Monday 29 October 2012

Medal Of Honour

                                                                                                                                                                 
                                                   www.techmaniax.blogspot.in                                                                     
                                                                                                                                                                 

 Medal Of Honour:WarFighter Limited Edition+Crack Only+BLACBOX PC Game Download

 


 



 


Written by active U.S. Tier 1 Operators while deployed overseas and inspired by real world threats, Medal of Honor Warfighter™ delivers an aggressive, gritty, and authentic experience that puts gamers in the boots of today’s most precise and disciplined warrior. Medal of Honor Warfighter is an up close and look at today’s battlefield and the fight against the ongoing global terror threat.
Following on the heels of 2010’s Medal of Honor that took the game series out of World War II and introduced players to today’s most elite U.S. warriors, Medal of Honor Warfighter takes players out of Afghanistan to continue to experience gameplay missions with a dotted line to real world incursions. This is Tier 1 on a global scale, featuring real world hotspots and international Tier 1 Operators in Multiplayer.
Medal of Honor Warfighter tells the story of U.S. Tier 1 Operator, “Preacher” as he returns home from overseas only to find his family torn apart from years of deployment. Trying to pick up the pieces to salvage what remains of his marriage, Preacher is reminded of what he’s fighting for – family. But when an extremely deadly explosive (PETN) penetrates civilian borders and his two worlds collide, Preacher and his fellow teammates are sent in to solve the problem. They take the fight to the enemy and do whatever it takes to protect their loved ones from harm.
Global Warfighters: Go head-to-head with the world’s best special operations forces.
Authentic Action: Medal of Honor Warfighter connects dotted lines to real global terror events.
Best in Class Engine: Frostbite 2 is next generation technology today.
 
 
 
Vista
Intel Core 2 2.4GHz / Athlon X2 2.7GHz
At least 2 GB
CD/DVD ROM drive (required for installation only)
At least 20GB of space
NVidia GTS 512 MB VRAM or better / ATI Radeon 3870 512 MB VRAM
DirectX 10.1 compatible
512 MB or better
1 MB DSL KBPS or faster
and Mouse

  

 


image
image
image
image



Direct Links

Rapidshare Links

Extabit Links


  1. https://safelinking.net/d/28b8ad3aaf
  2. https://safelinking.net/d/852eb3cec2
  3. https://safelinking.net/d/a8ecee8a63
  4. https://safelinking.net/d/b495284af7
  5. https://safelinking.net/d/69a2fcd1ad
  6. https://safelinking.net/d/07938e90cb
  7. https://safelinking.net/d/98a46bb4c3
  8. https://safelinking.net/d/c61a09e376
  9. https://safelinking.net/d/03ba413ebf
  10. https://safelinking.net/d/9dad347c93
  11. https://safelinking.net/d/d16561672e
  12. https://safelinking.net/d/aeb86cc6e1
  13. https://safelinking.net/d/da8fd5c905
Putlocker Links


Pass: www.sntdownloads.com

CRACK
Pass: www.p30day.com
Note – Go to the download link, click on “Skip Ad” and then if it gives “403 Forbidden Error” then just copy the link from the url bar of your browser and copy it to your download manager and start the download it will work…

BLACKBOX

Putlocker Links

  1. https://safelinking.net/d/d4e42a8c3c
  2. https://safelinking.net/d/bed203c909
  3. https://safelinking.net/d/ed91bc8380
  4. https://safelinking.net/d/df99dc89ca
  5. https://safelinking.net/d/00284f7298
  6. https://safelinking.net/d/8b33256e52
  7. https://safelinking.net/d/1e599efcba
  8. https://safelinking.net/d/3c76e3936a
  9. https://safelinking.net/d/d88ffb5116
  10. https://safelinking.net/d/58a78b6a34
  11. https://safelinking.net/d/cf8b6a0f2e
  12. https://safelinking.net/d/e6f8631549

Rapidshare Links

  1. https://safelinking.net/d/e79027988b
  2. https://safelinking.net/d/d577c5c08c
  3. https://safelinking.net/d/ee12dd6b47
  4. https://safelinking.net/d/bc41cc6259
  5. https://safelinking.net/d/ad4ee79e13
  6. https://safelinking.net/d/23cdf06e58
  7. https://safelinking.net/d/c74bf9141b
  8. https://safelinking.net/d/8cef8262f4
  9. https://safelinking.net/d/79298725b8
  10. https://safelinking.net/d/60216dc4a5
  11. https://safelinking.net/d/b470cf7eec
  12. https://safelinking.net/d/7e05dc0d38
Pass: www.blackboxrepack.com

 

Tuesday 23 October 2012

Assassin's Creed

                                                                                                                                                                   
                                                                                                                                                                   
                                                                                                                                                                    

 

Assassin's Creed - PC Game

 

 

 

Assassin's Creed

  • Publisher: Ubisoft
  • Developer: Ubisoft Montreal
  • Genre: Action, Aventure
  • Release Date: April 9, 2008

About Assassin's Creed


The first game in the Assassin's Creed franchise is set in 1191 AD, when the Third Crusade was tearing the Holy Land apart. Shrouded in secrecy and feared for their ruthlessness, the Assassins intend to stop the hostilities by suppressing both sides of the conflict. Players, assuming the role of the main character Altair, will have the power to throw their immediate environment into chaos and to shape events during this pivotal moment in history.

Minimum System Requirements

  • OS: Windows XP/Vista
  • Processor: Intel Pentium D Dual Core @ 2.6 GHz
  • Memory: 1 Gb
  • Hard Drive: 8 Gb free
  • Video Memory: 256 Mb
  • Video Card: nVidia GeForce 6800 / ATI Radeon X1600
  • Sound Card: DirectX Compatible
  • DirectX: 9.0c
  • Keyboard
  • Mouse
  • DVD Rom Drive

Recommended System Requirements

  • OS: Windows XP/Vista
  • Processor: Intel Core 2 DUO @ 2.2 GHz
  • Memory: 2 Gb
  • Hard Drive: 8 Gb free
  • Video Memory: 512 Mb
  • Video Card: nVidia GeForce 8800 / ATI Radeon HD 2900
  • Sound Card: DirectX Compatible
  • DirectX: 9.0c or 10
  • Keyboard
  • Mouse
  • Other Controllers: XBOX 360 Controller for Windows
  • DVD Rom Drive 


















Download Assassin's Creed – Direct Links

Part 01 – 700 MB

Part 02 – 700 MB

Part 03 – 700 MB

Part 04 – 700 MB

Part 05 – 700 MB

Part 06 – 700 MB

Part 07 – 700 MB

Part 08 – 700 MB

Part 09 – 700 MB

Part 10 – 230 MB

CRACK

www.elj-games.blogspot.com

Wednesday 10 October 2012

Alcohol 120%


                                                                                                                                                                    
                                                           Techmaniax.blogspot.in                                                                     
                                                                                                                                                                    
        

  Alcohol 120% 1.9.8.7424




                                   Image Hosted by ImageShack.us






                                                                   
                                                                 Image Hosted by ImageShack.us

Alcohol 120% is CD/DVD emulation and recording software that allows users to copy discs. Store your most used or important CDs as images on your computer and run them at 200x speed from up to 31 virtual CD or DVD drives. Alcohol is compatible with more than 99% of drives available. It supports the latest image file types including - MDS, CCD, BIN, CUE, ISO, CDI, BWT, BWI, BWS, BWA and many more.


                                                                  Image Hosted by ImageShack.us

Alcohol 120% 1.9.8.7424 - MediaFire Link


Monday 8 October 2012

Secure Your Wireless (Wi-Fi) Home Network


                                                                                                                                                                   
                                                     Techmaniax.blogspot.in                                                                         
                                                                                                                                                                   



How to Secure Your Wireless (Wi-Fi) Home Network


This article describes how you can secure your Wireless Network from hackers and you’ll also learn about free tools that people generally use to intercept your Wi-Fi signals.
Wireless networks (wi-fi)Wireless Networking (Wi-Fi) has made it so easy for you to use the computer, portable media player, mobile phones, video game consoles, and other wireless devices anywhere in the house without the clutter of cables.
With traditional wired networks, it is extremely difficult for someone to steal your bandwidth but the big problem with wireless signals is that others can access the Internet using your broadband connection even while they are in a neighboring building or sitting in a car that’s parked outside your apartment.
This practice, also known as piggybacking, is bad for three reasons:
  • It will increase your monthly Internet bill especially when you have to pay per byte of data transfer.
  • It will decrease your Internet access speed since you are now sharing the same internet connection with other users.
  • It can create a security hazard* as others may hack your computers and access your personal files through your own wireless network.
[*] What do the bad guys use - There have been quite a few instances where innocent Internet users have been arrested for sending hate emails when in reality, their email accounts where hacked though the unsecured Wi-Fi networks that they had at home.Wireshark is a free packet sniffing tool for Linux, Mac and Windows that can scan traffic flowing though a wireless network including cookies, forms and other HTTP requests.

How to Secure Your Wireless Network

The good news is that it is not very hard to make your wireless network secure, which will both prevent others from stealing your internet and will also prevent hackers from taking control of your computers through your own wireless network.
Here a few simple things that you should to secure your wireless network:

Step 1. Open your router settings page

First, you need to know how to access your wireless router’s settings. Usually you can do this by typing in “192.168.1.1” into your web browser, and then enter the correct user name and password for the router. This is different for each router, so first check your router’s user manual.
You can also use Google to find the manuals for most routers online in case you lost the printed manual that came with your router purchase. For your reference, here are direct links to the manufacturer’s site of some popular router brands – LinksysCiscoNetgear,Apple AirPortSMCD-LinkBuffaloTP-LINK3ComBelkin.

Step 2. Create a unique password on your router

Once you have logged into your router, the first thing you should do to secure your network is to change the default password* of the router to something more secure.
This will prevent others from accessing the router and you can easily maintain the security settings that you want. You can change the password from the Administration settings on your router’s settings page. The default values are generally admin / password.
[*] What do the bad guys use - This is a public database of default usernames and passwords of wireless routers, modems, switches and other networking equipment. For instance, anyone can easily make out from the database that the factory-default settings for Linksys equipment can be accessed by using admin for both username and password fields.

Step 3. Change your Network’s SSID name

The SSID (or Wireless Network Name) of your Wireless Router is usually pre-defined as “default” or is set as the brand name of the router (e.g., linksys). Although this will not make your network inherently* more secure, changing the SSID name of your network is a good idea as it will make it more obvious for others to know which network they are connecting to.
This setting is usually under the basic wireless settings in your router’s settings page. Once this is set, you will always be sure that you are connecting to the correct Wireless network even if there are multiple wireless networks in your area. Don’t use your name, home address or other personal information in the SSID name.
[*] What do the bad guys use - Wi-Fi scanning tools like inSSIDer (Windows) andKismet (Mac, Linux) are free and they will allow anyone to find all the available Wireless Networks in an area even if the routers are not broadcasting their SSID name.

Step 4. Enable Network Encryption

In order to prevent other computers in the area from using your internet connection, you need to encrypt your wireless signals.
There are several encryption methods for wireless settings, including WEPWPA (WPA-Personal), and WPA2 (Wi-Fi Protected Access version 2). WEP is basic encryption and therefore least secure (i.e., it can be easily cracked*, but is compatible with a wide range of devices including older hardware, whereas WPA2 is the most secure but is only compatible with hardware manufactured since 2006.
To enable encryption on your Wireless network, open the wireless security settings on your router’s configuration page. This will usually let you select which security method you wish to choose; if you have older devices, choose WEP, otherwise go with WPA2. Enter a passphrase to access the network; make sure to set this to something that would be difficult for others to guess, and consider using a combination of letters, numbers, and special characters in the passphrase.
[*] What do the bad guys use - AirCrack and coWPAtty are some free tools that allow even non-hackers to crack the WEP / WPA (PSK) keys using dictionary or brute force techniques. A video on YouTube suggests that AirCrack may be easily used to break WiFi encryption using a jail-broken iPhone or an iPod Touch.

Step 5. Filter MAC addresses

Whether you have a laptop or a Wi-Fi enabled mobile phone, all your wireless devices have a unique MAC address (this has nothing to do with an Apple Mac) just like every computer connected to the Internet has a unique IP address. For an added layer of protection, you can add the MAC addresses of all your devices to your wireless router’s settings so that only the specified devices can connect to your Wi-Fi network.
MAC addresses are hard-coded into your networking equipment, so one address will only let that one device on the network. It is, unfortunately, possible to spoof a MAC address*, but an attacker must first know one of the MAC addresses of the computers that are connected to your Wireless network before he can attempt spoofing.
To enable MAC address filtering, first make a list of all your hardware devices that you want to connect to your wireless network**. Find their MAC addresses, and then add them to the MAC address filtering in your router’s administrative settings. You can find the MAC address for your computers by opening Command Prompt and typing in “ipconfig /all”, which will show your MAC address beside the name “Physical Address”. You can find the MAC addresses of Wireless mobile phones and other portable devices under their network settings, though this will vary for each device.
[*] What do the bad guys use - Someone can change the MAC address of his or her own computer and can easily connect to your network since your network allows connection from devices that have that particular MAC address. Anyone can determine the MAC address of your device wireless using a sniffing tool like Nmap and he can then change the MAC address of his own computer using another free tool like MAC Shift.

Step 6. Reduce the Range of the Wireless Signal

If your wireless router has a high range but you are staying in a small studio apartment, you can consider decreasing the signal range by either changing the mode of your router to 802.11g (instead of 802.11n or 802.11b) or use a different wireless channel.
You can also try placing the router under the bed, inside a shoe box or wrap a foil around the router antennas so that you can somewhat restrict the direction of signals.
Apply the Anti-Wi-Fi Paint – Researchers have developed a special Wi-Fi blocking paint that can help you stop neighbors from accessing your home network without you having to set up encryption at the router level. The paint contains chemicals that blocks radio signals by absorbing them. “By coating an entire room, Wi-Fi signals can’t get in and, crucially, can’t get out.”

Step 7. Upgrade your Router’s firmware

You should check the manufacturer’s site occasionally to make sure that your router is running the latest firmware. You can find the existing firmware version of your router using from the router’s dashboard at 192.168.*.

Connect to your Secure Wireless Network

To conclude, MAC Address filtering with WPA2 (AES) encryption (and a really complex passphrase) is probably the best way to secure your wireless network.
Once you have enabled the various security settings in your wireless router, you need to add the new settings to your computers and other wireless devices so that they all can connect to the Wi-Fi network. You can select to have your computer automatically connect to this network, so you won’t have to enter the SSID, passphrase and   other information every time you connect to the Internet.
Your wireless network will now be a lot more secure and intruders may have a tough time intercepting your Wi-Fi signals.

Who is Connected to your Wireless Network

If you are worried that an outsider may be connecting to the Internet using your Wireless network, try AirSnare – it’s a free utility that will look for unexpected MAC addresses on your Wireless network as well as to DHCP requests. Another option is that you open your router’s administration page (using the 192.168.* address) and look for the DHCP Clients Table (it’s under Status > Local Network on Linksys routers). Here you will see a list of all computers and wireless devices that are connected to your home network.
*It is also a good idea to turn off the router completely when you are not planning to use the computer for a longer period (like when you are out shopping). You save on electricity and the door remains 100% shut for wireless piggybackers.
**If you ever want to let a new device connect to your network, you will have to find its MAC address and add it to your router. If you simple want to let a friend connect to your wireless network one time, you can remove his MAC address from the router settings when he or she leaves your place.

Build a Wireless Home Network without a Router

Build a Wireless Home Network without a Router


Let’s say you have one internet connection at home that you want to share across all your desktop and laptop computers, your Wi-Fi enabled mobile phones, tablets, video game consoles (like the Xbox), digital photo frames and any other wireless devices that you may have at home
.
How do you do this?
The easiest way to setup a wireless network, as we all know, is with the help of a router – just attach a wireless router to your modem and any Wi-Fi enabled gear, that’s located inside the signal range of your router, will be able to connect to the web using that lone Internet connection.

Setup Wireless Network without a Wireless Router

Now consider a slightly different scenario – you have all these Wi-Fi enabled devices at home but there’s no router. Well, there’s no reason to buy one because you can still easily setup a wireless network as long as your computers have a wireless network adapter*.
wireless network adapters
[*] Most new desktops and laptop computers are already equipped with internal network adapters so you are ready to go without a router.
If your computer doesn’t have built-in wireless capabilities, you can either buy a USB network adapter that plugs into the USB port of your desktop or go for a wireless adapterthat directly plugs into your notebook’s PC Card slot. Desktop users can also opt for an internal wireless PCI card but you’ll have to open the computer case in order to install this network adapter.

Create a Wi-Fi Network without a Router

Now that you have everything in place to create a Wi-Fi network, let’s actually build one.
For Windows XP and Vista users
If your main computer, that is already connected to the internet, is running Windows XP, Vista or even Mac OS X, you can set up an ad-hoc Wi-Fi network and the other wireless devices can then connect to the web via this ad-hoc network (also called a computer-to-computer network).
Wired Connection In, Wireless Connection Out
It’s an easy process. To set up an ad-hoc network in Windows Vista, go to Network and Sharing Center from the control panel, select “Set up a connection or network” and choose “Set up a wireless ad hoc (computer-to-computer) network”.
Make sure you select “Save this network” option else the ad hoc network will be removed if no other computers / devices are connecting to the network.
create wireless ad hoc network
save ad-hoc network
Turn on Internet Sharing in the next screen and now your other home computers can connect to the ad hoc network just like they would connect to any regular wireless network. Setting up an ad hoc network in XP takes a couple of extra steps but also make sure the host computer is running at least XP SP2 or SP3.
For Windows 7 users
If you are on Windows 7, you can instantly turn your  computer into a personal Wi-Fi hotspot without having to configure anything. All you need is a free software called Virtual Router and the computer connected to the internet must be running Windows 7.
[*] Virtual Router works will all editions of Windows 7 except the Starter edition because Microsoft has disabled the Virtual Wifi feature in that particular edition.
virtual  wifi router
Using the virtual router is simple – just run the program on any Windows 7 computer, assign a password and that’s it. In the above example, I used the Virtual Router to connect an iPod, an Ubuntu Linux laptop and a Windows desktop to the Internet via a Windows 7 notebook where that virtual router software was running.
As new devices join the Wireless network, their assigned IP and MAC addresses instantly appear in the Virtual Router window. And you can click the “Stop Router” button anytime to deactivate the hotspot and disable Internet sharing.

Editing in Adobe Acrobat

How to Edit PDF Files without Adobe Acrobat


The PDF file format was originally created by Adobe in the early ’90s and there are now over 700+ million PDF documents on the Internet according to Google (search for filetype:pdf).
PDF EditingThere are several reasons why the PDF file format is so popular for exchanging all sorts of documents including presentations, CAD Drawings, invoices and even legal forms.
  • PDF files are generally more compact (smaller in size) than the source document and they preserve the original formatting.
  • Unlike Word and other popular document formats, the content of a PDF file cannot be modified easily. You can also prevent other users from printing or copying text from PDF documents.
  • You can open a PDF file on any computer or mobile device with free software like Adobe Acrobat Reader. Google Chrome can read PDFs without requiring plugins and it cancreate PDFs.

Edit PDF Files using Free Alternatives to Adobe Acrobat

While PDF Files are “read only” by default, there are ways by which you can edit certain elements* of a PDF document for free without requiring the source files or any of the commercial PDF editing tools like Adobe Acrobat.
We will primarily focus on tools that let you alter the actual contents of a PDF file>. If you are looking to manipulate the PDF file structure itself like rearranging pages or merging multiple PDFs into one, please refer to this detailed Adobe PDF Guide.

An Online PDF Editor for Basic Tasks

Sometimes you need to make minor changes to a PDF file. For instance, you may want to hide your personal phone number from a PDF file before uploading it online or may want to annotate a page with notes and freehand drawings.
You can perform such edits in a PDF easily with PDFEscape.com, an online PDF editor that is free and also lets you edit password-protected PDF documents in the browser.
With PDF Escape, you can hide* parts of a PDF file using the whiteout tool or add annotations with the help of custom shapes, arrows, text boxes and sticky notes. You can add hyperlinks to other PDF pages / web documents.
[*] Hiding is different from redaction because here we aren’t changing the associated metadata of a PDF file but just hiding certain visible parts of a PDF file by pasting an opaque rectangle over that region so that the stuff beneath the rectangle stays invisible.

Change Metadata of PDF Files

If you would like to edit the meta-data associated* with a PDF document, check out Becy PDFMetaEdit. This is a free utility that can help you edit properties of a PDF document including the title, author name, creation data, keywords, etc.
The tool can also be used for removing PDF passwords as well as for encrypting PDF documents such that only users who know the password can read the contents of your PDF files. And since this PDF metadata plus bookmarks editor can be executed from the command line, you can use it to update information in multiple PDF files in a batch.
[*] If you planning to post your PDF files on the web, you should consider adding proper metadata to all the files as that will help improve the organic rankings of your PDF files in Google search results.

Edit the Text of a PDF File

If you want to edit the text in a PDF file but don’t have access to the source documents, your best bet is that you convert the PDF file into an editable Word document or an Excel spreadsheet depending on the contents of the PDF.
Then edit these converted PDFs in Microsoft Office (or Google Docs) and export the modified files back into PDF format using any PDF writer.
If your PDF document is mostly text, you may use the desktop version of Stanza to convert that PDF into a Word document. If the document includes images, charts, tables and other complex formatting, try the online PDF to Word converter from BCL Research or the one from NitroPDF – the former offers instant conversion while the latter service can take up to a day though its yields more accurate results.

Advanced PDF Editing (Images, text, etc.)

Now that you know the basic PDF editing tools, let’s look at another set of PDF editors that are also free but can help you do some more advanced editing like replacing images on a PDF file, adding signatures, removing blocks of text without breaking the flow of the document, etc.
First there’s PDF XChange, a free PDF viewer and editor that you also may use for typing text directly on any PDF page. PDF XChange also supports image stamps so you may use the tool for signing PDF files or for inserting images anywhere on a PDF page.
Then you have Inkscape, a free vector drawing tool (like Adobe Illustrator) that can natively import and export PDF content.

Video: How to Edit PDF Files with Inkscape

With Inkscape, you can select any object on a PDF page (including text, graphics, tables, etc.) and move them to a different location or even remove them permanently from the PDF file. You can also annotate PDF files with Inkscape or draw freehand on a page using the built-in pencil tool.
The next tool in the category of advanced PDF editors is OpenOffice Draw with thePDFImport extension. OpenOffice Draw supports inline editing so you can easily fix typos in a PDF document or make formatting related changes like replacing color, increasing or decreasing the text size, replacing the default font-family, etc.
Like Inkscape, the OpenOffice toolbox also includes support for annotations, shapes, images, tables, charts, etc. but here you have more choices and the software also looks less complex.
Edit PDF Files
The OpenOffice suite is a little bulky (they don’t provide a standalone installer for Draw) but if you have the bandwidth, OpenOffice is the best tool for manipulating PDF documents when you don’t have the budget for Adobe Acrobat.