Sunday, 5 August 2012

CHEATBOOK 2011



CheatBook DataBase 2011

Cheatbook 2011

Cheatbook 2011


Windows Sofware | CheatBook DataBase 2011 (PC & Console) | zip | 56.0Mb

CheatBook DataBase 2011 - The encyclopedia of game cheats. A die hard gamer would get pissed if they saw someone using cheats and walkthroughs in games, but you have to agree, sometimes little hint or the "God Mode" becomes necessary to beat a particularly hard part of the game. If you're an avid gamer and want a few extra weapons and tools the survive the game, CheatBook DataBase is exactly the resource you would want. [cut]
CheatBook-DataBase 2011 is a freeware cheats code tracker that makes hints, Tricks, Tips and cheats (for PC, Walkthroughs, Playstation, Playstation 2, Playstation 3, Sega, Nintendo 64, Nintendo DS, DVD, Gameboy Advance, Gameboy Color, N-Gage, Nintendo DS, XBox, XBox 360, iPhone, Gamecube, Dreamcast, Super Nintendo, Wii, Sony PSP) easily accessible from one central location.

Many of the suggestions which we received are now realized in the new version 2011.

- comfortable adding of individual cheats
- cheats can be edited more easily now
- files and images can be stored
- simple survey of informations about the cheat
- statistics
- comfortable filter conditions
- consoles cheats added
- 18 different consoles now possible
- search machine was revised
- link manager
- history log
- News and Updates
- private user data base
- Import old Own Bases

Release date January 8, 2011 CheatBook-DataBase 2011 is Freeware for
Win95/98/2000/NT/XP/Vista/Windows 7.
All Cheats inside from first CHEATBOOK Jan.98 until today.




Code:
no need of any other link just go to the link




http://www.cheatbook.de/




official website of cheatbook  

download both cheatbook 2011 and 2012 for free


OR
http://www.4shared.com/file/OusSpMiw/CheatBook_DataBase_2011.html?aff=7637829

APPLE QUICKTIME PRO V7.71.1680.42 FULL • INC SERIALS



Image  
The QuickTime family of digital media creation, delivery and playback software lets you deliver live or pre-recorded video and audio to an audience of any size. When combined with QuickTime Player and QuickTime Pro, these applications work together to provide the industry’s first end-to-end, standards-based digital media delivery system. 



QuickTime 7 is Apple's cutting-edge digital media software for both Mac and Windows-based computers delivers unparalleled quality for creating, playing and streaming audio and video content over the Internet. Besides playing MPEG-4 and MP3 content, it supports timecode tracks as well as MIDI standards such as the Roland Sound Canvas and GS format extensions. It also supports key standards for web streaming, including HTTP, RTP and RTSP. Plus, it supports every major file format for images, including JPEG, BMP, PICT, PNG and GIF. QuickTime 7 features an ultra efficient new H.264 video codec delivering stunning quality at remarkably low data rates from 3G to iChat AV to HD. 

New features in QuickTime 7 Player for Windows: 

- H.264 video playback. Watch movies created with this state-of-the-art, standards-based codec, which delivers exceptional-quality video. 
- Surround sound. With QuickTime 7, your PC, and surround speakers, you can enjoy the full effect of your surround sound game or movie. 
- New and improved playback controls. Easily change settings including jog shuttle, playback speed, bass, treble, and balance. 
- Zero-configuration streaming. QuickTime automatically determines your optimal Internet connection speed and reconnects dropped connections. 
- Live resize. Playback continues smoothly as you change the size of the QuickTime Player window 

New features in QuickTime 7 Pro for Windows: 

- Create H.264 video. Create incredible-looking video for any use, from 3G for mobile devices to HD. 
- Create surround audio. Create a rich multimedia experience by adding multichannel audio to your movie. 
- Floating controls. Easily access functions like pause, play, fast-forward, and rewind while watching full-screen movies. 
- Background exporting. Export your movie in the background and continue with your next playback or editing task. 
- Improved movie authoring. The all-new Movie Properties facilitates simple and efficient movie authoring. 
- Automate with VB Script. Automate your QuickTime workflow with native VB Script support in QuickTime 7. Developers can also use VB Script to access the new QuickTime Active X control for creating custom multimedia applications. 

Compatible with: Windows XP / Vista and Win7 (32/64-bit)
Multilingual: English, Spanish, French, Italian, Portuguese, etc




Image

Program + serials

Code:


http://rapidshare.com/files/294625701/QuickTime.Pro.v7.71.1680.42.by.tano1221.rar
http://depositfiles.com/files/9wgwf1zoh
http://oron.com/gtojam6kcc4d
http://hotfile.com/dl/149309181/abcc331/QuickTime.Pro.v7.71.1680.42.by.tano1221.rar
http://www.2shared.com/file/WbaoMnAz/QuickTimeProv771168042bytano12.html

Monday, 23 July 2012

Andramax Keylogger 3.9 Free Serial with Remote Installation


It was just yesterday that I had given you the serial for Ardamax Keylogger 3.9 (without remote installation). Readers commented that they wanted Ardamax with remote installation.As I promised, I said that I will give you serial for 3.8 but its good news that I have the serial for 3.9 version(latest)  with remote installation.


See the screenshots of the remote installation feature of ardamax keylogger:





ardamax 3.9 with remote installation


Ardamax Keylogger 3.9 with Remote Installation Free Serial Fullversion




Saturday, 21 July 2012

Kaspersky PURE v9.0.0.192 Incl License and Patch-iND

Kaspersky PURE 2.0 gives you our ultimate protection for PCs. It’s the security solution for all of your family’s PCs, identities, passwords, documents, photos and more. In addition to our latest antivirus technologies, Kaspersky PURE 2.0 delivers advanced protection and management features – including the ability to manage every PC in your home, via a single PC. It’s our most comprehensive, easy-to-manage PC security ever.



 

Benefits

Award-winning protection against Internet threats By combining our latest antivirus technologies – running on your PC – plus the far-reaching benefits of the cloud, Kaspersky PURE 2.0 provides more comprehensive security than ‘cloud only’ packages can offer. Keep safe from malware and phishing websites while you’re online – shopping, banking and social networking.
Protect your whole family Award-winning features help to protect your children and your information. You can control access to the Internet, applications, games and websites – plus limit or log Instant Messaging and social networking. Kaspersky PURE 2.0 can even block the transfer of phone and credit card numbers.
Protect your identity Advanced features help to keep your identity secure while you’re online. Password Manager generates strong passwords, stores them in an encrypted vault and automatically logs you on to websites and applications. The latest anti-phishing technologies help prevent online fraud – plus an on-screen Virtual Keyboard helps ensure credit card numbers aren’t stolen by keyloggers or identity thieves.
*Password Manager is not available for all x64 operating systems, applications or browsers.
Protect your digital assets Kaspersky PURE 2.0 lets you schedule automatic backups – to an external drive or USB device – to protect your photos, music and financial documents in case of theft or a hard disk fault. For added security, you can easily encrypt your sensitive, personal information.
Boost your PC performance Because your PC stores deleted files and your browsing history, that can affect performance and compromise your security. Keep your PC running smoothly – by permanently “shredding” your documents and deleting your surfing history, temporary files, cookies and Recycle Bin.
Easily manage your security – across multiple PCs Now, it’s easier to manage the security of all your family’s PCs. Kaspersky PURE 2.0 lets you maintain all security tasks, run scans and updates, perform backups, fix security issues and manage parental controls on all of your home PCs – from the one PC you’re using.
                                                    


DOWNLOAD


DONT FORGET TO FOLLOW US.

MICROSOFT EXPRESSION STUDIO 4 ULTIMATE (activated)

Microsoft introduced Microsoft Expression on September 16, 2005, at Microsoft's Professional Developers Conference in Los Angeles. Microsoft Expression Encoder was introduced at NAB 2007. Microsoft Expression Studio was released to manufacturing on April 30, 2007. The RTM news was announced at Microsoft's MIX 07 conference for web developers and designers.
Microsoft Expression Studio 2 was released on May 1, 2008, which also included a graphical makeover for the suite to an inverse of the previous a white on black theme. This release brings all products in the suite to version 2, and now also includes Visual Studio Standard 2008. Microsoft Expression Studio is also available to students as downloads via Microsoft's DreamSpark program.
Microsoft Expression Studio 3 was released on July 22, 2009, This release brings all products in the suite to version 3, with significant improvements especially targeting Silverlight 3. Expression Media is no longer a part of package, while all other products have been significantly improved and enriched.




DOWNLOAD

 http://thepiratebay.se/torrent/5863960/

Don't forget to follow us


Friday, 20 July 2012

Back again, I am happy that I have completed 3 months of blogging and for that reason I am providing 10 genuine licenses of Step shot. StepShot can create a quick guide of any procedure. Create an explanation for your colleague how to configure Outlook. Or create a simple guide for your grandma on how to reach your photos on Facebook or Picasa. Export to PDF and share. Save your time and traffic. Stop recording videos. You now don't need expensive tools. Transmit your guides in the most popular sharing format PDF document.

All you need to do is :-
 
 
 




Please drop your comments and share it!

Saturday, 14 July 2012

How To Password Protect Your USB Drive






USB flash drives are portable. Which makes them easy to keep with you but unfortunately also makes them east to mislay.

The solution to protecting your USB drive depends on what you need to do and how much of the drives contents you need to protect.

If you only want to protect a handful of files on your USB flash drive then it's probably simplest to save them with a password. Programs like Word and Excel make it fairly easy to do this. Before saving your file, go to the Tools menu. Choose Options and then click on the Security tab. You'll be given the option to enter a password to open the file. Although the box only asks you to enter the password once, you'll be asked to type it in again before you can exit from the Options dialog box. But once you've done that, you're on your own. So make sure you can remember the password otherwise you'll have to resort to a program to recover passwords before you can open it again!

For many people, this will be enough protection. After all, those photos of beautiful looking scenery from your recent holiday probably don't need to be stored securely


How To Protect Your Complete USB Flash Drive

If you need to store lots of data securely on your USB drive then it makes sense to password protect the complete drive.

For instance, you wouldn't want other people to be able to get hold of your company's data if your drive went astray, would you?

If you don't mind splitting your USB drive into multiple "volumes" (kind of like virtual disk drives) and providing the files you want to protect aren't too large, you may want to check out the free program Cryptainer LE. The biggest snag is that the maximum volume size is 25Mb. So if you're dealing with Word documents and Excel spreadsheets, you'll be fine. But if you're looking at Access databases and the like, it's likely that you'll soon run over this limit. It's also a pain in the neck to have to continually swap drives, so remember that when you're considering this program.

The best compromise I've found is a neat piece of software called Securestix which lets you password protect specific folders on your USB drive. This is a good solution - you can leave those holiday photos for all to see whilst making sure that your backup copy of your login passwords and your company data are securely locked away.

Securestix even comes with a password hint option (you don't have to use this, but it's there anyway) so that you can remember long forgotten passwords in much the same way that web sites let you get back a password from their secure servers.

The program is very simple to use and very affordable. You can download your copy instantly from this link.

What Do You Want To Password Protect On Your USB Flash



USB Flash Drive

Kingston DataTraveler I - 4 GB USB 2.0 Flash Drive DTI/4GB

Kingston DataTraveler I - 4 GB USB 2.0 Flash Drive DTI/4GB

Amazon Price: $5.95 (as of 01/10/2012)Buy Now
This 4 GB USB flash drive lightens your load without emptying your wallet. As easy as click and drag, the DataTraveler holds just about any file you can think of--from reports and pictures, to spreadsheets and other important documents. It works with virtually any device with a USB port--even cross-platform from Macintosh to PC and vice versa.

More About USB Flash Drives

Category: file - :SanDisk Cruzer Micro.png|thumb|SanDisk Cruzer Micro, a brand of USB flash drives
Category: file - :MicroSDFDrive.JPG|thumb|A Kingston card reader which accepts Micro SD memory cards (Transcend card shown inserted) and acts as a USB flash drive, resulting in a size of approximately 2 cm in length, 1 cm in width and 2 mm in thickness
Category: File - :IBM card storage.NARA.jpg|thumb|Punched cards in storage at a U.S. Federal records center in 1959. All the data visible here would fit on a 4 GB flash drive.
USB flash drive is a data storage device that consists of flash memory with an integrated Universal Serial Bus (USB) interface. USB flash drives are typically removable and rewritable, and physically much smaller than a floppy disk. Most weigh less than 30 g.Frequently Asked Questions About USB Flash Drives. Peripherals.about.com (2010-06-17). Retrieved on 2011-05-18. drives of 256 gigabytes (GB) are available,Baker, Jeff (July 20, 2009) "Kingston unveils 256GB thumb", MobileWhack.com and storage capacities as large as 2 terabytes (TB) are planned, with steady improvements in size and price per capacity expected. Some allow up to 100,000 write/erase cycles (depending on the exact type of memory chip used) and 10 years shelf storage time.
AboutCom-Swivel-Pro-Flash "Imation Swivel Pro Flash Drive", About.com, 2008USB flash drives allow reading, writing, and erasing of data, with some allowing 1 billion write/erase cycles in each cell of memory: if 100 uses per day, 1 billion cycles could span 10,000 days or over 27 years. Some devices level the usage by auto-shifting activity to underused sections of memory.
USB flash drives are often used for the same purposes for which floppy disks or CD-ROMs were used. They are smaller, faster, have thousands of times more capacity, and are more durable and reliable because they have no moving parts. Until approximately 2005, most desktop and laptop computers were supplied with floppy disk drives, but floppy disk drives have been abandoned in favor of USB ports.
USB Flash drives use the USB mass storage standard, supported natively by modern operating systems such as Linux, Mac OS X, Windows, and other Unix-like systems. USB drives with USB 2.0 support can store more data and transfer faster than much larger optical disc drives like CD-RW or DVD-RW drives and can be read by many other systems such as the Xbox 360, PlayStation 3, DVD players and in some upcoming mobile smartphones.
Nothing moves mechanically in a flash drive; the term drive persists because computers read and write flash-drive data using the same system commands as for a mechanical disk drive, with the storage appearing to the computer operating system and user interface as just another drive. Flash drives are very robust mechanically.
A flash drive consists of a small printed circuit board carrying the circuit elements and a USB connector, insulated electrically and protected inside a plastic, metal, or rubberized case which can be carried in a pocket or on a key chain, for example. The USB connector may be protected by a removable cap or by retracting into the body of the drive, although it is not likely to be damaged if unprotected. Most flash drives use a standard type-A USB connection allowing plugging into a port on a personal computer, but drives for other interfaces also exist.
USB flash drives draw power from the computer via external USB connection. Some devices combine the functionality of a digital audio player with USB flash storage; they require a battery only when used to play music.

How to Hack Email Account with Cookie stealing

Cookie Stealing. 

I observed that cookie stealing is neglected by some fellow hackers (even I was one of them). But, recently, I discovered that cookie stealing can be pretty handy to hack an Email account. In the following article, I have covered basics of how to hack an Email account using Cookie Stealing.

How to hack Email account:

If you are a newbie and don't know about cookie, then for your information, Cookie is a piece of text stored on user computer by websites visited by the user. This stored cookie is used by webserver to identify and authenticate the user. So, if you steal this cookie (which is stored in victim browser) and inject this stealed cookie in your browser, you can imitate victim identity to webserver and enter hisEmail account easily. This is called Session Hijacking. Thus, you can easily hack Email account using such Cookie stealing hacks.

Tools needed for Cookie stealing attack:

Cookie stealing attack requires two types of tools:

  1. Cookie capturing tool
  2. Cookie injecting/editing tool
1. Cookie capturing tool:Suppose, you are running your computer on a LAN. The victim too runs on same LAN. Then, you can use Cookie capturing tool to sniff all the packets to and from victim computer. Some of the packets contain cookie information. These packets can be decoded using Cookie capturing tool and you can easily obtain cookie information necessary to hackEmail account. Wireshark and HTTP Debugger Pro softwares can be used to capture cookies.

Update: Check out my Wireshark tutorial for more information on cookie capturing tool.

2. Cookie injecting/editing tool:

Now, once you have successfully captured your victim cookies, you have inject those cookies in your browser. This job is done using Cookie injecting tool. Also, in certain cases after injection, you need to edit cookies which can be done by Cookie editing tool. This cookie injection/editing can be done using simple Firefox addons Add N Edit Cookies and Greasemonkey scripts. I will write more on these two tools in my future articles.

Drawbacks of Cookie Stealing:

Cookie Stealing is neglected because it has some serious drawbacks:
  1. Cookie has an expiry time i.e. after certain trigger cookie expires and you cannot use it to hijack victim session. Cookie expiry is implemented in two ways:
    1. By assigning specific timestamp(helpful for us).
    2. By checking for triggers like user exiting from webbrowser. So, in such cases, whenever user exits from his browser, his cookie expires and our captured cookie becomes useless.
  2. Cookie stealing becomes useless in SSL encrypted environment i.e. for https (Secure HTTP) links. But, most Email accounts and social networking sites rarely use https unless vicitm has manually set https as mandatory connection type.
  3. Also, most cookies expire once victim hits on LogOut button. So, you have to implement this Cookie stealing hack while user is logged in. But, I think this is not such a serious drawback because most of us have the habit of checking "Remember Me". So, very few people actually log out of their accounts on their PCs.
So friends, this was a short tutorial on basics of how to hack Email account using Cookie Stealing. As I have stated, Cookie stealing has some disadvantages. But, I think Cookie stealing is a handy way to hack an Email account. In my next articles, I will post detailed tutorial to hack Facebook and Gmail accounts using Cookie stealing. If you have any problem in this tutorial on how to hack Email account using Cookie stealing, please mention it in comments.

Enjoy Cookie stealing trick to hack Email account...

Hack an email account using Keylogger




1. What is a keylogger?
A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a small program that monitors each keystroke a user types on a specific computer’s keyboard. Using a keylogger is the easiest way to hack an email account. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.

2. Where is the keylogger program available?
A keylogger program is widely available on the internet. Some of the best ones are listed below
SniperSpy
Win-Spy

3. How to install it?
You can install these keyloggers just as any other program but these things you must keep in mind. While installing, it asks you to set a secret password and a hot key combination. This is because, after installation the keylogger program is completely hidden and the victim can no way identify it. So, you need the Hot Key combination and secret password to later unhide the keylogger.

4. Once installed how to get password from it?
The hacker can open the keylogger program by just pressing the hot keys (which is set during installation) and enter the password. Now it shows the logs containing every keystroke of the user,where it was pressed, at what time, including screenshots of the activities. These logs contain the password of the victim’s email account.

5. I don’t have physical access to the victim’s target computer, what can I do?
It doesn’t matter whether or not you have physical access to the victim’s computer. Because keyloggers like SniperSpy and Win-Spy offers Remote Installation Feature. With this feature it is possible to remotely install the keylogger on the victim’s PC.
You can attach the keylogger with any file such as image, MS excel file or other programs and send it to the victim via email. When the victim runs the file, it will automatically get installed without his knowledge and start recording every activity on his computer. These activities are sent to you by the keylogger software via email or FTP.

6. What if the target user (victim) refuses to run the attached file?
Sometimes the victim may refuse to run the attachment that you send via email because of suspicion.


7. How can a keylogger hack the Email password?
Hacking an email password using keylogger is as simple as this: You install the keylogger on a Remote PC (or on your local PC). The victim is unaware of the presence of the keylogger on his computer. As usual, he logs into his Email account by typing the username and password. This username and password is recorded and sent to you via Email. Now you have the password of your target email account.
In case if you install the keylogger on your local PC, you can obtain the recorded email password just by unhiding the keylogger program (use your hot key and password to unhide).

8. Which Keylogger is the best?
Both the keyloggers mentioned above are the best for email hacking. However I recommend SniperSpy as the best for the following reasons.
1. Sniper Spy is more reliable than Win-Spy since the logs sent will be received and hosted by SniperSpy servers. You need not rely on your email account to receive the logs.
2. Unlike Winspy, Sniperspy doesn’t require anything to be installed on your computer. To monitor the remote PC all you have to do is just login to your SniperSpy account from your browser.
3. SniperSpy is more easy to use and faster than Winspy.
4. SniperSpy offers better support than WinSpy.
5. SniperSpy has got recognition from media such as CNN, BBC, CBS, Digit etc. Hence it is more reputed and trustworthy.
Apart from the above mentioned reasons, both SniperSpy and WinSpy stands head-to-head. However in my opinion it’s better to go for SniperSpy since it is the best one. I have tested tons of keyloggers and the only two that stood up were SniperSpy and Winspy.
So what are you waiting for? If you’re serious to hack an email account then go grab either of the two keyloggers now!

Saturday, 7 July 2012

Autodesk Maya 2012 X86/X64 100% Active




Autodesk® Maya® 3D animation software delivers an end-to-end creative workflow with
comprehensive tools for animation, modeling, simulation, visual effects, rendering,
matchmoving, and compositing on a highly extensible production platform. Whether
you work in film, games, television, advertising, publishing, or graphic design,
Maya offers state-of-the-art toolsets, combined into a single affordable offering
designed to help meet today’s demanding production requirements. Autodesk® Maya® 2012
delivers new toolsets for previsualization and game prototyping, extended simulation
capabilities, and improved pipeline integration.

Features

Autodesk® Maya® 3D computer animation software delivers an end-to-end creative
workflow with comprehensive tools for animation, 3D modeling, visual effects,
3D rendering, and compositing on a highly extensible production platform.
Autodesk® Maya® 2012 software delivers new features and toolsets for previsualization
and games prototyping, extended simulation capabilities, and improved pipeline
integration. It delivers viewport and sequencer enhancements, node-based render
passes, editable motion trails, and a new library of 80 Substance procedural textures.

System Requirements

For 32-bit Autodesk Maya 2012
Microsoft® Windows® 7 Professional, Microsoft® Windows Vista® Business (SP2),
or Microsoft® Windows® XP Professional (SP3) operating systems
Windows: Intel® Pentium® 4, AMD Athlon™ processor with SSE3 instruction
set support (or higher)
2 GB RAM
10 GB free hard drive space
Qualified hardware-accelerated OpenGL® graphics card
Three-button mouse with mouse driver software
DVD-ROM drive
HDD: IDE, SATA, SATA 2, SAS, SCSI
Microsoft Internet Explorer 7.0 or higher, Apple Safari, or Mozilla Firefox web browsers

For 64-bit Autodesk Maya 2012
Microsoft Windows 7 Professional, Microsoft Windows Vista Business x64 Edition (SP2),
Microsoft Windows XP Professional x64 Edition (SP2), Apple® Mac OS® X 10.6.5,
Red Hat® Enterprise Linux® 5.5 WS, or Fedora™ 14 operating systems
Windows and Linux: Intel Pentium 4, AMD Athlon processor with SSE3 instruction set
support (or higher)
Macintosh® computer: Macintosh computer with Intel-based 64-bit processor
4 GB RAM
10 GB free hard drive space
Qualified hardware-accelerated OpenGL graphics card
Three-button mouse with mouse driver software
DVD-ROM drive
HDD: IDE, SATA, SATA 2, SAS, SCSI
Microsoft Internet Explorer 7.0 or higher, Apple Safari, or Mozilla Firefox web browsers

******************************************************************************
You can mount or create the bootable ISO.
or extract all the files from the disk into afolder and
run "setup.exe" from there.
My testing was done on a 32-bit OS and a 64-bit OS.

******************************************************************************
If you get the "inscert CD #2" error. Create a folder
somewhere on your pc, extract all the files from the disk into the folder.
Use the "setup.exe" from the folder to install the program

****************************************************************************
I use Power ISO, Power ISO is a great program for this, and I always burn software at 4x speed.

Power ISO
Code:
https://www.rapidshare.com/files/415224468/POWER.rar


Magic ISO

Code:
http://www.rapidshare.com/files/412815574/MagicISO_Maker_v5.5.Build.0281.rar

******************************************************************************

1)
Downloaded the files, extrack to create your ISO.
Open the ISO and copy/paste the"Pony-Patch"
folder to your desktop.
Minimize the folder as you will use this as you
proceed with your install.
Image

2)
Run "Setup.exe" if you extracted the ISO files to a folder
or use the "autoplay" if you are using the bootable disk.
I am using the ISO disk
Select your Language
Select "Install"
"I Accept"
"Next"

Image

Image

Image

Image

Image

3)
Select I have my product information
Use there serial Number provided in the patch
folder named "Pony-Patch"
You should have this minimized at this time.

Image

3A)
Enter the serial numbers and product key as shown in the photo.
then click "next"
Select your install
Check "Install"

Image

Image

3B)
Finish the installation and close autodesk

Image

Image

Image

Image


4)
Restart Autodesk Product.

Image

Before clicking on Activate Disconnect from the internet
Before clicking on Activate Disconnect from the internet
Before clicking on Activate Disconnect from the internet


5)
Click on Activate,
Check "I have read the Autodesk Privacy Policy"
Click on "Continue"
Close your Autodesk program.

Image

Image

Image

5B)
Click on Activate,
Check "I have read the Autodesk Privacy Policy"
Click on "Continue"

Image

Image

6)
Pick "I have an activation code from Autodesk"
This will give you a request code, copy and paste(ctrl+c) to notepad. You will need this to get
your activation code
Example none working code.
qgcz z512 jq4d joy6 q95q 4r99 doky gezy

Image

7)
Open the crack folder you have minimized,
start XFORCE Keygen 32bits version if you are installing a 32bits application and
64bits if you are installing a 64bits application.

Image

8)
Click on "Mem Patch" (you should see successfully patched)

Image

9)
Copy the request code into the keygen and press generate
you can use ctrl+c / ctrl+v for copy/paste
This will give you a group of numbers and digits, 50+ in all

Example none working code.
A1B2C3D4E5F6G7H8I9J1K2L3M4N5O6P7Q8R9S1T2U3V4W5X6Y7Z1A2B3

Image

Image

10)
Now copy the activation code, all 50+, into box #1.
This will fill the boxes with the codes.
Then click next..and you are all set.

Image

11)
You know have a working copy of AutoDesk Maya 2012...enjoy

Image

Image

Image

Image


Note: Make sure to run the Keygen as administrator and with UAC off in Vista or Windows7
******************************************************************************

Image

PROGRAM FILES


PROGRAM FILES 

RapidShares - X86 (32 Bit) 
Code:
https://www.rapidshare.com/files/1280321228/AMaya_-__2012__x32.part2.rar
https://www.rapidshare.com/files/2344010401/AMaya_-__2012__x32.part1.rar


RapidShares - x64 (64bit) 
Code:
https://www.rapidshare.com/files/649843821/AMaya_-__2012__x64.part1.rar
https://www.rapidshare.com/files/3445232731/AMaya_-__2012__x64.part2.rar

****************************************************************************
Thank you all for supporting my uploads
--------------------------------------------------------------------------------
Enjoy my AutoDesk/AutoCad Programs