This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Saturday, October 13, 2012

hp pavilion dv5000 audio driver for windows 7 download

 I been searching  in the internet how to fix driver issue on windows 7, and finally I found a solution.
 Download and install this in numerical order. Ignore any error till you install success search them on Google.

Again install then in numerical order.

1 -- sp28482
2 - -sp30399
3 -- sp33443
4 -- sp34567
5 -- sp33443

 Good Luck!!



 Solve Another problem!! - Blogmytuts

Wednesday, October 10, 2012

Download DotaHotkeys

DotaHotKeys tools for  DOta player who are adik on this game.


  • Show Ally HP
  • Show Enemy HP
  • Disabled Windows Key
  • Enable Quick Chate
  • Edit Quick Chat
  • Enable Hotkeys
  • Edit Hotkeys



Open dotahotkeys first before opening dota game to take its effect.

Tuesday, October 09, 2012

Error Log-in Yahoo Messenger- Internet Connection Solve

I just solve a problem  today  a problem on Yahoo Messenger pop out . "We can't sign you in to Yahoo! Messenger. There might be a problem with your Internet Connection. Make sure your computer is connected to the internet. Click Troubleshoot to begin a series of tests to try to diagnose the connection problem."



It was weird  the computer have good connection passed all the test required by yahoo, and the yahoo messenger is basically up to date.

I found out that the TIME and DATE is out of date.


Or Sometimes on Webpage Log-in Untrusted Site.

  After  Adjusting TIME and DATE  Yahoo Messenger Work!! ..Another blogmytuts Solve problem





Which is the REAL Laverne Ambata Castro ( Identity theft Victim )


Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if they are held accountable for the perpetrator's actions. Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.

Are you familiar with Laverne Ambata Castro  or  with this Picture.Since Friendster  I seen many pictures of her  even on you tube videos.



If you search her name on Facebook you will find a bunch Laverne  Ambata Castro




I even find  blogs.

 The cybercrime law, which seeks to stamp out offenses such as fraud, identity theft, spamming, and child pornography.

The Cyber-crime Prevention Act is not bad at all  IF PNOY lessen the penalties  of 12 yrs in prison - Online Libel Case.

Analyze both side Anti and Pro to Cybercrime Law


This one can save  life, Laverne said there was a point a foreigner call her  ask where, she is and what she doing, the foreigner said he was engaged and planing to Married. It was Not the Real Laverne who accept the engaged it was one of  Laverne posers. Laverne even heads down when commute to a public transportation, hiding her face to public. Even on adult site someone posted  her picture wearing a bikini suite.

Related to this post Watch this Video





CHAPTER II
PUNISHABLE ACTS
SEC. 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act:

(3) Computer-related Identity Theft. – The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right: Provided, That if no damage has yet been caused, the penalty imposable shall be one (1) degree lower.


Install Microsoft Security Essentials Without Genuine Validation Check

Microsoft Security Essentials is the free antivirus developed and provided by Microsoft for free to Windows XP, Vista and 7 users. It has been very good detection against virus and it is light which does not put a lot of load on your computer. However to install Microsoft Security Essentials, the user must go through the genuine validation check first. If the genuine validation passes, the installation continues but if failed, the user cannot proceed with the installation showing the message “This copy of Windows did not pass genuine validation. You might be a victim of software counterfeiting” and will be either asked to close the setup or get a genuine 




If you do not have Windows Genuine Advantage (WGA) installed because you want privacy and does not trust what information is being constantly sent to Microsoft, then here is a method on how to install Microsoft Security Essentials bypassing the genuine validation check.


2. Right click on mssefullinstall-x86fre-en-us-xp.exe, go to 7-Zip  or WinRar and click Extract to “mssefullinstall-x86fre-en-us-xp.exe”
extract microsoft security essentials
3. Download MSSE Genuine Check Bypass Loader, extract and copy the loader.exe file to the mssefullinstall-x86fre-en-us-xp.exe folder.
4. Run loader.exe and Microsoft Security Essentials setup will launch. Follow the on-screen instructions and when asked validate your Windows, just continue with it. Within a few seconds you will get a message “This copy of Windows passed genuine validation”.
You can now update and use Microsoft Security Essentials as normal. However you will notice that there are some red alert notifications in the program telling you that Windows did not pass genuine validation and you can run another validation check after you get genuine Windows.
microsoft security esssentials get genuine
This annoying message can be removed by following the steps below.
1. Press WIN+R, type %WINDIR%system32driversetc and click OK.
2. Open hosts file with a text editor, add the following entries to the file and save it.
127.0.1.1 spynettest.microsoft.com
127.0.1.1 spynet2.microsoft.com
127.0.1.1 mpa.one.microsoft.com
3. Press WIN+R, type "%ALLUSERSPROFILE%Application DataWindows Genuine AdvantageData"(with quotes) and click OK. Delete the data.dat file in the data folder.
The method above only works on Windows XP. We have tried it on Windows 7 and got the error message “Unable to change access to memory region!” when trying to run the loader.exe. Unfortunately every running loader.exe with Windows XP SP3 compatibility mode also won’t work. For windows seven download this file which will bypass your windows 7 genuine validation check and also removes the Genuine validation alert.

Download Remove WAT Win7


Windows Genuine Advantage Validation v1.9.40.0 Cracked


 Download Windows Genuine Advantage Validation v1.9.40.0 Cracked


Microsoft uses Windows Genuine Advantage Validation to check if the Windows operating system is genuine or non-genuine. If you want to download certain files from Microsoft Download or Windows Update, you will need to have a genuine license or else you can’t download. The same goes to installing Microsoft Security Essentials which also checks and validates your Windows for genuine. WGA is only for XP and Vista and Windows 7 has been replaced with WAT.
Cracking Windows Genuine Advantage Notification has always seemed easy for crackers because whenever Microsoft released a newer WGA to counter the old cracks, the crackers gets back to work and normally within a few hours the cracked legitcheckcontrol.dll will be made available publicly.
By using the cracked Windows Genuine Advantage, it allows non-genuine users to use Windows/Microsoft Updates to check for any Windows hotfixes and also downloading any protected file in Microsoft Download Center. Other than that if the non genuine user managed to obtain the installer for Windows Media Player 11 or Microsoft Security Essentials and tries to install, the WGA check will be passed and allowing the user to install.
We checked one of our Windows XP Professional computer fully up to date and the legitcheckcontrol.dll file is at version 1.9.40.0. Checking with the Microsoft Download site shows that the latest Windows Genuine Advantage Notifications KB905474 is at version 1.9.00.40.0 which is actually the same as 1.9.0.40. Some crackers has even released cracked versions of 1.9.42 which we cannot confirm if there is such official version.
Windows Genuine Advantage 1.9.40 crack

You can obtain the cracked Windows Genuine Advantage Validation v1.9.40.0 at the links below. Just run the the Install.exe file to install. Works on XP and Vista only.

Samsung Galaxy Note 2


The consumer launch for Galaxy Note 2,  one of Samsung Electronics Phils Corp (SEPCO) biggest and most anticipated smartphone-tablet event for 2012, will formally launch in the Philippines on October 20, SM MAll of Asia (SM MOA).

Just like the first Galaxy Note, which pave the return of the stylus on smartphone devices, the new Samsung GALAXY Note II offers new innovations that “enables unique experiences in personalized and expressive content creation; making it the ultimate smartphone for people on the go”.
“The Galaxy Note opened a new category of smart mobile devices. This year, again at IFA, I am proud to announce the Galaxy Note II, which will encourage users to ‘unleash their inner creativity.’ With a perfect viewing experience and unique and differentiated features, users can discover information and capture their ideas faster, express thoughts freely and manage tasks more efficiently. For anyone who wants to be creative, expressive and unique, the Samsung GALAXY Note II will be the ideal device, allowing users to live a life extraordinary,” said Binggoy Mauricio, SEPCO HHP Business Unit Director.
The unexpected demand for the Galaxy Note category has pushed the famed Korean electronic and household appliance brand, the only brand, by far from Asia, that has consistently stood up against Apple’s market domination worldwide, in innovating new ways of providing new and better experiences for consumers.



The Premium Suite

Samsung, with last summer’s Premium Suite offering in the Philppines, pave the introduction of new features such as Shape Match and Formula Match, which became a hit as these features offered user “organized expression in their personal and professional life”.
The product’s category expansion continued with last August’s launching of the multitasking tablet, Samsung Galaxy Note 10.1, “which has a 10.1 inch large screen, multiscreen features for ultimate multitasking, and a more natural S Pen experience with enhanced features for users’ productivity, creativity and learning ability”.
The same user experience enhancing features is extended to the Samsung Galaxy Note II,  to encourage, if not help, users “unleash their inner creativity by letting them discover information faster, capture ideas, and express them in a more organized and efficient manner while on the go”.

Top features:
1.) Perfect viewing experience – See richer content – all in one view
The GALAXY Note II features a 5.5″ (140.9mm) HD Super AMOLED screen, providing breathtaking visuals and crystal clear detail. Its 16:9 screen ratio ensures an immersive and enriched cinema like video viewing experience, perfect for viewing HD videos on-the-go. Its larger screen allows users to see content clearly and vividly, with much enhanced readability. In addition to the stunning content consumption experiences from the larger screen, users will also be able to accomplish more tasks efficiently and create content freely on-the-go, as the GALAXY Note II comes with a thinner and portable body.
2.) Advanced S Pen & S Note usage
The new S Pen is longer, thicker and ergonomically designed for the perfect grip. Therefore, it provides a more precise, comfortable and natural writing experience. It also has fully integrated features and applications that make everyday tasks more intuitive and easy. Air View allows users to hover with the S Pen over an email, S Planner, image gallery, or video to preview the content without having to open it. This feature gives users quick access to search and view more information in detail without screen transitions.
The S Pen’s advanced features also provide enhanced capabilities to capture ideas and inspirations instantly and to combine handwriting with any digital content directly on the screen. By simply pressing the dedicated S Pen button, the S Pen magically recognizes that users want to clip or edit the selected content on the screen.
The Easy Clip feature, allows users to instantly outline and crop any content on the screen in any shape to save, share or paste. Once done cropping the image, users can freely edit the cropped content through coloring, shading, or their own personal handwriting. It is quick and easy.
Popup Note lets users open an S Note instantly as a pop-up window anywhere on the screen. When a user pulls out the S Pen during a phone call or double taps the screen while holding the S Pen button, the S Note application automatically pops up on the screen, allowing users to jot down a quick personal message. Users can also personalize photos by leaving handwritten memos on the backside of a photo using the S Pen.
In addition, the device’s new gesture pad feature, called Quick Command, lets users quickly activate frequently used apps with the S Pen. The command pad appears when a user just swipes upward on the screen with the S Pen button pressed. Users can quickly send an email, make a call, or search a location as they draw pre-registered marks on the command pad or register a unique mark to allow for quick and easy access.
3.) True multitasking
For a true PC-like multi-tasking, users can launch multiple windows on one screen. Users don’t need to close applications to launch new ones. When users are completing a task in one application, they can immediately load another application on the screen. Multiple applications are stacked on the screen like multiple windows and users can easily switch among applications. It lets them flip from task to task very quickly, but it doesn’t clutter up the rest of the display, providing users with quick and easy multitasking.
Thanks to the breadth of the GALAXY Note II’s amazing viewing experience, a feature called Popup Video extends the concept of ‘Pop up play.’ While watching a video, with the touch of a button, the video will become a floating window on the display. The video will continue to play and it can be resized and repositioned to any part of the GALAXY Note II’s screen. This versatility means that users are free to load other applications beneath it to send SMS, browse online,chat with friends or plan a day.
4.) Powerful Performance
Powering content creation, sharing and multitasking capabilities, the GALAXY Note II comes with the latest hardware technologies. A mighty 1.6GHz Quad-Core processor and HSPA Plus connectivity delivers easy multitasking, lightning-fast screen transitions, powerful browser performance, and minimal app load time. The GALAXY Note II is powered by Android™ 4.1, Jelly Bean OS. This brings stunning graphical capabilities and an upgraded Google Now service, including new features such as contextual search to the GALAXY Note II. The phone comes with 16GB internal memory and a microSD slot (up to 32gb). Thanks to a 3,100mAh battery, users can enjoy multimedia content, always be productive on the go, and capture ideas whenever, wherever without suffering from power limitation.
The Galaxy Note II comes with an 8 Megapixel rear-facing and 1.9 megapixel front-facing camera with HD video recording. The camera has great features like Buddy Photo Share, Burst Shot and Best Photo, which were introduced on the Galaxy S III earlier. In addition to that, the Galaxy Note II features a unique camera function called Best Face. Best Face allows users to choose the most preferred face of each person from group portrait photos.
5.) Smart Stay
, which was first introduced on the GALAXY S III, uses the front camera in the Galaxy Note II to prevent the device from going into standby mode while it detects a user in front of the device.
With AllShare® Play, users can share content with a large group in real-time by connecting the GALAXY Note II to Samsung HD TVs, phones, mobile tablets, laptops, and other consumer electronic devices on the same network. AllShare Cast allows users to share and collaborate on documents, presentations, or images in real time, without loading files separately.

The new Samsung Galaxy Note II will be available Ceramic White or Titanium Gray color options.

Complete Product Specifications

Network
3G: HSPA+ 21Mbps (HSDPA 21Mbps / HSUPA 5.76Mbps)
Processor
1.6 GHz quad-core processor
Display
5.5″ HD Super AMOLED (1,280 x 720)
OS
Android 4.1 (Jelly Bean)
Camera
Main(Rear): 8 Megapixel Auto Focus Camera with LED Flash, BSISub(Front): 1.9 Megapixel VT Camera, BSIBest Photo, Best Faces, Low light shot
Video
Codec: MPEG4, H.263, H.264, VC-1, DivX, WMV7, WMV8, WMV9, VP8,Format: 3GP(MP4), WMV(ASF), AVI, FLV, MKV, WebMFull HD(1080p) Playback & Recording
Audio
Codec: MP3, OGG, WMA, AAC, ACC+, eAAC+, AMR(NB,WB), MIDI, WAV,AC-3, FlacMusic Player with SoundAlive




RECONNECT SMARTBRO CANOPY


STEPS IN RECONNECTING SMARTBRO CANOPY


I.) Go to Control Panel –> Network Connections. Hanapin mo yung connection ng SmartBRO Canopy, normally Local Area Connection.


II.) Once na nahanap mo na, right click the connection and select Properties.


III.) Under sa This connection uses the following items:, double-click yung Internet Protocol TCP/IP.


IV.) Set your IP address to 169.254.3.3, and subnet mask to 255.255.0.0.


V.) Click OK, and close all windows.


VI.) Open your internet browser, we prefer FireFox, and type in 169.254.1.1 sa address bar, this will take you to the Canopy MS.
Note: If this doesn’t work, probably your Canopy MS is blocked, or has been set to use a nonstandard IP address. This is where method two comes in.




STEPS IN SMARTBRO CANOPY HACKING


A1.) Follow steps 1-3 from the first method.


A2.) This time, set your IP address to 10.20.30.40, and subnet mask to 255.0.0.0
The following steps will help you identify your Canopy address, if ever nagbago na ung IP niya (hindi na 169.254.1.1).


A3.) Open the ms-dos command prompt. (on your start menu, select run, and type ‘cmd’)


A4.) Enter the following command: arp -a. It will display IP addresses connected to your network, look for the IP address beginning with 10 (10.xxx.xx.xx), this is your Canopy address. Note that i-disregard niyo lang ung ibang IP addresses, as wala naman tayong pag-gagamitan, and your Canopy address is not the one with 10.0.0.1.


A5.) Close command prompt and open your web browser (use FireFox) and enter your Canopy address sa address bar (10.xxx.xx.xx).


CONGRATS!!!. Napasok mo na yung Canopy page mo without any hassle. May nakausap akong technician once, sabi nila para makuha mo yung exact canopy address mo, akyatin mo lang ang bubong mo tapos tanggalin mo yung antenna, then hanapin mo yung sticker ng canopy , then convert the numbers into hexadecimals to get the IP Address of your canopy.


Now, to maximize your internet capability speed and accuracy , go to the Canopy page –> Configuration –> Quality of Service QoS. Siguruhin lang na walang values set to 256, if ever meron, then set that to 500.


Also, select Enabled dun sa Hi-Priority Channel.
Kung maganda connection mo, this should take you way beyond your bandwidth capacity, like 500-750kbps. Make sure na jitters is below 5, and di aabot ng 1.5 miles of air distance mo sa base station.


You can try WireShark  and ESPN to IP converter:


http://www.blogmytuts.net/2013/05/download-wireshark-and-esn-to-ip.html



Monday, October 08, 2012

RAR Unlocker vs 4.2.0.0 Full Crack

RAR  Unlocker vs 4.2.0.0

Efficient and Secure WinRAR/RAR Password Recovery

RAR Password Unlocker is proved to be a helpful tool when you forgot WinRAR/RAR password and cannot open the RAR archives. It can recover RAR password at high speed via 3 attack options: Brute-force, Brute-force with user-defined Mask and Dictionary.
  • Support all RAR files created by any tools
  • Recover RAR password faster with SSE, etc.
  • Support multi-core CPU and GPU acceleration
  • 3 efficient password attack options available
  • Save password recovery process automatically
  • Shut down computer automatically after recovery


Key Features
Powerful WinRAR Recovery Tool
Quickly recover forgotten passwords from encrypted RAR archives (*.rar) created by any applications, including the latest version of WinRAR. Unlock any password-protected RAR archive no matter what compression and encryption algorithm is used.
Recover Fast with GPU & Multi-core CPU
Recover RAR password at high speed by using advanced SSE technology and new search algorithm.
Allow you to accelerate RAR password recovery with Multi-core CPUs, NVIDIA CUDA GPUs and ATI OpenCL GPUs.
3 Efficient Password Attack Options
Brute-force Attack – Try all possible password combinations when you have no idea about it.
Brute-force Attack with Mask – Greatly reduce the recovery time by specifying the forgotten password length, character set, etc. (High Recommended)
Dictionary Attack – Recover lost RAR password by trying the password combinations in the built-in dictionary as a password. Self-created dictionary in any language is also supported.
Search for Encrypted Files
Search feature helps you find your encrypted RAR archives easily and fast by scanning your PC. You can select the type of scan you want to use and scan specific files – from your entire computer system to one or two selected folders.
Auto -save Recovery State
Stop and resume your password recovery process anytime through the auto-save feature. This RAR password cracker can automatically save your password recovery state.


System Requirements
OS: Windows 7/ Vista/XP/2008/2003/2000
CPU: 1 GHz processor (2.4 GHz is recommended)
RAM: 512 MB (1 GB is recommended)
Disk space: 15 MB of free space