Tuesday, August 25, 2015

How to Send an Email to Facebook From Gmail

One of the challenges of running a small business is establishing solid communication lines. Gmail can be a good client to use for email as it is easily accessible from any computer with Internet access as well as from mobile devices. At some point you may need to send an email to a client or contact who uses a Facebook email address. You can send an email to this address just as you would a normal email address.

Step 1
Determine the contact's Facebook address. You can check if the contact has sent you the address to use. Otherwise, you can navigate to the user's Facebook timeline and locate their public username at the end of their URL. For example, for the URL "http://facebook.com/user" the public username would be "user." This public username is the first part of the Facebook email address, so the email address would be "user@facebook.com."
Step 2
Click on the "Compose" button at the top of the left sidebar in your Gmail inbox to compose a new email.
Step 3
Type the Facebook email address in the "To" field.
Step 4
Type the email's subject in the subject line as usual and type your email message in the main message text field.
Step 5
Click the "Send" button below to send the message to the Facebook address. The message will arrive in your contact's Facebook "Messages" box.

How to Send Bulk Mail Using Gmail

If you need to send a bulk email message to many of your customers, employees, or business acquaintances at one time, there is a way to do it using Gmail. By using Gmail to send a bulk email message, you can send the message using an address that is familiar to those who might be receiving it, which increases the chances of your email being opened, and helps recipients feel more confident that the message is not spam.


Step 1
Sign in to your Gmail account at gmail.com.
Step 2
Click the "Compose" button to create a new email message.
Step 3
Click the "Add BCC" link under the "To" box, and instead of entering addresses into the "To" field like you normally would for an email message, enter them into the "To BCC" field instead. This protects the email recipients you're sending the message to by making sure they can't see each other's email addresses.
Step 4
Enter the content of your message into the large body field.
Step 5
Click the "SEND" button to send your email message.

How to Clean Up Your Messy Windows Context Menu

One of the most irritating things about Windows is the context menu clutter that you have to deal with once you install a bunch of applications. It seems like every application is fighting for a piece of your context menu, and it’s not like you even use half of them.
Today we’ll explain where these menu items are hiding in your registry, how to disable them the geeky way, and an easier cleanup method for non-geeks as well.
image
Either way, your context menu won’t look like this one anymore…

Cleaning the Context Menu by Hacking the Registry

If you want to clean things up the truly geeky way, you can open up regedit.exe through the start menu search or run box, and then browse down to one of the following keys… sadly the context menu items are not stored in a single location.
Most of the menu items that used for all files and folders can be found by looking at one of these keys:
HKEY_CLASSES_ROOT\*\shell
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers
HKEY_CLASSES_ROOT\AllFileSystemObjects\ShellEx
Items that are specific to folders can usually be found in one of these keys instead:
HKEY_CLASSES_ROOT\Directory\shell
HKEY_CLASSES_ROOT\Directory\shellex\ContextMenuHandlers
The context menu items found at these different locations will need to be handled differently, and we’ll explain how, so keep reading!
Dealing with “shell” Items
Let’s take a look at one item as an example… if you browse down to the shell key under Directory you’ll see the items for Add to VLC media player and Play with VLC. Items under the regular “shell” key are usually really easy to spot, and easy to deal with.
image
If you want to hide one of these items so that you’ll have to Shift+Right-Click, then you can add a new string value on the right-hand side and name it “Extended” like you can see below:
image
If you’d like to disable it instead, but don’t want to delete the key, you can add a new string value and call it “LegacyDisable”.
image
And of course, you could just delete the whole key if you really wanted to… but I’d export a copy just in case.
Dealing with “shellex” Items
You probably noticed the other registry keys above that have “shellex” (Shell Extension) in the name instead of just “shell”. Those types of keys will need to be handled differently… for an example, we’ll head down to one of the keys mentioned above:
HKEY_CLASSES_ROOT\Directory\shellex\ContextMenuHandlers
These items will be a little more tough to decipher… but you can usually figure out an item by the key name on the left, and then just modify the (Default) value by putting a few dashes in front of it, which will disable the item without actually deleting anything.
In this example, I’ve clicked on 7-ZIP on the left, and by putting dashes in front of the value data I’ve disabled that menu item.
image
You’ll want to go through each location in the list at the top of this article until you figure out where exactly the offending items are located. At that point, you can use one of the tricks we mentioned in order to disable that item.
Dealing With Specific File Type Items
Sometimes, although not often, the menu items are located on the registry key for a specific file type. In that case you’ll need to first locate the file extension key by looking under HKEY_CLASSES_ROOT for that extension, which will tell you the name of the key that you need to look for.
For instance, if I wanted to remove a menu item for Excel documents (.xls) I would look at this registry key, which gives me the name of the actual key to look under…
HKEY_CLASSES_ROOT\.xls
image
As you can see above, the actual type of the file is “Excel.Sheet.8″, so I’ll then browse down to this registry key:
HKEY_CLASSES_ROOT\Excel.Sheet.8\shell
image
And now I can use the same techniques as above to disable items under “shell”… remember LegacyDisable and Extended? Yep, those work here.

Cleaning Up the Context Menu the Easy Way

Instead of hacking the registry, you can use two different NirSoft utilities to clean up the context menu. Sadly, some of the menu items are implemented as Explorer shell extensions (like the “shellex” keys we explained above), and some are implemented as regular context menu items (like the regular “shell” keys we explained above).
The first tool we will check out is ShellMenuView, which allows us to manage all of those “shell” key items with an easy to use interface.
Just browse down until you find the offending item, then click the Disable button… which will actually create a LegacyDisable key just like we explained in the manual section above.
image
You’ll see that those items are instantly disabled:
image
Next, we need to disable those “shellex” or Shell Extensions, using another great Nirsoft utility appropriately called ShellExView. This one works the same exact way as the first utility… just click on the Disable button to remove the items.
image
After using both of these utilities for just a few minutes, I was able to get my context menu back to the pristine “new install” state.
image
Go forth, and clean your context menu clutter! And yes, this works the same in all versions of Windows.

Monday, August 24, 2015

Prevent Windows Update from Forcibly Rebooting Your Computer

We’ve all been at our computer when the Windows Update dialog pops up and tells us to reboot our computer. I’ve become convinced that this dialog has been designed to detect when we are most busy and only prompt us at that moment.
The real problem comes into play when Windows gets tired of reminding us and says that the computer is going to reboot in 5 minutes, and the only way you can prevent the inevitable is to temporarily disable Windows Update.
There’s a couple of ways that we can disable this behavior, however. You’ll still get the prompt, but it won’t force you to shut down.
image
This trick should work for all versions of Windows as far as we know. You can always resort to the temporary disabling measures instead.
Manual Registry Hack
Open up regedit.exe through the start menu search box or run dialog, and navigate down to the following key, creating new keys if they don’t exist.
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
image
Create a new 32-bit DWORD value named NoAutoRebootWithLoggedOnUsers and give it a value of 1 to prevent automatic reboot while users are logged on. Delete the value to put things back to the way they were.
Downloadable Registry Hack
Just download and extract the registry hack files and double-click on WUNoAutoReboot.reg to disable automatic reboots. The other script will remove the hack.

Temporarily Disable Windows Update’s Automatic Reboot in Win7 or Vista

So you’re in the middle of doing something important on your computer when the “Restart your computer to finish installing important updates” dialog comes up, and asks you to restart your computer.
image
Sure, you can postpone it up to 4 hours, but then the dialog will just come up again. If you were downloading some important files you might not want the computer to reboot automatically.
The quick way to disable the reboot for the current session is to stop the Windows Update service from running. You can do this by opening an administrative mode command prompt.
Type cmd into the start menu search box, and use Ctrl+Shift+Enter to open in administrative mode. You could also right-click the item in the menu and choose Run as Administrator.
Once at the prompt, just type in the following:
net stop “windows update”
image
Don’t worry, the service will start right back up when you reboot your computer, but at least you don’t have to deal with the restart dialog.

How to unlock bsnl modem

Hello friends, Now i am going to post a new trick to unlock BSNL 3G MODEM. It is very easy and simple trick.So I hope you can easily do it and after that you can easily run any sim card in your BSNL DATA CARD so here are some easy steps to make this trick working

STEP 1. – Press Windows+R and  type regeditand hit enter.
STEP 2. – Now below type of window will appear in front of you.

STEP 3. – Now navigate this menu in Registry Editor
HKEY_LOCAL_MACHINE=>SOFTWARE=>LINKTOP3G
when you will click on LINKTOP3G, then you’ll get  3 option in right pane as shown in below image.
just double click on ENGINEER option andchange its value to 0


STEP 4. – Restart Your Pc and Enjoy, Your Modem is Unlocked but when you plugged your DATA CARD to another pc then you have to follow same steps .
” ENJOY AND WAIT FOR NEXT “

How to check your antivirus is fake or real



Friends, craze of android applications is on the sky. These are making the people crazy. There are lots of useful android apps also and you can enjoy these useful apps on your android phone only, but with the help of this trick on way2hacking you can enjoy android apps on your windows pcs, here are some simple stepswhich will help you to make this trick working, so lets start.. 

STEP 1-
First of all download BlueStack app on your windows pc .
 
 
 
STEP 2.-
Now install it on your pc. And just run it.
 

STEP 3.-
Now click on any .apk file present on your pc.
Enjoy & share with your friends…
 
 
” ENJOY & WAIT FOR NEXT”

How to install android app on Windows



Friends, craze of android applications is on the sky. These are making the people crazy. There are lots of useful android apps also and you can enjoy these useful apps on your android phone only, but with the help of this trick on way2hacking you can enjoy android apps on your windows pcs, here are some simple stepswhich will help you to make this trick working, so lets start.. 

STEP 1-
First of all download BlueStack app on your windows pc .
 
 
 
STEP 2.-
Now install it on your pc. And just run it.
 

STEP 3.-
Now click on any .apk file present on your pc.
Enjoy & share with your friends…
 
 
” ENJOY & WAIT FOR NEXT”

Types of Virus & Malicious Code and Protective Measures

Virus Hoax
A virus hoax is a false virus warning, usually in the form of an email message. It suggests the reader to forward the message to others, resulting in a rapidly growing proliferation of emails that may overload systems.
Mobile Device Virus / Worms
Like any computing platform, mobile devices are also susceptible to malicious code attacks. Although at present, malicious codes for handheld devices and smart phones are not that common, there is likely to be an increase as the functionality of mobile applications increase and with the wider deployment of these devices.
The open architecture of mobile application development environments, often with extensive software development documentation and tools, also allow attackers to create malicious code for these platforms quite easily.
Malicious code can infect mobile devices in several ways. These include:
  • Via email SMS or MMS: a message containing a hyperlink to a malicious code is sent to entice a user to select the link and download the code. Alternatively, the code can be sent in an email as an attached file and infect the device when executed. Similarly, malicious code can also be propagated via MMS messages. SymbOS / Commwarrior.M is a worm that is capable of spreading via MMS messages on Symbian Series 60 devices.
  • Via desktop synchronisation: the worm Cxover is one such an example. Cxover is a proof-of-concept worm that can affect both Windows PC and Windows Mobile devices. If it is executed on a Windows Mobile device, it will copy itself to the computer over an ActiveSync connection. If it is executed on a Windows PC, it will search for any handled devices connected over ActiveSync and copy itself to the device.
  • Via Bluetooth, Infra-red or Wi-Fi: the first worm capable of spreading via Bluetooth was discovered in June 2004 and was named Cabir. It was a proof-of-concept worm for Symbian OS Series 60 smart phones but it has not been found in the wild since then. The worm required several interactive steps on the part of the recipient in order to execute. An attacker who intentionally sends a malicious program to trick the recipient into accepting it can also exploit the potential weakness of Bluetooth.
Logic Bombs
A logic bomb is a program code which is embedded in another program, and can be activated when a certain predefined criteria are met.
For instance, a time bomb will attack a system and erase all data if a licence key or another program code is not found in the system. In some cases, a logic bomb will inform the attacker via the Internet that the bomb is ready to attack the victim.
Trap Door
A trap door is a secret entry point into a program that is intentionally included in the program code. While it can facilitate debugging during program development, it may be used for malicious purposes as well.
Common Obfuscation Techniques
The following are common obfuscation techniques used by malicious code developers and writers to evade detection and destruction:
  • Binders and Packers
    Most virus signature files are created based on the checksum value which makes use of the file properties and first few bytes of the malicious code binaries. The binders technique is to bind the virus and malicious code file on to another file, which changes its form. The packers technique is to compress the virus code before it is embedded.
  • Self-Encryption and Self-Decryption
    Malicious code may encrypt and decrypt itself, even using several layers of encryption and decryption and/or using random keys in encryption and decryption. This makes them harder to examine directly.
  • Polymorphism
    Malicious code can change its default encryption settings as well as the decryption code during self-encryption. These make it much more difficult to detect.
  • Metamorphism
    Malicious code change its form by, for instance, rearranging its code fragments or/and by adding useless lines of code into its source, and recompiling itself into a new form.
  • Code conversion to a VB (Visual Basic) script
    This method converts an executable program (.exe) into a visual basic script (.vbs) file that can be attached to a document, data files or email messages.
  • Stealth
    The technique is designed to evade anti-virus software detection by hiding the code itself. One example is to monitor system calls to files; the malicious code then modifies the return information to the process call by returning only original information.

How to crash internet browser using notepad

Friends, today i’ll share how to crash internet browser of your friends. Before explaining this trick let me tell you how this trick will work. You know what happens if a browser have to open 100 website at once, it’ll crash. So let start the trick. .

STEP 1.
Open notepad
STEP 2.
Copy and paste below code in NOTEPAD.
STEP 3.
Save it as (any name).bat  [I recommend you to give any interesting name so that your friend must click on this file. e.g FreeRecharge.bat]
STEP 4.
Give it to your friends in his pen drive, when he’ll click on it ,then boom. . you can also check it on your pc, it is not so harmful..
” ENJOY & WAIT FOR NEXT “