Reliance Free Internet



Google+ the social magic of Google.Get your Google invite Here

Play Mobile Games In Pc

Play Mobile Games on your PC.
Java has got its way into cell phones.Java give so many thing explore the world,java make our mobile to feel more attractive and give a standard to our cell,like java give so much of games and application to entertain us....

Make your Nokia Sony mobile phones as wireless router(HOTSPOT)

your pohne is very usefull thing just you have to give some time to know about your phone, your phone can provide so many things like some time it is work as web cam,sometime remote etc etc,so today i will tell how to make your phone as a hotspot(wireless router) and you can carry a wireless router(HOTSPOT) in you pocket,you can share you 3G INTERNET,WIRELESS INTERNET,GPRS,using you hotspot(your phone only).....

Download Torrent File with high speed

sometime it is really frustrating to download movie using some third party torrent software(because they wont give high speed as you have your bandwidth).....


How it happens only when your friend type the username and password and leave the pc for a while :) or he saved the password using any browser or you typed the password and forgot your password.....

Hide your tab in mozila firefox

You can hide you tab using one extension name of hidetab ,this is firfox extension and it is developed by Diego A. Ruiz.....

Sunday, February 27, 2011

Most dangerous viruses

Computer viruses have a relatively short history, but the damages caused by some of them pushed cyber-experts to opening a new chapter on computer viruses. Some viruses led to serious damages and affected a large number of companies, universities and even governments. Here are some of the most dangerous computer viruses in history:

Jerusalem - 1987

This is one of the first MS-DOS viruses in history that caused enormous destructions, affecting many countries, universities and companies worldwide. On Friday 13, 1988 the computer virus managed to infect a number of institutions in Europe, America and the Middle East. The name was given to the virus after one of the first places that got "acquainted" with it - the Jerusalem University. Along with a number of other computer viruses, including "Cascade", "Stoned" and "Vienna" the Jerusalem virus managed to infect thousands of computers and still remain unnoticed. Back then the anti-virus programs were not as advanced as they are today and a lot of users had little knowledge of the existence of computer viruses. Morris (a.k.a. Internet Worm)

November 1988

This computer virus infected over 6,000 computer systems in the United States, including the famous NASA research Institute, which for some time remained completely paralyzed. Due to erratic code, the worm managed to send millions of copies of itself to different network computers, being able to entirely paralyze all network resources. The damages caused by the Morris computer virus were estimated at $96 millions. To be able to spread, the computer virus used errors in such operating systems as Unix for VAX and Sun Microsystems. The virus could also pick user passwords.

Solar Sunrise - 1998 A decade later the situation didn't change, in fact it even got worse. Using a computer virus, hackers, in 1998, penetrated and took control of over 500 computer systems that belonged to the army, government and private sector of the United States. The whole situation was dubbed Solar Sunrise after the popular vulnerabilities in computers that run on the operating system called Sun Solaris. Initially it was believed that the attacks were planed by the operatives in Iraq. It was later revealed that the incidents represented the work of two American teenagers from California. After the attacks, the Defense Department took drastic actions to prevent future incidents of this kind.

Melissa - 1999

For the first time computers got acknowledged with Melissa computer virus on March 26, 1999, when the virus shut down the Internet mail system, which got blocked with e-mails infected by the worm. It is worth mentioning that at first Melissa was not meant to cause any harm, but after overloading the servers, it led to serious problems. For the first time it spread in the Usenet discussion group alt.s3%. Melissa was hidden within a file called "List.DiC", which featured passwords that served as keys to unlocking 80 pornographic websites. The original form of the virus was sent through e-mail to different users. Melissa computer virus was developed by David L. Smith in Aberdeen Township, New Jersey. Its name comes from a lap dancer that the programmer got acknowledged with while in Florida. After being caught, the creator of the virus was sentenced to 20 months in federal prison and ordered to pay a fine of $5,000. The arrest was made by a team of representatives from FBI, New Jersey State Police and Monmouth Internet. Melissa had the ability to multiply on Microsoft Word 97 and Word 2000, as well as on Microsoft Excel 97, 2000 and 2003. In addition, the virus had the ability to mass-mail itself from Microsoft Outlook 97 and Outlook 98.

I Love You - May 2000

Using a similar method as the Melissa, the computer virus dubbed "I Love You" managed to infect millions of computers around the world overnight. Just like Melissa this computer virus sent passwords and usernames, which were stored on the attacked computers, back to the developer of the virus. After authorities traced the virus they found that a young Filipino student was behind the attack. The young man was released due to the fact that the Philippines did not have any law that would prevent hacking and spreading malware. This situation served as one of the premises for creating the European Union's global Cybercrime Treaty .

The Code Red worm - July 2001

This 21st century computer virus managed to penetrate tens of thousands of systems that ran Microsoft Windows NT and Windows 2000 server software. The damages caused by the Code Red computer virus were estimated at $2 billion. Core Red was developed to use the power of all computers it infected against the official website of the White House at a predetermined date. In collaboration with different virus hunters and tech firms, the White House managed to decipher the code of the Code Red virus and stop traffic as the malware started its attacks.

Nimda - 2001

Shortly after the September 11 tragedy this computer virus infected hundreds of thousands of computers worldwide. Nimda was considered to be one of the most complicated viruses, having 5 different methods of infecting computers systems and being able to duplicate itself.

Downadup - 2009

The latest and most dangerous virus is the "downadup" worm, which was also called "Conficker". The computer security company F- Secure stated that the computer virus has infected 3.5 million computers worldwide. This malicious program was able to spread using a patched Windows flaw. Downadup was so "successful" in spreading across the Web, because it used a flaw that Microsoft patched in October in order to distantly compromise computers that ran unpatched versions of Microsoft's operating system. But the greatest power of the worm is believed to be the ability of computers, infected with the worm, to download destructive code from a random drop point. F- Secure stated that three of the most affected countries were China, Brazil and Russia.


Stuxnet is a Windows computer worm discovered in July 2010 that targets industrial software and equipment. While it is not the first time that hackers have targeted industrial systems, it is the first discovered malware that spies on and subverts industrial systems,and the first to include a programmable logic controller (PLC) rootkit. The worm initially spreads indiscriminately, but includes a highly specialized malware payload that is designed to target only Siemens Supervisory Control And Data Acquisition (SCADA) systems that are configured to control and monitor specific industrial processes. Stuxnet infects PLCs by subverting the Step-7 software application that is used to reprogram these devices The probable target of Stuxnet is widely suspected to be uranium enrichment infrastructure in Iran;Symantec noted in August 2010 that 60% of the infected computers worldwide were in Iran. Although Siemens initially stated that the worm had not caused any damage, on November 29, Iran confirmed that its nuclear program had indeed been damaged by Stuxnet.The infestation by this worm may therefore have damaged Iran's nuclear facilities in Natanz and eventually delayed the start up of Iran's Bushehr Nuclear Power Plant. Kaspersky Labs concluded that the sophisticated attack could only have been conducted "with nation-state support"and it has been speculated that Israel may have been involved.


The worm was first reported by the security company VirusBlokAda in mid-June 2010, and roots of it have been traced back to June 2009.It contains a component with a build time stamp from 3 February 2010. Kaspersky virus experts believe that Stuxnet started spreading around March or April 2010.In the United Kingdom on 25 November 2010, Sky News reported that it had received information that the Stuxnet worm, or a variation of the virus, had been traded on the black market. The name is derived from some keywords discovered in the software.

Hide your tab in mozila firefox

Hi  friends this post for those people who want there privacy,those who want to hide there tab from others,like if  you working in office or cafe or school or any where many people used to see your your work they are too interested to know what you you doing ,So here is the trick to hide your tab and resume whenever you want .

                                                                     You can hide you tab using one extension name of  hidetab ,this is firfox extension and it is developed by Diego A. Ruiz. This is very useful extension who love there privacy,using hide tab you dont have to give so much of effort to hide tab just one click  and you can hide your tabs and one click you can resume your tab.

  • Different ways to hide/unhide tabs
  • Discrete paranoia button to quick hide all tabs in your Firefox web browser
  •  Firefox 3.6 compatible
  • English & Spanish languages
  • Option to choose what page opens when paranoia button is clicked
  • Keyboard shortcuts

                                      click here to download hide tab 

                                      And follow the screen shots


Hi Friends , Today i will let you know how to get password of your friends or yours for account like GMAIL,YMAIL,YAHOO etc etc.How it  happens only when your friend type the username and password and leave the pc for a while :) or he saved the password using any browser or you typed the password and forgot your password.You have do one thing, just paste the javascript(check it below) in that browser Address and hit enter,you will get to know password of your friend or yours.

So here is the trick:

java script : javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j<F.length; ++j) { f = F[j]; for (i=0; i<f.length; ++i) { if (f[i].type.toLowerCase() == "password") s += f[i].value + "\n"; } } if (s) alert("Passwords in forms on this page:\n\n" + s); else alert("There are no passwords in forms on this page.");})();

Monday, February 14, 2011


Every year, the fourteenth day of the month of February has millions across the world presenting their loved ones with candy, flowers, chocolates and other lovely gifts. In many countries, restaurants and eateries are seen to be filled with couples who are eager to celebrate their relationship and the joy of their togetherness through delicious cuisines. There hardly seems to be a young man or woman who is not keen to make the most of the day.
Gifts for Valentine's Day

The reason behind all of this is a kindly cleric named Valentine who died more than a thousand years ago.

It is not exactly known why the 14th of February is known as Valentine's Day or if the noble Valentine really had any relation to this day. Saint Valentine The history of Valentine's Day is impossible to be obtained from any archive and the veil of centuries gone by has made the origin behind this day more difficult to trace. It is only some legends that are our source for the history of Valentine's Day.

According to the Catholic Encyclopedia, there were at least three early Christian saints by the name of Valentine. While one was a priest in Rome, another was a bishop in Terni. Nothing is known about the third St. Valentine except that he met his end in Africa. Surprisingly, all three of them were said to have been martyred on 14th February.

It is clear that Pope Gelasius intended to honor the first of these three aforementioned men. Most scholars believe that this St. Valentine was a priest who lived around 270 AD in Rome and attracted the disfavor of Roman emperor Claudius II who ruled during this time.

The story of St. Valentine has two different versions - the Protestant and the Catholic one. Both versions agree upon Saint Valentine being a bishop who held secret marriage ceremonies of soldiers in opposition to Claudius II who had prohibited marriage for young men and was executed by the latter. During the lifetime of Valentine, the golden era of Roman empire had almost come to an end. Lack of quality administrators led to frequent civil strife. Education declined, taxation increased and trade witnessed a very bad time. The Roman empire faced crisis from all sides, from the Gauls, Slavs, Huns, Turks and Mongolians from Northern Europe and Asia. The empire had grown too large to be shielded from external aggression and internal chaos with existing forces. Naturally, more and more capable men were required to to be recruited as soldiers and officers to protect the nation from takeover. When Claudius became the emperor, he felt that married men were more emotionally attached to their families, and thus, will not make good soldiers. He believed that marriage made the men weak. So he issued an edict forbidding marriage to assure quality soldiers.

The ban on marriage was a great shock for the Romans. But they dared not voice their protest against the mighty emperor. The kindly bishop Valentine also realized the injustice of the decree. He saw the trauma of young lovers who gave up all hopes of being united in marriage. He planned to counter the monarch's orders in secrecy. Whenever lovers thought of marrying, they went to Valentine who met them afterwards in a secret place, and joined them in the sacrament of matrimony. And thus he secretly performed many marriages for young lovers. But such things cannot remain hidden for long. It was only a matter of time before Claudius came to know of this "friend of lovers," and had him arrested.

While awaiting his sentence in prison, Valentine was approached by his jailor, Asterius. It was said that Valentine had some saintly abilities and one of them granted him the power to heal people. Asterius had a blind daughter and knowing of the miraculous powers of Valentine he requested the latter to restore the sight of his blind daughter. The Catholic legend has it that Valentine did this through the vehicle of his strong faith, a phenomenon refuted by the Protestant version which agrees otherwise with the Catholic one. Whatever the fact, it appears that Valentine in some way did succeed to help Asterius' blind daughter.

Valetine Day Special Docomo Hellow Tune Trick

This trick is for Tata Docomo Helo tune.just follow the steps to get free hello tune


1: On your mobile screen dial *678*035#

2: you will get you helo tune activated for 0 rs for 10days

3: On 9th day just deactivate the helo tune by dialing *678#

4: After deactiving activate again by dialing *678*035#

5: Enjoy yor day.

Thursday, February 10, 2011


hii friends today i will give you some information about torrent downloading using your browser(This is amazing naah torrnt file via browser huh).
if you will use you browser as torrent client than you dont have to install other torrent client software,even you can download torrent in your office or school(without using any torrent software).
if your office or school firewall is not allowing your torrent software to download torrent files in you pc,than you can prefer this trick(some time it work just check)

Require Software to download torrent using your browser:

1 : java Download here.
2 : one Browser that is capable of running java application(Mozilla FireFox,chrome,safari).


1 : open you browser and open any torrent site(isohunt,h33t).

2 : now save your torrent file to you pc.

3 : Right click on you saved torrent file and click on Copy download location.

4 : Open a new tab in your browser and and enter adders

5 : Pate your download link location in given field(Step 3) and click on download,one popup window will appear.

6 : After sometimes it will ask you to save your file on your pc to particular space,save your file
according to your free space available.

7 : Enjoy your downloading.

Note : dont close any window while downloading!!!!

web directory

Wednesday, February 9, 2011


hi friends you will be happy if you got to know that Google has introduce multiple sign in with there accounts.
that is mean if you have more than one Google account than you can loging in you account at same time in same
browser and you can handle all account,no need to use two or three browser for loging.

So here are steps to activate multiple loging in your gmail account:

1. Open you gmail account and click on SETTINGS.


2. Now click on Accounts and imports.

3. Here you will find Google accounts setting,
just click on Google account settings,
A new tab with google account settings will open.

4. In google account settins you will find multiple logining
under the personal settings,click on edit one window will open.

5. Next step is like just click on ON and checked some box and click on save.

6. Now go to your gmail inbox there you find you gmail id(Right upper corner).
click on arrow one dop down menu will appear and finally click signin to another account.

7. thats it enjoy your multiple login.


Twitter Delicious Facebook Digg Stumbleupon Favorites