Extension Factory Builder

Showing posts with label windows hacking. Show all posts
Showing posts with label windows hacking. Show all posts

Monday, 2 July 2012

Get a Job | Submit Your Resume Here | Jobs in IT companies | job for a hacker

Submit Your resume To get Placed in Reputed IT companies

To get a job in any field in the top most companies like google,yahoo.Post You Resume in  two websites given below,and shape your career in a way,you like.You can also post your cv or resume on these websites for the post of hacker.As 2005 survey conveys that-"every year india needs more than 78000 hackers"
Post for hackers can apply are-System administrator, network admininstrator ,IT networking manager,can apply in the field of security too.


Untitled Document

Market is bustling with Jobs; everyday top companies are hiring hundreds of deserving candidates by scouting them from TimesJobs.com.
Still waiting for your appraisal? It is time you jump on the bandwagon and get the hike you deserve.
1000s of new Job Opportunities have been recently posted on TimesJobs.com by top employers in IT, BFSI, Manufacturing & Engineering, Automobile and other growing industries.  Make the most out of this opportunity.
It is time to get the appraisal you deserve! Register now on TimesJobs.com
A Great Career & a better Salary await you!
Warm Regards,
TimesJobs.com
------------------------------------------------------------------------------------------------------------

Wednesday, 20 June 2012

Hacker vs Cracker | Difference between Hackers and Crackers

Hackers Vs Crackers

My Earlier post was about the Basic Definition of Hacker and Hacking and i also discussed that how to become a hacker.In this Post,i am Going to Discuss about the differences Between Hackers and Crackers.


Difference Between Hackers and Crackers


Hackers and Crackers are seems to be same words ,But a Great difference exists between Hackers and Crackers. First of all ,Hackers and Crackers have a same amount of knowledge and Experience,but the difference is about,How they are using their knowledge.Hackers are good guys,who use their Knowledge in positive direction.like hackers are appointed by companies and police to solve their problems or cases.On the other hand ,Crackers are Bad guys,who use their knowledge for Illegal and negative purposes.like Crackers stole the money from the bank by hacking into the bank's website.


             Hackers                                                                                 Crackers      
     
1. Lots of knowledge and experience                                            1.  Same amount of                                                                                              
about computers                                                                                  Knowledge and experience


2. Good Guy                                                                                     2. Bad guy


3. Strong Ethics                                                                               3.  Poor Ethics


4. No Crime commited                                                                    4.  Commits Crime


5. Fights Criminals,defend From                                                    5. They are Criminals
    Bad Crackers.

Tuesday, 19 June 2012

Who is a Hacker | Hacking Definition | How to Become a Hacker



I am Starting This tutorial With a simple question,which usually arise in my mind.and trust me,you must be having a wrong thinking about it.question is -Who is a Hacker? To get the ans to this Question.You need to know ,who is not a Hacker.So Hacker is not


1. A Criminal
2. The person who Releases Viruses
3. A Teenager sitting in a Dark Room eating pizzas and hacking into the fbi website.
4. Not always a Computer Related Person.means can also belongs to some other field too.
5. not even somebody,who can crack password to all the websites or softwares.
6. Not also,who stole the money from bank by hacking into bank Server.


By Knowing these things,u might be shocked,that if the person i have discussed above is not a hacker.then you might be thinking wrong about the term hacking or hacker.But this is not your fault.This False Misconceptions Has been Created by Media and Newspapers.So Now U all get to Knows Who Is not a Hacker.Now its Very easy for you to understand,Who Is a Hacker? 


Hacker Is who


1. The Person ,who thinks outside the box
2. who wants to Test His/Her Limits.
3. Who wants to try such things which are not given in manual.
4. Has Unlimites Curosity to work.
5. Who Discovers Unknown Features and Properties.
6. Someone who is dedicated to his knowledge
7. Highly Creative.
8. who Bellieves in Stretching the Limits.i.e who wants to test his/her limits,that upto what extent,He/she can go


After Reading This above discussed points on who is a Hacker.We can say That.All the Scientists,Discoverers,Mathematicians Can Fall under the Category of Hacking Or Hacker.Like Albert Einstein,Issac Newton.
One more Example i want to substitute Here,which will make you clear upto more extent,that Suppose The man,who rides the bike very fast,and he is very expert in driving and stunting,and making new stunts.Or A women who used to practise making of new Dishes in cooking.Then we can also say that,This man and woman is also a Hacker.
Now U must be having a Idea about who is a Hacker and who is not.Now i am Going to Discuss about the computer Hacker.Computer Hacker is one who Discovers new features ,discover bugs in software and help the company to Defend To being hacked.


Modern Day Hacker | How to Become a Hacker

If You want to Become a Hacker,You need to Follow these four points,which i am Providing Below.:-

1.You should be knowing Atleast one programming Language very Nicely.If i am Telling about programing language,then i must be talking about high level languages like C,C++,Etc

2.U should be Networking Guru.i.e You should knows the basics of networking,Means How the internet works,how the communcation sets up between two hosts,how the network is working.

3.you should know about the basics of unix or linux,as Unix is a heaven for hackers.u can go with linux,because unix only runs in server.and linux is GUI version of unix.

4.Last,But Not the Least Hacking Attitude-Criminal Mind.This is the One of the Major aspect to become a Hacker.that You should Think like a criminal.i.e like you should think how to crack into fb server while accessing your Fb account.

Now You must be knowing about the definitions, i think,all your misconceptions has been vanished now.If any Query,you can ask me in comments:-)

Thursday, 17 May 2012

How to Block websites like facebook and twitter ? 2 Easy ways To block websites

How to Block websites ? 2 Easiest ways To block websites
block websites
As I Think,You all wants to know that how to black websites in your computer,as parents wants to block illegal or porn sites,some elders want to block facebook and social networking sites,all type of persons wants to block websites in computer or laptop.
There are Two easiest ways,which i want to share with you all that how you can block any website in your computer,these techniques doesnt require any technical skills or programming skills,just follow the Steps written Below,and you can learn easily that how to block a website.


1. Using Host Files
 Host files are already made in windows,as they act as a secondary DNS server,as when we write any url in any url bar.then browser,first searches for the ip Address of the respective URL in windows itself,if it finds the ip with url,then it starts the procedure of connecting with that ip Address,but if it doesnt finds any record for that particular url,then it passes the request to ISP's DNS Server.so we manage to change the host file,so that when the particualr url is entered in browser's Url Bar,it will be redirected to some Ip address.
This is very easy method to block a website,u need to do just,follow the steps below :
1.first go to Windows Drive(mostly It is C Drive)
2.Then navigate to -> windows->system32->drivers->etc
3.in etc folder,open the File name 'hosts' and open in Notepad
it seems to be like in below picture
4.Now add a new entry in the bottom,let you want to block www.facebook.com.then add the line
127.0.0.1  www.facebook.com
This line means that when you try to open the www.facebook.com,then it is redirected to IP Adress 127.0.0.1,which is a back ip of the windows .
5.now save the file.and restart the computer.
6.to unblock it,remove the entry,which you have made.
You can also redirect to any other website,by specifying the Url Inspite of 127.0.0.1
Note:This method works for all browsers.

2.Using Website Block v3.16 software
Website Block v3.16 (Eng/Rus) |DemocraticHackers.in| 1.84 Mb

This utility allows you to block unwanted websites from display in Internet Explorer. If a website is blocked the user is forwarded to a blank page or to a "blocked page" and the contents of the original page are not loaded on your PC. Stop loading banners and ads, stop your kids from spending hours in chat rooms or remove undesired websites from their view. Prevent your children from having access to certain websites content such as adult sites and gambling.

Features
Free real time quotes Block websites of your choice.
Block porn sites Block porn, block adult content based on keywords in URL.
Blocked websites Use password protected mode so that other users can not change settings.
Block website Allows saving and opening blocked websites profiles.
Blocking website Includes password protected uninstall.
Block myspace, block facebook Easily block MySpace, block Facebook and other social networking sites.
Website block Reduce your internet traffic by blocking ads and banners.
Block by keywords Selectively block websites by keywords appearing in URL. Block porn sites, block adult websites by typing unwanted keywords that may be found in the full URL.


Please Share This post,if You like it :-)


Thursday, 10 May 2012

ZIP Password Recovery 2.0.0 with Serial Free Download | Crack Any Password Protected Zip File

ZIP Password Recovery 2.0.0 with Serial Free Download | Crack Any Password Protected Zip File



Do you want to find your ZIP password back? Crack PDF ZIP Password Recovery can help you recover ZIP password in case you forgot or lost the passwords for your ZIP/WinZIP/PKZIP archives. This tool enables you to adopt three strategies to recover ZIP password: the customizable brute-force attack, the brute force attack with trying all combinations, and the dictionary-based attack. With the assistance of Crack PDF ZIP Password Recovery, you can easily get access to your password protected ZIP files again.

-Recovery your forgotten ZIP password in three different ways
-Brute Force Attack with User Defined Mask
-Brute Force Attack with Trying All Combinations

Feature List:
-Able to recover any password for any WinZip/ZIP/ PKZ /ZIP archive.
-Support self-Extracting Zip Files (SFX).
-Able to recover long passwords.
-Three methods are provided to recover ZIP passwords: the brute-force attack (trying all the -combinations), the brute-force attack and the dictionary attack.
-Support advanced 128-bit and 256-bit AES Encryption.
-Allow you to add dictionary files.
-If any part of the password is known, you can select options to minimize recovery time.
-Automatically save password recovering state and can resume after a moment of pause or a crash.
-Auto shutdown the computer after recover ZIP password.

Tuesday, 8 May 2012

Disable or Enable Usb Ports In windows Xp,windows7 using Registry

Disable or Enable Usb Ports In windows Xp,windows7 using Registry


Follow Some simple steps to block Usb Ports In windows Xp,windows 7

Step1: In Windows 7  press Windows key+R and type as “regedit
Step 2: It will open the Registry Editor of  your Windows 7
Step 3: After opening Registry edit browse the following path in reght side bar of registry editor
The Path to go: “HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesUSBSTOR”
Step4: Then right click the registry “Start” which is rectangled in red color in the below screenshot of registry editor
Step:5 Right Click “Start” and Click modify
  • To enable USB ports: change the value from “4? to “3?
  • To disable USB ports: change the Value for “3? to “4?
finaly restart your system.Because Restarting Your system Will take The affects of changed registry..
Please Share ..if YOu like my post:-)

Sunday, 6 May 2012

100+ run commands in Windows | 100 Shortcut commands for different function

100+ run commands in Windows | 100 Shortcut commands for different function


How to use these commands?
1. firstly,click to start button .
2. Then, Select run from there, here you can enter these 100+ commands to open different tools fastly .






The lists of commands are as follows -:




  • Accessibility Options : access.cpl
  • Add Hardware: hdwwiz.cpl
  • Add / Remove Programs: appwiz.cpl
  • Administrative Tools : control admintools
  • Automatic Updates: wuaucpl.cpl
  • Wizard file transfer Bluethooth: fsquirt
  • Calculator: calc
  • Certificate Manager: certmgr.msc
  • Character: charmap
  • Checking disk : chkdsk
  • Manager of the album (clipboard) : clipbrd
  • Command Prompt : cmd
  • Service components (DCOM) : dcomcnfg
  • Computer Management : compmgmt.msc
  • DDE active sharing : ddeshare
  • Device Manager : devmgmt.msc
  • DirectX Control Panel (if installed) : directx.cpl
  • DirectX Diagnostic Utility : dxdiag
  • Disk Cleanup : cleanmgr
  • System Information=dxdiag
  • Disk Defragmenter : dfrg.msc
  • Disk Management : diskmgmt.msc
  • Partition manager : diskpart
  • Display Properties : control desktop
  • Properties of the display (2) : desk.cpl
  • Properties display (tab "appearance") : control color
  • Dr. Watson: drwtsn32
  • Manager vérirficateur drivers : check
  • Event Viewer : Eventvwr.msc
  • Verification of signatures of files: sigverif
  • Findfast (if present) : findfast.cpl
  • Folder Options : control folders
  • Fonts (fonts) : control fonts
  • Fonts folder windows : fonts
  • Free Cell ...: freecell
  • Game Controllers : Joy.cpl
  • Group Policy (XP Pro) : gpedit.msc
  • Hearts (card game) : mshearts
  • IExpress (file generator. Cab) : IExpress
  • Indexing Service (if not disabled) : ciadv.msc
  • Internet Properties : inetcpl.cpl
  • IPConfig (display configuration): ipconfig / all
  • IPConfig (displays the contents of the DNS cache): ipconfig / displaydns
  • IPConfig (erases the contents of the DNS cache): ipconfig / flushdns
  • IPConfig (IP configuration cancels maps): ipconfig / release
  • IPConfig (renew IP configuration maps) : ipconfig / renew
  • Java Control Panel (if present) : jpicpl32.cpl
  • Java Control Panel (if present) : javaws
  • Keyboard Properties: control keyboard
  • Local Security Settings : secpol.msc
  • Local Users and Groups: lusrmgr.msc
  • Logout: logoff
  • Microsoft Chat : winchat
  • Minesweeper (game): winmine
  • Properties of the mouse: control mouse
  • Properties of the mouse (2): main.cpl
  • Network Connections : control NetConnect
  • Network Connections (2): ncpa.cpl
  • Network configuration wizard: netsetup.cpl
  • Notepad : notepad
  • NView Desktop Manager (if installed): nvtuicpl.cpl
  • Manager links: packager
  • Data Source Administrator ODBC: odbccp32.cpl
  • Screen Keyboard: OSK
  • AC3 Filter (if installed) : ac3filter.cpl
  • Password manager (if present): Password.cpl
  • Monitor performance : perfmon.msc
  • Monitor performance (2): perfmon
  • Dialing Properties (phone): telephon.cpl
  • Power Options : powercfg.cpl
  • Printers and Faxes : control printers
  • Private Character Editor : eudcedit
  • Quicktime (if installed) : QuickTime.cpl
  • Regional and Language Options: intl.cpl
  • Editor of the registry : regedit
  • Remote desktop connection : mstsc
  • Removable Storage: ntmsmgr.msc
  • requests the operator to removable storage: ntmsoprq.msc
  • RSoP (traduction. ..) (XP Pro): rsop.msc
  • Scanners and Cameras : sticpl.cpl
  • Scheduled Tasks : control schedtasks
  • Security Center : wscui.cpl
  • Console management services: services.msc
  • shared folders : fsmgmt.msc
  • Turn off windows : shutdown
  • Sounds and Audio Devices : mmsys.cpl
  • Spider (card game): spider
  • Client Network Utility SQL server : cliconfg
  • System Configuration Editor : sysedit
  • System Configuration Utility : msconfig
  • System File Checker (SFC =) (Scan Now) : sfc / scannow
  • SFC (Scan next startup): sfc / scanonce
  • SFC (Scan each démarraget) : sfc / scanboot
  • SFC (back to default settings): sfc / revert
  • SFC (purge cache files): sfc / purgecache
  • SFC (define size CAHC x) : sfc / cachesize = x
  • System Properties : sysdm.cpl
  • Task Manager : taskmgr
  • Telnet client : telnet
  • User Accounts : nusrmgr.cpl
  • Utility Manager (Magnifier, etc) : utilman
  • Windows firewall (XP SP2) : firewall.cpl
  • Microsoft Magnifier: magnify
  • Windows Management Infrastructure: wmimgmt.msc
  • Protection of the accounts database: syskey
  • Windows update: wupdmgr
  • Introducing Windows XP (if not erased) : tourstart
  • Wordpad : write
  • Date and Time Properties : timedate.cpl


Shutdown windows xp fast | speed up windows Xp shutdown

Shutdown windows xp fast | speed up windows Xp shutdown

Start-Button

How to shutdown 
window xp faster 

When you shut down Windows XP, the OS tries its best to make sure that all services (they help run things like graphics, printers etc) are shut down. But there are times when they don't close, thus Windows XP tries to give it the chance to shut down itself. This amount of time that windows waits for the service to close is stored in the system registry. If you modify this setting, then windows will shut down the service earlier. To modify the setting, follow the directions below:
Then as under

1) Start – Run – Regedit
Navigate to the following Registry key:
HKEY CURRENT USER\Control Panel\Desktop
* Double click on the AutoEndTasks entry and replace the 0 with a 1 in the Value data text box
For the next two, if the dword value indicated does not exist, create it:
* Double click on the WaitToKillAppTimeout entry in the right pane and change the Value data to 2000
* Double click on the HungAppTimeout entry in the right pane and change the Value data to 1000
Reboot
* If still having a problem, make the next change:

2) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control
* Right-click on WaitToKillServiceTimeout and change it to 2000
NOTE :- The lowest value Windows will recognize is 1000 (1 second)More Tricks and Hacks ..

    Now reboot or restart your computer, You will be able to shutdown your window xp faster. 



Wednesday, 2 May 2012

Advance Rar Password Recovery with Serial Free Download | Crack Any Rar Passwords Protected File cracked

Advance Rar Password Recovery Free Download with serial | Crack Any Rar Passwords Protected File




This program recovers forgotten passwords for RAR archives. Recovery runs in the background and resumes on the next system start-up. When you have completely forgotten a password, Advanced RAR Password Recovery will run a brute-force attack that applies all possible combinations one by one. In such a case, you can set the minimum and maximum number of characters and the character sets you used (letters, numbers, and non-English characters). If you recall part of the password, you can restrict the search area with a mask such as m***l. If you have used a meaningful word for your password, the dictionary attack helps. You can plug in external dictionaries and check all possible lowercase and uppercase combinations. To decrease recovery time, the program optimizes its code for each type of processor. The trial version limits recovery to three-letter combinations, which doesn't give you the opportunity to fully evaluate performance. If you've forgotten the password for an important archived document, however, Advanced RAR Password Recovery may save you.

Download Advance Password Recovery 



Download It and register with serial :
Serial1:ARPR-83296730531875-CBBVYBXFEXDEVPMB
Serial2:ARPR-83296730531875-CBBVYBXFEXDEVPMB

Sunday, 22 April 2012

Difference between NTFS and FAT(FAT16,FAT32)| Comparison

Difference between NTFS and FAT (FAT16,FAT32)




To NTFS or not to NTFS—that is the question. But unlike the deeper questions of life, this one isn’t really all that hard to answer. For most users running Windows XP, NTFS is the obvious choice. It’s more powerful and offers security advantages not found in the other file systems. But let’s go over the differences among the files systems so we’re all clear about the choice. There are essentially three different file systems available in Windows XP: FAT16, short for File Allocation Table, FAT32, and NTFS, short for NT File System.
FAT16
The FAT16 file system was introduced way back with MS–DOS in 1981, and it’s showing its age. It was designed originally to handle files on a floppy drive, and has had minor modifications over the years so it can handle hard disks, and even file names longer than the original limitation of 8.3 characters, but it’s still the lowest common denominator. The biggest advantage of FAT16 is that it is compatible across a wide variety of operating systems, including Windows 95/98/Me, OS/2, Linux, and some versions of UNIX. The biggest problem of FAT16 is that it has a fixed maximum number of clusters per partition, so as hard disks get bigger and bigger, the size of each cluster has to get larger. In a 2–GB partition, each cluster is 32 kilobytes, meaning that even the smallest file on the partition will take up 32 KB of space. FAT16 also doesn’t support compression, encryption, or advanced security using access control lists.
FAT32
The FAT32 file system, originally introduced in Windows 95 Service Pack 2, is really just an extension of the original FAT16 file system that provides for a much larger number of clusters per partition. As such, it greatly improves the overall disk utilization when compared to a FAT16 file system. However, FAT32 shares all of the other limitations of FAT16, and adds an important additional limitation—many operating systems that can recognize FAT16 will not work with FAT32—most notably Windows NT, but also Linux and UNIX as well. Now this isn’t a problem if you’re running FAT32 on a Windows XP computer and sharing your drive out to other computers on your network—they don’t need to know (and generally don’t really care) what your underlying file system is.
The Advantages of NTFS
The NTFS file system, introduced with first version of Windows NT, is a completely different file system from FAT. It provides for greatly increased security, file–by–file compression, quotas, and even encryption. It is the default file system for new installations of Windows XP, and if you’re doing an upgrade from a previous version of Windows, you’ll be asked if you want to convert your existing file systems to NTFS. Don’t worry. If you’ve already upgraded to Windows XP and didn’t do the conversion then, it’s not a problem. You can convert FAT16 or FAT32 volumes to NTFS at any point. Just remember that you can’t easily go back to FAT or FAT32 (without reformatting the drive or partition), not that I think you’ll want to.
The NTFS file system is generally not compatible with other operating systems installed on the same computer, nor is it available when you’ve booted a computer from a floppy disk. For this reason, many system administrators, myself included, used to recommend that users format at least a small partition at the beginning of their main hard disk as FAT. This partition provided a place to store emergency recovery tools or special drivers needed for reinstallation, and was a mechanism for digging yourself out of the hole you’d just dug into. But with the enhanced recovery abilities built into Windows XP (more on that in a future column), I don’t think it’s necessary or desirable to create that initial FAT partition.
When to Use FAT or FAT32
If you’re running more than one operating system on a single computer, you will definitely need to format some of your volumes as FAT. Any programs or data that need to be accessed by more than one operating system on that computer should be stored on a FAT16 or possibly FAT32 volume. But keep in mind that you have no security for data on a FAT16 or FAT32 volume—any one with access to the computer can read, change, or even delete any file that is stored on a FAT16 or FAT32 partition. In many cases, this is even possible over a network. So do not store sensitive files on drives or partitions formatted with FAT file systems.
Share This Post With Ur Friends If You Liked It .

Lock/Unlock Computer With Pendrive(USB) in windows

Lock/Unlock Computer With Pendrive(USB) in windows


First, what is “syskey”?
SYSKEY is a utility that encrypts the hashed password information in a SAM database in a Windows system using a 128-bit encryption key.
SYSKEY was an optional feature added in Windows NT 4.0 SP3. It was meant to protect against offline password cracking attacks so that the SAM database would still be secure even if someone had a copy of it. However, in December 1999, a security team from Bind  View found a security hole in SYSKEY which indicates that a certain form of cryptanalytic attack is possible offline. A brute force attack then appeared to be possible.
Microsoft later collaborated with Bind View to issue a fix for the problem (dubbed the ‘Syskey Bug’) which appears to have been settled and SYSKEY has been pronounced secure enough to resist brute force attack.
According to Todd Sabin of the Bind View team RAZOR, the pre-RC3 versions of Windows 2000 were also affected.
So this is pretty cool, right?  Well, I really like the idea of keeping this on Floppy so that it requires a floppy disk (a sort of 2 factor (hardware/software) authentication?).
Naturally I wanted to go a bit further and use this on a USB drive instead of storing to a Floppy.  I can’t see myself carrying a floppy and a USB floppy drive around with me.  After all, this provides another layer of security.
NOTE:  I haven’t tested copying data from 1 USB to another USB to see if it works as a backup.  This way you could lock up a USB drive as a spare if needed.
Here’s how to get this to work using a USB drive.
1.  Insert your USB drive into your system and wait for it to be recognized and install any necessary drivers.
2.  Fire up disk management and re-assign the drive letter it was given to “A”.
Start up disk management by clicking Start and typing diskmgmt.msc
 Right-click the USB drive and choose to assign driver letter or path.

 Assign it to letter “A”
Accept the warning message
Now your USB drive is “A”
3.  Run Syskey and save encryption to USB Drive “A”

Click Start and type syskey followed by hitting Enter


Syskey launched; Click “Update”

Choose “Store Startup key on floppy disk” and click “OK”

You’ll be prompted to enter your diskette. Make sure your USB drive is inserted and writable.
4.  Reboot and have fun.  Don’t lose your USB disk!  Also, to revert this, you can run syskey again and choose to store it locally instead of “on a floppy disk”.

Saturday, 21 April 2012

Hide Drives For Your Privacy and Security By using registry without any software or application

Hide Drives For Your Privacy and Security By using registry without any software or application

Steps Involved :


1. open the registry to add key by clicking on to Start → Run, and typing in regedit. This will open the registry editor.

2. Now, navigate to the following registry hive as shown in the picture-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\
Policies\Explorer

3. Right-click on Explorer and choose New and then DWORD Value and name it NoDrives (it is case sensitive)
4.Now modify it’s value and set it to 3FFFFFF (Hexadecimal) .
Now restart your computer. So, now when you click on My Computer, no drives will be shown(all gone…).

To Hide Only Specific drives..continue the steps further and leave step 4

5.double click on it to open the properties dialog box. Click on Decimal for the Base unit.
6.Type in one of the following values depending on that drive letter you want to hide.



Example:- if you want to hide drive D, just type in the value 8. You can also hide multiple drives by adding the numbers if the particular drives together such as – for hiding D and E, you would type 24 (i.e D + E => 8 + 16 = 24).


Related Posts Plugin for WordPress, Blogger...
 
Submitdomainname.com Link Exchange with Democratic Hackers | Learn Ethical Hacking