Free Bsnl Gprs With Full Internet Access

BSNL Launches New GPRS Packs at Rs.14 and 98 for ChennaiFree Bsnl Gprs With Full Internet Access, U Can Surf For Free Via Gprs On Pc Too 

Here is the way.

1.Create 2 connections with different names like “BSNL PORTAL” and “CELLONE PORTAL” with  following settings.

Access Point Name– “celloneportal”

Proxy Service Address- “192.168.51.163”

Proxy Port- “8080”

Security- “NORMAL”

rest fields to be as it is.

2.Now open phone’s default inbuilt browser and select any of the two settings  created to access the web.you will now access only bsnl’s home site.

3.Now keep browser working and open another browser for full internet access like opera or netfront.in these browsers use the second setting created.make sure to use second setting this time.connect to open a page.you get an error message like “ACCESS DENIED” but you don’t worry.

4.keep both browsers working in background and open connection manager.in connection manager just disconnect the connection that is not working like the second one you used to connect opera or netfront.

5.Again open opera or netfront from background and this time use the  first connection that you are using to connect with default inbuilt browser to connect to Internet.

6.sure this time you are connected with full access.

 

 

 

 

 

Panasonic Toughbook CF-C2


One tough tablet!!!

 Panasonic Toughbook CF-C2

The new Toughbook CF-C2 is a Windows 8 bases tablet-PC hybrid device, with a semi rugged housing that can withstand drops of up to 76cm, a water resistant keyboard and touchpad and strengthened glass on the LCD.

The 12.5-inch HD screen is capacitive 5-finger multi-touch display that can be used both in tablet and clamshell mode.

The C2 powered by Interl core i5-3427U vPro Ultra Low Voltage and has 4GB RAM by default, which can be extended to 8GB.

The C2 also comes with a 9-cells bridge battery, where users can use either on 6-cells,3-cells or the combined 9-cells,depending on the type of usage.

Cost-To be announced

 

Art Of Email spoofing

Spam and e-mail-laden viruses can take a lot of the fun and utility out of electronic communications, but at least you can trust e-mail that comes from people you know – except when you can’t. A favorite technique of spammers and other “bad guys” is to “spoof” their return e-mail addresses, making it look as if the mail came from someone else. In effect, this is a form of identity theft, as the sender pretends to be someone else in order to persuade the recipient to do something (from simply opening the message to sending money or revealing personal information). In this article, we look at how e-mail spoofing works and what can be done about it.

If you receive a snail mail letter, you look to the return address in the top left corner as an indicator of where it originated. However, the sender could write any name and address there; you have no assurance that the letter really is from that person and address. E-mail messages contain return addresses, too – but they can likewise be deliberately misleading, or “spoofed.”  Senders do this for various reasons, including:

  • The e-mail is spam and the sender doesn’t want to be subjected to anti-spam laws
  • The e-mail constitutes a violation of some other law (for example, it is threatening or harassing)
  • The e-mail contains a virus or Trojan and the sender believes you are more likely to open it if it appears to be from someone you know
  • The e-mail requests information that you might be willing to give to the person the sender is pretending to be (for example, a sender might pose as your company’s system administrator and ask for your network password), as part of a “social engineering” attack
  • The sender is attempting to cause trouble for someone by pretending to be that person (for example, to make it look as though a political rival or personal enemy said something he/she didn’t in an e-mail message)

How Spoofing Works:

In its simplest (and most easily detected) form, e-mail spoofing involves simply setting by adding the poster and getter name and add the message which you want to send.

Here are the few simple steps to be followed to work with email spoofing:

Step1: 

Step2:

  • Enter the poster address ( address pretending to be the person you want).
  • Enter getter address ( victim’s address).
  • Enter the subject.
  • Enter the message or text you want to send.
  • Enter the Captcha for conformation and click on send. Your mail will be sent to victim pretending as the person you want.

Your mail will be sent to victim pretending as the person you want to.

CAUTION:This post is  just for getting a basic idea about Email SPOOFING, I bear no responsibility if some mischief is done. In some countries Email spoofing is illegal so I request you all not to use this service in banned countries. 

How To Find Your IP Address

What is an IP address?

  • Every device connected to the public Internet is assigned a unique number known as an Internet Protocol (IP) address. IP addresses consist of four numbers separated by periods
  • Since these numbers are usually assigned to internet service providers within region-based blocks, an IP address can often be used to identify the region or country from which a computer is connecting to the Internet. An IP address can sometimes be used to show the user’s general location.
  • The best way to find your IP address and complete details about your interconnection is as follow:

– just visit http://whatismyipaddress.com/.

– It wil provide the complete details about your connection which include IP information,Organization,Connection,Services,City,Region,Country as       follow:

Hide your Ass online

Planing to do any illegals things and make them untraceable ?

Want to hide your Ass (IP) ?

According to my experience i suggest you to use Anonymizer .

what is Anonymizer?

  • Anonymizers are tools that allows or attempts to allow users to make their online activity untraceable.
  • Anonymizers are proxy servers effectively which acts as intermediary between the client and the actual server. Anonymizer attempts to provide a shield of anonymity by protecting the identification information of the actual systems that are using the service or resources.
  • There are various types of anonymizers that are available freely and commercially on the Internet. There are protocol specific anonymizers which only understand a specific protocol and can only mediate connections that user that particular protocol.

Getting Started:

There are few simple steps to be followed to use this tool legally.

–> Go to the below link –>http://www.anonymizer.com/

  • As you are in legal way you are supposed to create an account and pay around $79.9 bugs to get subscribed and move ahead

If you are interested to do things in ill-legal way here I am to help you ….

–> Go to the below link–> http://www.anonymizer.ru/ you will find a page as shown below:

  • As it is developed by RUSSIAN FEDERATION the entire site will be in Russian language.
  • There is no need of learning Russian language to use this tool, little common sense  will help to get through.
  • Go to the search bar at Right-top of the page as shown above.
  • Enter your address for example:  “www.google.Com” 

  • Press enter ..now you will go to the requested web-page, but the URL will be a “virtual sub-directory” of the CGI proxy.
  • You will be directed to the requested webpage as follow:

  • These are the few simple steps to be followed to hide your ass before u start doing something  ill-legal  on web.

How To Set Classpath For JDK in Windows

Download and install J2SE on your machine. (If u face any problem in the process of downloading and installing follow https://techiesupport.wordpress.com/2012/07/24/installing-jdk-tutorial/ this may help you.

Configuring the installation on windows machine

In this Section we will add some settings to the windows environment so that the java compiler and runtime becomes available for compiling and running the java application.

Go to the control panel and double click on “System Properties” and to to the advance tab.

                        and add “c:\jdk1.5.0_06” to path variable:

and click on ok button. To save the setting click on “OK” button.

This will make the java environment available for development. Open the dos prompt and type javac on the console, you will find all the information regarding JDK

Now your development environment is ready for development.

Installing JDK Tutorial

We will first download, install and configure the J2SE development environment.

Downloading and Installing J2SE Software on Windows Platform

To download J2SE for development visit http://www.java.sun.com/j2se and download J2SE on your machine. In this tutorial we have used jdk-1_5_0_06-windows-i586.exe.The java 2Platform or (JDK) can be downloaded from the sun. Formerly Known as the java Development kit ,or JDK, Downloading java is really about downloading the java 2 plat form that comes in three editions , J2ME, J2SE and J2EE , if you are learning  java, then, you should start by downloading  J2EE.

Once you have downloaded the j2se on your system, you are ready to install . In the following section we will learn how to install  jdk development environment on your machine. here are the step to install JDK on your windows machine.

Step 1–>

Double click the JDK down loaded file, the executable extracts the required Contents to the temporary directory and then License agreement screen  appears. On the license agreement page read and accept the license and the click the next button .

Step 2

The custom setup screen appears as follows.

Step 3

Click on the change button to change the installation directory to “c:\jdk1.5.0_06” as shown in the following screen.

                     and click on the “OK” button. After clicking on the “OK” button installation begins.

Step 4

In the next window installer asks for the installing the runtime as shown in the following screen:

Step 5

Click on next button install the J2SE runtime on your machine. Next screen shows the browser selection

Step 6

Once the installation is finished it shows you the final screen indications the success. Now you have successfully installed J2SE on your machine. Installer shows the following final confirmation window as shown below

                                       Click on the “Finish” button to exit from the installer

Tips To Hunt Your Your Dream Job

The 21 st Century has brought with it a wider and more diverse range of jobs than ever before. But that hasn’t really made the job hunt any easier. In fact, organisations have now become even more selective about hiring. Here are 10 tips to help you get your dream job.

Focus Your Job Search

Instead of submitting your resume to thousands of job openings on Monster.com, classified ads and corporate websites, narrow your search to the jobs you’re truly passionate about. In 2010, Simply Hired found that 83% of people choose jobs they love over more money, and they should. By putting all of your effort into finding jobs at companies you’re interested in, you will have a better chance at getting your dream job. Your positive attitude, work ethic, body language and persistence will shine through in your interviews and will give you the competitive edge in the hiring process.

 ESSENTIAL SKILLS:
Average to strong working knowledge of English both, written and oral, is essential in the globalised workplace. Keyboard typing, MS Office and emailing are basic skills for all jobs with prominent employers. Cultivate a range of IT skills to enhance your flexibility for a wider variety of dream jobs.

 ADAPTING TO CHANGE:
Learning how to learn can be very useful in this era of rapid change. People who are curious and desire to keep up-todate will be in great demand. An employee who is able to apply new knowledge and technology efficiently to typical job duties assists the employer in meeting competitive challenges.

TEAM SPIRIT:
Demonstration of teamwork skills is as important for recruitment as it is for sports.

Brush Up on Your Soft Skills

Just being good at your trade won’t cut it anymore. You have to have a whole set of soft skills, including leadership, teamwork and communication, as well as emotional intelligence. In fact, CareerBuilder report that 71% of employers value emotional intelligence over IQ. You need to be able to deal with conflict in the workplace and get along with your co-workers. Employers want to hire employees that they can connect with both personally and professionally.

Tap into Your Network

Most job seekers don’t realize that the people around them can either hire them or refer them to a job. Don’t overlook your family, friends, professors, previous co-workers and the people that you meet at events and when you’re traveling. Also, make sure that you grow your online network using LinkedIn, Facebook and Twitter. A recent survey by Jobvite.com states that 1 in 6 workers have used social networks to get hired.