Monday, 24 October 2011

Gizmo's Freeware: This Digital Painting Website Lifts the Game to the Next Level

Gizmo's Freeware: This Digital Painting Website Lifts the Game to the Next Level

Link to Gizmo's Freeware: Top selections

This Digital Painting Website Lifts the Game to the Next Level

Posted: 24 Oct 2011 12:09 AM PDT

Websites where you can add special effects to your photos are a dime a dozen but this one is different because you can go beyond the usual kitsch effects to create something of genuine esthetic value. As ever, good results take time and patience but the results can be highly rewarding particularly for those with an artistic eye. That said you can still use the site for simple effects if you wish.

OS X Daily: Hide Mail from the Lock Screen in iOS 5

OS X Daily: Hide Mail from the Lock Screen in iOS 5

Link to OS X Daily

Hide Mail from the Lock Screen in iOS 5

Posted: 24 Oct 2011 12:20 AM PDT

Hide Mail from the iOS 5 Lock Screen The notifications revamp of iOS 5 makes it easier than ever to see new messages and mail, but if you receive sensitive or private emails on your iPhone or iPad, you may not want them showing up on the lock screen.

Those little email previews are easy to hide, here’s how:

  • Open “Settings” and then tap on “Notifications”
  • Tap on “Mail” and scroll to the bottom to “View in Lock Screen” and slide the adjuster to OFF

This will stop the email sender and subject info from being shown on the locked screen anytime a new email arrives. If you want to disable the notifications from appearing at the top of the screen as well, you’ll need to select the “None” option in the three side-by-side options at the top of that same settings screen.

For those who had this disabled to begin with, you can obviously reverse this process to turn the lockscreen email previews on, but be aware that anyone who picks up the iOS device can then see the basic sender and subjects of the newest email messages, even without entering a pass code.

A Celebration of Steve’s Life (Video)

Posted: 23 Oct 2011 08:42 PM PDT

Apple campus during the Steve Jobs life celebration event

Apple has posted the full video of the Steve Jobs memorial event, held on October 19, 2011 at the Cupertino California campus of Apple. The celebration featured a variety of prominent speakers, including Tim Cook, Jony Ive, and Al Gore, as well as several prominent musicians. It’s 81 minutes long and well worth watching for anyone interested in Jobs and his legacy.

Jobs parting advice to friend and Apple CEO Tim Cook? "Don't ask what I would do. Don't ask what I would want. Just do what's right."

You can watch it directly on here

The video requires Safari in OS X & iOS, or QuickTime 7 on Windows.

Watch Video of 60 Minutes: Steve Jobs – Interview with Walter Isaacson

Posted: 23 Oct 2011 06:49 PM PDT

Steve Jobs, 60 Minutes

The full 60 Minutes segment on Steve Jobs, featuring official biographer Walter Isaacson, has been posted online by CBS. The segment focuses on Steve Jobs and the biography itself, which is widely available for purchase.

Steve Jobs was already gravely ill with cancer when he asked author Walter Isaacson to write his biography. Jobs told Isaacson to write a honest book – about his failings and his strengths

Isaacson conducted more than 40 taped interviews with the Apple co-founder and CEO – all of them done while Apple was on its ascent with one great product after another, but Jobs was on his decline, ill with a form of pancreatic cancer that would end his life at age 56.

The videos are embedded below and require Flash to watch online.

Steve Jobs, part 1

Steve Jobs, part 2

Steve Jobs, extras

Steve Jobs, family photo album

Related Segment: iPad Apps for Autism

A transcript is also available to read online if you’re unable to watch the videos.

Delete Pictures from Photo Stream & iCloud

Posted: 23 Oct 2011 01:16 PM PDT

Delete Photos from Photo Stream in iCloud

If you’re set up to use iCloud with an iOS 5 device, you may have noticed that Photo Stream hosts your pictures online on and also syncs the pictures to the Photo Stream of your other devices. Apple will remove these pictures automatically after 30 days or after 1000 photos are uploaded, but if you want to delete them manually you can do that too:

Remove pictures from Photo Stream and iCloud

  • Login to with your Apple ID
  • Click on your name in the upper right corner of iCloud, seen in the screenshot above
  • Click on “Advanced”
  • Click on “Reset Photo Stream”

The warning below the reset button says “Reset Photo Stream to remove all photos from iCloud. This will not remove any photos from your devices or computers”, what this means is that if a picture was taken on an iPhone, it will continue to be in your standard camera roll in the Photos app, but will be deleted from the “Photo Stream” folder, and from iCloud.

Reset Photo Stream & iCloud to Delete Pictures

If you’re concerned about the available space on iCloud, you may want to consider upgrading to one of the paid iCloud plans, which start at $20/year for 15GB of storage. Just remember that your photos (or apps and iTunes music) do not count against the free plans 5GB of iCloud storage capacity.

Enjoy this? Check out more iOS 5 tips in our archive.

HackmeOut !

HackmeOut !

CyberGate Tutorial and Free Download

Posted: 23 Oct 2011 05:37 AM PDT

In this article I'll be showing you how to install and setup a Hacking software called "Cybergate".This is a very effective Windows Hacking tool.These genre of Programs are commonly called "RATs (Remote Administration Tools)".It has almost all the features which a budding hacker needs to understand more about the programming and the vulnerabilities of the computer.With this tool you can virtually "CONTROL ANY WINDOWS COMPUTER ON THE PLANET!" .But you have to make sure you install a file called "server.exe" some how or the other.The details I'll be providing here.

Features of CyberGate:

File Manager
Process Manager
Service Manager
Device Manager
Window Manager
Regitry Manager
Installed Programs
Active Port list

Screen Capture
Webcam Capture
Password Recovery
Audio Capture

Network Tools:
Socks 4/5 Proxy
HTTP Proxy
Send File
Download and Execute
Open Webpage
URL Redirection

Dos Prompt
Quick Search (for logs)
Extras (open-close CD-ROM etc.)
And Alot More!

Setting up and Installing Cybergate:

First of all download the software from this link.Make sure you don't download them from any website as such as it might be infected with some virus.Please make sure you disable your Anti-Virus before doing this as it might be detected as well.Don,t Worry the Anti-Virus is just over precautionary and tons of users worldwide you this software.If no you can always good about it !

File Details: 
Download: Free Download Cybergate v1.07.5 RAT
File Size: 2.28 MB
File Extension: .rar (Compressed Archive)

1. Start off by going to And Register. If You Have An Account There Already, Then Just Log In.

2. Once You've Logged In, Press "Add Host"

3. Now It's Time To "Choose Your Host Name".

Host Type: DNS Host (A)

Don't Care About The Rest, Once You've Choosen Your Host Name, Press "Create Host" In The Lower Right Bottom.

The Host Is Now Finished! Lets Move On To The No-IP Client.

1. The No-IP Client You Downloaded In The Beginning, Extract It To Your Desktop & Install It.

2. Now When You've Installed It, Open It Up , Log In With Your No-ip Username , Password.

3. When You're Logged In Press "Select Hosts" And Then Check That Little Box With Your Hostname.

Note: Always Have No-IP Open When You Have Cybergate Open!

There! Your No-IP Host !

Setting Up Cybergate 1.07.5

1. Extract The Cybergate File You Downloaded In The Beginning To Your Desktop! Once Extracted, Open It,Wait 20 Seconds For The Agreement To Pass!

2. When It's Open, Press: Control Center,Start.

3. Press: Control Center , Options , Select Listening Ports

4. Once You've Pressed The "Select Listening Ports" This Window Should Appear:

5.Firstly, Write "100" In That Little Box And Press The Blue Arrow. Then It Should Appear Under "Active Ports"

Active Ports: The Port You Will Forward Later!
Connections: Limit: The Max Amount Of Victims You Can Have.
Connection Password: The Connection Password. Use "123456"
[V] Show Password: (Shows Password)

Once This Is Done, Press "Save"!

6. Now We'll Go To The: Control Center , Build , Create Server.

User: First, Press "New" And Name It To: "Plutonium". Once Done, Press "OK"

Now Just Double Click On "Plutonium" Or Press "Plutonium" And Then Press "Forward"

7. Now We're In The "Connection" Tab.

First, Press " - 999" And Then Press Delete.Now Press "Add" And Write Your Hostname In It + :100.Like This:

Change The Identification To: Cyber
Change The PW To: 123456

Note: If You Want To Try The Server On Yourself, Then Delete Both:


And Replace Them With; Since Means "Local Computer or LAN Internet"

Make The DNS/HostName Server First Though!

DNS: Your Host Name, EG:
Port: The Port You Will Forward Later.
Identification: The slave Name
PW: The Password You Wrote In The Options, "123456"

8. Once You're Done With Theese, You'll Move On To The "Installation" Tab.

9. Have The Same Settings As I Do, And Follow The Instructions In The Image!

Install Directory: Where The Server Installs,

%Program Files%

Use The "System"!

Boot: This Is The "Startup" Option. Have Everything Checked.Press "Random" 5 Times And It Will Startup On Your slave Everytime They Start Their Computer!

Directory: Where The Virus Folder Installs
File Name: What The File Will Be Inside The Folder.
Inject Into: What Process It Injects into, Use Default Browser!
[V] Persistance: Keeps Trying To Inject Until Succed.
[V] Hide File: Hides The File, (Not FUD Though!)
[V] CCD: Changes The Creation Date From 16th July To 4 September 2005.
Mutex: Mutex Of The Server, Just Press Random A Couple Of Times!

There We Go, You've Now Completed The "Installation" Tab! Skip The Message of Keylogger Since They Are Pre-Set Already!

10. You Should Now Have Trumbled Into The "Antis" Tab, Have Everything Checked! (Except SANDBOXIE If You Are Gonna TRY IT ON YOURSELF!)

Ok, The Final Tab.. "Creation Of The Server". Have Every Setting As Me!

[V] Use Icon: Yes
[V] Delayed Execution: (How Many Seconds It Takes Until Your Server Injects And They Pop Up In Your RAT)
[V] Google Chrome PW: Yes, Steals Their GC Passwords :)
[X] Bind Files: No, Get An Real Binder Instead! (Have Your Server Crypted Though First!)
[X] Compress With UPX: Makes The Server Smaller But More AV's Detects It!

So after doing all that you have successfully setup your own RAT server which is ready to be tested on yours friends !


Make Sure That....

1.You are properly port-forwarded if using a router.
2.You have the No-IP Client installed and running.
3.Your DNS entries are correctly spelled when building your server.
4.The password in Listening Ports and the password your server uses are identical.
5.You are Listening on the correct ports.
6.Your Firewall is letting connections through on the port you're listening on.
7.Your server is added to excluded files in your Antivirus and Firewall.

What next ?

Now all you have to do is send this file to your friend and make sure he opens it.Once he does so he just won't realize that you actually infected him and your getting all the data from his computer.Make sure you use it only to prank and not to misuse this tool in any way !

Credits: Plutonium