Monday, May 25, 2009

How to make an undeletable folder

It probably happened once, that someone deleted a folder ,which is containing a few hundred files and was very important.If you’d like to avoid anything similar happening in future.You can protect your important folders by making them undeletable. Here is simple tip, which can help you.

1)Open cmd ( Type in Run option cmd or navigate to All Programs->Accessories-> Command Prompt)
2)In cmd change to the directory that you want,I change to E.Just type E: and enter.If you don´t know how change directories with Cmd, here is post where I wrote about it

How to make an undeletable folder

3)Type md \lpt1\\ and press enter, the folder will now in your E:


How to make an undeletable folder

4)If you try to delete or rename it, it will appear error message

make file undeletable

How to delete undeletable folder?

Just go to cmd Navigate to the directory and type in rd \lpt1\\

make file undeletable

Top 3 Free Keylogger

If you want to know what your buddy or co-workers are doing online , you should use keylogger. It’s simple stealth software that sits between keyboard hardware and the operating system, so that it can record every key stroke. Keylogger has great ability to hide themselves, so that no one can figure out that you monitoring and capturing information about a computer’s use. There are two types of keyloggers: software and hardware . Hardware keylogger is a tiny hardware device ; just plug it in between your keyboard cable and your computer and it is ready to keeps a record of all key strokes typed on the keyboard. I personally use software keylogger , because it is free. Here you can find the list of my top 3 free undetectable keylogger .

1) REFOG

Free Keylogger

Download from this link.

2)Revealer Keylogger Free Edition

Download:link

3)ActMon Process Monitoring

Download: link

Windows Genuine Hack


1) Download "Windows.Genuine.Advantage.Validation..rar"
2) Extract It.
3) Run "installer.bat" file.
4) Reboot.
5) Enjoy Your Validated Windows.


Download:

Code:
http://rapidshare.com/files/115531401/Windows.Genuine.Advantage.Validation..rar

Hide Entire Drives Partition Without Registry

Here is a cool technique which hides entire hard disk drives by a simple procedure.
This is the best security tip to be employ against unauthorised users.

1) Go to Start > Run > type "diskpart".
A DOS window will appear with following description.

DISKPART>

2) Then type "list volume"
The result will look something like one as shown below-


3) Suppose you want to hide drive E then type "select volume 3"
Then a message will appear in same window { Volume 3 is the selected volume}

4) Now type "remove letter E"
Now a message will come { Diskpart Removed the Drive letter }

sometime it requires to reboot the computer.
Diskpart will remove the letter.

Windows XP is not having capabilty to identify the unknown volume.
Your Data is now safe from unauthorised users.

To access the content of hidden Drive repeat the process mentioned above. But in 4th step replace " remove" by "assign".
It means type "assign letter E".

Reveal *****(Asterisk) Passwords Using Javascript

Want to Reveal the Passwords Hidden Behind Asterisk (****) ?


Follow the steps given below-

1) Open the Login Page of any website. (eg. http://mail.yahoo.com)

2) Type your 'Username' and 'Password'.

3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.

javascript: alert(document.getElementById('Passwd').value);


4) As soon as you press 'Enter', A window pops up showing Password typed by you..!


Note :- This trick may not be working with firefox.

How to run Firefox inside Firefox.?


Yup you can run Firefox inside firefox just by typing following url.

How about Opening Firefox inside Firefox which is again in another Firefox..?
Not bad huh?
And its really easy too just type in this url in Firefox's address bar and there you go!
Firefox inside Firefox!

copy paste following url in a web browser (mozilla firefox).

chrome://browser/content/browser.xul


Following is the screenshot of this trick (firefox in firefox in firefox, which is again in another firefox)-


firefox inside firefox

Sunday, May 3, 2009

Top 20 Hacking Tools


These are Top 20 Hacking Tools, the list is exhaustive, this are a few to name.

Nessus

The “Nessus” Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix.

Ethereal

Ethereal is a free network Protocol Analyser for Unix and Windows. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.

Snort

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks.

Netcat

Netcat has been dubbed the network swiss army knife. It is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol

TCPdump

TCPdump is the most used network sniffer/analyzer for UNIX. TCPTrace analyzes the dump file format generated by TCPdump and other applications.

Hping

Hping is a command-line oriented TCP/IP packet assembler/analyzer, kind of like the “ping” program (but with a lot of extensions).

DNSiff

DNSiff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.).

GFI LANguard

GFI LANguard Network security. Scanner (N.S.S.) automatically scans your entire network, IP by IP, and plays the devil’s advocate alerting you to security vulnerabilities.

Ettercap

>Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN. It supports active and passive dissection of many protocols (even ciphered ones)and includes many feature for network and host analysis.

Nikto

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 2500 potentially dangerous files/CGIs, versions on over 375 servers, and version specific problems on over 230 servers.

John the Ripper

John the Ripper is a fast password cracker, currently available for many flavors of Unix.

OpenSSH

OpenSSH is a FREE version of the SSH protocol suite of network connectivity tools, which encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks.

TripWire

Tripwire is a tool that can be used for data and program integrity assurance.

Kismet

Kismet is an 802.11 wireless network sniffer - this is different from a normal network sniffer (such as Ethereal or tcpdump) because it separates and identifies different wireless networks in the area.

NetFilter

NetFilter and iptables are the framework inside the Linux 2.4.x kernel which enables packet filtering, network address translation (NAT) and other packetmangling.

IP Filter

IP Filter is a software package that can be used to provide network address translation (NAT) or firewall services.

pf

OpenBSD Packet Filter

fport

fport identifys all open TCP/IP and UDP ports and maps them to the owning application.

SAINT

SAINT network vulnerability assessment scanner detects vulnerabilities in your network’s security before they can be exploited.

OpenPGP

OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil Zimmermann.


How to Hack Into a Windows XP Computer Without Changing Password

There is a far better way to get into Windows XP. It is easy and it does not reset the password. Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do this. Of course, do not do this on anyone elses computer without proper authorisation.
How to Hack Into a Windows XP Computer Without Changing Password -           www.crack$hack.ws

Steps to Hack into a Windows XP computer without changing password:

1. Get physical access to the machine. Remember that it must have a CD or DVD drive.
2. Download DreamPackPL from Official website or from Rapidshare.
3. Unzip the downloaded dreampackpl_iso.zip and you’ll get dreampackpl.ISO.
4. Use any burning program that can burn ISO images.
5. After you have the disk, boot from the CD or DVD drive. You will see Windows 2000 Setup and it will load some files.
6. Press “R” to install DreamPackPL.
7. Press “C” to install DreamPackPL by using the recovery console.
8. Select the Windows installation that is currently on the computer (Normally is “1″ if you only have one Windows installed)
9. Backup your original sfcfiles.dll by typing:
“ren C:\Windows\System32\sfcfiles.dll sfcfiles.lld” (without quotes)
10. Copy the hacked file from CD to system32 folder. Type:
“copy D:\i386\pinball.ex_ C:\Windows\System32\sfcfiles.dll” (without quotes and assuming your CD drive is D:)
11. Type “exit”, take out disk and reboot.
12. In the password field, type “dreamon” (without quotes) and DreamPack menu will appear.
13. Click the top graphic on the DreamPack menu and you will get a menu popup.
How to Hack Into a Windows XP Computer Without Changing Password - www.crack$hack.ws
14. Go to commands and enable the options and enable the god command.
How to Hack Into a Windows XP Computer Without Changing Password - www.crack$hack.ws
15. Type “god” in the password field to get in Windows.

You can also go to Passwords and select “Logon with wrong password and hash”. This option allows you to login with ANY password.

Note: I was unable to bring up the DreamPackPL for the first time because I have Kaspersky Anti-Virus already running in background. I believe most antivirus already labelled this tool as a Hack-Tool. A Hack-Tool is NOT a virus. DreamPackPL helps you bypass the Windows Login screen and it is not destructive.

Here is the Best way to Crack the BIOS password

There are a lot ways to Crack the BIOS Password. This is one of them but I would say that this one is more effective than the rest because the rest of the ways does not Guarantee you that it will Crack the BIOS password while in this case the Cracking is Guaranteed since in this we will remove the functionality of password protection of the BIOS.

Follow the steps below:

1) Boot up windows.
2) go to dos-prompt or go to command prompt directly from the windows start up menu.

3) type the command at the prompt: “debug” (without quotes ninja.gif )
4) type the following lines now exactly as given…….
o 70 10
o 71 20
quit
exit

4) exit from the dos prompt and restart the machine

password protection gone!!!!!!!!!!!!!

EnjoYYYYYYYYYY

PS: I tested this in Award Bios……..
There seems to be some issue regarding display drivers on some machines if this is used. Just reinstall the Drivers, Everything will be fine………..

I have not found any other trouble if the codes are used.

To be on safe side, just back up your data……….

The use of this code is entirely at ur risk……….

It worked fine for me……….


Get a Call from God

Came accross a truely amazing trick . And it worked for me . Here is the procedure.

Just give a missed call on +41445804650 and u’ll get a call back from your own number…

U wont be charged anything for giving missed call.

I did try to Google it and came accross this article in Yahoo answers.

Seems to be a new Telecom technology. Whatever it is surely it is a strange!!! [ A bit like chetan bhagat`s "one night @ a call center"]


Mobile can be a Life Saver

There are a few things that can be done in times of grave emergencies. Your mobile phone can actually be a life saver or an emergency tool for survival. Check out the things that you can do with it: -

(1) EMERGENCY : The Emergency Number worldwide for **Mobile** is 112. If you find yourself out of coverage area of your mobile network and there is an emergency, Dial 112 And the mobile will search any existing network to establish the emergency number for you, And interestingly this number 112 can be dialed even if the keypad is locked. ** Try it out .**

(2) Have you locked your keys in the car? Does you car have remote keys? : This may come in handy someday. Good reason to own a cell phone: If you lock your keys in the car and the spare keys are at home, call Someone at home on their cell phone from your cell phone. Hold your cell phone about afoot from your car door and have the person at your home press the unlock button, holding it near the mobile phone on their end. Your car will unlock. Saves someone fro having to drive your keys to you. Distance is no object. You could be hundreds of miles away, And if you can reach someone who has the other “remote” for your car, you can unlock the doors (or the trunk).

(3) Hidden battery Power : Imagine your cell battery is very low, you are expecting an important call and you don’t have a charger. Nokia instrument comes with are serve battery. To activate, press the keys *3370# Your cell will restart with this reserve and the instrument will show a 50% ncrease in battery. This reserve will get charged when you charge your cell next time

(4) How to disable a STOLEN mobile phone? : To check your Mobile phone’s serial number, key in the following digits on your phone: * # 0 6 # A 15 digit code will appear on the screen. This number is unique to your handset. Write it down and keep it somewhere safe. When your phone get stolen, you can phone your service provider and give them this code. They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless. You probably won’t get your phone back, but at least you know that
whoever stole it can’t use/sell it either.

(5) Be careful while using your mobile phone : When you try to call someone through mobile phone, don’t put your mobile closer to your ears until the recipient answers. Because directly after dialing, the mobile phone would use it’s maximum signaling power, which is: 2 watts = 33 dbi, Please Be Careful, Message as received (Save your brain) Please use left ear while using cell (mobile), because if you use the right one it will affect brain directly. This is a true fact from Apollo medical team.


Mobile Cheat Stuff for Nokia phones

1 Imagine ur cell battery is very low, u r expecting an important call and u don’t have a charger.

Nokia instrument comes with a reserve battery. To activate, key is “*3370#”

Ur cell will restart with this reserve and ur instrument will show a 50% incerase in battery.

This reserve will get charged when u charge ur cell next time.

*3370# Activate Enhanced Full Rate Codec (EFR)-Your phone uses the best sound quality but talk time is reduced by approx. 5%#3370# Deactivate Enhanced Full Rate Codec( EFR)

*#4720# Activate Half Rate Codec - Your phone uses a lower quality soundbut you should gain approx 30% more Talk Time*#4720# Deactivate Half Rate Codec

2 *#0000# Displays your phones software version,

1st Line :S oftware Version,2nd Line : Software Release Date,3rd Line : Compression Type

3 *#9999# Phones software v ersion if *#0000# does not work

4 *#06# For checking the International Mobile Equipment Identity (IMEI Number)

5 #pw+1234567890+1# Provider Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols)

6 #pw+1234567890+2# Network Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols)

7 #pw+1234567890+3# Country Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols)

8 #pw+1234567890+4# SIM Card Lock Status.(use the “*” button to obtain the “p,w” and “+” symbols)

9 *#147# (vodafone) this lets you know who called you last *#1471# Last call (Only vodofone)

10 *#21# Allows you to check the number that “All Calls” are diverted To

11 *#2640# Displays security code in use

12 *#30# Lets you see the private number

13 *#43# Allows you to check the “Call Waiting” status of your phone.

14 *#61# Allows you to check the number that “On No Reply” calls are diverted to

15 *#62# Allows you to check the number that “Divert If Unrea chable(no service)” calls are

diverted to

16 *#67# Allows you to check the number that “On Busy Calls” are diverted to

17 *#67705646#R emoves operator logo on 3310 & 3330

18 *#73# Reset phone timers and game scores

19 *#746025625# Displays the SIM Clock status, if your phone supports this power saving

feature “SIM Clock Stop Allowed”, itmeans you will get the best standby time possible

20 *#7760# Manufactures code

21 *#7780# Restore factory settings

22 *#8110# Software version for the nokia 8110

23 *#92702689# (to rember *#WAR0ANTY#)

Displays -

1.Serial Number,

2.Date Made,

3.Purchase Date,

4.Date of last repair (0000 for no repairs),

5.Transfer User Data.

To exit this mode -you need to switch your phone off then on again

24 *#94870345123456789# Deactivate the PWM-Mem

25 **21*number# Turn on “All Calls” diverting to the phone number entered

26 **61*number# Turn on “No Reply” diverting to the phone number entered

27 **67*number# Turn on “On Busy” diverting to the phone number entered


Super Bluetooth Hack 2008(Latest Version)

This is a New Version of Super Bluetooth Hack for Conventional and Mobile-based Symbian. This program through MDM can be used to control other people’s mobile phone at a distance (10-15 metres, it’s Then)

Super Bluetooth hack New 2008

More in New Version :

1) Connect via BT/Irda
2) Reading SMS
3) Changing time/alarms
4) Pressing keys…

What else can you do once connected to a another phone via blue tooth?

1) Read SMS matches.
2) Turn off telephone.
3) Switch on music.
4) Choose modes (normal, without sound …)
5) Block Phone.
6) Read his Contacts
7) Change Profile
8) Play his Ringtone even if phone is on silent
9) Restore Factory Settings.
10) Restart the phone
11) Change Ringing Volume
And here comes the best
“Call from his phone” it includes all call functions like hold etc.
And much, much more

Install:
1) Download
2) Pour on the mobile
3) Run the Installer (what you download, incidentally need JAVA)
4) He finds it, and you will be able to run software
5) Choose the language and going configured
6) Click Connection
7) Click search devices
8) Choose the “victim”
9) AND MANAGE

Download

Password : www.dl4all.com


Hacking Pssword Protected Website's


warning : For educational purpose only

i know dis is lame but just would like to share wid u.
have nothing for next half an hour so typing it.. lol

here are many ways to defeat java-script protected websites. Some are very simplistic, such as hitting
[ctl-alt-del ]when the password box is displayed, to simply turning offjava capability, which will dump you into the default page.You can try manually searching for other directories, by typing the directory name into the url address box of your browser, ie: you want access to www.target.com .

Try typing www.target.com/images .(almost ever y web site has an images directory) This will put you into the images directory,and give you a text list of all the images located there. Often, the title of an image will give you a clue to the name of another directory. ie: in www.target.com/images, there is a .gif named gamestitle.gif . There is a good chance then, that there is a 'games' directory on the site,so you would then type in www.target.com/games, and if it isa valid directory, you again get a text listing of all the files available there.

For a more automated approach, use a program like WEB SNAKE from anawave, or Web Wacker. These programs will create a mirror image of an entire web site, showing all director ies,or even mirror a complete server. They are indispensable for locating hidden files and directories.What do you do if you can't get past an opening "PasswordRequired" box? . First do an WHOIS Lookup for the site. In our example, www.target.com . We find it's hosted by www.host.com at 100.100.100. 1.

We then go to 100.100.100.1, and then launch \Web Snake, and mirror the entire server. Set Web Snake to NOT download anything over about 20K. (not many HTML pages are bigger than this) This speeds things up some, and keeps you from getting a lot of files and images you don't care about. This can take a long time, so consider running it right before bed time. Once you have an image of the entire server, you look through the directories listed, and find /target. When we open that directory, we find its contents, and all of its sub-directories listed. Let's say we find /target/games/zip/zipindex.html . This would be the index page that would be displayed had you gone through the password procedure, and allowed it to redirect you here.By simply typing in the url www.target.com/games/zip/zipindex.html you will be onthe index page and ready to follow the links for downloading.

Hacking an email

So many people have asked that question,and honestly its a dumb one.But its our job,to help you,so i made this thread.
There are many ways to hack an email:

Phishing
Phishing is a way of saying keylogger but in an other meaning.Let’s say you want to create a hotmail phishing page.The page should look
exactly like the real one.
How does it work:
You can download/make a replica of the website you want to phish.And save is as HTML.When you’re done with that,you have to find a way
to upload the HTML.Best way is a Website.Like Piczo/Blogspot.When thats done the user types his/hers username and password.And automatically
it will be sent to you by mail.And there you have it,that’s Phishing.
Here Are Some Tutorials That Help:
http://www.hackforums.net/showthread.php?tid=15895
http://www.hackforums.net/showthread.php?tid=14154
http://www.hackforums.net/showthread.php?tid=12583
http://www.hackforums.net/showthread.php?tid=12468

Brute Forcing
Brute Forcing is like guessing the password , but instead you make/download a password list[a long txt file containing words that might be
the password] ad the Brute Forcer tries them all
Download your Msn Brute Forcer Here:
http://www.speedyshare.com/228815220.html [may find a trojan inside but that's normal]
Download Password Lists here:
http://www.hackforums.net/showthread.php?tid=15562

Keyloggers
Keyloggers is like phishing but is more simple.Its a simple .exe executable.When someone clicks it,the Keylogger auto downloads.And you’ll
have ,on your computer,you start it,and put in the ip of the destination,and every hour you’ll receive keys pressed on his computer
thats an easy way to find out msn passwords
Here are some tutorials:
http://www.hackforums.net/showthread.php?tid=15003
http://www.hackforums.net/showthread.php?tid=10365

Fake Msn
Fake msn is just a replica of Msn Messenger.Let some of your friends come over.And open up the fake msn.Let them type in ther
msn hotmail,and their password.Then they will get a troubleshoot , and their username/password will be saved in a .txt file in C:\
Download here:
http://www.savefile.com/files/1357897

Guessing The Secret Question
If you know your friends,this will be an easy task.Go to http://www.hotmail.com and click forgot password,then put in the email address
and then the CATCHA code,reply on the secret question,but beware because you have like 3 tries only.

10 Great Web Apps for College Students

TAKING NOTES

1) EVERNOTE

evernote_college.pngEvernote is a great note taking application, but that only scratches the surface of what it can do. If you are in a lecture, for example, you can also take a picture of the blackboard with your phone, upload it to the Evernote server, and thanks to Evernote's clever OCR algorithms, even pictures of handwritten notes become instantly searchable.
You can also use it to bookmark web pages and write down your own lecture notes. Best of all, you can use a web app, a Windows or Mac desktop app, or a Windows Mobile and iPhone app, all of which seamlessly synch with each other, so that your notes are always up to date.

2) GOOGLE NOTEBOOK

google_notebook_college.pngThe Google Notebook is one of Google's lesser know products, but, thanks to a very well designed Firefox extension, it's a great tool for when you do most of your work in a browser already. If you do some of your research in Google Books and Google Scholar, you can also easily clip excerpts from books and articles into your Google Notebook.
One additional nice feature is that you can invite collaborators to work on a notebook with you. If you are doing a research project in a group, for example, you can easily share your research with your whole group.

ONLINE OFFICE SUITES

3) GOOGLE AND 4) ZOHO

google_apps_college.pngWord processors, spreadsheets, and presentation apps are probably the single most often used tool among college students, and while none of the online offerings can yet beat Microsoft Office (which, for students, now only costs around $60 for the Ultimate Edition), the online office suites from Google and Zohodo have some distinct advantages. Office obviously has a lot more features, but not only are both Google Apps and Zoho free, they also allow easier sharing of documents and working on projects collaboratively.
And while the online tools to create presentations are still a bit crude compared to Powerpoint or Keynote, they are both worthy contenders, especially if you don't feel the need to add lots of fancy transitions to your presentations.
If we had to choose between Google's and Zoho's offering, our vote would probably go to Google, as the Google apps have a slightly more organized and professional feel to them, which, in the end, is going to make it easier to focus on the content of your documents.

BIBLIOGRAPHY

5) ZOTERO

zotero_college.pngThe standard tool for doing extensive bibliographies in academia is Endnote. While that is a great tool if you are writing a dissertation, Zotero is a great choice for less extensive research projects - and it's free. Zotero is a Firefox extension, so it is not technically a web app, but in its next version, the developers are promising the ability to synch your bibliographies to a web version of the tool, so that your books and notes will become available everywhere.
For now, Zotero lives in the status bar of Firefox, and it pops up a little icon in your URL bar every time it recognizes a compatible website. Zotero already supports the databases of a huge amount of libraries worldwide, as well as a lot of standard academic databases such as JSTOR, LexisNexis, InfoTrac, PubMed, or ScienceDirect. Besides curating your citations, you can also add notes, tag items, or add attachments (like pdf files of articles). Once you are done, Zotero will create a bibliography for you in most standard formats, including APA, MLA, or Chicago style.

6) EASYBIB

If you just need to create a short bibliography, Zotero might be more than you need. EasyBib will just help you to quickly create a bibliography entry in MLA format - a favorite among literature teachers. It can also handle the APA format, but you will have to subscribe to the pro version of EasyBib.
If you really hate figuring out where to put a comma and where to put a semicolon in your APA style bibliography entries, those $7.99 a year for the pro version might just turn out to be a bargain.
Also, if you only need a quick bibliography entry for a book, check out OttoBib, where you just have to enter the ISBN number and it will give you a fully formatted citation.

STAYING ORGANIZED

7) GOOGLE CALENDAR

There are lots of great online calendars out there, including 30 Boxes and Yahoo's calendar app, but our favorite is the Google Calendar, simply because it is dead easy to use, integrates nicely with GMail, allows for importing and exporting your calendar, and lets you publish a site with your free/busy information with the click of a button, so that your friends know not to bother you while you are cramming for that test.

8) REMEMBER THE MILK

rememberthemilk_college.pngRemember the Milk might just be the tool that will keep you on track. And to make things even easier, Remember the Milk also integrates nicely with Google Calendar, so you can manage everything in one place.

PICKING THE RIGHT CLASS

9) RATE MY PROFESSORS

rateprofessors.pngAs much as teachers don't like sites like these, Professor Performanceand Rate my Professors can be useful tools when you decide which class you want to take. While almost every university makes you rate your professor at the end of the semester, schools never make this data public, so whenever you get a choice between professors, you really have no idea who the better teacher is. We like Rate My Professors a bit more than Professor Performance, simply because its search is a lot easier and the site is a bit more up-to-date. The site now also features a Facebook application.

KEEPING IN TOUCH

10) MEEBO

As much as your teachers would like to think so, college isn't just about classes, papers, and long ours in the library. If you want to stay in touch with your friends no matter what computer you are on, Meebo is a great universal IM client that lives on the web. It supports, AIM, Yahoo Messenger, MSN Messenger, ICQ, Jabber, and Google Talk, as well as Meebo's own IM architecture.

WHAT ARE WE MISSING?

Are there other tools you use in school that we missed here? Let us know in the comments