Welcome To Just IT CluB
The best place where you can get free and cracked software and awesome tutorials include tip and trick that never seen on web before or much rare.

Saturday, March 8, 2014

How To Earn Money On Internet

Fast Trick to Earn Money from Facebook ,Twitter , Google+

This topic will consist of two parts. 1st part is about this site and how it works 2nd part will be a new smart way to make fast and easy money using the check4changes Firefox extension

click here to Sign-up


get-fans-468x60

 Part 1:

This website where you can make money just by liking Facebook pages and following twitter pages , and you can also get fans for your page with the coins earned ( when you like a page you get coins + money )


Supported banks:

click here to Sign-up


get-fans-468x60
















Friday, January 10, 2014

How To Trace Your Facebook Profile Visitors And Who Visit Your Profile Most



[Image: Facebook+Profile+Ids.png]

Do you want to know who visit you Facebook profile most and how to find all visitors list. This is a trick to trace your all profile visitors without any software and add-on. Facebook is a biggest social media along world wide. It is mainly act as a community. So peoples visit your profiles and get information from your account to confirm people is fake or not. Facebook store all visitors in hidden. It not shows public. So now i share how to find hidden code and reveal all your recent Facebook profile visitors. Please follow instruct to find Facebook visitors.

1. Log In your Facebook account.

2. Go to your Facebook Profile Page.

3. Now Press Ctrl + U from your keyboard for see source code of your profile page.

[Image: Facebook+Profile+Ids.png]


4. Now search (CTRL+F) for below code.
{"list":
There are some Facebook Profile Ids of your friends who visited recently.

[Image: Facebook+Profile+Id.png]


The first one ID's are showing visits the most number of time.

5. If your want to find profile, Open a new tab on browser and paste below code on browser.

http://www.facebook.com/Facebook Profile Id

6. Replace RED color with ID on that page.

For Example: http://www.facebook.com/100002495205464

7. Press Enter key.

Done.

How To Share Your Files Without Uploading

This is a new method to share you files direct to your friends with a mediator. You can save your uploading and downloading time with this direct sharing method. It will help direct download from others computer. That time computer act like a server. Speed of direct file access is depend up on your or your partner internet speed. You can any type file with this method. It also provide multiple file sharing option. You can drag and drop your files to parachute symbol. This is a method to save your time like a copy paste option. Please share this method to all friends. and enjoy….

First go to justbeamit.com

Just click on parachute symbol to select your files. (or drag and drop your files to parachute symbol)

[Image: Just%252520click%252520on%252520parachut...imgmax=800]


Now appear you file below. Just click on Create link button.


[Image: Now%252520appear%252520you%252520file%25...imgmax=800]



Wait 2-3 seconds for create link.

Now Appear a link above. Please share that link to all your friends.

[Image: Appear%252520a%252520link%252520above.%2...imgmax=800]



Done.

This link works only one time. Please, keep your browser tab open while you are sharing, If you close it, your friend can't download it.

How To Register IDM without any BS crack

I see that many people on here still have a problem with IDM, also I noticed that their is many crack are infected !!! so I decide to write a little tutorial that will help you to solve this issue.
So keep attention and follow these little steps one by one :
1- Download the IDM, Install it then Click on Registrations.

A dialog box will appear Asking for Name Last Name Email Address and Serial Key
Now Enter you name, last name, email address and in field of Serial Key enter any of the following Keys.:
UVQW0-X54FE-QW35Q-SNZF5
FJJTJ-J0FLF-QCVBK-A287M
=GZLJY-X50S3-0S20D-NFRF9
=W3J5U-8U66N-D0B9M-54SLM
=EC0Q6-QN7UH-5S3JB-YZMEK
HUDWE-UO689-6D27B-YM28M
UK3DV-E0MNW-MLQYX-GENA1
398ND-QNAGY-CMMZU-ZPI39
After clicking, It will show error message that you have registered IDM using fake serial key and IDM will exit.
Now DISCONNECTand Go to the path C:\WINDOWS\system32\drivers\etc\hosts
Open hosts file with notepad.[/color]
 Now copy the below lines of code and paste it to below  127.0.0.1 localhost


127.0.0.1 registeridm.com
127.0.0.1 http://www.registeridm.com
127.0.0.1 secure.registeridm.com
127.0.0.1 http://www.internetdownloadmanager.com
127.0.0.1 secure.internetdownloadmanager.com
127.0.0.1 mirror.internetdownloadmanager.com
127.0.0.1 mirror2.internetdownloadmanager.com
Save it.



Now you must right click on hosts file ----------> Settings -------------------> Security Tab ------------> Edith -------------> Administrator ---------> check DENY for write permission


Check the picture bellow :
Why choosing deny writing ? because the new version of IDM change the settings of your hosts file when you click on register and it change the 127.0.0.1 to 12#.0.0.1 so the software can communicate with the server and check if the key is legit or not !!!



Don't forget to apply and click OK :)
[Image: TSXZajd.png]

Now check IDM, it should be converted to full version.


Enjoy it.

Wednesday, January 8, 2014

Difference between Wireless LAN and Bluetooth

Wireless LAN (WLAN) stands for Wireless Local Area Network. It refers to a network that connects two or more devices by using wireless data connections over short distances. Bluetooth is a short range technology standard which allows devices to communicate in a wireless manner. Bluetooth works in lower distance range than in comparison to a typical wireless LAN. Wireless LANs (802.11b) are also faster than in comparison to Bluetooth. However, Bluetooth is a better option when communication needs to take place between smart phones, etc. Bluetooth technology is new than in comparison to WLAN. Basically, WLAN and Bluetooth are both used to cater to two different types of wireless connectivity requirements.

Wireless LAN or WLAN stands for Wireless Local Area Network. It refers to a network that connects two or more devices by using wireless data connections over short distances. It can be considered as an extension of a LAN. WLAN is generally implemented by transmission modes like spread-spectrum radio transmission and infrared transmission. Infrared is based on transmission of infrared light. On the other hand, radio transmission makes use of the radio transmission on the ISM free-license GHz range.

The components that make up a WLAN are:

  • Wireless access point – It is a tiny box containing one or more aerials. A connector is also present in the box which attaches it to the rest of the wired LAN. The number of access points may differ from one scenario to the other. Access points handle the receiving and transmitting of data to all the wireless devices in their area.
  • Wireless network card – This card acts as a radio receiver/transmitter for a specific computer. Today, most of the laptops have this facility within its structure. However, in case it is not present, installation is required.

There are three commonly used WLAN systems:
  • 802.11b
Based on 2.4GHz
Typical throughput 3 to 5Mb/s
Well established and low cost
  • 802.11g
Based on 2.4GHz
Typical throughput 6 to 20Mb/s
  • 802.11a
Based on 5GHz
Typical throughput 6 to 28Mb/s

Bluetooth is a short range technology standard which allows devices to communicate in a wireless manner. The devices can be computers, mobiles or handheld devices. Like WLAN, Bluetooth technology does not require any cables to connect the devices. Bluetooth-enabled devices work within a range of 10 meters. Ericsson Mobile Communication is credited for starting the project named as Bluetooth.

It uses a chip that can be easily plugged into devices like phones and computers. It uses a particular radio frequency to transmit the data. Bluetooth is regarded to be a very safe technology. It has the capability to connect upto 8 devices at the same time. It is mostly preferred for transferring files from one phone to the other. One can also send music files and pictures wirelessly with the help of this technology. Bluetooth technology uses modifications of existing wireless LAN techniques.

Both WLAN and Bluetooth are important technologies in the wireless platform.

Comparison between wireless LAN 802.11b and Bluetooth:


Wireless LAN
Bluetooth
Definition
Wireless LAN stands for Wireless Local Area Network. It refers to a network that connects two or more devices by using wireless data connections over short distances.
Bluetooth is a short range technology standard which allows devices to communicate in a wireless manner.
Distance Range
Up to 200 feet
 Less than 30 feet
Bandwidth
High
Low
Security issues
Can occur, still controllable
Minimum
Speed
Comparatively more
Comparatively less
Central Access Point
Required
Not required
Identification of the network
By locating a central router of a wireless network switch.
By checking out the Bluetooth control panel (on phone or computer)

Create your own LAN-Connect two computers


Why is it needed??

If we connect two computers, it forms a network. The main advantage of a network is "resource sharing".
We can share files and folders. 
We can share printers. 
We can play LAN games.

Here are the steps to connect two windows XP computers.

Things You Will Need:



1. A Crossover cabe – This is a Cat5 Ethernet Cable that the wires have been switched around to allow two computers to talk to each other.

2. Ethernet adapter or in simple terms the port on the back of your pc where you are going to insert this cable.
Steps:

An Introduction to Proxy servers and Firewalls





Proxy Server:

Proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server.

Advantages Of Proxy:

Proxy Servers primarily provide anonymity on the Internet, since there is no direct connection between you and the Server.

Proxy Servers can be used for Regulating a Network and to apply Access Control Lists (ACL’s) on network services or content. For Example, It can be used to Block undesired sites.

Proxy severs can also be used use to Log the Internet usage of the Users in a Specified Network.

Proxy Servers can also provide some features which are generally Found in Firewalls and Intrusion Prevention Systems such as scanning the transmitted content for Malwares before delivery.

Proxy Servers are also used to scan outgoing traffic to prevent data leakage.

Types of Proxy servers

•Caching Proxy Server

•Web Proxy Server

•Content Filtering Server

•Anonymizing Proxy Server

•Hostile Proxy

•Transparent Proxy server

•Reverse Proxy


What is Packet Filtering?

How to secure your computer from Trojans and RATs




Symptoms of a trojan:


Unusual behaviour of the system is a mere indication of a Trojan attack!!!
• Programs starting and running without the initiation of the User.
• Opening or Closing of CD-ROM drawers
• Wallpaper, background, or screen saver settings changing by themselves
• Screen display flipping upside down
• Browser program opening strange or unexpected websites.

All the above actions seem like a ghost controlling your system!!!!
The actions clearly indicate that you are under Trojan attack!

Concept behind Detecting Trojans:

The first and foremost thing you have to do is to check the applications which are making network connections with other computers. One of those applications will be a process started by the Server Trojan.

METHOD 1:


Detecting trojans using" netstat" command


An effective method to detect trojans is by using “netstat” command.


Step1: Go to Start>run and type cmd ( to open command prompt)

Step2: Go to C drive and type netstat
It displays all the Active Connections.


Now Type the command netstat –ano
It displays all the present TCP/IP and UDP ports that are being used.


The trojan could be one of the ESTABLISHED conections. But not all the ESTABLISHED connections are trojans.

Monday, January 6, 2014

How to trace Exact Location of Mobile Phone





There are many instances when we want to know where our friends are, where our parents are, and for those who've got a pair, where is my girl-friend or boyfriend. ! Well there are many apps in the market which allow you to get exactly the pin-pointed location of  any cellphone. But the problem is they cost too high. Well today I'm gonna show you a process by which you can trace the exact mobile location of any cell phone without the need to spend a single penny. What you need is listed below, and i'm sure most of us already have what is needed.

REQUIREMENTS:
Any cell phone that supports Google maps. eg. iPhone , Nokia , Blackberry , Symbian etc.
Google Latitude. Which you can download by going to google.com/latitude from your cell phone.
STEPS:-
Go to www.google.com/latitude from your cell phone.
Download the free app.
Open the App.
Enter You mobile number in the entry Field.
Now You've set it up on your phone. Now you gotta set it up on your friends cell phone. 
HOW TO SET IT UP ON YOUR FRIENDS CELL PHONE:
You can add friends by their E-mail Addresses. Your friends will receive an E-mail with the download link of Google latitude. 
Or you can manually add yourself or ask your friend to add google latitude on his/her cell phone. 
Now you and your friend can add each other as friends on google latitude and you'll get the exact location of where your friends cell phone is.
There is exactly no limit to how many friends you can add in your latitude circle. ( just make sure you dont add your parents :) 
Well so As soon as You and your buddy confirm each other as friends you get to see each others location.
HOW TO USE IT EVEN WHEN YOU DON'T HAVE YOUR CELL PHONE WITH YOU:
Well the most eye catching feature of google latitude is that you can use it online even without a cell phone.
Just go to google.com/latitude from you PC, Follow the instructions, log-in into your account. And track You friends Locations !!

How To Remove Virus Using CMD ( command prompt ) ?

How To Delete Virus Using CMD In Usb/Memory Card




Virus is a computer program that can copy itself and infect computers.
The term "virus" is erroneously used to refer to other types of malware, including adware and spyware programs that do not have the reproductive ability.
A true virus can spread from one computer to another (in some form of executable code).
One of the ways by which a virus can infect your PC is through USB/Flash drives.
Common viruses such as 'Ravmon' , 'New Folder.exe', 'Orkut is banned' are spreading through USB drive .
Most anti virus programs are unable to detect them and even if they do, in most cases they are unable
to delete the file, only quarantine it.So in our post we use command prompt to remove harmful files that
any anti-virus can't.


These are the steps.


Step 1: 

 

Run the command prompt by going to start and type cmd on the search programs and files.

Step 2:

 Select the virus affected drive
                 (drivename: )
examples
C:
J:
F:
D:
E:


Step 3:

 type attrib -s -h *.* /s /d then press enter

Step 4:

 type dir 
        the dir command shows you the content of the drive

Step 5:

check if there is an unusual .exe file
                 if there's an autorun.inf file rename it

                    (rename filename.extension newfilename )

Step 6:

by doing the following steps you can now acces the drive without affecting the virus

 Go to my computer

Step 7:

Select the drive

Step 8:

Delete the harmful files
             *you can also delete the harmful files using command prompt
              ( type del filename)