This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Yahoo Chat Commands and some tricks

Chat Command Help

/cls Clears the history

/help Displays this message

/join roomname Joins room 'roomname'

/goto username Goes to 'username'

/think xxx . o O (xxx)

/follow user Follows the user wherever they go

/follow Stop Following

/invite username Invites 'username' to join this room : emotion Displays user defined emotion string

/think-- will get you . o O ( ........ ) just type /think whatever.....and get . o O ( whatever ) ...doesn't seem to work in messenger chat though......java /cheeta/ychat/cheeta users if they just type /think will have a random message inserted
/roll 2-- will get you something like 'fire-wall rolls 2 dice 3,4' ........to roll multisided dice type /roll 2:10
try /roll 2x2 to flip coins

/tell ( name )-- allows you to send a private message with out a pm box
/goto ( name ) lets you go to a friend or another user
/invite ( name )-- allows you to invite a user to where you are
/follow ( name )-- allows you to follow someone
/stopfollow( name )-- stops you following someone else.... no way to stop someone from following you. :cry: :cry:
/cls-- clears the screen
/help-- works great in java chat!!! be prepared for a full screen of info though.
/define-- works in cheeta chat
/time-- works in most clients
/version or /ver --the latter is great for when you need help.........and /version helpers name sends them a private message with the same info so they can help.
/join (roomname) is great for skipping the rooms list......like
/join yahoo! chat help:1

to emote without using the pop up emotes or the list just type /emote name .......like /hug or to emote someone /hug ( name) and to make your text show as an emote .....type a : then whatever.....and your text will look like an emote like Fire-wall hugs you

/ignore add (username) a quick way to send someone to the iggy box.....
/ignore remove (username) can take an accidental ignore off..... or even remove yourself form your own ignore.... don't laugh.... it has happened!!! despite yahoo saying you cant ignore yourself. you can also open messenger, look under privacy, and remove names there.
/save works in all but messenger (click file. then save for messenger chat)........in browser chat make sure you know where it saves the transcript!!!!!
/logoff closes your chat screen and logs you out

XP SETUP -- Microsoft Error codes

Q161703
"Stop: 0x0000001E" Error Message During Setup
Q216251
How to Specify a Specific or Third-Party HAL During Windows Setup
Q217073
Windows Setup Hangs When "Setup Is Starting Windows" Screen Appears
Q220845
Adding Third-Party or Updated Driver During Windows Setup
Q221447
Autologon and AutoLogonCount Parameters for Windows Unattended Setup
Q222939
Windows Setup Does Not Prompt for Installation Folder
Q225125
Windows Setup Does Not Prompt for Installation Folder
Q225125
Limited OEM Driver Support with F6 During Windows Setup
Q238955
How to Use Cmdlines.txt File During Sysprep.exe Setup Wizard
Q242380
How to Use a Command Prompt During GUI-Mode Setup
Q281652
Error Message "Setup Was Unable to Build the List of Files to Be Copied" During a Windows XP Unattended Installation
Q281653
Setup Appears to Stop Responding at the Registering Components Screen During an Unattended Installation
Q282008
Partitions Created by Using PartitionMagic 5.0 Appear Inactive in Windows XP Setup
Q282296
Setup from the 16-Bit Winnt.exe File Continues in an Endless Loop
Q283079
No Mouse or Keyboard Response During Sysprep Mini-Setup
Q283240
Quitting Text-Mode Setup Does Not Restart the Computer
Q283332
Setup Stops Responding Upon Restart After You Install Windows XP to a Partition on an IA64 Computer
Q287546
Missing Files" Error Message During Setup When Deploying Windows XP Images
Q289657
Out of Box Experience (OOBE) Does Not Run After Setup Completes
Q293281
Unpartitioned Space Remains When Creating a Partition During Setup
Q293834
User Accounts That You Create During Setup Are Administrator Account Types
Q295116
A Description of the Windows XP Setup Function Keys
Q296673
Windows Services for UNIX 2.0 Setup Does Not Work on Windows XP
Q296814
Setup Stops Responding (Hangs) During File Copy
Q297837
The CD-ROM Drive May Not Be Accessible During Setup on Computers That Have DirectCD Installed
Q301340
During Setup You Are Unable to Format a Partition with a File Allocation Table Format
Q301933
Error Message: Setup Was Unable to Build the List of Files to Be Copied. The System Cannot Find the Path...
Q302686
Differences Between a Quick Format and Format During Windows XP Setup
Q303466
Master Boot Record Disks Cannot Be Converted to GPT by Means of an Unattended Setup
Q305746
Windows XP Setup Halts When You Start Installation from Within Windows 95
Q305883
Windows Upgrade Advisor Quits Abruptly During System Compatibility Check and No Report Appears
Q307099
STOP 7b Error Occurs When You Press F6 to Load Drivers During Unattended Windows XP Setup
Q307316
Volume License Product ID Is Revealed During the Sysprep.exe Mini-Setup Wizard
Q309800
Serial Mouse Is Not Detected During Windows XP Setup
Q310637
Troubleshooting Invalid CD Key Error Message During Windows XP Setup
Q310760
Windows XP Does Not Respond at "Setup Is Starting Windows XP" Message

What To Do When Windows Wont Boot

When Windows fails to boot it is normally caused by you installing a program or device and it has caused a conflict with one or more other programs. This will no doubt give you plenty of heartaches if you're not certain which program caused Windows to not boot up.If you recently installed a program or application and know where it was installed, you may be in much better shape as for as correcting the error. Here are common ways to correct the problem of your computer not completely booting up or not booting up at all.

If your computer will not boot-up at all, hopefully you have made a good emergency boot disk. You can always make a windows startup disk by creating one from another computer running Windows 98 or Me. Perform the following if your computer won't Boot-Up At All.

FIRST......Put your boot floppy disk in the floppy drive and turn on the PC. On some computers, you may have to access the bios and select the Boot priority to your A: drive.Save any changes and select "Start Computer without CDROM support" and press Enter. Once you are at the A prompt, type dir c: and press enter.If your programs and other files are present, try restoring your system Registry by following the steps below. This may repair Windows, the Config. Sys and autoexec.bat files to where the PC may boot up normally. When the files are present, its a good indication of a good hard drive.

SECOND......To correct the problem of your computer not booting up,type in "fdisk /mbr" and press Enter to restore your master boot record.Type "Scandisk C:" to check the hard drive for errors that have occurred. You can also type "Sys C:" to hopefully restore files needed to boot up your computer.

THIRD......If the above procedures fail to repair your computer,you can repeat the first part of step one above and select "Start Computer With CDROM Support" re-install Windows.

Making A Windows XP Bootable Floppy

Windows XP users should create a boot disk now by placing a formatted blank diskette in the A: drive, open Windows Explorer to the C:,select Tools,Folder Options ,show Hidden files and and folders,then View Tab.

Now you uncheck "Hide Protected Operating System Files (recommended).You will see a warning and click Yes and click OK.Copy the files ntldr,ntdetect.com and boot.ini onto the disk.Remove the disk and label it the Windows XP Boot Disk.

After making your boot disk,recheck "Hide protected operating system files and folders (recommended)" in the Folder Options dialog box.To use the disk when Windows XP won't boot,place the disk in the drive,and then re-boot,the computer, Windows simply bypass the basic boot files on the hard drive and continue to boot up.

If The PC Won't Boot Pass Windows

FIRST......If your Operating System is Windows Millennium, turn on the computer and immediately press and hold down the CTRL key. Once the startup options appear, release the CTRL key. Select Safe Mode and press Enter. You are now in Windows limited version. If you know what caused your computer not to boot,you can now either change or delete that program.

SECOND....Repair your Registry by selecting Start,Run and typing "scanregw /fix" and press enter.This will fix any damage done to the Registry. You can also restore your registry which replaces your current registry with an earlier copy that was backed up by your computer.Click on Start,Run and type "scanregw /restore and press Enter.

To repair your Windows 98 Registry, hold down the CTRL key as you start the PC and select "Command Prompt Only". Type "scanreg /fix" and press Enter and "scanreg/restore" to restore a previousely saved copy of the Registry.

If you have Windows XP, press F8 after rebooting the PC should Windows freeze while booting up. You can select "Last Known Good Configuration" after rebooting to allow the computer to boot the last backed up files. And you can choose "Safe Mode" to remove any files you know caused the operating system to hang up.Be prepared when your operating system fail. It would be a great idea to go over this article a few times and print it. Make yourself s notebook and place this and all related articles there.

About The Author

Otis F. Cooper is solely dedicated to boosting the knowledge and confidence of every computer user that is serious about knowing computers.

Vodafone manual GPRS settings

Here follows manual settings of Vodafone GPRS:

For Karnataka & Andhra Pradesh: (This setting is tested by myself in Bangalore)

Account Name: Vodafone_gprs
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)

Access Point Settings:

Proxy: Enabled
Proxy Address: 10.10.1.100
Proxy Port: 9401
Data Bearer: Packet Data

Bearer Settings:

Packet Data Access Point: portalnmms
Network type: IPV4
Authentication: normal
User Name: (no need)
Password: (no need)

For Tamil Nadu:

Account Name: Vodafone_gprs
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)

Access Point Settings:

Proxy: Enabled
Proxy Address: 10.10.1.100
Proxy Port: 9201
Data Bearer: Packet Data

Bearer Settings:

Packet Data Access Point: portalnmms
Network type: IPV4
Authentication: normal
User Name: (no need)
Password: (no need)

Using Gmail account to monitor and handle all your separate email accounts

I use Gmail account as one of my main accounts to handle most of my important and personal email . I use multiple Gmail accounts as well apart from using domain based accounts. So I use Gmail's feature of handling multiple accounts for "Send As" feature and mail forwarding feature.

So what do we need as solution?

A single mail account where all the mail from multiple email accounts are forwarded, in which mail messages can be filtered in separate labels and mail messages can be replied from the email address it was sent to

Solution:-

1. 1 Gmail account
2. Multiple Gmail or hosted domain accounts which can be forwarded to your mail Gmail account
3. Mail forwarding and "Accounts" feature within Gmail
4. Creating labels in Gmail based on "Email Account" that the message comes from

Using three simple steps you can manage all from email accounts from a single account and use the base account as a email backup account for the respective email addresses.

The exact steps are detailed on Google Tutor Post.

I have to tell that this has been functioning very well for me for quite some time now. I only wish that I can easily forward my Hotmail email messages to Gmail .

USB to Nokia Safe Charger


This simple project shows you how to make a USB powered Nokia cell phone charger. The advantage is that it weighs much less than the bulky AC adaptor, and can be used wherever you have a computer or a laptop. I use this thing all the time now!

What do I mean by “safe charger”? Honestly I’m not sure. I’m just going on what I was able to infer from what I read off my multimeter. What I found was that the voltage across the nokia charge pins was rapidly fluctuating from Vdd to about 4 volts above Vdd. It would not do to have ~9 volts injected into a 5 volt bus! Thankfully, all you need to do is stick a diode in there and that’s that. So the diode might not be needed, but it’s safe! Thus, “Safe Charger”.



So far, it charges my phone just fine, but slightly slower than the wall wart that came with it. I think so, anyway.

Step one: strip off the shielding and insulation on an inch or so of the usb cable. Clip the white and green cables to uneven lengths so they can’t conduct into each other or either of the power lines. Hopefully you should be left with a black wire and a red wire.

Step two: Clip off a length of the nokia chargers phone-side plug. You won’t be needing the wall wart part anymore. Strip off the insulation from the nokia plug wire. Hopefully you should have a red wire and a black one. the red wire should be connected to the inner barrel of the plug, and the black one should be connected to the outer barrel.

Step three: Attach a normal silicon diode (not a zener diode) with the line part towards the nokia plug. It should go between the red wires from both cables . Attach the black wires from each cable together.

I suggest staggering the lengths of the wires so that the solder joints have less chance of coming into contact.

Check all the wires with a multimeter to make sure they are really the right ones! The colors might not be standard...









Step four: cover that baby in hot glue! Yeah!




Step five: Cover that nogoodnick cable in electrical tape!

That’s it!

USB BackTrack Linux installation

BackTrack is a Live Linux distribution based on SLAX that is focused purely on penetration testing. Distributed by remote-exploit.org, BackTrack is the successor to Auditor. It comes prepackaged with security tools including network analyzers, password crackers, wireless tools and fuzzers. Although originally designed to Boot from a CD or DVD, BackTrack contains USB installation scripts that make portable installation to a USB device a snap. In the following tutorial, we cover the process of installing BackTrack to a USB flash drive from within a working Windows environment.

BackTrack running from USB Screenshot:

BackTrack in action running from USB

How to install BackTrack to a USB device:

1. Download the (Portable Backtrack) USB BackTrack version
2. Extract the Boot and BT3 folders to the root of your USB device
3. Navigate to the Boot folder on your "USB device" and click bootinst.bat (click continue if the following error appears)

BackTrack Error
4. Follow the onscreen instructions to make the device bootable
5. Once the USB install script has finished, reboot your computer and set your BIOS or Boot Menu to boot from the USB device

Enjoy!

UNLOCK PASSWORD PROTECTED MEMORY CARD

Well its quite simple but most of the people do not know it.

Please note the fact that it only works if the password to the MMC Card was set in ur own mobile,where u want it to be unlocked.

This method works well for nokia cells with symbian operating system.Never tried on other cells.use any software like FXplorer that can browse files in ur cell.

1. Open one of above software you have.
2. Browse through the directory, C:\system
3. Rename the file mmcstore to mmcstore.txt
4. Open the file - The file will open in Notes.
5. You will find your password in that file. That file would also contain much more data which you do not understand,so you need to go through the file to get the password!

When ur cell is connected to pc by means of data cable or bluetooth,u can see the password by simply opening the file mmcstore with notepad. Laughing

The Next Generation Of Online Fraud Protection

Today's online world is one fraught with danger. At every turn internet users are faced with phishers, hackers, fraud and the threat of identity theft. This creates an atmosphere where users are not comfortable purchasing things online and merchants are being taken advantage of on a regular basis.

The Cybersource 8th Annual Online Fraud Report estimates that over $3 billion in online revenues was lost due to online fraud. The Internet Crime Complaint Center or IC3, which is a partnership of the FBI and the National White Collar Crime Center, stated in its annual report that there was $198.44 million lost by consumers in the fraud cases that they referred to law enforcement agencies in 2006. The average loss per complaint was just over $2500.00. Both buyers and sellers lose when online businesses are vulnerable to ill intentioned web users.

There are generally 2 types of fraudulent orders that are placed online. First there is an order that is being placed merely to check the validity of the stolen credit card information. A criminal will go to a website where he knows that the credit card is going to be billed immediately for products and services. They will place an order for something that is usually about $100.00 or less. Once the order goes through and the credit card is successfully billed, they know the stolen information is valid. Then they are free to place the second kind of order where they are actually looking to receive the products that they purchase with the stolen credit card information.

Currently, some of the most popular online fraud protection solutions include address verification, card verification number (CVC2, CVV2, CID depending on the card issuer), and IP geolocation. The downside to these solutions is that the address and card verification number can both be stolen along with the credit card number and IP addresses can be masked. 81% of online merchants also use manual order verification. Besides the increased costs associated with the extra time and staff that it takes to manually review the orders, it also slows down the order process and extends delivery times.

Traditional solutions allow the fraudulent order to be placed and then attempt to weed them out afterwards. The next generation of automated online fraud protection solutions deter the perpetrator from placing the fraudulent order in the first place. Taking the crook completely out of the equation allows online merchants to focus resources on fulfilling genuine orders and servicing current customers.

One of these next generation fraud protection solutions that is gaining popularity among online merchants is televerification. Televerification works like this: When the customer goes to place an order, they are asked for their telephone number. An automated telephone call is then placed to the customer and they are given a unique security code, either through automated message or SMS. They then enter that unique code into the appropriate place on the web site in order to proceed with their business. The process is quick and easy, yet the protection it affords businesses and their customers is extremely effective.

Requiring the confirmation of a workable, traceable telephone number lessens the attractiveness of that particular online business to ill intentioned users. Criminals are leery about providing a legitimate phone number that can be traced back to them. The benefits that are inherent to implementing any automated fraud protection solution for online merchants still apply: reduced chargeback costs, reduced manual verification costs and increased user confidence. The difference with televerification is that instead of catching the fraudulent order after it has come in, it stops them at the door.

An additional benefit of televerification is the ease of which it can be integrated into an online merchant's existing website. All it takes is adding a few lines of code to an existing site that will allow it to interact with a televerification provider's server. Most applications can be up and running within hours, not days or weeks like some solutions.

With eCommerce growing 20% or more each year, fraud protection for merchants and customers becomes an ever increasingly vital issue for the entire online community. Billions of dollars are lost every year due to criminals taking advantage of the anonymity that the Internet offers. Previously, online merchants could only try to weed the fraudulent orders out from the good ones as they came in. The next generation of fraud protection allows online merchants the opportunity to stop the fraudulent orders from ever being placed.

telnet hacking part--1

******************************************************
In this Article you will learn how to:
* Use telnet from Windows
* Download web pages via telnet
* Get finger information via telnet
* Telnet from the DOS command-line
* Use netcat
* Break into Windows Computers from the Internet
Protecting Yourself
What can they do
The command-line approach
The GUI approach
Final Words (Rahul)
************************************************************

How to Use Telnet on a Windows Computer


Telnet is great little program for doing a couple of interesting things. In fact, if you want to call yourself a hacker, you absolutely MUST be able to telnet! In this lesson you will find out a few of the cool things a hacker can do with telnet.
If you are using Win95, you can find telnet in the c:\windows directory, and on NT, in the c:\winnt\system32 directory. There isn't a lot of online help concerning the usage of the program, so my goal is to provide some information for new users.
First off, telnet isn't so much an application as it is a protocol. Telnet is protocol that runs over TCP/IP, and was used for connecting to remote computers. It provides a login interface, and you can run command-line programs by typing the commands on your keyboard, and the programs use the resources of the remote machine. The results are displayed in the terminal window on your machine, but the memory and CPU cycles consumed by the program are located on the remote machine. Therefore, telnet functions as a terminal emulation program, emulating a terminal on the remote machine.
Now, telnet runs on your Win95 box as a GUI application...that is to say that you can type "telnet" at the command prompt (in Windows 95 this is the MS-DOS prompt), and assuming that your PATH is set correctly, a window titled "telnet" will open. This differs from your ftp program in that all commands are entered in the DOS window.
Let's begin by opening telnet. Simply open a DOS window by clicking "start", then "programs", then "MS-DOS", and at the command prompt, type:
c:\telnet
The window for telnet will open, and you can browse the features of the program from the menu bar.


***************************************************
NEWBIE NOTE: In this text file, I am referring only to the telnet
program that ships with Win95/NT. If you type "telnet" at the
command prompt and you don't get the telnet window, make sure
that the program is on your hard drive using the Start -> Find ->
Files or Folders command. Also make sure that your path statement includes the Windows directory. There are many other programs available that provide similar functionality, with a lot of other bells and whistles, from any number of software sites.
*************************************************


To learn a bit more about telnet, choose Help -> Contents, or
Help -> Search for help on... from the menu bar. Read through
the files in order to find more detailed explanations of things
you may wish to do. For example, in this explanation, I will
primarily be covering how to use the application and what it can
be used for, but now how to customize the colors for the application.
Now, if you choose Connect -> Remote System, you will be presented with a dialog window that will ask you for the remote host, the port and the terminal type.
****************************************************
NEWBIE NOTE: For most purposes, you can leave the terminal type on
VT100.
****************************************************
In the Connect dialog box, you can enter in the host to which
you wish to connect, and there is a list box of several ports
you can connect to:
daytime: May give you the current time on the server.
echo: May echo back whatever you type in, and will tell you that the computer you have connected to is alive nd running on the Internet. qotd: May provide you with a quote of the day.
chargen: May display a continuous stream of characters, useful for spotting network problems, but may crash your telnet program.
telnet: May present you with a login screen.
These will only work if the server to which you are trying to connect is running these services. However, you are not limited to just those ports...you can type in any port number you wish. (For more on fun ports, see the GTMHH, "Port Surf's Up.") You will only successfully connect to the port if the service in question is available. What occurs after you connect depends upon the protocol for that particular service.
When you are using telnet to connect to the telnet service on a server, you will (in most cases) be presented with a banner and a login prompt.
[Note from Carolyn Meinel: Many people have written saying their telnet program fails to connect no matter what host they try to reach. Here's a way to fix your problem. First -- make sure you are already connected to the Internet. If your telnet program still cannot connect to anything, here's how to fix your problem. Click "start" then "settings" then "control panel." Then click "Internet" then "connection." This screen will have two boxes that may or may not be checked. The top one says "connect to the Internet as needed." If that box is checked, uncheck it -- but only uncheck it if you already have been having problems connecting. The bottom box says "connect through a proxy server." If that box is checked, you probably are on a local area network and your systems administrator doesn't allow you to use telnet.]
*********************************************

NEWBIE NOTE: It's not a good idea to connect to a host on which you don't have a valid account. In your attempts to guess a username and password, all you will do is fill the log files on that host. From there, you can very easily be traced, and your online service provider will probably cancel your account.
**********************************************
Now, you can also use telnet to connect to other ports, such as
ftp (21), smtp (25), pop3 (110), and even http (80). When you
connect to ftp, smtp, and pop3, you will be presented with a
banner, or a line of text that displays some information about the
service. This will give you a clue as to the operating system
running on the host computer, or it may come right out and tell
you what the operating system is...for instance, AIX, Linux,
Solaris, or NT. If you successfully connect to port 80, you will
see a blank screen. This indicates, again, that you have successfully completed the TCP negotiation and you have a connection.
Now, what you do from there is up to you. You can simply disconnect with the knowledge that, yes, there is a service running on port 80, or you can use your knowledge of the HTTP protocol to retrieve the HTML source for web pages on the server.
How to Download Web Pages Via Telnet
To retrieve a web page for a server using telnet, you need to connect to that server on port 80, generally. Some servers may use a different port number, such as 8080, but most web servers run on port 80. The first thing you need to do is click on Terminal -> Preferences and make sure that there is a check in the Local Echo box. Then, since most web pages will generally take up more than a single screen, enable logging by clicking Terminal -> Start Logging... and select a location and filename. Keep in mind that as long as logging is on, and the same file is being logged to, all new information will be appended to the file, rather than overwriting the
original file. This is useful if you want to record several sessions, and edit out the extraneous information using Notepad.
Now, connect the remote host, and if your connection is successful, type in:
GET / HTTP/1.0
and hit enter twice.
**************************************************
NEWBIE NOTE: Make sure that you hit enter twice...this is part
of the HTTP protocol. The single / after GET tells the server
to return the default index file, which is generally "index.html".
However, you can enter other filenames, as well.
*************************************************

telnet hacking part ---2

The blank screen indicates that the finger daemon is waiting for input. If you have a particular user that you are interested in, type in the username and hit enter. A response will be provided, and the daemon will disconnect the client. If you don't know a particular username, you can start by simply hitting enter. In some cases, you may get a response such as "No one logged on." Or you may get information of all currently logged on users. It all depends on whether or not the sysadmin has chosen to enable certain features of the daemon. You can also try other names, such as "root", "daemon", "ftp", "bin", etc.
Another neat trick to try out is something that I have seen referred to as "finger forwarding". To try this out, you need two hosts that run finger. Connect to the first host, host1.com, and enter the username that you are interested in. Then go to the second host, and enter:
user@host1.com
Now, if you want to show your friends that you a "real man" because "real men don't need no stinkin' GUIs", well just open up a DOS window and type:
c:\>telnet
and the program will automatically attempt to connect to the host
on the designated port for you.
Using Netcat
Let me start by giving a mighty big thanks to Weld Pond from L0pht for producing the netcat program for Windows NT. To get a copy of this program, which comes with source code, simply go to:
http://www.l0pht.com/~weld
NOTE: The first character of "l0pht: is the letter "l". The second character is a zero, not an "o".
I know that the program is supposed to run on NT, but I have
seen it run on Win95. It's a great little program that can be used
to do some of the same things as telnet. However, there are
advantages to using netcat...for one, it's a command-line program,
and it can be included in a batch file. In fact, you can automate
multiple calls to netcat in a batch file, saving the results to
a text file.
**************************************************
Before using netcat, take a look at the readme.txt file provided in
the zipped archive you downloaded. It goes over the instructions
on how to download web pages using netcat, similar to what I
described earlier using telnet.
There are two ways to go about getting finger information using
netcat. The first is in interactive mode. Simply type:
c:\>nc 79
If the daemon is running, you won't get a command prompt back. If this is the case, type in the username and hit enter. Or use the automatic mode by first creating a text file containing the username of interest. For example, I typed:
c:\>edit root
and entered the username "root", without the quotes. Then from
the command prompt, type:
c:\>nc 79 < root
and the response will appear on your screen. You can save the
output to a file by adding the appropriate redirection operator
to the end of the file:
c:\>nc 79 <> nc.log
to create the file nc.log, or:
c:\>nc 79 <>> nc.log
to append the response to the end of nc.log. NOTE: Make sure
that you use spaces between the redirection operators.

How to Break into a Windows machine Connected to the Internet

Protecting Yourself
First, the method of protecting yourself needs to be made perfectly clear. DON'T SHARE FILES!! I can't stress that enough. If you are a home user, and you are connecting a Win computer to the Internet via some dial-up method, disable sharing. If you must share, use a strong password...8 characters minimum, a mix of upper and lower case letters and numbers, change the password every now and again. If you need to transmit the
password to someone, do so over the phone or by written letter. To disable sharing, click on My Computer -> Control Panel -> Network -> File and Print Sharing. In the dialog box that appears, uncheck both boxes. It's that easy.

** The command-line approach **
Okay, now for the part that should probably be titled "How they do it". All that is needed is the IP address of the remote machine. Now open up a DOS window, and at the command prompt, type:
c:\>nbtstat -A [ip_addr]
If the remote machine is connected to the Internet and the ports used for sharing are not blocked, you should see something like:
NetBIOS Remote Machine Name Table
Name Type Status
---------------------------------------------
NAME <00> UNIQUE Registered
DOMAIN <00> GROUP Registered
NAME <03> UNIQUE Registered
USERNAME <03> UNIQUE Registered
MAC Address = 00-00-00-00-00-00
This machine name table shows the machine and domain names, a logged-on username, and the address of the Ethernet adapter (the information has been obfuscated for instructional purposes).
**Note: This machine, if unpatched and not protected with a firewall or packet-filter router, may be vulnerable to a range of denial of service attacks, which seem to be fairly popular, largely because they require no skill or knowledge to perpetrate.
The key piece of information that you are looking for is in the Type column. A machine that has sharing enabled will have a hex code of "<20>".
If you find a machine with sharing enabled, the next thing to do is type the following command:
c:\>net view \\[ip_addr]
Now, your response may be varied. You may find that there are no shares on the list, or that there are several shares available. Choose which share you would like to connect to, and type the command:
c:\>net use g: \\[ip_addr]\[share_name]
You will likely get a response that the command was completed successfully. If that is the case, type:
c:\>cd g:
or which ever device name you decided to use. You can now view what exists on that share using the dir commands, etc.
Now, you may be presented with a password prompt when you ssue the above command. If that is the case, typical "hacker" (I shudder at that term) methods may be used.
c:\windows\lmhosts.sam
Read over the file, and then open create another file in Notepad, called simply "Lmhosts", without an extension. The file should contain the IP address of the host, the NetBIOS name of the host (from the nbtstat command), and #PRE, separated by tabs. Once you have added this information, save it, and minimize the window. In the DOS command window, type:
c:\>nbtstat -R
This command reloads the cache from the Lmhosts file you just created.
Now, click on Start -> Find -> Computer, and type in the NetBIOS name of the computer...the same one you added to the lmhosts file. If your attempt to connect to the machine is successful, you should be presented with a window containing the available shares. You may be presented with a password prompt window, but again, typical "hacker" (again, that term grates on me like fingernails on a chalk board, but today, it seems that it's all folks understand) techniques may be used to break the password.
************************************************
You friend can learn his or her IP address by going to the DOS prompt while online and giving the command "netstat -r". Something like this should show up:
C:\WINDOWS>netstat -r
Route Table
Active Routes:
Network Address Netmask Gateway Address Interface Metric
0.0.0.0 0.0.0.0 198.999.176.84 198.999.176.84 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
198.999.176.0 255.255.255.0 198.999.176.84 198.999.176.84 1
198.999.176.84 255.255.255.255 127.0.0.1 127.0.0.1 1
198.999.176.255 255.255.255.255 198.999.176.84 198.999.176.84 1
224.0.0.0 224.0.0.0 198.999.176.84 198.999.176.84 1
255.255.255.255 255.255.255.255 198.999.176.84 0.0.0.0 1
Your friend's IP address should be under "Gateway Address." Ignore the 127.0.0.1 as this will show up for everyone and simply means "locahost" or "my own computer." If in doubt, break the Internet connection and then get online again. The number that changes is the IP address of your friend's computer.

Send Free SMS InternationaL

First of all i wannna tell you i am not joking , this is true by a simple trick or you can say hack or anything else you can send all sms free Abroad also....
I try it myself and sends more than 1000 Sms free International like Africa, Australia , Usa , France ........
The trick is the following:-
1. Must have Airtel connection or you should have the connection in which your Balance doesnot go into negative like in Hutch if we have have balance like 2 or 3 Rs then if you make a call or use GPRS there balance goes into negative , these days In Airtel also balance goes into negative but in some case the don't.
2. This Hack or you can say the trick you can use only on Nokia 2600 , well i use on that phone only try it on 1110 but no use on that phone.
3. The Advantage of this phone is that you can send 2 or 3 or more sms Simontaniously , this all happens like this , in Nokia 2600 when you send sms there will be a bar on your phone that message is sending so at that time if you click any button that nag screen disappears and if you have speed you can send one more sms while sending the previous one.
4. In Airtel , when i was very addicted to send sms to ma friends i find that when you have balance less than Rs 5 then you can send one free sms anywhere in the world but just only one , by this i came to knwo about the Airtel weak security and servers.
5. Now we do like this first of all go to any Airtel dealer and have free sms pack. And then save the international no. on your phone by which you can find it easily (i tried using it blank or .123.... goes on) now save your no. or any friend no you want and left the name blank or simple digits , now write a text message and send it to you or your friend , and when you can see the nag screen saying the message is sending , at that time click the main menu button and again send the message to your Abroad friend at any country , you must have speed or else the second msg will not go... NOTE You can send 1 message, if in your mobile if you see the upper right corner if it says message sending into two parts then it will not go only one message can go . After doing this the message to your friend who is in abroad will recieve the message like you receive the message of your friend but the best thing is its all free , the Airtel will think that you have send both the message in India only because you was too fast that you send 2 message at a time one to India and one to Abroad whihc they cannot detect...
So enjoy sending free Sms!!!!!!!

Send anonymous msg to victim via Bluetooth with out his permission.

Utility Name: Freejack
Features: Bluejacking tool written in JAVA
Download URL: http://www.software13.co.uk/freejack/

Reinstalling + Formating Operating system

Ever since Microsoft came with their tightened up firewall in the present Microsoft OS VISTA...things have become a bit time consuming and fadish[yeah!! i am talking about the screen turning fade with every second firewall yes/no or allow /disallow and the most frequent of them all 'NOT Responding'
Ok, by mistake will playing with Task Manager[Cntrl + Shift + Esc ] and some arbit game i was playing stopped responding. And there i saw a change in Processes tab in Task Manager "WinFault" down in the list. So, if somthing like this happens next time with you, A Not Responding message comes up and your close the application followed by End Now crap...You just open your Task Manager,click on Processes ,scroll down to WinFault and Select it and click on end process....Thats it!!! YOUR PROBLEM SOLVED !!!


Yippeeee...Keep visiting for more!!

Enter your email address:

Reinstalling + Formating Operating system

#1 Backing up files

If you have a habit of saving all the files in My Documents, This is your first step. Check out all possible folders like My Pictures, My Music and copy whichever is required to some other folder. You will loose data as they are in same drive where you will install the OS.

#2 Saving your configuration and profile files

In most of the software’s the facility to backup profiles or software configuration is present. Now in case you are going to install the software after re installation, You ,must do it so that you don’t loose your optimized settings and save time.

#3 Saving all your download folders and files

By default all softwares and settings are made to save files somewhere in C directory. Now lets say you downloaded a complete setup of itunes which is around 50 MB and saved in C:\download, If you don’t back it up you will have to re download that which will be ultimate waste of time.

So in case you have any thing like this save it.

#4 Re think on Partition Size.

Now lets say You have re installed as you don’t have much space left and You decided to reinstall everything and install only the required once to save space. Since you are going to re install its a better idea to increase the size of you partition . You might need some professional help or somebody who knows how to do this, but it will help you in long run.

#5 Note down things you need to install after this

Now since we have backed up everything and its ready to go . This one step you must follow.

Make a list of things you will be installing after reinstallation is over. Here is QUICK LIST

  • DRIVERS
  • Antivirus and Spywares
  • Browsers and addons.
  • Office Suites
  • Media Players and updates.
  • Rest of the things.

It gives you an idea of general things, You can change the list according to your need

Steps after reinstallation

Photoshop Cs2

Is Photoshop CS2 worth the upgrade? You bet it is! Here are just 10 things you can do with this fantastic new version of Photoshop that were impossible (or difficult) to do with previous versions:

Manipulate objects in the Adobe Bridge

This new generation of file browser enables you to look at photographs and artwork in detail before you open the file, process multiple Camera Raw images, flip through pages in PDF documents, size, rate and organize your work in a convenient and highly user-friendly way. Goes way beyond the capabilities of the File Browser introduced in Photoshop 7.

Get rid of imperfections with the Spot Healing Bush

The Spot Healing brush enables you to get rid of slight imperfections - like dust or scratches at the click of a mouse. Unlike the Healing Brush or Patch tools, you don't have to find a source point first.

Remove "red-eye" in an instant. With older versions of Photoshop, removing red-eye and pet-eye was possible, but it wasn't easy. Now, one click of the Red Eye removal tool can remove pet-eye and red-eye from your photographs, in less time than it takes your subject to say "cheese!".

Perform non-destructive scaling with Smart Objects. You know how it is: You try to make an imported object larger, and it goes all blurry and pixelated. With Smart Objects, that's a thing of the past, because you can scale, warp and rotate vector graphics in a non-destructive way.

Do neat things in perspective with the new Vanishing Point feature. With Vanishing point you can cut and paste in perspective. Now you're able to turn a photograph of a wall into a "virtual art gallery" with all the pictures correctly skewed, or move a window from one side of a building to another and, because the perspective is correct, have it look like it's always been there. You can also draw lines that taper off into the distance - wide nearest the camera, narrow further away - just like in "real life".

Get more accurate printing. With Photoshop CS2, the people at Adobe have improved the printing workflow. Now it's even easier to configure your inkjet printer to get more accurate color printing.

Customize menus and workspaces. Photoshop CS2 lets you highlight commonly used menu items, and set up custom menus and workspaces. Now all the power of Photoshop is (literally) at your command, and can be tailored to your requirements.

See what each font looks like before you use it. Finally! Photoshop gets a WYSIWYG font drop-down menu. Now you don't have to keep text highlighted while you cycle through all the fonts until you get to the right one!

Manipulate images with Image Warp. Image Warp allows you to bend, peel, and stretch images the same way as type. Now you can put an image on a mug or soda can with ease.

See what video graphics will look like, while you're doing them. If you're a video professional , you'll know how frustrating it can be: You make a graphic that looks fantastic on a flat computer monitor, but when you import the .psd file into your Avid timeline, and look at it on the TV screen, it's not quite what you had in mind. You then have to go back into Photoshop and make your artwork look "wrong", so it will look right on a video monitor. With Photoshop CS2 you can preview your images on a video monitor directly from the software, and see exactly how they're going to look in your video, even if your editing software is on a different computer. Neat eh?

Outlook Tips: One of the coolest and most useful Outlook tip

Did Forget to mention subject while writing an official email?
Sometimes YES, and that too when we send some important mails.
It happens accidentally. Don't worry...
Just follow the below steps & see the result.
1. Open your outlook and press Alt+F11 (this opens the Visual Basic editor)
2. On the Left Pane you'll see "Microsoft Outlook Objects", expand this. Now one can see the "ThisOutLookSession".
3. Click on "ThisOutLookSession" then copy and Paste the code below in the right pane. (Code Pane)
*****************************************************************************************************************
Private Sub Application_ItemSend(ByVal Item As Object, Cancel As Boolean)
If Len(Item.Subject) = 0 Then
Prompt$ = "Subject is Empty. Are you sure you want to send the Mail?"
If MsgBox(Prompt$, vbYesNo + vbQuestion + vbMsgBoxSetForeground, "Check for Subject") = vbNo Then
Cancel = True
End If
End If
End Sub
*****************************************************************************************************************
You are Done..
Next time You will not send a mail without a Subject in it..
Whenever you start outlook it will prompt you for enabling Macros where you select Yes.

Posted by jai at 1:15 AM 1 comments

Outlook Tips: Remove all items from Calendar

Follow the steps given below to remove all items from calendar..
Note: This method removes all items without asking for a confirmation. So use with caution.
1. Go to Calendar view using Shortcut Ctrl+2.
2. Go to View -> Arrange By -> Current View -> By Category.
3. Click on any one of the small calendar icons on the left-most row.
4. Select all items using Shortcut Ctrl+A.
5. Press 'Delete' or right-click and select delete in it.
You may go back to the usual Calendar 'View' mode by going to View -> Arrange By -> Current View -> Day/Week/Month.
You may go back to 'Mail' mode by clicking on the 'Mail' and then 'Folder List' buttons or using Shortcuts Ctrl+1 and then Ctrl+6.

Outlook Tips: Recovering Shift+Deleted mails

Follow the steps given below to Retrieve the mails deleted using Shift+Delete option..
MS Outlook 2000 and 2003 soft deletes the mails.
That is all copies of deleted mails including Shift+deleted are stored in PST file and can be recovered manually using the Recover Deleted Items option from the Tools menu

To Enable these Options:
By default this option is disabled in MS Outlook.
Use the following steps to enable this option..
1.Close Outlook
2.Open Windows registry editor (Run -> regedit)
3.Browse to My Computer\HKEY_LOCAL_MACHINE\Software\Microsoft\Exchange\Client\Options registry key
4.On the Edit menu, point to New, and then click DWORD Value.
Type the name DumpsterAlwaysOn (Note: Case sensitive Do not type any spaces in the name).
5.Set the DWORD value to 1 to turn the Recover Deleted Items menu choice on for all folders or enter 0 to turn it off.
6.Restart Outlook.

Note:This procedure can recover mails which were deleted by pressing shift+del in the past 4 days only.
All the Windows registry changes if incorrectly done may damage your system.

Outlook Tips: Recalling Mails Sent

Follow the given steps below to Recall the sent mails..
1.Go to the Sent Items folder.
2.Open the message to be recalled.
3.Actions -> 'Recall This Message'.
4.To recall the message -> 'Delete unread copies of this message'
5.To replace the message -> 'Delete unread copies and replace with a new message'
6.To be notified about the success of the recall or replacement, select 'Tell me if recall succeeds or fails for each recipient' check box.

If there are multiple recipients, you can request notification of whether the recall succeeded or failed for each one (so that you can take necessary steps).

Note: Even after successfull recalling of the message, the recipient still knows that you sent a message and then recalled it. Further more this will work only for mails sent within the a company or a Domain, others will get a plain text mail stating that you attempted to recall.

MMC Console Window Keyboard Shortcuts

MMC Console Window Keyboard Shortcuts
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)

Mail formats- Plain text, Rich text and HTML

Plain Text– Rich Text – HTML?

Why is it that in some messages that you reply to, you can change the font and make standard formatting changes just like a word processor but others you can not? The format of the message determines the flexibility you have when replying to or creating a new email message. There are three standard formats for an email message. They are described below.

* Plain Text - A plain text message is an email message that does not include colors, fonts or formatting. It is the most basic type of email that is easily readable by all e-mail clients today. It does not support pictures displayed directly in the message body (although you can include them as attachments).

* Rich Text - Outlook Rich Text Format (RTF) is a Microsoft format that only some e-mail programs understand, mainly the Microsoft Office Outlook clients. You can use RTF when sending messages within a company that uses Microsoft Exchange Server ( i.e. OSU). RTF supports text formatting, including bullets, alignment, and links.

* HTML Format – HTML supports text formatting, numbering, bullets, alignment, horizontal lines, pictures (including backgrounds), HTML styles, stationery, signatures, and linking to Web pages. This type of format provides the greatest range of formatting possibilities.


When using Outlook, how do I make changes or choose a Format?

How to change the format of your message depends on if you have Word as your email editor. To determine if Word is your editor, do the following:
In Outlook Click Tools – Options
Click on the Mail Format tab
If the "Use Microsoft Word to edit email messages" is checked then Word is your editor. Please use the instructions below for MS Word as your editor.
Otherwise please use the instructions below for Word is not your editor.

MS Word as your editor
When composing a message with Word as your email editor you have the option of creating a message in Plain Text, Rich Text or HTML Format. In the email, you can choose your format via the format toolbar drop down menu.

MS Word is not your editor

If Word is not your email editor, select the Format menu in the email and click the format you would like to use - Plain Text, Rich Text , or HTML.

When replying to an email message, you can also change the message format. With the message open, select the Format menu; click the format you would like to use (Plain Text, HTML, or Rich Text).
When should you use one type of format over another?

Rich Text can be used in place of Plain text when you are in an environment that uses one of the Microsoft Outlook email clients. CN recommends using Rich Text formatted messages to give you additional formation features. Email clients that can't support rich text formatted messages will simply drop the formatting and show them in plain text.

HTML formatting should only be used when there is a need to insert graphics or specifically format a message to look a certain way. While Outlook can display HTML messages please keep in mind that not all e-mail programs can.

If you have questions about the different formats or would like advice on which format is best to use please contact your CN support team.
Take the complete training here http://tss.oregonstate.edu/cn/soft_tips/docs/outlook/?page=mail-format&type=normal

Posted by jai at 6:30 AM 1 comments

Friday, December 21, 2007
Some Usefull RSS:

Add these RSS feeds to your Web pages and keep them updated.
101 Cookbooks
http://www.101cookbooks.com/index.rdf
About Today
http://z.about.com/6/nl/rss/todaysl.xml
BusinessWeek Online
http://www.businessweek.com/rss/bwdaily.rss
CNN.com Recently Published/Updated -
http://rss.cnn.com/rss/cnn_latest.rss
Cricinfo cricket news
http://www.cricinfo.com/rss/index.rdf
CyberMedia India Online Limited - IT News
http://www.ciol.com/RSS/CIOL-ITNews.xml
Dictionary.com Word of the Day
http://dictionary.reference.com/wordoftheday/wotd.rss
Discovery News Top Stories : Discovery Channel http://dsc.discovery.com/news/topstories.xml
Engadget
http://www.engadget.com/rss.xml
ESPN.com
http://sports.espn.go.com/espn/rss/news
Expressindia
http://www.expressindia.com/syndications/ei.xml
Fodor's Travel Wire
http://www.fodors.com/blog/index.rdf
Fool.com: The Motley Fool
http://www.fool.com/About/headlines/rss_headlines.asp
Forbes.com: Most popular stories
http://www.forbes.com/feeds/popstories.xml
Funny Quote of the Day
http://www.brainyquote.com/link/quotefu.rss
Hilarious Jokes on Funtoosh.com
http://www.funtoosh.com/rss/latest_jokes.php
International Herald Tribune
http://www.iht.com/rss/frontpage.xml
Medindia Health News
http://www.medindia.net/rss2.0/rss.xml
News items on ZDNet
http://news.zdnet.com/2509-1_22-0-5.xml
News-Indiatimes Cricket
http://cricket.indiatimes.com/rssfeeds/864838.cms
Official Gmail Blog
http://gmailblog.blogspot.com/atom.xml
Official Google Blog
http://googleblog.blogspot.com/atom.xml
orkut Blog
http://en.blog.orkut.com/atom.xml
Quote of the Day
http://www.brainyquote.com/link/quotebr.rss
Reuters: Oddly Enough
http://www.reuters.com/rssFeed/oddlyEnoughNews?irpc=69
The Economic Times- News- Economy- Finance http://economictimes.indiatimes.com/rssfeeds/1286551815.cms
The Financial Express -
http://www.expressindia.com/syndications/fe.xml
Wired Top Stories
http://www.wired.com/news/feeds/rss2/0,2610,,00.xml
Yahoo! News: Entertainment News
http://rss.news.yahoo.com/rss/entertainment
AnandTech Article Channel
http://www.anandtech.com/rss/articlefeed.aspx
Add CNET
News.com http://news.com.com/2547-1_3-0-5.xml
Add Emergic
http://emergic.org/index.xml
Add Slashdot
http://slashdot.org/rss/slashdot.rss
Add SPACE.com
http://www.space.com/syn/space.xml
Add Wired Politics
http://www.wired.com/news/feeds/rss2/0,2610,4,00.xml
Add Wired Top Stories
http://www.wired.com/news/feeds/rss2/0,2610,,00.xml

List of Google Services!!!!!!!

Well These are the list of Services Provided by Google some are known but some are not , so here get them all!!!!
Google AdSense : https://www.google.com/adsense/
Google AdWords : https://adwords.google.com/select/
Google Analytics : http://google.com/analytics/
Google Answers : http://answers.google.com/
Google Base : http://base.google.com/
Google Blog Search : http://blogsearch.google.com/
Google Bookmarks : http://www.google.com/bookmarks/
Google Books Search : http://books.google.com/
Google Calendar : http://google.com/calendar/
Google Catalogs : http://catalogs.google.com/
Google Code : http://code.google.com/
Google Deskbar : http://deskbar.google.com/
Google Desktop : http://desktop.google.com/
Google Directory : http://www.google.com/dirhp
Google Earth : http://earth.google.com/
Google Finance : http://finance.google.com/
Google Groups: http://groups.google.com/
Google Images : http://images.google.com/
Google Labs : http://labs.google.com/
Google Local: http://local.google.com/
Google Maps : http://maps.google.com/
Google Mars : http://www.google.com/mars/
Google Mobile : http://mobile.google.com/
Google Moon : http://moon.google.com/
Google Movies : http://www.google.com/movies
Google Music: http://www.google.com/musicsearch
Google News : http://news.google.com/
Google Pack : http://pack.google.com/
Google Page Creator : http://pages.google.com/
Google Personalized Home… : http://www.google.com/ig
Google Personalized Search : http://labs.google.com/personalized
Google Reader : http://www.google.com/reader
Google Scholar : http://scholar.google.com/
Google Search History : http://www.google.com/searchhistory
Google SMS : http://www.google.com/sms/
Google Suggest : http://www.google.com/webhp?complete=1
Google Talk : http://talk.google.com/
Google Toolbar : http://toolbar.google.com/
Google Transit Trip Planner : http://www.google.com/transit
Google Translate : http://www.google.com/translate_t
Google Video : http://video.google.com/
Google Web Accelerator : http://webaccelerator.google.com/
Google Web API : http://www.google.com/apis/
Google Web Search : http://www.google.com

Keeping Your Networks Secure

Computer security is an ever present concern that evolves constantly. One reason why computers and the programs we use are so vulnerable is that they are incredibly complex. The more complex they become, the more likely they are to have security gaps.

On the other hand, the more they can store and do, the more we value them. With so much potential for doing things locked within every computer and program, it shouldn't be surprising that a clever computer hacker can manipulate or break codes to wreak havoc on the whole system. This is why we also need security systems. Unlike the programs that they protect, security systems are valuable because of how many things they make hard to do.

If your company uses a network of computers to store, transfer and process information, you can't afford to leave that system vulnerable to attacks. New viruses and worms come out every year and without the right protection, your computers could be among the millions that are knocked completely out of commission.

In addition to blocking harmful viruses, it is just as important to guard against invaders who want to access confidential information about your business and your clients. Hackers are among the most innovative group of computer geeks in the world. If there's a vulnerability anywhere in any of your systems, they can find it.

Ways to Keep Your Network Secure and Running

There are many ways to tighten security on computer networks. A few forms of protection include anti-virus software, firewalls, intrusion prevention systems (IPS), information encryption, and user authentication safe guards. Armed with these tools, your Dallas network security will be a discouraging target for predators.

One thing to keep in mind though when you start the task of securing your system is the need for network security in addition to individual computer security. You may have armed each computer with a couple different kinds of protection, but if even one computer becomes infected with a virus or a worm, the problem will quickly spread to all the computers within your network.

If you and your staff don't have the expertise to diagnose security weaknesses in your network and provide the necessary remedies, there are many professionals who can. If you want, they can also maintain the systems they service. Network security is vital to your businesses success. Be sure you don't go with amateurs.

What to Look for in a Network Security Specialty Firm

When it comes to network security, it's hard to argue with a strong record of success. Watch for a network security company that has a list of happy clients. The larger the client, the larger target they probably are for hackers, so big names are a good thing.

Security testing is another key factor. No network can be made 100% secure and still be usable. A good firm will employ computer specialists whose job it is to hack systems. Through these means, they'll find and weaknesses in a system and be able to work towards securing it.

Is Your Computer Safe Offline?

Probably one the biggest notions among computer users is that if they are not online, they are safe from identity theft. Their reasoning is that, if they are offline, they are not vulnerable to phishing, viruses, malware, hackers, etc. While, it is true that being offline would protect them from such things, to fall into the belief that they are safe is being somewhat blind to other possibilities for id theft.

Even people who are connected to the Internet fall into a false sense of security. How? Computer users think that once they install a firewall, get adware, malware, and virus protection. Throw into all that, phishing protection. They get lulled into that invulnerable feeling. They think they are safe.

But are they? Among the many ways to steal data from a computer is through the peripheral data ports. They can be hooked up to printers, external disk drives, etc. Still another way to steal data has been the use of cds or floppy disks. This is done by actually stealing the disks themselves or dumping data onto them. In most cases, this can be done without the computer's owner ever knowing.

Along the same ideas, hard drives can be stolen or broken into. This is alot easier than one might think. Here's how. Hard drives fail. There's nothing that can be done about that. We get them replaced, reload the software, and move on with our lives.

But what about that old hard drive? Even if it has crashed, data can still be harvested from it. In some cases, it is not easily done. There are softwares written to help map the crashed disk and retrieve information off of it. This software is used by legitimate, reputable companies as a means of data reclamation for their clients. It is also used by thieves to steal personal and company data.

Another way to break into a computer involves the thief using his or her own floppy disk or cd to boot your system. With this method, they can bypass your security features and gain direct access to your data.

Even more recently, with the advent of flash drives, it is easier to steal data and conceal it. These small devices are roughly the same size as a man's finger and are hard to detect when concealed. They can be stolen or lost very easily due to their small size.

When it comes to dealing with these issues, many businesses are removing the extra disk drives from computer work stations. They are also networking their printers, etc. to monitor information flow.

Hard drives can be rendered totally useless by drilling holes in the cases and drives. Still another way to do this is by burning the hard drive.

Certain types of flash drives are being built with security features in place to aid in preventing theft. By using a security system which encrypts the data, it adds a measure of protection not offered by Microsoft. This encryption feature is called Advanced Encryption Standard (AES) symmetric encryption. It is considered to be the best encryptions systems for flash drives. It should also be noted that it is not the only form of encryption available. Many versions of encryption are designed with the user in mind (I.E. ease of use).

The final problem deals with the users themselves. Often times, the user will be careless with with their user name and password information. They sometimes will paste it to their computer or somewhere close to it. In this case, it is always best to either commit this information to memory or store it in a very secure place.

How to Solve error 80048820


When you start MSN Messenger, you are unable to sign in, the following message is displayed after the sign in process is interrupted.


“Sorry, we were unable to sign you in to the MSN Messenger at this time. Please try again later.

To let us try and troubleshoot the problem, click the Troubleshoot button.”



Causes
1.The system clock may be set incorrectly.
2.The Dynamic Link Library (DLL) softpub.dll, may not be registered on the system.
3.Internet Explorer may be using an invalid proxy server.

Resolutions
Double click on the clock in the taskbar and make sure the system clock is set correctly.
Register softpub.dll using the regsvr32.exe tool.

Click Start, and then click Run.
In the Open box, type regsvr32 softpub.dll and then click OK.
Restart MSN Messenger.



Remove any Internet Explorer proxy server settings

In Internet Explorer, click Tools and then click Internet Options.
In the Internet Options dialog box, go to the Connections tab.
Click LAN Settings…
Untick the Use a proxy server for your LAN (These settings will not apply to dial-up or VPN connections) checkbox.
Click OK and OK again Internet Options

How to Search For Rapidshare Folders by Using Goolge !!

Just go to Google.com and paste this string there ..

site:rapidshare.com inurl:users "Anything you want to search for"

site:rapidshare.de inurl:users "cracking"

site:rapishare.com inurl:files "web hacking"

site:rapidshare.de inurl:files "tips and tricks"

How To Remove Spyware From Your PC

If your computer has become plagued with Spyware, you are no doubt in need of a solution to rid you of Spyware without ridding you of needed programs and essential processes. To do this, you have two options: manually removing Spyware from your PC, or using an anti-Spyware program to automate the process of removing it.

This article will also help you increase the speed and performance of your computer by teaching you to maintain which programs run automatically when Windows starts up.

Manual Removal of Spyware and Other Pesky Programs

Not all Spyware can be removed manually. Spyware, like viruses, can be very stubborn. (If it is, you may need to get a Spyware remover program.) A lot of Spyware, however, was downloaded and installed willfully by you (perhaps without your realizing it). Aside from prevention (such as being careful when you download and install things not to just click arbitrarily to every dialog), there are a few ways to check to see if things are running on your computer that you do not wish to have running.

Not all unwanted programs that may be running will be Spyware. You may, for example, have a messenger you no longer use or a special feature program that came with your printer or another device.

Spyware are usually programs. In order to manually stop certain programs which may be running and stop them from running in the future, you can do the following. To determine what is currently running, click CTRL+ALT+DEL buttons all at once. This brings you to a feature of Windows called Task Manager. (You can also reach this by going to START Run, typing taskmgr.exe and clicking OK.)

Under the applications tab youll see the main programs you have running such as Internet Explorer, messengers, Word docs, etc. This isnt everything thats running, though! Click the Processes tab and youll see a lot of processes running. Anything that ends in .exe is a program running. (This [dot]exe extension means executable which means program, essentially.)

Browse through this Processes list and identify what is running. Watch out particularly for files that end in [dot]dll as this is an extension often used by viruses; not all [dot]dll files are harmful, though. To determine whether a process is needed, unneeded, or malicious, type in the full name of the process into Google (including the [dot]exe, all as one word) and read about what the program is and what it does.

Links in your Google results will explain the nature of the program, how important it might be for the proper operation of your computer, and whether it poses a threat to the integrity of your system.

Once you find a program you do not want running, return to task manager and go to the Processes tab again. Right-click the unwanted process and choose End Process. Do this for each unwanted process. (For example, if you use iTunes but do not have an iPod, you dont need ipodservice.exe running, which is installed automatically when you install iTunes).

Now that you have stopped the program, nothing will prevent it from running again next time you start your computer, unless you instruct your computer otherwise. To stop programs from starting up automatically when Windows boots up, go to START-Run, type msconfig, and click OK. Check Selective Startup. Go to the Startup tab and uncheck anything you dont want running. Click OK.

It will ask if you want to restart now or later. Choose a later if you have any unsaved work running in other programs. (Save or print this page if you are following along with and attempting this now, before restarting.)

After restarting, your computer will tell you that you have chosen to use the selective startup. Check the little box that says not to show this message when Windows starts. Go back into task manager and verify that the things you unchecked in the msconfig Startup list are not running. If they are, go back to mscofig and uncheck things under the startup tab again. If this process doesnt work after trying it a couple times, it may be time for an anti-Spyware program or an IT professional to address your computer.

If you are successful in the manual removal of these, you will notice not only an increase in privacy but also an increase in speed and performance. Dont forget to go to START Control Panel Add/Remove Programs and browse through that list, too. Uninstall anything on your computer that you dont want or need.

If you are unsure what something is, Google the name of it to find out. The fewer programs you have installed (especially unneeded ones) the faster your computer will run. This is also true about how full your hard drive is. Try to keep several gigs free at all times. Check this by going to My Computer and right-clicking the C: drive. Empty your recycle bin regularly.

Using a Spyware Remover Program:

If you are unable to remove the Spyware from your computer manually, look online and read about anti-Spyware programs to determine which is best for your situation and preferences is.

Even if you do use anti-Spyware and anti-virus software, always be proactive and aggressive about maintaining your computer. Dont expect third-party software to do all the work! If you dont have the money for professional computer check-ups, ask a friend who has a knack for such things.

Speed up Booting Xp by 61 Times

run -> msconfig - Hit Enter


Awesome tricks Explained here for u Free! :




Whenever you start your computer, you are faced with a few moments of thumb twiddling while Windows XP boots and prompts you to log on. Although you should expect to wait for a few moments, sometimes Windows XP seems to boot rather slowly. In fact, you may notice that over a period of time the PC that used to roar to life seems a bit sluggish instead. Fortunately, you can perform several techniques that help Windows XP get the bootup speed you want. This Article explores how to put these techniques to work.



Stopping Unneeded Startup Services !


Along with the core operating system and programs that Windows XP runs when it starts, there is also a host of services involved. Many of these services are necessary for Windows XP to operate correctly. However, many of them are for features in Windows XP that you may not use at all. You can peruse the services and disable any service that you do not want to run. The fewer services that run, the more quickly Windows XP will boot.


Caution:

Exercise caution when stopping services. If you do not know what a service does or are unsure of the ramifications of stopping the service, leave it alone. Some services are critical to Windows XP's operations, so make sure you understand what the service is before you disable it.


To reduce the number of services that start on bootup, you can access two different areas of Windows XP. The first is the System Configuration Utility. The Services tab shows you the services that start when the computer boots.
You can stop a service from starting by simply clearing the check box next to the service and clicking OK. However, before you do so, there is another way to disable services that you may prefer because the interface gives you more information about the service in question.


Open Control Panel/Administrative ToolsServices or else select Start/Run, type services.msc, and click OK. Either way, you see the Services console.
I prefer to use the Services console instead of the System Configuration Utility because it describes what the service does. Additionally, you can double-click a service and examine its properties.

Notice the Startup Type column in Figure 4-2. This information lists whether the service is automatic or manual. Manual services are only started in Windows XP when you start a process that requires the service. Some other process may require the service that has a "dependency" relationship with it; in this case, the dependency service will start, as well. Because these services do not start automatically when you boot Windows XP, you do not need to do anything with manual services.


However, all services listed as automatic start when Windows XP boots. These are the services that increase boot time. As I have mentioned, many of them are necessary and important, so you should not stop automatic services from booting unless you are sure of the ramifications. You can get this information by looking at the Description column. Here's a quick look at common services you may want to live without:



SPEED UP BOOT BY DISABLING UNUSED PORTS.!!


You may have tried many tweaks like modifying windowsXP start-up applications, prefetches, unload DLLs method,etc. And yes those methods do work for me.
I have just accidentally found out another way to give you an extra boost in windowsXP's boot performance. This is done by disabling your unused devices in
Device Manager. for example, if you don't have input devices that are connected to one of your USBs or COM ports, disabling them will give you an extra perfromance boost in booting. Go to Control Panel -> System -> Hardware tab -> device manager Disable devices that you don't use for your PC and then restart.



Do Dis !!


1.Start Registry Editor (Regedit.exe).

2.Locate the following key in the registry:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SessionManager\MemoryManagement\PrefetchParameters

3.Make sure you backup the keys by exporting them to a .reg file.

4.On the EnablePrefetcher value, change the setting from 3 to 5 (decimal).

5.Close the registry editor.

6.Restart your computer



Automatic Updates !

This service enables Windows XP to check the Web automatically for updates. If you don't want to use Automatic Updates, you can disable the service. You can always check for updates manually at the Windows Update Web site.

Computer Browser: If your computer is not on a network, you don't need this service. If you are on a network, leave it alone.

DHCP Client: If you are not on a network, you do not need this service. If you are on a small workgroup, you can still increase boot time by configuring manual IP addresses (which I explore later in this chapter).

DNS Client: If you are not on a network, you do not need this service. If you are, leave it alone.

Error Reporting and Event Log: You don't have to use these services but they can be very helpful, so I would leave them configured as automatic.

Fax: If you don't use your computer for fax services, you can disable this one.

Help and Support: If you never use the Windows XP Help and Support Center (found on the Start menu), you can disable this service.

IMAPI CD-Burning COM: This service enables you to burn CDs on your computer. If you never burn CDs, you can disable the service.

Indexing Service: Your computer keeps an index of files but if you rarely search for files, the service is just a resource hog. You can stop it and turn the service to manual.

Windows Firewall/Internet Connection Sharing: If you do not use these features, you can disable them.

Infrared Monitor: If you do not use infrared devices, you can disable this service.

Messenger: This service sends alert messages on a local area network (it is not the same as Windows Messenger). If you are not on a network, you can disable this service.

Print Spooler: If you do not do any printing from the computer, you can disable this service. If you print, make sure you leave it as automatic.

Remote Registry: This service allows remote users to modify the Registry on your computer. If you are not on a network, you can disable this service.

System Restore Service: This service allows you to use System Restore. If you have turned off System Restore anyway, you do not need to turn off the service. If you do, you turn off System Restore.

Themes: If you do not use themes, you can disable this service.

Windows Image Acquisition: If you do not use scanners or digital cameras, you can disable this service.

Wireless Zero Configuration: If do not use wireless networking devices, you can disable this service.




You may have a number of other automatic services, depending on software and other configurations on your computer. So it's a good idea to look through the services and learn more about them. If you double-click a service, a Properties dialog box appears
Notice that on the General tab, you see a Startup Type drop-down menu. If you want to change an automatic service to manual, select Manual here and click OK. As a general rule, don't disable a service unless you are sure you will never use it. However, manual configuration allows the service to be started when you find it necessary, thus speeding up your boot time.
However, before you change a service to manual, look at the Dependencies tab (see Figure 4-4). This tab shows you which other services depend upon the service you are considering changing.
Keep in mind that services are necessary for the vast functionality you get with Windows XP. Change only those services that you understand and do not use. How you use your Windows XP computer should be the best guide in terms of optional startup services.



Tip !


The Indexing service and the System Restore service take up a lot of disk space and system resources across the board. You can live without the Indexing service but I suggest that you keep using System Restore. It works great when you are in a bind and this is one case where the loss of speed may not be worth the ramifications of not using System Restore.


Speed Tips and Tricks for Windows XP Startup
Aside from startup programs, services, and the Prefetch folder, there are a number of other startup procedures and issues you can modify to help Windows XP start faster. The following sections explore those tips and tricks.


Manual IP Addressing on Small Office/Home Networks
Windows XP is configured to help you take care of networking. It uses the TCP/IP protocol for networking in workgroups, or what you might call small office or home networks that do not use a dedicated server.

The problem is that automatic IP addressing can be slow. When your computer boots, it has to query the network to see what IP addresses are already in use and then assign itself one. If you want to speed up the boot time a bit, consider manually assigning IP addresses to all computers on the network. This way, the network computers do not have to worry about locating an automatic IP address. Because one is manually configured, the operating system doesn't have to spend time solving this problem.

This isn't a networking book, however, so I won't delve into the implications of using a manual IP address, but if you are using a computer that functions as a host computer to the Internet (using Internet Connection Sharing [ICS]), you can get into connectivity problems if you change the configuration of the IP address. However, you can still work around this problem by starting with the ICS host computer.

Select Start/Connect To/Show All Connections. Right-click your network adapter card and click Properties. On the General tab, select TCP/IP in the list of services and click the Properties button.

In the TCP/IP properties, you can see if you use an automatic or manual IP address. In the example in Figure 4-5, I have configured a manual IP address of 90.0.0.1 and a default subnet mask. The other computers on my office network each use a different IP address in the same class, such as 90.0.0.2, 90.0.0.3, 90.0.0.4, and so on. This way, each computer has a permanent IP address, which helps increase boot time. Note that if you change the IP addresses of your computers, they must all use the same subnet mask. A default subject mask of 255.255.255.0 will keep you in good shape.

Make sure you understand the implications of changing IP addresses on your network. If you have no networking experience at all, you may be wiser to leave the automatic IP addressing as is and try to gain some speed using the additional suggestions in this chapter.



Disabling Recent Documents History !


Windows XP includes a feature that keeps track of all recent documents you have opened or used. The idea is that you can select Start/Recent Documents History and quickly reopen any document you have recently used. I use many documents each day and never use the feature myself. In my opinion, I can keep up with what I want to use without Windows XP doing it for me.
The bad thing about Recent Documents History is that Windows XP has to calculate what should be put there each time you boot Windows, which can slow things down. So, if you never use the Recent Documents History, it's a good idea to disable it. Here's how:
1. Open the Registry Editor (select Start/Run, type regedit, and click OK).
2. Navigate to HKEY_CURRENT_USER\Software\Mcft\Windows\ CurrentVersion\Policies\Explorer.
3. Create a NoRecentDocsHistory D_WORD key. Double-click the value to open it once it is created.
4. Set the Data Value to 1 to enable the restriction.
5. Click OK and close the Registry Editor. You'll need to restart the computer for the change to take effect.



Disabling the Boot Logo !


You can remove the boot logo that appears when you start Windows XP. This little tweak probably shaves only a few seconds off your boot time but seconds count if you are serious about trying to get Windows XP up and running as quickly as possible. The only negative is that if you remove the boot logo, you will also not see any boot messages, such as check disk. (But if you are not having problems with your computer, this isn't such a big deal.)
To remove the boot logo, follow these steps:
1. Select Start/Run, type msconfig, and click OK.
2. In the System Configuration Utility, click the BOOT.INI tab.
3. On the BOOT.INI tab, click the NOGUIBOOT check box option. Click OK.



Removing Unwanted Fonts !


One trick that increases your boot time a bit is to lose any fonts in the Fonts folder in Control Panel that you never use. The more fonts you have, the more processing Windows XP has to do to prep all of those fonts for use. You must be a bit careful here to not remove fonts that you might want, but there is a good chance that you can live without many of them. For instance, you may have foreign language fonts and other symbol fonts (such as Wingdings) that you never use.
To delete unneeded fonts, follow these steps:
1. Open the Fonts folder in Control Panel.
2. Select Edit/Select All and then Edit/Copy.
3. Create a new folder on your desktop, open it, and select Edit/Paste.
4. In this new folder, delete any of the fonts you do not want.
5. Return to the Fonts folder in Control Panel. Right-click the selected fonts and click Delete.
6. Go back to your new desktop folder and click Edit/Select All.
7. Return to your Fonts folder and click Edit/Paste. You now have only the desired fonts in the Fonts folder.



Tip:


You can directly delete fonts from the Fonts folder without creating the secondary folder. However, I recommend the preceding steps to help ensure that you do not make a mistake in the deletion process.



Stopping Remote Assistance and Remote Desktop Sharing !


In Windows XP Professional, you have two remote networking features called Remote Assistance and Remote Desktop Sharing. These remote networking features are very helpful in a variety of situations but if you don't use them, it is good idea to disable them to save boot time. You can always enable them later if you want to use them.
Note:
If you are interested in using Remote Desktop or Remote Assistance, see my book Windows XP for Power Users: Power Pack published by John Wiley & Sons.
1. Open the Start menu, right-click My Computer, and choose Properties.
2. Click the Remote Tab.
3. Clear both check boxes to disable Remote Assistance and Remote Desktop.



Speeding Up the Dual-Boot Timeout !


If you dual-boot your computer with Windows XP and another operating system, you see an operating system selection menu on startup. If you typically boot into Windows XP and not the other operating system, you can speed up the dual-boot timeout value so that you do not wait so long for the boot process to select your default operating system and continue with the boot process. The default timeout value is 30 seconds but you can change this setting to 10. This gives you enough time to select the alternate operating system if you want but also speeds up the boot process. You can skip this section if you do not use a dual-boot configuration.
Follow these steps:
1. Locate the boot.ini file on your computer. It is a hidden file by default; mine is located in C:\boot.ini.
2. Open the file with Notepad (which is what opens it by default).
3. Change the Timeout value to 10 (see Figure 4-11).
4. Select File/Save and close Notepad.



Speeding Up Your PPPoE Connection !


If you use a Point-to-Point Protocol connection over Ethernet (PPPoE), you may notice a delay in using the PPPoE connection after startup. By default, there is a 120 second delay but you can stop this behavior by manually configuring an IP address for the network adapter card. If you do not use a PPPoE connection, you can skip this section.
1. Select Start/Connect to/Show All Connections.
2. Open the TCP/IP properties for your LAN network interface card.
3. Manually set the IP address on the TCP/IP properties to an appropriate IP address and subnet mask for your network.



Reducing the Wait Time


When you start to shut down Windows XP, it has to quit, or "kill," any live applications or processes that are currently running. So close all applications first. However, some applications and processes are always running in the background. You can reduce the amount of time that Windows XP waits for those applications and processes to close before Windows XP kills them. Edit three different Registry settings to change this:
1. Open the Registry Editor.
2. Navigate to HKEY_CURRENT_USER\Control Panel\Desktop. Select WaitToKillAppTimeout and set the value to 1000.
3. Select the HungAppTimeout value and set it to 1000 as well.
4. Navigate to HKEY_USERS\.DEFAULT\Control Panel\Desktop. Set the WaitToKillAppTimeout and set the value to 1000. Select the HungAppTimeout \newline value and set it to 1000 as well.
5. Navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control. Select the WaitToKillServiceTimeout value and set it to 1000.
6. Close the Registry Editor.


Automatically Killing Tasks on Shutdown !


You know the drill. You start to shut down the computer, you wait a few moments, and then you see a dialog box asking if you want to kill an application or service that is running. Instead of prompting you, you can make Windows XP take care of the kill task automatically. Here's how:
1. Open the Registry Editor.
2. Navigate to HKEY_CURRENT_USER\Control Panel\Desktop.
3. Highlight the value AutoEndTasks and change the value to 1.
4. Close the Registry Editor.


More


Here's a great tip to speed up your browsing of Windows XP machines. Its actually a fix to a bug installed as default in Windows 2000 that scans shared files for Scheduled Tasks. And it turns out that you can experience a delay as long as 30 seconds when you try to view shared files across a network because Windows 2000 is using the extra time to search the remote computer for any Scheduled Tasks. Note that though the fix is originally intended for only those affected, Windows 2000 users will experience that the actual browsing speed of both the Internet & Windows Explorers improve significantly after applying it since it doesn't search for Scheduled Tasks anymore. Here's how :

Open up the Registry and go to : HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/Explorer/RemoteComputer/NameSpace Under that branch, select the key : {D6277990-4C6A-11CF-8D87-00AA0060F5BF} and delete it. This is key that instructs Windows to search for Scheduled Tasks. If you like you may want to export the exact branch so that you can restore the key if necessary. This fix is so effective that it doesn't require a reboot and you can almost immediately determine yourself how much it speeds up your browsing processes.