You can use Text-Mining-Tool to automatically extract text from a PDF file so that you can use it in any program freely. Or if you cannot open a PDF file because you do not have a PDF viewer installed, you can use this tool to extract the text and read the document.
Text Mining Tool is completely free and does not even require an installation, simply unzip it and run the program to use it.
text mining tool
Click the Open button and choose your file that you want to convert to text. Click ok and the large window below the buttons will eventually fill with all of the text extracted from the document.
extract text
Click Save to save the extracted text to your computer. You can also click Clipboard to copy the mined text to the Windows clipboard.
For convenience, the following hotkeys can be used to perform the operations:
* Open - F3 or O.
* Save - F2 or S.
* Clipboard - F5 or C.
* Exit - F10 or Escape.
You can also use the minetext console tool to create a batch script for extracting text from multiple files. This can be useful if you have a directory with a large number of files that need to have text extracted.
How to Extract text from PDF, DOC, HTML, CHM, and RTF files
How to Extract text from PDF, DOC, HTML, CHM, and RTF files
You can use Text-Mining-Tool to automatically extract text from a PDF file so that you can use it in any program freely. Or if you cannot open a PDF file because you do not have a PDF viewer installed, you can use this tool to extract the text and read the document.
Text Mining Tool is completely free and does not even require an installation, simply unzip it and run the program to use it.
text mining tool
Click the Open button and choose your file that you want to convert to text. Click ok and the large window below the buttons will eventually fill with all of the text extracted from the document.
extract text
Click Save to save the extracted text to your computer. You can also click Clipboard to copy the mined text to the Windows clipboard.
For convenience, the following hotkeys can be used to perform the operations:
* Open - F3 or O.
* Save - F2 or S.
* Clipboard - F5 or C.
* Exit - F10 or Escape.
You can also use the minetext console tool to create a batch script for extracting text from multiple files. This can be useful if you have a directory with a large number of files that need to have text extracted.
If you’re a web designer, this program can be very useful to grab the text from a Word document without getting all of the extra Microsoft Office styling code included with the text.
This is a very simple program that is very simple to use! It has one basic purpose and it does a good job! Enjoy!
How to make your application run when windows loads
Ok this one isn't to hard, you just need to learn how to use the registry API functions... I'm not going to go over what the windows registry is, if you don't know i advise you google it Wink.
In the registry there is a (path)key that windows reads, in that key is a list of sub-keys, there values contain file paths which are executed when windows loads, so in order to make our server load on startup we just need to add a sub-key into this key containing the path to our server, make sense Wink.
In order to do this the first thing we need to do is declare an object to hold data for subsequent calls to the registry functions.
// this is the object were use for subsequent registry function calls...
HKEY key1;
Secondly we need to open the Registry path(key) that contains the list of programs that will startup, this being "HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun".
Ok this is the code we use to open that registry path(key)
RegOpenKeyEx(HKEY_LOCAL_MACHINE, // the root key we want to open
"Software\Microsoft\Windows\CurrentVersion\Run", // that path(key) we want to open
0, // dont worry about this one, we just leave it null(0)
KEY_SET_VALUE, // the access right we wwant when opening the key
&key1); // our registry object we created ealier, were need for subsequent calls
Ok now we've opened the registry key, we need to create a value in it that contains the full path to our server.
RegSetValueEx(key1, // the registry object we used in the call to RegOpenKeyEx(...)
"Name-Of-Key-To-Create", // the name of the key that will be created
0, // we dont need to use this so we leave it null
REG_SZ, // the type of key were creating, it will hold the path to our server so its a string value
(const unsigned char*)"path to our server", // the value of the key were creating
strlen("path to our server")); // number of letters used in the value of our key
Now all we need to do is close the key we opened and were done Very Happy,
this is simple, code below:
RegCloseKey(key1); // close the key we opened ealier...
Ok i've gone through what we need to do and what functions we need to do to it, but there's one thing i hate, and thats when some ends a tut here, without showing what the finished version would look like... so here's what it should look like if you've done everything correct :D.
int main()
{
HKEY key1;
RegOpenKeyEx(HKEY_LOCAL_MACHINE,"Software\Microsoft\Windows\CurrentVersion\Run",0,KEY_SET_VALUE, &key1);
RegSetValueEx(key1, "key-name",0,REG_SZ,(const unsigned char*)"path to my server",strlen("path to my server"));
RegCloseKey(key1);
return 0;
}
and there ya have it, a simple method to make your server run on startup Wink. If you can think of any ways to improve this tutorial let me know Wink, hopefully your learned something from this tut Smile, any questions just reply and ill be happy to answer them, peace out, KOrUPt.
Orkut Scrap Helper
FireFox Extention)
It is an FireFox extention made by an indian named Ajay Martin.
Features:
Scrap those who have scrapped you in a single step!
Persistant link to Your scrapbook.
NOTE: You must be logged in to orkut to use this tool.
Download
works with : - Firefox 1.0+ - 1.6
Download Scrap Helper
Places That Viruses and Trojans hide on startup
you may find it a good read
1. START-UP FOLDER. This applies to all versions of Windows, Windows9x has a global startup folder and WinXP/2K has a per user and all users startup folder.
c:Documents and SettingsAll UsersStart MenuProgramsStartup
And
c:Documents and SettingsusernameStart MenuProgramsStartup
Windows opens every item in the Startup folder on startup/login, this folder is easy to find and you can just 'right click and delete' to remove items from it.
Note the above says 'open' not 'run' this means if there is a .txt file, notepad will open, if there is a .wav file the default program for handling .wav files will open and so on. Shortcuts are usually put in the startup folder but entire programs/documents/files can be put there.
STARTUP ORDER FOR WINDOWS NT4/2000/XP
User enters a password and logon to the system
2. REGISTRY. Windows executes all instructions in the "Run" section of the Windows Registry. Items in the "Run" section (and in other parts of the Registry listed below) can be programs or files that programs open (documents), as explained in No. 1 above.
All Run Keys:
[HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurr entVersionRunOnce]
[HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurr entVersionRun]
[HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurr entVersionRunOnceEx]
[HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurr entVersionRunEx]
[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurre ntVersionRunOnce]
[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurre ntVersionRun]
[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurre ntVersionRunOnceEx]
[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurre ntVersionRunEx]
3. REGISTRY. Windows executes all instructions in the "RunServices" section of the Registry.
Computer Management -> Services - items set to "Automatic"
4. REGISTRY. Windows executes all instructions in the "RunOnce" part of the Registry.
5. REGISTRY. Windows executes instructions in the "RunServicesOnce" section of the Registry. (Windows uses the two "RunOnce" sections to run programs a single time only, usually on the next bootup after a program installation.)
7. REGISTRY. Windows executes instructions in the HKEY_CLASSES_ROOTexefileshellopencommand "%1" %* section of the Registry. Any command imbedded here will open when any exe file is executed.
Other possibles:
[HKEY_CLASSES_ROOTexefileshellopencommand] =""%1" %*"
[HKEY_CLASSES_ROOTcomfileshellopencommand] =""%1" %*"
[HKEY_CLASSES_ROOTbatfileshellopencommand] =""%1" %*"
[HKEY_CLASSES_ROOThtafileShellOpenCommand] =""%1" %*"
[HKEY_CLASSES_ROOTpiffileshellopencommand] =""%1" %*"
[HKEY_LOCAL_MACHINESoftwareCLASSESbatfileshell opencommand] =""%1"
%*"
[HKEY_LOCAL_MACHINESoftwareCLASSEScomfileshell opencommand] =""%1"
%*"
[HKEY_LOCAL_MACHINESoftwareCLASSESexefileshell opencommand] =""%1"
%*"
[HKEY_LOCAL_MACHINESoftwareCLASSEShtafileShell OpenCommand] =""%1"
%*"
[HKEY_LOCAL_MACHINESoftwareCLASSESpiffileshell opencommand] =""%1"
%*"
If keys don't have the ""%1" %*" value as shown, and are changed to something like ""somefilename.exe %1" %*" than they are automatically invoking the specified file.
8. BATCH FILE. Windows executes all instructions in the Winstart batch file, located in the Windows folder. (This file is unknown to nearly all Windows users and most Windows experts, and might not exist on your system. You can easily create it, however. Note that some versions of Windows call the Windows folder the "WinNT" folder.) The full filename is WINSTART.BAT.
9. INITIALIZATION FILE. Windows executes instructions in the "RUN=" line in the WIN.INI file, located in the Windows (or WinNT) folder.
10. INITIALIZATION FILE. Windows executes instructions in the "LOAD=" line in the WIN.INI file, located in the Windows (or WinNT) folder.
It also runs things in shell= in System.ini or c:windowssystem.ini:
[boot]
shell=explorer.exe C:windowsfilename
The file name following explorer.exe will start whenever Windows starts.
As with Win.ini, file names might be preceeded by considerable space on such a line, to reduce the chance that they will be seen. Normally, the full path of the file will be included in this entry. If not, check the Windows directory
11. RELAUNCHING. Windows reruns programs that were running when Windows shut down. Windows cannot do this with most non-Microsoft programs, but it will do it easily with Internet Explorer and with Windows Explorer, the file-and-folder manager built into Windows. If you have Internet Explorer open when you shut Windows down, Windows will reopen IE with the same page open when you boot up again. (If this does not happen on your Windows PC, someone has turned that feature off. Use Tweak UI, the free Microsoft Windows user interface manager, to reactivate "Remember Explorer settings," or whatever it is called in your version of Windows.)
12. TASK SCHEDULER. Windows executes autorun instructions in the Windows Task Scheduler (or any other scheduler that supplements or replaces the Task Scheduler). The Task Scheduler is an official part of all Windows versions except the first version of Windows 95, but is included in Windows 95 if the Microsoft Plus Pack was installed.
13. SECONDARY INSTRUCTIONS. Programs that Windows launches at startup are free to launch separate programs on their own. Technically, these are not programs that Windows launches, but they are often indistinguishable from ordinary auto-running programs if they are launched right after their "parent" programs run.
14. C:EXPLORER.EXE METHOD.
C:Explorer.exe
Windows loads explorer.exe (typically located in the Windows directory)during the boot process. However, if c:explorer.exe exists, it will be executed instead of the Windows explorer.exe. If c:explorer.exe is corrupt, the user will effectively be locked out of their system after they reboot.
If c:explorer.exe is a trojan, it will be executed. Unlike all other autostart methods, there is no need for any file or registry changes - the file just simply has to be named c:explorer.exe
15. ADDITIONAL METHODS.
Additional autostart methods. The first two are used by Trojan SubSeven 2.2.
HKEY_LOCAL_MACHINESoftwareMicrosoftActive SetupInstalled Components
HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurr entversionexplorerUsershell folders
Icq Inet
[HKEY_CURRENT_USERSoftwareMirabilisICQAgentApp stest]
"Path"="test.exe"
"Startup"="c:\test"
"Parameters"=""
"Enable"="Yes"
[HKEY_CURRENT_USERSoftwareMirabilisICQAgentApp s]
This key specifies that all applications will be executed if ICQNET Detects an Internet Connection.
[HKEY_LOCAL_MACHINESoftwareCLASSESShellScrap] ="Scrap object"
"NeverShowExt"=""
This key changes your file's specified extension.
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetContro lSession ManagerBootExecute]
This is the first thing that is run.
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsNTCu rrentVersionWinlogonUserInit]
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonShell]
Send Fake Email
This tool allows our visitors to send emails to anyone, from anyone. This tool is intended for fun purpose only and cannot be used for spam or any such activities. With this send fake email tool, your email will not be considered as spam. Send Fake Email is one of the most advanced and the best tool online. Note this tool combines the power of PHP, ASP and some other languages.
By sending fake email, you may be committing the offense of fraud, which as we all know (right?) is an imprisonable offense. If this is being done as a prank, I would recommend that you let the person you are emailing know what you are doing, either ahead of time or IMMEDIATELY after you do this. I'm going to ask you to behave responsibly with this information. Sure, have a quick joke, but using this in a malicious way will get you in trouble!
Well other things apart below is the form, enter all the details and hit the send email button and your email will be sent to the person whome you intended to send.
div class="max">
SHELL Basics
----------------------------------
The Questions That Everybody Asks
----------------------------------
Q:What is a shell account?
A:Ok...I think I won't be needing to explain what an account is, but let's talk about the shell. You probably are using Windows, so your shell is command.com and all that cute (crashing) Graphic environment. Being more precise a shell is the program that translates and sends your commands to your system's core. This happens because the core doesn't understand the commands you give. For example, when you type "cd ..", this command will be first translate to a low language level by the shell and just after that, sent to the core (or your CPU would drive mad). Do you imagine how painful would be using a computer if you hadn't a shell? You needed to use a low language level, like assembler or even worst (binary) to do something. If you wanted to do "cd .." you would have to write a bunch of push mem put mem blabla mem or a huge list of 00101010. Do you really think that this would work with people? I don't think so.
Ok..Ok.. There are many persons that code in assembler, but I'm talking about ordinary people.
Q:So you are saying that a shell is just a "thing" that translates my inputs to the core, like command.com. But why do I want to connect to a remote command.com, I've got my own in my box.
A: People like Shell Accounts because you don't connect to a Windows box, but to a *nix box. If you can't have linux or any other *nix System at home, you could get a Shell Account, and start playing with linux like if it was in your own box.
Q:My friend is a *nix guru and he told me that some shells suck because they are restricted what's that?
A:There are two kind of shells, the restricted shells and the non-restricted shells. The difference between both is that usually restricted shells aren't rented, they are free shells, but in those shells you can't execute every command you want (for example, using a free shell they can keep you out of dig, nslookup and telnet programs). On the otherhand using non-restricted shells, you can run any command you want but these kind of shells are paid (sometimes universities give non-restricted shells to the students). Hey, but even if you have a restricted shell don't be worried, some of them are really good.
Q: So you are saying that I can get a shell without paying for it?
A: Yes you can. For me the best place is at nether.net (other host that is a free shell provider is freeshell.org), I'll guide you through the all process later. Sometimes ISPs also give shell accounts to their users, so you may have already a shell account and you don't know, phone to yours ISP's Support and talk with them.
Q: I phoned my ISP asking for a shell account, and they asked why did I want one. What should I say?
A: Just tell that you really love to surf with Lynx, and that you want to learn Unix. That should do. If they hang up, just go for the free shells.
Q: Hey I've got a shell, but how can I know if it's a good shell?
A: I think the answer is relative, it depends from the person who answer, for me the things that make a good shell are listed below.
-> Telnet (terminal emulator)
-> Nslookup (Gives you information about the host)
-> FTP (File Transfer Protocol, do I need to say anything else?)
-> Finger (gets information about some user)
-> Traceroute (The same as tracerT.exe in Windows, but much better)
-> Dig (probably many of the restricted shells won't let you use, but don't
worry)
-> Netstat (like in windows, lists all sockets and their status)
-> GCC (c compiler, cool to do your own coding)
-> Gzip (to [un]pack stuff)
-> Lynx (Best Browser in the World)
This doesn't mean that a good shell for you needs to have this. For you a good shell could be just a shell that allows you to telnet, like I said it's very relative. But if your shell account doesn't let you use telnet, FTP and GCC, you should get other shell account.
By now you should be getting bored of reading stupid questions, and even more stupid answers, so let's get in another section. Let's talk a little about the flavours of Shell Accounts.
-------------------------------------------
Quick View about flavours of Shell Accounts
-------------------------------------------
There are may kinds of shell accounts, some of them are what we call home made shells, other are the "standard" shell. Let's talk about the "standard" shells.
--------------------------------- Just for your information -------------------------------------
Home made shells are shells that are made by the sysop that owns the system, and it's just running in his system.
-------------------------------------------------------------------------------------------------
Like I said there are plenty of shells.You've got:
-> shell: Bourne Shell
-> Bash : Bourne Again Shell
-> Cshell: C Shell
-> Tcsh: Technical C Shell
-> Ksh: Kourne Shell
And many others. (I just listed those because it's the ones you can get at nether.net)
Each shell has their strong and weak points. For example the Cshell allows you to type in C commands like if it were normal commands, that means that if you type printf Hello it will be the same as echo in other shells(for the ones who don't know C language, printf stands for printing in the screen the input given). I won't explain the strong and weak points in each shell, you should be the
one doing that. Just get them at free shell providers at start exploring. The only hint I'll give you is that Bash is the best shell for beginners, if you want a more powerful shell just go to the C shell. Start with bash, explore the system, learn some bash scripting, then start using other shells. Talk with your friends that have others shells, ask what they think about it, you're getting the idea, aren't you?Wink If you already have one shell and doesn't know which shell is it, just type in echo $shell and it will probably be shown your shell's type. Since this is a quick view, I'll end here. Gonna help you getting a real cool shell account.
-------------------------------------
Getting a Shell Account At Nether.net
-------------------------------------
So are you ready to get your first shell account? Of course you are. The only thing I don't like in nether.net is the offline time that the
server sometimes stays. So if you can connect to nether.net don't worry, since there are plenty of people in that host sometimes he overflows and goes offline. Just wait some hours and you probably can go online again.
------ Accessing nether.net ------
Step 1. (Getting your terminal emulator ready to roll)
Open your telnet program, you can find it in windows directory under the name telnet.exe
Step 2. (Connecting)
Now that you are probably looking to the Telnet Window, select the Connect menu, and in that menu select Remote System.
It will be shown another box asking you for the hostname, port and term type. Fill those fields with the information below.
Hostname: nether.net
Port: Telnet (or 23 it's the same)
Term Type: vt100 (it should be already in this value)
You wait a little and...
------ Getting the account ------
Step 3. (Logging in)
Now you should be looking at the nether.net banner. That says:
Kernel SunOS 5.6 Generic_105181-17 on a sun4d
Welcome to nether.net
New to the system? Login as newuser
login:
Now like they say use newuser as login. A program called newuser will start, helping you creating an account.
Step 4. (Customising Keys)
After a bunch of crap, the newuser program will ask you to Customise keys. It will be asked the delete key (^H) and the break key (^C). What is in brackets are the default if you want you can choose any other. The ^H stands for the delete key (the one that has the <- symbol on it), and the ^C stands for ctrl+c. Attention don't write ^H or ^C just press the keys, and that will be the output.
Step 5. (Selecting Terminal Type)
After you customise the keys you'll be asked to enter your terminal type, you can select ? and the program will print you all the terminals support by it, but you should select vt100 or just press enter. Pressing enter the program will assume that your terminal is a dumb terminal. There is no problem to select the dumb terminal because you can change it later.
Step 6. (Personal Data)
It will be asked things like your full name, phone number, birth date, sex, blablab, your getting the idea. If you want you can just put a . and press enter. You can also give fake information, I think that 98% of the users at nether.net did that. In the end of all the questions you'll be asked if you want to hide the information from other users. Just say yes or no, I suggest you to say yes.
Step 7. (Selecting Shell)
Now it will be shown a list with the legal shells, just select one, like I said before if you are new to shell accounts choose bash shell.
Step 8. (Selecting Login)
Just select your login, like always 8 chars is the max length.
Step 9. (Selecting Password)
Select a password, it will be asked two times to see if the password is correct. You can change the password later using the passwd command later.
Step 10. (Accepting Choices)
At this time you should be looking to something like:
full name: Full Name
loginid: your username password:
address:
your address if you gave any
telephone: your phone number if you gave any
other e-mail addresses:
your e-mail address if you gave any
occupation:
The same here
computers:
Same
birthdate: Some date sex: Also something here
interests:
Something
how (did you find out about us):
How do you find them
Privacy switch on/off
shell: your shell account terminal: your terminal type
erase '^H' kill '^U' interrupt '^C'
Type "help" for a list of things you can change.
Select thing to change or "done"?
Now if you agree with all the data just type done and press enter, or if you want to change something just type the you want to change field.
Step 11. (After You type Done)
Now the program is checking if there is already your username, you should be seeing a bunch of numbers scrolling, it's normal don't get scared... Now if your Login name already exists will be asked another, if there isn't the system will encrypt your password, and you'll stay for some time watching a bunch of numbers scrolling. After that....
Step 12. (Congratulations You have a shell account)
Yep you've got a shell account, now you should be again in the login sequence and your login name is already written just type in the password, press enter and have fun. Remember that you can have many shells has you want. So if you want you can login again with newuser but instead of choosing a bash shell choose a Cshell and all the others or a shell bash again...
------------
The commands
------------
Hi won't talk about of every command that exists in *nix systems, if I did that the file would become huge. If you want to a big amount of information about commands check the final notes section. The basic commands are listed below with their function.
Syntax: command [switches] -> description
man [command] -> display the manual entry about the [command] you gave.
cd [directory] -> like in DOS it changes your current directory, to go one directory up you also use .., if you want to return to your home directory just type cd without the [directory] parameter.
ls [-al] -> ls makes the same as dir in DOS, it lists every file in the directory, the -al is some of the switch you can use. Using this two switch the listing will be displayed with hidden files, file permission, group and owner. To know all the other switches man ls.
cat [file] -> it's the same as the command type in DOS, it displays the content of the [file] given.
logout -> Logs you out from your shell account.
who -> Shows who's online, with information about those users. There are programs that make you invisible to the who command, but that's another story, probably in another tutorial.
ps [-aux] -> ps shows every procedure that is running, something like ctrl+alt+del in windows (not to reboot, but to show what's running) but much more powerful since it isn't known how we can run a program without being display in ps. If you run ps with no switches it will just show your own processes, if you use the switch -aux it will list every process that is running in the machine.
joe [file] -> joe is a text editor, it edits or creates the [file] given. Sometimes the shell providers haven't joe but they should have vi or vim (another text editor).
This command should be enough for you to start. Also use man command in the commands that we talk to get a bigger and more detailed description about it. Good surfing!
-----------
Final Notes
-----------
Now what you need is a little of practice, and good books to get in touch with the commands. One of the best *nix books is UNIX IN A NUTSHELL. You can find it in the books section at BSRF WWW page (http://blacksun.box.sk). For me, this is the best book about the subject, and since it's free I strongly recommend you to get it. Another good thing is man. For example, if you want to get some information about telnet, and how to use it, you just type in:
man telnet
And it will be prompt the manual page about telnet. If you are using a shell in the freeshell server (freeshell.org) you can also use the command help without any options. This will call you a menu with the options you can call. And keep in mind that *nix is Case Sensitive so Man, man and MaN or .profile and .Profile isn't the same thing.










