shantanushah.blogspot.com shantanushah.blogspot.com

SHANTANUSHAH.BLOGSPOT.COM

SHANTANU SHAH

This blog is for a personal use till yet. Posted by SHANTANU SHAH. Sunday, October 10, 2010. 4 Open Notepad and slowly type "Hello,friend how are you? I am fine bbye tc":. Set WshShell = WScript.CreateObject("WScript.Shell"). WshShell.SendKeys "lo ". WshShell.SendKeys ", fri". WshShell.SendKeys " how". WshShell.SendKeys " are". WshShell.SendKeys "I a". WshShell.SendKeys "m f". WSc, hoript.Sleep 500. WshShelw al.SendKeys " bb". WshShell.SendKeys "ye ". WshShell.SendKeys " tc". Posted by SHANTANU SHAH.

http://shantanushah.blogspot.com/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR SHANTANUSHAH.BLOGSPOT.COM

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

June

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Friday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 3.9 out of 5 with 15 reviews
5 star
8
4 star
1
3 star
4
2 star
0
1 star
2

Hey there! Start your review of shantanushah.blogspot.com

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

0.3 seconds

FAVICON PREVIEW

  • shantanushah.blogspot.com

    16x16

  • shantanushah.blogspot.com

    32x32

  • shantanushah.blogspot.com

    64x64

  • shantanushah.blogspot.com

    128x128

CONTACTS AT SHANTANUSHAH.BLOGSPOT.COM

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
SHANTANU SHAH | shantanushah.blogspot.com Reviews
<META>
DESCRIPTION
This blog is for a personal use till yet. Posted by SHANTANU SHAH. Sunday, October 10, 2010. 4 Open Notepad and slowly type Hello,friend how are you? I am fine bbye tc:. Set WshShell = WScript.CreateObject(WScript.Shell). WshShell.SendKeys lo . WshShell.SendKeys , fri. WshShell.SendKeys how. WshShell.SendKeys are. WshShell.SendKeys I a. WshShell.SendKeys m f. WSc, hoript.Sleep 500. WshShelw al.SendKeys bb. WshShell.SendKeys ye . WshShell.SendKeys tc. Posted by SHANTANU SHAH.
<META>
KEYWORDS
1 skip to main
2 skip to sidebar
3 shantanu shah
4 fun hack cont
5 type
6 wshshell.run notepad
7 wscript sleep 100
8 wshshell appactivate notepad
9 wscript sleep 500
10 wshshell sendkeys hel
CONTENT
Page content here
KEYWORDS ON
PAGE
skip to main,skip to sidebar,shantanu shah,fun hack cont,type,wshshell.run notepad,wscript sleep 100,wshshell appactivate notepad,wscript sleep 500,wshshell sendkeys hel,wshshell sendkeys end,wshshell sendkeys you,wshshell sendkeys,wshshell sendkeys ine
SERVER
GSE
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

SHANTANU SHAH | shantanushah.blogspot.com Reviews

https://shantanushah.blogspot.com

This blog is for a personal use till yet. Posted by SHANTANU SHAH. Sunday, October 10, 2010. 4 Open Notepad and slowly type "Hello,friend how are you? I am fine bbye tc":. Set WshShell = WScript.CreateObject("WScript.Shell"). WshShell.SendKeys "lo ". WshShell.SendKeys ", fri". WshShell.SendKeys " how". WshShell.SendKeys " are". WshShell.SendKeys "I a". WshShell.SendKeys "m f". WSc, hoript.Sleep 500. WshShelw al.SendKeys " bb". WshShell.SendKeys "ye ". WshShell.SendKeys " tc". Posted by SHANTANU SHAH.

INTERNAL PAGES

shantanushah.blogspot.com shantanushah.blogspot.com
1

SHANTANU SHAH: Fun Hack cont...

http://www.shantanushah.blogspot.com/2010/10/4.html

This blog is for a personal use till yet. Posted by SHANTANU SHAH. Sunday, October 10, 2010. 4 Open Notepad and slowly type "Hello,friend how are you? I am fine bbye tc":. Set WshShell = WScript.CreateObject("WScript.Shell"). WshShell.SendKeys "lo ". WshShell.SendKeys ", fri". WshShell.SendKeys " how". WshShell.SendKeys " are". WshShell.SendKeys "I a". WshShell.SendKeys "m f". WSc, hoript.Sleep 500. WshShelw al.SendKeys " bb". WshShell.SendKeys "ye ". WshShell.SendKeys " tc". WEP CRACK on BACKTRACK 4.

2

SHANTANU SHAH: STRONG PASSWORD

http://www.shantanushah.blogspot.com/2010/05/strong-password.html

This blog is for a personal use till yet. Posted by SHANTANU SHAH. Saturday, May 15, 2010. A Good Password must have 3 specialties :. 1IT SHOULD BE A COMBINATION OF ALPHABETS CHARACTERS(LOWER and UPPER CASES)AND NON ALPHABETIC CHARACTERS(*& $). 2SHOULD NOT BE YOUR NAME RELATIVES (GF/BF). 3IT SHOULD NOT BE TOLD TO ANYONE. Subscribe to: Post Comments (Atom). WEP CRACK on BACKTRACK 4. GOOGLE DRIVES IT FOR YOU.

3

SHANTANU SHAH: May 2010

http://www.shantanushah.blogspot.com/2010_05_01_archive.html

This blog is for a personal use till yet. Posted by SHANTANU SHAH. Saturday, May 15, 2010. A Good Password must have 3 specialties :. 1IT SHOULD BE A COMBINATION OF ALPHABETS CHARACTERS(LOWER and UPPER CASES)AND NON ALPHABETIC CHARACTERS(*& $). 2SHOULD NOT BE YOUR NAME RELATIVES (GF/BF). 3IT SHOULD NOT BE TOLD TO ANYONE. Posted by SHANTANU SHAH. Monday, May 10, 2010. What you will need. 1 A flash drive that is at least 4 GB. (maybe 2 GB). Considering the ISO is only 1570 MB, I would think 2 GB.

4

SHANTANU SHAH: Fun Hack

http://www.shantanushah.blogspot.com/2010/10/fun-hack.html

This blog is for a personal use till yet. Posted by SHANTANU SHAH. Sunday, October 10, 2010. Here are few of the pranks which you can play with your friends. on a remote system and on your own system which will make them feel that the system has got some viruses in it. THESE COMMANDS HaVE TO BE WRITTEN ON NOTEPAD:. 1Display a little message and shut down his/her computer :. Msg * I don't like you. You are too * * *! Save it as "Anyname.BAT" in All Files and send it. Save as "Anyname.VBS" and send it.

5

SHANTANU SHAH: BACKTRACK LINUX

http://www.shantanushah.blogspot.com/2010/05/backtrack-linux.html

This blog is for a personal use till yet. Posted by SHANTANU SHAH. Monday, May 10, 2010. What you will need. 1 A flash drive that is at least 4 GB. (maybe 2 GB). Considering the ISO is only 1570 MB, I would think 2 GB. Should work, but When I tried it I got a warning saying the. Installation may fail if I have less than 4.8 GB. I canceled it so I don't know if it will work or not. The more space you have the more data you can save. So, I would. Suggest 8 GB or more. I used 16. 3 A writable DVD.

UPGRADE TO PREMIUM TO VIEW 5 MORE

TOTAL PAGES IN THIS WEBSITE

10

LINKS TO THIS WEBSITE

tech-da-hack.blogspot.com tech-da-hack.blogspot.com

tech-da-hack: Fun Hack cont...

http://tech-da-hack.blogspot.com/2010/10/fun-hack-cont.html

Why go anywhere else if you can find such gr8 hacks here? Monday, October 11, 2010. 2 Open Notepad and slowly type "Hello,friend how are you? I am fine bbye tc":. Set WshShell = WScript.CreateObject("WScript.Shell"). WshShell.SendKeys "lo ". WshShell.SendKeys ", fri". WshShell.SendKeys " how". WshShell.SendKeys " are". WshShell.SendKeys "I a". WshShell.SendKeys "m f". WSc, hoript.Sleep 500. WshShelw al.SendKeys " bb". WshShell.SendKeys "ye ". WshShell.SendKeys " tc". Monday, October 11, 2010. WiFi Allian...

tech-da-hack.blogspot.com tech-da-hack.blogspot.com

tech-da-hack: February 2011

http://tech-da-hack.blogspot.com/2011_02_01_archive.html

Why go anywhere else if you can find such gr8 hacks here? Monday, February 7, 2011. Dating site has facebook profiles. 250,000 Facebook users have become the unwitting members of a dating site whose authors claim is a work of art and not set up to make money, but Facebook is expectedly not entertained by their stunt. Reports that Facebook is looking into the possibility of taking legal action against Cirio and Ludovico. The social networks terms of service on automated data collection. State that to do t...

tech-da-hack.blogspot.com tech-da-hack.blogspot.com

tech-da-hack: Email Spoofing

http://tech-da-hack.blogspot.com/2010/10/email.html

Why go anywhere else if you can find such gr8 hacks here? Monday, October 11, 2010. Some times we just want to hack someone's password for the sake of sending some mails to their girlfriends / boyfriends or may be just friends from their IDs. It is not always essential to hack passwords for just sending few mails. you can do it without logging in their accounts. Many of us must be wondering that how is it possible to send mails without logging in into someone's account. There are two ways of doing this :.

tech-da-hack.blogspot.com tech-da-hack.blogspot.com

tech-da-hack: Secure your Wireless world ...

http://tech-da-hack.blogspot.com/2011/03/secure-your-wireless-world.html

Why go anywhere else if you can find such gr8 hacks here? Wednesday, March 2, 2011. Secure your Wireless world . Secure your Wireless Router Using WEP. The world is so advanced and fast the people can't afford to have any kind of time lag in communication. In this run wireless networks(Wi-Fi,Bluetooth,infrared etc.) play an essential role. In this article we the 'tech-da-hack' team is sharing way to secure your wi-fi using WEP. We have to secure our network from the mallicious or unauthorized users.

tech-da-hack.blogspot.com tech-da-hack.blogspot.com

tech-da-hack: Change Login Keyring in Ubuntu

http://tech-da-hack.blogspot.com/2012/02/sometimes-if-one-changes-password-from.html

Why go anywhere else if you can find such gr8 hacks here? Sunday, February 5, 2012. Change Login Keyring in Ubuntu. Sometimes if one changes the password from the terminal in the way explained in the previous post, the login keyring may change. This would result in some problem within the OS,where it would ask for the login keyring and declare it as incorrect. To change the login keyring follow these steps:. 1) Go to the terminal and type the following two commands:. Rm -fr /.gnome2/keyrings.

tech-da-hack.blogspot.com tech-da-hack.blogspot.com

tech-da-hack: Understand what wireless sniffers are,what do they do and How do they work ?

http://tech-da-hack.blogspot.com/2012/01/understand-what-wireless-sniffers.html

Why go anywhere else if you can find such gr8 hacks here? Saturday, January 28, 2012. Understand what wireless sniffers are,what do they do and How do they work? The sniffing tool can use two methods of detecting wireless LAN. 1 Have the adaptor which scans all the channels for the beacon* messages. An Example of a Network Protocol Analyzer is wireshark that is available as a free source on http:/ www.wireshark.org/download.html. Saturday, January 28, 2012. Enter your email address:. Designed by Shantanu...

tech-da-hack.blogspot.com tech-da-hack.blogspot.com

tech-da-hack: January 2012

http://tech-da-hack.blogspot.com/2012_01_01_archive.html

Why go anywhere else if you can find such gr8 hacks here? Sunday, January 29, 2012. This is one technology advancement which is sending shock waves through the world of computing. At present the memristor is under development by a team at Hewlett Packard(HP). Sunday, January 29, 2012. Saturday, January 28, 2012. Understand what wireless sniffers are,what do they do and How do they work? The sniffing tool can use two methods of detecting wireless LAN. Saturday, January 28, 2012. Enter your email address:.

tech-da-hack.blogspot.com tech-da-hack.blogspot.com

tech-da-hack: November 2010

http://tech-da-hack.blogspot.com/2010_11_01_archive.html

Why go anywhere else if you can find such gr8 hacks here? Tuesday, November 16, 2010. Adobe Acrobat/Reader Phishing Scam. Today the Adobe Product Security Incident Response Team (PSIRT) released a bulletin stating the email phishing scam that has been reported by customers for some Adobe products. This is what their bulletin said:. With the availability of Adobe Acrobat X solutions. It is not available in any other manner via download, including via email. Tuesday, November 16, 2010. Some times we just w...

tech-da-hack.blogspot.com tech-da-hack.blogspot.com

tech-da-hack: March 2011

http://tech-da-hack.blogspot.com/2011_03_01_archive.html

Why go anywhere else if you can find such gr8 hacks here? Tuesday, March 8, 2011. Secure yourself from Da Threat Of 'Vital information resource under Siege' (VIRUS). The computer systems using operating systems rather than windows are generally considered more secure and safe. If one compares the number of viruses for windows and other O.S. windows will break any records. Keeping in mind the Threats we Tech-da-hack team suggests few essentials to secure your system from viruses:. Tuesday, March 08, 2011.

tech-da-hack.blogspot.com tech-da-hack.blogspot.com

tech-da-hack: December 2010

http://tech-da-hack.blogspot.com/2010_12_01_archive.html

Why go anywhere else if you can find such gr8 hacks here? Tuesday, December 28, 2010. Hope 2011 is better! Recently security vendor Bit9 released its annual "Dirty Dozen" list. According to statistics obtained from International Institute of Standard and Technology and International Vulnerability Database, it lists top 12 software with most vulnerabilities for 2010. From January to October this year, Google Chrome browser vulnerability has been discovered up to 76, which tops the list. We believe that th...

UPGRADE TO PREMIUM TO VIEW 8 MORE

TOTAL LINKS TO THIS WEBSITE

18

OTHER SITES

shantanurulz.blogspot.com shantanurulz.blogspot.com

Powerliving

Its all about knowing 'what' you are,for what PURPOSE you are and how you will UNLEASH the way you are! Saturday, March 3, 2012. HONESTY is something to be had with oneself rather than being honest to others and a liar to oneself! One believes ideals.which make no sense actually. because an ideal is one's personal idea of perfection where as actually it just might not be any where near something called perfection.To decide someone or something to be perfect is often an act of justifying one's...And LIFE ...

shantanusachdev.wordpress.com shantanusachdev.wordpress.com

Shantanu Sachdev's Blogging fever .. | Just another WordPress.com weblog

Shantanu Sachdev's Blogging fever . Just another WordPress.com weblog. February 18, 2014. First thing I tried of course was changing the memory settings. However this did not work. No matter how high I set it, it would always give this error. 1 This happens in tomcat versions higher than 7.0.33, so downgrading could be one possible solution. 2 jaxen and dom4j don’t play very well together, upgrading to Jaxen-1.1.6 and dom4j-1.6.1 worked for me. Posted in Java et' al. April 14, 2010. SELECT * FROM (SELECT...

shantanusahablog.wordpress.com shantanusahablog.wordpress.com

shantanusahablog | If it does not kill you, it makes you stronger… That's Life !

If it does not kill you, it makes you stronger… That's Life! Chapter 1: Discovering about my Genetic Disease. Inspiration for writing and publishing my book…. Book Review by Janelle Fila for Readers’ Favorite. Excerpts from my eBook: Fight for Life (available @Amazon for Kindle globally and Google Play Books). A Note from the Author. My book – “Fight for Life: My Journey from a Fatal Disease to Good Health” is now available for Kindle on Amazon. The link for US is : http:/ amzn.com/B014YFEFES. Your will ...

shantanusakaram.com shantanusakaram.com

ShantanuSakaram - home

Cinematographer photographer graphic designer.

shantanusengpta.wordpress.com shantanusengpta.wordpress.com

the brand evangelist | talking and evangelising brand engagement

Talking and evangelising brand engagement. March 31, 2009. Welcome to WordPress.com. This is your first post. Edit or delete it and start blogging! Create a free website or blog at WordPress.com.

shantanushah.blogspot.com shantanushah.blogspot.com

SHANTANU SHAH

This blog is for a personal use till yet. Posted by SHANTANU SHAH. Sunday, October 10, 2010. 4 Open Notepad and slowly type "Hello,friend how are you? I am fine bbye tc":. Set WshShell = WScript.CreateObject("WScript.Shell"). WshShell.SendKeys "lo ". WshShell.SendKeys ", fri". WshShell.SendKeys " how". WshShell.SendKeys " are". WshShell.SendKeys "I a". WshShell.SendKeys "m f". WSc, hoript.Sleep 500. WshShelw al.SendKeys " bb". WshShell.SendKeys "ye ". WshShell.SendKeys " tc". Posted by SHANTANU SHAH.

shantanusharma.com shantanusharma.com

Shantanu Sharma Homepage

Hi there, welcome to my home page! I am a multidisciplinary researcher and computer scientist by training. Currently, I am working as a Lead Scientist in GE's Corporate Research headquarters in upstate New York. My interest lies in businesses grounded on research and technology. My name is spelled as ʃɑːntʌnʊ ʃɑrmɑː. You may connect with me on. My doctoral dissertation, Computational modeling and automation techniques to study biomolecular dynamics. Is available on Amazon. You may also reach me via email.

shantanusheorey.com shantanusheorey.com

SHANTANU SHEOREY PHOTOGRAPHY

shantanusingh.com shantanusingh.com

Ghost

Just a blogging platform. Nice We've put together a little post to introduce you to the Ghost editor and get you started. You can manage your content by signing in to the admin area at your blog URL /ghost/. When you arrive, you can select this post from a list. Page 1 of 1. Ghost Theme by Marcos Navarro.

shantanusingh.wordpress.com shantanusingh.wordpress.com

The Code CleanUp Project | Another reason to stay glued to LCD after work!May your code be clean!

The Code CleanUp Project. Another reason to stay glued to LCD after work! May your code be clean! Content Server OEM Edition. Posted August 20, 2007. Stumbled on this today. Uses Lucene instead of FullText. The State of Affairs. Posted August 3, 2007. 1 Call a WDK component directly by calling the following URL : http:/. Param1}={param1’s value}&{param2}={param2’s value}. Where the part : http:/. Is commonly referred to as your Virtual Root and param1. 8212; But can an action be called this way? 6 Wrap s...

shantanusinghgaur.com shantanusinghgaur.com

Official Website Shantanu Singh Gaur