Convert Text Into Audio Using Notepad


You will love this posting. This is simple notepad trick that convert any text to audio with just a click.

1)       Open Notepad , and copy/paste following code

Dim msg, sapi
msg=InputBox(“Enter Text –”,”Mann’s Cyberdyne Security”)
Set sapi=CreateObject(“sapi.spvoice”)
sapi.Speak msg

1)       Save as your_file_name.vbs

2)       Now open the saved file and key in the text you want to convert and click OK.

How To Hide Text In Images (Steganography)

Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images.

By using this trick your text will get hidden into any image of your choice without increasing its size or without reducing its quality. Your data will be encrypted in the image with RC_4 encryption plus SHA hashing. So, there is no need to worry that it can be easily cracked by anybody.

Here is the tutorial with trick on how to hide text in images for free:

First download imagehide software. Its a freeware utility for hiding text in an image: Click here to download imagehide

The interface of Imagehide is very simple .Once it is installed all you have to do is to load the image in which you want to hide your text (Steganography) type the text and hit the Write data option.You can also password protect the text so that it can only be opened with the help of a password.

Once you have completed the above steps then you can send the image to your friend and he/she can only open it with the imagehide software and the password that you have used. Once opened with imagehide the text can be read by your friend. So use Steganography for more secure communication.

Features of ImageHide

Hide loads of text in images (Steganography)
· Simple encrypt and decrypt of data (old Ver 1.0)
· See how much data you can add in bytes
· No increase in image size
· Image looks the same to normal paint packages
· Get past all the mail sniffers
· New Version 2.0
· Better Encryption
· Now uses RC_4 encryption plus SHA Hashing
· Hashed Passwords (now in image)
· loads and views Ver 1.0 files
· Now knows Version and if encrypted or not
· Can now print the images
· Save Image files as BMP or PNG
· Can use many different image formats

The imagehide is freeware and supports all Windows OS, like Windows 7, Vista, and XP.

play snake game in Youtube

Many might not be knowing about the trick i am going to tell.

YouTube is one of the biggest things in new media entertainment, and Snake is one of the oldest computer games to still be played by millions of folks around the world. The longevity and popularity of the deceptively simple game can be attributed to Nokia including it on their mobile phone ranges from the late 1990′s. It was so popular that even in this age of the iPhone you can almost guarantee finding someone on the train playing Snake on their mobile.

There is a hidden snake game in youtube .Now where the game is and how to play it.The trick is very simple.

You play Snake by directing a snake around the screen to chase dots while at the same time the snake itself grows longer. The game is over when the snake head crashes either into itself or a wall. Sounds simple, but proves difficult and it’s very addictive. But how do you play it on YouTube?

  • When the video is streaming in youtube press left button of mouse and press up arrow key.
  • Now the streaming circle will start to move like snake. Play this game with arrow keys.

Hacking Network Password

Read Legal Disclaimer Before Continue This Post

I am going to tell you how password is being sniffed in a windows network. When you are in a wifi connection or in a LAN network. If you login to a website which does not support ssl then your username and password can be sniffed.

As when you enter username and password on your login page. It being send to router in clear text as no SSL( Secure Socket Layer) Secure Socket Layer is being used.  So it can be sniffed by software like Cain & Abel.

First turn OFF your window firewall -> Control Panel –> Security Center –> Manage Settings for —> Windows Firewall (Turn It Off)

1. Download, install and run Cain & Abel at

2. Click “Configure” in the top bar.

3. In the “Sniffer” tab, click the adapter which is connected to the network to be sniffed, then Click “Apply”, then “OK”.

4. Click the “Sniffer” tab in the main window.

5. Click the network card in the top bar (2nd icon from the left).

6. Click the “+” button in the top bar.

Select “All hosts in my subnet”, click “OK”. Entries should appear in the main window under the “IP address”, “MAC address” and “OUI fingerprint” headings.

7. From the “Sniffer” tab, click “APR” in the bottom tab.

8. Click the top right pane in the main window. Click the “+” button in the top bar.

9. Click on the router in the left pane. The router is generally the entry which has the lowest final IP value (*). Highlight the IP addresses to sniff in the right pane. Click “OK”.

10. Click the ARP icon in the top bar (3rd icon from the left). Wait until other users have logged into websites on other computers. Depending on the size of the network and the traffic which this network receives, this can range from minutes to hours.

After some time has passed, click “Passwords” in the bottom tab.

11. In the left pane, select the bolded entries. The right pane should show the time, server, username, password (in plaintext) and site accessed.

IP Address Grabbing using PHP Script

This is an easy method to grab someones IP address using php scripts . What u all need to do is just copy the code below and paste it in notepad and save it as ip.php or anything.

Upload it on any free hosting websites (which support php) like

Give the link to victim, as soon as the victim clicks on the link IP will be grabbed into a text file in the free hosting site.

$hostname = gethostbyaddr($_SERVER[‘REMOTE_ADDR’]);
$img_number = imagecreate(400,95);
$backcolor = imagecolorallocate($img_number,10,102,153);
$textcolor = imagecolorallocate($img_number,255,255,255);

$number0 = ” This is Your IP/Proxy”;
$number2 = ” Host/Proxy: $hostname”;
$number4 = ” _________________________________”;


header(“Content-type: image/png”);
$file2 = “- IP joined – IP/Proxy: $_SERVER[HTTP_X_FORWARDED_FOR] – Host: $hostname – ‘\n’ “;
fwrite($file, $file2);

Download Script From here

E-Mail Tracing

Email Tracing is the process in which one can see, from where the mail was came, Not only that one can check if phishing is being applied or Not, via this method one can check the original source from where mail is coming but also being given that the mail is contains any phishing page attached to that.

This method follows some steps.

  1. open your mail account.
  2. open the mail who’s path you want to trace.
  3. Click on show details, to see the full address details.
  4. Check the Return path.
  5. Follow step 1 and 2 in the image below to see the original message.
  6. Check for the Return path in the original message.

IF Return Path of STEP 4 is not Same as in STEP 6, Then there is Phishing or The mail is FAKE.



  • Linus Torvalds
  • Finish college student in 1991
  • Created Linux kernel
  • When Linux kernel combined with GNU applications, complete free UNIX-like OS possible
  • Linus  Torvalds announced Linux in the comp.os.minix newsgroup in august 1991.

Why Linux

  • Fresh implementation of UNIX APPIs
  • Open source development model
  • Supports wide variety of hardware
  • Supports many networking protocols and configuration
  • Fully supported


  • Linux is a UNIX-like OS: Linux is as similar to UNIX as the various versions are to each other. Conceptually, anything that can be done with another version of UNIX can be done with Linux operating system, although the means may vary slightly.
  • Multi-user and multi-tasking: Linux is a multi-user and multi-tasking operating system. That means more than one person can be logged on to the same Linux computer at the same time. And a user can have more than one process executing at the same time.
  • Wide hardware support: RedHat Linux supports most  pieces of modern x86-compatible hardware. In the early days of Linux hardware support was limited: today Linux support has become a check list for hardware vendors.
  • Fully supported: Red Hat is fully supported distribution.