksys wireless routers come in a variety of prices with a variety of firewall capabilities. Depending on the security needs of your wireless network, you may want to consider getting a wireless router with sophisticated firewall technology.

Belkin wireless router 
Belkin wireless routers offer excellent range and speed. One of their newest routers, the Belkin Pre-N has 8 times the range and 6 times the speed of regular 802.11g technology routers. They offer a variety of other wireless routers to meet the needs of small and large wireless network administrators.

Best Wireless Router 
The best wireless router will depend on your wireless network. If you have a small network within a small range of one another, it may not be necessary to purchase the latest and greatest wireless router on the market. However, if you run an office or business and want to maintain quality speed and performance, it is in your best interest to purchase the latest technology for the wireless router.

Wireless Router Password 
Most wireless routers come with a default password of admin. To maintain optimal wireless network security, it is a good idea to change this password so others will not be able to access the router, firewall, etc and hack your wireless network.

Wired and wireless router 
Many wireless routers offer the ability to use both a wired and wireless network. If you are not ready, and cannot make the switch fully to a wireless network, consider purchasing a wireless router which offers both options.

www.filestrend.blogspot.in

Wireless Internet Tips


If you plan on sharing your wireless internet access, you will need to have that option turned on in your settings. However, if you do not have other computers hooked up to the network at this time, for security purposes, you should leave the setting turned off until the need arises to share the wireless internet access.

Wireless Internet Speeds 
Coming in at the slowest is Bluetooth, followed by 802.11b, 802.11a and topping the charts currently is 802.11g. 802.11b is roughly equivalent to the traditional wired 10BaseT Wired Ethernet networks. Therefore, switching to Wi-Fi should not considerably slow down your wireless internet connection.

Wireless Network Equipment While Traveling 
You will need to have a wireless network card, either an adapter or integrated in your laptop. If you do not have an available slot on your PC, there are adapters you can purchase that plug into a USB port on the computer.

Finding a Wireless Internet Hot Spot 
There are several stores and restaurants that offer wireless internet access, such as Starbucks. If you have a particular destination in mind, you can call the hotels to see if they offer the service. There are also hot spot directories that you can search to find wireless internet access.

Wireless internet - WiFi Standards
802.11 is the Wi-Fi standard, however there are other standards which are variations of the 802.11. These include:
  • 802.11a
  • 802.11b
  • 802.11g
  • 802.11i.
The differences among these standards includes speed, transmission frequency, and price. 802.11g is backwards compatible with previous products, but that is not the case with 802.11a. Make sure you check on compatibility issues prior to purchasing products.

Wireless Internet and Dial up 
It is possible to share a wireless internet connection with dial up, but it is not a very good idea. Some access points, such as the airport extreme base station from Apple, will allow this. However, there is some slow down time with sharing a wireless internet connection, and if you decide to share a dial up connection, you won't be surfing anything fast.

Finding a Wireless Internet Hot Spot in a Chain 
If you are traveling and know that you will be stopping at Starbucks, for example, and want to access the internet, you can check out their website to see what specific franchises offer wireless internet access.

Paying for Wireless Internet Access 
Most likely, you will need to pay for the high speed wireless internet access when you travel. Starbucks for example uses T-mobile as their wireless internet provider. You will need to have a t-mobile account in order to access wi-fi at Starbucks. There are some restaurants that may advertise free Wi-Fi, but in general, you should expect to pay a fee.

Nationwide Wireless Internet Service 
There are a plethora of national wireless high speed internet services available. AT&T, Sprint PCS, T-mobile, and Verizon are a few which offer nationwide service. You will want to check out various pricing, roaming policies and fees for the various networks.

Mixing Apples and PC's to Share Wireless Internet Connection
You can mix apple and PC on a wireless network and share a wireless internet access. For example, Apple makes an access point called the AirPort Extreme Base station. Even though it is made by Apple, it still uses the Wi-Fi standard, and PC computers with a wireless adapter on the network will be able to share the wireless internet connection

Mixing Wireless Internet and Wired Internet 
You can easily share a wireless internet access while still maintaining a wired network. There are many wireless routers on the market which offer both wired and wireless network capabilities. It is also possible to add on an access point after a wired router for wireless access.

Configuring Wireless Access Point to Share Wireless Internet Connection 
Once you install the drivers on your computer for the access point, you will be able to open up the configuration software that comes with the router. The IP address 192.168.0.0 is the lowest in the network and should be dedicated to the router. Make sure to follow the specific configuration instructions that come with your wireless router, as each product will be slightly different from one another.

Wireless Internet Equipment 
The beauty of the WI-FI is that it set a standard for wireless networking. Because of this, you do not need to have equipment from all the same venders in order to run a successful wireless network. You will be able to share wireless internet access as well without having equipment from all the same venders.

Configuring Wireless Internet Card 
You will need to use the configuration software that comes with your network card to configure your computer to work at various hot spots. Simply type in the hotspot network name (various depending on the service you are using) and state the type of network, such as access point. You can also scan available wireless broadband internet access in the area and choose which network you wish to connect with.

Wireless Internet WIFI 
WI-FI, the 802.11 standard, is important for a variety of reasons. Having a standard in the industry ensures that anyone using wi-fi will be using the same standard, therefore equipment and connections are interchangeable. Having a set standard makes setting up wireless networks, sharing wireless internet access and working with wireless equipment more users friendly.

www.filesdesk.blogspot.in

Wireless Security Tips

Encryption is widely used for security of data, including wireless network security. Encryption is where data is translated into code for transmission via the radio waves. An encryption key, similar to a password, is needed to encrypt the code for transfer. If you are only minimally concerned with security, such as in wireless home network security, you may consider WEP encryption, which some find easier to configure with their current equipment.

Wireless Security: Protecting your password 
Your passwords are crucial to your wireless network security and should not be revealed to unauthorized individuals. Do not leave your password lying around or written in an obvious location. When entering your username and/or password, make sure people are not milling around and looking over your shoulder. Be very careful of responding to emails asking for passwords. Most legitimate companies do not ask for passwords via email due to the lack of security. These tips are useful for both wireless security and wired security.
Protect your business from online threats with the best internet security software.

Wireless Security: File Sharing 
Wireless network security is important. Always make sure to require a password from users connecting to your computer. Be careful about what folders you allow others to have access to. You can also set passwords on specific folders to further increase security.

Deciding on a Firewall 
The firewall you choose should be based primarily on the level of needed security, budget, reliability and the potential need to expand the wireless network. The most basic firewall, with minimal security is one that is part of a basic wireless router. The next level up is a dedicated firewall. After that comes a dedicated firewall device with a gateway. Finally, the highest level of wireless security is a dedicated firewall device (such as a computer) with a combination of proxy firewall and full packet filtering.

Wireless Security Encryption: 
WEP, wired equivalent privacy, is the standard encryption security that is built into all Wi-Fi devices. WEP does not provide as good of wireless security as WPA does, but is adequate for minimal security purposes.

Wireless Security: MAC filtering 
All devices on a wireless network have a MAC (media access control) address. This is a unique identification number that is part of the individual hardware. MAC filtering is where the access points on a wireless network will only speak with devices that you specify. MAC filtering is an excellent tool to use to enhance wireless security. This works great for wireless home network security, because the number of wireless devices will be manageable to work with.

Wireless Security: Firewall 
A firewall is either a piece of hardware or software which is used to block outsiders from accessing a network. Firewalls are an essential part of wireless network security. It works by controlling traffic between given zones of trust. A user has the ability to determine what is trustworthy and what is not. If you are running a wireless network, you may want to consider using a firewall which is built into a wireless router.

Wireless Security: Securing your laptop 
One of the benefits of a wireless network is the portability of computers. However, this can also lead to a serious wireless security risk and theft of computer. If you are traveling and using your computer in a hot spot area, do not leave it lying around outside of your eyesight. Consider investing in a cable lock, which will secure your laptop (or desktop) to a stationary object. There are higher levels of security you can look into, such as cards that sound an alarm with unauthorized movement.

Using more then one firewall 
You should only run one firewall on your network. This is true for both office and wireless home network security. If you run additional firewalls, you run the risk of conflicts. However, for wireless security, you can run one hardware firewall and one software firewall. For example, you can use a wireless router for the hardware firewall and firewall software on the computer.

Wireless Security: Setting Password 
Remember that your wireless home network is broadcast via radio waves, and can be accessible to anyone with range. If you do not set a password on your ad hoc network, then anyone within range can access the network. For this reason, it is crucial to set a password to protect your systems and to increase your wireless network security.

Basic Wireless Network Security 
There are several basic steps that everyone should do to help ensure wireless network security. When configuring your network, change the default names on the computers and set the SSID not to broadcast. Use wired equivalent privacy (WEP) encryption at a minimum. Change all default passwords for software and hardware. Finally, make sure to run antivirus software and antispyware software on all your computers. 

Choosing a good password for wireless security 
There are several tips to keep in mind when choosing a good password for wireless security. Do not use your name, initials or easy to guess numbers, such as address, birthday, etc. Any password based on personal information is a poor choice. Passwords should be at least eight characters long, and includes both numbers and characters. And remember, no matter how clever your password is, if you write it down where it is easily found, it won't be very secure.

 
Wireless Security Encryption: WPA 
WPA, Wi-Fi protected access, is an upgraded version of WEP. This newer protocol is more secure then WEP and, if you use a good password, is much tougher to crack. WPA devices are backwards compatible with WEP; however, in order to use WPA for wireless network security, all devices need to have WPA.

www.filesdesk.blogspot.in

How to Secure a Wireless Network from Hackers?

The reason we secure a wireless network is to stop people from using the services of our network who don't have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna.
In order to secure a wireless network from hackers, we should take proper steps to save ourselves against security issues. If you don't secure a wireless network from hackers, you might end up without its service. The consequence might also include the utilization of our network to attack further networks. To secure a wireless network from hackers, you should follow these simple wireless networking tips:
1.       Strategic antenna placement:
The first thing you have to do is to position the access point's antenna in a place which restricts the range of its signal to go further than the required area. You should not put the antenna close to a window because glass can't obstruct its signals. Place it in a central location of the building.
Use WEP:
WEP stands for Wireless encryption protocol.  It's a customary technique for encrypting traffic on a wireless network. You should never skip it as that will allow hackers to get instant access to the traffic over a wireless network.
3.       Change the SSID, disable the broadcast of SSID:
SSID stands for service set identifier.  It is the recognition thread utilized by the wireless access point due to which the customers are capable of starting connections. For every wireless access point arranged, select an exclusive as well as unique SSID. Also, if it's attainable, hold back the broadcast of the SSID out over the antenna. It won\t appear in the listing of offered networks, while being able to provide services as usual.
4.       Disable DHCP:
By doing this, the hackers will have to decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack your wireless network.
5.       Disable or modify SNMP settings:
Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.
6.       Utilize access lists:
For additional security of your wireless network, and if your access point support this feature, employ an access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers.


www.filesdesk.blogspot.in

Sunday, February 26, 2012 All (Ctrl+Alt+Del) Permanently deleted files Recovery solution

Sometimes we delete the files permanently, and realize that deleting them is like a Blunder...

For all those folks,
Here is the solution

Software called "Kissass Undelete" , can bring those files from the hard disk or your flash drive.
Conditions : Only if the data on that drive is not re-occupied(or written). that means the space which was available after the deletion is not been occupied after the deletion.

Click Here to download the .

1)
To start searching for the files,
Select the drive from the Left panel of the Windows and Click the scan button.
the Scan might take upto 10 secs.

2)
When the files search has been completed, it will show you the results with the name, typ, size and the last modified date of the searched file.

3) Now you can select the file to be recover. This is an Open source application and available for All Windows OS(Windows XP/Vista/ 7).

www.filesdesk.blogspot.in

How to "Delete administrator Password" without any software

Method 1

Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.

Method 2

Step 
1. Put your hard disk of your computer in any other pc .Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).Step 3. Then open that drive in which the victim’s window(or your window) is installed.Step 4. Go to location windows->system32->configStep 5. And delete SAM.exe and SAM.log 
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer 


www.filesdesk.blogspot.in

Keeping the Windows XP Core in the RAM

If you have 512 MB or more of RAM, you can increase system performance by having the Windows XP 'Core' kept in the RAM instead of paged on the hard disk.

Go to Start -> Run - Type regedit and press enter - On the left hand side tree, navigate to

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\

- On the list on the right side, look for an entry called 'DisablePagingExecutive'
- Double click it
- Press 1 on your keyboard
- Click OK
- Exit regedit and reboot the computer

To revert to the default setting, follow the same steps as above, but this time, press 0(zero) instead of 1 on the keyboard. 


www.filesdesk.blogspot.in

Recover the lost administrators password in Windows XP

Slightly more work needed if you lose or forget the Windows XP administrator password.

1.First reboot Windows XP in safe mode by re-starting the computer and pressing F8 repeated as the computer starts up.

2.Then (in safe mode) click Start and then click Run. In the open box type "control userpasswords2" without the quotes - I have just used quotes to differentiate what you have to type.

3.You will now have access to all the user accounts, including the administrators account and will be able to reset the lost password.

4.Just click the administrators user account, and then click Reset Password.

5.You will need to add a new password in the New password and the Confirm new password boxes, and confirm by clicking OK.


All done, you have recovered the lost adminitrators password! 




www.filesdesk.blogspot.in

How to find the IP address of the sender in Yahoo! mail

When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.

Finding IP address in Yahoo! Mail

1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
* Go back to the mails and open that mail.
5. You should see similar headers like this:Yahoo! headers : nameLook for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.That is be the IP address of the sender!
6. Track the IP address of the sender 


www.filesdesk.blogspot.in

How to find the IP address of the sender in Gmail

How to find the IP address of the sender in Gmail
When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.

Finding IP address in Gmail:

1.Log into your Gmail account with your username and password.

2. Open the mail.

3. To display the headers,* Click on More options corresponding to that thread. You should get a bunch of links.* Click on Show original.

4. You should get headers like this:Gmail headers : nameLook for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is65.119.112.245.That is be the IP address of the sender!

5. Track the IP address of the sender. 




www.filesdesk.blogspot.in