Saturday, August 7, 2010

WikiLeaks - where sensitive documents go public


WikiLeaks is a multi-jurisdictional public service designed to protect whistleblowers, journalists and activists who have sensitive materials to communicate to the public. Since July 2007, we have worked across the globe to obtain, publish and defend such materials, and, also, to fight in the legal and political spheres for the broader principles on which our work is based: the integrity of our common historical record and the rights of all peoples to create new history.

http://wikileaks.org/

This site has now been moved to a diff domain
                                                                                wikileaks.ch

Sunday, August 1, 2010

Get verified torrents on VERTOR


What is Vertor?
VERTOR (VERified TORrents) is the new generation torrent site that provides users with links to verified torrent files. All the torrents collected here were checked for viruses, passwords, DRM protection and more. Music files were cut to give users the option of preview, screenshots for video files were made. All the files here are 100% verified and safe to download! If you want to know more, click here.

www.vertor.com/

Saturday, July 31, 2010

Home 2009 Movie legally free on torrents and youtube


Home is a 2009 documentary by Yann Arthus-Bertrand. The film is almost entirely composed of aerial shots of various places on Earth. It shows the diversity of life on Earth and how humanity is threatening the ecological balance of the planet. The movie was released simultaneously on June 5, 2009 in cinemas across the globe, on DVD, Blu-ray, television, and on YouTube. Opening in 181 countries, the film broke the world record for the largest film release in history.

There is no business on this movie. It is available for schools, cities, NGOs and you." This means the film can be distributed, copied, uploaded, burned to DVD, etc., without restrictions if not altered or edited.

http://www.imdb.com/title/tt1014762/



You can Download from torrents from the below link
http://www.clearbits.net/torrents/547-home-2009


or watch it on youtube . Other languages also available
http://www.youtube.com/user/homeproject

Friday, July 30, 2010

THE CORPORATION movie free on P2P Officially


Provoking, witty, stylish and sweepingly informative, THE CORPORATION explores the nature and spectacular rise of the dominant institution of our time. Part film and part movement, The Corporation is transforming audiences and dazzling critics with its insightful and compelling analysis. Taking its status as a legal "person" to the logical conclusion, the film puts the corporation on the psychiatrist's couch to ask "What kind of person is it?" The Corporation includes interviews with 40 corporate insiders and critics - including Noam Chomsky, Naomi Klein, Milton Friedman, Howard Zinn, Vandana Shiva and Michael Moore - plus true confessions, case studies and strategies for change.

For More:http://www.thecorporation.com/index.cfm?page_id=2
http://www.thecorporation.com/


DOWNLOAD HERE

Video tutorial on how to download from torrents CLICK HERE

PS:If you still dont know how to download from torrents ask in the comment section

THE YES MEN FIX THE WORLD movie free on P2P officially



THE YES MEN FIX THE WORLD is a screwball true story about two gonzo political activists who, posing as top executives of giant corporations, lie their way into big business conferences and pull off the world's most outrageous pranks. This peer-to-peer special edition of the film is unique: it is preceded by an EXCLUSIVE VIDEO of the Yes Men impersonating the United States Chamber of Commerce. Because the Yes Men are being sued for this stunt, p2p is the only way that this film will get seen. Please spread the word!

Download here:
http://vodo.net/yesmen

Video tutorial on how to download from torrents CLICK HERE

Note: if you still dont know how to then ask in the comment section.


Wednesday, June 2, 2010

Process Explorer



The Process Explorer display consists of two sub-windows. The top window always shows a list of the currently active processes, including the names of their owning accounts, whereas the information displayed in the bottom window depends on the mode that Process Explorer is in: if it is in handle mode you'll see the handles that the process selected in the top window has opened; if Process Explorer is in DLL mode you'll see the DLLs and memory-mapped files that the process has loaded. Process Explorer also has a powerful search capability that will quickly show you which processes have particular handles opened or DLLs loaded.

The unique capabilities of Process Explorer make it useful for tracking down DLL-version problems or handle leaks, and provide insight into the way Windows and applications work.

A great tool to use when your task manager is disabled.

DOWNLOAD

Sergwia - Anti viral Tool kit (Remove restrictions caused by viri!)



It helps in removing restrictions which are also caused due to virus infections:

1 - Disable Folder Options >> so the user can't set the option to show hidden files!

2 - Disable Registry Tools >> so the user can't see what is going on during system startup!

3 - Disable Ctrl+Alt+Del >> so the user can't see the virus and the other applications running!

4 - Disable Show hidden files & folders >> so the user can't see the malware bodies which always come with hidden attribute set to true!

5 - Disable Run Command >> so the user can't use it to run some tools to track the virus activites of remove it.

6 - Disable Windows Firewall (SharedAccess) >> so the virus can send & receive any data through the network without the attention of the user!

7 - Disable Windows Firewall (Wscsvc) >> so the virus can send & receive any data through the network without the attention of the user!

8 - Disable Windows Firewall (Wuauserv) >> so the virus can send & receive any data through the network without the attention of the user!

9 – Restrict Internet Explorer Home Page Changing >> so the user can't change the malicious web page set by the malware!

10 – Restrict Internet Explorer Closing >> so the user can't close the pops up windows that appear when visiting the malicious web page or any other website!

11 – Hide Internet Options >> so the user can't change any setting set by the malware!

12 – Hide Internet Explorer Address Bar >> so the user can't see what web page being visited and what scripts being executed!

13 - Restrict Internet Explorer Right Click >> so the user can't view the source of the page being visited and other useful things.

14 – Hide Internet Explorer Navigation Buttons >> so the user will be forced to user the keyboard shortcuts to navigate through the web sites!

15 - Hide Internet Explorer Context Menu >> so the user can't access this menu which make him able to select some useful settings.

16 - Hide Internet Explorer Toolbar >> so the user can't use it to remove some unwanted toolbars made by the malware.

17 - Disable Command Prompt (cmd.exe) >> so the user cannot run any console programs like command prompt removal tools...

18 - Disable Control Panel >> so the user cannot use the control panel applets.

19 - Hide system files/folders >> so the user can't see the malware bodies which usually come with system attribute set to true!

20 - Change Show Hidden files option button >> So even if you select "Show hidden files and folders from folder options these files & folder will not be shown!

21 - Disable Show System files check box >> So even if you unchecked "Hide protected operating system files" these files & folder will not be shown!

22 - Disable Show all files/folders check >> So changing this from folder options will be ignored!

23 - Hide Desktop items >> to prevent the user from accessing My Computer and other desktop shortcuts!

24 – Hide files extensions. This is commonly used by malware to trick the user. By hiding file extension, a user doesn't know whether a file with folder icon is an exe file or just an ordinary folder.

25 – Disable File Extensions Check >> So changing this from folder options will be ignored!

26 – Restrict Windows Update >> So the user cannot download security patches from Microsoft.

27 – Disable Shut Down CommandD >> So the user cannot shut down the system normally.

28 – Restrict Settings Folders >> Just imagine when you all items under Start menu>Settings wont run!

29 – Disable Taskbar context menu >> You right click your taskbar.. Oops; nothing happens!

30 – Disable Logoff Command >> So the user cannot logoff and use another profile.

31 – Hide Start Menu Logoff >> So the user cannot use this shortcut to logoff!

32 – Restrict Add/Remove Programs >> So the user cannot see what applications and windows components are installed or uninstall/reinstall any application.

33 – File Extension Default >> So the user cannot select "Hide extensions for known file types".

34 – No Windows Update >> So the user cannot download security updates and other fixes for windows.

35 – R-Media Malware >> This item is indicating that a malicious object is trying to invade your computer through removable media, please see the details below.

36 – Hidden Drives >> So the user cannot see any of the storage drives but they still can use RUN to access and explore them.

37 – Restricted Drives >> So the user can see the drives but cannot access them even when using RUN command.

38 – No Search >> So the user cannot search the file system using the start menu item for any file.

39 – No Display >> So the user cannot access the Display control Panel to change the display settings.

40 - Corrupted Safe Mode >> So the user be forced start the computer in normal mode where the virus always active.

41 - Execution Debugger >> So the user cannot run many security tools and antivirus software to get rid of the virus.

42 - Windows Security Center >> So the user cannot access many security settings.

DOWNLOAD

Tuesday, March 16, 2010

Get Cricket scores of all the matches around the world. Updated every second.Cricket Score Card Download


Live Cricket Scores
LIVE CRICKET

A small utility which can be used for tracking the Score of various International and Domestic cricket matches happening across the Globe , at real time. This tool lists available Matches and shows a brief updated score of a selected match. (42KB)

http://www.wisdombay.com/downs/LIVECricket.zip

Get IPL match's live scores . DOWNLOAD NOW!

Thursday, March 11, 2010

Text Crawler - Search and replace text in any number of files without opening them



TextCrawler is a fantastic tool for anyone who works with text files. This cool utility enables you to instantly find and replace words and phrases across multiple files and folders. It utilises a powerful Regular Expression engine to enable you to create sophisticated searches, perform batch operations, extract text from files and more. It is fast and easy to use, and as powerful as you need it to be.

http://www.digitalvolcano.co.uk/content/textcrawler

Tuesday, January 12, 2010

Learn Morse Code



Morse Code: a telegraph code in which letters and numbers are represented by strings of dots and dashes (short and long signals)
Learn Morse Code is designed to make it easy to learn Morse code, as well as improve
the skills of those who already know the code.


Features

* Accurate Morse code timing
* Thorough evaluation of code copied
* Customizable character set
* International characters
* Prosigns
* Selectable speed, pitch and volume
* Optional Farnsworth timing
* Creating Morse code audio files
* Generate Morse code from text files
* Practice selected characters
* Practice common words, abbreviations and Q codes
* Optional dual pitch for initial learning
* and more

http://www.justlearnmorsecode.com/download.html