Here's the trick....
*Open Notepad and paste the following
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion] "CurrentBuild"="1.511.1 () (Obsolete data - do not use)" "ProductId"="55274-640-1011873-23081" "DigitalProductId"=hex:a4,00,00,00,03,00,00,00,35,35,32,37,34,2d,36,34,30,2d,\ 31,30,31,31,38,37,33,2d,32,33,30,38,31,00,2e,00,00,00,41,32,32,2d,30,30,30,\ 30,31,00,00,00,00,00,00,00,86,56,4e,4c,21,1b,2b,6a,a3,78,8e,8f,98,5c,00,00,\ 00,00,00,00,dd,da,47,41,cc,6b,06,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,38,31,30,32,36,00,00,00,00,00,00,00,b5,16,\ 00,00,83,83,1f,38,f8,01,00,00,f5,1c,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,66,e5,70,f3 "LicenseInfo"=hex:33,b7,21,c1,e5,e7,cd,4b,fd,7c,c6,35,51,fd,52,57,17,86,3e,18,\ d3,f4,8c,8e,35,32,7b,d1,43,8d,61,38,60,a4,ca,55,c9,9a,35,17,46,7a,4f,91,fc,\ 4a,d9,db,64,5c,c4,e2,0f,34,f3,ea
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WPAEvents] "OOBETimer"=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd
* Now save the file as License Key.reg (Note: The file name must contain the .reg extension)
* Double click the file that you created. It will ask for confirmation.
* Click Yes... And you are done.
* To see that it worked go to
http://www.microsoft.com/genuine/downloads/FAQ.aspx
and click on "Validate Windows"
Don't open Microsoft's site if ur Volume Serial No. is already blocked.
U can test it by installing Windows Media Player 11 / Internet Explorer 7.
This post was found on the net...but it was a gud one...
Compress ur 1GB file into less than 20MB
Hey guys check out this Article I found off the net (I found it through google, i don't remember the site):
KGB Archiver is the compression tool with an unbelievably high compression rate. Unfortunately, in spite of its powerful compression rate, it has high hardware requirements (Irecommend processor with 1,5GHz clock and 256MB of RAM as an essential minimum). One of the advantages of KGB Archiver is also AES-256 encryption which is used to encrypt the archives. This is one of the strongest encryptions known .
DOWNLOAD LINK:
http://www.softpedia.com/get/Compression-tools/KGB-Archiver.shtml
KGB Archiver is the compression tool with an unbelievably high compression rate. Unfortunately, in spite of its powerful compression rate, it has high hardware requirements (Irecommend processor with 1,5GHz clock and 256MB of RAM as an essential minimum). One of the advantages of KGB Archiver is also AES-256 encryption which is used to encrypt the archives. This is one of the strongest encryptions known .
DOWNLOAD LINK:
http://www.softpedia.com/get/Compression-tools/KGB-Archiver.shtml
6 ways to safeguard your PC online
Here are some precautions you can take to keep your PC safe from online hazards like viruses, worms, and Trojan horses:
1)Install an antivirus software program on your computer (for more info, see the related tip: Protect your PC with antivirus software).
2)Be suspicious of any e-mail attachments that you receive from unknown sources. E-mail is the main source of viruses, worms, and Trojan horses.
3)Be suspicious of downloads sent to you via chat applications (such as MSN Messenger or AIM).
4)Be picky about where you download files from on the Internet; many virus and worm writers use free software to disguise malicious applications.
5)Make sure that your PC has all the latest patches and updates installed (if you run Windows, visit the Windows Update site to install all the patches your operating system needs).
6)Scan all discs and downloads for viruses before running them.
1)Install an antivirus software program on your computer (for more info, see the related tip: Protect your PC with antivirus software).
2)Be suspicious of any e-mail attachments that you receive from unknown sources. E-mail is the main source of viruses, worms, and Trojan horses.
3)Be suspicious of downloads sent to you via chat applications (such as MSN Messenger or AIM).
4)Be picky about where you download files from on the Internet; many virus and worm writers use free software to disguise malicious applications.
5)Make sure that your PC has all the latest patches and updates installed (if you run Windows, visit the Windows Update site to install all the patches your operating system needs).
6)Scan all discs and downloads for viruses before running them.
What is Phishing?
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.
The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has.
The Web site, however, is bogus and set up only to steal the user’s information.
For example, 2003 saw the proliferation of a phishing scam in which users received e-mails supposedly from eBay claiming that the user’s account was about to be suspended unless he clicked on the provided link and updated the credit card information that the genuine eBay already had. Because it is relatively simple to make a Web site look like a legitimate organizations site by mimicking the HTML code, the scam counted on people being tricked into thinking they were actually being contacted by eBay and were subsequently going to eBay’s site to update their account information. By spamming large groups of people, the “phisher” counted on the e-mail being read by a percentage of people who actually had listed credit card numbers with eBay legitimately.
Phishing, also referred to as brand spoofing or carding, is a variation on "fishing," the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.
The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has.
The Web site, however, is bogus and set up only to steal the user’s information.
For example, 2003 saw the proliferation of a phishing scam in which users received e-mails supposedly from eBay claiming that the user’s account was about to be suspended unless he clicked on the provided link and updated the credit card information that the genuine eBay already had. Because it is relatively simple to make a Web site look like a legitimate organizations site by mimicking the HTML code, the scam counted on people being tricked into thinking they were actually being contacted by eBay and were subsequently going to eBay’s site to update their account information. By spamming large groups of people, the “phisher” counted on the e-mail being read by a percentage of people who actually had listed credit card numbers with eBay legitimately.
Phishing, also referred to as brand spoofing or carding, is a variation on "fishing," the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.