3 Uncommon Internet Errors | Error 103, 104, 105

Error 103?104? 105? or 404?
Are you suffering from any of these errors?

Error 103: This error occurs when your computer or router is not able to find the internet connection. This error usually results by fault in the settings of the modem/router, and is the most popular error on DLink Modems and Routers.


  1. Try “https” instead of “http” in the URLs.
  2. Make sure your router or modem is configured correctly and your firewall is not blocking your internet connections.
  3. Reset your modem or router, and reconfigure it properly.

Error 104: Also appears as Error 104(ERR_CONNECTION_FAILED). This error occurs when your computer is not able to establish a connection to the server.


  1. Check if your internet connection/gateway connection is connected.
  2. Use a proxy server in your router.
  3. Take help of your ISP.

Error 105: This error occurs when the TCP connection to the server times out. This error occurs when there’s a big load on your network, your speed is too slow or your server is down.


  1. Check if your LAN is overloaded.
  2. Restart your router or modem.
  3. Reconfigure your router modem.

PollDaddy Polls Unlimited Voting (Exploit)

I recently found a way to do unlimited votes on PollDaddy Polls and other such Poll Systems

The Poll Services add a cookie and some additional data to your computer which prevents you from doing more than the prescribed votes (usually 1). But if you clear these cookies along with some data, then you can do more votes.

How to do unlimited voting in Firefox

We first need to setup Firefox according to our circumstances. Here are the things to be done:

  • Go to Tools>Options & click on the Privacy tab.
  • Uncheck the last option, “Ask me before clearing my private data“.

    Selecting Options
    Selecting Options
  • Then click on the “Settings” in the? “Private Data” column.

    Selecting the Settings
    Selecting the Settings
  • Click “Ok“, then “Apply” & click “Ok“.
  • Our Firefox is ready to help us do voting at a fast speed.

    Now just keep 2 shortcuts in mind:

  • Ctrl + Shift + Del (Clears Private Data)
  • Ctrl + R (Refreshes a page)
  • Now here are the steps to vote unlimited:

  • Go to the poll’s page.
  • Vote once.
  • Clear Private Data using the shortcut.
  • Refresh the page using the shortcut, then vote again.
  • For voting continuously, keep on repeating the steps 3 & 4.
  • How to do unlimited voting in Google Chrome

    Here are the steps:

  • Go to the poll’s page, do the vote.
  • Click on the tools tab (top-right corner) & choose “Clear Browsing Data…“.
  • Tick all the options & in the “period” select “Everything“. Click on “Clear Browsing Data“.
  • Refresh the page & vote again.
  • Repeat these steps to vote again.
  • Thanks to a special friend without whom, this post would not have been possible:)

Top 10 Trojans of All Time

1. NetBus

It was created in Delphi by? Carl-Fredrik Neikter, in 1998. It is a software for remotely controlling a system which runs Microsoft Windows. Not only remote control, it can also be used as a backdoor. Like any other trojan, NetBus also has 2 components: the client and server. The server infects the host computer and the client is used to control it.

2. Back Orifice

Back Orifice’s main purpose is to remotely control a Microsoft Windows Powered system. It has the potential of being used as a RAT (Remote Administration Trojan). It is widely used by “Script Kiddies” due to its easy installation and GUI features. The name “Back Orifice” derives from “Microsoft BackOffice Server“. According to the group, its purpose was to demonstrate the lack of security in Microsoft’s operating system Windows 98. BO was created in Delphi.

3. Sub7

Sub7 or SubSeven is a popular backdoor program and RAT. It is mainly used for causing mischief, but it can also be used to steal credit card information and other such confidential data. Its name “Subseven” is derived by spelling “Netbus” backwards as “SubTen” and replacing “ten” with “seven“. Sub7 is less stable than Netbus, but has more features than it.


It is a Windows-based backdoor trojan program (RAT). It is capable of infecting all Windows OSs. Like most of the trojans, it is also written in Delphi, by Tataye, in 2002. Beast has many unique features, it was one of the first trojans to use the “Reverse Connection” and it used “Injection Method” for its DLL. Its unique features made it popular.

5. ProRat

It is a Turkish-made, Windows-based RAT, made by the PRO Group. It comes in two versions: free and paid version. The free version cannot perform operations on computers present on the WAN, but only on LAN. Its server is known for being almost impossible to remove without up-to-date antivirus. It has many features & it can perform many malicious operations on the victim’s computer. It also has a server creator which enables users to create servers which are undetectable and provides other advanced features.

6. Zlob Trojan

Also known as Trojan.Zlob is a trojan horse which masquerades as a needed video codec in the form of ActiveX. After a victim installs it, it displays popup-ads with a similiar appearance to that of the Microsoft Windows warning pop-ups, informing the user that their computer is infected with a spyware, clicking on these pop-ups starts the download of fake anti-spyware programs.

7. SpySheriff

As the name suggests, it claims to be an anti-spyware program, but it is actually a malware. It gives the infected computers, fake spyware and threat alerts and prompts the user of the infected PC to buy the program. SpySheriff is sometimes not even detected by actual spywares. It is very difficult to remove SpySheriff from the computer which it has infected. It causes many problems, including the Blue Screen of Death!


Also known as Vundo Trojan, Virtumonde, Virtumondo or MS Juan, is a trojan horse that causes pop-ups & advertisements for Rogue Security softwares and sporadically other misbehavior including performance degradation and denial of service with some websites including Google and Facebook. Vundu causes your browser to show pop-ups from time-to-time.


Turkojan is a RAT and spying tool for Microsoft Windows. It is not detectable by many AVs and only up-to-date antivirus programs can detect it. It is very much similar to ProRat in features, but has some plus and minus.

10. Trojan-Downloader.Win32.Kido.a

It is a Windows DLL file, it copies its executable file with random names to “Program Files“, “Temp“, “Special Folder” & “System“. It also registers its executable file to the registry to ensure that it is launched automatically at system start-up. It also modifies registry keys to make it impossible to boot into “Safe Mode“.
Its removal is not so easy if you don’t have an up-to-date Antivirus Software. The removal procedure includes some binary editing in registry.

Multiple GTalk Simultaneously

Have Multiple Google Accounts?
And want to login with both of them on Gtalk on single PC?

This is what I wanted to do as I’ve got two Google IDs, so I found out the way to run multiple GTalks simultaneously…

How to do it:

  1. Create a shortcut to GTalk on your desktop (if you dont have currently).
  2. Go to the properties of the shortcut. There in the target, you’ll see something like: “C:\Program Files\Google\Google Talk\googletalk.exe”
  3. Add /mutex to that target line. Then the line would be : “C:\Program Files\Google\Google Talk\googletalk.exe” /nomutex
  4. “Apply” it and then click “Ok”.
  5. Check out if it works, Enjoy Multi-GTalks!

Don’t forget to leave comments here if this works…[:)]

How this Works:
The mutex is short for mutual exclusion object. A mutex is a program object that allows multiple program threads to share the same resource, but not simultaneously.

So, in the hack above, we used nomutex (no-mutex) so to use the same resources simultaneously…

Download MP4 Videos directly from Youtube

Youtube is the best entertainment portal on the net. It has a vast collection of videos and more videos than any other video site on the net. Everyone who has ever visited Youtube would have wondered, “Can I download this videos?” and must have tried up many ways an would have got disappointed or would have been succeeded in getting .flv videos.

I was able to download videos in flv format but it was a disaster and time-waste for me to convert them to mp4 and moreover I was not satisfied with the video quality of the converts.

Now I’ve found a way with which I can download .mp4 videos directly from Youtube. I’ll be telling of it to you all in this post…


  1. Internet Download Manager (Click here to download) or Orbit Downloader (Click here to download).
  2. Internet Connection:)


  1. Install Internet Download Manager (IDM) or any other relevant.
  2. Go to Youtube.com and watch the video.
  3. Add &fmt=18 to the URL of the video (without any gap or space). Example:http://www.youtube.com/watch?v=AyTJ114IOSc
  4. After adding it would look like: http://www.youtube.com/watch?v=AyTJ114IOSc&fmt=18
  5. Then download the video with IDM or whatever software you had installed. You will see that it comes in MP4 format.

The secret of this is that recently Youtube was doing some tests with its videos. It started providing the videos in HQ by adding links saying “Watch this video in High Quality”. What this link does is that it adds &fmt=6 to the URL of the video.

Other codes which can be used are:

  • &fmt=6 (normal HQ)
  • &fmt=12 (better than before)
  • &fmt=16 (clode to MP4)
  • &fmt=18(outputs the MP4 file of the video instead of FLV, thus giving MP4 quality)
  • &fmt=22(highest quality, somewhat more HQ than MP4 and more advanced)

SQL Injection


Wikipedia: “SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another.”Read more…

Microsoft Corp: “SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and execution. Any procedure that constructs SQL statements should be reviewed for injection vulnerabilities because SQL Server will execute all syntactically valid queries that it receives. Even parameterized data can be manipulated by a skilled and determined attacker.”Read more…
HacKeR’s VieW
I wont be explaining much over here as this is just introduction to SQL Strings not a Tutorial [:)].
So by reading the above excerpts you might have got the idea of what a SQL Injection is. SQL strings are the malicious codes which are used for hacking into sites with such vulnerability. What a hacker does is:

  1. Searches sites which have SQL vulnearabilities.
  2. Once he’s done with it then comes the SQL Strings. He gets a list of strings or makes them on his own and then tries the strigs one-by-one. It is time consuming so a programmer can make a app for doing this job, just like cracking softwares. An example for a string would be ‘ or 1=1, anypassword
  3. If he’s successful he would get into the Administration of the site. From there he can edit the full site and its contents.

Best Online Shopping Portal – ShopWiki.co.uk

ShopWiki is a revolution for online shoppers.It will give shoppers everything, and it has got 30,000 stores instead of the 1,000 stores on other shopping sites.Its really amazing, you can get evrything you have got to get!

It means that everything for sale on the net can be found on ShopWiki. From Sport Utilities to Household Products and whatever you’d ever need!

The biggest point is that online shopping sites show you stores that have paid for placement, but ShopWiki provides you all, for free.


Try out some different styles and fonts with the in-built Character Map in Windows!
Windows has got an in-built Character Map which you can use to view all the characters of a Font Style that you choose.
This is helpful for some freaky display names in Social Networking sites like Myspace, Orkut, etc.
The Character Map is located in Start\All Programs\Accessories\System Tools\Character Map

Or in Run: ‘%SystemRoot%\system32\charmap.exe’, without the quotes.