Sep 25, 2008

Election 2008 - Is this election going to be far for all.

2 comments
Posted in
People getting angry when the election commission failed to issue cards to the mention date they told. See the Gallery for more info...... Click the Pictures to View the Story's.





Sep 22, 2008

My Blackout......

2 comments
Posted in
Okay this is not a blackout, but it’s a communication blackout. My phone Died!!!!!!!!!! It did not die. Ok I accidentally drop it into water, it work for some after 15 mints it died........! I did what I could do to bring it back. But I could not get a Heat Beet out of it..........! lol. As you can see on the photo i was doing CPR when it died.

Okay my Communication blackout was just a 24 Hour. Thank god I bought a new phone now. So just want to keep a memory of my Nokia 3500 its service in my blog.

Sep 17, 2008

DRP Web Site Hacked Again

4 comments
Posted in




Guys DRP site got hacked again. This is the 2nd Time the site go hacked. Still up to this time, they have not fixed it. You can see this photo. And if you are lucky u can check the link Clink Here to see if for your self.

== Announcement ==

0 comments
Posted in
Due to upgrade work on my server. My Blog was inaccessible for some time. And now my blog is up n running. N now i have fix many issues.

The First thing is It’s was not Hack lol…... Now you can view the site using Firefox, Opera and Internet Explorer (IE). Many other PHP cording has been down. Just to make it Perfect.

If you have any comments or idea's Plz let me know.

Enjoy....

= !rEy =

Sep 16, 2008

Back to Office after 15 Days of Break

1 comments
Posted in
After 15 Days of Rest in the home mostly, ???????  heheh Not resting at all. Ok I took 15 days leave from office because my dad's brother was admitted to hospital. Due to a very bed cut in his Left hand when he was working with a Electric Saw. Still up to day he is hospitalized. But getting well day by day with god will.


When back to office, was very happy to go to office again. But not so happy because still my brother was

Sep 14, 2008

CSI Stick grabs data from cell phones

0 comments
Posted in ,
If someone asks to borrow your cell phone, or you leave it unattended, beware!

Unless you actually watch them use it, they may be secretly grabbing every piece of your information on the device, even deleted messages. If you leave your phone sitting on your desk, or in the center console of your car while the valet parks it, then you and everyone in your contacts list may be at risk, to say nothing of confidential e-mails, spread sheets, or other information. And of course, if you do not want your spouse to see who you are chatting with on your phone, you might want to use extra caution.

There is a new electronic capture device that has been developed primarily for law enforcement, surveillance, and intelligence operations that is also available to the public. It is called the Cellular Seizure Investigation Stick, or CSI Stick as a clever acronym. It is manufactured by a company called Paraben, and is a self-contained module about the size of a BIC lighter. It plugs directly into most Motorola and Samsung cell phones to capture all data that they contain. More phones will be added to the list, including many from Nokia, RIM, LG and others, in the next generation, to be released shortly.

I recently attended and lectured at the Techno-Security conference in Myrtle Beach, Fla. About 1,500 law enforcement and security professionals participated and were briefed on the latest in cybersecurity vulnerabilities from participating federal agents, manufacturers, and cyber-consultants. The CSI Stick caught my attention because of the potential to rapidly and covertly download all of the information contained in many cell phones.

This device connects to the data/charging port and will seamlessly grab e-mails, instant messages, dialed numbers, phone books and anything else that is stored in memory. It will even retrieve deleted files that have not been overwritten. And there is no trace whatsoever that the information has been compromised, nor any risk of corruption. This may be especially troublesome for corporate employees and those that work for government agencies.

The good news: the device should find wide acceptance by parents who want to monitor what their kids are doing with their phones, who they are talking to and text messaging, and where they are surfing. It could also be valuable in secure areas where employees need to be randomly monitored to insure that sensitive information is not compromised through the use of a cell phone as a memory device.

The CSI Stick sells for $200 and requires an added piece of software to mine the data and do sophisticated processing on your computer. So now, in addition to worrying about your conversations or data being intercepted through your Bluetooth headset, there is a new threat, and it is very real.

The rule: if your phone contains sensitive data, do not leave it unattended. If you loan it to someone to use because they tell you theirs is not working, make sure you actually see them using the phone and there is nothing connected to it.

A New Windows From Microsoft

0 comments
Posted in
Yap other windows from Microsoft. This times its call Windows 7. As all know Microsoft promised all its users a very different experience out of vista. The big Question is did the users accepted change. For this question different people have different opinion.

Still today many new system brought today come with windows Vista. A research so that more than 30 % downgraded their new system from windows Vista to Windows XP Pro. Up to today many Leading IT company still stick with XP and waiting for the next windows.

To get more information about Windows 7 visit Blog of Engineering of Microsoft Windows 7

Sep 13, 2008

5 FREE security tools to Protect your Computer

3 comments
Posted in
Here's a list of 5 free security tools you can and should be using to help protect, disinfect and manage your Windows computer.

1# Secunia Personal Software Inspector


Number one is the Secunia Personal Software Inspector, quite possibly the most useful and important free application you can have running on your Windows machine.

It can be used to scan all the installed applications on the PC to determine which programs are missing security patches/updates.

The tool works by by examining files on your computer (primarily .exe, .dll, and .ocx files) for meta information on specific software builds installed. After examining all the files on the machine, the collected data is sent to Secunia’s servers and matched against the Secunia File Signatures engine determine the exact applications installed on your system.

It can be used to flag insecure/end-of-life software and find direct download links to missing security updates.

Sep 9, 2008

Welcome To Windows Vista

1 comments
Posted in
For this Ramadan, I updated my system by installed windows vista adding some more RAM to my system. After installing Vista I Activated windows vista Using Crack. Then I Patched vista, updated all the patched including Vista SP1. it took around 45 mints to patch more then 96 patches. After restart the system Windows vista was ask me again to activated windows vista???????

Then i did some Digging, then I found out that Microsoft have fixed Loop hole they have in Vista Activation. So I tried many ways to find a way to Crack it. You all may think why don't just uninstall the SP1. It won't fix it. Guys don't worry I found out a way to crack it. Its really easy. Just download the file and just run it with administrator right then you are done. click here to download the file.

Life is Good, Share it.......

Simple 4 Steps to protect Your password

0 comments
Posted in
When ever you try to sign up for a email account or anything think our the internet you are required to fill a form. In this form you have to provide a password to protect it from unortharised access. Well "password" guess a simple  word. but if a hacker got Your pass he can do lot of things and i mean" lot". so good passwords are extremely important to prevent unauthorized access to your accounts. when choosing a password is to make it as difficult as possible for a would be intruder (Hack) to guesses about what you've chosen as a password.

In order to make your password strong u need to use combination of letters, numbers, and punctuation etc.

so the following are something the things you should do:

1. use a password with mixed-case alphabetics.
2. use a password with nonalphabetic characters, e.g., digits or punctuation.
3. use a password that is easy to remember, so you don't have to write it down.
4. use a password that you can type quickly, without having to look at the keyboard. This makes it harder for someone to steal your password by watching over your shoulder.

So guys go and change your password.

Sep 7, 2008

Guys Welcome back....

0 comments
Posted in
Nothing much to tell. but im back to bloging with lot new stufff