Skip to main content

Chat in 007 style

Wanted to chat in 007 style ;)
1. All you need is your friend's IP Address
and your Command Prompt.
2. Open Notepad and write this code as it
is.....!
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
3. Now save this as "Messenger.Bat".
4. now open the file
5. type the IP Address of the computer you
want to contact and press enter
6. Now all you need to do is type your
message and press Enter.
Start Chatting.......!

Comments

Popular posts from this blog

Physical Teleportation Theoretical method to do It!

Teleportation is the ability of moving matter from one point in time and space to another point in time and space instantaneously. There are different types of teleportation available at this time both visual and physical teleportation are possible and we use visual teleportation as our starting point. Types Visual body teleportation Astral body teleportation The different types of visual teleportation are. visual body or astral body teleportation , or visual object teleportation but before we can master teleportation we must first learn the art of Telekinesis/Psychokinesis and Clairsentience and the higher state of consciousness the seventh sense. Other abilities useful in teleportation are Tele-Visualization and ESP (Extrasensory Perception). The ability of teleportation is used in Time travel, Interstellar travel, and Dimensional travel. Teleportation is the near instantaneous transport of the Psychic from one location to another and there is no other fo...

Man in the middle attack

Man-in-the-Middle Attack ————————————— Man-In-The-Middle attack is the type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information. It involves eavesdropping on a connection, intruding into a connection, intercepting messages, and selectively modifying data. DEFINITION : —————— The term "Man-in-the-middle attack" (MITM attack) refers to the type of attack where the attacker intrudes into the communication between the endpoints on a network to inject false information and intercept the data transferred between them. MITM attack is also known as: ————————————— Bucket-brigade attack —————————— Fire brigade attack —————————...

Professional Tips ON How To Be A Great Guitar Player

Professional Tips ON How To Be  A Great Guitar Player Everyone has their favourite and everyone loves their favourite for a different reason. When I was 13 I didn't play guitar, but my favourite guitar player was Slash  from  GN'R . Why? because he looked like the best guitar player in the world, he wore cool clothes, played his guitar in a cool way, wore a cool hat and was in a cool band. When I learned to play guitar I found and affection for playing blues music and then  Stevie Ray Vaughn became my favourite guitarist. I liked him the best because he could play fast, sound soulful and wore a cool hat. Everyone likes their heroes for different reasons, so what makes a great player great? I mean  Eric Clapton  is considered to be a great and so is Randy Rhoads , but they have distincly different styles, so what makes us consider them both to be greats? I have attempted to compile a list of criteria that guitarists fit to be a great. Some fit into mor...