Sunday, December 30, 2012

Windows 8 Release Preview PRT-SCR











Windows 8 Activators

Here I include some links for Windows 8 All Version activators mostly found from internet, you can download from below links.

·    Windows 8 Release Preview build 8400 - Permanent Trial Reset
Activate_Windows8.bat

·    For Windows 8 Consumer Preview build 7850 KMS Activator / Timebomb Remover
windows_8___daoudsoftwaresworld.blogspot.com_.rar
password: www.daoudsoftware.tk

·    AIO RTM (Core, Enterprise, Pro build 9200 etc)
Windows 8 All Version Activator 2013_2.zip

·    W8_Act.zip (For Windows 8 Professional)

·    Act.zip (Windows 8 All Version)

·    WA.rar (Windows 8 Activator 1.00)

·    Windows 8 Genuine MSDN ISOsPro + Activator.rar

·    Windows_8_Activator_(All Edition).rar

Enjoy and have a great day :)

Saturday, December 29, 2012

Repair Windows 8 Metro Apps

If there is some problem with any Windows 8 (Metro) apps, should they not be functioning properly. When you click on an app to open it, you find that it simply crashes and closes down, and you get to see the start screen again.



This time however, you will see a small ‘x’ sign on the bottom right side of the Tile, indicating that something is wrong with this particular app.

Click on it again. This time, it will display a This app can’t open message. To exit, you may click on Close. To repair it, you should click on the Go to the Windows Store link.
You will now see a message stating that This app needs to be repaired.
Clicking on Repair will repair the app. Effectively, the app is re-installed with all it default settings intact.
Once the app is repaired, you will see a notification in the top right side stating that the app was installed.
Now if you try to open the app, you will see that it opens properly.

Friday, November 16, 2012

[How To] Remove Watermark on Windows 8

Use this tool to help you remove the build watermark on Windows 8 desktop and you can edit on your own custom watermark.




My_WCP_Watermark_Editor.rar

Create Alternative Shutdown for Windows 8

If you found difficult how to shutting down Windows 8 quickly. There is a way to help you shutdown in few single clicks. By default, hold " Windows-Key + C " to open Charm Bar > Settings > Power Options > Shutdown


Tools: nircmd.zip

Download and unzip the nircmd.zip, copy the whole folder "nircmd" and paste into "C:\Program Files"
Go inside "C:\Program Files\nircmd\" folder, and right-click "nircmd.exe" > Send To > Desktop (create shortcut)

From your desktop, again right-click the "nircmd.exe - Shortcut" properties > set parameter in the end:

Target: "F:\New Apps [5]\nircmd\nircmd.exe"  -exitwin poweroff force

You can set by "Change Icon.." as you want >  Apply
You will be asking whether to shutting down the system or cancel to abort.

If you want to shutdown without asking either to save your documents, use additional parameter:

Target: "F:\New Apps [5]\nircmd\nircmd.exe"  -exitwin poweroff force initshutdown "" 0 force


// TESTED CLIENT: LYusRI and euphoria

Customize Windows 8 User Account Picture / Lock Screen

I installed Windows 8 Release Preview early to setup everything up, and it was not fully activated and only permanent trial. Then I got tired of not being able to customize anything so I found where Windows stores various images and here they are.

Tools: Download TakeOwnership.zip

User Account Picture:
1. Go to Drive C:

2. In the ribbon, go to "View" tab and choose "Options" > In the new windows go to "View" > choose to Show Hidden files

3. Back in the explorer, go to "C:\ProgramData" since it is not hidden anymore

4. Then go to folder Microsoft > User Account Pictures

5. The images you want to change are user.bmp, user.png, user-40.png, user-200.png (You may not see the .png or .bmp)

If you want to see each file extensions, go to Control Panel > Appearance and Personalization > Folder Options > View > Untick "Hide extensions for known file types"

Now in Photoshop ( or any other image editing software ) make 4 images of the image
you want using these settings:
user.bmp= .bmp, 480 x 480 pixel
user.png = .png , 480 x 480 pixel
user-40.png = .png , 40 x 40 pixel
user-200.png = .png , 200 x 200 pixel


Lock Screen :
This took me a while as it was harder then I thought.

1. Download and install the takeownership.reg script to registry (This will save you a lot of time and trouble)

2. Go to "C:\Windows\Web\Screen" and replace img 100 . jpg with the image you want (make sure you have the same name)

3. Go to "C:\ProgramData\Microsoft\Windows\" and right click the "SystemData" folder and choose "Take Ownership" now you can enter the folder by pressing continue.

4. Now go to S - 1 - 5 - 18 > ReadOnly > LockScreen _Z and replace the image with the same image you replaced in step 2 , but remember to change your images file name to the one of the image your replacing .
For example in step 2 it was called " img100 "
and this one the same image is now called "LockScreen ___1920 _1080 " for me .

5. Now for the last one is in "C:\Windows\WinSxS\"

6. You will see tons of folders just use the search and search for 'img 100 " and when you find the correct image open the folder ( right click > open file location) and replace img100 with your lockscreen image ( once again make sure you keep the same file name so make sure your new lock screen says img 100 )

It seems like a lot to change the lock screen , but I had to change all of them to change that one setting.

Start Screen :
addictivetips.com/windows-tips/how-to-change-windows-8-metro-start-menu-background-colors/

Look at the bottom of this post under, "Programs to do these process for you" , if you want a easier way.

Change Colors:
1 ) Hold windows key and press R ( Win + R )
2 ) Paste " C:\Windows\system32\oobe\msoobe.exe " - without quotes
3 ) Wait a second for it to popup and select your color
4 ) Alt + Tab out or just press Ctrl+ Shift + Esc to bring up Task Manager
5 ) Kill msoobe.exe ( it may be under Background Processes )
6 ) Restart explorer ( cmd ( or Win + R ) > taskill /im explorer.exe )

Programs to do these process for you :
I personally prefer to do manual edits, but I know some people do not or have a harder time so here are two programs I found that will help you change account picture and start screen. Then as a bonus it will also remove the activate watermarks.


Note: It did change the color ( a simple registry edit) , but it failed to change the start screen for me.

Credits: tay777

Sunday, November 11, 2012

ISSUE: Increases PC Performance

Use this tools which helps your computer run faster

1. Advanced SystemCare 4
Download from http://download.iobit.com/asc-setup.exe
Unzip & Install asc-setup.exe

Step1:
Open Advanced SystemCare 4 > Click Turbo Boost > Configure Turbo Boost > Next (Untick Programs you don't use which are unnessary to run) > Next > Next > Yes (Enable Turbo Boost at startup) > Finish

Step2:
Click Toolbox > Optimize > Smart RAM > Go! Smart Clean > Settings > Run at Windows Startup > Ok > Minimize

Step3:
On Advanced SystemCare > More > Settings > Performance Monitor > Click Enable Performance Monitor

2. Startup Manager
Download from http://dl.dropbox.com/u/53854375/StM_setup242-re.zip
Unzip & Install StM_setup242-re.exe

Step1:
Run Startup Manager > Add
--
Sections: Registry\Current User\Run
Name: SmartRAM
Path: C:\Program Files\IObit\Advanced SystemCare 4\Suo10_SmartRAM.exe
Flags: /m

OK
--
Close [X]

3. Control Panel > System and Maintenance > System >  Advanced system settings (left pane)
On the Advanced tab, under Performance, click Settings.
Click the Advanced tab, and then, under Virtual memory, click Change.
Tick the Automatically manage paging file size for all drives check box.
4. Control Panel > Hardware and Sound > Power Options > High performance 

ESET.KEY

ESET.Smart.Security.5.0.93.0.32bit

Username: EAV-48894407
Password: 36pcuuvnjs
Expiry date: 17/12/2016

Username: EAV-51063901
Password: dej5r4tkcb
Expiry date: 18/12/2011

Username: EAV-51063960
Password: 3vs7tcnxxa
Expiry date: 18/12/2011

Username: EAV-51065654
Password: jnemxjv6fs
Expiry date: 18/12/2011

Username: EAV-51065664
Password: ev5p8a6jre
Expiry date: 18/12/2011

Username: EAV-51065675
Password: 5mhfc3pedh
Expiry date: 18/12/2011

Username: EAV-51067297
Password: uemdcdtdux
Expiry date: 18/12/2011

Username: EAV-51070230
Password: 65buvr4juc
Expiry date: 18/12/2011

Username: EAV-51070237
Password: 4bhpd42tpb
Expiry date: 18/12/2011

Username: EAV-51103133
Password: 6dbfs4mpbf
Expiry date: 19/12/2011

Username: EAV-51103203
Password: jk2c2522fh
Expiry date: 19/12/2011

Username: EAV-51108882
Password: uxdjbbdn5e
Expiry date: 19/12/2011

--
STATUS: OK
DATE GENERATED: 22-03-2012 1:11 AM
// ENABLED PROTECTION..

AUTORUN.INF

STEPS:
1. Open notepad, copy lines below [autorun]
2. Save as 'autorun.inf' (w/ extension .INF, del .TXT)
3. Place the file into your pendrive drive
4. Eject and plug back pendrive into COMP

::SAMPLE::
------------------------------------------
[autorun]
OPEN=FOLDER1\APP1.exe
ICON=\FOLDER1\FILENAME.ico
ACTION=YOUR LABEL HERE

SECURITY ISSUE 13: Cyber Bullying

Cyber bullying usually happens in social networks, websites or even email. What recently happens in Brunei is people start to bully others by creating a Fan page such as in Facebook to bully certain people for personal satisfaction.

Why Cyber Bully?
Most cyber bullies are motivated by anger, revenge or frustration. But sometimes people do it for entertainment or for laughs or to get a reaction.

How to Prevent Cyber Bullying:
- Avoid exposing your pictures and personal information on the internet.
- Don't give a reaction to the Bully/Harasser (that will only add fuel to the fire)
- Don't reply to any emails/instant messenges or chatroom conversations from bully/harasser.
- Don't assume a picture of someone is real (lies happen on the Internet)
- Don't delete the messages. Because if this continues, you will need proof that you are being cyber bullied. If they keep sending your messages, check whether they are using same internet company. Phone the company up asking if they could give them a warning.
- Report it to your Parents or the Website or even to the Police.
- If all that fails, change your email address and/or cell phone number.

--
This message brought to you by BRUCERT
(Brunei Computer Emergency Response Team)
http://www.brucert.org.bn
email: cert@brucert.org.bn

SECURITY ISSUE 12: Phishing

Phishing is a type of email or instant message scam edsigned to steal your identity and fraudulently acquire sensitive information, such as username, passwords, and credit card details by masquerading as a trustworthy entity in electronic communication.

- Don't reply to email or pop-up messages that ask for personal or financial information.
- Don't click on links in email or intant messages.
- Don't cut and paste links from questionable messages into your web browser.
- Use up-to-date Antivirus and Firewalls. Upgrade them regularly.
- Don't email personal or financial information.

Moral: Don't just go click everything

--
This message brought to you by BRUCERT
(Brunei Computer Emergency Response Team)
http://www.brucert.org.bn
email: cert@brucert.org.bn

SECURITY ISSUE 11: Safe Email Practice

One of the most popular modes of virus distribution is the through emails. Practicing a few ground rules can help to keep your computer healthy and prevent viruses from spreading:-

- Don't open email attachments unless you know what they are.
- Don't open, forward or reply to spam or suspicious emails. Delete them immediately.
- Be aware of sure signs of scam email:-
• Not addressed to you by name.
• Asking for personal of financial information.
• Asking you for password.
• Asking you to forward it to other people.
- Watch out for viruses in attached files. Scan all attachments with up-to-date Antivirus software.

Moral: Sometimes, curiousity kills.

--
This message brought to you by BRUCERT
(Brunei Computer Emergency Response Team)
http://www.brucert.org.bn
email: cert@brucert.org.bn

SECURITY ISSUE 10: Spyware

Spyware is a computer software that is used to collect user's personal information without their informed consent. Spyware have the capabilities to invade your privacy such as bombard you with advertisements, collect and transmit personal information. Additionally, spyware can change computer settings, slow down or crash computers, cause unexplainable reduction in computer performance, excessive or unexplained modem or network traffic, and the appearance of new toolbars that can't be permanently deleted.

Prevent spyware from overtaking your computer by doing these best practices:
- Avoid installing free toolbars for your browser as they often contain spyware.
- Regularly use spam cleaners to remove spyware.
- Ensure your browser's security setting is set to medium or higher.
- Only download from websites you trust (Shareware and Freeware)
- Read privacy statements and license agreements.
- Read before you click.
- Only close windows with the red "x" icon or button.
- Protect your system by installing spyware blockers.
- Scan your computer system with anti-virus software.

Moral: Sometimes, another unwanted software will be installed on your computer if you are unaware.

--
This message brought to you by BRUCERT
(Brunei Computer Emergency Response Team)
http://www.brucert.org.bn
email: cert@brucert.org.bn

SECURITY ISSUE 09: Social Networking

Social networking websites (including Facebook, Twitter, MySpace, Friendster and Hi5) are increasing in popularity and used regularly by millions of people worldwide. These websites allow users to keep in touch with family and friends; to express themselves by creating a personal profile and share their photos; and to communicate with others from different cultures who share common interests or hobbies.

Unfortunately, these social networking websites are also being misused by child molesters, sexual predators and scam artists to find victims in various ways which includes grooming and identity fraud, and gathering sensitive information from personal profile (such as date of birth, address and contact number).

Some precautions when using social networking website:
- Keep personal information to yourself such as addresses, contact number, credit card numbers, school or workplace.
- Restrict access to your profile to people you know.
- Create a username which does not reveal anything about you.
- Be careful with people you know online.
- Avoid meeting people that you know online.
- Verify identity of the person you are talking to.
- Never believe everything you read.
- Don't respond to flaming, if it situation becomes hostile, log off or surf elsewhere.
- Posting makes your email public.
- Anything you type can be read by anyone.
- If someone makes a threat, report to a moderator or website operator. Never confront stalkers/harassers.
- Google yourself to find out how much information about you is on the Internet.

--
This message brought to you by BRUCERT
(Brunei Computer Emergency Response Team)
http://www.brucert.org.bn
email: cert@brucert.org.bn

SECURITY ISSUE 08: Backup

Backup should be at the top of your computer maintenance checklist. Backup allows you to keep a copy of your important files in a separate location to avoid unintentional loss of information on your computer. You should regularly make backup copies of any important files that you cannot replace easily.

- Backup your important filesin a separate place such as External Hard Disk drive, USB drive, CDs or DVDs.
- Backup your data REGULARLY.
- Ensure backup of sensitive files are secured properly. E.g. Backup files are password protected or encrypted.

--
This message brought to you by BRUCERT
(Brunei Computer Emergency Response Team)
http://www.brucert.org.bn
email: cert@brucert.org.bn

SECURITY ISSUE 07: Wireless

Secure Wireless Access Point:
A Wireless Access Point is a device designed to allow wireless communication devices to connect to the wireless network. It uses Wi-Fi technology which can realy data between other wireless devices such as laptops, printers, and even desktop computer.

- Enforce the use of encryption other than WEP (Wired Equivalent Privacy)
- Position the Wireless Access Point at a strategic point, for example NOT too to the window.
- Turn- off DHCP (Dynamic Host Configuration Protocol) and use static IP if possible for (Internet Protocol) other WLAN clients.
- Enable MAC-filtering. (Media Access Control)
At the command prompt, type ipconfig/all, and then press Enter.
If your computer has more than one network adapter, the physical address of each adapter is listed separately.
-  Change the default SSID and switch off the function to broadcast SSID. It makes it easier for you to identify which wireless network is yours, if there is more than one nearby, because the SSID is typically shown in the list of available networks.
- Change the default administrator user ID and password at regular interval, for example every 6 months. Choose a strong password.

P/S: Your Privacy is nothing when it comes to Unsecure Wireless Network.

--
This message brought to you by BRUCERT
(Brunei Computer Emergency Response Team)
http://www.brucert.org.bn
email: cert@brucert.org.bn

SECURITY ISSUE 06: Firewall

A Firewall is a system designed to prevent unauthorized access to your computer. It can either be a software or hardware or a combination of both.  Firewalls are frequently used to block hackers from accessing private networks connected to the internet. Firewall can also block programs on in your comouter from trying to connect to the internet without your approval.

- Always install a personal firewall for your computer at home and in the office.
- Configure the firewall to block unauthorized users from accessing your computer and allow only authorized users.
- Never allow unauthorized programs in the computer from connecting to the internet.

On Win XP: Start -> Control Panel -> System and Security -> Windows Firewall
On Win Vista/7: Start -> Control Panel -> Network and Internet -> Windows Firewall


--
This message brought to you by BRUCERT
(Brunei Computer Emergency Response Team)
http://www.brucert.org.bn
email: cert@brucert.org.bn

SECURITY ISSUE 05: Social Engineering

In the field of computer security, social engineering is a hacker-speak to trick people into revealing sensitive information that they won't normally reveal. It is generally a hacker's clever manipulation of the natural human tendency to trust, to be curious or even to be greedy.

- Never give out sensitive information (password, credit card number, bank acoount etc) to someone you don't know.
- Social engineers who will say anything to get induce you to give out private information. Do not fall for their lines.
- The primary defense against social engineering is to train users about security policies and ensure that they are followed.

--
This message brought to you by BRUCERT
(Brunei Computer Emergency Response Team)
http://www.brucert.org.bn
email: cert@brucert.org.bn

SECURITY ISSUE 04: Software Not Patched

Software patches (updates) are used to fix any vulnerability (informally called "holes") discovered on software. When holes are discovered, computer software vendors will usually develop patches to fix the flaw(s).

- Make sure your Operating System (Computer OS) is up-to-date, for example OS X, Microsoft Windows, Linux, BSD (Berkeley Software Distribution), etc.
- Always obtain patches from legitimate (trusted) sources, for example software vendors.

REMEMBER! Patching your computer is like maintaining your car, if you do not do it, it may fail.

--
This message brought to you by BRUCERT
(Brunei Computer Emergency Response Team)
http://www.brucert.org.bn
email: cert@brucert.org.bn

SECURITY ISSUE 03: Anti-Virus Software

Anti-virus is a software specifically designed to detect and remove know Viruses, Trojans and Worms on a computer system. New Viruses, Trojans and Worms are created almost everyday.

It is very important to:
- Ensure that you use Virus Detection software to protect your computer from Trojans and Viruses.
- Once installed, enable your anti-virus protection at all times.
- Regularly update your virus scanner.
- Scan your computer files and any removable media such as USB drives, CD-ROMs, etc.

--
This message brought to you by BRUCERT
(Brunei Computer Emergency Response Team)
http://www.brucert.org.bn
email: cert@brucert.org.bn

SECURITY ISSUE 02: Computer Logged On, And Unattended

Using A Shared Computer:

When using a computer that you share or use at work or in a public place:
- Never leave your computer unattended while logged on, not even for a moment.
- Always Log Off: Always ensure that you "Log Out" when you have finished using the computer.

Moral: It's always good to lock your computer before leaving.

--
This message brought to you by BRUCERT
(Brunei Computer Emergency Response Team)
http://www.brucert.org.bn
email: cert@brucert.org.bn

SECURITY ISSUE 01: Password Management

Passwords are commonly used to access computer systems but without proper password management it is useless. Passwords are like house keys. Most people probably would not leave the house key hanging on a hook at the front door.

Tips for creating good passwords:
- Must be at least 8 characters long.
- Do not use personal information in your password that someone else can easily guess.
- Must have at least 1 upper case (capital letter), 1 lower case letter, and 1 number or special characters (punctuation), but no spaces.
- Cannot be based on your name or words found in a standard dictionary.
- Do not write down your password. If you must write it down, DO NOT keep it out in the open (e.g. on a sticky note attached to your computer monitor)
- Do not share it with others.

Moral: Protect your password from everyone.

--
This message brought to you by BRUCERT
(Brunei Computer Emergency Response Team)
http://www.brucert.org.bn
email: cert@brucert.org.bn

[Hack] ScreenShield (Remove Timer) on Cyber Cafe PC

Beware! Cyber technician might see or notify from his monitor if your screenshield goes off. It means your time is completely off at while your pc not have blue screen.

1. Click on "Start" button > Program > Accessories > click Run (Press Windows Key + R)
2. Type in "taskkill /IM screenshield.exe /F"
3. Hit Enter, wait for seconds.

You can't use Task Manager from taskbar which already disabled by ScreenShield, so that's why you can't force kill the process 'screenshield.exe' from there.

Another method, such as using portable task manager or process explorer can kill the process. But this one is fast and shortcut.

Crisis Procedure Disk: AA1 ZG5 Blackscreen Fix

ISSUE: AA1 ZG5 Blackscreen Fix (Acer Aspire One)


When Aspire One powers on, the screen remains blank. How can I fix this?

Updating the BIOS will require a USB flash drive to store the BIOS information on during the update. To perform the update to the BIOS:

1. Go here and download and extract the latest BIOS for the netbook.

2. Rename the BIOS file from 3310.fd to zg5ia32.fd.

3. Copy zg5ia32.fd and Flashit.exe to USB flash drive

4. Ensure that the AC adapter is plugged in.

5. Insert the USB flash drive into a USB port.

6. Press and Hold down the Fn and the Esc keys together and press the power button.

7. When the unit's power light comes on wait a few seconds and release the Fn and Esc keys.

8. After the keys have been released the power light will start to blink.

9. During the BIOS update process the display will be blank.

10. Let the unit run and after approximately 1 to 7 minutes, the unit should reboot and the BIOS will be updated.

If the unit fails to reboot, or the BIOS was not updated sucessfully, try the steps again.

- with pandabubba

Activation Codes

INIT ACTIVATION REQUEST
--

Windows 7 Beta x86 (32bit) Product Key:
GG4MQ-MGK72-HVXFW-KHCRF-KW6KY
6JKV2-QPB8H-RQ893-FW7TM-PBJ73
QXV7B-K78W2-QGPR6-9FWH9-KGMM7
4HJRK-X6Q28-HWRFY-WDYHJ-K8HDH
TQ32R-WFBDM-GFHD2-QGVMH-3P9GC
MVBCQ-B3VPW-CT369-VM9TB-YFGBP
MM7DF-G8XWM-J2VRG-4M3C4-GR27X
KGMPT-GQ6XF-DM3VM-HW6PR-DX9G8
KBHBX-GP9P3-KH4H4-HKJP4-9VYKQ

Windows 7 Beta x64 (64bit) Product Key:
D9RHV-JG8XC-C77H2-3YF6D-RYRJ9
RFFTV-J6K7W-MHBQJ-XYMMJ-Q8DCH
JYDV8-H8VXG-74RPT-6BJPB-X42V4
7XRCQ-RPY28-YY9P8-R6HD8-84GH3
482XP-6J9WR-4JXT3-VBPP6-FQF4M

Windows 7 Home Basic Activation
Home Basic E:  OEM VTKM9-74GQY-K3W94-47DHV-FTXJY
Home Basic N:  OEM MD83G-H98CG-DXPYQ-Q8GCR-HM8X2
Home Basic:  OEM YGFVB-QTFXQ-3H233-PTWTJ-YRYRV

Windows 7 Home Premium Activation
RHPQ2-RMFJH-74XYM-BH4JX-XM76F
KGMPT-GQ6XF-DM3VM-HW6PR-DX9G8
KBHBX-GP9P3-KH4H4-HKJP4-9VYKQ
Home Premium E OEM:  76BRM-9Q4K3-QDJ48-FH4F3-9WT2R
Home Premium OEM:  RHPQ2-RMFJH-74XYM-BH4JX-XM76F

Windows 7 Ultimate Activation
Ultimate E OEM:  TWMF7-M387V-XKW4Y-PVQQD-RK7C8
Ultimate N OEM:  HTJK6-DXX8T-TVCR6-KDG67-97J8Q

Windows 7 Professional
FJ82H-XT6CR-J8D7P-XQJJ2-GPDD4

Windows Vista Home Premium
89572-OEM-7332166-000    21

WinXP Home SP3 OEM Key (Volume License)
3BBT8-RVKCC-CTCVK-4XWVH-8BFF8
MR49R-DRJXX-M6PX2-V96BF-8CKBJ
D4C9J-F24PG-VP8TF-FW8QT-8M7TT
22DVC-GWQW7-7G228-D72Y7-QK8Q3
22WXC-BDHBH-D6XTY-8V7FC-6YCW3
V2C47-MK7JD-3R89F-D2KXW-VPK3J

Windows XP x64 OEM:
FM634-HJ3QK-6QVTY-RJY4R-XCR9J
B2RBK-7KPT9-4JP6X-QQFWM-PJD6G

Windows XP x64 Corp:
VCFQD-V9FX9-46WVH-K3CD4-4J3JM
CWR72-XYW3X-MHRQC-P3W89-GK82B
B2RBK-7KPT9-4JP6X-QQFWM-PJD6G
KV4PX-KB8GG-28T9T-TBBJ7-R4JHW
H4F3Q-DFKDF-HDCXD-QBQPC-2FV7Q
QKVGM-T4H9H-W8YJH-BWDCY-CY7MJ
GG7JB-P3V6P-M2GYV-4FW8X-Y3RFY
FM634-HJ3QK-6QVTY-RJY4R-XCR9J
M4676-2VW7F-6BCVH-9QPBF-QBRBM
CKY24-Q8QRH-X3KMR-C6BCY-T847Y
KKPYJ-QQB3J-PQ622-6GFVY-MH68M
HTMTH-RRPB6-WRDX8-HW28M-TYH4Y
FBRTQ-TRH82-PHFG2-VRTTB-FRMRY
DB34H-Y4MJM-J49C7-DQMQY-FY9WM
GKGXM-3447M-DGF2C-8886H-98RFY
GMV7Q-RYDW9-7FJX8-WGWQ4-BYH4Y
JVBH6-8FKQ3-3KRGX-JFG3X-MP2PB
GHFK7-8DVWX-8G3CC-2C9RB-DJRFY
H2BVB-C2D2M-CWVT6-RMMX9-PDGCB
J6T36-KRT7F-CC3G8-DDB2C-XYT8M
DDXDD-4KRHP-FRYXB-QMX66-7KCPB
CXJB3-D6P38-WR6Y6-37GR7-TKMRY
FCK3J-YV6T4-2BXY8-FJFJD-BCV4Y
GK84G-3RBRD-488F4-FHHXK-W33JM
G38QW-3VDCP-D444Q-JPWVG-86PPB

Microsoft Office 2010 Key
BK34P-44JHP-6KJD8-CMT4F-3YM39
7RX9T-QW9MV-RYG42-JJ6XK-BCB4G

ESET Smart Security 5 / ESET NOD32 Antivirus 5 /
ESET NOD32 v4.2.71.2
Username: EAV-48894407
Password: 36pcuuvnjs
Expiration: 17/12/2016

Adobe Photoshop CS3 Extended
1045-1302-5692-5842-1244-7027

Adobe After Effects CS3:
1023-1263-6756-9813-4751-2076
1023-1100-0376-1380-9038-2876
1023-1118-5551-3552-1005-1383
1023-1515-5738-2483-1775-8912
1023-1723-4741-5144-3919-2862
1023-1443-2301-9843-0736-9600
1023-1028-8162-2576-9320-9689
1023-1168-1483-4268-4762-9075
1023-1667-6780-7875-4534-1522
1023-1897-1727-6226-5445-6520
1023-1922-0313-4713-5068-4768
1023-1466-0292-4759-0463-5299
1023-1931-6865-7280-4505-1217
1023-1424-8192-1113-1728-9089
1023-1554-3378-4447-8551-9080

Adobe Premiere Pro CS3:
1132-1285-6293-9030-6134-5197
1132-1761-0608-5957-4581-1178
1132-1312-8655-1304-9711-2903
1132-1855-2922-0702-6655-2079
1132-1871-6755-2951-4498-6369
1132-1637-3326-4062-9794-7720
1132-1220-5351-9788-7702-6744
1132-1484-0753-0733-0436-5164
1132-1849-5447-1019-1976-3290
1132-1871-8173-0310-1111-7417
1132-1217-2900-1027-9213-9318
1132-1903-4648-6749-0678-5025
1132-1316-5406-9538-8729-1388
1132-1308-3926-0652-0546-2665
1132-1608-9014-2125-8597-2844

Adobe CS3 Master Collection:
1325-1903-8739-4724-6436-1050
1325-1503-8739-4724-6436-1006
1325-1803-8739-4724-6436-1062

Crysis 2 Activation Code:
05AS-W20S-PIRA-RTEB-AY01
3NLU-YVYB-ZR2Z-8RU5-EBFE
956A-29AH-M4LA-0M0K-1BDE

Call Of Duty MW1
YSWD-UYYT-GMTW-DYG8-73E7
4D2L-DTEG-DLLS-L2T2-A165
J2UU-J8UE-S4L2-GMD2-937C
WTEP-WU4Q-ESEU-GTGY-A638
TDPQ-U2WT-8MEM-W4GM-33B3
LT8G-TESE-JD2T-LDPE-893A
LT8G-TESE-JD2T-LDPE-893A
DQJ2-42JM-EELY-U4DM-5AC0
QEYS-GU2M-4UYS-J8DD-CBE3
4TTY-JSJT-TYTQ-JTG8-8869
MEJT-SUSW-YGJJ-4JLD-9F76
8LS2-G42W-8M4P-4QJE-78DD
JLDD-SUWW-E2QY-PUTM-66CA
EWQS-2M4P-ED2M-444D-46AB
8YTL-Y4P4-LGSG-EJMY-A129

Call Of Duty MW4
8E8P-4MGQ-LP8Y-PYWE-3380
DL2J-8PY4-4Q22-GE48-88D2
Y2QY PWJG D2TD WTES 17E3
WTJU UQDU 8EMD YSM4 23DB
L8WY PT4J EMMU UY2L C1D2
YGDE 24S4 YTGL 22TT 83D3
8LMT 22PT 88DG LTPS 8477
8GUQ WYEL PE4E QLY8 1FDD
SE8J ULT2 D2YE PD88 651B
8JMM ELUG UQUE MSPP 6885
8P48 DGY2 2DSW E2SG 8F3E
2EE2 SQQW ELQQ SSTY D6FD
MYSD SGSL 2WEQ TSSE C799
QTTL DUG2 QELS MTU8 533F

AVG Free 9.0
9AVFREE-V0KMC-E9VUW-EW0VA-UU3XL-FEW97-OUGE

Angry Birds Rio v1.1.0 Serial:
THET-ALEV-LEFR-USWO

Angry Birds Seasons v1.5.1 Cracked:
THET-ALEV-LEFR-USWO

FIFA 2009
ZTNW-D76N-77DT-G3ZP-LGFB

Need For Speed Carbon:
OMZ9-9ZOF-FIGH-TING-4FUN

Need For Speed 6: Hot Pursuit 2
FIGH-TING-4FUN-OUYG

Need For Speed Most Wanted
OH8Y-X7A2-FIGHTING-4FUN

Need For Speed Undercover
OK8Y-FVUD-FIGH-TING-4FUN

Need For Speed ProStreet
OKVM-C8VF-FIGH-TING-4FUN

Need For Speed Underground
1URR-EEN7-FIGH-TING-4FUN

Need For Speed Underground 2
1K9H-EY3N-FIGH-TING-4FUN
Z5TT-PQ69-77DT-63ZP-LGFB

The Sims 2
ZNRH-M565-77DT-P3ZP-LGFB

Warcraft 2
6696-2TGV-TT64-CNMV
628G-GDKW-9B92-VXD2

Warcraft 3
N9UB14-GRQS-TDV290-QF8H-TSMKLM

Warcraft 4: Frozen Throne
WGMNX2-EGT7-8KD9EV-H6ZR-ZPH7PZ

The Sims 3 Generations:
TGWN-ZDWY-WXYZ-CWXW-5RLD
5T2A-G3GQ-KGFK-NKGD-PRLD
M322-B257-6AX8-F6AV-CRLD
H8B3-XNC6-8ZTF-N8ZR-KRLD
Y9XX-6L92-BRAD-WBRH-HRLD
JHYG-S68H-3ANB-T3AL-FRLD
F7PP-5KP7-Q8RS-XQ8P-WRLD
Q2PP-3RPN-FEVS-QFET-WRLD
5MVM-82CD-7DFF-V7DD-KRLD
9W9Z-5Y6K-37W9-S37U-DRLD
Y5AJ-FC9N-NNUD-BNNS-HRLD

Ghost Recon: Advanced Warfighter
FDA5-GTRQ-BAE3-7YFK

Crysis
GL22-CN3Q-ZHQK-JXLV-QNVH
CQNN-DV8J-VK3B-8VLT-JPRM
FGYG-GM6R-Y3MT-9633-H8BW
3CEW-7X9J-5VVK-DVBH-ZQ8B

Crysis Warhead
S98Q-2DM9-W433-BUH2-L4G4
FTNN-ZZBR-EHDU-GRK6-VJJ9

SWAT 4
LEB6-BAF6-DEG7-TEZ6-5344
DUT7-MEB5-FUB3-FUC6-3949
MYX9-PUW6-LUL4-BUG2-2683

Splinter Cell
031F-F8D0-6536-B510

Splinter Cell 2: Pandora Tomorrow
SCO-PXLD-F7Q5-TYH3-04B2

Splinter Cell 3: Chaos Theory
J62B2-7ZSA4-84JPW-R378Y-N4KCH
2Q4PL-S4YXN-QSULH-VR53S-SNH7F

Singularity Serial Key:
N3DP-WTNW-5WTW-D5H4-6274

Counter-Strike 1.6 No Steam:
5RP2E-EPH3K-BR3LG-KMGTE-FN8PY
AAAAA-AAAAA-AAAAA-AAAAA-AAAAA
! SOMEHOW WORKS

Command & Conquer Red Alert 2
021570-073216-295764-2473

FIFA Manager 2009
ZPQQ-2B64-77DT-83ZP-LGFB

James Bond 007: Nightfire
0505-4006590-2264816-4943

Serious Sam 2
2EA4-467C-354A-E387

RollerCoaster Tycoon 3:
RLD6-6AHJ-AMVV-YTEF-CTAD-ZQQV

Cyberlink PowerDirector 5
YHYAL-4XGPX-F24AW-GDEAU-9ZEGX-DDKDH

Nero 8 Site License Keys:
7K22-OO1B-11OS-E1SS-S9M4-B4X3-7E11
7K22-OO27-11OS-E99S-SOCE-4SGX-ABOA
7K22-OO27-11OS-E3OS-SOXB-ESKC-42MB
7K22-OO27-11OS-EO9S-SOC7-37X7-44A7
7K22-OO27-11OS-E97S-SOMB-XEOG-GA3K
7K22-OO27-11OS-E92S-SOOX-1BEA-KBC4
7K22-OO27-11OS-E7BS-SO9O-1AS4-MGMK
7K22-OO27-11OS-E99S-SO3M-EOOA-AM24  
7K22-OO27-11OS-E99S-SOKK-4M22-S331

Nero-8.3.6.0:
9K2K-6K22-9407-AAXX-E1C6-A308-3EE4
5E14-C318-994K-0X79-EM59-C21A-K4KE

--
::Nero 8 Plug-ins::
1E04-82KK-9934-4570-X5A8-0X70-69M2

DVD-Video Multichannel Plug-in
4CO1-GO27-11OS-E49S-SO4K-B3MO-9B3M
4C01-K0A2-98M1-25M9-KC67-E276-63K5
1C01-20A3-9961-2E54-MXAC-CX14-75C0
EC01-C063-9996-29EX-X58K-AAC1-44E3

Blu-ray/HD DVD Video Plug-in
1C06-E011-98KX-2K37-0KK6-3368-594K
4COG-GO27-11OS-E49S-SO4K-B3KX-7G3X
EC06-206A-99K5-2527-940M-3227-K7XK
5C06-10E8-9860-258X-M84E-4763-5E91
EC0M-C00C-98K4-25M4-239C-7710-C3C7

mp3PRO Plug-in
4COO-GO27-11OS-E49S-SO4K-B3KX-B7EC
9C00-E0A2-98K1-294K-06XC-MX2C-X988
KC00-2052-99M3-21A7-X34X-773X-531X
EC00-90MX-9984-216C-M72C-4044-MXAK

Lame MP3 Encoder
4CO4-GO27-11OS-E49S-SO4K-B3KX-KGBE
4C04-5032-9953-2A16-09E3-KC8M-5C80
KC04-300M-99M1-23KA-A5A8-C08C-M739
9C05-304K-999X-2628-555X-780A-X94C

LLS Plugin
4COS-GO27-11OS-E49S-SO4K-B3MO-E979
EC05-E087-9964-2703-05E2-88XA-51EE
9C05-A085-9855-2741-E8CM-A434-993A
9C05: 304K-999X-2628-555X-780A-X94C

HDDVD TEST
4COX-GO27-11OS-E49S-SO4K-B3MO-EC44
5C0X-205M-99M1-2435-2118-K246-1576
KC0X-A0KE-9963-2K08-8873-C24M-74M3
9C0X-K0KE-99CK-2KX5-6877-K0CK-X1X6

BD TEST (Blu-Ray Test Plugin)
4COM-GO27-11OS-E49S-SO4K-B3KX-K4C1
4COM-GO27-11OS-E99S-SO3K-23M2-CB7A
4COM-GO27-11OS-EB9S-SO4A-CGSE-O149

NERO TEST
4COE-GO27-11OS-E49S-SO4K-B3KX-74O2
4C0E-4009-9863-2X6M-1939-12A1-99A0
EC0E-400K-98M2-2K02-8AA4-42CX-3XAA
KC0E-E041-9909-2XE2-5A7X-242E-85K0

SecureDisc Viewer:
5E12-A408-98X4-5703-881M-4AA8-24XE
--

Adobe CS3 Web Premium
1329-1951-3673-3526-4516-3049
1329-1559-1105-2092-9073-3294
1329-1687-9724-0756-0396-8620
1329-1224-3455-1664-2055-5433
1329-1716-1782-6467-1580-0152
1329-1520-4920-9776-4582-5321
1329-1309-1983-9135-5441-8613

Adobe CS3 Dreamweaver
1192-1330-2050-6898-7274-8979
1192-1501-5462-6334-7032-4867
1192-1894-3058-7272-7665-9783

Adobe CS3 Fireworks
1193-1742-9462-6593-5245-6899
1193-1187-7389-1838-1017-5341
1193-1719-8771-8610-1224-1487
1193-1029-8900-8332-7131-9446

Adobe CS3 Contribute
1188-1884-0394-0878-0132-1166
1188-1247-2420-2911-2185-0769
1188-1126-2928-9366-2176-6981
1188-1505-1381-1709-0945-1731
1188-1681-8439-6299-8210-0853

Adobe Photoshop Lightroom CS3
1160-4443-3164-7577-8702-1677
1160-4440-6582-1708-7377-7576
1160-4446-4363-2367-5182-4190
1160-4446-3945-9668-3407-8212

Adobe SoundBooth CS3
1332-1829-0145-6759-6055-9930
1332-1084-4852-3612-2707-4086
1332-1461-2888-0934-1102-3938
1332-1753-8788-1349-9474-3408

Internet Download Manager 6.08
D91GM-T5X1J-DW7YG-1GHIS
I23LZ-H5C2I-QYWRT-RZ2BO
8XJTJ-ZTWES-CIQNV-9ZR2C
PAQ34-MHDIA-1DZUU-H4DB8
4CSYW-3ZMWW-PRRLK-WMRAB
DDLFR-JKN5K-B4DE3-H2WYO
9RVII-F3W58-6FAYV-WPTFD
M7CQ2-VARGX-QFYGZ-URKG0
POOUS-S8V4C-1RXUH-HG6NQ
7JPTJ-4XLY3-HM4LK-9UP4Q
OJNGE-77NS5-MW5FC-MFB7A
HSIWU-KRQQQ-Y870K-YI6QQ
HF0I6-AYL1O-BHDI7-DG9LW
LC3OG-66OU3-38BTX-SX20M
52OGI-AKRTG-MT6YU-YZ7OU
WNJ39-J1JN0-JKNVS-BZSCB
7WPV5-NHHF3-A2P39-LRJ74
OV4O3-1ASY1-8CDWI-9UGX4
O00C4-MYLXJ-LYUDP-QFGD5
I80CQ-RUG1G-LEP9V-O7UN0
OUC2X-F1F8A-8LO76-ETQCK
SN1OJ-P3ZGF-RU4XN-S61TZ
4P6BG-WGN41-C5CQQ-QXIO8
76JVD-ISRBG-KZB4U-LGL9D
PBPXJ-BC1EH-FKO7F-VUXJ2
30P7F-IG6PZ-CSZ3L-FRL7N
4B5XT-BOSBK-94O5F-669DJ

WinZip v8.1
Name: Free Version
S/N: F49B1A6E

Winamp 5.03
Name: ttdown.com
S/N: 51W6K-Y11SP-V5S2T-7TXXK

TuneUp Utilities 2010 9.0.4200.54
Name: Mulder Organization: X-Files
S/N: 2R4PYE-NYEDAB-CH0790-N491JR-XPJYVF-3Q9E2E

WinXP Media Center Edition 2005 OEM Serials:
Acer: M6YTH-FDKHY-P3F3J-WBWJV-7MVQ3
Alienware: KV4H8-8F2DT-J3PRX-YRQGY-WFTM6
Amoi: WPBTV-FHT4G-7WJJW-388TD-XFHMQ
Asus: VRJFM-B2DFH-Y3K8W-VB7PH-7MVYW
Compaq: VXTGP-P3F6M-6TDVJ-TMXX6-WQD68
Dell: P8HY6-D3G46-RVF66-GP7VM-8CFT3
Dixonsxp: JKR2X-8TJFF-X6JKM-G3C24-K2QYW
Emachines: FGHVY-WGD2D-GDTF9-B9QW7-BBVH6
Fujitsu: VWW2Q-22YMY-W4VWC-GTX4Q-47BC6
Gateway: FGHVY-WGD2D-GDTF9-B9QW7-BBVH6
HP: HYHV7-W343F-9TCCK-JPCBM-B2FQ8
Legend: VWW2Q-22YMY-W4VWC-GTX4Q-47BC6
Lenovo: VWW2Q-22YMY-W4VWC-GTX4Q-47BC6
Medion: PTVGT-CTW74-F84GF-3MPQY-X2Q2G
NEC/Packard Bell: FJBM7-KW7G2-YXDGW-VHYVW-9QK9M
Sony: QC72Q-VWGKT-XC4Q9-W7RTD-7Q8G6
Toshiba: VQBTX-HHK7C-DF4RC-97FHM-X2QW3
Trigem: QQ3J7-877X3-H4K68-XB7HB-3DMBT
Tcl: CR8C9-M7QQG-FGJWT-CV666-4J3XG

Battlefield 1942
7159-9900264-8773071-1738
5764-8577588-8022124-2221
2052-2587569-9173578-0109

Battlefield 2
0P2A-DZB7-FIGH-TING-4FUN
6SM5-YCSS-MKRN-JVZS-GWJC
AF8G-R9ZV-R8BW-CXVN-WUMV

Command & Conquer 3: Kanes Wrath
UNS2-VH8J-SJHF-BRXG-45PE
P3R9-FJYA-C69N-9ZVX-A3ZN
L7GG-56LK-PPB8-NNBY-LEGB

UEFA Euro 2008
39BT-K4DP-CBB3-PZ8Y-42S7

Dead Space
ED2J-NC5B-FEBR-J9SR-S7Y9
3N9Z-FB64-Q546-ZFML-HU38

Star Wars: Battlefront
BF0C-A77C-7457-8A98-SA40
6A50-15B8-DA9F-979C-NA40

CONT--

Disable Video Thumbnail - Fix Windows Explorer Crash

Requires you to edit the registry. DO AT YOUR OWN RISK!
Create a backup of anything you change.

Press 'Windows Key' + R and type 'regedit' to open Registry Editor.
Navigate to HKEY_CLASSES_ROOT\CLSID, select {c5a40261-cd64-84cb-c394da41d590}

It is "Video Thumbnail Extractor", with InProcServer32 pointing to "%SystemRoot%\System32\mediametadatahandler.dll" whereas sometimes make Windows Explorer loading and then not responding due to excessive thumbnail for videos.

Make backup of your registry by right-click {c5a40261-cd64-84cb-c394da41d590} and choose Export, and saved it as Enable Video Thumbnail.reg

Then delete {c5a40261-cd64-84cb-c394da41d590} contents. To revert back, double-click saved 'Enable Video Thumbnail.reg' to create again the registry.

[Hack] Build WhatsApp API Client


WhatsApp Encryption
You will be surprised to know that until August 2012, messages sent through the WhatsApp service were not encrypted in any way, everything was sent in plaintext. That means if you were using Whatsapp on a public wifi, everything can be captured by anyone else sniffing ont he wireless network. The latest WhatsApp uses encryption but its this new encryption is broken . But still, phone number is sent out in plaintext.

The local storage isn’t any different, you can checkout WhatsApp Database Encryption Project Report

WhatsApp API & Reverse Engineering
If you know XMPP, the same protocol used by facebook, GTalk, and several others, you can try your hands-on WhatsAPI , an API for WhatsApp messenger.

WhatsApp uses customized XMPP server with proprietary extensions, named internally as FunXMPP.

1. WhatsApp Authentication / Login Mechanism
Just like any other XMPP, WhatsApp uses jabber id and password to login. The password is hashed, stored in servers upon account creation and used transparently everytime the client connects the server.

Its an incredibly horrible implementation. As researcher found out, the username is the user’s phone number – an attacker would probably already knows the victim’s number.

On Android, the password is a md5 hash of the reversed IMEI number :

$imei = "112222223333334"; //
example IMEI
$androidWhatsAppPassword =
md5(strrev($imei)); // reverse
IMEI and calculate md5 hash

On iOS, the password is generated from the devices WLAN MAC address:

$wlanMAC =
"AA:BB:CC:DD:EE:FF"; // example
WLAN MAC address
$iphoneWhatsAppPassword =
md5($wlanMAC.$wlanMAC); //
calculate md5 hash using the MAC
address twice

Both IMEI and MAC address are easily retrievable from devices if you have physical access to it. MAC address is much easier to
capture as you can sniff on the wireless network to which iOS device is connected.

The JID is a concatenation between your country’s code and mobile number.
Initial login uses Digest Access Authentication.
You can try this for yourself:

https://r.whatsapp.net/v1/exist.php?cc=$countrycode&in=$phonenumber&udid=$password

$countrycode = the country calling code
$phonenumber = the users phone number (without the country calling code)
$password = see above, for iPhone use md5($wlanMAC.$wlanMAC), for Android use md5(strrev($imei))

The response you would receive would be in XML, containing messages designated for your phone.

2. Text Message communication
Messages are basically sent as TCP packets, following WhatsApp’s own format (unlike what’s defined in XMPP RFCs).
Photos, Videos and Audio files shared with WhatsApp contacts are HTTP-uploaded to a server before being sent to the recipient(s) along with Base64 thumbnail of media file (if applicable) along with the generated HTTP link as the message body.

WhatsApp Privacy Leak
WhatsApp shares your contacts with the server, we all know that. But the way it is done is ridiculously insecure. It basically sends contact information as:

https://sro.whatsapp.net/client/iphone/iq.php?cd=1&cc=$countrycode&me=$yournumber&u[]=$friend1&u[]=$friend2&u[]=$friend3&u[]=$friend4
The server response looks like:
--

 <?xml version="1.0"
encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//
DTD PLIST 1.0//EN" "http://
www.apple.com/DTDs/
PropertyList-1.0.dtd">
<plist version="1.0">
<array>
<dict>
<key>P</key>
<string>1234567890</string>
<key>T</key>
<integer>10817</integer>
<key>S</key>
<string>Some Status Message</
string>
<key>JID</key>
<string>23xxxxxxxxx</string>
<key>NP</key>
<true/>
</dict>
</array>
</plist>

--

Key “P” is the users phone number, Key “T”
seems to be the uptime(?), Key “S” is the users
status message. Not sure about “JID” and “NP”
yet – if you have smart guess let me know. All
this information is public.

Source: Geeknizer