Tuesday 29 March 2016

How to crack or Reset BIOS Password?

           Bios password is usually used to protect the user's BIOS settings on the computer. If you want to reset the password on the BIOS does not need to bother to connect bateray CMOSnya, with a little trick on the Dos you can reset the BIOS password on it in 2 ways:

1. Clear CMOS
This way I consider the most ancient and most easy to break down the password on the BIOS. The steps are easy, first open the casing cover computer CPU. Then find the bios battery that looks something like the battery just a little more big clock. After the meet and consider the area around the battery there is usually a jumper with 3 pins, 2 pins and 1 pin not connected. 

Suppose the three pins with the code 1 - 2 - 3. Connector that connects the initial position usually is 2-3. To reset the bios do I move the position of the plug that connects pins 2-3 to position 1-2 for about 5 seconds. Then plug it back into the starting position (2-3). Try restarting the computer back on, secured the bios password is gone. 

If the above looks complicated, is easy to clear cmos by unplugging the BIOS battery and then put it back. But with the consequences of removing the label is the warranty on the battery BIOS.

2. Through DOS 

First out of the windows with me restart your computer, start the computer in MS-DOS mode, use the option "Command Prompt Only" 

At c: prompt, type: DEBUG 
press enter. You will see the sign (-) at the DEBUG prompt, then type: 
o 70 2e 
at the DEBUG prompt will be displayed as-o 70 2e. 
press enter and type: 
-O 71 ff 
press enter, the last type: 
Q 
hit enter, then you will get out of the DEBUG prompt and return to the C:> prompt. 
Now restart your COMPUTER, and see the results

What Is Macintosh computer ????



 What Is Macintosh computer  ????


A popular model of computer made by Apple Computer. Introduced in 1984, the Macintosh features a graphical user interface (GUI) that utilizes windows, icons, and a mouse to make it relatively easy for novices to use the computer productively. Rather than learning a complex set of commands, you need only point to a selection on a menu and click a mouse button.
Moreover, the GUI is embedded into the operating system. This means that all applications that run on a Macintosh computer have a similar user interface. Once a user has become familiar with one application, he or she can learn new applications relatively easily. The success of the Macintosh GUI heralded a new age of graphics-based applications and operating systems. The Windows interface copies many features from the Mac.
There are many different Macintosh models, with varying degrees of speed and power. All models are available in many different configurations. All models since 1994 are based on the PowerPC microprocessor.

Friday 31 October 2014

How to add a cool Add This Welcome Bar in your Blogger blog

In this article I am going to give you detail about how you can easily add a shining welcome bar in your blogger (BlogSpot) blog using Addthis.in this tutorial I’m saying website instead of webpage and blogger (because the method work in both webpage and blogger site) page.so kindly read the article carefully.
addthis welcome bar gif


Why Use Welcome Bar
A welcome bar shows your massage (like any announcement) which can be places in top or end of your web page. You can add a welcome bar to any kind of website as well as your BlogSpot blog. There’s no limitation it can places anywhere.it support’s every kind of website because all webpage are made with HTML (hyper test some think protocol).

Good and Bad things about Welcome Bar
The good part about welcome bar that it can be added to anywhere. You may think that if I am talking about good then there must be any bad thing related to welcome bars. But there’s no bad think about welcome bar they always look pretty and helps you a lot. Many well-known webmasters are using those.
There are many free tools (or I should say online services) as well premium ones which lets you add welcome bar to your website for free. But among all of them I will prefer to use Addthis features of addthis.com looks pretty well to me so I’m using this but you may use any other web service (any one you want to use there are many alternatives available in the web).there are other alternatives like HelloBar and many other. I have tried hello bar but addthis is lot easier than hellobar. It’s very easy to use addthis.

So here’s the main part how to add welcome bar to your website: -
1>     First open Addthis.com
2>     Create an account if you don’t have any one
3>     Verify email
4>     Go to addthis.com again and sign in
5>     You will now see Your Addthis Dashbord
6>     Navigate to tools
7>     In the last tool you will see welcome Bar click on that
addthis welcome bar dashboard

addthis welcome bar dashboard

   A new will come and there will be some codes copy them and paste them below <head>
In blogger template html editor.


you can customize the text and color and other stuff so edit whatever you want and then add the code to your blogger blog .That’s it. Now you will see a cool welcome bar in your website.

Monday 14 October 2013

TOP 11 BEST HACKING MOVIES OF HOLLYWOOD

                                       TOP 11 BEST HACKING MOVIES OF HOLLYWOOD


In the list of Computer movies we have brought to you the top Hollywood movies based on hacking. These hacker movies just show up the cool way to represent life and happenings in the life of a hacker. Thus if you are interested in hacking stuff, don't forget to have a look on these hacking movies.

 
 So,Here's the list of movies :)
 
 

John McClane takes on an Internet-based terrorist organization who is systematically shutting down the United States.

Rating : 5.9/10 
Director: Len Wiseman
Stars : Bruce Willis, Justin Long and Timothy Olyphant.

2. Hackers (1995)


A young boy is arrested by the US Secret Service for writing a computer virus and is banned from using a computer until his 18th birthday.

Rating : 5.9/10
Director: Iain Softley
Stars: Jonny Lee Miller, Angelina Jolie and Jesse Bradford

3. Pirates of Silicon Valley (1999)

Pirates of Silicon Valley is a semi-humorous documentary about the men who made the world of technology what it is today, their struggles during college, the founding of their companies, and the ingenious actions they took to build up the global corporate empires of Apple Computer Corporation and Microsoft Inc. 

Rating: 7.1/10
Director: Martyn Burke
Stars: Anthony Michael Hall, Noah Wyle and Joey Slotnick

4. The Italian Job (2003)


After being betrayed and left for dead in Italy, Charlie Croker and his team plan an elaborate gold heist against their former ally.

Rating: 6.9/10
Director: F. Gary Gray
Stars: Donald Sutherland, Mark Wahlberg and Edward Norton.

5. Untraceable (2008)


FBI agent Jennifer Marsh is tasked with hunting down a seemingly untraceable serial killer who posts live videos of his victims on the Internet. As time runs out, the cat and mouse chase becomes more personal.

Rating: 6.1/10
Director: Gregory Hoblit
Stars: Diane Lane, Colin Hanks and Joseph Cross.

6. Foolproof (2003)


Kevin, Sam and Rob are founding members of a theoretical group which pulls off heists. Leo, a gangster, blackmails them into pulling off a real multi-million dollar heist. Now it's up to them to get out alive.

Rating: 6.5/10
Director: William Phillips
Stars: Ryan Reynolds, Kristin Booth and Joris Jarsky.

7. Firewall (2006)


A security specialist is forced into robbing the bank that he's protecting, as a bid to pay off his family's ransom.

Rating: 5.7/10
Director: Richard Loncraine
Stars: Harrison Ford, Virginia Madsen and Paul Bettany.

8. The Score (2001)


An aging thief hopes to retire and live off his ill-gotten wealth when a young kid convinces him into doing one last heist.

Rating: 6.8/10
Director: Frank Oz
Stars: Robert De Niro, Edward Norton and Marlon Brando.

9. Swordfish (2001)


A secretive renegade counter-terrorist co-opts the world's greatest hacker (who is trying to stay clean) to steal billions in US Government dirty money.

Rating: 6.4/10
Director: Dominic Sena
Stars: John Travolta, Hugh Jackman and Halle Berry.

10. Sneakers (1992)


Complex but lighthearted thriller about computers and cryptography, government and espionage, secrets and deception and betrayal.

Rating: 7.0/10
Director: Phil Alden Robinson
Stars: Robert Redford, Dan Aykroyd and Sidney Poitier.

11.The Social Network (2010)


Harvard student Mark Zuckerberg creates the social networking website that would become known as Facebook, but is later sued by two brothers who claimed he stole their idea, and the co-founder who was later squeezed out of the business.

Rating: 7.9/10
Director: David Fincher
Stars: Jesse Eisenberg, Andrew Garfield and Justin Timberlake.

We hope you will like the above collection. You are most welcome with your comments if you are having some more movies like that in your mind. Enjoy people and do not forget to comment.
- See more at: http://www.darkhtu.net/2013/10/top-11-best-hacking-movies-of-hollywood.html#sthash.odobojHq.dpuf

SQL commands (USEFUL FOR PROGRAMMERS)

                                         SQL commands (USEFUL FOR PROGRAMMERS)




ABORT -- abort the current transaction
ALTER DATABASE -- change a database
ALTER GROUP -- add users to a group or remove users from a group
ALTER TABLE -- change the definition of a table
ALTER TRIGGER -- change the definition of a trigger
ALTER USER -- change a database user account
ANALYZE -- collect statistics about a database
BEGIN -- start a transaction block
CHECKPOINT -- force a transaction log checkpoint
CLOSE -- close a cursor
CLUSTER -- cluster a table according to an index
COMMENT -- define or change the comment of an object
COMMIT -- commit the current transaction
COPY -- copy data between files and tables
CREATE AGGREGATE -- define a new aggregate function
CREATE CAST -- define a user-defined cast
CREATE CONSTRAINT TRIGGER -- define a new constraint trigger
CREATE CONVERSION -- define a user-defined conversion
CREATE DATABASE -- create a new database
CREATE DOMAIN -- define a new domain
CREATE FUNCTION -- define a new function
CREATE GROUP -- define a new user group
CREATE INDEX -- define a new index
CREATE LANGUAGE -- define a new procedural language
CREATE OPERATOR -- define a new operator
CREATE OPERATOR CLASS -- define a new operator class for indexes
CREATE RULE -- define a new rewrite rule
CREATE SCHEMA -- define a new schema
CREATE SEQUENCE -- define a new sequence generator
CREATE TABLE -- define a new table
CREATE TABLE AS -- create a new table from the results of a query
CREATE TRIGGER -- define a new trigger
CREATE TYPE -- define a new data type
CREATE USER -- define a new database user account
CREATE VIEW -- define a new view
DEALLOCATE -- remove a prepared query
DECLARE -- define a cursor
DELETE -- delete rows of a table
DROP AGGREGATE -- remove a user-defined aggregate function
DROP CAST -- remove a user-defined cast
DROP CONVERSION -- remove a user-defined conversion
DROP DATABASE -- remove a database
DROP DOMAIN -- remove a user-defined domain
DROP FUNCTION -- remove a user-defined function
DROP GROUP -- remove a user group
DROP INDEX -- remove an index
DROP LANGUAGE -- remove a user-defined procedural language
DROP OPERATOR -- remove a user-defined operator
DROP OPERATOR CLASS -- remove a user-defined operator class
DROP RULE -- remove a rewrite rule
DROP SCHEMA -- remove a schema
DROP SEQUENCE -- remove a sequence
DROP TABLE -- remove a table
DROP TRIGGER -- remove a trigger
DROP TYPE -- remove a user-defined data type
DROP USER -- remove a database user account
DROP VIEW -- remove a view
END -- commit the current transaction
EXECUTE -- execute a prepared query
EXPLAIN -- show the execution plan of a statement
FETCH -- retrieve rows from a table using a cursor
GRANT -- define access privileges
INSERT -- create new rows in a table
LISTEN -- listen for a notification
LOAD -- load or reload a shared library file
LOCK -- explicitly lock a table
MOVE -- position a cursor on a specified row of a table
NOTIFY -- generate a notification
PREPARE -- create a prepared query
REINDEX -- rebuild corrupted indexes
RESET -- restore the value of a run-time parameter to a default value
REVOKE -- remove access privileges
ROLLBACK -- abort the current transaction
SELECT -- retrieve rows from a table or view
SELECT INTO -- create a new table from the results of a query
SET -- change a run-time parameter
SET CONSTRAINTS -- set the constraint mode of the current transaction
SET SESSION AUTHORIZATION -- set the session user identifier and the current user identifier of the current session
SET TRANSACTION -- set the characteristics of the current transaction
SHOW -- show the value of a run-time parameter
START TRANSACTION -- start a transaction block
TRUNCATE -- empty a table
UNLISTEN -- stop listening for a notification
UPDATE -- update rows of a table
VACUUM -- garbage-collectand optionally analyze a database