Saturday, September 17, 2011

Trick to Disable Send To Option From Right Click Menu


You must have seen Send To option when you right click on any file/folder. This Send To option helps you to send your files/folders from one location (drive) to another. This also acts as a shortcut key to send files to any external storage media (Pen Drive, Memory Card). But by this trick you can also Disable this feature by making changes in window’s Registry settings. Now if someone try to get any data from your computer he/she should have to copy/paste the data rather than to use this Send To option.
Trick to Disable Send To option on Right Click in Context Menu:-
  • Type Run in the start up search box and press enter or press Win+R.
  • Type Regedit and click OK.
  • Now navigate to following location:
HKEY_CLASSES_ROOT\AllFilesystemObjects\shellex\ContextMenuHandlers\Send To
  • Double Click on the Default in the right window pane.
  • Now there you will see Hexadecimal value written in the Value data field. Remove this code (make it blank) and click OK.


That’s it! Now Send To option will be gone from your context menu when you right click on any file/folder. You can also recover this option back by putting this Hexadecimal value back in the Value data field. So it is better to copy/paste that value somewhere in your computer.



Thursday, September 15, 2011

Facebook FishVille Cheat


So what is FishVille? It’s a game where you raise a fish, feed them and help decorate the tank which they live in. It’s similar to many of the other games like FarmVille, Cafe World, and Roller Coaster Kingdom, however in this one you are simply taking care of a fish tank. As you raise fish you can sell them to earn coins and experience. Honestly, it uses a similar format to all of Zynga’s other games which means the company could reuse a lot of the code from their other games.

Before giving out a tip or two, what is Fishville? Fishville is the latest Facebook game from Zynga! After the smashing success of Farmville, a game where you create and maintain a farm, Zynga has introduced another game which has a lot of potential of being another winner.
Some say that this game is like an underwater Farmville. But in my opinion, this game is more like Tamagochi (remember the small pocket-size gadget kids of the 90s where crazy with??) where you need to make sure you feed your fish every now and then.


In this game you simply grow fish, feed them, and then purchase items for your fish tank. Then come back once in a while to see how your tank is doing. Just like all the other games on Facebook, this one is passive so that you can check in a couple times a day rather than sit and play it non-stop. While I haven’t spent a lot of time playing this game, I’m sure that Zynga is actively tracking user metrics to ensure that this game is just as sticky as their other ones.

Now on to some tips. Like in Farmville, if you do not harvest your crops in time, they will wither and die. The same is true with Fishville. If you do not feed your fish with food, they will die. What you need to be careful of is that you need to know when you need to feed your fish. There are those that takes hours before you need to feed them and there are those that only takes minutes. If you got some fish that needs feeding every few minutes, then you need to be vigilant in feeding them or else they die which happened to me a lot of times.

If it turns out to be a hit (which it probably will be),  Zynga should blow past 200 million monthly active users, far outstripping any of the other competition on the Facebook Platform. If you want to spend your time building a virtual fish tank, go check out FishVille. Also check out Inside Social Games who first broke the news of this application.

Another good tip would be to find neighbors as soon as possible. Like Farmville, you need them to unlock some items. I haven’t fully played Fishville yet but I am sure that your neighbors can help you take care of your fish like how you can take care of your neighbor’s farm in Farmville.

Thursday, September 8, 2011

Bypassing Firewalls

Although firewalls are meant to provide complete protection from port-scan probes and the like, several popular firewall products contain holes just waiting to be exploited. This section focuses on a hole in ZoneAlarm, Versions 2.1.10 to 2.0.26, that allows attackers to port-scan the target system. Specifically, if you system uses port 67 as the source port of a TCP or UDP scan, Zone-Alarm will let the packet through and will not notify you. That means an attacker can TCP or UDP port-scan a ZoneAlarm-protected computer as if there were no firewall, if he or she uses port 67 as the source port on the packets.

For example, in the case of a UDP scan, an attacker can use nmap to port scan the host with the following command line (notice -g67, which specifies the source port):

nmap -g67 -P0 -p130-140 -sU 192.168.128.88

After you have installed a firewall on your system, you may get a number of warnings, seemingly indicating that someone is trying to break into your system. In most cases, however, they are in fact bogus messages that are caused either by your OS or by the process of allocating dynamic IPs. For example, when you dial in to your ISP, you may receive a message that certain IP is probing a particular port on your system. This is because someone disconnected from your ISP just before you dialed in and you were assigned that person's IP address. What you are seeing are the remains of the ISP's communication with the previous user. This is most common when the person to whom the IP was previously assigned was using ICQ or a chat program, was connected to a game server, or had simply turned off his modem before his communication with remote servers was complete. Another common message is that a certain IP is trying to initiate a Net BIOS session on a particular port on your system (in fact, Net BIOS requests to UDP port 137 are among  the most common items you'll see in your  firewall reject logs). This stems from a feature in Windows: When a program resolves an IP address to a name, it may send a NEt BIOS query to an IP address. This process is just part of the background radiation of the Internet and is nothing to be concerned about. Likewise, for a TCP scan, an attacker can use nmap to port-scan the host with the folowing command line (again, notice -g67, specifying source port):

nmap -g67 -P0 -p130-140 -sS 192.168.128.88



(By Dushyant Pandya)





Twitter Delicious Facebook Digg Stumbleupon Favorites More