Ahmed Hassan

Ahmed Hassan

Ahmed Hassan

Ahmed Hassan

Ahmed Hassan

Thursday, 20 December 2012

DFX Audio Enhancer 11.106 + (36) Skin Pack


DFX Audio Enhancer boosts the sound quality of all of your music, videos, Internet radio, games, and other programs. Simply turn on DFX and be immersed in HD quality sound.


3D Surround Sound
Immerse yourself inside the music 

Booming HyperBass
Produce deeper, richer bass 

Stereo Ambience
Renew lost stereo depth and body 

High Fidelity Restoration
Eliminate that ΓÇ£muffledΓÇ¥ sound 

Dynamic Audio Boost
Pump up the volume to new heights 

Spectrum Analyzer
ΓÇ£SeeΓÇ¥ DFX enhance your sound 

Headphones Optimization
Hear more pleasant, natural sounds with headphones 

Multiple Processing Modes
Optimize sound quality for music, speech and other audio types 

Customizable Audio Presets
Select from many factory-tuned settings or create your own 

Preset to Song Association
Get the perfect sound for each song you play

New DFX 11 now enhances all PC audio playback, providing system-wide HD quality sound for all your entertainment.
Music, Video, Game Websites 


YouTube



Pandora



Netflix



Hulu



Vimeo



Last.fm



Amazon.com



Facebook



Yahoo!



TuneIn Radio



VEVO



iTunes Trailers



And every website



Media Players, Video Chats, Programs 



iTunes



Spotify



Windows Media Player



Skype



VirtualDJ



VLC media player



Winamp



QuickTime Player



RealPlayer



DivX Player



GOM Player



JetAudio



And every program

download from here

Hard Drive Inspector v4.1.145 Pro and for Notebooks

Hard Drive Inspector a powerful and effective in the work program that allows you to easily monitor the status of your PC hard 
disk. Through the use of technology SMART, Hard Drive Inspector allows you to predict the possible failure of the HDD before 
it happens, that allows you to create backups of important information and save it. The program has flexible settings, allowing 
the utility to completely customize to fit their needs
download from here

Saturday, 15 December 2012

IGI-2 COVERT STRIKE - PC GAME - HIGHLY COMPRESSED

In this sequel to the award-winning Project IGI: I’m Going In, players assume the role of British covert operative David Jones, a former SAS soldier now working for the secret U.S. military organization codenamed ‘IGI’. Set directly after the events of the original game, Jones undertakes top-secret military operations by infiltrating airbases, harbors, and secret government installations located deep within enemy territories
IGI 2 boasts an action-packed single player campaign, featuring enhanced AI, a diverse range of weapon types and a newly implemented save system. Additionally, IGI 2 will offer intense team based multiplayer action. With an immersive storyline spanning across China, Russia and Libya, IGI 2 delivers a thinking-gamer̢۪s first-person shooter. Each action packed mission expands the plot and is driven forward with impressive animated cut scenes that continue to absorb the player in the game̢۪s carefully constructed narrative
 Minimum Requirements
                                                                                                                                                                                                                       Windows 98/ME/2000/XP/Vista/7

DirectX 8.1
Pentium III or Athlon at 700Mhz
128Mb RAM
Supported 32Mb Graphics Card
DirectX 8.1 Compatible Sound Card
8x CD-ROM
1.9Gb Hard Disk Space
(1.4Gb for game, 500Mb free after installation)
download from here

TOTAL OVERDOSE - PC GAME - HIGHLY COMPRESSED

In Total Overdose: A Gunslinger's Tale in Mexico, you can play as two brothers who are searching for their father's killer. Plumb the depths of Mexican drug trade, fighting lowlifes from the coast of California to jungle hideouts in Mexico. You can use a large arsenal of weapons and vehicles to get your revenge. Total Overdose: A Gunslinger's Tale in Mexico also includes a combat and stuntsystem that offers you more points for killing with st
system requirements
Windows:            Win 2000 or Windows XP/vista/7 (tested)


CPU:                    Pentium 1.5 GHz or AMD Athlon XP (1400 Mhz)
RAM:                  256 MB RAM
VIDEO:               DirectX 9 compatible graphics card
HD Space:           1.7 GB free space on hard disk

download from here

Monday, 10 December 2012

Internet Download Manager v6.11

Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performanc
how to install
run idman6.11-
 copy patch.exe and past it in C:\Program Files\Internet Download Manager and run it-
done and enjoy-
download from here

Sunday, 9 December 2012

angry birds

download angry birds from here

Lock your folders using Folder.Lock.6.5.2

Folder Lock is a  by passwordsnice file encryption software that can protect folders, lock files, protect USB 
Drives and CD/DVDs. The program supports Windows 7.0, Vista, XP and 2000

Folder Lock creates encrypted storages called 'Lockers'. You can keep your private files & folders in Locker and password protect it with a single click. Lockers are portable, so you can transfer, secure and backup these Lockers or keep them in USB Drives, CD/DVD, & notebooks or transfer them over email. These Lockers are undeletable on the computer where Folder Lock is installed

You can create as many Lockers as you want. Different users can create different Lockers with different passwords as well. With Folder Lock, you can choose either to encrypt using 256-bit AES on-the-fly encryption or lock files, folders and drives anywhere on your computer. Each Locker can contain your encrypted files as well as your personal list of your locked items
Download here

How to crash small websites using RDOS | DOS tutorial

Have you ever wanted to DOS attack on a website. Here I am going to write about a tool which is really helpful but it wouldn't be effective on big servers

NOTE: Please do not try to this tutorial to harm any other's website. I will not be responsible in any case. If you are not agree, please leave this website without reading further tutorial
:you need to 
Port Scanner Download Here
Ip Hiding tool Download Here
:Follow these steps
 First of all you need to know the IP address of the website you want to crash Use ping command in windows to get the ip address of the website. pen CMD and enter ping www.website.com
see the snap
Now you have the IP address of the website.
 Now use Port scanner to check whether PORT 80 is open or not. If PORT 80 is not open choose another website to hack :P
otherwise you can crash this website

Now open your  rDos. Enter your victims ip that you got from step 1.
It will ask you for the port to attack use port 80 that’s why we scanned to make sure that 80 was open! If it is closed it will not work

Create your own Virus using V-Maker

Today i am going to post about a virus creating tool. This tool is Virus Matic 2010 or in short V-Maker
Main Feature of V-Maker 
You can create your own prank files/viruses with ease by V-Maker.


    1. Disable Mouse and Keyboard
    2. Disable Regedit
    3. Delete System32
    4. Block Site
    5. Disable Task Manager
    6. Take Screen Shot Of Victim  PC
    7. Message Box (When User Click on Virus)
    8. Automatically Download Start (When User click on virus download start automatic)
    9. USB Spread
    10. Download here 

    Hack website using SQL map | automatic SQL injection tool

    Today i am going to write a sql injection tool. It's V 0.9 is just released. There are many changes in this tool from it's previous version. Sql injection is one of the top web application vulnerabilities. It's very important to check a website against this vulnerability.  

    sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections
    Download from here

    Vishing, a phishing attack over VoIP protocol

    phishing is the main trick used for hacking email account, facebook and twitter accounts. This trick is used with social engineering for hacking. I think phishing is the best way to hack any account. Today i am going to write about phishing but over VoIP protocol. It is called vishing. Vishing term is the combination of "VOice" with "Phishing".

    This trick use the trick of caller ID spoofing to make a call which looks like calles coming from a valid user with valid phone number. Vishing trick exploits the people's trust on the telephone service and caller id. A normal user do not know about caller id spoofing so he can easily be the victim of this attack. Vishing attack is used to steal credit card numbers or other personal information used in identity theft schemes from individuals.

    Example of vishing
    Wardialing: This is when attacker uses an automated system to call a specific area codes with a message of a local bank. Once victim answers the call, recording begins, requesting that the listener enter bank account, credit, or debit card numbers, along with PIN codes.
    Caller ID Spoofing: This is the trick for cell phone network to display a false number on the recipient’s caller ID. A number of companies provide tools that facilitate caller ID spoofing. These tools are typically used to populate the caller ID with a specific bank.
    VoIP: Voice over Internet Protocol, or VoIP, is an Internet-based phone system that can facilitate vishing by allowing multiple technologies to work in tandem. Vishers are known to use VoIP to make calls, as well as to exploit databases connected to VoIP systems.

    denial-of-service (DoS) attack

    In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts (banking, etc.), or other services that rely on the affected computer
    The most common and obvious type of DoS attack occurs when an attacker "floods" a network with information. When you type a URL for a particular website into your browser, you are sending a request to that site's computer server to view the page. The server can only process a certain number of requests at once, so if an attacker overloads the server with requests, it can't process your request. This is a "denial of service" because you can't access that site.
    An attacker can use spam email messages to launch a similar attack on your email account. Whether you have an email account supplied by your employer or one available through a free service such as Yahoo or Hotmail, you are assigned a specific quota, which limits the amount of data you can have in your account at any given time. By sending many, or large, email messages to the account, an attacker can consume your quota, preventing you from receiving legitimate messages.

    How do you avoid being part of the problem

    Unfortunately, there are no effective ways to prevent being the victim of a DoS or DDoS attack, but there are steps you can take to reduce the likelihood that an attacker will use your computer to attack other computers:
    • Install and maintain anti-virus software.
    • Install a firewall, and configure it to restrict traffic coming into and leaving your computer.
    • Follow good security practices for distributing your email address. Applying email filters may help you manage unwanted traffic.

    Saturday, 8 December 2012

    What are Anonymous mails and How to send It

    Anonymous Mails

    Anonymous mails are those emails which has been sent from a third party server and does not disclose the originator of email. In anonymous emails, email recipient will remain unaware of the sender's identity.

    These kind of emails are used by hackers to spread spam and phishing attack
    here are many websites that allows users to send anonymous mails. They also have ability to omit data from emails that can be address, the message path from sender to receiver and the time stamp. This make it difficult to identify the email.
    By using these kind of anonymous mail sender websites, we can send emails that pretends to be come from some fake email address which either exists or not. We can also send emails from email id of our friend without knowing his password.

    How to send Anonymous Mails

    There are so many websites are available which allow us to send Anonymous Mails from their server. All these websites are free and does not charger anything. We only need to submit a simple form to send the free anonymous email.
                                                 These are some popular websites that are used to send fake emails.
    • http://www.sendanonymousemail.net/
    • http://www.anonymailer.net
    • http://emkei.cz/
    If you need more, you can search on Google. You will get hundreds of results for fake emails and anonymous email websites.

    How To Create Your Own Anonymous Email Sender

    You can also create your own website to send fake or anonymous emails. If you know PHP, you can create your own script that can send fake emails.
    If you do not know how to code that Anonymous email sender website, you can download the free available script
                             Download Anonymous Email Sender Script
    Download the script from the link above and upload it to your web host. You web host must support email sending php function. This script also records each messages being sent and stores it in the database. 
    What do you think about this? Do you know some better way of sending fake emails? Share your views with us. 

    system speed booster



    With System Speed Booster you will be able to improve how your computer works. Download System 
    Speed Booster free and carry out a cleaning on your computer
       To download click here

    Andriod applications pack

                                  To download click here

    Andriod Browsers



    download andriod browser opera -firefox-chrome
    Google Chrome from here
    mozila firfox from here
    opera mini from here

    Adobe flash player for andriod

    Adobe® Flash® Player is a cross-platform browser-based application runtime that delivers uncompromised viewing of expressive applications, content, and videos across screens and browsers.
    Flash Player is optimized for high performance on mobile screens and designed to take advantage of native device capabilities, enabling richer and more immersive user experiences
    To download click here

    google chrome

    google chrome

    Google Chrome is a freeware web browser  developed by Google that uses the WebKit layout engine. It was released as a beta versionfor Microsoft Windows on September 2, 2008, and as a stable public release on December 11, 2008. As of September 2012, according to StatCounter, Google Chrome had 34% worldwide usage share of web browsers making it the most widely used web browser.W3Counter indicated that Chrome became the leading browser globally in August 2012 with 28% marketshare.However, Net Applications indicates 
    that Chrome is only third when it comes to the size of its user base, behind Internet Explorer and Firefox
    download from here

    Game booster

    IObit game booster
    Getting the absolute best performance out of your system and games isn’t rocket science but it can sure be tough to figure out. In partnership with IObit, Razer Game Booster is your simple yet power solution. All it takes is a click of a button, and it will automatically enhance the state of your system and focus all its resources purely for gaming, allowing you to zone in on your game the way it’s supposed to be played without wasting time searching online for the best game settings or configurations
    To download click here

    Unlocker

    Unlocker
    Unlocker is a tool that can trace and "unlock" the locking protection commonly used in system files. However, its main use is to terminate theprocesses that are using a certain file, or force the processes to stop using the file, so the user can safely delete, rename or move the file. It is written by the French programmer Cedrick 'Nitch' Collomb
    download unlocker from here

    Vmware player

    VMware is a company that provides virtualization software for x86-compatible computers. VMware Inc. is a subsidiary of EMC Corporation and has its headquarters in Palo Alto, California. The term "VMware" is often used in reference to specific VMware Inc. products such as VMware Workstation, VMware Virtual Desktop Infrastructure, VMware Player and VMware Server
                                               
                                        download vmware from here

    ccleaner professional

                                  ccleaner professional include crack

    from here

    Android 4.2: A new flavor of Jelly Bean.


             Andriod jelly bean is out more information here

    Advanced SystemCare

     Advanced system care full version
     from here  serials from here

    Tune Up Utilies 2013

     [Tune Up Utilies 2013 [Full Version
    from here