Skip to main content

Posts

How to download torrents directly using browser.

Today, I Came across a very useful site  Seedr.cc  which is very helpful in downloading torrent files. It is free and will always remain the same.you just have to visit the site and just create an account. It can be done with your Google account also. You will get 2GB of storage for a free account and it can be increased by some simple tasks given on the website. You can also buy premium membership which comes in many varieties. You can either copy the torrent magnet link or you can upload the torrent file on your account. Then it will provide you a direct link for downloading the file. It is a gift for those students who cannot download a BitTorrent client due to admin rights but want to download a torrent. The best thing about this site is that either you can download the video or stream it online once you adder it to seedr. Just try it once, I know you will get addicted.!! Link for this site is  https://www.seedr.cc/?r=178507
Recent posts

How to View Saved Password in Mozilla Firefox.

How to do ? Step 1  . Open Firefox Web Broweser. Step 2 . Then Click on FireFox > Options > Option   Step 3 . Then a POP Up box will appear, In that go to security and click on Saved Passwords. 4. Now click on website whose password you want to see and click on show password. Step 5 . Done, You have password of your victim with few simple steps. You can try this at school computer lab if someone have saved their password.

How to Bypass BIOS Passwords

BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS.

How to customise your start button

First you need a tool called " Resource Hacker ". This free program allows you to change resources in any .exe file such as "Explorer.exe", which includes the [Start] button's Label. You can visit Download.com and search there for "Resource Hacker". After you download it, follow the guide here:

Cracking Zip Password Files

Cracking Zip Password Files Tut On Cracking Zip Password Files.. What is FZC? FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you're gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as altavista.com.

Block Ads

Block Adservers If you wanna remove those nasty ads from the pages which waste lot of time and bandwidth then here is something for you I belive it will help you a lot. How it works ...? It's possible to set up a name server as authoritative for any domain you choose, allowing you to specify the DNS records for that domain. You can also configure most computers to be sort of mini-nameservers for themselves, so that they check their own DNS records before asking a nameserver. Either way, you get to say what hostname points to what IP address. If you haven't guessed already, the way you block ads it to provide bogus information about the domains we don't want to see - ie, all those servers out there that dedicate their existence to spewing out banner ads.

Ip Address Structure, Expilinatin OF IP Address {A short way}

   IP ADDRESS STRUCTURE: Note: the terms multicast address and MSB are explained at the end. Every station on a PSN (packet switched network) that is based on the TCP/IP protocol (your computer is one, for example. Yes, we're referring to a host that is connected to the net) must have an IP address, so it can be identified, and information can be relayed and routed to it in an orderly fashion. An IP address consists of a 32 bit logical address. The address is divided into two fields: