How To Get Services That Cost Over $100 For Only $4 !

Fourerr is a popular website where people post all sorts of jobs they are willing to do for $4.  Its premise is simple: after signing up, users post things they are willing to provide buyers – for $4 U.S, just as the website’s name suggests.  Buyers review the offers, find one that suits their needs, pay the provider and a $4 match is made.  Fourerr vendors get paid when they deliver the completed product or service to the buyer and the buyer marks the transaction as “complete.”  A commission is deducted and the balance is deposited into an account for the vendor where it can stay to buy the services of other Fourerr vendors, or it can be transferred to PayPal for deposit or withdrawal.

Fourerr is an inexpensive, fun way for vendors and buyers to find exactly what they want at a price anyone can afford.  The diversity and amount of products and services is staggering.  It is an online, virtual, global bazaar where everyone has a key role!  Where else can you purchase services for $4 that elsewhere cost over $100? Nowhere, only at

Tips For People Who Want To Use Pirated Software


I know you are reading this and you must be using some or many or all softwares which are actually pirated :p Dont worry, i am not going to tell you what you should use and what you should not. This post of mine is for you people only telling you about what precautions you should take in order to use them without any problem.


  1. Never Update the software even if it ask you to do so.Eg Internet Download Manager
  2. Avoid installing software when connected to internet. Just before installing it disconnect your internet connection
  3. Try to use the setup files downloaded from the author site and use only keys to make it full version as softwares downloaded from other sources may be infected by virus/trojans
  4. If you are downloading software from some torrent site then make sure you read the review about it before downloading it
  5. Some software auto-connects to its developers site and update itself. To stop them from doing this you need to install a good firewall software on your system. I will recommend Zone Alarm. After installing it all the connections preference will be decided by you so you may prevent them from connecting to their host.
  6. Still some softwares are coded in such a manner that they will update themselves whenever you connects to internet. So for them just make sure their processes are not running when you dont need it. Just remove its entry from startup.
  7. Some software are too much intelligent, eg Artisteer. Never use such softwares when you are connected to net.

By practising these methods you can live healthy pirated life 🙂

Note: Always use genuine softwares. Its good for software industry

Thanks for reading my post. If you have installed any software which has infected your system then you may remove the virus by using our methods

Thanks for reading my post. If you like it then do share with others. If you like thi site then bookmark it and visit again. Thank you

How to activate Kaspersky 2009 the easy way.

How to activate Kaspersky 2009 the easy way…

No keys necessary

First off download either KIS or KAV from the Kaspersky web site.

Once installed and it asks you to register, skip through this section.

After the computer has rebooted load up Kaspersky, click on “Settings” and go down to “Options” and un-check
“Enable Self-Defence”. Click ok.

Now disable Kaspersky and exit the program.

Next run regedit

Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\KasperskyL ab\protected\AVP8\environment\

Scroll down to Product Status and change from “Release” to “Beta”

Exit regedit and reload Kaspersky, you’ll notice that when you goto the area where you
normally input your key you now have an option to “Activate Beta Version”.

Click this and you’ll get a 30 day BETA trial, the great thing is you can just redo this time and again,
so 30 days later just do the same thing.

Basically what you’ve done here is fool the Kaspersky server into thinking your using the BETA version of
the product when infact your actually using the Release version that will give you all the updates etc like
a full release.

No more keys, no more nagging!!

Useful Google Talk Bots That You Must Add as Friend

Useful Google Talk Bots That You Must Add as Frnd
Here are the eleven most useful ‘bots’ that transform Google Talk into a more useful program:

feeds 1. – Add this IM Feeds bot as your Google Talk buddy and you’ll be able to read any blog or website that syndicates content via RSS feeds.

To subscribe to a website in GTalk, simply send a new IM message that says “sub” where is the site address that you want to read inside Google Talk.

2. – This secret bot lets you post to FriendFeed from Google Talk. You may submit either hyperlinks or text messages.

3. – This imified bot turns Google Talk into a real powerhouse.

imifiedYou can post bookmarks to delicious, send messages to Twitter, submit blog entries to WordPress, Tumblr or Blogger, manage events in Google Calendar, shorten long URLs, run whois and so on.

4. – Like IM Feeds, iNezha bot helps you read feeds inside Google Talk but this is slightly more versatile. For instance, you can simply say “digg” and it will show a list of all feeds that match that search term so you don’t have to type (or copy-paste) feed addresses.

5. Translation – This is a free service from Google that helps you translate words from a foreign language into your native language. Just add the relevant bot (e.g. for Hindi to English or for English to Hindi) as your buddy, send him a message and it will get translated instantly.

6. Use Google Talk with Twitter – Invite to become your friend in Google Talk and verify your account. Now whenever you IM this new friend, the message will automatically publish on your twitter account.

7. Set Task Reminders – If you need to remember something important, Google Talk can send you reminders for that event.

Just add timer to your Twitter friend’s list and then add to your buddy list in Gtalk. Now if you want to get a reminder after 50 minutes, send a direct message to twitter like “d timer 50 pick kids from school” and a reminder will automatically pop up in your Google Talk after 50 minutes.

8. Transliteration – If you want to chat in your mother tongue (like Hindi or Tamil) but feel more comfortable using the English keyboard, Google Transliteration bot will come in handy.

9. Xpenser – With xpenser, you can record travel expenses via email, SMS or even Google talk. Add as your buddy and send a message like “lunch 33.2 with Bill Gates” and that will be added as an expense to your online spreadsheet that can be accessed from anywhere.

10. – Like Imified, is one of the most useful Google bots out there especially if you are a social networking or micro-blogging addict.

Add to Gtalk and you can communicate with twitter, jaiku, wordpress,, facebook, myspace, bebo, friendfeed, linkedin, tumblr, plaxo, friendster, delicious and more.

11. Meshly – Add as your friend and you’ll be able to post web link to your Meshly account via Google Talk. You can also add tags, categories and description to your hyperlink via Gtalk itself.

This post was posted by Rishabh in OUG

How to move a half-finished download in uTorrent

If you download a lot of software, movies, and other illegal stuff from uTorrent, you might have run into this problem once or twice: you start a huge download, let’s say 24 Seasons 1 through 5, which is a whopping 60GB and you know it’s going to take at least two weeks to fully download.

In the meantime, you install other software on your computer and realize that you are running out of space on your main drive! Now what? Should you just not doing anything for two weeks and wait for the download to finish and then move it? Or do you want to delete what you already downloaded and start over at another location?

Heck no! You can actually move a uTorrent download in the middle of a download by following the steps below. And yes, I figured this out because I was downloading something huge!

Step 1: First of all, in order to change the download location of a uTorrent download in the middle of a download, you have to stop the download, otherwise it’ll give you an error that the files are in use.

So right-click on the entry and choose Stop:

move utorrent download

Step 2: Ok, so now that it is stopped, we can tell uTorrent a new location for where we want it to continue download the torrent. To do this, right-click and choose Advanced and then choose Set Download Location.

Go ahead and navigate to the new download location and click Save (do not change the file name).

change utorrent download location

Step 3: Now that the new location is set, you need to physically move the half-downloaded files from the old location to the new location that you just set in uTorrent.

Note that you can keep uTorrent open when moving the files because the torrent is Stopped and therefore not accessing the files. If the download consisted of a folder, make sure to move the entire folder, otherwise just move the single file.

Step 4: Now that the files have been moved, you need to start up the download again. uTorrent will recognize that the files are now in this new directory and will verify the files by scanning them.

So right-click and choose Start and then wait a few minutes while it verifies how much has already been downloaded:

move utorrent download location

Under Status, it should say Checked and then the percentage. If you have a very large download, it may take a little while, but it is NOT re-downloading the content. After that it will say Queued and then will go to Downloading status.

That’s it! So now your uTorrent download has been moved to a new location and is downloading at the new location. Enjoy!

How to see Rapidshare Folders by Users

You might have seen links like

where a collection of files can be seen. But the question is that how to find such links? Well google will help you in this 🙂

But how?

Use following keywords in google to see all rapidshare folders available on internet inurl:users “*” inurl:users “*” inurl:files “*” inurl:files “*” inurl:users (pass|password) inurl:users (pass|password)
Suppose u need some info on hacking.Then u can try following keywords to see all rapidshare folders having any hacking related thing in it inurl:users “hack” inurl:users “hacking”

And get you desired file/folder whatever you need. No need of any rapidshare search engine. Google will do everything for you 🙂

Thanks for reading my post. Stay tuned for updates. More to come

Send Ad Free SMS with your own Name as sender

Today, I got to know about a great service which lets you to Send Free SMS over 10 countries<. You don’t need to sign up. Your SMS will arrive guaranteed and there are no annoying ads also. The message can have upto 160 characters.
Cool Features:

  • Free SMS
  • No sign up required
  • Messaging to 10 countries, including India
  • Ad free messaging
  • Display your own number in the sender
  • Secured by Captcha

Tor: anonymity online [an excellent tool to defend your identity on net]

Countries such as China, Saudi Arabia etc. routinely block many websites. Interestingly entire and similar blog sites were banned in India not long ago. So it is no wonder that many of us are looking for ways to access blocked websites.

Tor is an excellent software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

Hundreds of thousands of people around the world use Tor for a wide variety of reasons: journalists and bloggers, human rights workers, law enforcement officers, soldiers, corporations, citizens of repressive regimes, and just ordinary citizens.


Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor’s hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they’re in a foreign country, without notifying everybody nearby that they’re working with that organization.

Groups such as Indymedia recommend Tor for safeguarding their members’ online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company’s patent lawyers?

A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.

The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.

You may download TOR from it’s official site