Saturday, February 27, 2010

The Punisher (2004) In Hindi


Release Date: 16 April 2004 (USA)
Genre: Action | Crime | Drama | Thriller
Tagline: This Is Not Revenge. It's Punishment
Plot:
The Punisher is a 2004 comic book action film based on the Marvel Comics character of the same name, starring Thomas Jane as the antihero Frank Castle / The Punisher and John Travolta as the villain Howard Saint, a money launderer who orders the death of Castle's entire family. The film is not a sequel to 1989's The Punisher; it is a reboot. The story and plot were mainly based on two Punisher comic book stories; The Punisher: Year One and Welcome Back, Frank along with scenes from other Punisher stories such as Marvel Preview: Featuring The Punisher #2, The Punisher War Zone and The Punisher War Journal.[3] The film was released on April 16, 2004 by Lions Gate Entertainment, grossing $13,834,527 in the United States over its opening weekend. The Punisher received mainly negative reviews from film critics. A DVD release followed on September 7, 2004 with $10.8 million in copies sol
http://rapidshare.com/files/217972269/the.punishers.hindi.part1.rar

http://rapidshare.com/files/217972289/the.punishers.hindi.part2.rar

http://rapidshare.com/files/217972281/the.punishers.hindi.part3.rar

http://rapidshare.com/files/217971554/the.punishers.hindi.part5.rar

Cute Love Poems FOR KING4M LOVERS




The wind is tossing the lilacs,
The new leaves laugh in the sun,
And the petals fall on the orchard wall,
But for me the spring is done.

Beneath the apple blossoms
I go a wintry way,
For love that smiled in April
Is false to me in May.

LG Launches Watch Phone in India

If you are a watch freak and also happen to be a fan of ultra rare gadgets, this might just interest you. The LG GD910 watch phone looks like a normal watch - except for the fact that it can double up as your mobile phone when needed.

That's right. Tthe GD910 LG's latest watch phone has been launched in India. It is quite thin at just 13.9mm and packs in 3G and Video Calling capabilities as well. The phone is quite stylish and the front fascia is covered by scratch-proof tempered glass. It comes with a Bluetooth Headset so you don't have to keep talking like David Hasselhoff talked to his super-car KITT in the "Knight Rider" series.

The LG watch phone can be all yours for Rs. 49,990 which makes it super expensive - even for an ultra sci-fi esque gadget like this.

Man.vs.Wild

Man.vs.Wild.S06E10.HDTV.XviD-OMiCRON

Download:

Code:
man.vs.wild.s06e10.hdtv.xvid-omicron.avi
http://d01.megashares.com/?d01=4c67666

Sherlock Holmes (2009) DVDSCR (500MB Only)








Quote:
Ripper ...........: IMAGiNE IMDB Rating.......:7.7/10
Video Codec.......:XVID Release Date......:01/15/10
Audio Codec.......:AC-3 Theatre Date......:12/25/09
Audio Bitrate.....:448 Runtime.......:2h 08mn
Subtitles.........:NIL Language..........:ENGLISH

DETAILS:

General
Complete name : Sherlock Holmes 2009 SCR - IMAGiNE.avi
Format : AVI
Format/Info : Audio Video Interleave
Format profile : OpenDML
File size : 550 MB
Duration : 2h 8mn
Overall bit rate : 2 228 Kbps
Writing library : VirtualDub build 30091/release

Video
ID : 0
Format : MPEG-4 Visual
Format profile : Advanced Simple@L5
Format settings, BVOP : Yes
Format settings, QPel : No
Format settings, GMC : No warppoints
Format settings, Matrix : Default (MPEG)
Muxing mode : Packed bitstream
Codec ID : XVID
Codec ID/Hint : XviD
Duration : 2h 8mn
Bit rate : 1 767 Kbps
Width : 704 pixels
Height : 384 pixels
Display aspect ratio : 16:9
Frame rate : 23.976 fps
Resolution : 8 bits
Colorimetry : 4:2:0
Scan type : Progressive
Bits/(Pixel*Frame) : 0.273
Stream size : 1.59 GiB (79%)
Writing library : XviD 1.2.1 (UTC 2008-12-04)

Audio
ID : 1
Format : AC-3
Format/Info : Audio Coding 3
Codec ID : 2000
Duration : 2h 8mn
Bit rate mode : Constant
Bit rate : 448 Kbps
Channel(s) : 6 channels
Channel positions : Front: L C R, Surround: L R, LFE
Sampling rate : 48.0 KHz
Stream size : 412 MiB (20%)








http://rapidshare.com/files/354622229/Sherlock_Holmes_DVDSCR_ND.part1.rar
http://rapidshare.com/files/354620603/Sherlock_Holmes_DVDSCR_ND.part2.rar
http://rapidshare.com/files/354620905/Sherlock_Holmes_DVDSCR_ND.part3.rar
http://rapidshare.com/files/354620876/Sherlock_Holmes_DVDSCR_ND.part4.rar
http://rapidshare.com/files/354620873/Sherlock_Holmes_DVDSCR_ND.part5.rar

The Wolfman 2010 TS XVID-PrisM




The Wolfman 2010 TS XVID-PrisM
TS |English | 1h 34min | 640x352 | XviD 1045 kbps | MP3 128 kbps | 704MB
Genre: Horror | Thriller


Upon his return to his ancestral homeland, an American man (Del Toro) is bitten, and subsequently cursed by, a werewolf.



Quote:
Download links:

Rapidshare:
http://rapidshare.com/files/353562795/2The.Wolfman.2010.TS.XVID-PrisM.part1.rar
http://rapidshare.com/files/353562868/2The.Wolfman.2010.TS.XVID-PrisM.part2.rar
http://rapidshare.com/files/353562888/2The.Wolfman.2010.TS.XVID-PrisM.part3.rar
http://rapidshare.com/files/353562498/2The.Wolfman.2010.TS.XVID-PrisM.part4.rar

Hotfile:
http://hotfile.com/dl/29428548/7111ea7/4The.Wolfman.2010.TS.XVID-PrisM.part1.rar.html
http://hotfile.com/dl/29428549/a2c9f18/4The.Wolfman.2010.TS.XVID-PrisM.part2.rar.html

Depositfiles:
http://depositfiles.com/files/kwllmwzn4

Turbobit:
http://turbobit.net/tgwxe8qe5gi8.html

how to find a crack for softwares in google


its soo simple first write the product name but be carefull
before the product name you must have to put The and then product name and after that 94fbr(it must be enclosed in inverted commas)
for example
the sc keylogger pro 3.2"94fbr"

enjoy

Start computer in 10 seconds.

Start computer in 10 seconds.

JUST FOLLOW SIMPLE STEPS

Click on the start button then press R it will take

u to Run well go to runand type Regedit
press enter
this will open Registery Editor
now look for the key

HKEY_LOACAL_MECHINE\SYSTEM\CurrentControlSet\Control\ContentIndex

now there find the Key Called
"Startup Delay"
Double Click On It
Now where its Base
Click Decimal
Now its Default Value Is 4800000
Change The Value To 40000
here u go u have done it
now close the Registery Editor and Restart Your Computer
You'll See The Result

HiT ThAnX

Windows Extreme Se7en 2010 Professional SP3 (x86) Final Octo


http://hotfile.com/dl/21974636/86fc8b0/Extreme.Se7en.2010_www.dl4all.com.part1.rar.html
http://hotfile.com/dl/21974687/846abc5/Extreme.Se7en.2010_www.dl4all.com.part2.rar.html
http://hotfile.com/dl/21974723/e1df0ad/Extreme.Se7en.2010_www.dl4all.com.part3.rar.html
http://hotfile.com/dl/21974322/4d7b342/Extreme.Se7en.2010_www.dl4all.com.part4.rar.html
http://hotfile.com/dl/21974809/aa73b92/Extreme.Se7en.2010_www.dl4all.com.part5.rar.html
http://hotfile.com/dl/21974658/4ce33b9/Extreme.Se7en.2010_www.dl4all.com.part6.rar.html

ip address OPEN ANY SITE FOR members ..[must..C]

HELLO FRENDZ SEE THIS TUTORIAL
I have previously written some articles/tutorials on How to access blocked websites at school/college/office/cyber cafes etc.
See this is much Interesting for those who open sites such as ORKUT in colleges and Blocked sites
These methods can still help you to unblock websites. But then, there is no fool-proof way as such since it all depends on how smart your network admin is. So, here I present yet another way to access blocked sites which is based on the method of bypassingURL filtering employed by the admin.
Access Blocked Websites by Bypassing URL Filtering
Most of the network admins in schools and colleges block a website by its name (http://www.xxx.com) or by its IP address. Assuming this is the case, we will learn about a way to bypass the URL filtering.
Step 1:Find out the IP address of the blocked website which you are trying to access. Let us take http://best4m.com as our example. Go to Start �> Run and type cmd

A new window opens. Type ping techpp.com and press Enter. You will see the IP address as shown below.

[/B]IP address of best4m.com = 69.65.42.93[/B]
Step 2: Convert each of the 4 numbers (69, 65, 42 and 93) into an 8-digit binary value. In order to do this open your Windows calculator, select Scientific view.

Make sure 慏ec� is selected and enter the first number and select 態in�. This would give you 8 digit binary value of 69 = 01000101

Repeat the process for other 3 numbers as well. You will get four 8-digit binary equivalents. Put them all together
010001010100000100010101001011101
NOTE == BINARY CALCULATOR ME 7 DIGIT AYEGA ADD 0 IN STARTING
FOR EG IN CALCULATOR
BINARY OF 69 IS 1000101 SO IT IS WRITTEN AS 01000101 OK
Step 3: Convert 010001010100000100010101001011101 into a decimal value. For this, reverse the process explained in Step 2 i.e Select Bin and input 010001010100000100010101001011101 (copy-paste) and then click Dec. This will give you the decimal equivalent of the 32 digit binary number = 2323786333

Step 4: Go to your browser and in the address bar type http://2323786333, this should open http://best4m.com, but it doesn抰, reason given below.
Imp: You might have observed that http://1138628690 is giving Bad Request error. This is because the above trick doesn抰 work forwebsites running on virtual hosts.But other sites like Google, Gmail etc will work flawlessly (http://1249729384 or http://3512041827/)
bHAI AALLLL IZZZ WEELLLLLL
REASON IS BEHIND US MAN............................................................................

CHANGE YR PROCESSOR NAME

GO TO
START>
RUN>
TYPE REGEDIT>
HKEY_LOCAL_MACHINE>
HARDWARE>
DISCRIPTION>
SYSTEM>
CENTRAL PROCESSOR>
ON RIGHT HAND SIDE RIGHT CLICK ON PROCESSORNAMESTRING AND THEN WRITE ANYTHING U WANT IN THAT TEXTBOX

[TuT] Speed up internet! WORKS!(I got 254% Faster!)

[TuT] Speed up internet! WORKS!(I got 254% Faster!)
[CENTER]WORKS WITH EVERYTHING THAT USES DNS! INCLUDING XBOX 360 + PS3[/CENTER]
I gained 254% speed.
Thanks is always appreciated!


Step 1. Download
Step 2. Run
Step 3. Look at the top right of your HTML log, and in the box where it says "recommended configuration (fastest and nearest)" note the top 2 servers
Step 4. Use the first two DNS from step 3
Download :
Code:
http://rapidshare.com/files/339726425/namebench-1.1.rar

cricket

http://www.sportshike.com/

Another World DIRECT LINK





http://d.trymedia.com/dd/telco/5u_d/AnotherWorld.exe

http://rapidshare.com/files/299705965/Another.World.Fix.rar


x-unit.org

cyberlink powerdvd

http://hotfile.com/dl/23296963/8a9db8f/dp-egydown.rar.html

imoto dvd ripper

http://rapidshare.com/files/169329712/ImTOO.DVD.Ripper.Ultimate.5.0.46.1121.rar

bitdefender 2047 valid


http://hotfile.com/dl/26589557/d2ce2fe/BitDefender_2010_Total_Security_with_patch__till_2047.rar.html

DivX Player v6.7

Make the most of your media experience with the DivX Player. Play virtually any video format with superior video and audio quality on your PC, and use built in tools to organize your media, manage your downloads and burn discs from within DivX Player.
Benefits:
* Enjoy 5.1 channel, room-rattling MP3 surround sound and manipulate and improve the quality of the audio in your videos with DFX Audio Enhancer ®
* Watch DivX videos with.srt subtitles
* Create video playlists
* Pause and progressively play video downloads
* Add URLs and queue online DivX videos for automatic downloading
* Burn videos to disc from within DivX Player for playback on millions of DivX Certified devices
* Activate and manage DivX Certified devices from within the DivX Player
Download: 12 MB

http://rapidshare.com/files/149074782/DivX_Player_v6.7.0.21__Portable_.rar

Pass: www.dl4all.com

Norton Virus Definitions 2009\2010 December 18, 2010

http://definitions.symantec.com/defs/20100218-016-x86.exe

Avast! Internet Security 5.0.377 Final

Comes with an antispam filter and built-in firewall

avast! provides a package of applications that aim to protect your computer from a possible virus infection or other malware threat. If you use it correctly, and in combination with other programs such as data backup utilities, it will significantly reduce the risk of your computer being attacked or infected by a virus, and thus the risk of losing important or private data.

The Avast! Internet Security application comes with an antispam filter and built-in firewall. Once installed, avast! runs silently in the background to protect your computer against all known forms of malware. You don't need to do anything else - just install and forget!

Active internet users need greater protection for themselves as they shop and bank on-line. To secure against threats from infected web sites and the growing risk of identity theft, avast Internet security provides you with continuous protection from its layers of antivirus, anti-spyware, anti-rootkit protection, firewall and antispam.

Real-time shields
The real-time shields are the most important part of the program, as they are working continuously to prevent your computer from becoming infected. They monitor all your computer's activity, checking all programs and files in real-time - i.e. at the moment a program is started or whenever a file is opened or closed.

Virus Chest
The virus chest can be thought of as a folder on your hard disk with special properties, that make it a safe, isolated place for storing potentially harmful files. You can work with the files in the virus chest, with some security restrictions.

avast! antispam filter
avast! Internet Security includes a fully integrated antispam filter to detect unwanted email.

Spam delivered to your mailbox can result in your mailbox quickly becoming full, as a result which, legitimate emails may not be received. It can also unnecessarily increase the load on the email server, internet connection, local networks etc.

Firewall
avast! Internet Security includes a fully integrated firewall which can be controlled directly from the avast! user interface.

The firewall monitors all communication between your computer and the outside world and blocks unauthorized communication based on a number of "allow" and "deny" rules. In this way, the firewall can prevent sensitive data from leaving your computer and can also block attempted intrusions by external hackers

Command-line scanner
The ashCmd program uses the same avast! scanning engine to detect potential malware infections so the results are exactly the same as running a scan via the normal program interface. The avast! command-line scanner, ashCmd.exe, is normally installed in the directory C:Program FilesAlwil Softwareavast5.

A scan is run from the command prompt using various switches and parameters. To see a description of the parameters, locate the ashCmd file and double click on it. This will open a new window in which the various parameters are displayed.

Here are some key features of "Avast! Internet Security":

· High performance antivirus engine
· Anti-rootkit protection
· Anti-spyware protection
· Script shield
· Process virtualization
· Command line scanner
· Anti-spam filter
· Built-in firewall

Requirements:

· Processor Pentium 3,
· 128 MB RAM,
· 100 MB of free hard disk space

Limitations:

· 30 days trial

[url=http://files.avast.com/iavs5x/setup_ais_eng.exe]Avast! Internet Security 5.0.377 Final(directlink n RESUME SUPPORT)[/url]

Avast! Pro Antivirus 5.0.377 Final

Continuous protection against viruses and spyware

avast! is a package of applications that aim to protect your computer from a possible virus infection or other malware threat. If you use it correctly, and in combination with other programs such as data backup utilities, it will significantly reduce the risk of your computer being attacked or infected by a virus, and thus the risk of losing important or private data.

These help files have been created to help you understand how the program works as a whole, as well as describing the properties and functions of its component parts. We assume the user has knowledge of basic terms and the basic skills needed to use the Windows operating system. If you are not familiar with terms such as "folder", "file", or "window", or what it means to "activate a window" or "click a button", we recommend that you consult the appropriate user manual before proceeding.

Based on the award-winning avast! antivirus engine, avast! antivirus 5.0 contains all of the features you would expect in a modern antivirus program. It incorporates anti-spyware technology certified by West Coast Labs' Checkmark process, as well as anti-rootkit and strong self-protection capabilities, but now provides even faster scanning with improved detection ability. It contains several real-time "Shields" which continuously monitor your email and internet connections and check the files on your computer whenever they are opened or closed.

- Continuous protection against viruses and spyware
- Ensures all mails sent and received are clean
- Keeps you protected from "chat" infections
- Stops attacks from hijacked websites
- Lets you safely browse suspicious websites or run unknown applications
- Allows safe and uninterrupted gaming

Here are some key features of "Avast! Pro Antivirus":

· Core and detection
· Antivirus and anti-spyware engine
· State of the art scanning engine provides reliable protection against viruses, spyware and other forms of malicious software.

· Real time anti-rootkit protection
· Unique "on access" technology checks all kernel-mode drivers that the operating system is loading for signs of rootkit behavior. This enables even unknown rootkits to be detected and stopped before they can do any damage.
· avast! Sandbox
· Enables potentially exploitable programs (such as web browsers) and/or suspicious executables to be run in a safe, virtual environment. The avast! Sandbox is unique as it runs on both 32 and 64bit platforms.

· avast! Community IQ
· Most samples we process come from sensors deployed throughout the avast! community in the Behavior shield and anti-rootkit modules. This is a unique source of data made possible only thanks to our huge user base. Most of the collected samples are analysed by a number of automated processes and only a small fraction of the samples need to be processed manually by our virus analysts.

· Code emulator
· When a suspicious executable is encountered (during both on-demand and on-access scanning), avast! is able to emulate the program’s code in an isolated environment. The code emulator is used for two purposes. First, it is used for generic unpacking. Secondly, it is used in the heuristics engine. Technically, this is done using dynamic translation, a method much faster than traditional emulation techniques.

· Heuristics engine
· Starting with version 5.0, avast! features a new heuristics engine designed to proactively detect malware undetectable with normal definitions. The heuristics engine is able to cover both binary (executable) and script malware.

· Potentially unwanted programs detection
· New in version 5.0, avast! now detects potentially unwanted programs, such as remote admin tools and commercial key loggers. Custom rules can be set for dealing with these types of programs.

· Scanning
· Boot-time scanner
· Allows you to scan your computer for infections before the operating system has started and before a virus can be activated (32-bit operating systems only).

· Command-line scanner
· Enables you to run a scan directly from the command line.

· Wake-up for scan
· Microsoft Windows is woken from sleep or hibernation mode, performs a scheduled scan, then returns back to sleep mode.

· Scheduled scanning
· Allows users to define the scan time and files to be scanned.

· avast! Intelligent Scanner
· Can reduce the number of required file scans by up to 80% through a white list of proven safe applications. Files identified as safe are not rescanned unless they change.

· Shields
· Behavior Shield
· Monitors activity on your computer using a number of sensors (file system, registry and network based) and reports/blocks any suspicious behavior.

· Behavioral Honeypots
· avast! sensors identify and monitor suspicious file activity on selected computers, automatically submitting files to the Virus Lab for additional analysis.

· File System Shield
· Real-time scanning of opened/executed files.

· Mail Shield
· Scans all incoming/outgoing e-mails for malware. For MS Outlook, a special plug-in is used. Other email clients are protected by a generic POP3/IMAP4/SMTP proxy. New in version 5, the proxy also supports scanning of SSL communication (gmail.com, sympatico.ca, ….)

· Web Shield
· Scans all visited web pages and checks all files, pages and java scripts downloaded from the internet. Thanks to the Intelligent Stream Scan feature, the Web shield doesn't slow down your web browsing.

· P2P Shield
· Checks files downloaded using P2P programs. - ABC, Ares, Azureus, BearShare, Bit Torrent, BitComet, BitLord, BitPump, CZDC++, Direct Connect, eDonkey, eMule, iDC++, iMesh, Kazaa, Kceasy, LimeWire, Morpheus, Opera's DC++, Overnet, Qtrax, Shareaza, SoulSeek, StrongDC++, uTorrent, Vuze, WinMX, Winny2, Zultrax.

· IM Shield
· Checks files downloaded while using instant messaging or “chat” programs. - AIM (AOL Instant Messenger), Gadu-Gadu, gaim/Pidgin, Google Talk, ICQ, IM2 Messenger, Infium, Miranda, mIRC, MSN/Windows Messenger, Odigo, PalTalk Messenger, Psi Jabber Client, QIP, QQ, SIM, Skype, Tlen, Trillian, WengoPhone, XFire, Yahoo! Messenger.

· Network Shield
· Provides protection against network-based viruses. The module has two main components: a URL blocker, designed to block malicious URLs (as defined by the Virus Lab), and a lightweight intrusion-detection system.

· Script Shield
· Detects malicious scripts hidden in internet web pages and prevents them from running and hijacking or potentially causing damage to your computer (Internet Explorer only, 32-bit only).

· Updates
· Smart virus definition updates
· Incremental updating system minimizes the size of regular update files.

· Fast application of updates
· New format for the virus definition file speeds up application of updates into avast! 5.0 and reduces demand on CPU/memory, resulting in uninterrupted computer use.
· New format for the virus definition file means faster updates and reduces demand on CPU/memory, resulting in uninterrupted computer use.

· Gaming
· Silent/Gaming Mode
· New Silent/Gaming Mode automatically detects full-screen applications and disables pop-ups and other on-screen notifications without degrading security.

· Optimized for latest Intel Core i7 CPUs
· Critical sections of the avast! scanning engine code have been optimized to deliver unrivaled performance on the latest Intel chips.

· CPU optimization
· Multi-threaded scanning optimization
· avast! runs faster on new multi-core CPUs. A new avast! feature allows the splitting of large individual files between cores, accelerating the scanning process.

· Green computing
· Reduced demands on the disk drive result in lower energy consumption.

· Miscellaneous
· avast! iTrack
· Real-time graphic scanning reports.

· Graphical user interface
· Easy to navigate graphical interface.

· Automatic processing
· Infected files are processed automatically without requiring user instructions.

Requirements:

· Processor Pentium 3,
· 128 MB RAM,
· 100 MB of free hard disk space

Limitations:

· 30 days trial


[url=http://files.avast.com/iavs5x/setup_av_pro_eng.exe]Avast! Pro Antivirus 5.0.377 Final RESUME SUPPORT[/url]

the settelers 2


http://www.megaupload.com/?d=3SNBZTO9
http://www.megaupload.com/?d=NKAF7QW7
http://www.megaupload.com/?d=ANBHDYUN
http://www.megaupload.com/?d=RLGOWKML
http://www.megaupload.com/?d=GZSRLUUN
http://www.megaupload.com/?d=6CYT7YER
http://www.megaupload.com/?d=0AUL62GS
http://www.megaupload.com/?d=QTP8SUD3

C S



http://rapidshare.com/files/100695699/Counter_Strike_Condition_Zero.part1.rar

http://rapidshare.com/files/101174297/Counter_Strike_Condition_Zero.part2.rar

http://rapidshare.com/files/101171680/Counter_Strike_Condition_Zero.part3.rar

mortal combat

http://hotfile.com/dl/11252542/bdadd02/MK_5_Deadly_Alliance.rar.html

Now God of war 1 size 179mb


http://hotfile.com/dl/24218104/1b5f723/God_of_War.7z.html

direct download +rsume support game









http://hotfile.com/dl/27971299/5d88f2c/Cartoon.Network.Mega.Games.Pack.part1.rar.html
http://hotfile.com/dl/27971909/9724d64/Cartoon.Network.Mega.Games.Pack.part2.rar.html
http://hotfile.com/dl/28312395/ffe01c6/3DGIRLZZ11.rar.html