Saturday, July 11, 2009

BEST PROXY SITE

Here are some best proxy site.

1. http://www.shadowsurf.com/
2. http://anonymouse.ws/
3. https://www.hidemyass.com
4. http://www.your-freedom.in
5. http://www.cooltunnel.com/
6. http://www.browseatwork.com
7. http://www.proxify.com
8. http://www.novalok.net
9. http://bypass.4clever.com/
10. http://www.b3u.net
11. http://www.hidemyass.com
12. http://www.mathcookbook.com
13. http://www.guardster.com/subscription/proxy_free.php
14. http://www.anonymouse.org
15. http://www.tinyurl.com/ntbam
16. http://www.ghostproxy.com
17. http://www.papertigershark.com
18. http://www.iphide.co.uk
19. http://www.hackersproof.com
20. http://www.kcoolonline.com
21. http://www.ghostsurfing.co.uk
22. http://www.anonycat.com
23. http://www.browseatwork.com
24. http://rapidwire.net
25. http://62.193.247.221/
26. http://prox30.com
27. http://www.privax.us
28. http://www.etary.com
29. http://s1.iphide.com
30. http://proxiesrus.com
31. http://www.surfindark.com
32. http://www.navydog.com
33. http://falsario.com
34. http://www.cheekyproxy.com
35. http://www.funkyproxy.com
36. http://www.surfsneaker.com
37. http://www.proxii.com
38. http://www.proxynumber1.com (Replace 1 with any number between 1 to 10)
39. http://myspaceproxyy.com
40. http://tenpass.com
41. http://www.browsesneaky.com
42. http://www.proogle.info
43. http://greatproxy.info
44. http://www.realproxy.info
45. http://aplusproxy.com
46. http://www.ecoproxy.com
47. http://proxiesrus.com/
48. http://www.navydog.com
49. http://www.cheekyproxy.com
50. http://www.funkyproxy.com
51. http://www.surfsneaker.com
52. http://www.proxii.com
53. http://myspaceproxyy.com
54. http://tenpass.com
55. http://www.ecoproxy.com
56. http://www.browsehidden.com/
57. http://www.surfsneaky.com/
58. http://www.filterhide.com/
59. http://www.birdsflyfast.com

ALL FILE FORMAT WITH THEIR EXTENSION

ABK :-Corel Draw AutoBackup
ACL :-Corel Draw 6 keyboard accelerator
ACM :-Used by Windows in the system directory
ACP :-Microsoft Office Assistant Preview file
ACT :-Microsoft Office Assistant Actor file
ACV :-OS/2 drivers that compress and decompress audio data
AD :-After Dark screensaver
ADB :-Appointment database used by HP 100LX organizer
ADD :-OS/2 adapter drivers used in the boot process
ADM :-After Dark MultiModule screensaver
ADP :-Used by FaxWorks to do setup for fax modem interaction
ADR :-After Dark Randomizer screensaver
AFM :-Adobe font metrics
AF2 :-ABC Flowchart file
AF3 :-ABC Flowchart file
AI :-Adobe Illustrator drawing
AIF :-Apple Mac AIFF sound
ALB :-JASC Image Commander album
ALL :-Arts & Letters Library
AMS :-Velvert Studio music module (MOD) file
ANC :-Canon Computer Pattern Maker file that is a selectable list of pattern colors
ANI :-Animated Cursor
ANS :-ANSI text
API :-Application Program Interface file; used by Adobe Acrobat
APR :-Lotus Approach 97 file
APS :-Microsoft Visual C++ file
ARC :-LH ARC (old version) compressed archive
ARJ :-Robert Jung ARJ compressed archive
ART :-Xara Studio drawing
ART :-Canon Crayola art file
ASA :-Microsoft Visual InterDev file
ASC :-ASCII text
ASD :-WinWord AutoSave
ASM :-Assembler language source file
ASP :-Active Server Page(an HTML file containing a Microsoft server-processed script)
ASP :-Procomm Plus setup and connection script
AST :-Claris Works "assistant" file
ATT :-AT&T Group 4 bitmap
AVI :-Microsoft Video for Windows movie
AWD :-FaxView document
BAK :-Backup file
BAS :-BASIC code
BAT :-Batch file
BFC :-Windows 95 Briefcase document
BG :-Backgammon for Windows game
BI :-Binary file
BIF :-GroupWise initialization file
BIN :-Binary file
BK :-Sometimes used to denote backup versions
BK$ :-Also sometimes used to denote backup versions
BKS :-An IBM BookManager Read bookshelf
BMK :-An A bookmark file
BMP :-Windows or OS/2 bitmap
BM1 :-Apogee BioMenace data file
BRX :-A file for browsing an index of multimedia options
BSP :-Quake map
BS1 :-Apogee Blake Stone data file
BTM :-Batch file used by Norton Utilities
B4 :-Helix Nuts and Bolts file
C :-C code
CAB :-Microsoft cabinet file(program files compressed for software distribution)
CAL :-CALS Compressed Bitmap
CAL :-Calendar schedule data
CAS :-Comma-delimited ASCII file
CAT :-IntelliCharge categorization file used by Quicken
CB :-Microsoft clean boot file
CCB :-Visual Basic Animated Button configuration
CCF :-Multimedia Viewer configuration file used in OS/2
CCH :-Corel Chart
CCM :-Lotus CC:Mail "box" (for example, INBOX.CCM)
CDA :-CD Audio Track
CDF :-Microsoft Channel Definition Format file
CDI :-Phillips Compact Disk Interactive format
CDR :-Core Draw drawing
CDT :-Corel Draw template
CDX :-Corel Draw compressed drawing
CEL :-CIMFast Event Language file
CFB :-Comptons Multimedia file
CFG :-Configuration file
CGI :-Common Gateway Interface script file
CGM :-Computer Graphics Metafile
CH :-OS/2 configuration file
CHK :-File fragments saved by Windows Disk Defragmenter or ScanDisk
CHP :-Ventura Publisher chapter
CIL :-Clip Gallery download package
CIM :-Sim City 200 file
CIN :-OS/2 change control file that tracks changes to an INI file
CK1 :-iD/Apogee Commander Keen 1 data file
CK2 :-iD/Apogee Commander Keen 2 data file
CK3 :-iD/Apogee Commander Keen 3 data file
CK4 :-iD/Apogee Commander Keen 4 data file
CK5 :-iD/Apogee Commander Keen 5 data file
CK6 :-iD/Apogee Commander Keen 6 data file
CLASS:-Java class
CLP :-Windows Clipboard file
CLS :-Visual Basic Class Module
CMD :-Command file for Windows NT (similar to a DOS .BAT file)
CMD :-DOS CP/M command file
CMD :-dBase-II program file
CMF :-Corel Metafile
CMP :-JPEG Bitmap
CMP :-Address document
CMV :-Corel Move animation
CMX :-Corel Presentation Exchange image
CNF :-Configuration file used by Telnet, Windows, and other applications
CNM :-Windows application menu options and setup file
CNQ :-Compuworks Design Shop file
CNT :-Windows (or other) system content files for the help index and other purposes
COB :-trueSpace2 object
COD :-Microsoft C compiler output as displayable assembler with original C as comments
COM :-Command file (program)
CPD :-Fax Cover document
CPE :-Fax Cover document
CPI :-Microsoft MS-DOS code page information file
CPL :-Control Panel extension
CPL :-Corel colour palette
CPP :-C++ code
CPR :-Corel Presents Presentation
CPT :-Corel Photo-Paint image
CPX :-Corel Presentation Exchange Compressed drawing
CRD :-Cardfile file
CRP :-Corel Presents Run-Time Presentation
CRT :-Certificate file
CSC :-Corel Script
CSP :-PC Emcee On-Screen image
CSV :-Comma-separated values file
CT :-Scitex CT Bitmap
CTL :-Used in general to mean a file containing control information.
CUE :-Microsoft Cue Cards data
CUR :-Windows Cursor
CUT :-Dr Halo bitmap
CV :-Corel Versions archive
CV :-Microsoft CodeView information screen
CWK :-Claris Works data file
CWS :-Claris Works template
CXX :-C++ source code file
DAT :-Data file
DAT :-WordPerfect Merge Data
DBF :-Aston-Tate dBASE database
DBX :-DataBeam image
DCR :-Shockwave file
DCS :-Desktop Color Separation file
DCX :-Fax image (based on PCX)
DDF :-BTRIEVE database
DEF :-SmartWare II data file
DEF :-C++ Definition
DER :-Certificate file
DIB :-Device-Independent Bitmap
DIC :-Dictionary
DIF :-Data Interchange Format spreadsheet
DIR :-Macromedia Director file
DIZ :-Description file
DLG :-C++ Dialogue Script
DLL :-Dynamic-Link Library
DMF :-X-Trakker music module (MOD) file
DOC :-FrameMaker or FrameBuilder document
DOC :-WordStar document
DOC :-WordPerfect document
DOC :-Microsoft Word document
DOT :-Microsoft Word document Template
DPR :-Borland Delphi project header file
DRV :-Driver
DRW :-Micrografx Designer/Draw
DSG :-DooM saved game
DSM :-Dynamic Studio music module (MOD) file
DSP :-Microsoft Developer Studio project
DSQ :-Corel QUERY file
DSW :-Microsoft Developer Studio workspace
DWG :-AutoCAD drawing eXchange format
DXF :-AutoDesk Drawing Interchange format
EMF :-Enhanced Windows Metafile
ENC :-Encore file
EPS :-Encapsulated PostScript image
ER1 :-ERWin file
ERX :-ERWin file
EVY :-Envoy document
EWL :-Microsoft Encarta document
EXE :-Executable file (program)
F :-FORTRAN file
F77 :-FORTRAN file
F90 :-FORTRAN file
FAR :-Farandole Composer music module (MOD) file
FAV :-Microsoft Outlook navigation bar
FAX :-FAX Type image
FH3 :-Aldus Freehand 3 drawing
FIF :-Fractal image file
FITS:-CCD camera image
FLC :-AutoDesk FLIC animation
FLI :-AutoDesk FLIC animation
FLT :-Corel filter
FLT :-StarTrekker music module (MOD) file
FMB :-Oracle binary source code for form, version 4.0 and later
FMT :-Oracle text format of form, version 4.0 and later
FMT :-Microsoft Schedule+ print file
FMX :-Oracle executable form, version 4.0 and later
FOG :-Fontographer font
FON :-System font
FOR :-FORTRAN file
FOT :-Font-related file
FP :-FileMaker Pro file
FP1 :-Flying Pigs for Windows data file
FP3 :-FileMaker Pro file
FPX :-FlashPix bitmap
FRM :-Form
FRM :-FrameMaker or FrameBuilder document
FRM :-Oracle executable form version 3.0 and earlier
FRM :-Visual Basic form
FRM :-WordPerfect Merge form
FRX :-Visual Basic form stash file
GAL :-Corel Multimedia Manager album
GCP :-Ground Control Point file used in image processing of remote sensing data .
GED :-Graphic Environment Document (drawing)
GEM :-GEM metafile
GEN :-Ventura-Generated text file
GFC :-Patton&Patton Flowcharting 4 flowchart file
GFI :-Genigraphics Graphics Link presentation
GFX :-Genigraphics Graphics Link presentation
GID :-Windows 95 global index file (containing help status)
GIF :-CompuServe bitmap
GIM :-Genigraphics Graphics Link presentation
GIX :-Genigraphics Graphics Link presentation
GNA :-Genigraphics Graphics Link presentation
GNX :-Genigraphics Graphics Link presentation
GRA :-Microsoft Graph
GRD :-Grid file, used in image processing of remote sensing data often to form map projections.
GRP :-Program Manager Group
GTK :-Graoumftracker (old) music module (MOD) file
GT2 :-Graoumftracker (new) music module (MOD) file
GWX :-Genigraphics Graphics Link presentation
GWZ :-Genigraphics Graphics Link pres
H :-C program header
HED :-HighEdit document
HEL :-Microsoft Hellbender saved game
HEX :-Macintosh BinHex 2.0 file
HGL :-HP Graphics Language drawing
HLP :-Help file
HOG :-Lucas Arts Dark Forces WAD file
HPJ :-Visual Basic Help Project
HPP :-C++ program header
HQX :-Macintosh BinHex 4.0 file
HST :-History file
HT :-HyperTerminal
HTM :-Hypertext document
HTML:-Hypertext document
HTX :-Extended HTML template
ICA :-Citrix file
ICB :-Targa bitmap
ICM :-Image Color Matching profile file
ICO :-Windows Icon
IDD :-MIDI Instrument Definition
IDQ :-Internet Data Query file
IFF :-Amiga ILBM
IGF :-Inset Systems metafile
IIF :-QuickBooks for Windows interchange file
IMA :-WinImage file
IMG :-GEM image
INC :-Assembler language or Active Server include file
INF :-Information file
INI :-Initialization file
INP :-Oracle source code for form, version 3.0 and earlier
INS :-InstallShield install script
INS :-X-Internet sign-up file
ISO :-Lists the files on a CD-ROM; based on the ISO 9660 CD-ROM file system standard
ISP :-X-Internet sign-up file
ISU :-InstallShield uninstall script
IT :-Impulse Tracker music module (MOD) file
IW :-Idlewild screensaver

ENCRYPTION ,CRYPTOGAPHY AND STEGANOGRAPHY

FREE PUBLIC KEY ENCRYPTION SOFTWARE

This page lists free encryption and cryptographic software of a wide variety. There are free on-the-fly disk encryption and on the fly file encryption (OTFE) software that transparently encrypts files on your disk drive (or partition), on demand encryption tools that allow you to encrypt single files for those one-off occasions when you need encryption public key encryption which is particularly useful for things like email (where the key you use to encrypt your data is different from the key used to decrypt the data).Here are also software that can perform steganography, a sort of invisible encryption, where the plaintext version of your sensitive data
is encrypted and hidden inside another file (typically images or sound or video files).


Furthermore, if you need to ensure the privacy or security of your data, you might also be interested in the free Destructive Deletion Tools, Disk and File Wipe Utilities, Secure Deletion Software.

As usual, commercial software like the well-known PGP Whole Disk Encryption and PGP Desktop Email Encryption are not listed here.




SCRAMDISK :-

Scramdisk for Linux is a suite of Linux tools that allow you to create and access Scramdisk and TrueCrypt containers. It has a Linux driver that allows you to mount such containers. Scramdisk for Windows and TrueCrypt are free on-the-fly disk encryption software that you can find elsewhere on this page.

FREEOTFE:-

FreeOTFE is an open source OTFE (on the fly disk encryption) software for Windows. It presumably creates encrypted partitions (the documentation does not explicitly state this, nor does it state if it supports the creation of encrypted container files). You mount the encrypted volume under Windows and it appears as a drive which you can use normally. FreeOTFE supports "hidden volumes" which are encrypted volumes that are created inside another
encrypted volume. All FreeOTFE volumes also have no identifiable signature. It is compatible with Linux losetup, which is useful if you need to use your encrypted volumes in both Linux and Windows. Supported ciphers include AES and Twofish, and supported hash algorithms include MD2, MD4, MD5, RIPEMD-128, RIPEMD-160, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512.

TRUECRYPT:-

TrueCrypt is the successor to E4M (which is no longer maintained). You can use it to encrypt an entire partition of your hard disk or to create an encrypted container file which appears like a normal hard disk to Windows. You can then store and access your files on that virtual drive just like any other file. Since the program does not mark the encrypted container (or partition) in any way, there's no way to for any intruder to guess which file is your encrypted container. This, according to the author, also preserves plausible deniability. Encryption algorithms supported include AES, Blowfish, CAST, IDEA (removed in version 2.1a) and Triple-DES. The source code
is available free. This program works under Windows XP, 2000 and 2003 and Linux.

COMPUSEC:-

CompuSec encryption software will encrypt your entire hard disk (including your operating system) using a "fast AES algorithm". It also supports the encryption of floppy disks, memory sticks and other removable devices. Even your Windows hibernation file is stored encrypted on the disk.

CRYPTAINER

Cryptainer LE allows you to create 25 MB encrypted containers that appear to Windows as disk drives. It supports Windows 95 (OSR 2), 98, ME, 2000, XP and 2003. It uses the Blowfish algorithm. It apparently also allows you to send encrypted emails as well.

CRYPTOEXPET LITE:-

CryptoExpert Lite is a free on the fly encryption program that creates a virtual disk on your disk from a container file. It supports the CAST encryption algorithm.

E4M DISK ENCRYPTION:-

E4M Disk Encryption Working with documents on your computer where you don't want prying eyes to see? You can get free software that sets up a drive on your hard disk where all files saved will be encrypted. The drive need not be an actual hard disk or partition, it can be a file that is set up to look like a drive to Windows for transparent operation. It is easy to use, free, freely redistributable with the full source code available. It works on all Windows systems.Supported encryption include DES, IDEA, Triple-DES, Blowfish, and CAST. If you find yourself continually encrypting individual files on your computer, this might prove to be the easier to use solution.

SCRAMDISK:-

Scramdisk allows you to create an encrypted virtual drive on your Windows systems where you can store files which will be automatically encrypted. The drive acts like a normal drive which you can access just like any other disk drive on your system. Supported encryption algorithms include Triple DES (EDE), Blowfish, DES, IDEA, MISTY1, Square, and TEA (both 16 and 32 rounds).

WINDOWS PRIVACY TOOLS(WINPT):-

Windows Privacy Tools (WinPT)(including the Windows Privacy Tray, ie WinPT Tray, and the WinPT Explorer extensions), is a set of tools that allow you to encrypt your data using GnuPG (see elsewhere on this page). It is a frontend to GnuPG that resides in your system tray that may be used as a universal plug-in to any email software. The software is free.

PGP (Pretty Good Privacy):-

The above link is to the International PGP Home Page, where you can get free binaries and sources for Pretty Good Privacy (PGP) for a variety of operating systems for either US or non-US countries. You can use PGP to encrypt your email in conjunction with your email client, be it Eudora, ELM, PINE, or whatever. PGP is a public key encryption system, which means that you have two keys (passwords), one which is known only to you and the other is known to your recipient. Messages or documents (or whatever) encoded with one key can only be decoded with the other.
You can read more about this from the PGP FAQs at the site. Note that the free versions of PGP lag behind the commercial (paid) PGP Whole Disk Encryption and PGP Desktop Email Encryption.

GPG: GNU Privacy Guard:-

GPG, a.k.a. GnuPG, is the GNU version of PGP (Pretty Good Privacy), a public key encryption system. Like all things GNU, it is free and can be freely distributed and modified. It is generally compatible with the newer PGP versions (depending on the encryption algorithms you choose); but you should read their FAQ for more details.

FREE ENCRYPTION SOFTWARE WITH STEGANOGRAPHY

S-TOOLS:-

S-Tools is an encryption software with steganographic capabilities. It hides files in BMP, GIF and WAV files after compressing and encrypting them. It runs on Windows and supports drag and drop. It uses the facilities provided in a freely available encryption library cryptlib (which supports a host of well known encryption algorithms like AES, Blowfish, etc) to perform its encryption.

4T HIT MAIL PRIVACY LITE :-

4t HIT Mail Privacy Lite encryption software allows you to hide your private data such as email messages inside an image (JPG, GIF, TIFF, BMP, etc). The image is still viewable as an image, but it also contains the encrypted version of your secret message (steganography). The website does not specify which encryption algorithm is used.


CAMOUFLAGE :-

Camouflage encryption software performs steganographic functions as well. It encrypts your file using an unspecified algorithm (in fact the website merely says it scrambles your data) and attaches them in another file of your choice, such as sound files, picture files, etc. I suspect that this software is only for the casual user who merely wants to hide files from a prying brother or sister) and not for anyone who really needs strong encryption (such as governmental agencies, banks, companies, and the like).

LOCKNOTE:-

LockNote encrypts your documents using AES 256. Your encrypted document will have an embedded decryption program that will run when you (or your recipient, if you are sending your document to someone else) double-click it in Windows NT/2000/XP. You can then enter the password to decrypt the document. The program is released under the GNU . General Public License.

BCARCHIVE:-

BCArchive is an encrypting, compressing archiver. It can compress a file, a group of files, or folders (subdirectories), and place the result into an encrypted archive. It uses algorithms like IDEA and Blowfish to encrypt the data, and PKCS #5 for deriving the encrypted key from the password string. It is also able to create a
self-extracting archive, so that the recipient of your archive (if you're sending it to someone) need not have to install BCArchive to access your files. You can also use public/secret key pairs with this program. BCArchive supports the following symmetric algorithms: Blowfish, IDEA, Triple-DES and CAST5. It supports the following
asymmetric algorithms: RSA and ElGammal/Diffie-Hellman. Secure hash algorithms supported include SHA-256, SHA-1,MD5, RIPEMD-160.

AXCRYPT:-

AxCrypt allows you to encrypt your files with the AES encryption algorithm (128-bit key). It supports the use of key files, huge files (more than 4 GB), shredding of temporary and plaintext files, an extensive command line interface as well as a right click interface from Windows Explorer, etc. The program is open source, distributed under the GNU General Public License.

FINECRYPT:-

FineCrypt allows you to encrypt a limited number of folders and files (although it will not encrypt archives like ZIP, ARC, CAB, ARJ, TAR and GZ files). Encryption algorithms supported include MARS, RC-6, Rjindael (AES),Serpent, Twofish, and others. You can encrypt select your encryption mode as well, from ECB, CBC, CFB and OFB. The software also allows you to create encrypted self-extracting executables.

FILE BUDDY:-

File Buddy encrypts and decrypts your files as well as securely wipes your original plaintext versions. It works on Windows 95, 98, ME, NT4, 2000. It is also able to compress your files before encrypting. The website does not specify the encryption algorithm used.Crypto-Lock uses SHA-1 and Blowfish (CBC mode) to encrypt your files (including executable files) after compressing it. It can produce self-decrypting modules, and overwrite the original plaintext version.

POWERCRYPT 2000:-

PowerCrypt uses a proprietary symmetric encryption algorithm to encrypt your data. It is a Windows program.

CCRYPT:-

CCrypt is a command line encryption tool that encrypts the files you specify. It is multiplatform with ports for Windows, Linux, Sun Solaris, Macintosh OS X, FreeBSD, AIX, etc. It uses the Rjindael AES cipher (Advanced Encryption Standard). The source code is available.

MCRYPT:-

mcrypt is a command line tool in the fashion of the Unix crypt command. It allows you to encrypt files that you specify on the command line using one of the following encryption algorithms: Blowfish, Twofish, DES, TripleDES,3-Way, Safer, Loki97, Gost, RC2, Mars, Rjindael AES, Serpent, Cast, Arcfour and Wake. The OpenPGP encrypted file
format is supported. This encryption tools works on Unix systems (including Linux) and has also been ported to Windows.

AUTOMATED INSTALLATION OF XP

You can create a CD that can install Windows XP automatically, putting in all the details and answering all the dialog boxes.The secret behind this is the answer file, which tells Windows what to do while it’s installing. The answer file can be created using Windows setup manager.
Using this tool, you can make the answer file so powerful that you can even tell Windows to include or exclude individual components, set the display resolution, and more.

Here’s the Steps involved in creating XP Automated Installation Disc :

Step 1: To begin with, insert your Windows XP installation CD into the drive and copy the entire contents of the CD to a new folder on your hard disk.

Step 2: Navigate to the Support > Tools folder on the CD and double-click the Deploy.cab file. Copy all the files to a new folder on your hard disk.

Step 3: The crucial part begins now, creating the answer file. To execute the windows setup manager, double click the Setupmgr.exe file from the contents of the Deploy.cab, which you just copied onto the hard drive.

Step 4: The first few steps of the wizard are self explanatory. Select the following options from the successive dialog boxes. Create a new answer file; Windows unattended installation (Select the appropriate Windows version); “Fully automated”; “No this answer file will be used to install from CD”; and finally, accept the license agreement.

Step 5: Under the General Settings, you can customize the installation of Windows by providing the default name and organization, display settings, time zone and the product key. Fill in the fields using the drop-down list or by keying in the details. If you don’t select an option from the drop-down list, the default values will be used.

Step 6: After you are done click Finish and save the answer file as “winnt.sif” when you are prompted. Advanced users can further tweak the answer file by referring to the Help file called Ref.chm in the same folder.

Step 7: Finally copy the answer file to i386 folder in the Windows XP installation folder you created in the beginning.


Step 8: To burn a bootable installation disc, you need the boot sector of the Windows XP CD. Download it from here.

Step 9: Launch Nero and select CD-ROM (Boot) from the New Compilation dialog box. Under the Boot tab, specify the boot sector file you downloaded and extracted. Set the emulation as “No emulation”, and keep the boot message blank. Most importantly, remember to set the “Number of loaded sectors” as 4.

Step 10: Under the Burn tab, set the write method to disc at-once. Click the New button to to begin adding files and folders to the compilation. Drag all the contents of the Windows XP installation disc that you copied to your hard drive (with the answer file in the i386 folder) into the left pane. Insert a blank CD into the optical drive and hit burn button. Your windows automated installation Disc is ready .

Make bootable windows xp cd

Download boot file from HERE

Start Nero Burning ROM.

1.) Select CD-ROM (Boot).

2.) Select Image file from Source of boot image data.

3.) Check Enable expert settings (for advanced users only!).

4.) Set Kind of emulation: to No Emulation.

5.) Set Load segment of sectors (hex!): to 0000.

6.) Set Number of loaded sectors: to 4.

7.) Set Platform identifier: to Intel x86 compatible.

8.) Press the Browse button and Locate the BootSector file (boot.ima)

Click on the ISO tab.

- Set File name length to Max. of 31 chars (ISO Level 2).

- Set Format to Mode 1.

- Set Character Set to ISO 9660 (standard ISO CD-ROM).

- Check the Joliet check box.

- Check all Relax ISO Restrictions.

- Check Allow more than 64 characters for Joliet names

Click the Burn tab.

- Check Write.

- Check Finalize CD (No further writing possible!).

- Set Write Method to Disc-at-once. (We have had Track-At-Once work as well.)

- Click the New button.

- Select everything in the folder and drag it to the ISO compilation panel.

- Click the Write CD Dialog button

Click the Boot tab.

- Verify the settings. Correct if needed.

- Click the Burn button.

Tuesday, July 7, 2009

SOME USEFUL LINK FOR HACKING

http://www.showmyip.com/
http://hackthespace.blogspot.com/
http://www.securitytaskforce.org/
http://www.blackhat.com/
http://www.blackhat.com/html/bh-usa-06/bh-usa-06-speakers.html
http://www.nag.co.in/ncise.htm
http://www.wtcs.org/snmp4tpc/freeware.htm
http://www.wireshark.org/
http://www.grc.com/default.htm
http://www.thinkdigit.com/index.php?action=pro_how_to&prodid=679
http://www.snort.org/
http://prasadswork.blogspot.com/
http://crack0hack.wetpaint.com/?t=anon
http://www.discoverhacking.c-o.in/
http://crack0hack.wetpaint.com/page/Best+Hacking+Softwares_+1000sw%28Free+download%29
http://www.remote-exploit.org/backtrack_download.html
http://crack0hack.wetpaint.com/rss2_0/pageReport/created?t=anon

CRACK MD5 PASSWORD HASH ONLINE

Hello ,below is some links to crack md5 password hashes online .

http://gdataonline.com
http://md5.rednoize.com
http://ice.breaker.free.fr
http://www.milw0rm.com/md5/
http://shm.hard-core.pl/md5/
http://www.hashchecker.com
http://lasecwww.epfl.ch/%7Eoechslin/projects/ophcrack/
http://md5.benramsey.com
http://md5.altervista.org
http://shm.hard-core.pl
http://plain-text.info
http://www.passcracking.ru/
http://www.securitystats.com/tools/hashcrack.php
http://www.xmd5.org/index_en.htm