background preloader

Chat with Your Friends through ms dos Command Prompt

Chat with Your Friends through ms dos Command Prompt
-: Chat with Friends through ms dos Command Prompt :- 1) All you need is your friend's IP Address and your Command Prompt. 2) Open Notepad and write this code as it is.....! @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A 3) Now save this as "Messenger.Bat". 4) Open Command Prompt. 5) Drag this file (.bat file) over to Command Prompt and press Enter. 6) You would then see something like this: 7) Now, type the IP Address of the computer you want to contact and press enter You will see something like this: 8) Now all you need to do is type your message and press Enter. ShareThis

http://www.insecure.in/cmd_chat_trick.asp

30 Modern Free Futuristic Fonts Futuristic fonts best for those who have to have something new and ultra-modern. Everybody use serif, sans-serif, grunge and Gothic fonts in projects but futuristic fonts can add innovative sensation to your design. Today we have collected 30 free futuristic fonts for your future projects. PASSWORD HACKING Need to hack someone’s Facebook password? Well, you’re at the right place! In this post I’ll show you some of the possible ways to hack Facebook password. Also, at the end of this post, I will be discussing

25 Best SSH Commands / Tricks - StumbleUpon OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. The encryption that OpenSSH provides has been strong enough to earn the trust of Trend Micro and other providers of cloud computing.Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions.

Picture Gallery 87 Funny Videos, Free Games, & Funny Pictures Sign up | Login Picture Gallery 87 [+] 44 of the best pictures submitted over the past week! [–] 44 of the best pictures submitted over the past week! Tags: Gallery, Picture Preserving OEM Pre-Activation when Re-installing Windows XP Updated: April 20, 2005 By Stephanie Ybarra Large PC Manufacturers known as Original Equipment Manufacturers (OEMs) have the ability to pre-activate Microsoft® Windows XP software installed on new PCs. As a result, end users are typically not required to activate the software during the set up process by typing in the product key found on the Certificate of Authenticity attached to the PC (COA Key). In order to reduce a significant source of piracy, Microsoft has disabled online activation for COA Keys that are attached to PCs that have been pre-activated by OEMs. This change should have a minimal impact on licensed users who generally do not use their COA Key to activate the software because it has been pre-activated by the OEM.

Upside-Down-Ternet My neighbours are stealing my wireless internet access. I could encrypt it or alternately I could have fun. I'm starting here by splitting the network into two parts, the trusted half and the untrusted half. How to use Google for Hacking. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. 70 Things Every Computer Geek Should Know. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject.

Related: