Sunday, 8 April 2012

Creating a Professional Banner in Adobe Fireworks (Easiest Process)

Well, today we will be learning how to make a banner such as that shown above... Ya. The green picture with a boy and some text with cool effects.. This type of image is known as a banner.

So where do you use banners? Well, banners are images that are placed on top of your website or blog, which tell your visitors the main purpose of your site or blog. 

For the purpose, I have made a video, in which I have demonstrated the making of the same banner made above...

Its a very interactive solution to the banner problem, as well as to all your image needs (somewhat), cuz from this tutorial, you will learn much of adding effects to english text, adding shadows, making good backgrounds, removing a background from picture etc. etc., all in one tutorial...

The software used is Adobe Fireworks CS5, which will soon be available on my blog...

Till then, watch the video embedded below... Kept in mind should be that the video is my own work, and not of any other user on YouTube... (just a side note ^_^)!

The video teaches much, as I believe I have done the steps in such a way that even a beginner can easily learn from this video... Well, if you like this, and other works of My Windows Zone, you can become a follower, and as a charity, press the +1 button, so to improve the chances of us being found on Google easily...

Till the next post... C ya!

Saturday, 7 April 2012

Making a Quiz in PowerPoint (Description + Video)

Hey everyone...

Today you will all be learning how to make quizzes in MS Powerpoint. Yes, Yes, it is the same which you have installed in your computer, not any other one...

It is a very simple process. Actually, what we make is a multiple choice quiz, in which the player selects an option from the given ones. On clicking the right one, he is directed towards a "CONGRATULATIONS!" page, where he is also given the option to proceed to the next question. Otherwise, in case of clicking a wrong option, he is redirected to "SORRY! WRONG ANSWER" page, where he is given the option to return to the same question.

This method is famous because of its simplicity. You will not have to enter any coding, or anything. All you would have to do is make different slides, and then hyperlinking the texts on it to other slides. Now some of you might be confused with the language used here, as it might seem new to some of you. But believe me, they are all buttons I am talking about, which you would have to click. 

To make this process easier, and this post shorter, I have made a video for you, embedded below. Once you watch it, making quizzes for you would be as easy as a piece of cake (literally).

In the video I have used Microsoft PowerPoint 2010, but the same process can also be done on MS Powerpoint 2007. I did not embed an MS PowerPoint 2003 video cuz its quite old, and no one uses it these days...  Anyhow, watch the video below for more info...

Easy eeh... Ya! I also know... So I guess you would enjoy producing some quizzes...

Yes, I also didnt forget scoring, but the problem was that it would require some visual basic code to be added, which would simply make the quiz complicated, and people would not find it easy to make... So, to keep the simplicity, I think that a quiz like this without scoring would probably work...

See you in my next post... Till then...

Friday, 6 April 2012

Convert Access Database (ACCDB) to EXE


Database is a collection of data, which can be collected using an interface, made in Office Access.

The problem is usually that when we create one, it remains in the ACCDB form, which is an editable one, i.e. one can edit the elements of your database, and use them as their own... But none of us wants that...

I searched over the internet, methods for converting the access database (ACCDB) to EXE, an executable form, but what all did was that they did convert the database into EXE, but it still ran in MS Access.

So, I figured out a way to make an uneditable form of the currently present Database (ACCDB) to a format ACCDE, which cannot be edited, and then making an installation package for ACCDE, which will install the ACCDE in the Program Files of the user's computer. 

The following conditions should be met before continuing with the process:
  1. MS Access 2010/2007 installed
  2. Inno Setup Compiler installed (Can be downloaded for free here)
  3. A license file in .txt format (if you want it)
  4. An icon file in the format .ico, needed for the installation file
The method was an easy one, which is shown below in the video. Using that, anyone can convert and protect their own databases, which can be used, but not copied. 

I hope you learned much from the video... But after all this, I have found one drawback of the ACCDE file, which is that an ACCDE file created in 64-Bit version of MS Access will not work with 32-Bit versions of MS Office/Access, whereas vice versa is also applicable. So a solution to this problem is that you can label the specific databases as ACCDE (32-Bit) (made in 32-Bit versions of Office), and ACCDE 64-Bit, made in 64-Bit versions of Office.

Have a nice day, till the next post...

IGI 2 - Covert Strike (Full Version)


I.G.I.-2: Covert Strike is a computer game developed by Innerloop Studios and released by Codemasters in 2003. The game is a stealth-based first person shooter. It is the sequel to Innerloop's Project I.G.I.: I'm Going In. The original, published by Eidos Interactive, offered only single-player play. Chris Ryan, a former Special Air Service operative best known for being the lone successful escapee of Bravo Two Zero, served as a consultant to the game. The box art is similar to the poster for GoldenEye.
The game's plot features a rogue Chinese General, "Wu Xing" as the primary antagonist. Xing orchestrates various events (such as armed robbery of advanced prototype technology from the Russian mafia) in order to get Electromagnetic pulse (EMP) weaponry on a space rocket that he has launch control over. At the end of the game, the protagonist David Jones is finally able to defeat him and stop the launch.
The game was banned in China, because it "intentionally blackened China and the Chinese army's image".[1] It received generally negative reviews by critics.[2][3]

Missions and Storyline

The game is divided into missions, and the story is presented in cut scenes, shown before and after every mission, with animated characters rendered in real-time and pre-recorded speech. This approach is similar to other games in this genre, which don't rely on video, instead providing a comparable quality of visual and dramatic appeal, reusing the same in-game 3D engine for cut scene rendering.
Missions have objectives that must all be completed before the mission ends.
Straight-forward tactics are not encouraged, with stealthy and covert movement giving the player a better rating, rank and chance of survival, with the highest attainable ranking entitled David Jones.
Multiple paths exist for every mission, with the most obvious and daunting being a noisy gun-fight, because in every mission Jones is outnumbered anywhere from 20-1 up to 50-1. Every mission presents an opportunity for large groups of enemies to be bypassed or sneaked past, undiscovered. Certain missions even require entire operations to be carried out undetected, i.e. without giving enemies a chance to sound the alarm, as the name Covert Strike suggests.
At the start of a new game, a difficulty level can be chosen, changing the number of bullets Jones takes before dying, the intelligence of the enemy and group AI, and the number of save-games available.

Covert Operation

The player can use the available Map computer to recon the mission area, remotely viewing a real-time satellite image of the terrain with structures and outdoor enemies clearly visible, which is also necessary to plan strike routes, after monitoring enemy patrol routes and other strategic information. Using the binoculars and thermal goggles, nearby enemies can be located, sometimes even through walls.
Jones is equipped with lock picks, and safe crackers making him capable of forced entry into any locked room or safe, enabling noiseless and stealthy entry into restricted areas and buildings, and obtaining military secrets or private information, and objects. Remote-controlled CR-4 explosives are also available for use on certain ground targets, meaning large structures can be destroyed safely, from a distance, leaving Jones undetected. Air strikes can be called for on certain missions, using the laser designator to pinpoint ground targets for bombing.

Stealthy Shooting

During gameplay, the player has access to a large arsenal of real world weapons, including handguns, assault rifles, sniper rifles, light machine guns and RPGs. Although these cannot be bought, the weapons available in game levels can be exchanged with carried ones.
Players begin missions with certain fixed or carry-over weapons from earlier missions, although additional weapons can be obtained from killed enemies, the player is required to assess future tasks and equip the most suitable weapons, judging based on the cut scene briefing, and the objectives list.
Like its prequel, realism was intended to be paramount in this game, which features more than 30 accurately modeled real-world weapons which look and behave exactly like they do in real life[4], including their rate of fire and loading times.
    Silenced weapons, completely unavailable in the prequel, such as the G17-SD and SOCOM handguns, the SMG-2 sub-machine gun, and the PSG-1SD sniping rifle, enable silent and stealthy killing even from great distances, leaving the enemy clueless and Jones completely undetected.
    Heavy weapons such as the MP5-A3 and MP5-SD3 sub-machine guns, AK-47 and G36 assault rifles, with faster fire and reloading rates, more range or hitting power are needed for all-out gun-battles, where usage is usually at the cost of being discovered by multiple nearby enemies, and therefore giving Jones less chance of survival.
    Balanced weapons such as the SVD Dragunov and M82A1-T sniping rifles, the G11 assault rifle, however, provide a balance of both power and stealth. Emitting noise, yet usable from great distances, means that, if used strategically while under cover, Jones can go undetected while effecting a 1-shot, 1-kill hit rate.
Bullets also perform and penetrate differently, based on their speed, weight and caliber, and target material: wood, steel, plastic or flesh, meaning players will be able to kill multiple targets with one shot or hit targets right through cover.[5] Targets are affected not only by Jones's movement and stance but also the calculated kickback for each weapon.
Only 2 guns can be carried at any given time and the rest have to be left behind, unlike its prequel where Jones could carry any number, promoting critical thinking and weapon understanding, as each weapon has very different strengths and side-effects.[6] In addition to the two chosen weapons, a Combat Knife is carried at all times and always available for use, enabling noiseless kills and hand-to-hand combat when out of ammunition or without guns.


David Jones: The protagonist of the entire game. He is, in fact, one of the best officers in the IGI headquarters. He is capable of accomplishing difficult tasks and missions without anyone's assistance, and is also pictured as a fearless man who does not hesitate to kill his targets at any spot. David is also described as an officer who does not give up so easily at risky and emergency situations, but stands firm to face and solve the situation calmly.
Robert Quest: Robert appears as one of the antagonists in this game. A strong man in his early fifties, Robert acts as David's temporary veteran pilot, piloting him to every single location in Russia to obtain the chips. Unknown to David, Robert has actually co-operated secretly with David's mission director in order to get the full set of the EMP chips and the blueprints. When David succeeds in getting all the chips, Robert betrays him by threatening that he'll shoot him if he doesn't jump off, the latter of which David chooses. Robert was killed by David in the seaport in Egypt.
Phillip White: The mission director; is actually a good friend of David's. He guides David sincerely throughout all the missions in Russia to recover the stolen EMP chips to obtain the chips for himself and Robert Quest, his close comrade. Both of them infiltrated the IGI for decades and had earned great trust in the agency just to wait for the very moment. After betraying David with Robert, he and Robert escape for sanctuary in China, where they obey the command of General Wu Xing and handed the EMP chips to him. Finally, he was killed by General Wu Xing for accusing the general of killing Robert.
Rebecca Anya: Anya is one of the female officers operating in the IGI agency, although she usually spends most of the time in front of the monitor as David's new mission director after the dreadful incident. She has a typically cool manner of soldiers and does her job well, causing David to succeed in every mission without further dangers or failures.
Jach Priboi: A middle-aged man, Jach is actually an old pal of David's, but had not communicated with him for the past few years. Since the Russian fiasco, Jach had moved his illegal weapons trade to Libya, where he was held captive by the Libyan Intelligence for unknown purposes. While serving close surveillance in Libya, he unexpectedly encounters David who intends to rescue him out. He tries his best to assist David in every way and eventually recovers his important trade documents and also kills Major Zaleb Said in the end, fulfilling his intention and revenge.
Senator Pat Lenehan: Senator Lenehan is the main administrator and founder of the IGI agency, which was created in order to combat the threat of war. Lenehan seems to express great interest in David's missions. He constantly goes to the command center to monitor David's missions together with Anya. An elderly old man, he is pictured as one who cares for the others. Lenehan is also shown organizing large-scale backup troops for one of David's missions.


The game's protagonist, David Jones,[7] an agent working for the Institute for Geotactical Intelligence and former British SAS operator,[8], was sent to the Carpathian mountains in Ukraine to recover a set of EMP chips stolen by a group of Russian mafia from a high-tech US facility.[9] After HALO jumping and infiltrating the weather station in the mountains and retrieving one of the EMP chips, his mission director (Phillip White) commands him to go to retrieve the remaining EMP chips so that the IGI researchers can launch a full scale research on the chips to determine their real usage against the thieves.then he goes tobridge and destroys it.Then in production facility he gets half of emp chips.Thenafter he is betrayed by His PILOT ROBORT QUEST AND MISSION DIRECTION PHLLIP WHITE as they takes EMP obtained by Jones, after a series of events, he eventually finds himself at the borders of Romania, where he is then forced to evade the incoming border patrols.
Meanwhile, his former pilot and mission director had escaped. The IGI was not able to detect their whereabouts after the incident, but spent enough efforts to get an important detail that Phillip White had made several weapons and military deals with Jach Priboi in Libya. Under Anya, his new mission director, he sets off to Libya and searches for the middle-aged Priboi, who had been locked up by the Libyan Intelligence as he was supplying weapons to the rebel forces.
After rescuing Priboi and escaping out of the Libyan prison, Priboi states that all the information which David needs are in a safe in his villa, which was at that time being used as a command center by the Libyan general, Major Zaleb Said. David decides to go to the villa to get the information. Surprisingly, after expunging much effort and going through many of gunfights, Priboi discovers that Major Said had taken his papers and he then vows angrily to take them back. He suggests David to take control of the helicopter in his airbase not far away from the villa in order to confront Major Said. They get the helicopter without much conflict, and manage to gun Major Said down amidst the confusion and get the papers back.[10] Upon returning to his villa, Priboi tells David that the trade that he made with David's former missions director was in a seaport in Egypt.
David sets off to the port without hesitation, and discovers that Robert Quest and Phillip White were actually cooperating with an unknown country to operate the chips. David kills his former pilot in the aforementioned seaport, and takes a seaplane to the unknown country and ventures off to the Spratly Islands near China[11], where Anya states to be running suspicious activities throughout the time. What Anya said was quite true; David found his mission director cooperating in secrecy with a Chinese general, whom he found out later to be General Wu Xing, who plans to use the chips to blindfold US intelligence and cripple the powers within.
Later David finds his former mission director Phillip White killed by General Wu Xing himself, as the former accused the latter of killing his friend Robert Quest, who was actually killed by David at the Egyptian port. In Wu Xing's secret weapons lab David Jones gets to know that the General was going to start a "World War III". He then engages in a gunfight with Wu Xing killing the latter.
After some chaos and confusion, David tracks the entire plan location to a large and closely-guarded rocket launch pad, where Anya asks him to disable the system immediately before the launch is made and causes an international incident. With efforts, David then succeeds in preventing the rocket from heading towards its programmed destination and to detonate somewhere safe. Finally, he prevents a major disaster from occurring, and the world is once again safe and sound.



Installation Instructions:
  1. Download the "Setup.exe" file from MediaFire
  2. Install the game. It will be a time taking process.
  3. Once done, watch the video for more info
The video below was made for windows 7 users, but making the shortcut to the main game is also for XP users... Watch the video below, and enjoy playing. But before downloading, make sure your PC meets the minimum requirements. The video has been made officially by me... ;)

Minimum System Requirements:

Processor = 1.4GHz
RAM = 256MB
Graphics Card = 64MB

Thursday, 22 March 2012

Revo Uninstaller Pro v2.5.3 + Keygen (Tested)


Revo Uninstaller Pro helps you to uninstall software and remove unwanted programs installed on your computer easily! Even if you have problems uninstalling and cannot uninstall them from "Windows Add or Remove Programs" control panel applet.
Revo Uninstaller is a much faster and more powerful alternative to "Windows Add or Remove Programs" applet! It has very powerful features to uninstall and remove programs.

-No more stubborn programs
-No more installation errors
-No more upgrade problems

Remove programs easily

With its advanced and fast algorithms, Revo Uninstaller Pro analyzes an application's data before uninstall and scans for remnants after the uninstall of a program. After the program's regular uninstaller runs, you can remove additional unnecessary files, folders and registry keys that are usually left over on your computer.

Revo Uninstaller Pro offers you some simple, easy to use, but effective and powerful methods for uninstalling software like tracing the program during its installation.

Revo Uninstaller Pro has a very powerful feature called Forced Uninstall. Forced Uninstall is the best solution when you have to remove stubborn programs, partially installed programs, partially uninstalled programs, and programs not listed as installed at all!

To remove a program completely, and without leaving a trace, you can monitor all system changes made during its installation, and then use that information to uninstall it with one click only – simple and easy!

Main Features:

The Uninstaller tool lists the installed programs and components for all and current user. With a choice of views, as well as a context menu, information on program components is available: program properties, their registry entries and links to manufacturer's web site, for a start. The "Search" option finds installed applications just by typing the first few letters of their name. Revo Uninstaller scans before and after an uninstallation to find all files, folders and registry keys left behind by the program's uninstaller. The primary feature of Revo Uninstaller is Hunter Mode.

Forced Uninstall
Revo Uninstaller Pro has a very powerful feature called Forced Uninstall. This feature allows you to remove leftovers of programs that are already uninstalled, incomplete installations and uninstall remnants of programs! It does not matter if the program, you want to remove, is not listed in Revo Uninstaller Pro or in Windows Add/Remove Programs Control Panel applet. Forced Uninstall gives power to the user but still keeps the safety and the accuracy of the results.

Real-Time Installation Monitor
Revo Uninstaller Pro has a feature that allows monitoring of installation of a program and detects system changes during that installation. The process is done in real time – simultaneously!
This feature is very powerful because by monitoring system changes during the installation, we eliminate all the scanning algorithms when we need to uninstall that program and nevertheless we can still use these algorithms but in another feature called Forced Uninstall.

Multi-Level Backup System
Revo Uninstaller Pro creates backups of removed registry keys, values, files and folders. Backup Manager is the main part of that system. It helps you to manage backup information stored by Revo Uninstaller Pro after deletion registry entries, files and folders.

The other levels of the backup system are
- Creating system restore point before each uninstall
- Full Registry backup before each uninstall
- Full Registry backup once each day Revo Uninstaller Pro is started

Hunter Mode
This is a special, innovative feature of Revo uninstaller which indeed has two sub modes – Hunter mode and Drag and drop mode. These modes are giving you a flexibility to uninstall applications with one click (stop or delete) by simply dragging and dropping program icons to the Hunter icon or selecting their icon with the mouse cursor, whether it's on the desktop, quick launch toolbar, in the system tray or the program's window is open.

Junk Files Cleaner
Junk Files Cleaner allows you to find and remove various types of junk and unnecessary files from your computer. Junk files are created by many of the Windows applications. Normally, such files are deleted by the application that created them as soon as they do not need them, but they may remain permanently on your hard drive if there is an unexpected termination of the parent application, a system crash, etc. Cleaning junk temporary files will free a lot of hard disk space.

Windows Tools
There are a lot of handy and useful tools and components bundled with every Windows operating system. Unfortunately, some have complex command line options and others are just plain difficult to access. The Revo Uninstaller feature Windows Tools gives fast, one-click access to more than ten Windows utilities used in daily PC management. Available tools are: System Restore, Network Diagnostics, Network Information, Security Center, System Properties, System Information, TCP/IP Netstat Command, On-Screen Keyboard, Disk Defragmenter, Services, Shared Folders, Group Policy.

Autorun Manager
Auto Run Manager allows you to manage programs which load automatically at Windows startup.With this tool you can not only enable or disable applications from auto starting at Windows startup, but you can also get more detailed information about them, e.g. the program’s publisher, description, launch path (where it is saved on your computer), status of the application (if it’s running or not) and more. Stopping programs from automatically starting will increase the speed of loading your Windows.

Browsers Cleaner
Your browser records detailed record of every web site you’ve ever visited. It’s easily accessible from your browser window and by simply pressing a button, anyone can see where you’ve been browsing on the web! Revo Uninstaller erases web site history of web browsers including Firefox, Internet Explorer, Netscape and Opera. With Browsers Cleaner you can also delete temporary internet files which include all the images you’ve viewed, all the online videos you’ve watched and all the web pages you’ve visited. Deleting temporary internet files will free up a lot of valuable hard disk space on your computer.

MS Office Cleaner
MS Office Cleaner allows you to remove history of most recently used files in MS Word, Excel, Access, PowerPoint and Front Page. If you do not want somebody else to see your last opened or edited spreadsheets, documents or other files created using MS Office just select those you do not want and click Clear.Your most recently used files will no more be listed.

Windows Cleaner
Microsoft Windows keeps tracks of many things that you do with your computer like file search history when you search for file and folders; recently opened document history; open/save history used in standard open/save dialogs from different applications installed on your computer; start menu clicks history; last opened registry key history and more.

Evidence Remover
Deleting your files and folders does not mean that they are gone forever. When you empty Windows Recycle Bin your files and folders are just marked as deleted but they are not erased physically. There is a chance to recover deleted data from 10 years or older PC and this data may be very important and confidential. With any recovery tool or un-delete program you can easily get back your important documents and other files that you have deleted. And here comes Evidence Remove tool of Revo Uninstaller.

Unrecoverable Delete
If you want securely delete file or folder and want to be sure that no body with any tool could recover these files or folders use Unrecoverable Delete. Deleting files and emptying Windows Recycle Bin does not mean that these files are gone forever. They are still on your Hard Disk Drive or other storage but marked as deleted. Any body with a tool available free or commercial could recover deleted data very easily. Unrecoverable Delete tool of Revo Uninstaller tool makes it impossible to recover your deleted data - even with the most advanced and expensive tools on the market.

Benefits of Using Revo Uninstaller Pro:

Real-Time installation monitor is the most advanced and innovative technology used today! This technology is unique among the rest of the uninstallers. That is why it offers the easiest and the fastest way to monitor installations, so when the program is no longer needed the system changes made by the installation of the monitored program could be fully reverted as the program has never been installed before! It is so easy to use that requires only 3 mouse clicks to accomplish the whole process!

Revo Uninstaller Pro scans for leftovers with even more advanced algorithms that are so precise, fast and very effective in search for leftovers of Windows Services, Drivers, File associations, Shell Extensions, COM components, Windows Installer components, program settings and more!

Forced Uninstall is very useful and powerful program removal feature that is available in Revo Uninstaller Pro! Even when a program is uninstalled with Revo Uninstaller it could leave some leftovers because of the selected uninstall mode or because there is not enough reliable info about the uninstalled program. The user could tell where the leftover files or folders are, and according to that info Revo Uninstaller Pro could scan Windows Registry and the file system for even more related leftovers. Forced Uninstall gives a lot of power to the user but still keeps the safety of the system! It is very useful when the installation is corrupted and cannot continue further. Forced Uninstall is the best solution when you have to remove partially installed programs, partially uninstalled programs, and programs not listed as installed at all.

Multi-Level backup system – guarantees that with Revo Uninstaller Pro you can safely uninstall and remove remnants of programs. Revo Uninstaller Pro creates backups of removed registry keys, values, files and folders. Before each uninstall of a program it creates a System Restore Point. For maximum protection and safety It also makes full registry backup that could be used even when Windows cannot start at all! You can use that registry backup even when some other program, virus or something else has damaged the whole system.

Print and Export of the installed programs – Revo Uninstaller Pro let you to print and/or export all details of your installed programs in few handy file formats. So later if you need to reinstall your software configuration it will be much easier to find and install the right programs that you like and use all the time.

Installation Instructions:

For your convenience, a video tutorial has been made officially by MYWINDOWSZONE, given below, which will show you how to Install, and use this program. Watch on for more info. When your'e ready, proceed to the Download section:


Click the button below to start downloading from MediaFire.

Wednesday, 21 March 2012

BitDefender Total Security 2009 + Genuine Keys


Do you want an antivirus that is the best rated all over the web, best in its work, speed, security, and everything in common? Then you would have to try this one. Kaspersky and BitDefender are the best antivirus software ever, and are recommended personally by the MyWindowsZone.

Small Review:

BitDefender is the small up-and-coming security vendor. With a focus on the end user and confusion-free usage, BitDefender’s Total Security 2009 package gives you well-rounded coverage in an appealing package. However, does the branding "Total Security" live up to its name? The Tech Herald put the software through its paces to find out.
BitDefender’s Total Security 2009 offers all the normal protection layers. The software offers layered defense from Malware by including an engine that scans for Rootkits, Worms, Trojans, and potentially harmful applications based on action alone. The firewall stops targeted scans for passive infection and includes parental controls. There are also little features to round out the software package.

Install Notes provided by the Official Website:

The computer tested was an Intel Pentium D 3.4GHz (Dual Core), 1024MB RAM, with Windows XP SP3. BitDefender Total Security 2009 was installed with the base configurations enabled for this test.
The total time spent on the install process was just over six minutes. Afterward, there is a required re-boot of the system and a nine step post-install process to follow. The nine steps use a menu to walk you through the various settings and configuration options. Most are default coverage, but it is best to go through each step and learn what is going on behind the scenes. Like the Norton install process, you will also be asked to sign up for a BitDefender user account.
At the end of the nine-step configuration, you are prompted to update the software and run a scan. Make sure you do this, as the software is updated hourly in most cases, so you are already missing several update releases. The update process and the initial scan are the longest parts to the overall install and configuration, an initial scan took about 16 minutes.
What is unique about the install and initial scan is that after all that is said and done, the Total Security 2009 software wants to check for updates again. This is one of several system checks the software wants to complete, which is what is explained when you launch the system controls.

Installation Instructions:

Download and install the antivirus software on your computer. There are two versions, be sure to choose the correct one. Once downloaded and installed, enter the following key:


This would activate the license. It would be valid for 180 days. Once it finished, reinstall and re-input the serial, simply. 

Hit the relevant buttons below to download:

i). 32-Bit (x86) Version Download:

ii). 64-Bit (x64) Version Download:

Saturday, 17 March 2012

Real Hide IP ( + Crack (Tested/Working)


Real Hide IP is a program that protects your privacy on the internet, by hiding your current ip, and showing a fake one.

What is an IP?
An IP is the Internet protocol, the method by which information is sent between any two computers on the Internet. It is represented by a number, such as Your IP shows entire information about you, even your location, e.g. country, city and location with 10 meters accuracy. It also shows your internet services provider e.g. in Pakistan, we have Wi-Tribe, PTCL etc.

Why should we change our IP?
IP changing is very necessary during web browsing. This is because is every type of website gets entire information about you, your protection and integrity can be in danger!!! Suppose a website full of hackers gets to know your IP. It will then be able to trace your computers location, and then hack files, and even send viruses. Therefore I recommend you to change your IP, and to do so, just download this paid program (worth $30), for free!

Installation Instructions:  
  1. Download the .zip package by hitting the download button in the end of the post!
  2. Extract all the files using a compression program (WinRAR recommended, available, search!)
  3. Run "RealHideIP-", and install the program. Do not RUN the program. If it has started itself, close it. It would probably be in the notification area.
  4. Then open the Crack folder, and "RealHideIP" (exe) from the folder, and navigate to "My Computer" in XP, and "Computer" in Windows 7/Vista
  5. Use the following directories: 
    1. For Windows XP/Vista/7 (x86) 32-Bit: "C:\Program Files\RealHideIP"
    2. For Windows XP/Vista/7 (x64) 64-Bit: "C:\Program Files (x86)\RealHideIP"
  6.  Now in these directories, paste the RealHideIP.exe file over here. It will prompt you to either to replace the already existing files of the same name, or cancel copying. Choose "Copy and Replace"!
Your Cracking is now done...! Now you can use this program for your use. Below are the screenshots of the program...!


If you have any questions or queries, feel free to ask in the comments...!

Tuesday, 7 February 2012

Nero Burning ROM v11.0.12200 + Serials



Nero Burning Rom is a simple software that allows you to write different types of data, be they images, movies, music etc., to multiple types of discs. With increasing number of types of discs available in the market, demand has also grown to produce them. Take for example the production of Blu-Ray Movies from their files downloaded through bittorent clients. Now, if you have a Blu-Ray disc player (at home), you would definitely love to watch your downloaded movie using that specific player.

For that purpose, you will have to create a Blu-Ray disc, which by normal methods, needs professional resources. Nero Burning Rom provides ease for you, so that you never have to worry about a single thing when creating professional CD/DVD/Blu-Ray (and even more) types of productions. Also, using some good CD Burners, some people prefer to take their backups on CDs/DVDs. This tool is very useful for them, as this allows them to make what they want with a guarantee. The distinctive features of this program are given below:
Distinctive Features:


With Nero Burning ROM 11, you dont need to categorize each type of file when making discs. For example, if you have a 7GB data, and you have two 4GB DVDs, then you wont need to separate your data into two parts (in this case 4GB and 3GB). Nero Disc span will do this automatically for you. Also, you have no restriction on the type of file to be burnt. Now you can also mix any types, be they Music, Videos, or even of any unknown format. 

Expect nothing less than the best with the experts who started it all. Exclusive Nero SecurDisc 3.0 burning helps ensure disc readability reliability regardless of scratches, age and deterioration so your content remains secure for a long time. SecurDisc Surface Scan offers additional reliability to burned optical discs.

Move your music from CDs to your PC with one-click ripping. Easily create playlists or CD mixes of your favorite tunes right on your computer for instant playback.

Go beyond just burning with more SecurDisc features such as Surface Scan, which offers additional reliability to burned optical discs. Surface scanning is included with every burn to ensure that your discs are perfect before burning.

With this burning rom, you need just to drag and drop to create disc images in many formats. You can Use ImageRecorder to create disc image files by simply dragging and dropping to burn disc image formats such as iso, nrg, cue and img. The virtual disc recorder expertly replicates data for easy backup to CDs, DVDs and Blu-ray Discs.

Make perfect copies with just a few clicks. Whether you're copying music or videos, it's easy to make flawless copies of your favorite music CDs and movies for playback or sharing. Copy music to CDs and even HD movies to Blu-ray Discs quickly and easily.

So there you have it...! Now I know that you all need to get this software for free, as it costs about $50, so I also have a solution for that. Just hit the download button below to download the torrent file, as the file is large, and the torrent belongs to its owner...! So I say that you ENJOY!!!

The torrent details are given below:

Uploader: ChattChitto RG

Note: The seeders and leechers may increase and/or decrease with time, so they are not mentioned.

Installation Instructions:

1). Hit the download button below, and download the .zip file from MediaFire
2). Extract the files from the .zip, and run the program in it. It will show a window like this:


3). Click the "Nero Burning ROM v11.0.12200 Setup" Button. An installation will start running. Once the installation has finished, carry on with step 4.
4). After installation, click on the "Nero Burning ROM  v11.0.12200 Serials". You will see a screen showing you different serials and usernames. Use any of them, and register your copy. If they are required during the installation, then when needed, press the Serials button.

I hope that helps. Believe me, this is one of the great softwares. For all my CD/DVD work, I use this goodie...

See you in my next post. To download the .zip file, click download button below. The software has been self-tested, and is fully compatible with all versions of windows, and of course, all MyWindowsZone downloads are absolutely virus free...!