Cyber Hoodies on Facebook

Find us on Facebook,please like the page and don't forget to follow....

Top methods on how hackers can hack facebook accounts in 2012.

Facebook is one of the most widely used social networking site with more than 750 million users, as a reason if which it has become the number 1 target of hackers.....

23 ways to speed Windows XP not only Defrag

Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will enhance the performance and reliability of your PCs.....

How Antivirus Software Works

Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it, so its essential for you to understand the working of antivirus.....

Who is a hacker ........!

To reduce the hardness of reading, i've uploaded two videos regarding who the hacker is just watch this.....

Wednesday 28 December 2011

Evolution and Future of Personal Computing

Let’s talk about last two decades in terms of evolution of personal computing.

1991-2000: Some major hardware developments occurred, which made the dream of personal computing come true. Software giants like Microsoft, Apple, Google, etc evolved and took over the IBM-dominant market. Desktops started making their way into offices and eventually, homes.
2001-2010: The starting of decade was taken over by Microsoft operating system, Windows XP. It spread like a fire, used in most offices, homes, business etc.                                                           Apple developed some products like iMac, MacBook, which had its different customer base, not as vast as Microsoft. But the end brought increment in the number of Mac users. 
On the hardware end, a vast change could be seen throughout. Huge, bulky desktops started shrinking and soon laptops became the first choice of home users. Apple, always known for its innovations, took the world by surprise on its launch of MacBook air. It was the thinnest laptop on the planet and was ultra portable. By the end, apple again came with the one of the biggest innovations of the decade, which might change computing forever. It was its tablet PC, iPad. Soon, many companies started launching their own android tablets, but still the iPad dominates the tablet market, mainly because it’s smooth, fluid interface and its large iOS app base. Microsoft, revealed its plans and preview of Windows 8, which was optimized both for tablet use and desktop/laptop use.

Monday 19 December 2011

Aakash tablet PC- specs and review

All of us are very well aware of India's cheapest tablet PC launched. They named it Aakash. Indian govt. promised last year to invent a cheapest tablet PC, so that every student can get to know know what is a tablet and how it works. Now govt. kept their promise and Aakash is in market. Anyone can purchase it online by visiting it's official website www.aakashtablet.com just for Rs. 2500/- 

Here i am presenting secifications and review of this tablet PC. 

Saturday 17 December 2011

Protect Your Facebook, Gmail, Hotmail, Yahoo Accounts From Hackers Using Zemana Antilogger

keylogger
Today I am writing article on "How To Protect Your Computer, Facebook, G mail, Hotmail, Yahoo Accounts From Hackers Using Zemana Anti logger". Zemana anti logger is a powerful way to protect your PC from malware, remote key loggers and spyware programs that are widely spread all over the Internet. Zemana Anti logger is the No.1 privacy software that can protect your computer by blocking all the known and unknown Internet threats.

Unlike most antivirus softwares, Zemana antilogger does not rely on the signature based and file scanning approach. Rather it makes use of a unique technology to detect and shut down the malware and spyware programs just before it can steal your identity or hurt your computer. Zemana AntiLogger eliminates threats from keyloggers, SSL banker trojans, spyware, and more..

Create A Hidden User Account in Windows 7 and xp

  • For your own privacy purposes or say it for security reasons you can Create A Hidden User Account under windows xp/7 operating system. 
  • This tweak will easily allow you an account that is normally displayed on the Welcome screen to be hidden from view. To log on using that hidden account it is necessary to use the Log On To Windows dialog box similar to the one that in Windows 2000.
 1. [Start] [Run] [Regedit]
 
2. Registry Key: HKEY_LOCAL_MACHINE \SOFTWARE\ Microsoft\ WindowsNT\ CurrentVersion\ Winlogon\ SpecialAccounts\ UserList

3. Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.

4. Data Type: REG_DWORD [Dword Value] // Value Name: Type Name of Account to be Hidden

5. Setting for Value Data: [0 = Account is Hidden / 1 = Enabled]

6. Exit Registry and Reboot...

While the account is hidden on the Welcome screen, note that the account profile will be visible in C:\Documents and Settings or wherever user profiles are stored as well as in Local Users and Groups.