Last Update

Kaspersky Trial Resetter

Kaspersky Trial Resetter is the first and only program that is able to reset the license key for all Kaspersky products.

The program includes support for the follwing products:

Kaspersky Anti-Virus & Internet Security 2011 Series
Kaspersky Anti-Virus & Internet Security 2010 Series
Kaspersky Anti-Virus & Internet Security 2009 Series
Kaspersky Anti-Virus & Internet Security 8.0 Series
Kaspersky Anti-Virus & Internet Security 7.0 Series
Kaspersky Anti-Virus & Internet Security 6.0 Series

 How to:
Follow the next steps to correctly reset the license key for your
Kaspersky product.

Here is a textual guide if you can't read the writing in the image:

1. Right click on kaspersky icon + Press "Settings"
2. Go to "Options"
3. Untick "Enable Self-Defense" & "Disable external service control"
4. Press "Apply & OK"
5. Right click on kaspersky icon and press " Exit "
6. A window will show press "yes"

After you've done that you can run the program

Download This File

download via Hotfile
download via Rapidshare

A1 Website Download v2.3.3


Download websites and store them anywhere. The complete
solution for webdesign and webmaster consultants, travelers
and people with low bandwidth internet connections.

With our website download tool you can save and keep
complete websites for later viewing. This includes
multimedia files such as pictures and videos.


1) Unpack and install.
2) Overwrite existing with cracked files.
3) Enjoy this release

Download This File

download via Hotfile
download via Rapidshare

Music MP3 Downloader

Music MP3 Downloader | 7.8 Mb

Music MP3 Downloader is easy to use software which enables you search and download over 100 million MP3 in the largest music network.

Key Features

Over 100 million MP3 from the largest network
You can search and download any music you want - over 100 million MP3 from the largest download network.
100% clean and safe download
Music MP3 Downloader is not a Peer-to-Peer program. You don't have to worry about downloading virus. It is clean of any form of badware (viruses, spyware, adware, etc.)
Always bring you the hottest songs

Download This File

Download via rapidshare
Download via hotfile

Navicat Premium Enterprise 9.0.12


Navicat Premium is a multi-connections Database Administration
tool allowing you to connect to MySQL, SQLite, Oracle and
PostgreSQL databases simultaneously within a single application,
making database administration to multiple kinds of database so

Download This File

click here to download

Recover Keys

Have you ever lost your keys? Perhaps, yes. In such case you can usually create a duplicate or change the lock. But, what if you've lost your activation keys for Windows operating system or other major software you recently purchased? It may cost you from hundreds to thousands of dollars.

For this reason we have created the software called Recover Keys. With Recover Keys you will easily recover any keys lost. Simply scan your system for all installed software and make a backup, print or save it to a text file.

Key Features
Lost XP product key? Recover it with Recover Keys software

Find XP key. product key viewer
Recover lost product keys
With Recover Keys you can retrieve activation keys for Microsoft Windows NT / 2000 / XP / 2003 Server / Vista / Windows 7, Microsoft Office, Alcohol 120%, Acronis TrueImage, Disc Director, SlySoft AnyDVD, CloneCD, Adobe Photoshop, Nero, Camtasia Studio, Electronic Arts games and many-many more programs. Currently it supports more than 950+ programs. Please, check the list of supported programs by this link.

Download This File

Rapidshare : click here to download
Hotfile: click here to download

Internet Download Manager v6.0BETA Incl Keygen and Patch

Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.

Download This File

click here to download

Total Video Converter 3.70 Build 100319

E.M. Total Video Converter is a piece of extremely powerful and full-featured converter software that supports almost all video and audio formats. The software is designed to convert video for your mobile video player as 3gp, mp4, PSP, PS3, iPod, iPhone etc and also VCD or DVD player, XBOX360.

New Total Video Converter 3.60 let you experience Unparalleled High-Definition movie. It is the best and unique software today with incomparable support for converting and burning video to AVCHD disc which can work on PS3 and Blu-ray player. Meanwhile, it supports for converting and burning video to HD formats like H.264 TS, Mpeg-2 TS, WMV-HD, MKV-HD, DivX-HD, Divx-HD, MOV-HD, FLV-HD and MP4-HD.

Main Features of Total Video Converter:

  • Convert all kinds of videos to mobile videos or audios (mp4, 3gp, xvid, divx mpeg4 avi, amr audio) which are used by cell-phone, PDA, PSP, iPod, iPhone, Xbox360, PS3 etc.;
  • Photos slide show combines multi-photos and musics with more than 300 photos fantasy transition effect;
  • High compatibility and high efficiency for Importing RMVB or RM video/audio;
  • Convert various videos to MPEG videos compatible with standard DVD/SVCD/VCD;
  • Burn the converted videos to DVD/SVCD/VCD;
  • Rip DVD to popular videos of all sorts;
  • Extract audio from various of videos and convert which to all kinds of audios (mp3, ac3, ogg, wav, aac);
  • RIP CD to audios of all sorts directly;
  • Support using with command line;
  • Combine several video and audio files to one video file;
  • Demultiplex or extract video and audio;
  • Multiplex video and audio to one file;

Total Video Converter supports reading the following file formats:

Video Formats:

Convert from Real Video Rmvb (.rm,.rmvb)
Convert from MPEG4 (.mp4)
Convert from 3gp (.3gp, 3g2)
Convert from Game Psp (.psp)
Convert from MPEG1 (.mpg, mpeg)
Convert from MPEG2 PS (.mpg, mpeg, vob)
Convert from MPEG2 TS (DVB Transport Stream)
Convert from DIVX (.divx)
Convert from Ms ASF (.asf, .wmv)
Convert from Ms ASF (.asf, .wmv)
Convert from Ms AVI (.avi)
Convert from Macromedia Flash video FLV (.flv)
Convert from Apple Quicktime (.mov)
Convert from FLIC format (.fli, .flc)
Convert from Gif Animation (.gif)
Convert from DV (.dv)
Convert from Matroska (.mkv)
Convert from ogm (.ogm)
Convert from Video Formats Dx9 Directshow can open

Audio Formats:

Convert from CD audio (.cda)
Convert from MPEG audio (.mp3, mp2)
Convert from Ms WAV (.wav)
Convert from Ms WMA (.wma)
Convert from Real Audio (.ra)
Convert from OGG (.ogg)
Convert from Amr audio (.amr)
Convert from AC3 (.ac3)
Convert from SUN AU format (.au)
Convert from Macromedia Flash embedded audio (.swf)
Convert from Audio Formats Dx9 Directshow can open

Game Video Formats:

Technologies format, used in some games(.4xm)
Playstation STR
Id RoQ used in Quake III, Jedi Knight 2, other computer games
Format used in various Interplay computer games,Interplay MVE
Multimedia format used in Origin's Wing Commander III computer game,WC3 Movie
Used in many Sega Saturn console games, Sega FILM/CPK
Multimedia formats used in Westwood Studios games, Westwood Studios VQA/AUD
Used in Quake II, Id Cinematic (.cin)
Used in Sierra CD-ROM games, Sierra VMD
Used in Sierra Online games, .sol files
Electronic Arts Multimedia, Matroska
Used in various EA games; files have extensions like WVE and UV2
Nullsoft Video (NSV) format

Total Video Converter supports generating the following file formats:

Video Formats:

Convert to MPEG4(.mp4)
Convert to 3gp(.3gp, 3g2)
Convert to Game Psp (.psp)
Convert to MPEG1 (.mpg, mpeg)
Convert to NTSC, PAL DVD mpeg and Burn to DVD disc
Convert to NTSC, PAL SVCD mpeg and Burn to SVCD disc
Convert to NTSC, PAL VCD mpeg and Burn to VCD disc
Convert to Ms Mpeg4 AVI (.avi)
Convert to Divx AVI (.avi)
Convert to Xvid AVI (.avi)
Convert to H264 AVI (.avi)
Convert to Mjpeg AVI (.avi)
Convert to HuffYUV AVI (.avi)
Convert to Swf Video (.swf)
Convert to Flv Video (.flv)
Convert to Gif Animation (.gif)
Convert to Mpeg4 Mov (.mov)
Convert to Apple Quicktime (.mov)
Convert to DV (.dv)
Convert to WMV (.wmv)
Convert to HD Mpeg TS (.ts)
Convert to ASF (.asf)

Audio Formats:

Convert to MPEG audio(.mp3, mp2)
Convert to Ms WAV (.wav)
Convert to Ms WMA (.wma)
Convert to OGG (.ogg)
Convert to Amr audio (.amr)
Convert to AC3 (.ac3)
Convert to SUN AU format (.au)
Convert to m4a (mp4 audio)
Convert to aac (aac audio)
Convert to mmf (mmf audio)
Convert to Flac (flac audio)

Download This File

click here to download

Password :

Solid Converter PDF 6.0.669 Final

PDF Conversion and Creation
Convert PDF to Word, Excel - Easily Editable Documents!

* PDF to Word Conversion. Convert your PDF files to Microsoft? Word documents for easy editing.
* PDF to Excel Conversion. Convert tables from your PDF files to Microsoft? Excel spreadsheets. Select pages or entire document.
* WYSIWYG Content Extraction. Convert selected tables or images from a PDF file. Creates tables in Word or Excel or image files.
* Quality Conversions. No need to waste hours reformatting and reworking your files.
* Headers and Footers. Advanced options for converting or removing headers and footers.
* Form Recognition. Form fields are recognized and converted into text boxes for easy editing.
* Rotated Text Recovery. Convert text from your PDF no matter which way it's oriented.
* Hyperlink Detection. URL Hyperlinks in the original PDF are automatically transferred into the new Word document.Convert From Explorer. One click to open PDF document into Word from Windows Explorer.
* PDF Creation. Simply drag and drop. Easily create PDFs from your documents. WYSIWYG user interface.
* WYSIWYG User Interface. Multiple document PDF UI for page-level manipulation operations.
* Watermarks. Pre-defined and custom watermarks. Text stamps, images or PDF overlays. Electronic letterheads.
* Combine. Combine multiple documents into a single PDF file. Combine PDF files.
* Rearrange Pages. Use drag and drop to rearrange page order in a PDF file or between multiple files.
* Extract Pages. Extract pages from a PDF file as a single new PDF or as multiple new PDFs for each page.
* Full Search. Fast text search of multiple PDF files. Navigable list of results.
* Batch-Process Conversions. Save time by using batch conversion palettes in the UI or using scripts from the command line.
* Print to PDF. Create PDF files easily from any Windows-based program.
* Password-Protect your PDFs. You can restrict who can view, edit, copy, print or add comments to your document.
* Encrypt your PDFs. Secure your PDF files using 128-bit RC4 or AES encryption algorithms.
* Set PDF Permissions. Control which users can read, print, edit, copy or comment your PDF files.
* Set Document Properties. Define Title, Author, Subject and Keywords to help organize your documents.
* Custom Page Settings. Create PDF files with custom pages sizes, margins and orientation.
* Reduce File Size. Keep your PDFs small with our compression options. Optimize file size for Web or print while preserving an appropriate level of quality.
* Acrobat Reader Settings. Set default view including page layout, initial zoom and page thumbnail view.
* Archive Using PDF/A. Create PDF/A-1b documents which are fully compliant with ISO 19005-1 archiving standards.

* Compatible with: Windows 2003, XP, Vista and Win7 (32/64-bit)
* Multilingual: English, Spanish, French, Italian, German, Chinese, Russian.

Dowload This File

click here

Full Speed Internet Booster 3.3

Full Speed software is the most effective Internet Speed Booster and Internet Speed Test software available today!
Just download, run, and click the Boost button. Now you will have 5 X faster Internet, forever! You won’t believe how fast your high speed Internet Broadband can go.
Instantly Get:
1. Overall faster Internet connection speed
2. Faster download speeds
3. Faster web site browsing
4. Improve Internet and Intranet performance
5. Quicker download times
6. Smoother streaming music and movies
7. Faster download for songs and video
8. Faster performance with email
9. Faster loading Web graphics
10. Faster loading Web pages
11. Faster Internet Explorer
12. Speed test for Web site browsing
13. Speed test for general data transfer
14. Works for businesses or home users
15. Improved VPN and WAN performance
16. Increased peak download speed
17. More consistent data transfer
18. Better data flow efficiency
19. Fewer corrupt downloads
20. Works over networks
21. Works with all ADSL/DSL modems and routers
22. Works over wireless
23. Smoother surfing
* Tested on all Broadband technologies *

Size: 8 mb

click here

WindowsCare Memory Improve Ultimate.v5.2

WindowsCare Memory Improve Ultimate.v5.2.1.263-Lz0
Memory Improve Ultimate is powerful memory optimizer software designed to improve and monitor windows memory. It can free up wasted RAM automatically and compress system memory to make processes run faster with greater stability. It still has the ability to view and monitor data of RAM memory, paging file usage and CPU usage in real time. It is a feature-rich yet easy-to-use program.

Download This File


Windows 7 Loader Extreme Edition 3 Multilanguage

I the novice user of the PC, saw that there are various activators Windows 7 Loader. What of them to select?
To beginners and those who not ready to restore the loader, owing to impossibility to boot after application of activators, it is recommended to use only safe Windows 7 Loader eXtreme Edition v3. If the "Loader" method used then press "Cancel" button after reboot.

How to use the activator?
Start w7lxe.exe, do nothing, wait when all makes the activator in an automatic mode.

Online genuine validation shows the error.
KB971033 is blocked for the purpose of preventing possible activation loss in the future.

This is for those who were not successful in activating Windows 7, Vista (together or not) and Office 2010!
Windows 7 Loader eXtreme Edition - the latest version now activator

Activator is suitable for any version of "Seven". Windows 7 Loader Extreme Edition - is a versatile tool to activate any version of Windows 7/Vista/2008R2/2008. Interacts directly with elements of the operating system responsible for activation. It supports all the official ways to activate and removes a number of internal restrictions on their use. Provides an adequate level of security the user, allowing fearlessly make intuitive interaction with the activator. Able to perform all the basic functions of the individual tools used for activation.
Default SLIC emulator: W7 Loader(Forceful) for Windows 7 h86/64 from the notorious "Napalum".

Download This File

click here to download

Super Internet TV Premium 9.0.0

Super Internet TV v9.0.0 Premium Edition (NEW) | 13.8 MB

Super Internet TV allows you to watch 2200+ live television channels and listen to 5000+ online radio stations from 100+ countries. There is no need for a TV Tuner card because all the channels are streamed through your Internet connection. All you need is a Windows PC and an Internet connection. You can also record your favorite programs at will. Super Internet TV is ideal for people interested in alternative programming, learning languages, foreign cultures, entertainment, sports or news.
- Watch 2000+ Internet TV
- Listen to 5000+ radio stations
- No special hardware required
- Very Easy-to-Use Interface
- No PC knowledge required
- Recording Internet TV channels and radio stations
- Resizable screen, including full-screen mode
- Automatic channel list updates
- Your own personal favorite list
- Advance filtering
- Faster video stream loading
- More reliable connection
- Works anywhere in the world

OS: Windows Vista, XP, 2003, 2000, ME, 98, 98SE or Windows NT4.0

Download This File

click here to download

Hacking MSN, Yahoo, Hotmail AIO

In the opportunity this time I will share the tools that are often used to break into an email. If for his use alone does not need to clear it.
You only need to ask you if you do not understand. If you find a failure during the attempt, do not hesitate to try again ..

Fake Yahoo! Messenger Login Screen
Fake MSN Messenger Version 7
Fake MSN Messenger Version 5.0
Fake MSN Messenger Version 4.6
Fake Hotmail Login Screen
Saria Fake Logins 2.0
Fake Login Hotmail
AOLKicker V.1.0.0
Fake Webpages 1
Fake Webpages 2
B-S Spy

MSN Chat Monitor and Sniffer
MSN Password Retriever
Head **** Hotmail Hack
HotmailHacker XEdition
Give me your pass V1.0
Hotmail Hacker Final
Hotmail Hacker Gold
MSN Spy Lite v1.0
MSN Sniffer v1.2
MSN Hacker DUC
MSN passwords
Hotmail Hacker
Hotmail Hack
MSN Flooder
Hotmail Brute Force
MSN Password Finder v2.0
MSN Password Grabber v1.0
Hack MSN Password
Hack Hotmail Evolution
MessenPass 1.02
Icecold REloaded
Hotmail Killer 2
NukeMSN v1.5
Hot Freeze v1.6
Hotmail Killer
MSN Locker
Magic -PS

Yahoo Password Retrieval
Yahoo Password Stealer
S-H Y! Pass Sender
Yahoo Cracker
Yahoo Booter

Skinner v1.2
MSN Bomberman v3
Ultimate Nickpopupz
MSN 7 Universal Patcher
Emoticons Creator v1.1
Anti Status Bomb
Proyect Lithium
MSN Detector 2.0
Multi MSN Loader
MSN Dondurucu
MSN Virus Cleaner
MSN Auto Responder
MSN Blockchecker

Network Password Recovery
NetBIOS Name Scanner
FTP Password Hacker
Cable Modem Sniffer
Port Listener XP
Blueport Scanner
FTP Brute Forcer
Angry IP Scanner
PhpBB Defacer
NetRes View
Whois Domain
Domain Scan
Fast Resolver
Port Scanner
XP -Killer
Remote Anything
Smart-Hack Uploader
PhpBB Attacker

Download This File

click here to download

Sql Commands (usefull For Injection)

Here is a list of SQL commands and what they do, these would be used in some injection methods and of course legitimate sql functions.
On thier own they wont exploit anything but eventually youl find an exploit that needs these and they are good to know for injection or just to better understand how SQL works.

ABORT -- abort the current transaction
ALTER DATABASE -- change a database
ALTER GROUP -- add users to a group or remove users from a group
ALTER TABLE -- change the definition of a table
ALTER TRIGGER -- change the definition of a trigger
ALTER USER -- change a database user account
ANALYZE -- collect statistics about a database
BEGIN -- start a transaction block
CHECKPOINT -- force a transaction log checkpoint
CLOSE -- close a cursor
CLUSTER -- cluster a table according to an index
COMMENT -- define or change the comment of an object
COMMIT -- commit the current transaction
COPY -- copy data between files and tables
CREATE AGGREGATE -- define a new aggregate function
CREATE CAST -- define a user-defined cast
CREATE CONSTRAINT TRIGGER -- define a new constraint trigger
CREATE CONVERSION -- define a user-defined conversion
CREATE DATABASE -- create a new database
CREATE DOMAIN -- define a new domain
CREATE FUNCTION -- define a new function
CREATE GROUP -- define a new user group
CREATE INDEX -- define a new index
CREATE LANGUAGE -- define a new procedural language
CREATE OPERATOR -- define a new operator
CREATE OPERATOR CLASS -- define a new operator class for indexes
CREATE RULE -- define a new rewrite rule
CREATE SCHEMA -- define a new schema
CREATE SEQUENCE -- define a new sequence generator
CREATE TABLE -- define a new table
CREATE TABLE AS -- create a new table from the results of a query
CREATE TRIGGER -- define a new trigger
CREATE TYPE -- define a new data type
CREATE USER -- define a new database user account
CREATE VIEW -- define a new view
DEALLOCATE -- remove a prepared query
DECLARE -- define a cursor
DELETE -- delete rows of a table
DROP AGGREGATE -- remove a user-defined aggregate function
DROP CAST -- remove a user-defined cast
DROP CONVERSION -- remove a user-defined conversion
DROP DATABASE -- remove a database
DROP DOMAIN -- remove a user-defined domain
DROP FUNCTION -- remove a user-defined function
DROP GROUP -- remove a user group
DROP INDEX -- remove an index
DROP LANGUAGE -- remove a user-defined procedural language
DROP OPERATOR -- remove a user-defined operator
DROP OPERATOR CLASS -- remove a user-defined operator class
DROP RULE -- remove a rewrite rule
DROP SCHEMA -- remove a schema
DROP SEQUENCE -- remove a sequence
DROP TABLE -- remove a table
DROP TRIGGER -- remove a trigger
DROP TYPE -- remove a user-defined data type
DROP USER -- remove a database user account
DROP VIEW -- remove a view
END -- commit the current transaction
EXECUTE -- execute a prepared query
EXPLAIN -- show the execution plan of a statement
FETCH -- retrieve rows from a table using a cursor
GRANT -- define access privileges
INSERT -- create new rows in a table
LISTEN -- listen for a notification
LOAD -- load or reload a shared library file
LOCK -- explicitly lock a table
MOVE -- position a cursor on a specified row of a table
NOTIFY -- generate a notification
PREPARE -- create a prepared query
REINDEX -- rebuild corrupted indexes
RESET -- restore the value of a run-time parameter to a default value
REVOKE -- remove access privileges
ROLLBACK -- abort the current transaction
SELECT -- retrieve rows from a table or view
SELECT INTO -- create a new table from the results of a query
SET -- change a run-time parameter
SET CONSTRAINTS -- set the constraint mode of the current transaction
SET SESSION AUTHORIZATION -- set the session user identifier and the current user identifier of the current session
SET TRANSACTION -- set the characteristics of the current transaction
SHOW -- show the value of a run-time parameter
START TRANSACTION -- start a transaction block
TRUNCATE -- empty a table
UNLISTEN -- stop listening for a notification
UPDATE -- update rows of a table
VACUUM -- garbage-collect and optionally analyze a database

Thread: SpyHunter

SpyHunter | 17.30 Mb

As malware continues to evolve and become more sophisticated to avoid detection by anti-spyware/anti-virus programs, SpyHunter responds with new advanced technology to stay one step ahead of today?s computer threats.
SpyHunter is a powerful, real-time anti-spyware application designed specially for people like you, not for tech experts. It is automatically configured out of the box to give you optimal protection with limited interaction so all you need to do is install it for immediate and ongoing protection.

SpyHunter?s latest version (v.4) has added a variety of advanced protection features to detect the latest parasites while keeping you actively protected. SpyHunter takes it a step further by offering additional customization capabilities to ensure every user is able to custom tailor SpyHunter to fit their specific needs.

SpyHunter has the ability to detect and remove rootkits, which are used to stealthy install rogue anti-spyware programs and other trojans. Rootkits use hidden and encrypted folders to avoid detection by traditional security software. SpyHunter?s newly integrated advanced rootkit detection technology allows it to perform an instant rootkit scan and promptly display a message upon detection. The message will ask the user to reboot the computer and after reboot the rootkit will have been removed.

Download This FIile

click here to download

Ulead SmartSaver Pro 3.0

Ulead® SmartSaver Pro 3.0 optimizes and compresses your images down to tiny file sizes to ensure that your images download fast on the Web or E-mail. It's the ultimate package for preparing images for the Web.

Powerful Web Graphics Composition
Create complex tables with slicing tool. Replace cell image, assign color or images to the cell and change animation settings with advanced control.

Outstanding Optimization
Independently optimize all components by using the color palette. Maintain quality in selected areas of GIF, JPEG and PNG images.

Cutting-Edge Interactivity
Mouse over a cell to display a rollover image in another or several cells. Assign multiple mouse events for different actions, like mouse-over, mouse-out, etc.

Download This File

click here to download

Safari 5.0

At one time, web browsers simply got you to the Internet. But from the day it was released, Safari set the bar higher for web browsers. It introduced sophisticated design elements that made browsing a joy. Easy to use, Safari stayed out of your way and let you effortlessly navigate from site to site.
More browsing space: Safari is designed to emphasize the browsing, not the browser. The browser frame is a single pixel wide. You see a scroll bar only when needed. By default, there's no status bar. Instead, a progress indicator turns as your page loads. You'll find tabs at the very top of the browser, opening an even wider window for viewing websites. A great browser, Safari lets you simply enjoy the web.
Find the sites you need: Looking for a site you visited in the past but can't quite remember? Use Full History Search to quickly find sites using even the sketchiest search terms. And when you click a web page in Cover Flow, it's because you've already recognized it as the site you were looking for. No more guessing. Innovative features like these show you how good browsing can be.
Satisfy your need for speed: The world's fastest browser, Safari has speed to burn. Why should you wait for pages to load? You want to see those search results, get the latest news, check current stock prices, right now.

Download This File

Safari 5.0 . File Size 31,03M

Opera 10.60

A full-featured Internet browser, Opera includes pop-up blocking, tabbed browsing, integrated searches, and advanced functions like Opera's groundbreaking E-mail program, RSS Newsfeeds and IRC chat. And because we know that our users have different needs, you can customize the look and content of your Opera browser with a few clicks of the mouse.
  • Speed Dial: Your favorite sites are just one click away at all times.
  • Search Shortcuts: Faster search รข€“ type your queries directly into the address bar.
  • Trash Can: Instantly reopen recently closed tabs.
  • Speed Dial: Get your favorite Web page with just one click.
  • Mouse Gestures: With Opera you can navigate the Web with your mouse.
  • Opera Link: Synchronize data of your choice online, or among different computers and devices.
  • Quick Find: Opera remembers not only the titles and addresses, but also the actual content of the Web pages you visit.
  • Feed Preview: Preview a Feed by clicking on the feed icon, and you will see it in clean and efficient multiple-column layout.
  • Quick and customizable Web search: Get quick access to Google, eBay, Amazon and more with the search field in the upper right corner.
Download This File

Opera 10.60 - 12.52MB

Flock 2.6.0

Flock delivers the latest webmail, photos, videos and updates from your favorites sites, so you can stop running around. Take a load off. Enjoy.

Keep In Touch - Keep in tune with your friends and their activities. Flock makes sure you never miss a beat.

It's Cool To Share - Flock hooks it all together so you can drag and drop anything to your friends.

Make the News: Publish Yourself - Flock makes blogging and photo uploading to popular services super easy. Just log in to your favorite service and your instantly ready to publish anything from anywhere on the web with Flock.

Easy Access - Flock automatically connects you with over 20 of your favorite online services. Just log in. Flock does the rest.

Stay Informed and Be Heard - Flock has features you can't find in any other browser, whether you're consuming the news or making the news.

Download This FIle

Flock 2.6.0
10.95MB (Freeware)

Google Chrome 6.0.447.0 Beta

Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.
One box for everything
Type in the address bar and get suggestions for both search and web pages.
Thumbnails of your top sites
Access your favorite pages instantly with lightning speed from any new tab.
Incognito mode
Don't want pages you visit to show up in your web history? Choose incognito mode for private browsing.
Safe browsing
Google Chrome warns you if you're about to visit a suspected phishing, malware or otherwise unsafe website.
For information about alpha and developer builds, check out the Chrome dev channel here.

Download This File

Google Chrome 6.0.447.0 Beta

Firefox 3.6.8

The Web is all about innovation, and Firefox sets the pace with dozens of new features to deliver a faster, more secure and customizable Web browsing experience for all.
User Experience. The enhancements to Firefox provide the best possible browsing experience on the Web. The new Firefox smart location bar, affectionately known as the "Awesome Bar," learns as people use it, adapting to user preferences and offering better fitting matches over time.
Performance. Firefox is built on top of the powerful new Gecko platform, resulting in a safer, easier to use and more personal product.
Security. Firefox raises the bar for security. The new malware and phishing protection helps protect from viruses, worms, trojans and spyware to keep people safe on the Web.
Customization. Everyone uses the Web differently, and Firefox lets users customize their browser with more than 5,000 add-ons.

Download This File

Firefox 3.6.6
Firefox 3.6.8

Avira Premium Security Suite

The Avira Premium Security Suite protects you in a very comprehensive way against the dangers from the Internet. It offers you numerous advantages over the virus protection offered in the AntiVir Premium Edition. In addition to AntiVir, the Suite offers an integrated firewall that wards off attacks such as DoS attacks (Denial of Service attacks) or port scans and spam filtering to help you manage the complex attacks on your mail box.

The advantages:

- Complete security package with virus scanner, email protection, Personal Firewall, AntiSpyware, AntiPhishing, ...;
- Very easy to install;
- One click configuration with individual selection between standard and expert configuration;
- Extremely high performance and detection capacity by using the latest standards (AHeAD technology);
- Extremely small program and signature updates make sure that the protection against attackers is always up-to-date;
- Take control of your inbox with Avira's advanced antispam technology.
- AntiSpam, AntiPhishing and Rootkit Protection;
New: - Virus check of every file and archive access;
- Protection of active processes against undesired breakups;
- Perfect for game tasks through the "Game mode"

Premium Protection:
* AntiVir
* AntiAdware
* AntiSpyware
* AntiDialer
* AntiPhishing
* EmailScanner
* FireWall

Download This File

click here to download

Inside Windows Product Activation - Algorithm Explanation

The current public discussion of Windows Product Activation (WPA) is
characterized by uncertainty and speculation. In this paper we supply
the technical details of WPA - as implemented in Windows XP - that
Microsoft should have published long ago.

While we strongly believe that every software vendor has the right to
enforce the licensing terms governing the use of a piece of licensed
software by technical means, we also do believe that each individual
has the right to detailed knowledge about the full implications of the
employed means and possible limitations imposed by it on software

In this paper we answer what we think are currently the two most
important open questions related to Windows Product Activation.

* Exactly what information is transmitted during activation?

* How do hardware modifications affect an already activated
installation of Windows XP?

Our answers to these questions are based on Windows XP Release
Candidate 1 (build 2505). Later builds as well as the final version of
Windows XP might differ from build 2505, e.g. in the employed
cryptographic keys or the layout of some of the data

However, beyond such minor modifications we expect Microsoft to cling
to the general architecture of their activation mechanism. Thus, we
are convinced that the answers provided by this paper will still be
useful when the final version of Windows XP ships.

This paper supplies in-depth technical information about the inner
workings of WPA. Still, the discussion is a little vague at some
points in order not to facilitate the task of an attacker attempting
to circumvent the license enforcement supplied by the activation

XPDec, a command line utility suitable for verifying the presented
information, can be obtained from It
implements the algorithms presented in this paper. Reading its source
code, which is available from the same location, is highly

We have removed an important cryptographic key from the XPDec source
code. Recompiling the source code will thus fail to produce a working
executable. The XPDec executable on our website, however, contains
this key and is fully functional.

So, download the source code to learn about the inner workings of WPA,
but obtain the executable to experiment with your installation of
Windows XP.

We expect the reader to be familiar with the general procedure of
Windows Product Activation.


We focused our research on product activation via telephone. We did
so, because we expected this variant of activation to be the most
straight-forward to analyze.

The first step in activating Windows XP via telephone is supplying the
call-center agent with the Installation ID displayed by msoobe.exe,
the application that guides a user through the activation process. The
Installation ID is a number consisting of 50 decimal digits that are
divided into groups of six digits each, as in


In this authentic Installation ID we have substituted digits that we
prefer not to disclose by 'X' characters.

If msoobe.exe is invoked more than once, it provides a different
Installation ID each time.

In return, the call-center agent provides a Confirmation ID matching
the given Installation ID. Entering the Confirmation ID completes the
activation process.

Since the Installation ID is the only piece of information revealed
during activation, the above question concerning the information
transmitted during the activation process is equivalent to the

'How is the Installation ID generated?'

To find an answer to this question, we trace back each digit of the
Installation ID to its origins.

>>> Check digits

The rightmost digit in each of the groups is a check digit to guard
against simple errors such as the call center agent's mistyping of one
of the digits read to him or her. The value of the check digit is
calculated by adding the other five digits in the group, adding the
digits at even positions a second time, and dividing the sum by
seven. The remainder of the division is the value of the check
digit. In the above example the check digit for the first group (6) is
calculated as follows.

1 | 2 | 3 | 4 | 5 <- position
0 | 0 | 2 | 6 | 6 <- digits

0 + 0 + 2 + 6 + 6 = 14 (step 1: add all digits)
0 + 6 + 14 = 20 (step 2: add even digits again)

step 3: division
20 / 7 = 2, remainder is 20 - (2 * 7) = 6

=> check digit is 6

Adding the even digits twice is probably intended to guard against the
relatively frequent error of accidentally swapping two digits while
typing, as in 00626 vs. 00266, which yield different check digits.

>>> Decoding

Removing the check digits results in a 41-digit decimal number. A
decimal number of this length roughly corresponds to a 136-bit binary
number. In fact, the 41-digit number is just the decimal encoding of
such a 136-bit multi-precision integer, which is stored in little
endian byte order as a byte array. Hence, the above Installation ID
can also be represented as a sequence of 17 bytes as in

0xXX 0xXX 0xXX 0xXX 0xXX 0xXX 0xXX 0xXX
0x94 0xAA 0x46 0xD6 0x0F 0xBD 0x2C 0xC8

In this representation of the above Installation ID 'X' characters
again substitute the digits that we prefer not to disclose. The '0x'
prefix denotes hex notation throughout this paper.

>>> Decryption

When decoding arbitrary Installation IDs it can be noticed that the
most significant byte always seems to be 0x00 or 0x01, whereas the
other bytes look random. The reason for this is that the lower 16
bytes of the Installation ID are encrypted, whereas the most
significant byte is kept in plaintext.

The cryptographic algorithm employed to encrypt the Installation ID is
a proprietary four-round Feistel cipher. Since the block of input
bytes passed to a Feistel cipher is divided into two blocks of equal
size, this class of ciphers is typically applied to input blocks
consisting of an even number of bytes - in this case the lower 16 of
the 17 input bytes. The round function of the cipher is the SHA-1
message digest algorithm keyed with a four-byte sequence.

Let + denote the concatenation of two byte sequences, ^ the XOR
operation, L and R the left and right eight-byte input half for one
round, L' and R' the output halves of said round, and First-8() a
function that returns the first eight bytes of an SHA-1 message
digest. Then one round of decryption looks as follows.

L' = R ^ First-8(SHA-1(L + Key))
R' = L

The result of the decryption is 16 bytes of plaintext, which are -
together with the 17th unencrypted byte - from now on interpreted as
four double words in little endian byte order followed by a single
byte as in

name | size | offset
H1 | double word | 0
H2 | double word | 4
P1 | double word | 8
P2 | double word | 12
P3 | byte | 16

H1 and H2 specify the hardware configuration that the Installation ID
is linked to. P1 and P2 as well as the remaining byte P3 contain the
Product ID associated with the Installation ID.

>>> Product ID

The Product ID consists of five groups of decimal digits, as in


If you search your registry for a value named 'ProductID', you will
discover the ID that applies to your installation. The 'About' window
of Internet Explorer should also yield your Product ID.

>>>> Decoding

The mapping between the Product ID in decimal representation and its
binary encoding in the double words P1 and P2 and the byte P3 is
summarized in the following table.

digits | length | encoding
AAAAA | 17 bits | bit 0 to bit 16 of P1
BBB | 10 bits | bit 17 to bit 26 of P1
CCCCCCC | 28 bits | bit 27 to bit 31 of P1 (lower 5 bits)
| | bit 0 to bit 22 of P2 (upper 23 bits)
DDEEE | 17 bits | bit 23 to bit 31 of P2 (lower 9 bits)
| | bit 0 to bit 7 of P3 (upper 8 bits)

The meaning of each of the five groups of digits is documented in the
next table.

digits | meaning
AAAAA | apparently always 55034 (in Windows XP RC1)
BBB | most significant three digits of Raw Product Key
| (see below)
CCCCCCC | least significant six digits of Raw Product Key
| plus check digit (see below)
DD | index of the public key used to verify the
| Product Key (see below)
EEE | random value

As can be seen, the (Raw) Product Key plays an important role in
generating the Product ID.

>>>> Product Key

The Raw Product Key is buried inside the Product Key that is printed
on the sticker distributed with each Windows XP CD. It consists of
five alphanumeric strings separated by '-' characters, where each
string is composed of five characters, as in


Each character is one of the following 24 letters and digits:

B C D F G H J K M P Q R T V W X Y 2 3 4 6 7 8 9

Very similar to the decimal encoding of the Installation ID the 25
characters of the Product Key form a base-24 encoding of the binary
representation of the Product Key. Decoding the Product Key yields a
multi-precision integer of roughly 115 bits, which is stored - again
in little endian byte order - in an array of 15 bytes. Decoding the
above Product Key results in the following byte sequence.

0x6F 0xFA 0x95 0x45 0xFC 0x75 0xB5 0x52
0xBB 0xEF 0xB1 0x17 0xDA 0xCD 0x00

Of these 15 bytes the least significant four bytes contain the Raw
Product Key in little endian byte order. The least significant bit is
removed by shifting this 32-bit value (0x4595FA6F - remember the
little endian byte order) to the left by one bit position, resulting
in a Raw Product Key of 0x22CAFD37, or


in decimal notation.

The eleven remaining bytes form a digital signature, allowing
verification of the authenticity of the Product Key by means of a
hard-coded public key.

>>>> Product Key -> Product ID

The three most significant digits, i.e. 583, of the Raw Product Key's
nine-digit decimal representation directly map to the BBB component of
the Product ID described above.

To obtain the CCCCCCC component, a check digit is appended to the
remaining six digits 728439. The check digit is chosen such that the
sum of all digits - including the check digit - is divisible by
seven. In the given case, the sum of the six digits is

7 + 2 + 8 + 4 + 3 + 9 = 33

which results in a check digit of 2, since

7 + 2 + 8 + 4 + 3 + 9 + 2 = 33 + 2 = 35

which is divisible by seven. The CCCCCCC component of the Product ID
is therefore 7284392.

For verifying a Product Key, more than one public key is available. If
verification with the first public key fails, the second is tried,
etc. The DD component of the Product ID specifies which of the public
keys in this sequence was successfully used to verify the Product Key.

This mechanism might be intended to support several different parties
generating valid Product Keys with different individual private keys.

However, the different private keys might also represent different
versions of a product. A Product Key for the 'professional' release
could then be signed with a different key than a Product Key for the
'server' release. The DD component would then represent the product

Finally, a valid Product ID derived from our example Product Key might


which indicates that the first public key (DD = index = 0) matched and
123 was chosen as the random number EEE.

The randomly selected EEE component is the reason for msoobe.exe
presenting a different Installation ID at each invocation. Because of
the applied encryption this small change results in a completely
different Installation ID.

So, the Product ID transmitted during activation will most probably
differ in the last three digits from your Product ID as displayed by
Internet Explorer or as stored in the registry.

>>> Hardware Information

As discussed above, the hardware configuration linked to the
Installation ID is represented by the two double words H1 and H2.

>>>> Bit-fields

For this purpose, the double words are divided into twelve
bit-fields. The relationship between the computer hardware and the
bit-fields is given in the following table.

double word | offset | length | bit-field value based on
H1 | 0 | 10 | volume serial number string
| | | of system volume
H1 | 10 | 10 | network adapter MAC address
| | | string
H1 | 20 | 7 | CD-ROM drive hardware
| | | identification string
H1 | 27 | 5 | graphics adapter hardware
| | | identification string
H2 | 0 | 3 | unused, set to 001
H2 | 3 | 6 | CPU serial number string
H2 | 9 | 7 | harddrive hardware
| | | identification string
H2 | 16 | 5 | SCSI host adapter hardware
| | | identification string
H2 | 21 | 4 | IDE controller hardware
| | | identification string
H2 | 25 | 3 | processor model string
H2 | 28 | 3 | RAM size
H2 | 31 | 1 | 1 = dockable
| | | 0 = not dockable

Bit 31 of H2 specifies, whether the bit-fields represent a notebook
computer that supports a docking station. If docking is possible, the
activation mechanism will be more tolerant with respect to future
hardware modifications. Here, the idea is that plugging a notebook
into its docking station possibly results in changes to its hardware
configuration, e.g. a SCSI host adapter built into the docking station
may become available.

Bits 2 through 0 of H2 are unused and always set to 001.

If the hardware component corresponding to one of the remaining ten
bit-fields is present, the respective bit-field contains a non-zero
value describing the component. A value of zero marks the hardware
component as not present.

All hardware components are identified by a hardware identification
string obtained from the registry. Hashing this string provides the
value for the corresponding bit-field.

>>>> Hashing

The hash result is obtained by feeding the hardware identification
string into the MD5 message digest algorithm and picking the number of
bits required for a bit-field from predetermined locations in the
resulting message digest. Different predetermined locations are used
for different bit-fields. In addition, a hash result of zero is
avoided by calculating

Hash = (Hash % BitFieldMax) + 1

where BitFieldMax is the maximal value that may be stored in the
bit-field in question, e.g. 1023 for a 10-bit bit-field, and 'x % y'
denotes the remainder of the division of x by y. This results in
values between 1 and BitFieldMax. The obtained value is then stored in
the respective bit-field.

>>>> RAM bit-field

The bit-field related to the amount of RAM available to the operating
system is calculated differently. The seven valid values specify the
approximate amount of available RAM as documented in the following

value | amount of RAM available
0 | (bit-field unused)
1 | below 32 MB
2 | between 32 MB and 63 MB
3 | between 64 MB and 127 MB
4 | between 128 MB and 255 MB
5 | between 256 MB and 511 MB
6 | between 512 MB and 1023 MB
7 | above 1023 MB

It is important to note that the amount of RAM is retrieved by calling
the GlobalMemoryStatus() function, which reports a few hundred
kilobytes less than the amount of RAM physically installed. So, 128 MB
of RAM would typically be classified as "between 64 MB and 127 MB".

>>>> Real-world example

Let us have a look at a real-world example. On one of our test systems
the hardware information consists of the following eight bytes.

0xC5 0x95 0x12 0xAC 0x01 0x6E 0x2C 0x32

Converting the bytes into H1 and H2, we obtain

H1 = 0xAC1295C5 and H2 = 0x322C6E01

Splitting H1 and H2 yields the next table in which we give the value
of each of the bit-fields and the information from which each value is

dw & | |
offset | value | derived from
H1 0 | 0x1C5 | '1234-ABCD'
H1 10 | 0x0A5 | '00C0DF089E44'
H1 20 | 0x37 | 'SCSI\CDROMPLEXTOR_CD-ROM_PX-32TS__1.01'
H1 27 | 0x15 | 'PCI\VEN_102B&DEV_0519&SUBSYS_00000000&REV_01'
H2 0 | 0x1 | (unused, always 0x1)
H2 3 | 0x00 | (CPU serial number not present)
H2 9 | 0x37 | 'SCSI\DISKIBM_____DCAS-34330______S65A'
H2 16 | 0x0C | 'PCI\VEN_9004&DEV_7178&SUBSYS_00000000&REV_03'
H2 21 | 0x1 | 'PCI\VEN_8086&DEV_7111&SUBSYS_00000000&REV_01'
H2 25 | 0x1 | 'GenuineIntel Family 6 Model 3'
H2 28 | 0x3 | (system has 128 MB of RAM)
H2 31 | 0x0 | (system is not dockable)

>>> Using XPDec

XPDec is a utility to be run from the command prompt. It may be
invoked with one of four command line options to carry out one of four

>>>> XPDec -i

This option enables you to access the information hidden in an
Installation ID. It decodes the Installation ID, decrypts it, and
displays the values of the hardware bit-fields as well as the Product
ID of your product. Keep in mind that the last three digits of the
Product ID contained in the Installation ID are randomly selected and
differ from the Product ID displayed by Internet Explorer.

The only argument needed for the '-i' option is the Installation ID,
as in

XPDec -i 002666-077894-484890-114573-XXXXXX-XXXXXX-XXXXXX-XXXXXX-XX

>>>> XPDec -p

To help you trace the origin of your Product ID, this option decodes a
Product Key and displays the Raw Product Key as it would be used in a
Product ID.

The only argument needed for the '-p' option is the Product Key, as in


Note that this option does not verify the digital signature of the
Product Key.

>>>> XPDec -v

This option calculates the hash of a given volume serial number. It
was implemented to illustrate our description of string hashing. First
use '-i' to display the hardware bit-fields. Then use this option to
verify our claims concerning the volume serial number hash.

The only argument needed for the '-v' option is the volume serial
number of your system volume, as in

XPDec -v 1234-ABCD

(The volume serial number is part of the 'dir' command's output.)

>>>> XPDec -m

This option calculates the network adapter bit-field value
corresponding to the given MAC address. Similar to '-v' this option
was implemented as a proof of concept.

The only argument needed for the '-m' option is the MAC address of
your network adapter, as in

XPDec -m 00-C0-DF-08-9E-44

(Use the 'route print' command to obtain the MAC address of your
network adapter.)


When looking at the effects of hardware modifications on an already
activated installation of Windows XP, the file 'wpa.dbl' in the
'system32' directory plays a central role. It is a simple
RC4-encrypted database that stores, among other things like expiration
information and the Confirmation ID of an activated installation,

a) the bit-field values representing the current hardware


B) the bit-field values representing the hardware configuration
at the time of product activation.

While a) is automatically updated each time the hardware configuration
is modified in order to reflect the changes, B) remains fixed. Hence,
B) can be thought of as a snapshot of the hardware configuration at
the time of product activation.

This snapshot does not exist in the database before product activation
and if we compare the size of 'wpa.dbl' before and after activation,
we will notice an increased file size. This is because the snapshot is
added to the database.

When judging whether re-activation is necessary, the bit-field values
of a) are compared to the bit-field values of B), i.e. the current
hardware configuration is compared to the hardware configuration at
the time of activation.

>>> Non-dockable computer

Typically all bit-fields with the exception of the unused field and
the 'dockable' field are compared. If more than three of these ten
bit-fields have changed in a) since product activation, re-activation
is required.

This means, for example, that in our above real-world example, we
could replace the harddrive and the CD-ROM drive and substantially
upgrade our RAM without having to re-activate our Windows XP

However, if we completely re-installed Windows XP, the information in
B) would be lost and we would have to re-activate our installation,
even if we had not changed our hardware.

>>> Dockable computer

If bit 31 of H2 indicates that our computer supports a docking
station, however, only seven of the ten bit-fields mentioned above are
compared. The bit-fields corresponding to the SCSI host adapter, the
IDE controller, and the graphics board are omitted. But again, of
these remaining seven bit-fields, only up to three may change without
requiring re-activation.


In this paper we have given a technical overview of Windows Product
Activation as implemented in Windows XP. We have shown what
information the data transmitted during product activation is derived
from and how hardware upgrades affect an already activated

Looking at the technical details of WPA, we do not think that it is as
problematic as many people have expected. We think so, because WPA is
tolerant with respect to hardware modifications. In addition, it is
likely that more than one hardware component map to a certain value
for a given bit-field. From the above real-world example we know that
the PX-32TS maps to the value 0x37 = 55. But there are probably many
other CD-ROM drives that map to the same value. Hence, it is
impossible to tell from the bit-field value whether it is a PX-32TS
that we are using or one of the other drives that map to the same

In contrast to many critics of Windows Product Activation, we think
that WPA does not prevent typical hardware modifications and,
moreover, respects the user's right to privacy.


Fully Licensed GmbH is a start-up company focusing on novel approaches
to online software licensing and distribution. Have a look at their
website at

for more information.

Their research branch every now and then analyzes licensing solutions
implemented by other companies.


Copyright © 2001 Fully Licensed GmbH (
All rights reserved.

You are free to do whatever you want with this paper. However, you
have to supply the URL of its online version

with any work derived from this paper to give credit to its authors.

PDF Password Unlocker v4.0.1.1

PDF Password Unlocker v4.0.1.1 | 3.67 Mb
Instant PDF Password recovery solution
If you cannot open an encrypted PDF document because of losing the password, then PDF Password Unlocker can help you. This software is a handy PDF password recovery software, which can be used to recover PDF password of encrypted PDF documents easily and instantly. Brute-force attack, brute force with mask and dictionary attack are available for you to retrieve lost passwords within few clicks.

Download This File

click here to download

Office Password Unlocker v4.0.1.6

Office Password Unlocker v4.0.1.6 | 2.9 Mb
A professional and secure Office password recovery software .
Office Password Unlocker is one of popular Office password recovery tool in the market, which can recover Office password from Office 97-2007 including Microsoft Access, Microsoft Word, Excel and PowerPoint files. In addition, Brute-force attack, brute force with mask and dictionary attack are provided for you to unlock the files easily.

Download This File

click here to download

Microsoft: Windows Phone 7 in October

In a video that's been uploaded to YouTube, Microsoft is seen showing off their advertising platform with a range of products, Windows Phone 7 included. In the video, they let slip a more specific release date then they've previously mentioned, according to WMPoweruser.
Before now, Microsoft has only said in public that Windows Phone 7 is slated for a "Holiday Season" release, and have refused to be more specific than this. Marketing VP Mitch Mathews says in the video: "I'm gonna ask rock star Kostas... to come on. And Kostas has brought with him Windows Phone 7, which we launch this October."
WMPoweruser says that the video demo mainly shows off the advertising features the platform has, which include: "Applications as ads, being able to pin applications as live tiles to the start screen and get updates and continuing engagement with the user and toasts, which are notifications developers can send to the end user." The video also has a piece about something called "0-click sharing", a feature that allows a user to upload photos straight to their SkyDrive account.
The October release date is sooner than some may have expected, though it is certainly great news that Windows Phone 7 equipped devices will be released soon. Windows Phone 7 has made the news a lot recently, with the newest build being shown off at TechEd with huge speed improvements, Microsoft disallowing porn apps on the platform, and previews of playable Xbox Live Arcade games on the phones appearing.

Color Code Table

Here, you can automatically determine the color code by simply clicking on the color you want, and see his code under the color box.

Color code on select :


My Friends

Send Messange

Copyright 2009-2010 All Right Reserved

Back to TOP