Friday, October 28, 2011

Origin of famous Company Names

There are many companies / brands / products whose names were derived from strange circumstances.
Mercedes
This was actually the financier’s daughter’s name.
Adobe
This came from name of the river Adobe Creek that ran behind the house of founder John Warnock.
Apple Computers
It was the favorite fruit of founder Steve Jobs. He was three months late in filing a name for the business, and he threatened to call his company Apple Computers if the other colleagues didn’t suggest a better name by 5 O’clock.
CISCOIt is not an acronym as popularly believed. It is short for San Francisco.
Compaq
This name was formed by using COMp, for computer, and PAQ to denote a small integral object.
Corel
The name was derived from the founder’s name Dr.Michael Cowpland. It stands for COwpland REsearch Laboratory.
Google
The name started as a joke boasting about the amount of information the search-engine would be able to search. It was originally named ‘Googol’, a word for the number represented by 1 followed by 100 zeros.
After founders- Stanford graduate students Sergey Brin and Larry Page presented their project to an angel investor, they received a cheque made out to ‘Google’
Hotmail
Founder Jack Smith got the idea of accessing e-mail via the web from a computer anywhere in the world. When Sabeer Bhatia came up with the business plan for the mail service, he tried all kinds of names ending in
‘mail’ and finally settled for hotmail as it included the letters “html” – the programming language used to write web pages. It was initially referred to as HoTMaiL with selective uppercasing.
Hewlett Packard
Bill Hewlett and Dave Packard tossed a coin to decide whether the company they founded would be called Hewlett-Packard or Packard-Hewlett.
Intel
Bob Noyce and Gordon Moore wanted to name their new company ‘Moore Noyce’but that was already trademarked by a hotel chain so they had to settle for an acronym of INTegrated ELectronics.
Lotus (Notes)Mitch Kapor got the name for his company from ‘The Lotus Position’ or ‘Padmasana’. Kapoor used to be a teacher of Transcendental editation of Maharishi Mahesh Yogi.
MicrosoftCoined by Bill Gates to represent the company that was devoted to MICROcomputer SOFTware. Originally christened Micro-Soft, the ‘-’ was removed later on.
Motorola
Founder Paul Galvin came up with this name when his company started manufacturing radios for cars. The popular radio company at the time was called Victrola.
ORACLE
Larry Ellison and Bob Oats were working on a consulting project for the CIA (Central Intelligence Agency). The code name for the project was called Oracle (the CIA saw this as the system to give answers to all questions or something such). The project was designed to help use the newly written SQL code by IBM. The project eventually was terminated but Larry and Bob decided to finish what they started and bring it to the world. They kept the name Oracle and created the RDBMS engine. Later they kept the same name for the company.
Sony
It originated from the Latin word ’sonus’ meaning sound, and ’sonny’ a slang used by Americans to refer to a bright youngster.
SUNFounded by 4 Stanford Universitybuddies, SUN is the acronym for Stanford University Network. Andreas Bechtolsheim built a icrocomputer; Vinod Khosla recruited him and Scott McNealy to manufacture computers based on it, and Bill Joy to develop a UNIX-based OS for the computer.
Yahoo!
The word was invented by Jonathan Swift and used in his book ‘Gulliver’s Travels’. It represents a person who is repulsive in appearance and action and is barely human. Yahoo! Founders Jerry Yang and David Filo selected the name because they considered themselves yahoos

Monday, October 24, 2011

Adobe Creative Suite CS5 Master Collection

Adobe Creative Suite CS5 Master Collection:
Adobe Creative Suite is a set of professional creative tools for delivery of design across Media. Make a work for Virtually any screen, Mobile, Tablet to HD Display.

What's Inside:
  • Adobe Photoshop CS5 Extended
  • Adobe Illustrator CS5
  • Adobe InDesign CS5
  • Adobe Acrobat CS5
  • Adobe Flash Catalyst CS5
  • Adobe Flash Professional CS5
  • Adobe Flash Builder 4.5 Premium Edition
  • Adobe Dreamweaver CS5
  • Adobe Fireworks CS5
  • Adobe Contribute CS5
  • Adobe Premier CS5
  • Adobe After Effects CS5
  • Adobe Audition CS5
  • Adobe Onlocation CS5
  • Adobe Encore CS5
  • Adobe Bridge CS5
  • Adobe Device Central CS5
  • Adobe Media Encoder CS5
  • Integrates with - CS Live Online services 1.2

Installation Instructions:
1./ Install Adobe Master Collection
2./ Use XFORCE keygen to generate your serial
3./ When the installation is finished
Execute "disable_activation.cmd" from Win folder(double click on it)
(in vista or Win7, run it as admin if you have uac enabled)
4./Enjoy it
Hope this will help you. 


Please download both the files give below:






Sunday, October 23, 2011

Resident Evil 5 (PC)



Resident Evil 5 (2009/PCDVD/MULTI9/ENG/RUS/Lossless/RePack)
Year: 2009 | Developer: Capcom Entertainment | Publisher: Capcom Entertainment | PC |
Language: English Russian Etc | Genre: Action (Shooter) / 3D / 3rd Person | File Size : 3.38 GB |

A professional soldier Chris Redfield the well-known players from the previous parts Resident Evil does not leave hope to wipe out all traces of activity which has for decades engaged in developing biological weapons. So far all studies on the establishment of the army invulnerable monsters fizzle but the mad scientists are optimistic and continue to conduct cruel experiments on living people. In search of truth the main character goes to a small African village and discovers hundreds of people affected by another experimental virus. Poor things have changed not only externally but also internally: pursued by severe hunger they attack anything that moves. The virus has turned patients into ideal murderers having made their bodies much stronger and sturdier. And very soon Chris and his companion Sheva Alomar will have to face serious opponents little resembling mindless ghouls from previous games Resident Evil ...

Features
- Sense and Sensibility. It is extremely dangerous and aggressive enemies significantly increased their intelligence and reaction speed in addition they learned to find common ground with like-minded and able to join in the group.
- The power and accuracy. An impressive arsenal of military heroes such as knives pistols machine guns sniper rifles and more.
- Dream and reality. Modern graphic effects unprecedented level of detail some know-how in the processing of lighting and shadows.

Features RePack
- Nothing is converted / not cut
- Installation time ~ 25 minutes

Install and run
- run Setup.exe
- Installed by following the instructions of the installer
- Play!

System requirements:
- Operating System: Windows XP SP3 / Windows Vista / Windows 7
- Processor: Intel 3.0 GHz / AMD 2.5 GHz
- Memory: 1 GB (Windows XP) / 2GB (Windows Vista / Windows 7)
- Video: 256 Mb memory compatible c Direct 9.0
- Sound Card: DirectX 9.0c compatible
- Free space on hard disk: 8 GB

Screenshots:




Download Links:

Fileserve:
http://www.fileserve.com/file/9Yf3ZpS/R-E-V-2009-PC-MULTI9-ENG-RUS.part1.rar
http://www.fileserve.com/file/5H2bpkH/R-E-V-2009-PC-MULTI9-ENG-RUS.part2.rar
http://www.fileserve.com/file/e5fryjF/R-E-V-2009-PC-MULTI9-ENG-RUS.part3.rar
http://www.fileserve.com/file/u8acSGp/R-E-V-2009-PC-MULTI9-ENG-RUS.part4.rar
http://www.fileserve.com/file/sCg3qfz/R-E-V-2009-PC-MULTI9-ENG-RUS.part5.rar
http://www.fileserve.com/file/7WHM65Y/R-E-V-2009-PC-MULTI9-ENG-RUS.part6.rar
http://www.fileserve.com/file/3GHaUqR/R-E-V-2009-PC-MULTI9-ENG-RUS.part7.rar
http://www.fileserve.com/file/xcS9HVZ/R-E-V-2009-PC-MULTI9-ENG-RUS.part8.rar

File Jungle:
http://www.filejungle.com/f/fsHvth/R-E-V-2009-PC-MULTI9-ENG-RUS.part1.rar
http://www.filejungle.com/f/KSxqFb/R-E-V-2009-PC-MULTI9-ENG-RUS.part2.rar
http://www.filejungle.com/f/JJd2pm/R-E-V-2009-PC-MULTI9-ENG-RUS.part3.rar
http://www.filejungle.com/f/dgXFdb/R-E-V-2009-PC-MULTI9-ENG-RUS.part4.rar
http://www.filejungle.com/f/rVGjWV/R-E-V-2009-PC-MULTI9-ENG-RUS.part5.rar
http://www.filejungle.com/f/UQqCzv/R-E-V-2009-PC-MULTI9-ENG-RUS.part6.rar
http://www.filejungle.com/f/tpZG72/R-E-V-2009-PC-MULTI9-ENG-RUS.part7.rar
http://www.filejungle.com/f/876Psj/R-E-V-2009-PC-MULTI9-ENG-RUS.part8.rar

WUpload:
http://www.wupload.com/file/610963331/R-E-V-2009-PC-MULTI9-ENG-RUS.part1.rar
http://www.wupload.com/file/610966011/R-E-V-2009-PC-MULTI9-ENG-RUS.part2.rar
http://www.wupload.com/file/610969336/R-E-V-2009-PC-MULTI9-ENG-RUS.part3.rar
http://www.wupload.com/file/610977311/R-E-V-2009-PC-MULTI9-ENG-RUS.part4.rar
http://www.wupload.com/file/610977931/R-E-V-2009-PC-MULTI9-ENG-RUS.part5.rar
http://www.wupload.com/file/610982761/R-E-V-2009-PC-MULTI9-ENG-RUS.part6.rar
http://www.wupload.com/file/610987206/R-E-V-2009-PC-MULTI9-ENG-RUS.part7.rar
http://www.wupload.com/file/610988846/R-E-V-2009-PC-MULTI9-ENG-RUS.part8.rar

Filesonic:
http://www.filesonic.com/file/2680422834/R-E-V-2009-PC-MULTI9-ENG-RUS.part1.rar
http://www.filesonic.com/file/2680423074/R-E-V-2009-PC-MULTI9-ENG-RUS.part2.rar
http://www.filesonic.com/file/2680427144/R-E-V-2009-PC-MULTI9-ENG-RUS.part3.rar
http://www.filesonic.com/file/2680432304/R-E-V-2009-PC-MULTI9-ENG-RUS.part4.rar
http://www.filesonic.com/file/2680434984/R-E-V-2009-PC-MULTI9-ENG-RUS.part5.rar
http://www.filesonic.com/file/2680439984/R-E-V-2009-PC-MULTI9-ENG-RUS.part6.rar
http://www.filesonic.com/file/2680440414/R-E-V-2009-PC-MULTI9-ENG-RUS.part7.rar
http://www.filesonic.com/file/2680441994/R-E-V-2009-PC-MULTI9-ENG-RUS.part8.rar
 

InternetDownloadManager (IDM) v6.07(Multi-lingual) Final + Crack

InternetDownloadManager (IDM) is a tool to increase download speeds, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.

IDM has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download accelerators and managers that segment files before downloading starts, Internet Download Manager segments downloaded files dynamically during download process. Internet Download Manager reuses available connections without additional connect and login stages to achieve better acceleration performance.

Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, directories with authorization, MP3 audio and MPEG video content processing, and a large number of directory listing formats. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.

Some features of IDM:

* IDM supports all popular browsers and applications. It can also be integrated into any 3rd party Internet applications.
* When you click on a download link in a browser, IDM starts the download and accelerate it. It supports HTTP, FTP and HTTPS protocols.
* IDM can accelerate downloads by up to 5 times due to its dynamic file segmentation technology.
* IDM can also resume unfinished download from the place where they were left off.
* Antivirus checking makes your downloads free from all kinds of viruses and trojans.
* Advanced Browser Integration. can be used to catch any download from any application. No other download managers have this interesting feature.
* IDM can connect to the Internet at a set time, download the files you want, disconnect, or shut down your computer when all the downloads are done.
* IDM supports many types of proxy servers. For instance, IDM works with Microsoft ISA, and FTP proxy servers.
* IDM supports main authentication protocols like Basic, Negotiate, NTLM, and Keberos. Therefore, It can access many Internet and proxy servers using login name and password.

What's new in version 6.07 Build 12:
* Added support for Firefox 8
* Improved video discovery on youtube
* Fixed bugs

Multilingual: English, Spanish, French, Italian, Deustch, Japanese, Portugues, etc
Compatible with: Windows 95/98/Me/2000/NT/XP/2003/Vista/Server 2008/7 (32/64-bit)



Avira Antivirus Premium 2012 + Crack

Avira AntiVir Premium protects you against all threats i.e., viruses, worms, trojans, rootkits, phishings, adware, spyware, bots. It has best detection rates and high-class security with tons of updates every day.
It includes basic antivirus protection, email protection (POP3), AntiPhishing, AntiSpyware, AntiAdware and more. With real-time scanning and scheduling of full system scanning and several updates it offers premium and high protection. It includes a POP3 based Mail Scanner that scans all your emails before they are stored on your Work Station. With a user-friendly control center, quarantine management, fast performance and high detection rates the Avira AntiVir Premium provides essential protection for your PC and Laptop.

AntiVir Personal offers high and effective protection against computer viruses for the individual and private use on a single PC-workstation. It detects and removes viruses and includes an Internet-Update Wizard for easy updating.



Friday, October 21, 2011

[Tech] Steve Jobs vowed to 'Destroy' Android

The Apple Co-founder (Steve Jobs) who died earlier this month of Pancreatic Cancer, was enraged by Google's Android, the best selling Operating System.

"I will spend my last breath and I will spend every penny of Apple's $40 billion in the Bank, to right this wrong." He told Walter Isaacson, the author of an official biography to be published in United States.

"I'm going to Destroy Android as it is a Stolen Product. I am willing to go Thermonuclear war on this."

Apple has been engaged in a battle with Google's manufacturing partners like Samsung for over a year. His official Biography is the first time Mr. Jobs personal anger over the dispute has been revealed.

Apple has alleged that Samsung Smartphones and Tablets are copies of iPhone and iPad.

Apple has also targeted HTC and Motorola which Google bought. That was widely seen as an attempt to destroy Android by acquiring Motorola's patent portfolio.

The iPhone was unveiled in January and promoted the Smartphone Revolution.

At that time, Eric Schmidt (the Chief Executive of Google) resigned as the two firms became increasingly fierce rivals.

In Mar 2010, Mr Jobs and Mr. Schmidt were pictured at a coffee meeting in Palo Alto. Referring against the HTC Handset, Mr. Jobs told Mr. Schmidt : "I don't want your Money, If you offer me $5 billion, I won't take it."
     "I have got huge money. I want you to stop using Apple's Ideas on Android."

Monday, October 17, 2011

How to Hack a Computer - Cain and Cable

Cain and Abel (sometimes called simply "Cain") is a Windows password recovery tool. It can recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks. Cryptanalysis attacks are done via rainbow tables which can be generated with the winrtgen.exe program provided with Cain and Abel. Cain and Abel is maintained by Massimiliano Montoro.Kumar has already posted about how to use Cain and Abel to hack Networks.

Cain & Abel is a useful tool for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons. 

How to hack a Computer with Cain and Able

  • This hack will only work for Computers connected on LAN.
  • First of all download Cain and Abel Software.
  • Now install the software and open it . Make sure that you dont have any active antivirus on your pc.
  • First Click the Sniffer Tab.
  • Now Click on the sniffer button in the top toolbar. On clicking ,the sniffer will start.
  • Now click on + button to add the range of ip address you want to hack on LAN. Like in my hostel my ip is something like 15.15.15.04 so I have given the range from 15.15.15.1 to 15.15.15.254 .
  • Tick the option which says " All Tests ".
  • Click OK and you will see the software will start all the test.
  • After completion of these tests you will see the MAC Addresses ,IP addresses and OUI fingerprints of all computers running in your LAN .
  • Now click on APR tab below.In APR there are two windows .
  • Click on the above window and the + button will appear above .Now Click that button and a new window will open.
  • Left side window will show all the ip addresses and right window will be empty.
  • Click on any IP address in the Left Window and all other IPs will automatically appear in right window.Suppose I click on 15.15.15.1 .
  • Press Cntrl and select all the ips in the right window and Click OK.
NOTE: What you are doing ? Actually you are going to poison all the other ips using 15.15.15.1 . In this way you will be totally safe . If someones tries to know who is poisoning then he will get the ip of 15.15.15.1 and you are safe here :)
  • All these ips will be shown in above window.
  • Now Click on APR Button in the top toolbar and as you click on that button poisoning will start.It will show in the below window.
  • Now click on the Password tab below.
  • In the left  list you will see HTML .Click on it.
  • Hurrah you got the passwords of all the PCs and also the sites they have recently visited .
NOTE: APR poisoning is very dangerous , and during this hack your LAN is fully loaded and it affects the speed a lot .

Status with Virus Scanners

  • Some virus scanners, notably Avast! detect Cain and Abel as 'malware' "Win32:Cain-B [Tool]". It's classified in Avast! as "Other potentially dangerous program". 
  • The author, and owner of oxid.it states that his programs are not Malware. Even if Cain's install directory, as well as the word "Cain", are added to Avast's exclude list, the real-time scanner will stop Cain from functioning. 
  • The latest version of Avast no longer blocks

Attacks Available in Cain and Abel

  • The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs Man-in-the-Middle attacks. 
  • The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. 
  • The new version also ships routing protocols authentication monitors and routes extractors.
  • Dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.

Features

  • WEP cracking
  • Speeding up packet capture speed by wireless packet injection
  • Ability to record VoIP conversations
  • Decoding scrambled passwords
  • Calculating hashes
  • Traceroute
  • Revealing password boxes
  • Uncovering cached passwords
  • Dumping protected storage passwords
  • ARP spoofing
  • IP to MAC Address resolver
  • Network Password Sniffer

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More