Total Pageviews

technical tips

Google+ Followers

Temple Run 2 Hack (Savegame file with 999,999,999 Diamonds and Coins hack!!!)

Written By Akshay Prabhale on Saturday, February 8, 2014 | 10:00 PM


ROOT NOT REQUIRED
Follow the steps:
* Backup your current savegame file if nencessary
1. Download "gamedata.txt" (only 3KB file) (link is below)
http://www.mediafire.com/view/8yn17i6k7w6c6q9/gamedata.txt
2. Copy "gamedata.txt" using your "File manager" to:/sdcard/ Android/data/com.imangi.templerun2/files
3. Replace existing file!!! Enjoy... "Hit like and share if it works for you"

Credits:- Owner
10:00 PM | 0 comments | Read More

Bram Cohen The founder of peer-to-peer (P2P) BitTorrent protocol

                    Bram Cohen (born October 12, 1975) is an American computer programmer, best known as the author of the peer-to-peer (P2P) BitTorrent protocol, as well as the first file sharing program to use the protocol, also known as BitTorrent. He is also the co-founder of CodeCon, organizer of the San Francisco Bay Area P2P-hackers meeting, and the co-author of Codeville. 

                    In April 2001, Cohen quit MojoNation and began work on BitTorrent. Cohen unveiled his novel ideas at the first CodeCon conference, which he and his roommate Len Sassaman created as a showcase event for novel technology projects after becoming disillusioned with the state of technology conferences. It remains an event for those seeking information about new directions in software, though BitTorrent continues to lay claim to the title of "most famous presentation".

                    Cohen wrote the first BitTorrent client implementation in Python, and many other programs have since implemented the protocol.

 Bram Cohen author of  BitTorrent protocol

                    In the summer of 2002, Cohen collected free pornography to lure beta testers to use the program. BitTorrent gained its fame for its ability to quickly share large music and movie files online. Cohen himself has claimed he has never violated copyright law using his software. Regardless, he is outspoken in his belief that the current media business was doomed to being outmoded despite the RIAA and MPAA's legal or technical tactics, such as digital rights management. In May 2005, Cohen released a trackerless beta version of BitTorrent.

                 In late 2003, Cohen served a short career at Valve Software to work on Steam, their digital distribution system introduced for Half-Life 2.

                  By 2004, he had left Valve and formed BitTorrent, Inc. with his brother Ross Cohen and business partner Ashwin Navin. In 2012 he announced a beta-version of BitTorrent Live for TV broadcasting through the Internet.
- Wikipedia

RESPECT!!!!

Official website - http://bramcohen.com/ 
Twitter Account - https://twitter.com/bramcohen
9:22 PM | 0 comments | Read More

TOP 20 COOL HACKING MOVIES OF HOLLYWOOD (Random Order)

  • 1.Die Hard 4: Live Free or Die Hard (2007)



    John McClane and a young hacker join forces to take down master cyber-terrorist Thomas Gabriel in Washington D.C.

  • 2. Hackers (1995)

    A young boy is arrested by the US Secret Service for writing a computer virus and is banned from using a computer until his 18th birthday. Years later, he and his new-found friends discover a plot to unleash a dangerous computer virus, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.
  • 3. Pirates of Silicon Valley (1999)

    History of Apple and Microsoft.
  • 4. The Italian Job (2003)

    After being betrayed and left for dead in Italy, Charlie Croker and his team plan an elaborate gold heist against their former ally.
  • 5. Untraceable (2008)

    FBI agent Jennifer Marsh is tasked with hunting down a seemingly untraceable serial killer who posts live videos of his victims on the Internet. As time runs out, the cat and mouse chase becomes more personal.
  • 6. Foolproof (2003)

    Kevin, Sam and Rob are founding members of a theoretical group which pulls off heists. Leo, a gangster, blackmails them into pulling off a real multi-million dollar heist. Now it's up to them to get out alive.
  • 7. Firewall (2006)



    A security specialist is forced into robbing the bank that he's protecting, as a bid to pay off his family's ransom.
  • 8. The Score (2001)

    An aging thief hopes to retire and live off his ill-gotten wealth when a young kid convinces him into doing one last heist.
  • 9. Swordfish (2001)

    A secretive renegade counter-terrorist co-opts the world's greatest hacker (who is trying to stay clean) to steal billions in US Government dirty money.
  • 10. Sneakers (1992)

    Complex but lighthearted thriller about computers and cryptography, government and espionage, secrets and deception and betrayal.
  • 11. The Social Network (2010)



    Harvard student Mark Zuckerberg creates the social networking site that would become known as Facebook, but is later sued by two brothers who claimed he stole their idea, and the cofounder who was later squeezed out of the business.
  • 12. Takedown (2000)

    This film is based on the story of the capture of computer hacker "Kevin Mitnick".
  • 13.Prime Risk (1985)

    A female engineer, with the assistance of her pilot-wannabe male friend, discovers a way to rip off ATM machines, but in doing so stumbles upon a plot to destroy the U.S. monetary system.
  • 14.Ghost in the Shell (1995)

    A female cyborg cop and her partner hunt a mysterious and powerful hacker called the Puppet Master.
  • 15.23 (1998)

    The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.
  • 16.Webmaster (1998)

    JB is the city's best attacker, who lives a carefully organized life in and outside the network. After hacking into the most powerful of all domains the Stoiser domain, JB thought that the cruel Stoiser would kill him. But instead he gave him a job - as a webmaster.
  • 17.Matrix (Series) (1999-2003)



    A computer hacker learns from mysterious rebels about the true nature of his reality and his role in the war against its controllers.
  • 18.Antitrust (2001)

    A computer programmer's dream job at a hot Portland-based firm turns nightmarish when he discovers his boss has a secret and ruthless means of dispatching anti-trust problems.
  • 19.Code Hunter/ Storm Watch (2002)

    America's best player is being pulled in to the ultimate cyber-terror. The game's mastermind has stolen his identity, put him on the FBI's Most Wanted List, and is blackmailing him to take a part in a real twisted plan of world destruction. With just hours left, can the code be broken to save the world from total annihilation?
  • 20. The Girl with the Dragon Tattoo (2009)


    Journalist Mikael Blomkvist is aided in his search for a woman who has been missing for forty years by Lisbeth Salander, a young computer hacker.
10:39 AM | 0 comments | Read More

Restore Task Manager, Regedit and Folder Options Disabled by Virus

Written By Akshay Prabhale on Thursday, February 6, 2014 | 6:17 AM

Let's face it. All of us have been infected by virus before. Even if you have anti-virus installed, you can still be infected by a new or custom virus that is not recognized by your anti-virus. Sometimes after removing the virus completely from our system, you'll face new problems such as you can no longer bring up Windows Task Manager from CTRL+ALT+DEL. You get the error message saying "Task Manager has been disabled by your administrator"....



You think that it's easy to fix this problem by going to Registry Editor but you can't! You get the error message "Registry editing has been disabled by your administrator".


Folder Options and even Show Hidden Files & Folder is disabled! How frustrating! Don't worry, here's how to restore your Windows Task Manager, Registry Editor, Folder Options and Show hidden files & folders.

This problem is most commonly caused by a virus called "Brontok". Brontok virus will make some changes to the system restrictions in order to hide itself from easy detection and also from easy cleaning.

Here's a free tool called Remove Restrictions Tool (RRT) which is able to re-enables all what the virus had previously disabled, and gives you back the control over your own computer.


Remove Restrictions Tool is able to re-enable:
- Registry Tools (regedit)
- Ctrl+Alt+Del
- Folder Options
- Show Hidden Files

Small and easy to use. Make sure you boot in to Safe Mode to use Remove Restrictions Tool (RRT). Just click on the buttons and it'll do it's job.




Click Here to download

Safe Computing



6:17 AM | 0 comments | Read More

How to Chat With Command Prompt

Step 1: Open notepad then type:
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
 
Step 2: When you're finished, click on file, save as, then save it as messenger.bat
 
Step 3: Go to control panel (make sure you are in Classic View). Click on "administrative tools", then click on "services". 
 
Step 4: Now find the "messenger" service in the list on the right, then open it. You'll see "startup type" which should be disabled, so click on that and select "manual". 

Step 5: Now press the start button in the upper right hand corner of the window (not the green start button), and click apply.
 
Step 6: Next, do the same procedure on the remote computer. Until this service is activated on that PC, or you won't be able to use this!  
 
 
 
Step7: Now click on the messenger file you made. Since it is a batch file it will open with cmd (command prompt). It should show "MESSENGER" at the top and "User:" below that. Type the IP address of the remote computer. If it is in the network, then when you type the message next, it should send it to them. It will be likewise on the other computer. DONE!! ;)
6:15 AM | 0 comments | Read More