Wednesday, October 27, 2010

How To Recover Deleted Files In Windows

SOURCE. If you have deleted some of your important files accidently then the first thing you will do is panic.But I am going to teach you how you can recover your deleted files.Using this method you can recover files that have been


  • Deleted from the Recycle bin
  • The files which have been permanently deleted using SHIFT+DELETE key
  • Files deleted from your Memory Card


Before starting the tutorial for recovering the deleted files I will explain the basics of file deletion which will help you understand that how and why file recovery is possible.


How File Deletion Works



Whenever you move a file to recycle bin or permanently delete a file the file is actually not deleted from the hard-disk instead that file space is marked as free by the operating system so that new files can be written at that space.So, if no new file is written at that place then you can recover the file easily but if you have placed some data in that particular drive then it is possible that the data be written on the same location from where you have deleted your file. It will make the data recovery difficult or impossible. 

Note:- Do not put any new data on the Drive from which you have to recover you data because it may hamper your data recovery chances.


This method works on windows platform and is completely free.
Now,Lets begin the step by step tutorial on How To Recover Deleted Files In Windows




1.Download Recuva .It is a freeware utility.


Click Here To Download Recuva(3.7 MB)


2.Install Recuva and it will ask what sort of file you want to recover.Example pictures,movies.Now select the drive.


3.It will scan and show you all the files that have been deleted from that particular drive.


4.After completion of the drive is complete it will show two types of files.

  • Those with green icons can be recovered.
  • Those with red icons cannot be recovered easily.

5.Right click on the file to be recovered and select Recover Highlighted and your file will be recovered.



Using this tutorial you can recover almost any kind of deleted files.. though you have deleted your file from recycle_bin, don't worry. still you can recover your deleted file using above method. Actually is not any kind of hacking its just simple method but still 80% of people do not know about this technique. So, now let me go.. we will meet once again on my next tutorial.

Now Bye, your friend

Ashish Dandgawhale

Saturday, October 23, 2010

Unique Project To UNITE HACKERS In India



Friends, most of the you and other people who are directly or indirectly related to hacking field, must have heard about a project which was launched to unite all the ethical and un-ethical hackers of India. The project became very famous in very short time. Lots of gossips about the project were in talk of hackers. They also launched the magazine for cyber happenings named "Hacker5" on last 5th of Oct. 


In this project from last few days I have seen that so may rumors has been spread here and there. It was like:
  
  • This unite hackers project will not be a successful project
  • Vaidehi Sachin is utilizing Amarjit Singh and his team of hackers for her benefit only
  • Amarjit Singh and his hackers friends are utilizing Vaidehi Sachin & her media power for typical  Hacking purpose....and may more........
 ALL THE ABOVE BULLSHIT IS ABSOLUTELY FAKE.

THEY BOTH VAIDEHI SACHIN & AMARJIT SINGH CALMING IN FRONT OF ALL OF YOU GUYS THAT WHATEVER THEY ARE DOING IS ONLY FOR NATION FIRST. THEY WANT TO TAKE THE LEVEL OF HACKER IN INDIA UP TO ITS HIGHEST LEVEL AND WANT TO BUILD GOVERNMENT APPROVE INDIAN CYBER SOLDIERS.

They want to unite all ethical & unethical hackers of India.. Register them under cyber employment act & create a new young army for Cyber security of our country INDIA.The intention is to rehabilitate youth lured in cybercrime.

IF STILL ANY ONE HAS ANY CONCERNS, HE/SHE CAN MAKE A DIRECT CALL TO AMARJIT SINGH, WHO IS OFFICIALLY TAKING CARE OF ALL THIS PROJECT. HIS CONTACT NUMBER IS 9953926905



BETTER TO CLEAR RATHER THAN MAKING MORE RUMORS



NOW ITS RIGHT TIME TO GIVE A SENSIBLE RESPONSE TO ALL SUCH FAKE RUMORS. I request you all to support this campaign to unite all hackers of India under one roof to protect our country and make it cyber crime free. All hackers are not Criminals, they are the Heroes of the Computer Revolution. Let us make this country cyber protected with this young think tank, 73% hackers of India are in the age group of 12 to 19, they don't have direction. Let us unite these think and spread awareness.

For More Information About This Project Visit Official Site: www.freehacking.net

You can also Contact Here At This Blog owNer: ********** [Removed ]

Article Is Take And Modified From www.freehacking.net


Published By:
Ashish N. Dandgawhale

www.waybyhackers.blogspot.com





Tuesday, October 19, 2010

How To Make General-Internet SupperFast

 
Hello friends, this is Ashish going to tell you some ways to make your internet supper fast. The following post is on some methods to increase your internet speed, I will show you some ways to increase your net and browser speed

Increase internet speed - method 1

Go to Start >>Run and then type in “gpedit.msc” without the quotes (“)

Computer Configuration -> Administrative Templates -> Network -> QoS Packet Scheduler.

after that, you should see something like “Limit Reservable Bandwidth”. Modify that and set it to “Disabled”, or you can put it to “Enabled” and change the value to 0.
Now this will increase your internet speed by 20%

Increase internet speed - method 2

Below combination will speed up your surfing on the net. it is amazingly fast.

Firefox + IDM + TCP Optimizer

Plz do a speed test of your net connection before & after at http://speedtest.net to know what difference this software has made.
1) Speed Up the Firefox.

just do the following.

* Type "about:config" into the address bar and hit return. Scroll down and look for the following entries:

network.http.pipelining

network.http.proxy.pipelining

network.http.pipelining.maxrequests

* Alter the entries do as follows:

Set "network.http.pipelining" to "true"

Set "network.http.proxy.pipelining" to "true"

Set "network.http.pipelining.maxrequests" to some number like 30.


* Lastly right-click anywhere and select New-> Integer.

Name it "nglayout.initialpaint.delay" and set its value to "0".

Increase internet speed - method 3

Now Download & Install IDM (The Best Download Manager I've ever used)

TCP OPTIMIZER DOWNLOAD

When u open TCP Optimizer, dont do anything, just select the option 'Optimal Settings' & apply the changes.

In the next box, press OK and reboot.
I have given several methods to speed up your internet, Go ahead and try and see the magic. I am damn sure this post will really benefits you  for increasing you internet speed. This is not the final and only one article on internet but I hope you have really learned something new from my writings. If any any problem plz post it on comment section


Published By:
Ashish N. Dandgawhale

www.waybyhackers.blogspot.com





Orignal Post Taken And Modified from http://rafayhackingarticles.blogspot.com/

Saturday, October 16, 2010

Ankit Fadia - India's Best Fake (Fraud) Hacker



Hi Waybyhackers's Fans... 

I have come back again from many boring days, this time I am going to talk about a critical matter(Most people have their own opinions), It's mine. Now lets talk about "India's Best Fake Hacker - Ankit Fadia , Claims without Proofs !" 
There are only few people in the hacking field who have never heard about Ankit Fadia ,then so called self declared “India’s Best Ethical Hacker” ,There are lot of arguments and facts against him , Some people says he is not a HACKER he is just a good businessman who knows how to make fool of the peoples . The thing that made him so much famous is only Media coverage nothing else. Now lets talk about Fadia's claims and some facts about him .
At the age of 14 Ankit Fadia started a website called “HackingTruths”, which he claims was judged as the “second best hacking site in the world by the FBI”. I don’t know when did FBI started rating hacking sites? it is because nothing such like this happened. It a world know truth FBI never ranks any website

Fadia also claims that when he was 14, he trashed the front page of an Indian magazine's website. He then sent an e-mail to the editor confessing to the hack, suggesting counter measures. let me ask a question has he ever submitted any exploit? did he ever created tools for hacking ? the answer is N0, a big NO .

He is also claims to be involved in decrypting a message from an Al Qaeda operative. But when there is not a single published work of Ankit Fadia involvement about cryptography or cryptanalysis then how the how he can decrypt any message and that too from AL QAEDA and Most intelligence agencies like NSA have expert cryptanalyst with PhD’s and super fast clusters to get their job done. They wont require a 16 year old.

He is also been reported to be working with CIA and FBI . yeah you heard it right CIA and FBI .I think Americans have shortage of hackers in their own country that’s why they are hiring such noobs.

"Fadia had claimed that his alert to a U.S. spy agency had prevented an attack by Pakistani hackers. However, he never divulged the name of the agency, citing security reasons."

In December 2009 Fadia’s business site, hackingmobilephones.com was hacked by a spammer promoting pharmaceutical products for erectile dysfunction. Fadia again "claimed it had happened because of a fault in the server that hosts his site. "The problem lies in the server and all the sites hosted by it have been infected." However all web servers give their customers an option to build their own security installing their own (customer’s) software and patches when they opt for private servers. Might be MR FADIA Did not have any excuse better then this one .

Recently in his commercial seminar he called Indian hacking groups as Indian cyber criminals.the angry hackers crew hacked and defaced his site. So now the question is the so called “INDIA’S BEST HACKER” cant he secure his site from other hackers?

Now lets talk about his courses and books :–

At 15, his book on Ethical Hacking made him the youngest author to be published by Macmillan India. he claims that his books are being “used as text books in computer security courses across South-East Asia”
lol what a joke.If you will ever read his books you will find that he has copied each and every single page from other best selling hacking books .and the harshest part of all he don’t even gives credits to the authors and other hackers , he simply steals their work.

His course ANKIT FADIA Certified Ethical Hacker (AFCEH) powered by reliance claims to make you an security expert in just “3 bloody months” . WOW what an opportunity for a newbie to become a hacker .
but the thing is the certificate given by him are not valid . Read this


The thing is no one can be a hacker or a good security expert in just 3 months. It takes a lot of time or I say it takes many years to become a HACKER.

In one of his seminars he said that Linux is CRAP and advised them to use windows for hacking purpose rather then Linux.

I haven’t seen any hacker saying Linux a crap and advising to use windows . and neither will a hacker say these words because he knows Linux the the mother of all hackers. there is no hacking without Linux possible in today’s world except social engineering .

NOW YOU JUDGE WHO IS ANKIT FADIA? A HACKER OR A NOOB.
You can read about this false claims at http://en.wikipedia.org/wiki/Ankit_Fadia .
Admin,ICA.

Published By:

Ashish N. Dandgawhale

Monday, June 21, 2010

How to hack e-mail accounts !! A Detailed Tutorial !

Hello Gentlemen .. Me, Ashish Dandgawhale. its been so long since I published anything. Was busy with my work ! But I have written something recently… so here we go !

The Internets MOST ASKED QUESTION OF ALL TIME !

HOW CAN I HACK HOTMAIL/GMAIL/YAHOO/FACEBOOK

OK ?

Here is the "CORRECT" answer,

I'm merely disappointed by the number of technically illiterate people around the world. The most popular question in any hacking related site is "How to hack e-mail" its not tolerated in any security/hacking related forum and if asked you can expect to get a rant from people. the reason is simple because there are NO ways of hacking a e-mail address by easy means and the people who know this fact often get very annoyed when most people don't understand WHY its NOT POSSIBLE !

The hacking of a e-mail is possible when a person who owns the account gets hacked. the other way is to hack them directly from the e-mail servers which is most unlikely because these sites use sophisticated Intrusion Detection and highly skilled consultants who are up to date with exploits and patch's. unless you are a real professional hacker its highly unlikely you will ever break into a e-mail server.

People MUST understand that there are NO PROGRAMS/SOFTWARE'S that can hack a e-mail password when you enter an e-mail address. to understand this better let me explain you how e-mail works

Lets say you have a gmail account

When you enter your username and password and hit login what happens is your outgoing e-mail server encrypts the login information and sends over the network to its destination which is a gmail server which can ONLY decrypt the encrypted credentials then these were checked against its database and if they match it will re direct you to your mail inbox. to authenticate you with the gmail server, it will send you a cookie ( a text file ) with a session ID to your browser confirming that you are authenticated so the gmail server.

So there was a time when e-mail servers gave the option to NOT to use SSL cause it slows down the e-mail. because of the time it takes to encrypt. it was a "happy time" for the hackers who simply used a wifi hotspot to sniff session ID and break into emails !!! why ? because If anyone sniffs your session ID he can use it to login into you mail WITHOUT the password because the session ID is the proof of authentication as I mentioned earlier ^ but with almost all the e-mail servers NOW use a SSL encryption and the Session ID is also encrypted so by sniffing its NOT possible to decrypt the ID !

So there goes Packet Sniffing :(

You may ask so what ? why the encryption cannot be cracked ?

Because The encryption uses Hypertext Transfer Protocol over Secure Socket Layer and public/Private key encryptions technique which is almost impossible to crack. Do some Research on these terms and you will know why its not possible to crack/

If you're curious and patient enough read this else Skip


So now the next possible way is to somehow hack into the gmail servers and pull the password hash's and then crack them. well, sadly not many people have succeeded doing it because its highly impossible and way too risky

Now after reading all this you might have a slight idea why I ask people who claim "they can hack any e-mail" to prove it !! so if you can make a program that can somehow bypass all the security and bring the password from the gmail server then you deserve a noble prize !!!

<But I must tell you that professional hackers do have few techniques to override these terms I mentioned in certain cases….>

NOW ASK ME HOW TO HACK A E-MAIL ?

Ok you clearly know its almost impossible but the good news is that its possible to hack a individuals computer or a web server. most people lack of common sense and so many people have NO technical knowledge whatsoever. so by hacking them its possible to steal their passwords.

Because we can't hack the password from the servers but we can hack it from the people who use it..

There are so many ways.. here are some of the methods,

1. Fake Login page - Fake page also known as phishing. This process involves creating a fake login page of a certain e-mail and tweaking the password authentication process so when the user inserts login details it will be sent to the hacker. This is the easiest way to hack when the victim has no technical knowledge.

2. Social Engineering - Humans have certain weaknesses and this process involves exploiting someone's weakness to retrieve a credential such as a password. for an e.g: There are many incidents in the past like once when a hacker phoned a employee of a company (victim) and identified himself as the Technical Engineer of that company and instructed the employee (victim) to follow a set of FAKE system error checking and eventually received his login password from him by simply convincing him to reveal them. its just simple as that/ it does takes lot of confidence and skill.

3. Keylogger - Its an application which runs hidden from a user in the background and logs/records all the keystrokes of a user. when a user types something it will be recorded and saved. when the system goes online the recorded details will be sent to the hacker. which can contain a e-mail login detail. the keyloggers are outdated and most of them are detected by anti-virus programs. but when used in a LAN network or when the hacker has physical access to a system it proves to be effective. so if your girlfriend/boyfriend is cheating on you this is the way to go.. but I still think smart people don't keep "cheating related e-mails in their inbox" he he

The downfall of keyloggers are that not many keyloggers can be deployed remotely and they are often picked by anti-virus programs (which can be avoided by using code obfuscation or packing/crypting, changing Entry point..but its more complex)

Another downfall of keylogger is that most of them don't use any encryption and the data is sent as it is, with a skilled reverse engineer its possible to track down the hacker by breaking the file and analysing the code.

4. Trojans - Programs which are often known as backdoors. these programs are similar to keyloggers but they can execute certain commands sent by the hacker. most Trojans have a built in password stealer which is an application that can steal stored browser passwords. also in addition they have far more sophisticated functions such as webcam capture (YES the hacker can see you when you pick your nose) ability to browse/download/edit your files and folders, audio recording, etc.. different Trojans have different functions. All hacker has to do is create a server and send it to the victim and once the victim opens the file it will drop into the victims system and connect to hackers client. now he can issue commands to his server which is in the victims computer and manipulate it whatever the way he likes.

Trojans are very easy to use and most of them use encryption and security evasion techniques and there are TONS of tutorials all over internet if anyone interested in using them.

I hope I have covered enough information. so next time when you see someone asking "How to hack email" Please point it to this thread. so he/she don't waste his/her time and money.

My advise is if you have a personal issue such as cheating/breaking up I encourage you to sort them by other means. or maybe Go see a doctor. if she dumped you… MOVE ON !

DON'T EVER PAY ANYONE TO HACK ANY EMAIL because ……………. I hope you read the whole thing ^

I hope this sheds some light and answers the most asked question of all time. Feel free to add your suggestions/feedback and if you share this article please keep the credits intact. any questions feel free to ask and if you want feel free to write constructive criticism.

Published By:
Ashish N. Dandgawhale








Source: http://securityfactor.wordpres.com

Monday, March 1, 2010

FREE AIRTEL SMS 100% TESTED WORKING



Hey boys and girls todays I have very special good news for all of you, I know everybody sends sms and want to send it free of cost. don't you? I know everybody think it but dont find any working trick. Am I right na? when people search for such trick on google, almost all sites suggest you to change your message center number But I know such trick never worked for anybody. But really believe me I am not lieving with you, I checked this [which I m going to explain] trick on my handset and found it working, so I am giving it to you.[How are you feeling now?] I dont know it will work in other state or not? but I found it working in Maharashtra specially in region of Nagpur.so want to know it?


Lets begin it.. .




  • Go to recharge center and recharge your cell with E-recharge of 24, thus you will get daily 500 free sms for 10 days. I know, now you are thinking that it is not trick it is service by airtel. Is'nt?



  • Actually trick begins now..



Real trick behind this is " DO NOT CHECK YOUR SMS BALENCE, TO KNOW HOW MANY DAYS YOU HAVE REMAINED OR YOUR TODAYS NUM OF SENT SMS "


I am writting it once again


Never Never Never, Check your sms balence !!


Using this precaution airtel will not know how many days you have remained,and your sms will Be free for whole life [ Don't think it as fake, I have tested .i.y I am Publishing it]


PRECATION:




  • When your 10 days will compleate, your sms May show error while sending, Dont worry try after 4 to 5 hours, it will start to work once again



  • I am telling once again never never never never never never check your Sms balence [this is real trick]



  • Note: I have checked this trick on my 3 friends handset and found it working in Maharashtra. Please give me coments and let me know that is it worked in your handset with your State and Service center number of mobile and your your starting series of mobile number. It will usefull to get details of airtel secrate



  • I am giving you knoledge, dont blame me if it did'nt work, I am not GOD to know everthing. I just found this trick working for me and my friends, [Really Yaaar...]





Technorati :

Friday, February 19, 2010

How to hack websites in some easy steps, and what are hacking technics

No, I’m not switching over the illegal stuff; this may help you prevent your websites from being hacked. Websites and user forums are continuously being hacked and intentions are not always criminal. Many people hack websites just for the sake of causing mischief and trouble. This excellent post tells you how people go about hacking websites You can use some of the methods described here to make provisions to beat hackers. Some of the website hacking methods discussed on the blog post are:
  • SQL Injection: This involves injecting SQL queries using form fields, login screens and even URLs to hack into websites. There are strings that can totally modify your dynamically generated SQL command strings.
  • Cross Site Scripting: Cross site scripting is much more complex that SQL injection and it often used to access sensitive personal information. In cross site scripting JavaScript is embedded in the hyperlink to hack into the website.
  • Authorization bypass: It’s much simpler than it seems.
  • Google hacking: This happens by searching for files that actually contain logins and passwords.
  • Password cracking
All of the above hacking technique are little much difficult so now I will give you very easy trick to hack any website. Actually following trick is not any hack but it is very easy technique to make any body fool saying "I have hacked this site"

This is a java script which allows u to edit any website........ change every text in the website.... but not save it!!!!!

1. Go to any website

2. Paste the below code in the address bar of your browser

3. Now Press Enter

4. You can edit the website , but you cannot save it.

CODE:

javascript:document.body.contentEditable='true'; document.designMode='on'; void 0 

Ok, friends now tell all your friend that you have hacked website, now you can change any thing on targeted website

Saturday, February 13, 2010

How To Steal [Cut] Balence From Friends Mobile

Hello everybody this is Ashish, come back from sleep of many days. Today I have a very amazing trick to tell you all crazy people. So, have you ever wanted to steal balance from your friends balance...No? Ow yaar !! Please don't lie at least with me. I know you have tried to do this at least once in your life. Otherwise now, you would not be present here..Right na? [I m always right yaar]. I m giving this trick to you just for fun and to know that this also can be done with you. So lets begin it without wasting a little bit of tme...Ha haa hia haa

What you need Before Doing it?
1. A Blue tooth enabled S-40 OR S-60 Handset
2. A friend having Blue tooth enabled handset [Your Target, Victim]
3. A software named "Supper Blue Tooth Hack"

Lets Begin...

So first Google your internet for software called "Supper Blue Tooth Hack" and download it into your mobile then install it. After installing software on your phone just go to friend or enemy whose balance you want to steal and tell him/her to turn on blue tooth connection by tricking him that you want to send a song to him or any funny video, As connection of your mobile and friends mobile is paired, you have done almost half of work. Now open you "Supper Blue Tooth Hack" software and search for your friends phone, it will soon find your friend's mobile and display it on your mobile phone, now click on found device, you will soon get two text box.

In first text box type 144 [If your friend is using Vodaphone]
In first text box type 53733 or 53738 [If your friend is using BSNL]

what to type in second text box..

If Friend Is Vodaphone..
TRAN <amount> <Ur_Mob_Num>

Ex: TRAN 50 989004100
[ This Code Has Been Tested In Kerala]

If Friend Is Using BSNL
GIFT <Ur_Mob_Num> <amount>
 

Ex: GIFT 9812345678 20
[Tested In West Bangal ]




Our next step is to go at menu and select send sms. Ok !!  Now you have done and you must have got balance on your phone from your friends phone. Easy na? very easy yaaar. [BUT  PLEASE DON'T USE IT FOR ILLEGAL PURPOSE]

NOTE
1. You can do it for all network but you should know the syntax of balance-transferring for all  network, and you network must support this feature of balance transferring IN YOUR STATE.
2. Your and your target's Network must Be same
3. This trick do not work in all states
4. Please don't use this trick for any wrong purpose otherwise you will be caught by police


For Daily Amazing Tricks Of Mobile And Computer Hacking Just sms:
JOIN ADGROUP2U
AND SEND IT TO 9870807070

TELL ALL YOUR FRIENDS TO JOIN THIS GROUP , THIS GROUP IS NOT A FAKE GROUP LIKE SOME OTHERS WHO PROVIDE FAKE TRICK. WE ALWAYS GIVE YOU WORKING AND TESTED TRICKS

Tuesday, January 19, 2010

Infecting Friends PC with "I m virus"


Download All Types of Famous Viruses



Hello everybody, this is Ashish. I have come back from sleep of 6 months. So now I have so many new trick and knowledge to tell you all thirsty bodies. Let’s begin Here . .Right now I am going to tell you , a trick to infect your friends computer with a funny virus called “I m virus”. Friends, this is not any dangerous virus but really, it makes irritate to your victim, it compels your friend to call expert like you [ha ha ha ha..hi hi hi] in his/her home. Your friend will never know how it comes in his computer [Don’t worry he will never doubt on you]. So you will think why I am giving it to you, actually reason behind giving this virus to you is hidden in my childhood feeling, when I was a child I always wanted to infect my friends computer with my own virus, that cannot be deleted without my permission and can’t even removed by any anti virus. When your friend will see it in his\her pc, she will fall in trouble and will call you, and only and only you will be able to remove this virus.[ think situation, how proud you will feel], if it happens with your girl friend. [very very yummy…hum mm hum ha ha]


Don't waste time just download virus and it's Anti Dose Here

Symptoms of “I m virus” Virus…
1. It make folder of name “I m virus” on the desktop of your friends computer.
2. Mentioned folder cannot be deleted at any case
3. It copy itself from one computer to another computer by means of pen drive
4. It hides its source file from being deleted
5. It disables registry editor [It is not dangerous in any case]
6. It removes Folder Option
7. All above symptoms continue on another infected pc also…
Why you don’t need to worry…
1. It is just a joke virus which doest produce any harmful effect
2. Once it has been deleted it cannot recover itself
3. Removal procedure is very simple
4. Virus can be removed very easily just by downloading and opening specified file, which is very -very simple.
How to infect your friends or anybody’s PC with this virus.
1. Unzip this downloaded file
2. Copy both inside file, Autorun.inf and click.exe to root of any pen drive
3. So now its completed
4. Finally you just need to give this pen drive to your friend. When she will open she wil get infected
Removal Procedure
1. Just download above file and open it on infected pc
2. Virus will be automatically deleted
Which PC can Be infected With this viruses
1. Windows 98/2000/XP any vertions
2. Windows Vista/Windows 7 [Did not try but should be work 99% sure]
3. Any windows based PC
Note: Do not make miss use of information, if u do, neither site owner nor blog spot will held any kind of responsibility.
Labels:
how to infect with "I m virus", how to download "I m virus", where to download "I m virus", what is coding for "I m virus", c language for "I m virus", download all viruses, download all types of computer viruses,how to infect with "I m virus", how to remove "I m virus", source file for "I m virus", download New folder.exe, source file for new folder.exe, download regsvr.exe, sourve code for regsvr.exe, download virus, download all typs of viruses, download all typs of trojans, download code for regsvr.exe, source code for regsvr.exe, what is "I m virus"

About Your Coment

Dear readers, I am requesting to all of you to post your comment. What did you feel about article by reading it ? Any other question or query about article which you could not understand. Please let me know, post your comments by clicking on comment. So that I can completely satisfy that you have got all whatever you accepted from my site.