Saturday, June 6, 2009

NOKIA CDMA SECRET CODES TRICKS

In this post lets see about how to perform certain additional and hidden tasks in nokia mobile phones by secret codes.

Nam Set: *3001#12345#

Software Version of mobile: *#837#

Software Version: *#9999#

CDMA Mode : *#7738#

Message sending options: *#66767#

Esn Number: *#92772689#

Current Channel: *#24#

Restart Phone: *#75681#

Restart Phone: *#75682#

Nokia 8887 Nam Programming :

Nam Set: *3001#12345#

Version: *#0000#

Evrc: *#3872#

Esn/Data/Timer: *#92772689#

SID: *#743#

Help: *#4357#

Slot Cycles: *#75681# , *#75682#

Nokia 8587 Nam Programming :

Nam Set: *#626#7764726#

A-Key: #8159357022#4579# (26 digits)

A-Key: #8159357022#4547# (20 digits)

Version: *#0000#

Version: *#837#

Vocoder: *#3872#

Change language: Menu 5, 3, 1

Change DM mode: *#7678#

Debug Screen: *#8378#

Debug: *#8380#

Field Test Menu: *#83788#

SPC Unlock, Factory Reset :

Full Factory Reset: *#7370#

Resets all settings including non-user changeable items (like SPC)

NOKIA TEST MODE:

1) Turn on the phone. Press *3001#12345#

2) Select Field Test and enable it..

3) Exit from NAM.. and restart your phone..

4) you will observe a new menu " Net Monitor "..

5) type appropriate group/display code.. ( 3101 for link info, 6101 for battery info )
6) enter 0000 to back



tags: nokia tricks,all nokia secret codes,cdma mobile tricks

secret codes for symbian based nokia mobiles like s40,s60 mobiles

In this post lets see about certain tricks for nokia mobile phones and secret codes for symbian based nokia mobiles like s40,s60 mobiles.

#06# Display the IMEI (GSM standard)
*#0000# Display the firmware version and date
*#bta0# Display the Bluetooth MAC address (models with build-in Bluetooth radio, activate first to show address)
*#mac0wlan# Display the WLAN MAC address (models with build-in Wi-fi radio)
*#opr0logo# Clear the operator logo (3310 and 3330 only)
*#pca0# Activate the GPRS PCCCH support (early GPRS models)
*#pcd0# Deactivate the GPRS PCCCH support (early GPRS models)
*#res0wallet# Reset the mobile wallet (models with mobile wallet)
*#res0# Soft-format the memory (Symbian models only)
*#rst0# Reset to factory defaults, confirmation required (DCT4 or newer)
*#sim0clock# Display the SIM clock status (DCT3 only)
*#ssn0# Display the manufacturing serial number (mid-range and premium, non-Symbian models, and those devired from them)
*#war0anty# Display the manufacturing and repair info (no exit on DCT3)
*efr0# Enable EFR encoding (pre-2003 models)
#efr0# Disable EFR encoding (pre-2003 models)
*hra0# Enable HR encoding (pre-2003 models)
#hra0# Disable HR encoding (pre-2003 models)
#pw+1234567890+n# Display the SIM lock status: (pre-2003 models)
n = 1: provider lock
n = 2: network lock
n = 3: country lock
n = 4: SIM lock

To know the IMEI (International Mobile Equipment Identity) No.: *#06#
To check the phones Software revision. *#0000#
To enter the service menu type. *#92702689#
Clock Stopping. *#746025625#

tags: symbian mobile tricks,nokia s60,s40 tricks and secret codes

Monday, June 1, 2009

Windows XP Hidden Applications

Microsoft has kept many useful applications hidden in Windows XP for reasons they know better. Today I will give you a list of such applications. You may know or have used them but there are some you may don’t even know they exists. Depending on the version of Windows XP you are using not all the commands will work, some needs Administrator privileges to run properly. These applications can only be accessed using the Command Prompt or by using the Run dialog box or by double clicking on the .exe file of the application.

Run any of these applications: go to Start > Run and type the executable name

• Account Manager
Command to run: syskey.exe
Use: It encrypts Windows XP account database.
Disclaimer: Use with caution, may cause slow performance if enabled.

• Clipboard Viewer
Command to run: clipbrd.exe
Use: To view or delete clipboard contents.

• Character Map
Command to run: charmap.exe
Use: To view and insert special characters.
You can also access it by clicking on Start > All Programs > Accessories > System Tools > Character Map

• Disk Cleanup
Command to run: cleanmgr.exe
Use: To clean downloaded program files, temporary internet files, recycle bin, temporary remote desktop files, setup log files, backup files, offline files and also compresses old files.
You can also access it by clicking on Start > All Programs > Accessories > System Tools > Disk Cleanup

• Driver Verifier
Command to run: verifier.exe
Use: Verifies drivers and helps create settings, delete settings and display information about currently verified drivers.
Disclaimer: Use with caution.

• Dr. Watson Tool
Command to run: drwtsn32.exe
Use: It is used to configure crash log dump settings

• DirectX Diagnostic Tool
Command to run: dxdiag.exe
Use: Provides DirectX version information and also system information, also used to troubleshoot directx components.

• Group & Policy Manager
Command to run: gpedit.msc
Use: To manage user and computer permissions and privileges.
Disclaimer: Use with caution, if you do not know what a setting does, read its description given there, if you don’t understand leave the setting as it is.

• iExpress Wizard
Command to run: iexpress.exe
Use: It helps to create and open self-extracting installable packages.

• Microsoft Synchronization Manger
Command to run: mobsync.exe
Use: It allows synchronization of offline web pages.

• Microsoft Telnet Client
Command to run: telnet.exe
Use: Used to connect telnet networks.

• Network Shared Folder Wizard
Command to run: shrpubw.exe
Use: Helps create shared folders for a network.

• Object Packager
Command to run: packager.exe
Use: Helps packaging objects for insertion into files.

• ODBC Administrator
Command to run: odbcad32.exe
Use: Helps configuring local and network database options.
Can also be accessed from Control Panel > Administrative Tools.

• Private Character Editor
Command to run: eudcedit.exe
Use: Creates and edits new characters for using into documents.

• Performance Monitor
Command to run: perfmon.exe
Use: Monitors CPU hard disk quota and provides detailed logs and reports.
Can also be accessed from Control Panel > Administrative Tools.

• Registry Editor
Command to run: regedit
Use: Helps to create, view and modify registry values.
Disclaimer: Take caution when modifying the registry, always backup the registry before any modifications.

• File Signature Verification Tool
Command to run: sigverif.exe
Use: Helps to check and verify file signatures.

• System Configuration Editor
Command to run: sysedit.exe
Use: Helps to modify SYSTEM.INI, WIN.INI, CONFIG.SYS, AUTOEXEC.BAT
Disclaimer: Take caution when editing any of these files. If you do anything wrong while editing them you may not be able to start Windows.

• System Configuration Utility
Command to run: msconfig
Use: Helps editing SYSTEM.INI, BOOT.INI, WIN.INI. Also helps to control services and startup programs and configure startup modes.
Disclaimer: Use with caution, if you do not know what a setting does, read its description given there, if you don’t understand leave the setting as it is.

• Windows Media Player 5.1 (Retro)
Command to run: mplay32.exe
Use: It is a very basic and plain version of Windows Media Player. Helps to play basic formats of music.

• Windows Workgroup Chat
Command to run: winchat.exe
Use: Helps to chat with other computers in your workgroup.

I hope that it will help a lot to newbies!!!
If I left any or you know any more hidden utilities, feel free to leave your comment!

Monday, May 4, 2009

Keyboard sniffers to steal data!!!!!

Computer criminals could soon be eavesdropping on what you type by analysing the electromagnetic signals produced by every key press.

The attacks were shown to work at a distance of 20 metres

The attacks were shown to work at a distance of 20 metres

By analysing the signals produced by keystrokes, Swiss researchers have reproduced what a target typed.

The security researchers have developed four attacks that work on a wide variety of computer keyboards.

The results led the researchers to declare keyboards were “not safe to transmit sensitive information”.

Better attacks

The attacks were dreamed up by doctoral students Martin Vuagnoux and Sylvain Pasini from the Security and Cryptography Laboratory at the Swiss Ecole Polytechnique Federale de Lausanne (EPFL).

The EPFL students tested 11 different keyboard models that connected to a computer via either a USB or a PS/2 socket. The attacks they developed also worked with keyboards embedded in laptops.

Every keyboard tested was vulnerable to at least one of the four attacks the researchers used. One attack was shown to work over a distance of 20 metres.

In their work the researchers used a radio antenna to “fully or partially recover keystrokes” by spotting the electromagnetic radiation emitted when keys were pressed.

In a web posting they added: “no doubt that our attacks can be significantly improved, since we used relatively unexpensive equipments [sic].”

In videos showing their early work the researchers are seen connecting keyboards to a laptop running on battery power. They avoided using a desktop computer or an LCD display to minimise the chance of picking up signals from other sources.

Details of the attacks are scant but the work is expected to be reported in a peer-reviewed journal soon.

The research builds on earlier work done by University of Cambridge computer scientist Markus Kuhn who looked at ways to use electromagnetic emanations to eavesdrop and steal useful information.

I can not open my drive or flash memory, what should I do?

Many viruses create a new autorun.inf file for infected drives to run there executable files from autorun. However, antivirus software can kill the virus but they don’t delete the autorun file because it’s not a virus by itself. This is the way to delete autorun.inf and get rid of the problem.

Autorun.inf is a hidden and protected file by Windows Operating System, so first thing you have to go to Folder Options from Tools menu in My Computer:

After that goto view tab in folder options:

You have to make sure that the “Show hidden files and folder” radio button is selected and remove the checkbox from “hide protected operating system files (Recommended)”.

After you click OK or apply a warning message will appear:

Click on Yes and get back to My Computer.

Now go to the drive that you want to remove autorun.inf from it. Right click on the drive icon from my computer and click on Open. If that didn’t work and it showed you the “Open With” window

then click on Browse button and select “C:\%WindowsFolder%\Explorer.exe” to open the file with and click OK.

The drive should opened with Windows Explorer by now and you will be able to see autorun.inf. Delete the file and restart you computer and your problem is solved.

Simple tip to protect from Autorun.inf viruses

External memory devices are common virus distribution method. Once you open an infected memory device the Autorun.inf will copy the virus to your machine and it will get infected as well.

However, there’s a very simple protection method that doesn’t require any third-party software.

First, you have to enable viewing hidden and protected files. You can do this simply by enabling two options from Folder Options as shown in the following image:







Now, all system files will appear in Windows Explorer including autorun.inf. The thing about autorun.inf that it works only when you open the external device not when you explore it. So, don’t use the open option from the Autorun menu

or the Windows Explorer context menu

Instead use the explore option from the context menu when you open the removable device you can see and delete autorun.inf. Also, you can check if this device is infected by skimming for hidden executable files and delete them.

When I double click on my local drive, I get the open with window!

This is a common problem which is usually associated with autorun.inf. If you have a persistent problem with opening your drive, it’s advisable to have a look to the other articles in the Troubleshooting category. If you don’t please continue reading this article:

The problem usually happen when you double click on your local drive. A message just like the one shown below will appear. Before you try these steps, try to right click on drive and click on the “Explore” option. If that didn’t work for you follow these steps:



Click on “Browse” and you will get this window

Locate you windows folder and choose to open your local drive with “Explorer.exe”. After that click on “Open” and you back to the first window just cick “Ok” and your drive will open.

Saturday, February 28, 2009

How To Scare Your Friends

How To Scare Your Friends


Step 1. Open up notepad
Step 2. Type
lol=msgbox("Whatever you want message to say",20,"Whatever you want the window to be titled")

Ex:
lol=msgbox("Warning your computer has been infected by a virus ",20,"Virus Alert")

Step 3. Save the text as Whateveryouwant.vbs

The number 20 represents the type of window style the message will be in. You can experiment with different styles you want.

How to Make a batch form notpad

How to Make a batch form notpad


How to build a simple .bat virus

Index
1. Tools
2. What makes a virus a virus
3. Making your first batch file
4. Making a batch virus
5. Destructive commands
6. Most common tricks used to make someone open the file
7.By, Robby23, 24 Guns, Harry, SLAUGHTER, blu3m4n, BuRP QuakE





1. Tools
To make a batch program you will need a text program (ex. Word,notepad,wordpad etc…) A keyboard if you don’t have one you can use the ON-screen keyboard
To get to the on-screen keyboard start>all programs>accessories>accessibility


2. What makes a virus a virus
When people think of a virus they think of a computer virus but the word virus came from a virus that̢۪s in your body. They also think a virus is meant to delete or destroy things. They normally do but a virus is called a virus because, it copies itself. Like a virus in your body it copies it self to other cells cause it can̢۪t live with out a host. Same with a computer virus with out a file or a program a virus can̢۪t be made.
So all a computer virus is: a program that copies it self ,but some people put destructive code in it.

3. Making a Batch file
I̢۪m going to use notepad you can use what ever you want

We are also going to make a â€Å“Hello Worldâ€� Application that is the first program you make in any language

When making a batch file you are always going to use this line first

@echo off

You can turn it on if you like. All that does is telling the program not to tell its location. If you turn it on then the program will tell were it is at on the computer.
You can experiment a little if you want.

Now we are going to make it say Hello World

To do this we need a echo command which looks like this
echo

This tells the program to write something since we want it to say Hello World we are going to type Hello World next to echo to make it look like this

echo Hello World

so at this point you should have

@echo off
echo Hello World

now go to file save and name it test.bat ( you can name it whatever you want as long as it has .bat at the end.)
Save it to the desktop so you can get to it faster.

Then run it



You should of have a black box open and close really fast

To fix this we need a pause command and we will also need a goto command

The goto command is the most importent command

If you dont know the goto command tell it were to go to next.

since we need a pause command we want it to go to pause so we need to write goto pause like this

goto pause

now u should have

@echo off
echo Hello World
goto pause

now we need a subsection name pause

you make a sub section by putting a : by the first word like this

:start

or

:end

,but we said go to pause so we need one name pause like this

Stick Out Tongueause

then under that we are goin to write pause

Stick Out Tongueause
pause

this just makes it were it will keep the box open till you press a key

Optionl

At the end you can put a exit at the end of pause were the goto command should go ,but you dont have to.

save at run it now.You should be able to read your text now

4. Making a Batch file into a virus

This is alot easier then some people think.

To make a virus you just need the copy command which looks like this

copy

so lets make a new one by reading section 3 you should know you need the @echo off

@echo off
copy

allright we are going to name this file first

and we are going to make it copy itself to C:\WINDOWS just because no one looks in their

this is what it looks like (i will explain it)

@echo off
copy first C:\WINDOWS

copy-tells it to copy
first-is just the name of the file we want to copy
C:\WINDOWS- is the place you want to copy to

that is a virus

5. Destructive commands

If you get pissed at someone you might want to send him someting to mess with him. Here are some commands to add to the virus.

del -this del files

del file name
del (.txt*)

the (.txt*) would delete all txt files on the computer the * at the end just means all instead of a file called .txt

deltree- this deletes the whole folder

you can remeber it like this

Think of a tree if you type del you are only deleting a part of the tree ,but if you type deltree you are deleting the whole tree

format- this deltes everything

format c:

this delets everything in the c drive

open

this is just fun to use to scare some one but not do damage to something

open name of file

like to open notepad type

open notepad

to open microsoft paint type

open mspaint

just put ta crap load in their

also the next one that can be very usefull is looping

this will make the file repet it self til it is shut off

say your first sub section is called start

you would just make the goto command to go to start like

@echo off
:start
start notepad
goto start

that will open notepad over and over and if they dont close it it can crash their computer

to open the command window you have to use var. like %% (not going to explain var. it would be confusing)

@echo off
:whatever
start %0
goto whatever

this will open the black box over and over

6. Most command tricks

people will put it in a folder with a couple read me doc. and call it a game

people will say check this out it is so cool

people will say check out this hack or cheat i found for this game

to check if the are good do this

tell them to put it in a zip folder and send it

unzip and right click on the program(dont open it)

and press edit

that will show the sorce code and if you see something you dont like then delete it


ok


see u The thing is....

onemyshow

Make Force Computer Keep Restarting

Make Force Computer Keep Restarting


1.open note pad

2.type "shutdown -s" with out quotes

3.save the file with .bat extension


4.explaination,u have created a prog which shutdowns the pc with in 30
of executing the file

5. now open "x:\Documents and Settings\USERNAME\Start Menu\Programs\Startup\" (x->is the drive on which ur windows has been installed and USERNAME is the username)

6.paste a shortcut on this directory



NOW WHEN EVER UR FRIEND STARTS HIS PC a count down will start after 30 sec his pc will shutdown
u can also maki his pc restart instead of shutting down.. just replace "shutdown -s" "restart _s"


enjoy.... this is not a virus but look so...

Live CD for Wireless Hacking, Used by the FBI

Live CD for Wireless Hacking, Used by the FBI


Live CD for Wireless Hacking, Used by the FBI - Shaify Mehta

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of "strong" encryption while a 128 bit key has 104. The IV is placed in encrypted frame's header, and is transmitted in plain text.

Traditionally, cracking WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packetsâââ??¬ââ?¬�a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.

Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, "It doesn't matter if you use 128 bit WEP keys, you are vulnerable!

---------------------------------------------------------------------------------------------

auditor-200605-02-no-ipw2100.iso


This version is for systems with the Intel B/G wireless cards (IPW2200) only. All other system should take the version below.
The md5sum of auditor-200605-02-no-ipw2100.iso is "70a5f3e47c191c055366b3b0a3fa2c90

Code:
\\auditor-200605-02-ipw2100.iso

This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
The md5sum of auditor-200605-02-ipw2100.iso is "cdec4b975c1001ddc127a16a32ed1dd7"

Code:

What do beeps mean??? know here.......

What do beeps mean??? know here.......


One Beep :
DRAM refresh failure
This may be due to - Bad memory chips
- A bad DMA Chip
- Bad memory addressing chips on the motherboard

Two Beeps :
Parity error or Parity Circuit failure
-Your memory may not be seated properly on the mother board.
-Unplug and plug it properly

Three Beeps :
Bad memory or bad mother board

Four beeps :
Timer failure in the RAM.

Five Beeps :
CPU chip may be dead

Six Beeps :
Keyboard controller may have failed

Seven beeps :
CPU is dead. Retry the connections and test.
-Replace the whole motherboard.

Eight Beeps :
Video card is missing or Bad.

Nine Beeps :
Damaged ROM BIOS.
-BIOS chip has to be replaced if it persists.

Ten Beeps :
CMOS shutdown.
-Replace CMOS memory and associated chips.

Eleven Beeps :
Cache memory test has failed.
-To enable cache memory try CTRL+ALT+SHIFT++.

One long Beep and Three short Beeps:
Memory failure

One long Beep and Eight short Beeps :
Video card failure.
-Try to install video card in another slot.

No Beeps :
Check Power supply
-Check mother board connections
-Remove all cards except video card and check for system power up
-Insert all cards one at a time and check their operation.
-If system hangs on the installation of a particular card, then it is the cause for the problem and replace it with another of that type and check

Turn Your Pc On in 10 Seconds

Turn Your Pc On in 10 Seconds



Click on the start button then press R it will take u to Run well go to run
n type Regedit
press enter
this will open Registery Editor
now look for the key

HKEY_LOACAL_MECHINESYSTEMCurrentControlSetContr olContentIndex

now there find the Key Called
"Startup Delay"
Double Click On It
Now where its Base
Click Decimal
Now its Default Value Is 4800000
Change The Value To 40000
here u go u have done it
now close the Registery Editor and Restart Your Computer
You'll See The Result

MSN Messenger and Hotmail accounts cracker

MSN Messenger and Hotmail accounts cracker


MSN Messenger and Hotmail accounts crack

MSN Messenger and Hotmail accounts cracker - Shaify Mehta



http://rapidshare.com/files/67541185/MSN_Messenger_Account_Cracker_v2.zip

Wi-fi without router

Wi-fi without router

Here is a short guide to help have the benefits of a wifi router without actually having it on Windows XP.

SHARING YOUR EXISTING ETHERNET INTERNET CONNECTION

1. Go to Control Panel -> Network Connection.
2. Right click on Your Ethernet connection and click on “Properties”.
3. Go to “Advanced” Tab.
4. Check “Allow Other NEtwork….. Internet Connection”
5. In the Drop down Below select the Wifi connection of your pc. If it is disabled, it will be showing your wifi connection already.
6. Click on “Settings”
7. Check the protocols you need to share. Jamal has explained on them.I normally use only http and https.
8. Click on “Ok”.you reach the network connection page. The sharing part is now over.

FINDING DNS SERVER IP ADDRESS.

1. Click on Start -> Run
2. Type in cmd in the Run prompt
3. In the new window type “ipconfig /all” and press enter.
4. Note down your DNS server ip address from the screen.

CONFIGURING THE WIFI

1. Go again to Control Panel -> network connections.
2. Right click on your WIFI connection and click “properties”.
3. Go to”Wireless Network” Tab.
4. The “use windows to configure my wireless network connection” should be checked.
5. In the preferred network connection section click on add button
6. Enter a name of your wish to the network name.
7. Network authentication is “open”
8. Change Data Encryption to “Disabled”
9. Check the “this is a computer to computer …. not used” connection.
10. Click “Ok”.
11. Click on general tab. select “internet protocol(tcp/ip) and click on properties button.
12. Now type 192.168.0.1 in ip address, 255.255.255.0 in subnet mask, leave default gateway empty.
13. Fill in the DNS server entry which you had noted down earlier.
14. Click on “OK” and your network is set.

Your network should appear on the wifi network list now. Search for wlan on your phone. Connect and enjoy browsing on your phone

Wednesday, February 4, 2009

Chat With Command Prompt

Chat With Command Prompt

If you want a private chat with a friend or client on you Network, you don't need to download any fancy program!
All you need is your friends IP address and Command Prompt.
Firstly, open Notepad and enter:

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

Now save this as "Messenger.bat". Open the .bat file and in Command Prompt you should see:

eg:
step 1:

http://sai143mohan.googlepages.com/msg1.bmp

step 2:

http://sai143mohan.googlepages.com/msg2.bmp

step 3:

http://sai143mohan.googlepages.com/msg3.bmp
MESSENGER
User:
After "User" type the IP address of the computer you want to contact.
After this, you should see this:
Message:
Now type in the message you wish to send.
Before you press "Enter" it should look like this:

MESSENGER
User: 56.108.104.107
Message: Hi

Now all you need to do is press "Enter", and start chatting!

go to top of this page

Monday, February 2, 2009

Nokia phone's security Master Code It is safe and completely FREE!

Nokia phone's security Master Code
It is safe and completely FREE!




just email me
email:sai143mohan@yahoo.co.in
subject should be IMEI no _______________
  • 15 digits IMEI
  • company name of mobile
  • u r email address

Thursday, January 29, 2009

UsernameZ & passwordZ plz dont change

gUyz if dOnt mINd i m pla@nng 2 sT@rt a thrEad Just for Lendng Usern@MEz & PAsswrd
Of nY sIteZ & stUff....!!

UsernameZ & passwordZ plz dont change

megashares account
User: kooldude11787@gmail.com
Pass: a1fed8

mEgashare NEver ENding usernaME & passwrd Life LOng

www.megashare.com
User : xthilakx@gmail.com
Password : 4497f13977f99

www.divxcrawler.com
Username : divx382
password : 8324pass

www.megashare.com
Username : xthilakx@gmail.com
Password : 4497f13977f99


Username: avi-3814500-c2b
Passwort: DB0B7794

usenext account






www.unlimitedgamedownloads.com
User Name: ga20me
Password: ke01feb

Pirate access account
h4gpOM
Ca0i25

user:9kHYkg
Pass:smGHD

user: P2izn5
pass:T7y1UY

user:tWxWTe
pass:0yjFEX

user:MQSUjv
pass:lFj6g6

user:eEz0ex
pass61ZoYl

user:h4gpOM
pass:Ca0i25

user:e2ZTjs
pass:zqObNO



Dollar warez
user:-e2ZTjs
pass:-zqObNO

fulldownloads.us account
Username: Af872HskL
Password: XjsdH28N


www.warezquality.com Free Account
Username: ageg2020
Password : z8fsDfg3


Demonoid.com
Username: 'komfuzzled'
Password: 'poniuk0unzyu'

megashare.com
USER NAME: xthilakx@gmail.com
PASSWORD: 4497f13977f99

www.warezreleases.com
Username: HnRPxKQz
Password: a59KBV7

www.pirateaccess.com
Username/Email: yourfrienddalat@gmail.com
Password: CHh5LKPI

FullReleases.com
Username: naddie
Password: j7AebD

----------------------------------------------------------------------------------------------------------
hi guys dis is fr all da XP lovers who wanna vista look....
its easy u have to go to crystaxp.net
log in as

:Username:dj_doctor
password:qwerty123

and go to bricopack and download vista inspirat
or u can straight away go to http://www.crystalxp.net/galerie/num.130.htm
-----------------------------------------------------------------------------------------------------------





http://www.warezreleases.com/
Username: a25bipZP
Password: 1TeVnoJb
This login is for WarezReleases because they ask you to pay an amount for an account their. So enjoy it. Spread the word...... Because people shouldn't pay for warez.





Hai friends..
At dollar warez you will find the latest and newest full version high speed downloads of software..
GO TO: http://www.dollarwarez.com/
#########################
Username: e2ZTjs
Password: zqObNO




Full Memberships

These are some memberships Where all of you guys Can download fully cracked softwares, movies , Games . For free and it is a life time Memberships.


Username: tmoWYpq
Password: F7FLPUF

Go to http://0dayaccess.com/ to login!

----------------------------------------------


username is GkRHr8
password is pbyC4y

http://www.dollarwarez.com/signup.html


---------------------------------------------


http://www.fullreleases.com/


Username: i_l0ve_u_786
Password: E8NHN9


-----------------------------------------



Username: J5ocydQk
Password: Caw9MzWe

http://www.warezreleases.com/members/login


--------------------------------------------



http://www.warezaccess.com/

Your Member ID: 1131709144
Your Password: lucky786



----------------------------------------



Username/Email: xxx_heel_xxx@yahoo.com
Password: MJY0BUY

Username/Email: i_l0ve_u_786@yahoo.com
Password: rYvLgPrt

http://access.pirateaccess.com/