Tuesday, October 26, 2010

Bypass Firewall At School,College Or Office

Is Orkut,Facebook,Yahoo blocked on your school,college or office?Then,dont worry I have a solution for you that will not only unblock all the websites that have been blocked  but also make your internet surfing anonymous so that nobody can trace your orignal ip address.As you know that most of the proxy websites are blocked with your school,college or office firewall and even if you find some new proxies they even them block them out.So,why not to move something that is almost a permanent solution.
We will be using a very small and free software called ultrasurf.It will not only allow you to surf blocked websites but it will also give you freedom to stream videos,download and upload files.
Now Here is the step by step tutorial with screenshots on Trick Bypass Firewall At School,College Or Office With  UtraSurf
  1. First you need to Download Ultrasurf.Click here to download ultrasurf
  2. You will get a zipped file with a .exe file in it.Click on it
  3. It will start ultra surf and automatically connect to its server.  




  1. Even it will open your Internet explorer automatically.Now you can have an unblocked and secure to internet.
  2. If you want to use ultrasurf with you need to download the firefox plugin also.You can download firefox plugin by clicking here

  1. If you are connected to internet through a proxy server then ultrasurf will detect it.If somehow it doesnot detect the proxy server then you can manually enter your proxy server
To manually enter proxy server
Click on Option > Proxy Setting > Manual Proxy Settings




Note:-If you want to use ultrasurf with other applications you need to configure them to use ultrasurf as their proxy client. The Proxy IP address is 127.0.0.1 and the Port is 9666.



Tuesday, October 12, 2010

Get Any Microsoft product for free..

Introduction

This article will basically introduce you to the funniest yet useful bug in Microsoft systems. Do at your own risk as neither Impcompfact nor the author of the article are responsible for anything legal related to it

Background

I work as a manager in HP for north american customers, so i have been hanging around in this field since a long time. So just by a little research i managed to find the bug!

Lets start 

PART 1

1. Go to ebay.com
2. Search for "Microsoft Products". (Suppose you chose a "gamingkeyboard")
3. Select any product below $150, and tell the seller that "I am ready to buy, but just to make sure that I am getting the right thing, i want to know the PID number of the product".
4. Seller will mail you PID number.

Part 2

1. Call up microsoft customer service OR have a chat with their representative
2. I dont have the number byhearted so goto support.microsoft.com and find that out
3. Tell them that " I own this (the same) Gaming keyboard, its broken, some of the keys are not working, I have done all the troubleshooting."
4. VOILA!, they will say that "Its ok, sir, we will send your another!"
5. YOUR DONE!!


How it works?

When they send you another keyboard, they would NOT ask you to return the existing broken keyboard, because the SHIPPING will cost them more than the price of the keyboard. So thats what is the loophole

Why till $150?

As i mentioned above, if the replacement product costs more than $150, then they will ask you to return the existing broken product at the time of delivery, which apperantly we dont have .

Can I get caught?

NO!. Its done through complete legal way, I have already ordered 5 of them and have received 3 at my friend's place in US. I am expecting them to drop1 of them at my place (india), within couple of days

Tuesday, November 24, 2009

Introduction

  What is Hacking..?
                   Hacking is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)
            Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an ethical hacker and an organization, it's OK. The key difference is that the ethical hacker has authorization to probe the target.