Posted by [V3N0M] on Wednesday, December 31, 2008
Labels:

A Very Happy New Year to you folks . Thanks a lot for supporting me,lets hope New year 2009 brings us more prosperity, opportunities and love. Its your great support that has made to work hard and strive for making this blog a better place to learn and share.

Thanks a lot friends and May you have a Very Happy New Year 2009.

A very happy new year

I may hang out with my friends, try to date a girl and resolve to be a good son,a nice bro and a gr8 lover and in the end,try to become a better human.

Gudluck

Posted by V3N0M . ALL RIGHTS RESERVED .

Subscribe in a reader
Posted by [V3N0M] on Wednesday, December 31, 2008
Labels:

A favicon is the icon which is found in most URL address bars and which may be duplicated in bookmarks, on bookmark tool bars, and tab bars. AHow to Make an Animated Faviconsn animated favicon is a series of single static favicons which are slightly  changed, and when run in series are animated, like film, and are put on one's website. Animated favicons are brand new and may only work with the latest Firefox, some Mozilla and Netscape browsers.

STEPS:

  1. Create a folder on desktop named 'Animation'. Put in it your favicon maker such as 'Edit32' or 'IconArt'. Make any number of favicons; keep it simple to begin with, such that each accomplishes the change on wishes like 1 2 3 4. In this method, these must be saved as (.gif files) and give each a name in series. If they are in (.ico) one needs an extension converter like IrfanView.
  2. Get a gif Animator Compiler, or this case you may want two. The compiler puts each of your single favicon files into a single gif file, which is to be put on the web page server. This is a completely new field so programs and information are scarce. Download the free '11view 3.0a' for viewing and positioning your favicon series. However it does not work well for animated on-line favicons, and does not loop as continuous play. But it is great for viewing and organizing your favicon animations and assigning them times, where 200 is about a second.
  3. Download free 'UnFREEze 2.1' as the actual compiler. Slide your favicons in proper order into the window. Highlight each and assign times to each frame, check loop or not, compile and name and save to your folder.
  4. Past this compiled gif file into your html folder in html editor. It can be put in your favicon folder or a new one created for animations. Address each html page in which it is to appear. The static favicon code is left in place since many browsers don't show animations as <link rel="icon" href="Folder/Favicon.ico">. Underneath is placed animation code such as
    <link rel="icon" href="Folder/Animation.gif"> or
    <link rel="icon" href="Folder/Animation.gif" type="image/gif">.
  5. On FTP transfer protocol, transfer or create Folder for .gif file and transfer it and .gif file to server-side. Transfer html pages containing animation code to server.

[V-LINKED]

posted by V3N0M . WIKIHOW . ALL RIGHTS RESERVED .

Subscribe in a reader
Posted by [V3N0M] on Tuesday, December 30, 2008
Labels:

Bit Defender Anti Virus 2009 FULL

Computer virus is basically a set of instruction or program which a computer understands. This program instructs the computer to perform some particular task. Most of the time the task is deletion of data from the computer, erasing entire hard drive, making a data corrupt. Some virus just displays a message or produce sound. When we encounter such type of cases then we say the computer is affected by virus. Name of some virus are Klez, Melissa, W32, Michelangelo. The virus enters the computer system from internet through e-mail messages or instant messaging messages. When we download file from internet or copy audio, video file or any other file virus can be attached to that file. While opening those files or executing those programs virus get active and start destroying our computer system. There also exists some virus so powerful that we do not even require opening the virus attached file. Virus do not affect write protected disk, also the computer hardware like monitor, keyboard, it only infect the software. The program (virus) is written by some unknown person making people suffer. As a professional way these people also create software to tackle their made virus and sold in market making money out of it. Fortunately the antivirus software can handle virus. This program checks files for virus before entering the system. It is the user’s task to keep antivirus updated to make the system completely protected from virus.Bit Defender Antivirus 2009 provides advanced proactive protection against viruses, spyware, phishing attacks and identity theft, without slowing down your PC. Superior Proactive Protection from Viruses, Spyware, and other e-Threats that wont slow you down. In the spirit of “install and forget” software, BitDefender doesn't go in for the blinking red and green lights to notify you of its activity. Instead, a tiny red and black icon appears in the lower-right corner of your desktop, just above the system tray. This unobtrusive icon is the scan activity monitor. A green line indicates when files are being scanned for viruses and spyware. You can remove the monitor by going into the configuration settings.

Version 2009 provides faster all around protection.

Download- BitDefender AntiVirus 2009 for Windows XP Size: 67,17 Mb

Password:

CODE

www.webpunkt.ru

[V-LINKED]

posted by V3N0M  . ALL RIGHTS RESERVED .

Subscribe in a reader
Posted by [V3N0M] on Monday, December 29, 2008
Labels:

download-Download Accelerator Plus (DAP)Download Accelerator Plus (DAP) is the world's leading download manager, allows you to download up to 300% faster* with increased reliability, resume support and errors recovery. It searches for mirror sites that most effectively serve your downloads through multiserver connections for optimal utilization of dial-up or broadband connections. DAP automatically recovers from shutdowns, lost connections, and other errors. It is fully integrated into Netscape, Internet Explorer, and Opera, Mozilla/Firefox and offers a toolbar for Internet Explorer with a links catcher and a highlighter, providing the best possible performance from ANY Internet connection (dial-up, cable, DSL / ADSL, T1 etc.), allowing a Faster and more Reliable download experience. It features auto-hang-up after downloading, proxy settings, scheduling, and a unique Always Résumé service. 

DAP Features:

  • Preview pane – Preview downloads of Music and Video files
  • Download list - Advanced management of downloads queues, priorities and statuses
  • File Information pane – Advanced information of downloaded files and sources
  • Completed downloads list – Separate list of completed downloads
  • DAP Drive integration – Save downloads and Upload files to DAP Drive web storage
  • Media Center Tab – Conveniently manage your media files
  • Superior Usability – New interface with flexible design options
  • Integrates with all browsers – Internet Explorer, Netscape, Opera, Mozilla/Firefox

Download Accelerator Plus registered version includes:

  • Zip Extract - download & extract specific files from zip archive
  • Removal of the Banner Advertisement within the application
  • DAP Skin Selection
  • Management of site passwords and other relevant info (unlimited)
  • Tray icon minimization while downloading
  • Prioritized technical support
  • Extreme acceleration speed - for faster download rate

Only with DAP Premium:

  • Extremely faster - x10 connections per download!
  • Absolutely no advertisements!
  • Totally customized download experience!
  • Shredder to totally eliminate files you don't need!
  • Trace Cleaner -keep your privacy after browsing!
  • Preview & extract zip files while downloading!
  • Cool new look, more comfortable management features!

Download DAP 9.0 Premium

[V-LINKED]

posted by V3N0M  . ALL RIGHTS RESERVED .

Subscribe in a reader
Posted by [V3N0M] on Sunday, December 28, 2008
Labels:

Having problem hiding your “naughty” files again ? or its just that some unwanted “friends” fiddle with your pc ? and you dont have a dime to spend on a folder lock software or you are sitting on a painfully slow pc with does not allows you good bandwidth and downloads then whatever the reason you might have look below:How to make a folder lock using batch file

Yes thats right. You can lock any folder without using any software. Follow these steps.
1.Suppose you have a folder named abcd in D:\abcd.

2.In the same drive next to the folder create a new notepad file with the exact statement
ren abcd abcd.{21EC2020-3AEA-1069-A2DD-08002B30309D}

3.Now save this text file as loc.bat

4.Create another notepad file and type
ren abcd.{21EC2020-3AEA-1069-A2DD-08002B30309D} abcd

5.Save this as key.bat

6.Now there are two batch files . Double click loc.bat and your folder will change into Control Panel and its contents cannot be viewed .

7.To open the folder double click key.bat and you get back your original folder .

8.For more safety keep the key.bat in another location .Only for unlocking copy paste to the original location and double click .

645FF040-5081-101B-9F08-00AA002F954E   >   recycle bin

21EC2020-3AEA-1069-A2DD-08002B30309D  >   control panel

2559A1F3-21D7-11D4-BDAF-00C04F60B9F0  >   run

2559A1F0-21D7-11D4-BDAF-00C04F60B9F0  >   search

7007ACC7-3202-11D1-AAD2-00805FC1270E  >   Connect to

85BBD920-42A0-1069-A2E4-08002B30309D   >  Briefcase

2559A1F1-21D7-11D4-BDAF-00C04F60B9F0   >   help

D20EA4E1-3957-11d2-A40B-0C5020524152  >  fonts

E211B736-43FD-11D1-9EFB-0000F8757FCD   >  Cameras and scanners

208D2C60-3AEA-1069-A2D7-08002B30309D  >  My network places

now you have learnt how to make folder lock for free without using any software. Stay tuned for more updates

[V-LINKED]

posted by V3N0M  . ALL RIGHTS RESERVED .

Subscribe in a reader
Posted by [V3N0M] on Saturday, December 27, 2008
Labels:

Several times we come across the need to convert the doc file to pdf file so that people cant make changes to them and cant edit your name with them Here are four methods of converting Word documents to PDF for free.

Using Google docs and spreadsheetsHow to Convert a Microsoft Word Document to PDF Format

  1. Backup your file
  2. Go to docs.google.com
  3. Click upload
  4. Click browse
  5. Select the file you would like to convert
  6. Click the upload button
  7. Under the file menu; on the far left, under the Google logo select save as PDF

Using an Online Converter

  1. Go to printinpdf.com
  2. Click 'browse' and select the file on your computer.
  3. You can select upto 3 files.
  4. Click 'Convert to PDF' and wait for it to process.
  5. When you see 'Your files are Ready for download', click on your .pdf files and they open in a new window.
  6. Save your pdf files to your computer.

www.media-convert.com

  1. Go to media-convert.com
  2. Click 'browse' and find the file you want to change to a PDF.
  3. Leave the input as auto detect.
  4. Go down to output and select PDF.
  5. Click Convert and wait for it to process.
  6. Download your freshly created PDF.

Using Open Office

  1. Download OpenOffice from openoffice.org
  2. Install it to your computer.
  3. Open the Word document you want to convert.
  4. From the main menu select File > Export as PDF... There is also an export to PDF button right on the main taskbar.
  5. Choose a filename for your PDF.
  6. Choose the options you want, or just hit save/ok.

Use a Utility like PDF995

  1. There are 2 little files to download and install, a printer driver and the converter.
  2. Download from pdf995.com/download.html
  3. Save to your favorite downloads location, such as c:/downloads
  4. Double click on each zip file to uncompress and install
  5. To use it, you open any document, and choose PDF995 as the printer.
  6. So, in Word, do File... Print... then change the printer to PDF995.
  7. This will actually print to a file, so choose the save location.

TIPS:

  • Using the On-line converter is faster, But Sometimes may glitch or the site may go down.
  • OpenOffice has said to be better than MS Office and is completely free.
  • Always backup first

[V-LINKED]

posted by V3N0M . WIKIHOW . ALL RIGHTS RESERVED .

Subscribe in a reader
Posted by [V3N0M] on Friday, December 26, 2008
Labels:

The Trojan Virus can be very common so you should keep your computer protected with Norton or Macafee Virus Program. The paid version in Norton will kill the virus completely but in Macafee, the free version will only stop the Trojan Horses. If the Trojan horses did invade then you will need to know some C++ stuff to stop it. There is a certain code you will need to know to keep all the boxes from appearing. The effect after the horses drastically slows your computer. While your computer is going slow you may see a shield next to the clock at the bottom right corner and it will occasionally turn into a question mark. It is a scam and by clicking on it you are downloading more of the after Trojans or Trojan spies (they slow your computer)To stop the spies in their tracks follow the steps.How to Beat Your Trojan Virus

STEPS:

  1. Go to the start button and then go to accessories.
  2. Look for System Tools.
  3. Go to the little box that says system restore and click on it. Hold your mouse over it.
  4. Note that a new window appears with a button Restore Computer to an earlier time.
  5. Click next then a calender will appear choose a date before you got the virus and continue.
  6. Notice that your computer will restart and return to the condition it was in on the you selected.
  7. Understand that if it does not, then go to Programs, select system restore, and all the files on your computer should be erased.

TIPS:

  • System restore is only available in Microsoft's Windows Me, XP and Vista operating systems.
  • If something tells you what file or folder the virus is in then go to my computer and delete the folder.
  • If your computer lags just wait for it to smooth out.

WARNINGS:

  • Opening anything besides what I told you to open may damage your computer.

[V-LINKED]

posted by V3N0M . WIKIHOW . ALL RIGHTS RESERVED .

Subscribe in a reader
Posted by [V3N0M] on Thursday, December 25, 2008
Labels:

CopyFaster - Copy & Paste Faster! How to copy and paste faster as before

Are you getting the best performance out of your system? Let CopyFasterbring out the best in your hard drive!
CopyFaster is a software utility that enables Windows Explorer to copybig files faster when copying to and from the same hard drive.

CopyFaster is faster because:
• Less seeking - CopyFaster’s finer control over the copyingprocess causes less time-consuming movement of the hard disk head.CopyFaster will try to read from the same section of the hard disk(where the head is positioned) multiple times before causing the headto move to another position (which is time consuming).
• Uncached file access - CopyFaster bypasses Windows 2000’s file cachewhich normally speeds up repeated access to the same file, but is lessuseful for big files. Bypassing the file cache prevents extra wastedmemory-to-memory copying from occurring.

it’s only a 6MB software.

Download copy faster

[V-LINKED]

posted by V3N0M . ALL RIGHTS RESERVED .

Subscribe in a reader
Posted by [V3N0M] on Wednesday, December 24, 2008
Labels:

Have you ever been locked out of an old computer by a forgotten BIOS password? There's no need to get frustrated. It is relatively easy to bypass this safeguard.How to Break a BIOS Password

STEPS:

Desktop

  1. Power off the computer and make sure that it is unplugged.
  2. Open up your computer case. You need physical access to the motherboard to complete this procedure.
  3. Find a circular, (mostly) silver metallic object on the motherboard. This is the CMOS battery.
  4. CAREFULLY remove the CMOS battery, avoid touching it with your fingers, and leave it out for about 120 seconds. This will flush the CMOS memory which stores the BIOS password and all other configuration. (See Warnings)
  5. Set the battery back into place and power on the computer.
  6. The computer should then warn you that the CMOS configuration could not be found. You can either reconfigure it yourself or restore defaults. Restoring the default configuration should be fine.
  7. You will notice that the BIOS password has been cleared and you can boot without it. You may reset the BIOS password to something else by going into the BIOS configuration and setting a new User Password (The Supervisor Password controls access to the BIOS, NOT the computer!)

Laptop

  1. Remember that laptops can be trickier, especially if it's a newer model. If it has a security chip on the motherboard forget about it. You either have to physically remove the chip or contact the mfg for the "master" password. If you can boot up off of a cd or floppy try any of these methods:
  2. Create a Win98SE bootable media "or anything that lets you boot into MS-DOS" and boot off of it.
  3. When the A:\> prompt appears type debug and press enter.
  4. You will then only see a "-".
  5. Type o 70 2E "include the spaces" and press Enter.
  6. Type o 71 ff "include the spaces" and press Enter.
  7. Type q and press Enter.
  8. Here are a list of common mfg backdoor passwords:
  • AWARD BIOS
    AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256, j262, j332, j322, 01322222, 589589, 589721, 595595, 598598, HLT, SER, SKY_FOX, aLLy, aLLY, Condo, CONCAT, TTPTHA, aPAf, HLT, KDD, ZBAAACA, ZAAADA, ZJAAADC, djonet, %øåñòü ïpîáåëîâ%, %äåâÿòü ïpîáåëîâ%
  • AMI BIOS
    AMI, A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND, Oder

Other passwords you may try (for AMI/AWARD or other BIOSes) - LKWPETER, lkwpeter, BIOSTAR, biostar, BIOSSTAR, biosstar, ALFAROME, Syxz, Wodj gvs

TIPS:

  • Depending on the manufacturer of your motherboard, you may be able to use what it is called a "backdoor password" to bypass the password problem. Try looking at the external links for possible passwords.
  • Remember that passwords are Case Sensitive. The last two passwords in the AWARD BIOS list are in Russian.
  • Sometimes the bios reset jumper has a "handle" and is colored a bright color to make it easy to locate. Also, look in your case near the bottom. If it is a manufactured computer then it probably came with a little sticker with the jumpers and the location of the reset jumper.

WARNINGS:

  • In rare cases, the battery may be soldered into the motherboard and very difficult to remove. If this is true, you may need to find a jumper near the battery that achieves the same result. If you don't know which jumper it is, you CAN test them all. Unplug (really unplug, not just power off) the computer, and start a methodical change in all the jumpers positions, change one, count to ten, change it back, move on the next. After completing the lot of them (on older motherboards this could take a while) plug the PS back in, and boot up. You may risk damaging your computer with this procedure if you are not careful.
  • Some notebooks such as IBM's ThinkPad render useless when the BIOS password is being tried to reset.
  • Don't just start pulling jumpers on the motherboard. Make sure you know where it was and in what position in case anything goes wrong put it back.
    If you turn your computer on and it makes strange noises / beeps, you should contact the vendor, manufacture, or a tech guy to fix it.

[V-LINKED]

posted by V3N0M . ALL RIGHTS RESERVED .

Subscribe in a reader
Posted by [V3N0M] on Sunday, December 21, 2008
Labels:

For All Those Gmail Account Holders That Whish To Use A Gmail Account With Msn Messenger & .Net Passport Service Use Msn Messenger with Gmail

An Introduction

In this tutorial you will learn how to step up your Gmail Account with . net passport to allow u to login to msn messenger ang any .net passport supported website

What you will need

  • A Gmail Account - as these are only obtainable via invitation i will assume you already have one .
  • Msn Messenger / Windows Messenger - used to verify your gmail account.

Here is how to do it -

  • Once you have downloaded / obtained all of thease you are ready to continue.
  • log in to your gmail account via - http://gmail.com. Once you are logged in minimize this internet browser window ( convenient or later on )
  • load up msn messenger and cancel any automatic signed in attempt so that you have it ready to signed in with your gmail account later on .
  • You will need to visit the Microsoft .Net Passport website - http://www.passport.net
  • Now you will need to click on the register for your free .net passport today button that is in the top right hand corner of the page you cant miss it its huge
  • That will take you to a registration page fill in the from as you would if you where filling a hotmail account accept when asked for your email account you would enter myaccount@gmail.com
  • Once the registration of you .net registered gmail account has been made , signed in to Msn messenger using this newly registered account , you will notice that when you signed in to messenger your messenger name will be youraccount@gmail.com (un verified ) and you wont be able to change it , this is solved below.
  • As soon as you have signed in , a message will appear in an information box ( the same as when a contact signed in ) , click on this and you will be taken though the process of Verifying your account the reason you have to go though this is because at current gmail is not affiliated with .net passport e.g .net passport doesn't recognize the @gmail.com as a valid email provider there for they cannot automatically verify your account ( hotmail and msn auto verify as there .net passport affiliated websites) ,
  • Once u have been taken though the verification process you will be asked to log in to your email account and visit the url given in an email form the .net passport verification service , maximize the internet browser window that you signed in to gmail on earlier , you will have 2 emails form .net passport the first will be welcoming you to .net passport , the second will be the one we are after , the verification email , open this up find the url to finish verifying your email address ( usually its either the first to thirs url in the email)
  • Once you have completed these actions and you have been told that your gmail account is verified , signed out of msn messenger , then re signed back in ( you don't need to wait for any period of time just signed out then straight back in again) , you will now notice the (not verified) had been removed form your msn name , and now you are able to change ther name to , if this is so m, then congratulations you now have a fully functioning .net passport gmail account ( you cannot access your gmail email account via msn messenger you will still have to visit the gmail login page for this )
  • http://gmail.com
  • If for any reasons this did not work , and you again receive the message asking you to verify , or you haven't received your verification email from .net passport , then re-try steps 2 - 7 , un till you get it working correctly .

i hope this helps some of you gmail account users out there that have been wracking your brains over how to get gmail in to msn messenger.

 

[V-LINKED]

posted by V3N0M . WIKIHOW . ALL RIGHTS RESERVED .

Subscribe in a reader
Posted by [V3N0M] on Saturday, December 20, 2008
Labels:

Is your computer bogging down and getting slow? This article explains how to clean it up without having to reinstall Windows.How to Make Your Windows Run Faster

STEPS:

1. Backup your files

Backup any files you want to keep. The easiest way to do this is to copy your entire profile folder (C:\Documents and Settings\username) to a CD/DVD, iPod, USB flash drive, or external hard drive. This folder contains all of your files and settings.

2. Create a new user account and delete the old one

  • Open the Control Panel and select "User Accounts"
  • Create a new user account
  • Log out of your old account and into the new account
  • Repeat Step 1 and delete your old account - make sure to select "Delete Files"

3. Uninstall any unused programs

Control Panel -> Add/Remove Programs

4. Clean up and optimize your hard drive

  • Run Disk Cleanup (Start -> All Programs -> Accessories -> System Tools -> Disk Cleanup)
  • Run Disk Defragmenter (Start -> All Programs -> Accessories -> System Tools -> Disk Defragmenter)

5. Increase Widows Memory Performance

  • Open the Control Panel and select "System"
  • Select "Advanced-> Perform -> Select the 3rd option (Increase perform)"

TIPS:

  • It is best to reinstall Windows, because it will erase everything on your computer and return it to factory condition. If you don't want to do this, follow the steps above.
  • If you don't want your files to be recovered, use a file wipe utility or overwrite the data with as many files as possible (such as music).
  • The safest option is to purchase a new hard drive and destroy the old one. You will then have to reinstall Windows.

[V-LINKED]

posted by V3N0M . WIKIHOW . ALL RIGHTS RESERVED .

Subscribe in a reader
Posted by [V3N0M] on Friday, December 19, 2008
Labels:

How to shutdown in a single click Did you know that in Windows XP you can shut down your computer from the (eventually DOS prompt) command line box? Moreover, you can do this by clicking your mouse only once.

All you need to do is... right-click on an empty Desktop spot -> select New -> Shortcut -> type shutdown followed by a space, and then enter one or more of the parameters listed below -> click Next -> type a suggestive name for your new shortcut -> finally, click Finish.

This is the Shutdown.exe (located in %systemroot%\System32, usually C:\Windows\System32) syntax:

shutdown [-i|-l|-s|-r|-a] [-f] [-m \\computername] [-t xx] [-c "Text"] [-d[u][p]:xx:yy]

Valid command line switches:

-a = Abort system shutdown in progress ONLY IF the -t xx timeout option was already set to ANY value other than 0. ALL switches except -l and -m are ignored during abort.

-c "Text" = Text comment (case insensitive) to be displayed in the Message area of the System Shutdown window. MUST be enclosed between quotes. Maximum allowed 127 ASCII characters.

-d [u][p]:xx:yy = Reason code for shutdown:
u = User code.
p = Planned shutdown code.
xx = Major reason code. Positive integer number less than 256.
yy = Minor reason code. Positive integer number less than 65536.

-f = Force running applications to close without warning.

-i = Display the shutdown interface (GUI). MUST be the first option!

-l = Log off the current user of the local computer (default action). Can NOT be used with the -m option unless the current user has Sysadmin rights, in which case the -m switch takes precedence.

-m \\computername = Remote/network computer name (most always case sensitive) to log off/restart/shut down. Current user MUST have Sysadmin rights to be allowed to use this switch!

-s = Shut down the local computer.

-r = Shut down and restart (reboot) the local computer.

-t xx = Set shutdown timer to timeout for xx seconds. IF NOT specified defaults to 20 seconds. Allowed values between 0 and 99 seconds. The -a switch is the ONLY one that CAN be used during the timeout period.

NOTES:
The dash (-) in front of these switches can be replaced by a forward slash (/).

Spaces are NOT required to separate the shutdown command from ANY following switches, but ARE required to separate ANY switch from its following parameter(s), if any.
For example:

shutdown -s -c "Shutting down!" -t 3

tells your computer to shutdown after waiting for 3 seconds while the System Shutdown window will display text above in the Message area.

Optional: after you're done creating your customized shortcut for shutdown -> right-click on it -> select Properties -> enter your desired key "combo" in the Shortcut Key box (e.g. Ctrl + Alt + End) -> click OK/Apply.
From now on just left-click on your shutdown shortcut or hit that key combination to turn off/restart/log off your computer.

[V-LINKED]

posted by V3N0M . ALL RIGHTS RESERVED .

Subscribe in a reader
Posted by [V3N0M] on Thursday, December 18, 2008
Labels:

Tired of waiting for Rapidshare downloads ? or Do you need to change your IP address frequently ? whatever it is , here is the way to change your IP address in less than one minute.How To Change Your Ip In Less Then 1 Minute

STEPS

  • Click on "Start" in the bottom left hand corner of screen
  • Click on "Run"
  • Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

  • Type "ipconfig /release" just like that, and hit "enter"
  • Type "exit" and leave the prompt
  • Right-click on "Network Places" or "My Network Places" on your desktop.
  • Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

  • Right click on "Local Area Connection" and click "properties"
  • Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
  • Click on "Use the following IP address" under the "General" tab
  • Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
  • Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
  • Hit the "Ok" button here
  • Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

  • Right-click back on "Local Area Connection" and go to properties again.
  • Go back to the "TCP/IP" settings
  • This time, select "Obtain an IP address automatically"
  • Hit "Ok"
  • Hit "Ok" again
  • You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

NOTES
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back.

[V-LINKED]

posted by V3N0M . ALL RIGHTS RESERVED .

Subscribe in a reader
Posted by [V3N0M] on Tuesday, December 16, 2008
Labels:

Determining if a torrent is real or fake can give a heck of a headache. Using sites that you know and trust can give you general information as to the authenticity of the torrent.

Steps :How to Determine if a Torrent Is Real or Fake

  • Find a torrent of whatever you are looking for.
  • Review any information given to you, such as the date uploaded, the file size, etc. For example, if something was released on April 10, but it was uploaded on March 14, it's probably a fake or a ripped version.
  • Review any ratings or comments available to you. Others may have already confirmed it's status.
  • Check for other sites linking to the torrent. The more sites, the more chance the torrent is real.
  • If all else fails, you could download a section of the torrent and check it's quality. This may not work for movies and large file.

Warnings :

  • If you download a torrent and the file points you to a website saying you need special software, do not download or install it.
  • Don't run something on your computer unless you trust it. Think of it like a sandwich. Would you eat a random sandwich you find in a park?
  • Do not download illegal material. If you do, the MPAA can track you down and sue you. For proof, simply look at the music industry.

[V-LINKED]

posted by V3N0M . WIKIHOW . ALL RIGHTS RESERVED .

Subscribe in a reader
Posted by [V3N0M] on Monday, December 15, 2008
Labels:

Bloodshed C++ IDE – FREE, OPEN SOURCE & Bloody Good

The Bloodshed Dev-C++ package is a complete compiler, IDE and supporting tools for software creation under the Windows (Win32) operating system. It uses a popular compiler, known as MinGW (Minimal GW), supports both C and C++ and has some useful automation features for Windows software creation. Development for the command line interface is also supported.

It runs on any Win32 system - so is great for those trying to rejuvenate old machines as development environments for learning how to program. The software is free - Open Source - and can be downloaded from Source Forge, or the Bloodshed.net main site.

‘Dev-C++ is awesome!’ Version 5 has a lot more features than version 4, but the addition of these features seems to have bought along a lot of bugs. Doesn't stop me from using it though.

Feature list

  • Support GCC-based compilers
  • Integrated debugging (using GDB)
  • Support for multiple languages (localization)
  • Class Browser
  • Code Completion
  • Debug variable Browser
  • Project Manager
  • Customizable syntax highlighting editor
  • Quickly create Windows, console, static libraries and DLLs
  • Support of templates for creating your own project types
  • Makefile creation
  • Edit and compile Resource files
  • Tool Manager
  • Print support
  • Find and replace facilities
  • Package manager, for easy installation of add-on libraries
  • CVS Support
  • To-Do List
  • CPU Window

Requirements

  • Windows 95 or higher.
  • 32 MB of RAM.
  • The executables compiled by Dev-C++ will need MSVCRT.DLL (comes with Windows 95 OSR 2 or higher).

Download Bloodshed dev c++

 

[V-LINKED]

Subscribe in a reader
Posted by [V3N0M] on Sunday, December 14, 2008
Labels:

 Download Blender- The Free Animation and 3D modelling toolBlender is a free 3D graphics application. It can be used for modeling, UV unwrapping, texturing, rigging, water simulations, skinning, animating, rendering, particle and other simulations, non-linear editing, compositing, and creating interactive 3D applications. Blender is available for several operating systems, including Microsoft Windows, Mac OS X, Linux, IRIX, Solaris, NetBSD, FreeBSD, OpenBSD with unofficial ports for BeOS, SkyOS, AmigaOS, MorphOS and Pocket PC. Blender has a robust feature set similar in scope and depth to other high-end 3D software such as Softimage|XSI, Cinema 4D, 3ds Max, Lightwave and Maya. These features include advanced simulation tools such as rigid body, fluid, cloth and softbody dynamics, modifier based modeling tools, powerful character animation tools, a node based material and compositing system and Python for embedded scripting.

Download blender

[V-LINKED]

Subscribe in a reader
Posted by [V3N0M] on Saturday, December 13, 2008
Labels:

The_Day_the_Earth_Stood_Still

Starring: Keanu Reeves, Jennifer Connelly, Jaden Smith, John Cleese, Jon Hamm, Kyle Chandler, Kathy Bates
Director: Scott Derrickson
Screenwriter: David Scarpa, Edmund H. North
Producer: Erwin Stoff, Paul Boardman, Gregory Goodman
Studio: 20th Century Fox

Keanu Reeves tops this adaptation of the seminal 1951 sci-fi film The Day the Earth Stood Still with this 20th Century Fox production. Scott Derrickson (The Exorcism of Emily Rose) helms the story of an alien traveler, Klaatu (Reeves), who heads to Earth along with his bodyguard robot, Gort, to deliver a warning of planetary destruction if the people of the world fail to bring peace to their civilizations. Jennifer Connelly, Jon Hamm, and Kathy Bates co-star in the David Scarpa-penned film. ~ Jeremy Wheeler, All Movie Guide.

Download

 

[V-LINKED]

Subscribe in a reader
Posted by [V3N0M] on Friday, December 12, 2008
Labels:

Shutdown your PC sitting anywhere in the world Shutdown your pc sitting anywhere in the world just by sending a message from your cell phone. lets see how the system works:

Things you need -

    1. Outlook Express and a e-mail
    2. A account in ‘Kwiry’
    3. A text capable cell

Step 1: Create “shutdown.bat” and type this code in notepad as follows -

  • c:/windows/system32/shutdown –f –s -t 00
  • save this file in c drive as shutdown.bat

Step 2: Get a pop3 capable e-mail address

for a pop3 email address you can use your gmail account or if you don’t have that you can easily register google account on “www.gmail.com”.

Step 3: Setup Microsoft Outlook Express

  • Open Outlook Express
  • click on tools>e-mail accounts>Add a new account
  • click next,& then click on pop3
  • click on next and writ your user name in first cell and write your email address in second cell
  • write “pop.gmail.com” in incoming mail server
  • write “smtp.gmail.com” in outgoing mail server
  • now write your gmail user name and password in logon information
  • click more settings, and go to outgoing server & select “my outgoing server (SMTP) needs authentication”
  • now go to advanced and set the value of incoming server (pop3) to 995
  • click both boxes that says ”this server requires authentication
  • now click on “leave a copy of message on the server” and then click ok,& click finish.

Step 4: Sign up for “kwiry” account

fill up all the details & then click on start using kwiry

Step 5: Setup a rule for Outlook

  • click on send/receive option and goto send/rcceive settings and then click on “define send/receive group”
  • select “select this group in send/receive” & set the value of “schedule an automatic send/receive every” to 1 minute & then click close
  • now click tools>rules and alerts>new rule
  • click start from a blank rule and select “check the message when they arrive” & click next
  • select “specific word in a subject” click on specific words at bottom and write “your kwiry – shutdown” in the cell
  • click add and then ok
  • now select “select an application” and click on application on bottom
  • now change the file types to “all files(*.*)” and browse shutdown.bat
  • click next & finish
  • click apply & ok

Step 6: send a text message to kwiry

send “shutdown” to 59479 from your mobile phone. generally you have to wait for a minute and the Outlook will receive an email and the computer will prepare to shutdown.

Stay tuned for more…

 

[V-LINKED]

Subscribe in a reader
Posted by [V3N0M] on Thursday, December 11, 2008
Labels:

Disable Automatic Reboot After Windows Update Method 1 :

  • Back up your registry.
  • Open regedit by typing "regedit" into the Start > Run dialog.
  • Navigate to HKEY_LOCAL_MACHINE\ Software\ Policies\ Microsoft\ Windows\ WindowsUpdate\AU.
  • Create or change the DWord value NoAutoRebootWithLoggedOnUsers to 1.
    Exit and reboot.

Disable Automatic Reboot After Windows Update

Method 2 : For XP Pro, 2000, and 2003 Users with SP2 Installed

  • Enter gpedit.msc into the Start > Run dialog.
  • Navigate to Computer Configuration > Administrative Template > Windows Components > Windows Update.
  • Right click on No auto-restart for scheduled Automatic Updates installations. Enable it.
  • Exit the Group Policy editor and reboot.

[Using the "No Auto-Restart" feature does not achieve the goal that you want. It will stop the auto-restart but you will continue to get pop-ups asking for a restart until you do. To prevent this, you need to enable "Reprompt for restart with scheduled installations", found in the same section, and set the interval for reprompts to the max allowed which is 1440. That's 24 hours. You will probably turn off or restart your computer normally during that time.]

With this option set, you will be asked only once to restart now or later. After you click later, you will not be asked again until the next day if you have left your PC on for 24 hours.

 

[V-LINKED]

p;osted by V3N0M . WIKIHOW . ALL RIGHTS RESERVED .

Subscribe in a reader
Posted by [V3N0M] on Wednesday, December 10, 2008
Labels:

There are many viruses and worms out there that could infect your computer. Not all of them are going to completely destroy your data, but they are always a hassle to deal with. How to Avoid Being Infected With Malware (Viruses)

Steps

  • Be careful about using MS Outlook. Outlook is more susceptible to worms than other e-mail programs, unless you have efficient Anti-Virus programs running. Use Pegasus or Thunderbird (by Mozilla), or a web-based program such as Hotmail or Yahoo.
  • Invest in some security software. You can buy suites of software, usually called Internet Security packages, that do the whole hog, such as Norton Internet Security or Kaspersky Internet Security. However, you can also choose to install them separately:

Install an Anti-Virus program. Examples of these can come from Norton, Kaspersky, Sophos or McAfee. Also available is the free AntiVir virus scanner. Make sure you keep your virus definitions updated and run a full system scan weekly.

Install an Anti-Spyware program. Examples of these are Adaware SE, Microsoft Defender. They defend against Internet malware and spyware. Just like an Anti-Virus program, keep it updated, and do a full system scan weekly.

  • If someone sends you an attachment in e-mail or instant messaging, do not open it immediately. If it is a picture, text or sound file (these attachments often end in the extensions .txt, .jpg, .jpeg, .gif, .bmp, .tif, .mp3, .htm, .html, and .avi), you are probably safe. If someone you know very well sends you a Word attachment or other type of file, e-mail them to ask them if they meant to send it to you. If they say yes, you can open it, but you might still be at risk if they are not good about running Anti-Virus scans or careful about what they download. Always scan them before you download them. Be wary of attachments with a double extension, such as .txt.vb or .jpg.exe, as the system will only recognize the extension to the extreme right, and run the file as such. Double extensions are often a good indicator that the file is malicious.
  • Do not use disks that other people give you, even from work. The disk could be infected with a virus. Of course, you can run a virus scan on it first to check it out, but AV programs are not 100% effective.
  • Do not download files from just any old website. If it is a reputable site that you trust, you are probably safe. The threat is not only from software; don't download Word documents or other non-HTML files that have something other than one of the extensions listed above, either. Make sure that you scan every file that you download, wherever it's from.
  • Set up your Windows Update to automatically download patches and upgrades. This will allow your computer to automatically download any updates to both the operating system and Internet Explorer. These updates fix security holes in both pieces of software.
  • Consider switching to a different web browser. Other web browsers (such as Firefox, Google Chrome or Opera) are considered to have much better security than Internet Explorer. Other benefits include much faster loading, customisibility and ease of use. Plus, they're both free.
  • Be careful when surfing. You can get a malicious script from a webpage and not know it. If you have Internet Explorer set up for the maximum security settings, you are probably safe. If you use Firefox, you can download the NoScript extension, which allows you to easily control which websites are allowed to run scripts and protects you from other threats such as click-jacking. If you ever get a window asking if you want to allow an automatic install, say "No" unless you know the site requesting the install.
  • Read about the latest virus threats so you are aware of the potential danger. Go to Symantec's page to read about them daily.

Tips

If you are aware that some malware is currently downloading or installing on your computer and you can't cancel or shut it off, the best thing to do is to immediately turn off your computer by the switch, not the shutdown menu. This will put it to an abrupt stop and will not give the download or installation time to finish. When you turn your computer back on, if you have enabled your system restore then restore your computer to the most recent time period before the installation or download took place. Otherwise, run your anti-virus software before doing anything else on your computer.

  • You might want to consider not using Windows at all. Other operating systems, such as Mac OS X or Linux, are much less susceptible to viruses.
  • When using peer to peer programs to download files such as songs or videos, always remember the following:
    • When downloading a song, always make sure it has a bitrate and make sure that it is a normal one, such as 128, 192, 320 etc. If you see a song without a bitrate, it is obviously not a song at all and a potential virus. Also check the size of the song; A normal song will usually be between 1,955 KB and 6,607 KB depending on the bitrate and length of the song. Some songs may be larger or smaller, but keep in mind that a song of (for example) 38 KB is either a very very short song, or 87% of the time will be a virus. Also the same with an excessively large file, say for example you're searching for "Love is All You Need" by "The Beatles", and you come across a file that is 100 or so MB, don't download it.
    • When downloading video files, keep in mind that video files don't have a bitrate, if you see a video file with a bitrate, don't download it. Also, video file sizes vary a lot, so it is difficult to give an estimated margin as with sound files, but it is not hard to use common sense. For example if you are looking for a short clip, and you find a file that is 900 MB, chances are, you have either found the entire video, or you have found something that is other than what it says. Full movies usually lay around the 700 MB range, so keep that in mind when searching for a full movie. In addition, note that if you have downloaded a video and (after having scanned it with legitimate anti-virus software) it plays, but a message shows up stating that your video software is "not compatible" and that you should go to such and such site, don't go to the site, it will probably not be safe, and delete the file immediately.
  • If using an operating system that supports system restore, always make sure it is active before you download anything.
  • Be vigilant! Constant vigilance is a must in safe computing. Any abnormalities in operation, or trouble with the system, should be taken as the result of malware and should be treated as such. If you so much as suspect that your computer is compromised, run a virus scan immediately, it never hurts.
  • Do not panic. If you believe your computer has been compromised, and a virus is found, take a step back and survey the situation. If your antivirus software cannot remove the virus, and you do not believe you are capable of handling the job, simply remove your computers internet connection, and call a professional technician.
  • Some antivirus products come with a self-booting recovery disk. These often can repair infections that standard antivirus software, running under Windows, can't.
  • Try to balance paranoia with common sense. Some people get really weird about viruses, spyware, etc. Back up your data regularly and follow these steps, and it shouldn't be a big problem.

Warnings

  • There are worms that use exploits in popular programs, email in particular, to execute code and infect a system. In most cases this is the most prevalent method of worm replication using Outlook or Outlook Express.
  • The easiest way to avoid this is to keep current with Windows Updates, and also to disable the Preview Window.
  • Never click on any page advertisements or pop-up ads, these are usually very misleading and sometimes potentially harmful.
  • If you do not believe you can handle a virus removal, contact a professional or experienced user. Removing the wrong files, registry keys, or browser helper objects cvirusan wreck havoc on your operating system.
  • Note that your backup may also infected by virus. Consider whether to use them.

 

[V-LINKED]

posted by V3N0M.WIKIHOW.ALL RIGHTS RESERVED.

Subscribe in a reader
Posted by [V3N0M] on Tuesday, December 09, 2008
Labels:

Alcohol Audio 180% 3.0
Alcohol Audio 180% 3.0 is writing down, copying, transformation, in audio-CD or MP3-CD or digital videodiske, phonogram of musical digital videodiskov on the tape player of MP3.С by this program you are king of music.
Size: 22 MB
Language of Interface: English
Platform: Windows All

 

Download Alcohol Audio 180% 3.0

Password Code:

Mafia007@WarezDominator.Com

[V-LINKED]

Subscribe in a reader
Posted by [V3N0M] on Tuesday, December 02, 2008
Labels:

Transporter 3 (2008).jpg Frank Martin (Jason Statham) has been pressured into transporting Valentina (Natalya Rudakova) (by using a device which prevents him from moving 75 feet from his car or a bomb attached to him explodes) the kidnapped daughter of Leonid Vasilev (Jeroen Krabbe), the head of the Environmental Protection Agency for Ukraine, from Marseilles through Stuttgart and Budapest until he ends up in Odessa on the Black Sea. Along the way, with the help of Inspector Tarconi (Francois Berleand), Frank has to contend with the people who strong armed him to take the job, agents sent by Vasilev to intercept him, and the general non-cooperation of his passenger. Despite Valentina's cynical disposition and Frank's resistance to get involved, Frank and Valentina fall for each other, while escaping from one life-threatening situation after another. Statham again drives an armored Audi A8 W12 in the film.

Download transporter 3 part 1

Download transporter 3 part 2

 

[V-LINKED]

Subscribe in a reader
Posted by [V3N0M] on Saturday, November 29, 2008
Labels:

The java games for a particular mobile have fixed resolution
But if you want to change the resolution for the different mobile application you can use the software provided here to change the resolution
This simple "hack", allows running java

game developed and optimized for low resolution phones (176*208) like N70 on the high resolution phones (352*416) like N80 or phones with QVGA screens like N93 in full screen mode and its native resolution. Now a have a free PC software that allows editing and changing the screen resolution of Java applications/games to any of the stand.

Download

 

[V-LINKED]

Subscribe in a reader
Posted by [V3N0M] on Friday, November 28, 2008
Labels:

imgres Windows XP performance can be easily improved just by applying several tweak on its default setting. With the following easy trick we are looking for a significant performance improvement without having to upgrade or buying additional software. With a little bit of preparation and following the steps carefully you can improve the performance almost instantly. Here are top 5 easy tricks for improving windows xp performance.

1. Defragment your hard drives

Defragment your hard drives time to time, just right click on the drive then click on properties, click on tools and then click on defragment now.This process may take a few minutes to a few hours depending on how long the period since you did it in the past. As an alternative you can use JK defrag which is smaller but more efficient than Microsoft Disk Defragmenter program. It is free software and it can even defrag your computer when it’s idle, saving you precious time.

2. Turn Off Indexing to Speed Up Windows XP

windows XP keeps a record of all files on hard disk.  So when you do a search on the hard drive it is faster.  But because the computer has to index all files, it will slow down normal file commands, so if you do not do a whole lot of searches on your hard drive then you should turn this off. Open My Computer--> Right-click your hard drive icon and select Properties.  At the bottom of the window you'll see "Allow indexing service to index this disk for faster searches"; uncheck this and click Ok.  A new window will pop up.  Select Apply to all folders and subfolders. The process will take some time for the changes to take effect but then you should enjoy slightly faster performance.

3. Turn of the graphic performance to Speed Up Windows XP

Windows XP is graphically very rich, and if you will turn off the graphic performance you can speed up your Windows. I do it because I care more about the functionality than the fancy graphic.  So click start--> control panel--> system--> advanced--> performance setting button and check “adjust for best performance" and click "OK".

4. Shutdown Windows XP Faster

It takes a long time to restart or shutdown Windows XP when the "Exit Windows" sound is enabled. To help this problem, you must disable this sound.
Click Start button--> Control Panel--> Sounds and Audio Devices-->Sounds.Then under program events and Windows menu click on "Exit Windows" sub-menu and highlight it. Now from sounds you can select, choose "None" and then click "Apply" and "OK". Of course its good to uncheck the start Windows sound also. Now you should see some improvements when shutting down your system.

5. Disable Error Reporting

This “feature” calls home to Microsoft and sends info about system errors. By disabling Error Reporting you can free up system/network resources. To disable the program follow these steps; To access the settings for the reporting feature:Click Start. Right-click My Computer, then click Properties. Click the Advanced tab. Click Error Reporting. check the box that says Disable Error Reporting uncheck the box that says But notify me when critical errors occur. click OK to close the window.

These tips and tricks will surely help you in speeding up your Microsoft xp.

 

[V-LINKED]

Subscribe in a reader
Posted by [V3N0M] on Wednesday, November 26, 2008
Labels:

images Ultra Surf 9.2 is one of the software that provides you to surf your net freely. This software helps you access those sites which are banned through the server by bypassing them. More advantage of this software is that it hides your ip address, does not store any cookies and keeps your history clean. This software helps you in Completely transparent data transfer and high level encryption of the content allow you to surf the web with high security. UltraSurf allows you to overcome the censorship and blockage on the Internet. You can browse any website freely, so as to obtain true information from the free world just download ultra Surf™ 9.2.

Download ultrasurf 9.2

 

[V-LINKED]

Subscribe in a reader
Posted by [V3N0M] on Wednesday, November 26, 2008
Labels:

imgres  Computer virus is basically a set of instruction or program which a computer understands. This program instructs the computer to perform some particular task. Most of the time the task is deletion of data from the computer, erasing entire hard drive, making a data corrupt. Some virus just displays a message or produce sound. When we encounter such type of cases then we say the computer is affected by virus. Name of some virus are Klez, Melissa, W32, Michelangelo. The virus enters the computer system from internet through e-mail messages or instant messaging messages. When we download file from internet or copy audio, video file or any other file virus can be attached to that file. While opening those files or executing those programs virus get active and start destroying our computer system. There also exists some virus so powerful that we do not even require opening the virus attached file. Virus do not affect write protected disk, also the computer hardware like monitor, keyboard, it only infect the software. The program (virus) is written by some unknown person making people suffer. As a professional way these people also create software to tackle their made virus and sold in market making money out of it. Fortunately the antivirus software can handle virus. This program checks files for virus before entering the system. It is the user’s task to keep antivirus updated to make the system completely protected from virus.

Download avast antivirus for free

 

[V-LINKED]

Subscribe in a reader
Posted by [V3N0M] on Tuesday, November 25, 2008
Labels:

Wi-Fi defense scan finding a vistor on network The technology detects all devices on the network, provides identifying information to assist the owner in designating each as Friend or Foe, and seamlessly locks-down the network to allow only approved devices. Adding a new device or allowing a visitor to join the network is also an easy task, and the application ensures that you maintain a locked-down network. At all times, SpyderSoft Wi-Fi Defense™ continues a background scan to detect new and/or unauthorized devices.

Download wi-fi defense

 

[V-LINKED]

Subscribe in a reader
Posted by [V3N0M] on Monday, November 24, 2008
Labels:

Ghajini is one of the highly awaited movies of 2008. Ghajini will feature Aamir Khan, Asin Thottumkal and Jiah Khan in main roles. Aamir Khan is playing a very important role in this movie who is also the producer of this movie.
Directed by A. R. Murugadoss, Ghajini is a movie in which Aamir Khan having shaven his head bald first time. A. R. Rahman is providing the music for this movie while Ravi K. Chandran is cinematographer of Ghajini. The movie is distributed by Geetha Arts.

Movie Information Cast: Aamir Khan, Asin Thottumkal, Jiah Khan, Mohit AhlawatYear: 2008 Music: A.R. Rahman Lyrics: Prasoon Joshi Cinematographer: Ravi K. ChandranChoreographer: Ahmed Khan Presenter: Allu Arvind Producer: Tagore Madhu, Madhu Mantena

Story, Screenplay, Direction: A.R. Murugadoss

Tracklist 1. Guzarish - Javed Ali, Guest Vocals: Sonu Nigam 2. Aye Bachchu - Suzanne 3. Kaise Mujhe - Benny Dayal, Shreya Ghoshal 4. Behka - Karthik 5. Latoo - Shreya Ghoshal 6. Kaise Mujhe [Instrumental]

Download all Ghajini songs in a single zip file

 

[V-LINKED]

Subscribe in a reader
Posted by [V3N0M] on Sunday, November 23, 2008
Labels:

Yuvvraaj  V-LINKED

Yuvvraaj is a musical story of a fragmented family of three brothers Deven YuvvRaaj (Salman Khan), Gyanesh (Anil Kapoor) and Danny (Zayed Khan) fighting and playing games with each other to inherit their father's wealth.Great movie from start to finish. Its a movie with class! The lesson of this movie is also very important. The chemistry between salman and katrina is superb. Anil kapoor was excellent in his role and zayed khan also did a great job. the great music, great cinematography, great direction, great scenery and the class that comes from shooting in such classy locations as Prague make this movie a sure hit. Subash ghai has knocked this one right out of the park.

But “Yuvvraaj” falls way short of the symphony created for it and even the masked revellers and flamenco dancers that mysteriously appear in many a dance sequence can’t really salvage the film.

download Yuvvraaj Music

Download Yuvvraj Movie ( archieve part 1 )

Download Yuvvraj Movie ( archieve part 2 )

 

[V-LINKED]

Subscribe in a reader
Posted by [V3N0M] on Sunday, November 23, 2008
Labels:

V-LINKED provides u the httest links to movies, app, warez, songs, e-books and more....

GET them here and GET them all.
Be V-LINKED


[V3N0M]

Subscribe in a reader