Things You Should Know Before Start Learning Hacking





Hello Friends, from a past everyone is learning hacking hacking and hacking. But they just start doing it, without knowing the basic facts. Here i will share some basic things with you , which you should know before starting your tour of learning hacking.


-:TRUST:-

First there are many website available that will ask you for private info/money in return of Hacking tool or who claim to Hack Email Id’s in return of money. All such things are Scam . Nothing Works.And after purchasing the tool you can not report even because in deep you are too purchasing sum thing illegal.


-:EMAIL HACKING SOFTWARE:- 

One thing you should know that there is no direct software on the planet that cna help you to hack Facebook , Google , Yahoo, NASA or any other big website. All the software that claim to do so are scam.Instead of wasting your money on such rubbish things , do use basci keyloggers and social engineering techniques. Once you become perfect you can hack almost any email account.


-:FREE HACKING TOOLS:-

SOme people download lots of Keyloggers or Trojans which you find as freeware on internet mostly on hacking forums and underground blogs. Hackers are not fools. They compile Keyloggers and Trojans almost with any such software and when you install them , you are already hacked before even trying to hack others.SO don't be fool be smart.




-:CODING:-

May be there are hundreds of free tool available which are virus free and can be used for hacking but you are never going to be a good hacker without the knowledge of programming and scripting languages. When you are going to use only ready made software’s and would depend on them for hacking anything then your functionality would be limited up to the functionality of the software. Here i am not saying to learn all languages but try your hands on languages like perl and python they are far much better than C and C++ , mainly concentrated on LOGIC.


-:NOTE:-

So Never Ever Under estimates the term Hacker. A Hacker Is Not a person who just hacks email id’s or deface websites but a True Hacker is a Computer Genius who the knowledge of computers more than anyone.and he contribute his hacking skilss to help the society. 




Next time think before asking the question – "How much will I get in this field?” because, if you have so many skills, you really don’t have to run after money. Success comes and money follows itself.

Adding Facebook BACKDOOR in Hacked Account...!!!







Here is a way how some hackers retain the hacked facebook accounts even after the target changes the password or the hacker himself returns it to the target.
Many of the facebook users are unaware that there is a alternative way to log in the facebook account by linking a alternate email account to it. Not the default email id which you use regularly to log in by typing the email id and password but a different email id. So when you are logged in this alternate email id and open the facebook website it directly logs in your facebook account without even asking the password. If you did not get the concept here is a example. Imagine that your regular email id is "regular@gmail.com" and you add a alternate email id "alternate@gmail.com" in account setting. Now when you are logged in "alternate@gmail.com"
and open facebook website it redirects you and directly opens your facebook account. So here the is procedure how you can add this alternate email id as a backdoor.


For Any help Leave a comment..

Thanks..!!

Free Antivirus For 6 Months From Facebook | Facebook Antivirus 2012

Free Antivirus For 6 Months From Facebook By ALLTRICKSWORLD.IN

Facebook is concerned with the security of its users and wants to make their experience on Facebook more secure. To achieve this Facebook is providing license for 6 months for 5 major antivirus applications. A user can select any one antivirus from McAfee Antivirus for 6 months, NortonAntivirus for 6 months, Trend Micro Internet Security for 6 months, Microsoft Security Essential (It’s free), and SophosAntivirus for Mac.



download free antivirus from Facebook screenshot 650x523 Free Antivirus For 6 Months From Facebook


Just go to Facebook‘s Antivirus Marketplace Page and choose your antivirus and get it free for 6 months. After the 6 month’s period create a new Facebook ID

Facebook Said - Please Hack us & Get $500 Reward...!!!









Earlier through Hackers Cup, Facebook has already shown honour to hackers now social networking giant Facebook is directly encouraging hackers to try hacking its security systems to find weaknesses. Those who succeed will receive a reward of US$500 or more and have their name added to a list of helpful hackers.



The hackers have taken part in Facebook's White Hat program. Anyone who finds a way of breaching the site's networks, and owns up, can earn rewards worth thousands of dollars. As well as money, Facebook promises not to land them in trouble with the police & legal harassment if they have complied with the program's golden rules. Already one British hacker has earned more than $2400 from Facebook, and the most prolific White Hat contributors are now given their own Facebook "bug bounty" credit cards. Facebook's chief security officer,
Joe Sullivan, says he would much rather the hackers worked with the company, rather than against it. In time, he hopes the hackers will be able to find legitimate ways of expressing themselves within schools and universities. "There is a real lack of practical academic programs for cyber-security not only in the US but also internationally," he said. "Cyber-security is a skill best learned by doing, and unfortunately many of the current academic programs place little emphasis on real-world practical experience such as that gained in competition or via bug-bounty programs.



According to Facebook - "If you're a security researcher, please review our responsible disclosure policy before reporting any vulnerabilities. If you give us a reasonable time to respond to your report before making any information public and make a good faith effort to avoid privacy violations, destruction of data and interruption or degradation of our service during your research, we will not bring any lawsuit against you or ask law enforcement to investigate you."



Eligibility:-

To qualify for a bounty, you must:
Adhere to our Responsible Disclosure Policy:
Be the first person to responsibly disclose the bug
Report a bug that could compromise the integrity of Facebook user data, or circumvent the privacy protections of Facebook user data, such as:
Cross-Site Scripting (XSS)
Cross-Site Request Forgery (CSRF/XSRF)
Remote Code Injection
Broken Authentication (including Facebook OAuth bugs)
Circumvention of our Platform permission model
A bug that allows the viewing of private user data
Reside in a country not under any current U.S. Sanctions (e.g., North Korea, Libya, Cuba, etc.)


Rewards:-

A typical bounty is $500 USD
We may increase the reward for specific bugs
Only 1 bounty per security bug will be awarded
Exclusions:-
The following bugs aren't eligible for a bounty (and we don't recommend testing for these):
Security bugs in third-party applications (e.g., http://apps.facebook.com/[app_name])
Security bugs in third-party websites that integrate with Facebook
Security bugs in Facebook's corporate infrastructure
Denial of Service Vulnerabilities
Spam or Social Engineering technique


For more detailed information click Here

Reset Administrator Password in Windows 8


 


In my previous post How to enable hidden administrator account, i have suggested you the way to enable the hidden admin account. Now in this article you will get to know, what to do if you forget your password and can’t log in to the system anymore.

So to log in to your account again, you have to enable hidden admin account using the reference from our previous post. It will be much easier to reset your password if you are using a Microsoft Administrator Account to log in. The process to get your password resetrequires you to download Offline NT Password & Registry Editor which is available as an ISO image that you can burn to CD or DVD, and a file that you can install on an USB Flash Drive.

Now boot using this CD created and after booting you will see a DOS like window. Here you are required to enter some commands that will help you to restore the user account. The steps you need to follow are:

• First screen, press enter to continue

• Select the hard drive on which your Windows installation is installed. This may take some time depending on the number of partitions on the PC as it is using the “Linux-way” of listing the hard drives.

• You then need to enter the path to the Registry. I’d recommend to tap on enter to try the default path first which usually is detected correctly by the program.

• Press q

• Select the Password Reset option (1)

• Enter Administrator as the user account that you want to modify.

• Select the unlock and enable user account option (4)

• Use ! and q to end the editing and save the values


Now restart your PC using the operating system’s drive again. After booting you will find that the administrator account is listed on the sign in page. Select it and access your computer. Now you can change other account passwords or run administrative tasks to restore access to the PC.

Download Offline NT Password & Registry Editor

How to Enable Hidden Administrator Account in Windows 8




Windows 8 is the recent version of windows OS. If you have started using this OS then you must have observed that there is no Administrator account associated with the OS. Actually administrator account has been disabled by default. Though it does not matter but if it is enabled, then it can serve many purposes.

Since the admin account is hidden by default, it is not recommended to enable it again and use the administrator account on a day to day basis. But as I said that it can be used for a variety of purposes. One of the main purposes that you can use it for is that it act as fallback account in case you can’t log in to a regular user account, or for tasks that require administrative privileges.





When you will look at the list of the users account in the control panel, you will find thatadministrator account is not listed there. Even the guest account is also hidden. Thus to enable the administrator account in Windows 8, here is a small tip that will help you a lot.

Here are the steps to enable administrator account in Windows 8:

• Press the Windows key to get into the Metro interface if you are not already there.

• Enter cmd and right-click on the Command Prompt result that should appear.

• This opens a list of options at the bottom. Select Run as administrator there.

• Accept the UAC prompt

• Now enter the following command in the command prompt: net user administrator /active:yes
  



This is how you can enable your hidden admin account. In the similar manner, anyhow, if you want to disable it again you just have to run the following command: net user administrator /active:no. Now if you want to check whether the account is enabled or not, just go to the control panel and check out whether it is present in the list or not. However the account has no password to it and you should consider setting one to improve account security.

How to Unblock Websites at School, Work, Home or Anywhere

Internet Censorship has grown drastically over the past few years with countries like China, Pakistan, Saudi Arabia, Iran taking the lead over other governments in extending internet censorship to almost all sources of free unbiased information. Some schools and offices also prevent users from accessing certain websites which they believe are of no use in the respective areas. Governments sometimes enforce censorship on all forms of print and digital media like newspapers and television. China is known to have even forced Google to filter its search results. In such times, sometime you may need to access a website that is blocked. This article explains how.

Which websites are most commonly Blocked?



The most commonly blocked websites include websites about pop culture, health, medicine, women, religion and politics. Social websites that are often blocked include Blogger (Blogspot) blogs, Google News,Facebook, Orkut, MySpace, Bebo, Flickr, Hulu, LinkedIn, Yahoo! Messenger, Typepad, eBay, WikiLeaks, Digg, Reddit, Technorati, StumbleUpon, Delicious, YouTube, DMOZ etc.


Access Blocked Websites at School, Work or AnywhereThere are many genuine reasons for which you might visit blocked websites at your school or office. Given below are the many ways you can use to regain access to the blocked website you wish to visit.

1. Cache: Many search engines maintain a cache of web pages indexed by them. You can search for a website on Google , Yahoo! or Bing and click on the cached link that is given next to the result. To load the web pages more quickly, you can visit the text-only version.

2. Using Google Mobile Search: Google Mobile Search acts as a proxy which you can use easily. It removes all the CSS styling and JavaScript and presents a stripped down version of the web page to the user from it's own server. Due to this, the blocking software feels that you are visiting Google, whereas in reality, you are viewing the blocked website. It also breaks larger pages into many smaller ones. Go to Google Mobile Search.

3. To access a blocked website, you can enter the IP address instead of the URL in your browser's address bar. This can bypass most basic forms of website blocks. Although if the blocking software maps the IP address to the website domain, the website will still remain blocked. You can find the IP address of the website by pinging the website domain name in command prompt and noting its IP address. Execute ping www.facebook.com in command prompt to ping www.facebook.com.
in result u will get some combination of numbers separated by dots like this "69.171.237.32
" (Note: this number combinations is only for facebook.com for different website number will be changed)
copy that numbers and paste in your browser address bar and hit enter.

4. Access Blocked Websites using Google Translate or Yahoo! Babelfish. You can also use translational services to get on blocked websites. To do so, enter a language different from the website in the 'From' field and English in the "To" field. You can also use this method to bypass software that block websites on the basis of specific keyword mentions. Just translate the URL you wish to visit in a different language to overcome the keyword block.

5. Proxy Websites: There are many proxy websites (anonymizers) which open blocked websites on their servers and present the data to you. This hides from the service providers the address of the website you are trying to visit. Few popular free ones include HideMyAss, Anonymouse and Proximize me .

6. Use RSS Readers for Accessing Restricted Blogs: All blogs syndicate their content via RSS feeds which you can subscribe to in web based RSS Readers like Bloglines to access blocked content.

7. Use IP Address to Decimal Conversion: If you cannot access blocked websites, you can enter the decimal number of the URL's IP address to get access to restricted websites. Search Google for IP to Decimal + IP Address of the banned website and Google will convert it into decimal. Enter that into your browser's address bar and see if the blocked website opens. (Note: to get ip address of any website you need to ping that website in cmd as shown in pint no. 3.)

8. Create a 2 layered Unblocker: Just go to Google Translate or Yahoo! Babelfish, open any proxy website inside it and then use that proxy website to access your blocked website. In this way, you can achieve two layered website unblocking.

9. TOR: TOR or The Onion Router is a free software that protects the privacy and security of its users by channeling data through multiple nodes so as to prevent the orginal data from being unscrambled. Although browsing through TOR is a bit slow, it is one of the most effective ways of bypassing restricted websites.

10. Nyud.net: To unblock blocked websites, just add nyud.net to their URL. For example, if this blog (www.facebook.com) is blocked, you can visit it by going to www.facebook.com.nyud.net.

11. Opera Mini Simulator: Opera offers a web based version of Opera Mini to allow users to get an experience of what it is like. You can use this demo version to access most websites that offer their mobile versions. Even websites that do not offer a mobile version can be viewed through this, although the quality of the results obtained may not be that good.

12. Changing DNS servers: A common way of blocking websites is preventing DNS servers from giving the locations of the blocked website's servers. In such a scenario, changing your DNS servers to OpenDNS's or Google's DNS will be your best option to get over the block. As an additional advantage, this will also increase your internet speed.

13. VPN Software: VPN or Virtual Private Network Software can be described as a tunnel under the public network that offers more anonymity than proxy websites as it also encrypts the data transferred by the blocked website thus, offering complete anonymity when you access your favorite web applications. Although most VPN software are available as paid software only,HotSpotShield is a popular free alternative.

14. IP Hiding Software: Sometimes, websites block users on a particular IP address from visiting themselves. In such cases, free IP hiding software like UltraSurf can be used to visit them. While free software offer very less features as compared to paid ones, they are still effective for overcoming most common blocks.

15. Edit your host files: Some malware and blocking software edit your host files and add a website's address to prevent you from visiting that website. In such a scenario, you can edit your host file with Notepad by visiting “C:\WINDOWS\system32\drivers\etc” if C is your system drive and remove that website. In Windows Vista and Windows 7, a warning from UAC might be displayed while editing your host files.


How To Hack Facebook Account using TabNapping

 

Hai guys Today i will tell u How To Hack Facebook Account using TabNapping . TabNapping is an advanced way of Phising Read More about tabnabbing from HERE.



Follow these steps to Hack Facebook Account Using Tabnapping :-




1. First Download Script from HERE(password: doyouknow1247.blogspot.in) and then Extract it!!!




2. Now choose any hosting website like http://www.host1free.com/ etc.




3. Now Create your account. You will get all server details.




4. Then click on File Manager and then click on Public_Html




5. Now Upload Three Files (Facebook.html , Login.php , google.html)




6. After uploading them You will get the your files like this www.yourhosting.com/filename.html




7. Now open the tabnabb.js in note pad. Put your facebook.html your there where you will find the text like this :- window.location = ‘ Enter your Link here ‘ and then upload it




8. Now you are done when some one will open your google.html after few seconds he will be redirected to the facebook.html




9. Enjoy!!!




Thanks for Reading!!!!!

Tabnabbing: A New Type of Phishing Attack


 


Tabnabbing:

The web is a generative and wild place. Sometimes I think I missed my calling; being devious is so much fun. Too bad my parents brought me up with scruples.

Most phishing attacks depend on an original deception. If you detect that you are at the wrong URL, or that something is amiss on a page, the chase is up. You’ve escaped the attackers. In fact, the time that wary people are most wary is exactly when they first navigate to a site.

What we don’t expect is that a page we’ve been looking at will change behind our backs, when we aren’t looking. That’ll catch us by surprise.


How The Attack Works


1. A user navigates to your normal looking site.

2. You detect when the page has lost its focus and hasn’t been interacted with for a while.

3. Replace the favicon with the Gmail favicon, the title with “Gmail: Email from Google”, and the page with a Gmail login look-a-like. This can all be done with just a little bit of Javascript that takes place instantly.


4. As the user scans their many open tabs, the favicon and title act as a strong visual cue—memory is malleable and moldable and the user will most likely simply think they left a Gmail tab open. When they click back to the fake Gmail tab, they’ll see the standard Gmail login page, assume they’ve been logged out, and provide their credentials to log in. The attack preys on the perceived immutability of tabs.

5. After the user has entered their login information and you’ve        sent it back to your server, you redirect them to Gmail. Because they were never logged out in the first place, it will appear as if the login was successful.

Add a Categories Section to a Blogger Blog


Categories is a very important section of any blog, because with the help of categories people can easily find what they are looking for. As a disadvantage Blogger blogspot blog doesn’t have category section in it, its not a big deal because it does have labels in that. So we would manually create category section in blogger from existing labels. Now how to create categories using these labels so there are different procedures to make categories, we will explain all of them.

The first and the easy way to create categories is to simply rename the title of the labels as categories. But it wouldn’t work because there are so many labels you choose for an article. So to choose the category you must go to Selected Labels in label widget and choose the one’s that you want to show in category. If you see at the header you may notice that how i have created the major categories from the labels so visitors can easily find what they are looking for.




How to choose a proper word to be shown in categories section from an article that is already having too many labels is that ..


1. Go to YourBlogAddress (Ex. http://doyouknow1247.blogspot.in/)
 > Click On Design > Layout > Click On Add Gadget > than in basic gadgets find "Labels" and click on it.

2. Change the title from labels to categories, and choose Selected Labels, edit it and select the labels which you want to show as categories as shown below.




Now Save it and you have done..!!!


The other way to add categories section to a blogger is as follows.

1. In this method you have to decide first how you want to group your articles, according to the labels applied, and what group heading you want to give to each grouping of articles.

2. Now to make the first category navigate to the individual page of the label you wish to use, by clicking on the label it has. After the page is opened for that label, Copy the URL address of this page. For example the URL address of the label of PC Games on my Site is:


http://doyouknow1247.blogspot.in/search/label/Pc%20Games 


but, let me tell you important thing that if you got a label that have two words in it like 'PC games', or 'Tips And Tricks', then use the %20 sign in between the two words like Pc%20Games, or Tips%20And%20Tricks.

3. From Blogger Dashboard go to Design > Page Elements > Add a Gadget > Link List.

4. In the Configure Link List dialog box, paste the link of the label you've copied from the address bar to New Site URL.

 


5. Give whatever name you want to be shown as your category is about what, in New Site Name, as I've given PC Games. Make the title as Categories any on other title you want to give.

6. After completing the settings click on Add Link to add the link to your categories, and click on Save.

7. For every article you with to put into the Categories Section copy the link of that label and add it to the Configure Link List. You can use the up and down arrows of each link to shuffle them around for desired order.



Have a God Day...!!!

Find if Image has been Modified or Photoshopped with FotoForensics



We come across lots of beautiful photos and pictures on internet and Facebook of places and scenery that we wish to set them as our wallpaper. I also like these images but always had this thought in mind that if these images are real and such lovely places do exists on earth. Although I am not sure of these facts, I still like to set them as my wallpaper.

If this had happened to you too, and in case you are wondering that every second photo that you come across is real or fake, then you should definitely try this out. Being aphotographer myself, I understand how important it is to photoshop an image but one should decide the level of modification that he wishes to perform in a photo.

With the help of this free online service called FotoForensics, you can also determine whether the photo you are currently seeing is real, fake, modified or photoshopped. Yes this is true; you can also determine the level of modification done on the photo. You just need to either enter the image URL or upload the image to this service (higher the resolution, better the scan results) and wait for the Forensic results.


Image taken from FotoForensics

FotoForensics make use of Error Level Analysis (ELA) which is a type of technique in which they introduce certain known level of error in an image, but if the ELA value is higher at some points than expected then it has surely been modified. I would suggest you to first understand how this process works else you won’t be able to correctly evaluate the result. Read the tutorial here.

Say for instance for the above image, the darker the image part, lesser the change in the image whereas with each image resave, the colors are lost and the photo tend to turn white and noisy. In this picture, the background is completely black, but the person is not. That means that the background is at a different quality level compared to the rest of the picture; the background was digitally modified. In this case, it was enhanced to make the white look brighter.

Let me know how it goes for you.
Visit FotoForensics

Teenage Mutant Ninja Turtles




Teenage Mutant Ninja Turtles


Publisher: Ubisoft
Developer: Ubisoft Montreal
Release Date: March 20, 2007
Genre: Action

About This Game

This Teenage Mutant Ninja Turtles game is based on the CG animated movie produced by Imagi Animation Studios and based on Mirage Studios' Foot Clan-kicking Turtle heroes. The game takes place in a New York City plagued by secretive villains and strange, otherworldly creatures. Faced with these perils, the Turtles will experience their most trying time as heroes and as a family, as Raphael, Donatello and Michelangelo lose their focus and struggle to maintain their unity and ninja discipline. It's up to Leonardo and the faithful father figure Splinter to reunite the band of brothers and save New York City from a monstrous evil that lurks around every corner. Players engage in over-the-top acrobatic navigation, collaborative combat and powerful fighting moves.

Minimum System Requirements
  • OS: Windows XP/Vista
  • Processor: Pentium 4 @ 1.5 GHz or Athlon Equivalent
  • Memory: 512 MB
  • Hard Drive: 1.6 GB Free
  • Video Memory: 64 MB
  • Sound Card: DirectX Compatible
  • DirectX: 9.0c
  • Keyboard & Mouse


Recommended System Requirements
  • OS: Windows XP/Vista
  • Processor: Pentium 4 @ 2 GHz or Athlon Equivalent
  • Memory: 1 GB
  • Hard Drive: 1.6 GB Free
  • Video Memory: 128 MB
  • Sound Card: DirectX Compatible
  • DirectX: 9.0c
  • Keyboard & Mouse

















Download Teenage Mutant Ninja Turtles [Full] – Direct Links








 www.elj-games.blogspot.com

Moto Racer 3 - PC Game




Moto Racer 3


Developer: Delphine
Publisher: Infogrames
Genre: Racing
Release Date: February 12, 2002 (US)

About Moto Racer 3

The ultimate motorcycle racing game is back-and totally customizable! Build your own tracks with the new 3D track creator and share them with your friends. Feel the adrenaline rush of high-speed racing with improved graphics and more 3-D acceleration. Choose a tire smokin' superbike or a rugged motorcross bike and hang on for the ride of your life!

Minimum System Requirements
  • OS: Windows 98/ME/2000/XP
  • Processor: Pentium III 450MHz
  • Memory: 64MB
  • Hard Drive: 650MB
  • Video Memory: 16MB DirectX compatible 3D Accelerated
  • Video Card: DirectX compatible 3D Accelerated
  • DirectX: DirectX 8.0a
  • Keyboard
  • Mouse
























Download Moto Racer 3 – Direct Links





www.elj-games.blogspot.com

Sega Rally Revo - PC Game

 

Sega Rally Revo

Developer: SEGA Racing Studio
Publisher: SEGA
Genre: Racing
Release Date: October 9, 2007 (US)

About Sega Rally Revo

The classic rally racing series series hits next-gen consoles, with powerful new technology fueling its bumper-to-bumper racing. Vehicle selection affects driving strategy in Sega Rally Revo, as race course surfaces dynamically deform upon repeated contact with vehicle tires and changing weather effects. Sega Rally Revo features a variety of fully deformable surfaces, from gravel-littered tracks and smooth tarmac roads, to snow-covered mountain passes. Driving skills will also be tested by Sega Rally Revo's advanced AI which allows NPC drivers to dynamically adapt their driving style to the varied racing surfaces. Players can enjoy a comprehensive single-player campaign as they travel the globe racing the best drivers in the world. Sega Rally Revo also features online capabilities, with multiplayer splitscreen modes offering an extremely competitive rally experience against drivers around the world.

Minimum System Requirements

  • OS: Windows XP/Vista
  • Processor: Pentium 4 @ 2.0 GHz
  • Memory: 1 Gb
  • Video Memory: 128 Mb
  • Sound Card: DirectX Compatible
  • DirectX: 9.0c
  • Keyboard
  • Mouse


Recommended System Requirements
  • OS: Windows XP/Vista
  • Processor: Intel Core 2 DUO @ 2 GHz / Athlon 64 X2 Equivalent
  • Memory: 2 Gb
  • Video Memory: 256 Mb
  • Sound Card: DirectX Compatible
  • DirectX: 9.0c
  • Keyboard
  • Mouse
























Download Sega Rally Revo – Direct Links










www.elj-games.blogspot.com

Spellforce 2 : Shadow Wars

 
SpellForce 2: Shadow Wars

Developer: Phenomic Game Development JoWooD Entertainment AG
Publisher: Aspyr JoWooD Entertainment AG
Genre: Strategy
Release Date: May 5, 2006 (US)

About SpellForce 2: Shadow Wars

In SpellForce II, the player takes over both roles of commander and soldier in the heat of war. He is commander of his troops and also a fighting warrior on the front, solving quests and overcoming obstacles as in classical RPGs, but also leads armies as in an RTS.

Minimum System Requirements
  • OS: Windows 2000/XP
  • Processor: Pentium 4 @ 1.6 GHz
  • Memory: 512 MB
  • Hard Drive: 5 GB Free
  • Video Memory: 128 MB
  • Sound Card: DirectX Compatible
  • DirectX: 9.0
  • Keyboard & Mouse
  • CD/DVD Rom Drive

Recommended System Requirements
  • OS: Windows 2000/XP
  • Processor: Pentium 4 @ 3 GHz
  • Memory: 1 GB
  • Hard Drive: 5 GB Free
  • Video Memory: 256 MB
  • Sound Card: DirectX Compatible
  • DirectX: 9.0
  • Keyboard & Mouse

Screen Shots : 















 

SpellForce 2: Shadow Wars – Direct Links







www.elj-games.blogspot.com