Receive all updates via Facebook. Just Click the Like Button Below

Join The Community

Search

Tuesday 31 July 2012

Lock your PC in Single click


I like to do lock ur PC with a single click without gone to the several click on start, Click on shut down arrow and Lock.

Just follow several steps and u can lock with only single click..

  1. Right Click on desktop.
  2. Select  New and Shortcut.
  3. In the text box, type the following: rundll32.exe, user32.dll, LockWorkStation Click Next.
  4. Enter a Name like “Lock Workstation”. Click Finish.
  5. Right Click on Shortcut, Going to Change Icon, Select Lock icon.
  6. Now it is ready to use, just double click on it and your pc is locked. 
Enjoy :)

Thursday 26 July 2012

How to create hidden text files without any software?

How to create hidden text files without any software?

In this post i am going to share a trick using which you can create hidden text files .And you don't even have to install any software for this trick. You can do this just by using a notepad. And no one except you can open the file and view its contents as the file can only be accessed if you know the correct file name used while creation.

tep 1. Click on start menu>run > type cmd > and hit enter.


Step 2. Use Dos commands to change the directory and get in the desired folder.


Step 3.Now type in 
notepad visiblefilename.txt:hiddenfilename.txt  (you can use different names if you want)
You will be prompted to Create a New file click Yes as shown below.



Step 4. Now enter the data you want to hide , save the file and close notepad



Step 5.Visit the file-save location, you will see your visiblefilename.txt file there, you can open the file and enter any text of your choice as any other normal text file.


Step 6. To open and read/write youhidden file , type in the command notepad visiblefilename.txt:hiddenfilename.txt (change filenames with your own used during Step 3 above) at DOS command prompt and hit Enter.


Enjoy this trick friends and have fun!!! :D

All in one virus (prank)

Hard prank: Pick your poison batch file. It asks your friend to choose a number between 1-5 and then does a certain action:



1: Shutdown
2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown
Type in notepad:



@echo off
title The end of the world
cd C:\
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press 'x' then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc...
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you're boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two

Save it as "Anything.BAT" and send it.

You might wanna have to change the Icon of the file before sending it to your friend, so right click the file, click Properties, click on the 'Change' Icon and change the icon from there.

Detect keylogger installed on a computer


Q.What  are keyloggers?

Ans. Keylogger are the softwares that are being used by crackers(wrongly named as hacker) to spy on people. These kind of software keep record of all the keystrokes been made by the victim on his keyboard , and send it to the attacker.                        

Q.How does  keyloggers enters your computer ?

Ans.Your system can get infected by a keylogger in several ways(direct or indirect) :-

    It can be through....
1.     downloaded files ,
2.     music,or
3.     any other infected software applications.

Q.How to get rid of  keyloggers that is installed on a computer?

 Ans.
1.Use Anti keyloggers software
There are some anti keyloggers available on the internet that will make the task of removing keyloggers easy. Use these softwares if you think there is a high possibility of keyloggers on a computer. The anti keyloggers that i suggest 
 Cyberhawk.and
2Use updated antivirus and anti spyware
     Some of the good anti viruses have capability to detect key loggers. So you should update your     
     antiviruses regularly so that it gets updated for new keyloggers.

here i provide you with some links that would help you protect your pc
·         http://security.kolla.de/
·         http://www.clamwin.com


3Search for keyloggers yourself
Keyloggers have the capability that they hide them self from the user but are active in the background. There are some shortcuts that are used to see them live on screen
For example Ctrl + Alt + X or Ctrl + Alt + Wondows Key + X or desktopshark,ctrl+alt+shift+u  etc.4

4. Use special tools
1.KL-Detector
Freeware on demand keylogger scanner.
2.SnoopFree
Freeware antikeylogger that block hook based keyloggers as well as screen captures. For Windows XP.
3.PSMAntiKeyLogger
PSMAntiKeyLogger is a real-time protecting software which protects you against Keyloggers. No scanning is needed.
4.I HateKeyloggers
Freeware antikeylogger that block hook based keyloggers. For Windows 2000 and XP.

Note:-
There are basically two types of keylogger:-
 
1.simple keylogger:  This type of keylogger is installed in our computer to hack password of gmail,facebook e.t.c.but victim have to use your computer.
2.remote keylogger This type of keylogger create a virus and you just need to send it to your victim .and his whole pc is hacked





Wednesday 25 July 2012

Autorun Virus Remover 3.1 Build 0719




The program allows you to remove common viruses from flash drives, based on the automatic launch when you connect. If you have a problem or you want to scan your computer and protect it - this program to you. It does not require a conventional anti-virus software update their signature databases, which is particularly important when the computer is not connected to the Internet and is off-line. Uses very little resources and closes a window of vulnerability without affecting the environment and without disturbing the usual operation. Is 100% compatible with any application software. It works regardless of the level of training the user to easily and simply - once you install it and forget.

Autorun Virus Remover can detect and clean hundreds of usb / autorun viruses and it will block viruses and trojans trying to attack when USB device is inserted. Autorun Virus Remover provides 100% protection against any malicious programs trying to attack via USB storage (USB drive? USB stick? Pen drive? Flash drive? Flash card? Secure digital card? Removable storage? Portable storage? Ipod? Media player). Compare Autorun Virus Remover with other antivirus solutions, you will find out its highlights: Autorun Virus Remover provides 100% protection against any threats via USB drive, however, the majority of other products are unable even to guarantee 90% protection. Autorun Virus Remover can detect and clean the usb virus / worm / trojan such as Ravmon, auto.exe in your computer or usb drive, it could solve the problem that unable to open a drive by double clicking. It also removes the leftovers of virus by removing the autorun.inf files and cleaning up your system registry, so you won't see the autoplay item anymore.

100% protection against any malicious programs via USB storage
Autorun Virus Remover uses innovative proactive technology to block any threats via USB drive. There are relatively few products available in shops or on the Internet which offer even close to 100% protection against any malicious programs via USB drive. The majority of products are unable even to guarantee 90% protection. Autorun Virus Remover is the world's best software to block threats via USB drive.

The best solution to protect offline computer
Other antivirus software should update signature database regularly, and they cannot effectively protect offline computer that is not connected to the Internet. When new viruses, worms and other malicious attacks strike, traditional signatures are insufficient. Every minute one waits for a virus signature update creates a window of vulnerability that could have devastating consequences. Autorun Virus Remover uses advanced proactive detection techniques, requires no signature updates, and closes the window of vulnerability left open by other reactive, signature-based responses.

The world's fastest and smallest antivirus software
With Autorun Virus Remover, it's not necessary to sacrifice speed for detection and scanning. Compare antivirus software and you'll discover that Autorun Virus Remover is by far one of the smallest applications in the industry. For example, the Autorun Virus Remover installer is just 1 MB. The program utilizes approximately 1 to 7 MB of RAM.

100% compatible with all software
Incompatibility between antivirus programs is an issue. In the vast majority of cases, installing two antivirus programs from different vendors on one machine (for increased protection) is technically impossible, as the two programs will disrupt each other's functioning. However, Autorun Virus Remover is 100% compatible with all software, including Windows Vista.

Simple to use
Autorun Virus Remover has been specifically designed to perform effectively regardless of the user's level of computer expertise. Just install and forget it.

Open Multiple Facebook Accounts in Mozilla FireFox

Open Multiple Facebook Accounts in Mozilla FireFox

Sometimes u wanna to open 2 or more facebook,gmail,yahoo etc. accounts together in Mozilla firefox But U always unable to open !!! m i right ??
Here i m giving an simple trick by which u can open multiple accounts as u wish …

Follow these Steps only :

Step 1. Click on Start—>Run —> write as it is.

“C:\Program Files\Mozilla Firefox\firefox.exe” -no-remote -p —>Click OK
(Here it is showing the path of “Firefox.exe” file on the system, If in ur System this file at other places then plz give that path .)
One Window will pop up , like:
Step 2 .Click on “ Create Profile” then another window will pop-up like:
then Click on “Next” :
Enter Any name in the Empty box of “Enter new Profile Name” like here i m given “Digital TechPoint”—>click on “Finish” Button.
Step-3 .Then Start Your Firefox by as you open It will open firefox with Default User Profile,
After this again
Click on Start–>Run –>type “C:\Program Files\Mozilla Firefox\firefox.exe” -no-remote -p

Select The New Created Profile Like here: i have Choosen “Digital TechPoint” ,then Click on Start Firefox Button .
Now You can open Your different facebook account in different Browsers.!!!
Note :Like this u can create many Profile and opening Mozilla with these profile name u can open different accounts in different Browsers.

You May Like Digital TechPoint on Facebook: TechniAjzSelect The New Created Profile Like here: i have Choosen “Digital TechPoint” ,then Click on Start Firefox Button .
Now You can open Your different facebook account in different Browsers.!!!
Note :Like this u can create many Profile and opening Mozilla with these profile name u can open different accounts in different Browsers

Alien ware skin pack (theme) for windows 7


Support:
Windows 7 , Windows 7 SP1 - [X86 (32Bit)] - [All Language]

Note : Skin Packs installer have easy and safe install option , Please unistall old or other version of skin packs before install new version. Before install disable user account controller and close all runnig program , after finish restart your system.

http://adf.ly/BwGcf

Password

Monday 23 July 2012

WINDOWS 7 COMPRESSED ISO (10 MB)



The Windows 7 operating system shares many features and functions with Windows Vista. It also improves on Vista. Here is a list of features and functions that are unique to Windows 7: 
  • Action Center – allows users to see what alerts Windows 7 shows; a handy way to control those annoying UAC messages while not having to disable it.
  • Aero Shake – click and shake one open window and all others on the desktop will minimize. 
  • Aero Snap – drag a window to any edge of the display and it will automatically re-size. 
  • Aero Peek - point to the right edge of the taskbar to watch open windows turn transparent, revealing all your hidden icons and gadgets
  • Aero Templates, Themes – new backgrounds and themes unique and created for Windows 7 (including free additional themes downloadable from Microsoft). 
  • Device Stage - helps users interact with any compatible device connected to a Windows 7 computer; view device status and run common tasks from a single window. The key words here are "compatible devices."
  • Domain Join – helps business users quickly connect to different office networks.
  • Gadgets (Improved) – the Sidebar has been eliminated; Gadgets can be placed anywhere; New Gadgets have more functionality. 
  • Home Group – enables users to quickly and easily create home networks between computers using Windows 7. 
  • Jump Lists - right-click a program icon and see a list of recently used files that use that program.
  • Libraries - make it easier to find, work with, and organize documents, music, pictures, and videos scattered across your PC or network. 
  • Location-Aware Printing – if you travel between offices or home and office, this feature is handy: Windows 7 remembers which network and printer you're using and automatically switches the default printer to match the one you last used. 
  • Multiplayer Games – Microsoft has revived 3 XP multiplayer games: Internet Checkers, Internet Spades, and Internet Backgammon. 
  • Networking (Improved) – improved task bar widget that allows for quick network connection and configuration.
  • Play to function - right-click the music tracks you’d like to hear and select Play To. Play To works with other PCs running Windows 7 and devices compliant with the Digital Living Network Alliance (DLNA) media standard. 
  • Performance (Improved) – For Sleep mode to reconnect with Wireless Networks, limited background processes to those needed for currently used devices, faster desktop searching, and easier setup for external devices. 
  • Task Bar (Improved) - "pin" favorite programs anywhere on the taskbar; rearrange programs in any way you like by clicking and dragging. Point to a taskbar icon to see a thumbnail preview of open files or programs. Then, move your mouse over a thumbnail to preview the window full-screen. 
  • Windows Media Center (Improved) – a few new features and integrates with Home Group. 
  • Windows Media Player 12 – An upgrade from version 11 that plays the most popular audio and video formats—including new support for 3GP, AAC, AVCHD, DivX, MOV, and Xvid; also available by download, no doubt. 
  • Windows Touch – support for computer touchscreens.
  • Windows XP Mode – Allows an XP session of Windows to run so that Business applications will work within Windows 7 – however, will not work with most current Intel and some AMD-based computers.

Download windows 7 iso compressed into 10 MBs here and enjoy......


http://adf.ly/BwGb7

Sunday 22 July 2012

Create and Hack a Password Protected Folder without Software

Create and Hack a Password Protected Folder without Software

Securing Confidential Data is a basic requirement of everyone. This can also be done through available Softwares on Internet. Now i will share a method to Lock folders Without using any Software.This Trick will work in windows XP,Vista and Windows 7.

Why to Use this Method?

*. If you are afraid of getting Viruses through Softwares(This Technique is completely Safe ).
*. If you are using PC of someone else and want to do some prankand not having enough time to download and install Softwares.
*. If for some reason you are not able to Install Softwares on PC.

How to do it?

*. Open Notepad ( Start->Run->Notepad)
*. Copy the Code below and Paste it into Notepad .

cls
:End
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD
-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD
-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD
-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==computerplanet4u goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD
-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD
-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End

*. Password for the above batch file is set to computerplanet4u . You can change it to anything by editing computerplanet4u to your choice in following line:
if NOT %pass%== computerplanet4u goto FAIL

*. Now Save this file with a name anyname.bat (here .bat is the extension). I am choosing Kashyap.bat as my file name in this tutorial.
*. Now a Bat file is created.
*. Now double click on bat file and it will ask you for password and Enter Password (for the above code it is kashyap).
*. Now you will see a folder named LOCKER in the same location where you saved anyname.bat (kashyap.bat here) file.
*. Open it and fill it with the data you wanna hide.
*. When you are done with the above press Y in the bat file and hit Enter.
*. Now Close this Bat file window and locker folder will hide itself.
*. Again to Edit Locker Folder double click kashyap.bat file and enter password .

Downloading torrent files through IDM

Downloading torrent files through IDM | Trick To download torrent files faster using IDM

Hello To all friend .Today i am sharing a latest hacking trick which help you download any torrent files Through or using IDM Software in Fast way.

First You need to follow some few steps for do this .

1. In First step you need to download idm software and then install it in your pc .

2 Now, Go to www.zbigz.com website .

3. and now copy any torrent file link address .

4. Now paste link address in Upload box .

5. now click on go free button .

That's It guys now you are done.

Download Youtube Video without using any software

How To Download Youtube Videos Without Using Software

Friends as all youtube users knows that we have to use any software to download the youtube video from youtube official website.

Today in this post i m sharing such a nice working trick to download your desired youtube video without help of any software.

Just go to youtube.com.

Select your youtube video,whom to you want to download.i mean open that video.

Now remove the www from the youtube video's in address bar.

Just put the "ss"in the place of www in address bar.

Example,if your desire youtube video's add is-http://www.youtube.com/watch?v=tawWYv54hqw
Just replace it like this-http://ssyoutube.com/watch?v=tawWYv54hqw
Now hit the enter.
A new page will ask you for choose the format of video to download.

Select any format.
That's it.

iCare Data Recovery Software


iCare Data Recovery Professional

Besides all the basic functions, the professional edition adds on new features like free upgrading supported if new version released. It is especially useful when your computer encounters system/disk crashes and you need to reinstall iCare Data Recovery. And it could efficiently retrieve lost files from dynamic disk.

What's more? It could recover files from formatted drive, RAW file system, drive has not formatted error, RAW drive, undelete files emptied recycle bin, recover files due to partition lost, system crash, software crash, bad boot sector, missing boot sector, bad MBR, $MFT damaged, lost partition table, lost or damaged FAT, virus infections, power failure, and other unknown data loss...

iCare Data Recovery Professional works perfectly with hardware RAID and hard drive, USB drive, SD card, memory card, etc. It provides the comprehensive data recovery solution for computer users.


Partition Recovery--Recover files from lost partition, deleted partition, partition not detected by PC...


Advanced File Recovery--Recovering deleted files with original folders and names, not formatted drive or card... 


Deep Scan Recovery--RAW recovery module, recover files from bad boot sector, mbr, virus attack, damaged FAT... 


Format Recovery Recover files when drive says not formatted or has RAW error; restore from formatted drive, card...



Key Features of iCare Data Recovery Professional

Recover files from formatted partition, memory card, external drive, USB drive, sd card...
Recover 2TB disk
drive not formatted error and report RAW file system
Recover MAC files on Windows
Free lifetime upgrade once new edition released
Recover data when lost due to resize partition, merge partition, copy partition failure by PartitionMagic, Partition Manager...
It could restore photos, office files, zip files, rar files, emails, pdf files, etc.
Reformatted sd card, xd card, cf card, pen stick, memory card...
System cannot boot, cannot locate the boot partition, I/O error
external drive, memory card, cf card cannot be detected or recognized...
Virus attack and lost files
Bad boot sector, bad partition table, damaged FAT, lost File Allocation Table...
Recover files from FAT, NTFS partitions
Recover files from devices with unknown file systems including Hard Disk, external ZIP/USB drive, removable SmartMedia, MemoryStick, SD cards, etc.
Partition structures are damaged or deleted...



http://adf.ly/BwGTd

Password


Fantastic Space Universe Animated Wallpaper


Download and Enjoy this FREE Animated Wallpaper




Fantastic Space Universe Animated Wallpaper



Take a trip to Fantastic Space Universe, discover new life form and new galaxys with this amazing animated wallpaper.



Screenshots:




Features:


* 4 Fantastic Space Scenarios.
* High Quality Image and Effects.
* High Quality Space ambience sound.
* Support Settings Language: English, Deutsch, Français, Spanish.






OS: Windows 7, Vista, 2003, XP, 2000, 98, Me, NT


Howto Install Screensavers/Animated Wallpapers On Windows Vista / 7
Right-click in the program installer, and then click Run As Administrator


Enjoy!


http://adf.ly/BwGVj

Password


Advanced System Optimizer


OK  As we all know ( or you dont know) Advanced System optimizer is the best system utility for windows. some time back i had praised Tune up utilities a lot but now i take all that back. If you search Google for the best system optimizer you will get Advanced System Optimizer 2012 at the first search result  This is not what i sasy though this is what the reviews and the benchmarks say, where tuneup utilities is nowhere near.
Advanced System Optimizer has a long list of features and registry-repair tools to help improve your registry. This registry repair software offers extensive backup capabilities. It will automatically create a partial backup before making any change, so if a mistake accidently happens within the registry, you can undo the change and restore your entire system to its previous state. Advanced System Optimizer also offers individual undo capabilities, which allows you to make specific changes within the registry.


It has a registry defrag tool that helps get rid of fragments in your registry to increase the speed and performance of your dear little computer. This application also features exporting and importing capabilities, which allows you to save information in your registry as a text file and import to or export it from the registry.
It offers an undelete tool using which you can succesfully recover the by mistakely deleted files in a jiffy.
A startup manager,Malware protection this and that and blah blah blah. the list is endless and i can write soo much 
http://adf.ly/BwGRs

Send Anonymous emails

Send Anonymous emails to anyone around the world .Many times we want to skip our identity when sending Email.

When we Send Email from any email ID | email spoofer 

which can cross spam filter. 


There are many email spoofing websites

but no one guranteed for sending mail in inbox.

But this one is something different. 

You are able to send email from any email id and

that will surely be in the sender's inbox not in the spam. 

Features: 

1. Email Doesn't go in spam folder

2. Instant delivery of emails

3. With Attachment Support

4. With HTML Editor

5. And Many Other Features ...


U can use any of these website to send anonymous emails ;) 






warning: Please do not use this website for any type of cyber crimes.

don't use it in illegal works

enjoy your privacy.

Friday 20 July 2012

How to create codes of big emotions for facebook

Hello everyone, the owner of the tips and tricks is here with new facebook trick.

In this article i'll show you how to make codes of big pictures and use them  as a Facebook simile.

 Four steps are required :,

1. Go to this link
http://adf.ly/BwGEj and  browse  your picture

2.click on upload button


3. wait 1 or 2 min codes will appear  

codes : For example :, (copy these codes to and paste them into facebook chat box)

[[428312643902504]] [[428312640569171]] [[428312637235838]] [[428312630569172]] [[428312633902505]] [[428312723902496]]
[[428312710569164]] [[428312717235830]] [[428312713902497]] [[428312720569163]] [[428312797235822]] [[428312793902489]]
[[428312787235823]] [[428312800569155]] [[428312790569156]] [[428312877235814]] [[428312880569147]] [[428312870569148]]
[[428312873902481]] [[428312883902480]] [[428313040569131]] [[428313037235798]] [[428313030569132]] [[428313033902465]]
[[428313043902464]] [[428313130569122]] [[428313133902455]] [[428313147235787]] [[428313150569120]] [[428313153902453]]
[[428313287235773]] [[428313277235774]] [[428313283902440]] [[428313280569107]] [[428313290569106]] [[428313420569093]]

4.Copy and Paste the code to Facebook Chat

Thursday 19 July 2012

Hacking Process....

The Five Phase Approach of Malicious Hackers, typically approach an attack using five common phases. 
It is important to understand these phases of hacking attacks in order to better defend against them. Here we’ll discuss the five hacker phases to better understand them and how they relate to each other.

1. Reconnaissance:-
Before hacking your Online business or corporate infrastructure, hackers first perform routine and detailed reconnaissance. Hackers must gather as much information about your business and networks as possible. Anything they discover about their target (you) can be valuabe during their attack phases.

2. Scanning (Network & System):-
Hackers may be either general hackers or specialized hackers, such as phreakers, but their intent is majorily the same to access information and services that they should not gain access to. In many ways, this phase of network scanning is an extension of the reconnaissance phase. Hackers want to learn more about your network mapping, phone system structure, and internal informational architecture. Learning what routers, firewalls, IDS systems, and other network components exist can lead hackers to beneficial hacking information by researching known vulnerabilities of known network devices. Typically, hackers perform port scans and port mapping, while attempting to discover what services and versions of services are actively available on any open or available ports.

3. Gaining Access:-
Open ports can lead to a hacker gaining direct access to services and possibly to internal network connections. This pahse of attack is the most important and the most dangerous. Although some hack attacks don’t need direct network access to damage your business, such as Denial of Services (DoS), simple methods of attack are available to network-connected hackers including session hijacking, stack-based buffer overflow, and similar security exploits. Smurf attacks try to get network users to respond and the hacker uses their real IP Addresses to flood them with problems.

4. Maintaining Access:-
Hackers may choose to continue attacking and exploiting the target system, or to explore deeper into the target network and look for more systems and services. Not all attackers remain connected to the exploited network, but from a defensive strategy it must be expected. Hackers may deploy programs to maintain access by launching VNC clients from within your network, providing access to external systems, opening Telnet sessions and similarly serious services like FTP and SSH, or upload rootkits and Trojans to infiltrate and exploit your network and systems to the point where they have complete root level control.

5. Cover Tracks:-
Most hackers will attempt to cover their footprints and tracks as carefully as possible. Although not always the case, remove proof of a hacker’s attacks is their best defense against legal and punitive action. It is most likely that low-end hackers and newbie hackers will get caught at a much higher rate than expert level hackers who know how to remain hidden and anonymous.

These five phases of a hacker’s attack loop back to the beginning. A successful attack with maintained access often results in continuing reconnaissance.

Sunday 15 July 2012

DAEMON Tools Pro Advanced 5.0.0316.0317




[Software INFO:]


Daemon Tools Lite - small in size but powerful features emulator CD / DVD-drive - allow "pick up" any disk image, made by any utility for

copying disks (eg, CloneCD), ie can work with what you want "discs" - even with PlayStation. Similarly, in this emulator you can "insert"

copied on the hard disk audio-CD or DVD-drives. By the way, to work properly with copies of the "smart" defense, used the CD with the games,

the program has special modes SafeDisc (C-Dilla), Securom and Laserlock ...


The program works on all versions of Windows and allows for simultaneous emulation of up to four CD / DVD-drives. The program interface is

translated into many languages, including Russian language.

In the arsenal of the amateur game there is always a drive emulation software to read the CD / DVD-ROM drive. This program installs a

special driver thanks to which Windows defines a virtual drive and can work with him as with a regular. The only difference is that instead

of using this laser disc image files of CD and DVD-media. The advantages of such a program are obvious. First, it can make a copy of a

computer game or any other content from CD / DVD, copy-protected. Second, using this program, you will in most cases get a high-speed data

read and forget about the "brakes" and "locked up", which often can be observed when working with disks. Well, of course, it increases the

service life of the drive and the laser medium. One of the leading application for creating images and work with them, and is the program

DAEMON Tools Lite.

Features:
"Creating a *. Iso and *. Mds images
"Virtualize up to 4 drives
"Working with images, file formats: *. Iso, *. Nrg, *. B5t, *. B6t, *. Bwt, *. Ccd, *. Cdi, *. Cue, *. Isz
"Compress and password-protect images
"To use a new gadget to the Sidebar in Windows 7, Vista.

[INSTALL NOTES]

Step 1: unpack rar archive
Step 2: run DAEMON Tools Pro Advanced v.5.0.0316.0317.exe

http://adf.ly/BwG6w

Password