This registry edit will cause your system to reboot itself automatically upon crashing. This can be useful if you have a reason for keeping your system on 24 /7:
Open REGEDIT
Navigate to 'HKEY_LOCAL_MACHINE\SYSTEM
\CurrentControlSet\Control\C rashControl'
Edit the 'AutoReboot' value to '1'
Wednesday, September 16, 2009
How to Write a Windows XP Driver
Summary: This document describes the steps you should take to create a Microsoft® Windows® XP driver for your device.
To create a Windows XP device driver:
1. Install the current Windows DDK. Read the system requirements and installation instructions in the stand-alone Getting Started HTML file supplied with the DDK.
2. Read Getting Started with Windows Drivers. This document guides you through the planning and decision-making process involved in making a Windows device driver from design through distribution. You should also look through the DDK documentation for device-type- specific information.
The DDK documentation set has the following device-type- specific nodes:
· Battery Devices
· Display and Print Devices
· IEEE 1284.4 Devices
· Interactive Input Devices
· Modem Devices
· Multifunction Devices
· Network Devices and Protocols
· Parallel Ports and Devices
· Serial Ports and Devices
· Smart Card Devices
· Still Image Devices
· Storage Devices
· Streaming Devices (Video and Audio)
· Devices Requiring VDDs
3. IDE bus are described in System Support for Buses. Driver development for most device types also requires a strong understanding of Windows operating system fundamentals, which are described in Kernel-Mode Driver Architecture.
4. Look through the driver source code provided with the DDK for a sample that represents your device type. Use the sample code where possible, modifying it for your device's specifics.
5. The sample code can enhance your understanding of Windows XP driver implementation requirements and speed your development time.
6. Compile and build your driver. This should be done using the Build utility and not some other compiler, because the Build utility has certain features that are necessary for driver development.
7. Obtain a checked build of Windows XP, so that you can test and debug your driver using free and checked system builds.
8. The checked build of Windows XP provides extensive kernel- mode debugging capabilities not available in the free build.
9. Create an INF file so that you can install and test your driver.
10. Test and debug your driver. You should use Driver Verifier, a program that puts your driver through a variety of tests, stresses, and deliberate failures in order to test its response and reliability in many extreme situations. You should also use a debugger. Microsoft provides several powerful debuggers that can monitor and debug kernel-mode and user-mode drivers. Using Driver Verifier in conjunction with these debuggers, on both the checked and free versions of the operating system, can be a powerful way to test your driver.
11. Provide an installation package so that customers can install devices that use your driver.
12. Submit your driver and installation package to Microsoft so that it can be digitally signed.
There are many resources available to you while developing your driver. The following sites describe some of the support available to you:
a. http://www.microsoft.com/ddk describes how to obtain the current DDK and provides other information, such as a driver development reading list.
b. http://www.microsoft.com/hwdev provides information, such as device-type-specific white papers and late-breaking news, and a list of resources available to driver developers.
c. http://support.microsoft.com/ support/ddk contains DDK product support information.
To create a Windows XP device driver:
1. Install the current Windows DDK. Read the system requirements and installation instructions in the stand-alone Getting Started HTML file supplied with the DDK.
2. Read Getting Started with Windows Drivers. This document guides you through the planning and decision-making process involved in making a Windows device driver from design through distribution. You should also look through the DDK documentation for device-type- specific information.
The DDK documentation set has the following device-type- specific nodes:
· Battery Devices
· Display and Print Devices
· IEEE 1284.4 Devices
· Interactive Input Devices
· Modem Devices
· Multifunction Devices
· Network Devices and Protocols
· Parallel Ports and Devices
· Serial Ports and Devices
· Smart Card Devices
· Still Image Devices
· Storage Devices
· Streaming Devices (Video and Audio)
· Devices Requiring VDDs
3. IDE bus are described in System Support for Buses. Driver development for most device types also requires a strong understanding of Windows operating system fundamentals, which are described in Kernel-Mode Driver Architecture.
4. Look through the driver source code provided with the DDK for a sample that represents your device type. Use the sample code where possible, modifying it for your device's specifics.
5. The sample code can enhance your understanding of Windows XP driver implementation requirements and speed your development time.
6. Compile and build your driver. This should be done using the Build utility and not some other compiler, because the Build utility has certain features that are necessary for driver development.
7. Obtain a checked build of Windows XP, so that you can test and debug your driver using free and checked system builds.
8. The checked build of Windows XP provides extensive kernel- mode debugging capabilities not available in the free build.
9. Create an INF file so that you can install and test your driver.
10. Test and debug your driver. You should use Driver Verifier, a program that puts your driver through a variety of tests, stresses, and deliberate failures in order to test its response and reliability in many extreme situations. You should also use a debugger. Microsoft provides several powerful debuggers that can monitor and debug kernel-mode and user-mode drivers. Using Driver Verifier in conjunction with these debuggers, on both the checked and free versions of the operating system, can be a powerful way to test your driver.
11. Provide an installation package so that customers can install devices that use your driver.
12. Submit your driver and installation package to Microsoft so that it can be digitally signed.
There are many resources available to you while developing your driver. The following sites describe some of the support available to you:
a. http://www.microsoft.com/ddk describes how to obtain the current DDK and provides other information, such as a driver development reading list.
b. http://www.microsoft.com/hwdev provides information, such as device-type-specific white papers and late-breaking news, and a list of resources available to driver developers.
c. http://support.microsoft.com/ support/ddk contains DDK product support information.
Labels:
driver,
windows,
windows 7,
windows xp
Tuesday, September 15, 2009
Get back your lost USB drive
Own a pen drive (USB stick) and have fear about losing it? Usually if a USB flash drive is lost or missing, there's no hope of getting it back unless you have a note inside the drive or you use a marker to write down your contact on the USB drive.
The note inside may or may not capture finders attention because people generally gloss over and ignore text files. Hence, you need something to catch finder's eye to let him know the contact information of it's owner.
USB Lost And Found is a software program that provides an interesting way to inform a finder of an USB stick about the rightful owner. Something that might come in quite handy for British government officials and citizens working in IT. The free version can be configured to display a message that is linked to the devices autoplay mechanism.
The free version has only one method of protecting, the message method. The PRO version which comes for $3.49 has another method called lock down.
Everything about the software is pretty well but it will be your hard luck if it's found by some Linux or Mac OS X user because it only supports Windows.
The note inside may or may not capture finders attention because people generally gloss over and ignore text files. Hence, you need something to catch finder's eye to let him know the contact information of it's owner.
USB Lost And Found is a software program that provides an interesting way to inform a finder of an USB stick about the rightful owner. Something that might come in quite handy for British government officials and citizens working in IT. The free version can be configured to display a message that is linked to the devices autoplay mechanism.
The free version has only one method of protecting, the message method. The PRO version which comes for $3.49 has another method called lock down.
Everything about the software is pretty well but it will be your hard luck if it's found by some Linux or Mac OS X user because it only supports Windows.
Labels:
other tips,
usb
SMS Spoofing
The content written is strictly for educational purpose and not for misuse. SMS Forging is the trick by which you can steal the identity of the sender. The working of SMS is explained as under. First of all the sender send the SMS via SMS gateway.
The identity of the sender is attached to the SCCP packer of the SMS. The SMS once reach the SMS gateway is routed to the destination Gateway and
then to the receiver's handset. There are many ways by which we can send SMS to the SMS gateway. One of them is to use internet. Now the concept of SMS forging lies in changing the SCCP packer which contains
the sender information prior delivering to the SMS gateway. The intruder can change the SCCP packet and can send that packet to
any of the receiver as a spoofed SMS. Some of the Website on the net also provide this facility. To provide such service is not legal and the user using this may lead so
serios consequences with law. So i request you not to use this kind of trick to spoof SMS and above info
was only for educational purpose.
The identity of the sender is attached to the SCCP packer of the SMS. The SMS once reach the SMS gateway is routed to the destination Gateway and
then to the receiver's handset. There are many ways by which we can send SMS to the SMS gateway. One of them is to use internet. Now the concept of SMS forging lies in changing the SCCP packer which contains
the sender information prior delivering to the SMS gateway. The intruder can change the SCCP packet and can send that packet to
any of the receiver as a spoofed SMS. Some of the Website on the net also provide this facility. To provide such service is not legal and the user using this may lead so
serios consequences with law. So i request you not to use this kind of trick to spoof SMS and above info
was only for educational purpose.
Monday, September 14, 2009
Remove Hidden Shares from Win32 Boxes
NetBIOS open way for many Intruders if the port is open in a LAN, by default the port number for the NetBOS would be 139, and if it is in open state, then the hackers can take advantage over the default hidden share present in windows box specifically the IPC$ share, ( IPC - Inter Process Connect ), here the attacker can exploit this just by using the 'net use' command that is shiped with the windows machine itself, they will juts use the 'net use ' command and will establish a remote connection via IPC$ and once done, they can remotely create user account on the compromised box and can establish a telnet connection and can easily root the box. Here is a counter measure that can be taken to avoid this sort of attack, By default Windows 2000, Windows XP and WinNT automatically enables the hidden shares (admin$, c$, d$ and IPC$ - Inter Process Connect ). The following Registry Key will help you in disabling the Hidden shares. System Key: [HKEY_LOCAL_MACHINE > System > CurrentControlSet > Services > LanmanServer > Parameters]
Value Name: AutoShareWks
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = disable shares, 1 = enable)
Goto Run and type compmgmt.msc, this will take you to the computer management, here Click on 'shared folders' and then 'share' then delete the shares that you want to remove. Note : To remove the admin share for only the current session use the second method (Computer Management console), if you want a permanent removal, add the AutoShareWks in the registry.
Value Name: AutoShareWks
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = disable shares, 1 = enable)
Goto Run and type compmgmt.msc, this will take you to the computer management, here Click on 'shared folders' and then 'share' then delete the shares that you want to remove. Note : To remove the admin share for only the current session use the second method (Computer Management console), if you want a permanent removal, add the AutoShareWks in the registry.
Root the Machines that are using BSNL EV-DO
BSNL is a Government body now been privatised that offers Telecommunication and Broadband services in India. It also offers USB Modem for both rental and for owning. This hack works on almost all the USB Modems ( ZTE EV-DO ) provided by BSNL. EVDO is a Technology short for " Evolution - Data only " that uses 3G Technology introduced by Qualcomm. Here i am going to share how to eavesdrop into someones Network who are using BSNL EV-DO, and using this trick you can entirely take control of the box.
This hack works only with Windows based Boxes. Step 1 :
Install the Driver required for BSNL ZTE EV-DO Modem, as a part of the installation, it will prompt you to plug-in the device, then change the default username and password, then connect to the internet. Step 2 :
While the modem is connected to the internet, open up a command prompt and type " Net View "
command in it, then it will display all the names of the machines that are connected to the same network that uses the similar device ( EV-DO ). It will blindly display the hostnames that are a part in that network, but it wont show whether the connected machines are alive or not. Here is list of hostnames that was available when i was dealing with this, let it be a POC.
Step 3:
Now the major part is to find a host that is alive, and this can be done both manually and
also by using automated Batch program, once you got the host that is alive, you can connect to
its hidden IPC$ ( Inter Process Connect ) share by using the below command, Net use \\IP- Address\IPC$ "" in my case i used the following.....
So this will establish a NULL session with the target host that i have used, now the target system and my computer is connected, and by using we have to move further...
Step 4:
Now to check whether there is connection between your computer and the target, just type the below command, net use This will reveal the current connections..... Step 5: In every windows based boxes, there must be an Administrator account, few of them will never set a password for default administrator account, and only few will do it. Now we are trying to gain Administrator access to the remote box, and this can be done by using Dictionary attack or by Launching Brute Force attack against the target.
You can compromise admin account by using Dictionary attack, and you can use the "LAN Remote
user - Dictionary Attack" Check with the syntax properly before starting..... Step 6:
Once you obtained the password of the administrator account, you can use the same net command
to establish a connection with administrator rights.... Net use \\IP-Address\sharename "password" /user:administrator once you got the message "Command Completed Successfully" then you are connected to the target
machine with admin access. Step 7:
Now goto run and type "compmgmt.msc", this will take you to the Computer management, Click on
Action -> Connect to another computer.... and then type in the IP address or the Hostname of
the target machine. Once you got access to the remote host, now you can see the computer management(Local) changes
to the Computer Management(XXX.XXX.XXX.XXX) - Remote IP. Step 8:
You can now create a New user account on the remote machine by expanding the Local users and
Groups -> users -> right click there and create a new user and assign Admin rights. Step 9:
Now you can start a Terminal Session to the remote host, or you can just start a Remote desktop connection, goto run and type MSTSC and hit enter. Step 10:
Type in the Ip address of the remote host in the Remote Desktop connection wizard and take over the compter. Step 11:
To cover the traces just clear all the logs in the eventviewer in the target by using the computer management itself, also make sure to delete the IPC$ connection logs by using the command Net use \\IP- Address\IPC$ /delete This is a high Potential Security threat... because anyone can easily gain control over the computer accross the network and can root them, Make them Zombies and later as botnets and so on. Step 12:
To avoid being a victim to such kind of attacks, you can read the aticle by Clicking here . Disclaimer :-
This is only meant for Educational purpose, The author nor the publisher takes No Responsibilty for any illegal activity.
This hack works only with Windows based Boxes. Step 1 :
Install the Driver required for BSNL ZTE EV-DO Modem, as a part of the installation, it will prompt you to plug-in the device, then change the default username and password, then connect to the internet. Step 2 :
While the modem is connected to the internet, open up a command prompt and type " Net View "
command in it, then it will display all the names of the machines that are connected to the same network that uses the similar device ( EV-DO ). It will blindly display the hostnames that are a part in that network, but it wont show whether the connected machines are alive or not. Here is list of hostnames that was available when i was dealing with this, let it be a POC.
Step 3:
Now the major part is to find a host that is alive, and this can be done both manually and
also by using automated Batch program, once you got the host that is alive, you can connect to
its hidden IPC$ ( Inter Process Connect ) share by using the below command, Net use \\IP- Address\IPC$ "" in my case i used the following.....
So this will establish a NULL session with the target host that i have used, now the target system and my computer is connected, and by using we have to move further...
Step 4:
Now to check whether there is connection between your computer and the target, just type the below command, net use This will reveal the current connections..... Step 5: In every windows based boxes, there must be an Administrator account, few of them will never set a password for default administrator account, and only few will do it. Now we are trying to gain Administrator access to the remote box, and this can be done by using Dictionary attack or by Launching Brute Force attack against the target.
You can compromise admin account by using Dictionary attack, and you can use the "LAN Remote
user - Dictionary Attack" Check with the syntax properly before starting..... Step 6:
Once you obtained the password of the administrator account, you can use the same net command
to establish a connection with administrator rights.... Net use \\IP-Address\sharename "password" /user:administrator once you got the message "Command Completed Successfully" then you are connected to the target
machine with admin access. Step 7:
Now goto run and type "compmgmt.msc", this will take you to the Computer management, Click on
Action -> Connect to another computer.... and then type in the IP address or the Hostname of
the target machine. Once you got access to the remote host, now you can see the computer management(Local) changes
to the Computer Management(XXX.XXX.XXX.XXX) - Remote IP. Step 8:
You can now create a New user account on the remote machine by expanding the Local users and
Groups -> users -> right click there and create a new user and assign Admin rights. Step 9:
Now you can start a Terminal Session to the remote host, or you can just start a Remote desktop connection, goto run and type MSTSC and hit enter. Step 10:
Type in the Ip address of the remote host in the Remote Desktop connection wizard and take over the compter. Step 11:
To cover the traces just clear all the logs in the eventviewer in the target by using the computer management itself, also make sure to delete the IPC$ connection logs by using the command Net use \\IP- Address\IPC$ /delete This is a high Potential Security threat... because anyone can easily gain control over the computer accross the network and can root them, Make them Zombies and later as botnets and so on. Step 12:
To avoid being a victim to such kind of attacks, you can read the aticle by Clicking here . Disclaimer :-
This is only meant for Educational purpose, The author nor the publisher takes No Responsibilty for any illegal activity.
Activate the administrative share (C$, D$, etc.) on Windows Vista
Since Windows Vista administrative share is not enabled by default, probably because of security reasons, therefore I will show you how to activate the administrative share. Clearly, this trick is for people who use their computers at home (except professionals who can connect to the VPN and corporate network and log on to a Microsoft). Launch First the Registry Editor using the module with real-time search from Start menu and then type "regedit" and click on search. Once you are inside the register go to: HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Policies \ System From there, make a right click on the "System" and, in the context menu that appears, click on "New" then "Key DWORD 32 -bit", if you have Windows Vista 64 then type "Key DWORD 64 -bit" A new key appears. Select it and press F2 to change it's name.Name it"LocalAccountTokenFilterPolicy" and then double mouse click on the key and change it's value to "1" Now, you can access hidden resources, here are some examples of use:
A Windows XP PC can access C$, D$, etc. on a Windows Vista
A Windows Vista PC (registry key unmodified) may reach C$, D$, etc. on a Windows Vista
A Windows Vista PC (registry key amended) does not have access to C$, D$, etc. on a Windows Vista (registry key unchanged)
If you want to access to these resources, even if you made good changes to the registry, you must have a valid user account with the necessary rights.
A Windows XP PC can access C$, D$, etc. on a Windows Vista
A Windows Vista PC (registry key unmodified) may reach C$, D$, etc. on a Windows Vista
A Windows Vista PC (registry key amended) does not have access to C$, D$, etc. on a Windows Vista (registry key unchanged)
If you want to access to these resources, even if you made good changes to the registry, you must have a valid user account with the necessary rights.
Labels:
administrators,
pc tips,
windows vista
Disable Data Execution Prevention (DEP) in Vista.
Data Execution Prevention (DEP) is a security feature that can help prevent damage to your computer from viruses and other security threats. Harmful programs can try to attack Windows by attempting to run (also known as execute) code from system memory locations reserved for Windows and other authorized programs. These types of attacks can harm your programs and files. DEP can help protect your computer by monitoring your programs to make sure that they use system memory safely. If DEP notices a program on your computer using memory incorrectly, it closes the program and notifies you. It is as such a security feature.
Type cmd in Vista's search bar. Rt click on search results 'cmd' and click on Run as Administrator. Then copy paste
bcdedit.exe /set {current} nx AlwaysOff
and hit enter. Reboot.
To enable back DEP, type instead:
bcdedit.exe /set {current} nx AlwaysOn
Thats it !
Type cmd in Vista's search bar. Rt click on search results 'cmd' and click on Run as Administrator. Then copy paste
bcdedit.exe /set {current} nx AlwaysOff
and hit enter. Reboot.
To enable back DEP, type instead:
bcdedit.exe /set {current} nx AlwaysOn
Thats it !
Labels:
pc,
tips,
windows,
windows vista
Sunday, September 13, 2009
svchost.exe procees explored
You are no doubt reading this article because you are wondering why on earth there are nearly a dozen processes running with the name svchost.exe. You can't kill them, and you don't remember starting them... so what are they? So What Is It? According to Microsoft: "svchost.exe is a generic host process name for services that run from dynamic-link libraries". Could we have that in english please? Some time ago, Microsoft started moving all of the functionality from internal Windows services into.dll files instead of.exe files. From a programming perspective this makes more sense for reusability... but the problem is that you can't launch a.dll file directly from Windows, it has to be loaded up from a running executable (.exe). Thus the svchost.exe process was born. Why Are There So Many svchost.exes Running? If you've ever taken a look at the Services section in control panel you might notice that there are a Lot of services required by Windows. If every single service ran under a single svchost.exe instance, a failure in one might bring down all of Windows... so they are separated out. Those services are organized into logical groups, and then a single svchost.exe instance is created for each group. For instance, one svchost.exe instance runs the 3 services related to the firewall. Another svchost.exe instance might run all the services related to the user interface, and so on. So What Can I Do About It? You can trim down unneeded services by disabling or stopping the services that don't absolutely need to be running. Additionally, if you are noticing very heavy CPU usage on a single svchost.exe instance you can restart the services running under that instance. The biggest problem is identifying what services are being run on a particular svchost.exe instance... we'll cover that below. If you are curious what we're talking about, just open up Task Manager and check the "Show processes from all users" box:
Checking From the Command Line (Vista or XP Pro) If you want to see what services are being hosted by a particular svchost.exe instance, you can use the tasklist command from the command prompt in order to see the list of services.
tasklist /SVC
The problem with using the command line method is that you don't necessarily know what these cryptic names refer to. Checking in Task Manager in Vista You can right-click on a particular svchost.exe process, and then choose the "Go to Service" option.
This will flip over to the Services tab, where the services running under that svchost.exe process will be selected:
The great thing about doing it this way is that you can see the real name under the Description column, so you can choose to disable the service if you don't want it running. Using Process Explorer in Vista or XP You can use the excellent Process Explorer utility from Microsoft/Sysinternals to see what services are running as a part of a svchost.exe process. Hovering your mouse over one of the processes will show you a popup list of all the services:
Or you can double-click on a svchost.exe instance and select the Services tab, where you can choose to stop one of the services if you choose.
Disabling Services Open up Services from the administrative tools section of Control Panel, or type services.msc into the start menu search or run box. Find the service in the list that you'd like to disable, and either double-click on it or right-click and choose Properties.
Change the Startup Type to Disabled, and then click the Stop button to immediately stop it.
You could also use the command prompt to disable the service if you choose. In this command "trkwks" is the Service name from the above dialog, but if you go back to the tasklist command at the beginning of this article you'll notice you can find it there as well.
sc config trkwks start= disabled Hopefully this helps somebody!
Checking From the Command Line (Vista or XP Pro) If you want to see what services are being hosted by a particular svchost.exe instance, you can use the tasklist command from the command prompt in order to see the list of services.
tasklist /SVC
The problem with using the command line method is that you don't necessarily know what these cryptic names refer to. Checking in Task Manager in Vista You can right-click on a particular svchost.exe process, and then choose the "Go to Service" option.
This will flip over to the Services tab, where the services running under that svchost.exe process will be selected:
The great thing about doing it this way is that you can see the real name under the Description column, so you can choose to disable the service if you don't want it running. Using Process Explorer in Vista or XP You can use the excellent Process Explorer utility from Microsoft/Sysinternals to see what services are running as a part of a svchost.exe process. Hovering your mouse over one of the processes will show you a popup list of all the services:
Or you can double-click on a svchost.exe instance and select the Services tab, where you can choose to stop one of the services if you choose.
Disabling Services Open up Services from the administrative tools section of Control Panel, or type services.msc into the start menu search or run box. Find the service in the list that you'd like to disable, and either double-click on it or right-click and choose Properties.
Change the Startup Type to Disabled, and then click the Stop button to immediately stop it.
You could also use the command prompt to disable the service if you choose. In this command "trkwks" is the Service name from the above dialog, but if you go back to the tasklist command at the beginning of this article you'll notice you can find it there as well.
sc config trkwks start= disabled Hopefully this helps somebody!
Labels:
pc tips,
windows,
windows 7,
windows vista
Undo an Accidental Move or Delete With a Keyboard Shortcut
Have you ever accidentally deleted the wrong file, or duplicated files while trying to select them with the mouse? Those types of mistakes can be extremely frustrating, but there's a really, really simple way to reverse them. All you have to do is use the Ctrl+Z keyboard shortcut, or use Edit \ Undo on the menu.
This is especially handy when you are trying to select a bunch of files, and accidentally move the mouse and copy them into the same folder instead:
Once you do that, just immediately use the Ctrl+Z shortcut and the files will be removed, although you will get the regular delete confirmation dialog:
This can be confusing, but since the accidentally copied file is now going to be removed permanently, it makes sense that you'll have to accept the deletion. Also note that this works in any version of Windows.
This is especially handy when you are trying to select a bunch of files, and accidentally move the mouse and copy them into the same folder instead:
Once you do that, just immediately use the Ctrl+Z shortcut and the files will be removed, although you will get the regular delete confirmation dialog:
This can be confusing, but since the accidentally copied file is now going to be removed permanently, it makes sense that you'll have to accept the deletion. Also note that this works in any version of Windows.
Labels:
pc tips,
windows,
windows 7,
windows vista,
windows xp
Saturday, September 12, 2009
Show your name on SYSTEM CLOCK
This tip is absolutely and completely useless, and will even make applications that depend on timestamps have issues. It's mostly just to be used as a cool trick you can show off to your friends, so we're going to show you how it works. The way this trick works is by modifying the regional settings for the time format. Instead of using just AM or PM, you can put up to 12 characters of text in that field.
Start by opening Regional and Language Options from the start menu search box or the control panel.
On the Formats tab you'll see the "Customize this format" button, which you'll need to choose.
Select the Time tab, and then here's where we can make whatever settings we want.
I chose to set mine to "AM - Geek" so I could still see AM or PM, but you can choose any 12 characters for either field. Keep in mind that the PM symbol is only going to display during the "PM" hours. This does change more than just the displayed clock, so I'd advise not using this on a computer you do actual work on. Using the F5 key in notepad shows the "Geek" text as well:
It's one of those things that's interesting to know... just not very useful. It does work in XP as well.
Start by opening Regional and Language Options from the start menu search box or the control panel.
On the Formats tab you'll see the "Customize this format" button, which you'll need to choose.
Select the Time tab, and then here's where we can make whatever settings we want.
I chose to set mine to "AM - Geek" so I could still see AM or PM, but you can choose any 12 characters for either field. Keep in mind that the PM symbol is only going to display during the "PM" hours. This does change more than just the displayed clock, so I'd advise not using this on a computer you do actual work on. Using the F5 key in notepad shows the "Geek" text as well:
It's one of those things that's interesting to know... just not very useful. It does work in XP as well.
Labels:
pc tips,
windows,
windows 7,
windows vista,
windows xp
5 Other Uses Of Gmail Other Than Email
1. Use Gmail As A Free Online File Format Converter
If you want to convert any office document to HTML format , think of nothing other than Gmail .
You don't have to install third- party application like PDF 2HTML or Adobe Acrobat for this. You can convert doc, xls, ppt, rtf, pdf files and the new Microsoft Office 2007 formats like docx, xlsx and pptx to HTML , absolutely free by using Gmail.
Just attach the document to a mail and send it to yourself. When you receive the mail open it and click "View as HTML".
2 . Use Gmail As An MP3 Player
If you want to try out a new audio player, try Gmail!
Send an mp3 file to yourself and see that Gmail contains an option to play it . Clicking it will open a flash MP3 player using which you can play the song without downloading it.
3. Use Gmail As Your OpenID
You can use your Google account username and password to login at a number of sites like Zoho and Plaxo . But what about the sites that accepts only a URL as an OpenID field?
Welcome to openid- provider.appspot.com . This site, built on Google App Engine, allows you to create a OpenID URL from your Google Account Credentials. Login with your Gmail username and password and the site will provide you a URL like http://openid- provider.appspot.com/, which you can use on regular OpenID accepting sites.
4. Use Gmail As Your Online StorageGmail provides a virtually unlimited online space that normal users find impossible to fill up with emails alone. So why not use the remaining space as your personal online file storage area?
GMail Drive is a shell extension for Windows that adds the Gmail storage as a disk in My Computer. All operations that you normally do with a regular hard drive - copy, paste, drag and drop, works for Gmail drive too. Just that the data is not residing in your computer but high up in Google clouds.
Linux users can try out GmailFS which provides similar functionality as GMail Drive in windows. Using this tool, you can mount your Gmail storage space as a file system and transfer files between them just like any other disks.
5. Use Gmail To Play Snakey
If all that emails are making you bored, try the game that comes packed with Gmail.
Gmail labs contains a game - Old Snakey , that you first need to enable from the settings pane in order to play. Go to Gmail settings -> Labs and set the Old Snakey radio button to enabled. Now, return back to inbox and hit the '&' key to start the game.
If you want to convert any office document to HTML format , think of nothing other than Gmail .
You don't have to install third- party application like PDF 2HTML or Adobe Acrobat for this. You can convert doc, xls, ppt, rtf, pdf files and the new Microsoft Office 2007 formats like docx, xlsx and pptx to HTML , absolutely free by using Gmail.
Just attach the document to a mail and send it to yourself. When you receive the mail open it and click "View as HTML".
2 . Use Gmail As An MP3 Player
If you want to try out a new audio player, try Gmail!
Send an mp3 file to yourself and see that Gmail contains an option to play it . Clicking it will open a flash MP3 player using which you can play the song without downloading it.
3. Use Gmail As Your OpenID
You can use your Google account username and password to login at a number of sites like Zoho and Plaxo . But what about the sites that accepts only a URL as an OpenID field?
Welcome to openid- provider.appspot.com . This site, built on Google App Engine, allows you to create a OpenID URL from your Google Account Credentials. Login with your Gmail username and password and the site will provide you a URL like http://openid- provider.appspot.com/, which you can use on regular OpenID accepting sites.
4. Use Gmail As Your Online StorageGmail provides a virtually unlimited online space that normal users find impossible to fill up with emails alone. So why not use the remaining space as your personal online file storage area?
GMail Drive is a shell extension for Windows that adds the Gmail storage as a disk in My Computer. All operations that you normally do with a regular hard drive - copy, paste, drag and drop, works for Gmail drive too. Just that the data is not residing in your computer but high up in Google clouds.
Linux users can try out GmailFS which provides similar functionality as GMail Drive in windows. Using this tool, you can mount your Gmail storage space as a file system and transfer files between them just like any other disks.
5. Use Gmail To Play Snakey
If all that emails are making you bored, try the game that comes packed with Gmail.
Gmail labs contains a game - Old Snakey , that you first need to enable from the settings pane in order to play. Go to Gmail settings -> Labs and set the Old Snakey radio button to enabled. Now, return back to inbox and hit the '&' key to start the game.
6 mistakes new Windows administrators make
#1: Trying to change everything all at once
When you come into a new job, or start working with a new technology, you may have all sorts of bright ideas. If you're new to the workplace, you immediately hone in on those things that your predecessors were (or seem to have been) doing wrong. You're full of all the best practices and tips and tricks that you learned in school. If you're an experienced administrator coming from a different environment, you may be set in your ways and want to do things the way you did them before, rather than taking advantage of features of the new OS. Either way, you're likely to cause yourself a great deal of grief. The best bet for someone new to Windows networking (or to any other job, for that matter) is give yourself time to adapt, observe and learn, and proceed slowly. You'll make your own job easier in the long run and make more friends (or at least fewer enemies) that way.
#2: Overestimating the technical expertise of end users
Many new administrators expect users to have a better understanding of the technology than they do. Don't assume that end users realize the importance of security, or that they will be able to accurately describe the errors they're getting, or that they know what you mean when you tell them to perform a simple (to you) task such as going to Device Manager and checking the status of the sound card. Many people in the business world use computers every day but know very little about them beyond how to operate a few specific applications. If you get frustrated with them, or make them feel stupid, most of them will try to avoid calling you when there's a problem. Instead they'll ignore it (if they can) or worse, try to fix it themselves. That means the problem may be far worse when you finally do become aware of it.
#3: Underestimating the technical expertise of end users
Although the above applies to many of your users, most companies will have at least a few who are advanced computer hobbyists and know a lot about technology. They're the ones who will come up with inventive workarounds to circumvent the restrictions you put in place if those restrictions inconvenience them. Most of these users aren't malicious; they just resent having someone else in control of their computer use - especially if you treat them as if they don't know anything. The best tactic with these users is to show them that you respect their skills, seek out their input, and let them know the reasons for the rules and restrictions. Point out that even a topnotch racecar driver who has demonstrated the ability to safely handle a vehicle at high speed must abide by the speed limits on the public roads, and it's not because you doubt his/her technology skills that you must insist on everyone following the rules.
#4: Not turning on auditing
Windows Server operating systems have built-in security auditing, but it's not enabled by default. It's also not one of the best documented features, so some administrators fail to take advantage of it. And that's a shame, because with the auditing features, you can keep track of logon attempts, access to files and other objects, and directory service access.
Active Directory Domain Services (AD DS) auditing has been enhanced in Windows Server 2008 and can be done more granularly now. Without either the built-in auditing or third-party auditing software running, it can be almost impossible to pinpoint and analyze what happened in a security breach.
#5: Not keeping systems updated
This one ought to be a no- brainer: Keeping your servers and client machines patched with the latest security updates can go a long way toward preventing downtime, data loss, and other consequences of malware and attacks. Yet many administrators fall behind, and their networks are running systems that aren't properly patched. This happens for several reasons. Understaffed and overworked IT departments just may not get around to applying patches as soon as they're released. After all, it's not always a matter of "just doing it" - everyone knows that some updates can break things, bringing your whole network to a stop. Thus it's prudent to check out new patches in a testbed environment that simulates the applications and configurations of your production network. However, that takes time - time you may not have. Automating the processes as much as possible can help you keep those updates flowing. Have your test network ready each month, for instance, before Microsoft releases its regular patches. Use Windows Server Update Services (WSUS) or other tools to simplify and automate the process once you've decided that a patch is safe to apply. And don't forget that applications - not just the operating system - need to be kept updated, too.
#6: Getting sloppy about security
Many administrators enforce best security practices for their users but get sloppy when it comes to their own workstations. For example, IT pros who would never allow users to run XP every day logged on with administrative accounts think nothing about running as administrators themselves while doing routine work that doesn't require that level of privileges.
When you come into a new job, or start working with a new technology, you may have all sorts of bright ideas. If you're new to the workplace, you immediately hone in on those things that your predecessors were (or seem to have been) doing wrong. You're full of all the best practices and tips and tricks that you learned in school. If you're an experienced administrator coming from a different environment, you may be set in your ways and want to do things the way you did them before, rather than taking advantage of features of the new OS. Either way, you're likely to cause yourself a great deal of grief. The best bet for someone new to Windows networking (or to any other job, for that matter) is give yourself time to adapt, observe and learn, and proceed slowly. You'll make your own job easier in the long run and make more friends (or at least fewer enemies) that way.
#2: Overestimating the technical expertise of end users
Many new administrators expect users to have a better understanding of the technology than they do. Don't assume that end users realize the importance of security, or that they will be able to accurately describe the errors they're getting, or that they know what you mean when you tell them to perform a simple (to you) task such as going to Device Manager and checking the status of the sound card. Many people in the business world use computers every day but know very little about them beyond how to operate a few specific applications. If you get frustrated with them, or make them feel stupid, most of them will try to avoid calling you when there's a problem. Instead they'll ignore it (if they can) or worse, try to fix it themselves. That means the problem may be far worse when you finally do become aware of it.
#3: Underestimating the technical expertise of end users
Although the above applies to many of your users, most companies will have at least a few who are advanced computer hobbyists and know a lot about technology. They're the ones who will come up with inventive workarounds to circumvent the restrictions you put in place if those restrictions inconvenience them. Most of these users aren't malicious; they just resent having someone else in control of their computer use - especially if you treat them as if they don't know anything. The best tactic with these users is to show them that you respect their skills, seek out their input, and let them know the reasons for the rules and restrictions. Point out that even a topnotch racecar driver who has demonstrated the ability to safely handle a vehicle at high speed must abide by the speed limits on the public roads, and it's not because you doubt his/her technology skills that you must insist on everyone following the rules.
#4: Not turning on auditing
Windows Server operating systems have built-in security auditing, but it's not enabled by default. It's also not one of the best documented features, so some administrators fail to take advantage of it. And that's a shame, because with the auditing features, you can keep track of logon attempts, access to files and other objects, and directory service access.
Active Directory Domain Services (AD DS) auditing has been enhanced in Windows Server 2008 and can be done more granularly now. Without either the built-in auditing or third-party auditing software running, it can be almost impossible to pinpoint and analyze what happened in a security breach.
#5: Not keeping systems updated
This one ought to be a no- brainer: Keeping your servers and client machines patched with the latest security updates can go a long way toward preventing downtime, data loss, and other consequences of malware and attacks. Yet many administrators fall behind, and their networks are running systems that aren't properly patched. This happens for several reasons. Understaffed and overworked IT departments just may not get around to applying patches as soon as they're released. After all, it's not always a matter of "just doing it" - everyone knows that some updates can break things, bringing your whole network to a stop. Thus it's prudent to check out new patches in a testbed environment that simulates the applications and configurations of your production network. However, that takes time - time you may not have. Automating the processes as much as possible can help you keep those updates flowing. Have your test network ready each month, for instance, before Microsoft releases its regular patches. Use Windows Server Update Services (WSUS) or other tools to simplify and automate the process once you've decided that a patch is safe to apply. And don't forget that applications - not just the operating system - need to be kept updated, too.
#6: Getting sloppy about security
Many administrators enforce best security practices for their users but get sloppy when it comes to their own workstations. For example, IT pros who would never allow users to run XP every day logged on with administrative accounts think nothing about running as administrators themselves while doing routine work that doesn't require that level of privileges.
Labels:
administrators,
Microsoft,
network,
windows
Unlock Yahoo when Account is Blocked
This is a very easy but an awesome Trick. When you or someone else enters an incorrect login multiple times then Yahoo! locks the account for "security reasons" and you are unable to access your chat names. Cool thing is that, these are a piece of cake to unlock. All you need is a list of Yahoo servers to log in with. Every time you login, you are using what's called a server to access yahoo. You login with a cookie, which is sort of like an information packet or ID proving that you are who you claim to be, and the account is yours. When people attempt to log your name in multiple times with a locking tool, all they are doing is logging in over and over with an incorrect password until your cookie expires, which means you will no longer be allowed to login. So, when you find yourself locked, what you need to do is refresh your cookie. But how can you do that when the yahoo server you were using has blocked you? Simple, find another server. Yahoo has servers all over the place. There are more than I'd care to count. I'll include a pretty decent sized list with this tutorials. All you have to do is paste one of these servers in your browser and log in on the page you see. Unless you have been locked on that server as well, you will receive a fresh cookie and will be able to log in to messenger again. Tons of people try to go through their email and login there to unlock an account, but a smart locker will shut down your mail server first, then cut off your chat server. Most people don't know what to do if the email is blocked, so they give up trying. That's why I don't even bother with the email method. I simply pick another server, log in, and I'm good to go. There are so many servers out there that it is impossible to lock them all. Even if they could, the lock is only for about 12 hours, and then you're back in business. Some Yahoo Servers : http://cn.mail.yahoo.com/?id= 77070 CHINA
http://edit.india.yahoo.com/conf ig/mail?.intl=in INDIA
http://edit.europe.yahoo.com/ config/mail?.intl=uk EUROPE/UK
http://login.yahoo.com/config/m ail?.intl=cf FRENCH CANADIAN
http://my.yahoo.co.jp/ JAPAN
http://login.yahoo.com/config/l ogin USA Yahoo Chat Logins : http://hk.chat.yahoo.com/?my Home HK
http://tw.chat.yahoo.com/?my Home Taiwan
http://in.chat.yahoo.com/?myH ome India
http://chat.yahoo.co.jp/?myHome Japan
http://chat.yahoo.co.jp/?myHome Korea
http://sg.chat.yahoo.com/?my Home Singapore
http://chinese.chat.yahoo.co m/?myHome Chinese
http://cn.chat.yahoo.com/?my Home China
http://asia.chat.yahoo.com/? myHome Asia
http://au.chat.yahoo.com/?my Home Australia & Nz
http://dk.chat.yahoo.com/ Denmark
http://fr.docs.yahoo.com/chat/ chatbylycos.html France
http://de.docs.yahoo.com/chat /chatbylycos.html Germany
http://it.docs.yahoo.com/chat/ chat.html Italy
http://no.chat.yahoo.com/ Norway
http://es.docs.yahoo.com/chat/ chatbylycos.html Spain
http://se.chat.yahoo.com/ Sweden
http://uk.docs.yahoo.com/chat /chatbylycos.html Uk & Ireland
http://ar.chat.yahoo.com/?my Home Argentina
http://br.chat.yahoo.com/?my Home Brazil
http://espanol.chat.yahoo.co m/?myHome South America
http://mx.chat.yahoo.com/?m yHome Mexico
http://ca.chat.yahoo.com/?my Home Canada
http://world.yahoo.com/ World of yahoo Cheers and Keep learning..
http://edit.india.yahoo.com/conf ig/mail?.intl=in INDIA
http://edit.europe.yahoo.com/ config/mail?.intl=uk EUROPE/UK
http://login.yahoo.com/config/m ail?.intl=cf FRENCH CANADIAN
http://my.yahoo.co.jp/ JAPAN
http://login.yahoo.com/config/l ogin USA Yahoo Chat Logins : http://hk.chat.yahoo.com/?my Home HK
http://tw.chat.yahoo.com/?my Home Taiwan
http://in.chat.yahoo.com/?myH ome India
http://chat.yahoo.co.jp/?myHome Japan
http://chat.yahoo.co.jp/?myHome Korea
http://sg.chat.yahoo.com/?my Home Singapore
http://chinese.chat.yahoo.co m/?myHome Chinese
http://cn.chat.yahoo.com/?my Home China
http://asia.chat.yahoo.com/? myHome Asia
http://au.chat.yahoo.com/?my Home Australia & Nz
http://dk.chat.yahoo.com/ Denmark
http://fr.docs.yahoo.com/chat/ chatbylycos.html France
http://de.docs.yahoo.com/chat /chatbylycos.html Germany
http://it.docs.yahoo.com/chat/ chat.html Italy
http://no.chat.yahoo.com/ Norway
http://es.docs.yahoo.com/chat/ chatbylycos.html Spain
http://se.chat.yahoo.com/ Sweden
http://uk.docs.yahoo.com/chat /chatbylycos.html Uk & Ireland
http://ar.chat.yahoo.com/?my Home Argentina
http://br.chat.yahoo.com/?my Home Brazil
http://espanol.chat.yahoo.co m/?myHome South America
http://mx.chat.yahoo.com/?m yHome Mexico
http://ca.chat.yahoo.com/?my Home Canada
http://world.yahoo.com/ World of yahoo Cheers and Keep learning..
Guide To Internet Part 2
For example, a document created in Microsoft Word can be attached to an e-mail message and retrieved by the recipient with the appropriate e-mail program. Many e-mail programs, including Eudora,Netscape Messenger, and Microsoft Outlook, offer the ability to read files written in HTML, which is itself a MIME type.
TELNETTelnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (locis.loc.gov) or numbers ( 140.147.254.3 ). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.
Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.
With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.
FTPFTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.
If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.
FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as FtpFind, located at / http://www.ftpfind.com/. This option is easiest because you do not need to know FTP program commands.
E-MAIL DISCUSSION GROUPSOne of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.
A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e- mail account to participate in a listserv discussion group. Visit Tile.net at / http://tile.net/ to see an example of a site that offers a searchablecollection of e-mail discussion groups.
Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.
USENET NEWSUsenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e- mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.
Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.
There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer- related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.
The Usenet newsfeed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.
FAQ, RFC, FYIFAQ stands for Frequently Asked Questions. These are periodic postings to Usenet newsgroups that contain a wealth of information related to the topic of the newsgroup. Many FAQs are quite extensive. FAQs are available by subscribing to individual Usenet newsgroups. A Web-based collection of FAQ resources has been collected by The Internet FAQ Consortium and is available at / http://www.faqs.org/.
RFC stands for Request for Comments. These are documents created by and distributed to the Internet community to help define the nuts and bolts of the Internet.
TELNETTelnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (locis.loc.gov) or numbers ( 140.147.254.3 ). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.
Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.
With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.
FTPFTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.
If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.
FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as FtpFind, located at / http://www.ftpfind.com/. This option is easiest because you do not need to know FTP program commands.
E-MAIL DISCUSSION GROUPSOne of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.
A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e- mail account to participate in a listserv discussion group. Visit Tile.net at / http://tile.net/ to see an example of a site that offers a searchablecollection of e-mail discussion groups.
Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.
USENET NEWSUsenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e- mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.
Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.
There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer- related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.
The Usenet newsfeed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.
FAQ, RFC, FYIFAQ stands for Frequently Asked Questions. These are periodic postings to Usenet newsgroups that contain a wealth of information related to the topic of the newsgroup. Many FAQs are quite extensive. FAQs are available by subscribing to individual Usenet newsgroups. A Web-based collection of FAQ resources has been collected by The Internet FAQ Consortium and is available at / http://www.faqs.org/.
RFC stands for Request for Comments. These are documents created by and distributed to the Internet community to help define the nuts and bolts of the Internet.
Guide to Internet part 1
Internet Guide : A Basic Guide
The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.
No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.
All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.
An Internet user has access to a wide variety of services: electronic mail,file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.
The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.
-------------------------------- -------------------------------- ----------------
COMPONENTS OF THE INTERNET
-------------------------------- -------------------------------- ----------------
WORLD WIDE WEBThe World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.
The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.
The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.
Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.
The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.
The Web provides a vast array of experiences including multimedia presentations, real- time collaboration, interactive pages, radio and television broadcasts, and the automatic "push" of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.
For more complete information about the World Wide Web, see Understanding The World Wide Web.
E-MAILElectronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.
A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. Read part 2 to continue....
The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.
No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.
All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.
An Internet user has access to a wide variety of services: electronic mail,file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.
The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.
-------------------------------- -------------------------------- ----------------
COMPONENTS OF THE INTERNET
-------------------------------- -------------------------------- ----------------
WORLD WIDE WEBThe World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.
The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.
The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.
Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.
The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.
The Web provides a vast array of experiences including multimedia presentations, real- time collaboration, interactive pages, radio and television broadcasts, and the automatic "push" of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.
For more complete information about the World Wide Web, see Understanding The World Wide Web.
E-MAILElectronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.
A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. Read part 2 to continue....
Friday, September 11, 2009
Googling the right Way part 2
intitle:
allinurl: allinurl:albino sheep Argument exists in URL
inurl:
Advanced
GET-variable breakdown
http://www.google.com/search?
as_q=test (query string)
&hl=en (language)
&num=10 (number of results [ 10 ,20 ,30 ,50 ,100 ])
&btnG=Google+Search
&as_epq= (complete phrase)
&as_oq= (at least one)
&as_eq= (excluding)
&lr= (language results. [ lang_countrycode ])
&as_ft=i (filetype include or exclude. [i,e])
&as_filetype= (filetype extension)
&as_qdr=all (date [ all,M3 ,m6,y ])
&as_nlo= (number range, low)
&as_nhi= (number range, high)
&as_occt=any (terms occur [ any,title,body,url,links ])
&as_dt=i (restrict by domain [ i,e ])
&as_sitesearch= (restrict by [ site ])
&as_rights= (usage rights [ cc_publicdomain, cc_attribute, cc_sharealike, cc_noncommercial, cc_nonderived ]
&safe=images (safesearch [ safe=on,images=off ])
&as_rq= (similar pages)
&as_lq= (pages that link)
&as_qdr= (get only recently updated pages d[ i ] | w[ i ] | y[ i ])
&gl=us (country)
Googledorks
So, Google gives us all those handy tools for filtering away what we don't want to see, how can we use this to help securing our own systems?
Well, for example, we could use the neat Google Hacking Database, a project where people has submitted a huge collection of queries yielding results that the unskilled webmaster (the Googledork) wishes weren't there. Everything from vulnerable login-forms to passwords surfaces with some cleverly engineered queries.
Goolag
Goolag is a vulnerability scanner (and a politically involved protest..) made by the famous Cult of the Dead Cow. It builds on the above mentioned GHDB, scanning for vulnerabilities in the database. At the moment there is only a Windows-version of the program. The Goolag project is also a campaign against Google's (and a few other big players') choise to comply with the Chinese censorship policy.
Useful Queries
-inurl:htm -inurl:html intitle:"index of" "Last modified" mp3 mp3-file indexes, add desired artist
site:rapidshare.de -filetype:zip OR rar daterange: 2453402- 2453412 Zip Files on rapidshare uploaded on specified date
http://www.google.com/searc h?q=your+ query+ here&as_qdr=d1 Query results updated within one day
Others
http://www.google.com/searc h?q=answer to life, the universe, and everything
http://www.churchofgoogle.org
http://www.google.com/techno logy/pigeonrank.html
References
http://www.google.com/help/c heatsheet.html
http://www.dumblittleman.com /2007 /06 /20-tips-for-more- efficient-google.html
http://www.googleguide.com/a dvanced_operators_reference .html
http://sudarmuthu.com/blog/2 006 /05 /07/google-search- syntax-dissected.html
http://en.wikipedia.org/wiki/P ageRank
allinurl: allinurl:albino sheep Argument exists in URL
inurl:
Advanced
GET-variable breakdown
http://www.google.com/search?
as_q=test (query string)
&hl=en (language)
&num=10 (number of results [ 10 ,20 ,30 ,50 ,100 ])
&btnG=Google+Search
&as_epq= (complete phrase)
&as_oq= (at least one)
&as_eq= (excluding)
&lr= (language results. [ lang_countrycode ])
&as_ft=i (filetype include or exclude. [i,e])
&as_filetype= (filetype extension)
&as_qdr=all (date [ all,M3 ,m6,y ])
&as_nlo= (number range, low)
&as_nhi= (number range, high)
&as_occt=any (terms occur [ any,title,body,url,links ])
&as_dt=i (restrict by domain [ i,e ])
&as_sitesearch= (restrict by [ site ])
&as_rights= (usage rights [ cc_publicdomain, cc_attribute, cc_sharealike, cc_noncommercial, cc_nonderived ]
&safe=images (safesearch [ safe=on,images=off ])
&as_rq= (similar pages)
&as_lq= (pages that link)
&as_qdr= (get only recently updated pages d[ i ] | w[ i ] | y[ i ])
&gl=us (country)
Googledorks
So, Google gives us all those handy tools for filtering away what we don't want to see, how can we use this to help securing our own systems?
Well, for example, we could use the neat Google Hacking Database, a project where people has submitted a huge collection of queries yielding results that the unskilled webmaster (the Googledork) wishes weren't there. Everything from vulnerable login-forms to passwords surfaces with some cleverly engineered queries.
Goolag
Goolag is a vulnerability scanner (and a politically involved protest..) made by the famous Cult of the Dead Cow. It builds on the above mentioned GHDB, scanning for vulnerabilities in the database. At the moment there is only a Windows-version of the program. The Goolag project is also a campaign against Google's (and a few other big players') choise to comply with the Chinese censorship policy.
Useful Queries
-inurl:htm -inurl:html intitle:"index of" "Last modified" mp3 mp3-file indexes, add desired artist
site:rapidshare.de -filetype:zip OR rar daterange: 2453402- 2453412 Zip Files on rapidshare uploaded on specified date
http://www.google.com/searc h?q=your+ query+ here&as_qdr=d1 Query results updated within one day
Others
http://www.google.com/searc h?q=answer to life, the universe, and everything
http://www.churchofgoogle.org
http://www.google.com/techno logy/pigeonrank.html
References
http://www.google.com/help/c heatsheet.html
http://www.dumblittleman.com /2007 /06 /20-tips-for-more- efficient-google.html
http://www.googleguide.com/a dvanced_operators_reference .html
http://sudarmuthu.com/blog/2 006 /05 /07/google-search- syntax-dissected.html
http://en.wikipedia.org/wiki/P ageRank
Labels:
Google,
other tips,
websites
Googling the Right Way part 1
Short History
Right, this will be a really, really short history lesson. If you're interested, check out what the people over there has written for yourself. (Link at page bottom)
So, Google was created by the duo Larry Page and Sergey Brin, two Stanford grad students who, although they didn't see eye-to-eye on many topics, were determined to crack the quite boring nut of organizing all that information that was spread out on the web. By 1997, their BackRub Search Engine had started gaining a sparkling reputation for its unique way of analyzing and ranking webpages through "back links", links pointing to a page from other pages. The system also gained attention for its interesting server environment, contrary to the "normal" high-end servers, BackRub ran on a collection of simpler PCs, collected from the campus' nooks and crannies.
From there, the story is one of unfathomable success ("Instead of discussing all the details, why don't I just write you a check?"), leading to the status of The One Search-engine we all know, love and envy.
PageRank
"Back links?" you think. Yeah, Google's system of deciding what pages are worth your reading-cycles differed from all other search engines' way at the time. The PageRank algorithm ranks all sites by giving them a rank between 0 and 10, based on how many other pages are linking to the site, and what value the linking pages has.
If you are interested in the mathematics between the PageRank algorithm, I suggest you read about it on Wikipedia. The logics behind PR is not in the scope of this article.
From this information, you can probably figure out the basics of SEO, Search Engine Optimization. Get your page linked to by the big boys. Of course, some people just can't be content with playing by the rules, and the PR-algorithm isn't perfect, so from time to time someone manages to fool the algorithm, an example being the 302 Google Jack, redirecting the new, zero-ranked page to a rank ten page, like Google itself. When Google updates the PageRanks, the new page will get the same rank as the page it linked to. Other people buys and sells high-valued links, really a kind of advertising, but with a big debate buzzing in the background. Google has requested that such links use the HTML attribute "nofollow", rendering the page linked to to be ignored when re-ranking.
The above mentioned kinds of tricks, as well as many others, can of course lead your page to get devalued, meaning that it will not be ranked at all. Play safe!
Basics
Every Joe Schmoe knows that search-engines like Google doesn't take kindly too long sentences and free-text, but he probably never bothered reading up on how the magical searchbox actually works, something he should be severely punished for. Let's leave Joe to his fate, and rise far above him, to the lands without stupid questions.
Even in the "basic" syntax collection I'm sure you are able to find a few sparkling gems you didn't know about, so skim through it even if you feel confident in your Google-Fu.
So, top down, a standalone word yields pages containing that word, a sentence enclosed with quotation-marks (" ") similarly yields pages that contain that exact phrase. If you have ever created an SQL- query for some database, I'm sure you will find a lot of similarities as we go on now. Google is actually "just a database", remember?
Command Example Result
AND [&] (ampersand) Slackware AND Linux Shows pages containing both arguments, *OBS* this is the default operator, no need to include
OR [|] (pipe) Laptop OR Desktop Shows pages containing either argument
- (minus) Hamburger -McDonalds Shows pages containing the word "Hamburger", but only if they don't mention "McDonalds"
+ (plus) +coke Contrary to the "includes" belief, this limits the results to the given form only, no pluralis or other tenses
~ (tilde) ~Hacker Results include everything deemed similar to "Hacker"
* (asterisk) Fish * Chips The wildcard (*) is replaced by one or more words/characters (and, n, 'n, &)
define: define:Nocturnal A personal favorite, looks up the meaning of the word
site: Phreaking site:phrack.org Limits the search to a specific site
#...# zeroday 2007...2008 Search results include a value within the given range
info: info:www.hacktivismo.com Shows information about the site
related: related:www.google.com Shows pages similar/related to argument
link: link:www.darkmindz.com Shows sites linking to the argument
filetype: phrack filetype:pdf Results are limited to given filetype
([?]) Cyber (China & America) Nestling combines several terms in the same query
[?A] in [?B] 1 dollar in yen Converts argument A to argument B
daterange: daterange: 2452122- 2452234 Results are within the specified daterange. Dates are calculated by the Julian calendar
movie: movie:Hackers Movie reviews, can also find movie theaters running the movie in U.S cities
music: music:"Weird Al" Hits relate to music
stock: stock: goog Returns stock information (NYSE, NASDAQ, AMEX)
time: time: Stockholm Shows the current time in requested city
safesearch: safesearch: teen Excludes pornography
allinanchor: allinanchor: Best webcomic ever" Results are called argument by others
inanchor: foo bar inanchor:jargon As above, but not for all. The corresponding below all bear the same meaning
allintext: allintext:8-bit music Argument exists in text
intext:
allintitle: allintitle: Portfolio Argument exists in title
read part two to continue
Right, this will be a really, really short history lesson. If you're interested, check out what the people over there has written for yourself. (Link at page bottom)
So, Google was created by the duo Larry Page and Sergey Brin, two Stanford grad students who, although they didn't see eye-to-eye on many topics, were determined to crack the quite boring nut of organizing all that information that was spread out on the web. By 1997, their BackRub Search Engine had started gaining a sparkling reputation for its unique way of analyzing and ranking webpages through "back links", links pointing to a page from other pages. The system also gained attention for its interesting server environment, contrary to the "normal" high-end servers, BackRub ran on a collection of simpler PCs, collected from the campus' nooks and crannies.
From there, the story is one of unfathomable success ("Instead of discussing all the details, why don't I just write you a check?"), leading to the status of The One Search-engine we all know, love and envy.
PageRank
"Back links?" you think. Yeah, Google's system of deciding what pages are worth your reading-cycles differed from all other search engines' way at the time. The PageRank algorithm ranks all sites by giving them a rank between 0 and 10, based on how many other pages are linking to the site, and what value the linking pages has.
If you are interested in the mathematics between the PageRank algorithm, I suggest you read about it on Wikipedia. The logics behind PR is not in the scope of this article.
From this information, you can probably figure out the basics of SEO, Search Engine Optimization. Get your page linked to by the big boys. Of course, some people just can't be content with playing by the rules, and the PR-algorithm isn't perfect, so from time to time someone manages to fool the algorithm, an example being the 302 Google Jack, redirecting the new, zero-ranked page to a rank ten page, like Google itself. When Google updates the PageRanks, the new page will get the same rank as the page it linked to. Other people buys and sells high-valued links, really a kind of advertising, but with a big debate buzzing in the background. Google has requested that such links use the HTML attribute "nofollow", rendering the page linked to to be ignored when re-ranking.
The above mentioned kinds of tricks, as well as many others, can of course lead your page to get devalued, meaning that it will not be ranked at all. Play safe!
Basics
Every Joe Schmoe knows that search-engines like Google doesn't take kindly too long sentences and free-text, but he probably never bothered reading up on how the magical searchbox actually works, something he should be severely punished for. Let's leave Joe to his fate, and rise far above him, to the lands without stupid questions.
Even in the "basic" syntax collection I'm sure you are able to find a few sparkling gems you didn't know about, so skim through it even if you feel confident in your Google-Fu.
So, top down, a standalone word yields pages containing that word, a sentence enclosed with quotation-marks (" ") similarly yields pages that contain that exact phrase. If you have ever created an SQL- query for some database, I'm sure you will find a lot of similarities as we go on now. Google is actually "just a database", remember?
Command Example Result
AND [&] (ampersand) Slackware AND Linux Shows pages containing both arguments, *OBS* this is the default operator, no need to include
OR [|] (pipe) Laptop OR Desktop Shows pages containing either argument
- (minus) Hamburger -McDonalds Shows pages containing the word "Hamburger", but only if they don't mention "McDonalds"
+ (plus) +coke Contrary to the "includes" belief, this limits the results to the given form only, no pluralis or other tenses
~ (tilde) ~Hacker Results include everything deemed similar to "Hacker"
* (asterisk) Fish * Chips The wildcard (*) is replaced by one or more words/characters (and, n, 'n, &)
define: define:Nocturnal A personal favorite, looks up the meaning of the word
site: Phreaking site:phrack.org Limits the search to a specific site
#...# zeroday 2007...2008 Search results include a value within the given range
info: info:www.hacktivismo.com Shows information about the site
related: related:www.google.com Shows pages similar/related to argument
link: link:www.darkmindz.com Shows sites linking to the argument
filetype: phrack filetype:pdf Results are limited to given filetype
([?]) Cyber (China & America) Nestling combines several terms in the same query
[?A] in [?B] 1 dollar in yen Converts argument A to argument B
daterange: daterange: 2452122- 2452234 Results are within the specified daterange. Dates are calculated by the Julian calendar
movie: movie:Hackers Movie reviews, can also find movie theaters running the movie in U.S cities
music: music:"Weird Al" Hits relate to music
stock: stock: goog Returns stock information (NYSE, NASDAQ, AMEX)
time: time: Stockholm Shows the current time in requested city
safesearch: safesearch: teen Excludes pornography
allinanchor: allinanchor: Best webcomic ever" Results are called argument by others
inanchor: foo bar inanchor:jargon As above, but not for all. The corresponding below all bear the same meaning
allintext: allintext:8-bit music Argument exists in text
intext:
allintitle: allintitle: Portfolio Argument exists in title
read part two to continue
How to use data validation in Excel
In Excel we usually find a situation wherein we want to limit the values of certain fields. This tip is useful if you want to standardize a certain field and limit it to a few predefined values.
For example, we want a gender field to have only one of the two values: "MALE" or "FEMALE".
Instead of letting users type "MALE" or "FEMALE" we can provide a dropdown like field to make sure we won't type other information:
As an added validation, Excel will also prompt you if you inputted a value other than the options provided:
This is what we call data validation in Excel. So how do we do that? First position your cursor on the field that you want to add data validation. Then click the Data menu and then Validation:
The Validation dialog box will appear, enter the list of choices delimited by comma on the "source" field, check in-cell dropdown option, choose "list" on the "Allow" field:
You can also apply the data validation rule to a column or row or even a few selected cells. With data validation, you can be assured that there are no invalid data inside your spreadsheet.
For example, we want a gender field to have only one of the two values: "MALE" or "FEMALE".
Instead of letting users type "MALE" or "FEMALE" we can provide a dropdown like field to make sure we won't type other information:
As an added validation, Excel will also prompt you if you inputted a value other than the options provided:
This is what we call data validation in Excel. So how do we do that? First position your cursor on the field that you want to add data validation. Then click the Data menu and then Validation:
The Validation dialog box will appear, enter the list of choices delimited by comma on the "source" field, check in-cell dropdown option, choose "list" on the "Allow" field:
You can also apply the data validation rule to a column or row or even a few selected cells. With data validation, you can be assured that there are no invalid data inside your spreadsheet.
Wednesday, September 9, 2009
Enable Equalizer in Windows media Player 12
We all know that the next version of Windows Media Player , which is WMP12 , comes with the upcoming OS from Microsoft, Windows 7. I happened to install the first beta, and when I tried to set the equalizer in WMP12 , I couldn't find it anywhere.
I searched every menu and preferences, but it wasn't there in any of them. Just when I thought its not there in the beta version, I finally saw the Graphic Equalizer button, in a tricky way!
It is a bit tricky, but it is possible to get the equalizer in Windows Media Player 12. If you are also one of those looking for the equalizer in WMP 12 , follow the steps below to get one.
1. Open Windows Media Player 12 in Library View (Default View).
2. Press Alt to get the menu, and navigate to View > Skin Chooser.
3. Select 'Revert' skin from the skins list (left side) and press the "Apply Button" button.
4 . You can now see the "Graphic Equalizer" button at the bottom right of the skinned WMP12.
5 . Set the default equalizer options to whatever you like.
Unfortunately, I couldn't find any way to enable the SRS- WOW effects. May be they haven't included them in the beta version.
I searched every menu and preferences, but it wasn't there in any of them. Just when I thought its not there in the beta version, I finally saw the Graphic Equalizer button, in a tricky way!
It is a bit tricky, but it is possible to get the equalizer in Windows Media Player 12. If you are also one of those looking for the equalizer in WMP 12 , follow the steps below to get one.
1. Open Windows Media Player 12 in Library View (Default View).
2. Press Alt to get the menu, and navigate to View > Skin Chooser.
3. Select 'Revert' skin from the skins list (left side) and press the "Apply Button" button.
4 . You can now see the "Graphic Equalizer" button at the bottom right of the skinned WMP12.
5 . Set the default equalizer options to whatever you like.
Unfortunately, I couldn't find any way to enable the SRS- WOW effects. May be they haven't included them in the beta version.
How to detect computer & email monitoring or spying software
Computer Monitoring
So now, if you still think someone is spying on you, here's what you can do! The good thing right now is that neither Windows XP SP3 nor Windows Vista support multiple concurrent connections while someone is logged into the console (there is a hack for this, but I would not worry about). What this means is that if you're logged into your XP or Vista computer (like you are now if you're reading this), and someone were to connect to it using the BUILT-IN REMOTE DESKTOP feature of Windows, your screen would become locked and it would tell tell you who is connected. So why is that useful? It's useful because it means that in order for someone to connect to YOUR session without you noticing or your screen being taken over, they have use third-party software and it's a lot easier to detect third-party software than a normal process in Windows. So now we're looking for third-party software, which is usually referred to as remote control software or virtual network computing (VNC) software. First, the easy thing to do is to simply check in your Start Menu All Programs and check whether or not something like VNC, RealVNC, TightVNC, UltraVNC, LogMeIn, GoToMyPC, etc is installed. A lot of times IT people are sloppy and figure that a normal user won't know what a piece of software is and will simply ignore it. If any of those programs are installed, then someone can connect to your computer without you knowing it as long as the program is running in the background as a Windows service. That brings us to the second point. Usually, if one of the above listed programs are installed, there will be an icon for it in the task bar because it needs to be constantly running to work.
Check all of your icons (even the hidden ones) and see what is running. If you find something you've not heard of, do a quick Google search to see what pops up. It's usually quite hard to remove something from the taskbar, so if there is something installed to monitor your computer, it should be there. However, if someone really sneaky installed it and nothing shows up there, you can try another way. Again, because these are third-party apps, they have to connect to Windows XP or Vista on different communication ports. Ports are simply a virtual data connection by which computers share information directly. As you may already know, XP and Vista come with a built-in Firewall that blocks many of the incoming ports for security reasons. If you're not running an FTP site, why should your port 23 be open, right? So in order for these third-party apps to connect to your computer, they must come through a port, which has to be open on your computer. You can check all the open ports by going to Start , Control Panel , and Windows Firewall .
Click on the Exceptions tab and you'll see see a list of programs with check boxes next to them. The ones that are checked are "open" and the unchecked or unlisted ones are "closed". Go through the list and see if there is a program you're not familiar with or that matches VNC, remote control, etc. If so, you can block the program by un-checking the box for it!
The only other way I can think of to see if someone is connected to your computer is to see if there are any processes running under a different name! If you go to the Windows Task Manager (press Cntr + Shift + Esc together) and go to the Processes tab, you'll see a column titled User Name .
Scroll through all the processes and you should only see your user name, Local Service, Network Service, and System. Anything else means someone is logged into the computer!
Email & Web Site Monitoring
To check whether your email is being monitored is quite simple. Always, when you send an email from Outlook or some email client on your computer, it has to connect to the email server. Now it can either connect directly or it can connect through what is called a proxy server, which takes a request, alters or checks it, and forwards it on to another server. If you're going through a proxy server for email or web browsing, than the web sites you access or the emails you write can be saved and viewed later on. You can check for both and here's how. For IE, go to Tools , then Internet Options . Click on the Connections tab and choose LAN Settings .
If the Proxy Server box is checked and it has a local IP address with a port number, then that means you're going through a local server first before it reaches the web server. This means that any web site you visit first goes through another server running some kind of software that either blocks the address or simply logs it. For your email, you're checking for the same thing, a local IP address for the POP and SMTP mail servers. To check in Outlook, go to Tools , Email Accounts , and click Change or Properties, and find the values for POP and SMTP server.
If you're working in a big corporate environment, it's more than likely that the Internet and email are being monitored. You should always be careful in writing emails or browsing web sites while at the office. Trying to break through the security also might get you in trouble if they find out you bypassed their systems!
So now, if you still think someone is spying on you, here's what you can do! The good thing right now is that neither Windows XP SP3 nor Windows Vista support multiple concurrent connections while someone is logged into the console (there is a hack for this, but I would not worry about). What this means is that if you're logged into your XP or Vista computer (like you are now if you're reading this), and someone were to connect to it using the BUILT-IN REMOTE DESKTOP feature of Windows, your screen would become locked and it would tell tell you who is connected. So why is that useful? It's useful because it means that in order for someone to connect to YOUR session without you noticing or your screen being taken over, they have use third-party software and it's a lot easier to detect third-party software than a normal process in Windows. So now we're looking for third-party software, which is usually referred to as remote control software or virtual network computing (VNC) software. First, the easy thing to do is to simply check in your Start Menu All Programs and check whether or not something like VNC, RealVNC, TightVNC, UltraVNC, LogMeIn, GoToMyPC, etc is installed. A lot of times IT people are sloppy and figure that a normal user won't know what a piece of software is and will simply ignore it. If any of those programs are installed, then someone can connect to your computer without you knowing it as long as the program is running in the background as a Windows service. That brings us to the second point. Usually, if one of the above listed programs are installed, there will be an icon for it in the task bar because it needs to be constantly running to work.
Check all of your icons (even the hidden ones) and see what is running. If you find something you've not heard of, do a quick Google search to see what pops up. It's usually quite hard to remove something from the taskbar, so if there is something installed to monitor your computer, it should be there. However, if someone really sneaky installed it and nothing shows up there, you can try another way. Again, because these are third-party apps, they have to connect to Windows XP or Vista on different communication ports. Ports are simply a virtual data connection by which computers share information directly. As you may already know, XP and Vista come with a built-in Firewall that blocks many of the incoming ports for security reasons. If you're not running an FTP site, why should your port 23 be open, right? So in order for these third-party apps to connect to your computer, they must come through a port, which has to be open on your computer. You can check all the open ports by going to Start , Control Panel , and Windows Firewall .
Click on the Exceptions tab and you'll see see a list of programs with check boxes next to them. The ones that are checked are "open" and the unchecked or unlisted ones are "closed". Go through the list and see if there is a program you're not familiar with or that matches VNC, remote control, etc. If so, you can block the program by un-checking the box for it!
The only other way I can think of to see if someone is connected to your computer is to see if there are any processes running under a different name! If you go to the Windows Task Manager (press Cntr + Shift + Esc together) and go to the Processes tab, you'll see a column titled User Name .
Scroll through all the processes and you should only see your user name, Local Service, Network Service, and System. Anything else means someone is logged into the computer!
Email & Web Site Monitoring
To check whether your email is being monitored is quite simple. Always, when you send an email from Outlook or some email client on your computer, it has to connect to the email server. Now it can either connect directly or it can connect through what is called a proxy server, which takes a request, alters or checks it, and forwards it on to another server. If you're going through a proxy server for email or web browsing, than the web sites you access or the emails you write can be saved and viewed later on. You can check for both and here's how. For IE, go to Tools , then Internet Options . Click on the Connections tab and choose LAN Settings .
If the Proxy Server box is checked and it has a local IP address with a port number, then that means you're going through a local server first before it reaches the web server. This means that any web site you visit first goes through another server running some kind of software that either blocks the address or simply logs it. For your email, you're checking for the same thing, a local IP address for the POP and SMTP mail servers. To check in Outlook, go to Tools , Email Accounts , and click Change or Properties, and find the values for POP and SMTP server.
If you're working in a big corporate environment, it's more than likely that the Internet and email are being monitored. You should always be careful in writing emails or browsing web sites while at the office. Trying to break through the security also might get you in trouble if they find out you bypassed their systems!
Labels:
Hacking,
lan,
pc tips,
software,
windows vista,
windows xp
Create Custom Desktop Themes
Learn to create custom themes for your desktop through three fantastic tutorials. First up we have RocketDock which allows you to bring Mac OS X to your PC. You can create your own icons, manage programs, it's completely customizable and easy to use.
Next up we have Samurize , another solution for desktop customization. It allows you to monitor various aspects of your PC through widgets along with plenty of other features.
Finally, we have a step by step guide which guides you through the process of creating your own themes
Next up we have Samurize , another solution for desktop customization. It allows you to monitor various aspects of your PC through widgets along with plenty of other features.
Finally, we have a step by step guide which guides you through the process of creating your own themes
Protect your Computer from USB Virus
Have you ever attached a USB to a computer and later found out that the Computer is infected by a virus? I have definitely faced this situation many times. If you attach your infected USB drive to the infected computer the virus is transferred to the Computer in no time infecting all the important documents. But now you don't have to worry about any USB Virus because USB Disk Security provides 100 % protection against any threats via USB drive. USB Disk Security provides 100% protection against any threats via USB drive, however, the majority of other products are unable even to guarantee 90% protection. USB Disk Security is the best antivirus software to permanently protect offline computer without the need for signature updates, but other antivirus software should update signature database regularly, and they cannot effectively protect offline computer. This light and easy to use solution is 100% compatible with all software and doesn't slow down your computer at all. You pay USB Disk Security once and get it all, however, other antivirus products should be paid for updates every year.
Product Highlights: 100 % protection against any malicious programs via USB storage USB Disk Security uses innovative proactive technology to block any threats via USB drive. There are relatively few products available in shops or on the Internet which offer even close to 100% protection against any malicious programs via USB drive. The majority of products are unable even to guarantee 90% protection. USB Disk Security is the world's best software to block threats via USB drive. The best solution to protect offline computer Other antivirus software should update signature database regularly, and they cannot effectively protect offline computer that is not connected to the Internet. When new viruses, worms and other malicious attacks strike, traditional signatures are insufficient. Every minute one waits for a virus signature update creates a window of vulnerability that could have devastating consequences. USB Disk Security uses advanced proactive detection techniques, requires no signature updates, and closes the window of vulnerability left open by other reactive, signature-based responses. The world's fastest and smallest antivirus software With USB Disk Security, it's not necessary to sacrifice speed for detection and scanning. Compare antivirus software and you'll discover that USB Disk Security is by far one of the smallest applications in the industry. For example, the v5.0 of USB Disk Security installer is just 1 MB. The program utilizes approximately 1 to 7 MB of RAM. 100% compatible with all software Incompatibility between antivirus programs is an issue. In the vast majority of cases, installing two antivirus programs from different vendors on one machine (for increased protection) is technically impossible, as the two programs will disrupt each other's functioning. However, USB Disk Security is 100% compatible with all software, including Windows Vista. Simple to use USB Disk Security has been specifically designed to perform effectively regardless of the user's level of computer expertise. Just install and forget it. System Requirement 100 MHz Processor or more, 16 MB RAM or more. The operating system should be Windows 95 , Windows 98 , Windows 2000 , Windows XP, Windows NT 4.0, Windows ME, or Vista. Download
http://w17 .easy-share.com/ 1702778903 .html
Product Highlights: 100 % protection against any malicious programs via USB storage USB Disk Security uses innovative proactive technology to block any threats via USB drive. There are relatively few products available in shops or on the Internet which offer even close to 100% protection against any malicious programs via USB drive. The majority of products are unable even to guarantee 90% protection. USB Disk Security is the world's best software to block threats via USB drive. The best solution to protect offline computer Other antivirus software should update signature database regularly, and they cannot effectively protect offline computer that is not connected to the Internet. When new viruses, worms and other malicious attacks strike, traditional signatures are insufficient. Every minute one waits for a virus signature update creates a window of vulnerability that could have devastating consequences. USB Disk Security uses advanced proactive detection techniques, requires no signature updates, and closes the window of vulnerability left open by other reactive, signature-based responses. The world's fastest and smallest antivirus software With USB Disk Security, it's not necessary to sacrifice speed for detection and scanning. Compare antivirus software and you'll discover that USB Disk Security is by far one of the smallest applications in the industry. For example, the v5.0 of USB Disk Security installer is just 1 MB. The program utilizes approximately 1 to 7 MB of RAM. 100% compatible with all software Incompatibility between antivirus programs is an issue. In the vast majority of cases, installing two antivirus programs from different vendors on one machine (for increased protection) is technically impossible, as the two programs will disrupt each other's functioning. However, USB Disk Security is 100% compatible with all software, including Windows Vista. Simple to use USB Disk Security has been specifically designed to perform effectively regardless of the user's level of computer expertise. Just install and forget it. System Requirement 100 MHz Processor or more, 16 MB RAM or more. The operating system should be Windows 95 , Windows 98 , Windows 2000 , Windows XP, Windows NT 4.0, Windows ME, or Vista. Download
http://w17 .easy-share.com/ 1702778903 .html
Labels:
anti virus,
pc tips,
software,
usb,
virus
Tuesday, September 1, 2009
Protech OS Installation
How to Install Protech OS ? [For Absolute Beginners]
I am writing this tutorial for people who are new to Linux Distro's and Installation. Considered you have Windows XP Installed already in your computer. And this Installation method best suitable for Dual Booting option(Both Windows & Linux). Also including Screenshots for better clarity in understanding. Partitioning It would be great if you have Hiren Boot Disk for partitioning and formatting a part of the disk (may be complete) to allot it for Protech Installation. Boot the Hiren Disk and Resize or Create the partition in which you like to perform the installation. The format must be EXT2 or EXT3. I normally prefer Norton Partion Magic which is available as the first option in that Hiren Boot Menu -> Partition Tools . Hiren actually consist of many useful disk, recovery and security related tools. Take a look at the sample screenshot below.
Once done with this step, you will see a GUI Partition window where you can simply complete the Partition Job with the help of mouse if the driver available by default in the Hiren CD. * Remember you must have define the partition space for protech as atleast 5GB. Load the Protech CD
Reboot the computer after partitioning and formatting done. Now place the Protech OS CD into the CD Drive and Boot the computer using Protech. Follow the below steps to begin the Installation Process. 1 . Select Install or Upgrade option available as first in the Boot Menu Screen. 2. If you like to do any Memory or CD/DVD Error check you may do so by selecting the 3 rd and 4 th options. 3. Wait till it loads into desktop. As by default it boots as Live OS we must wait till the Desktop Loads Successfully. Also remember Protech is based on Ubuntu. Hence it is possible to use the Software Repository of Ubuntu as well as Debian by default. 4. Once loaded into the Desktop you can navigate the controls and options by simply doing Right Click in the Mouse.
5 . Application TAB Consist of Editors, Multimedia, Net, Programming and System Utilties. 6 . Next comes the Security Tools option, the one differentiate Protech OS from other Security Distributions. It actually contains a good recognized Security Software that one should play with. 7. You may change the default them to your wish in the Fluxbox Menu. 8 . Let's move on to "HOME" to begin the Installation Process. In the New Window you will see the only icon named as Install when you are in Live CD. 9. In the Pop up window you can select the default setups need to be configured. This is similar to Windows or Ubuntu Installation Steps. 10 . It is very important that you must select the Partition Space alloted previously using Hiren Boot Disk. 11 . Alright ! Configure your Root login and password, then partition selection and finally begin the installation process. 12. Once its started you may need to wait for 20 mins to 30 mins ( Depending on the Processor Speed ) to transfer the Compressed files from CD to the Hard Drive. 13 . Yummy ! Installation completed and it will prompt you for Rebooting ( Remove the CD from the CD / DVD Drive ). 14. It's all done now. You are ready to use the Protech OS with various security Tools. It also works as a Best Desktop OS for me.
I am writing this tutorial for people who are new to Linux Distro's and Installation. Considered you have Windows XP Installed already in your computer. And this Installation method best suitable for Dual Booting option(Both Windows & Linux). Also including Screenshots for better clarity in understanding. Partitioning It would be great if you have Hiren Boot Disk for partitioning and formatting a part of the disk (may be complete) to allot it for Protech Installation. Boot the Hiren Disk and Resize or Create the partition in which you like to perform the installation. The format must be EXT2 or EXT3. I normally prefer Norton Partion Magic which is available as the first option in that Hiren Boot Menu -> Partition Tools . Hiren actually consist of many useful disk, recovery and security related tools. Take a look at the sample screenshot below.
Once done with this step, you will see a GUI Partition window where you can simply complete the Partition Job with the help of mouse if the driver available by default in the Hiren CD. * Remember you must have define the partition space for protech as atleast 5GB. Load the Protech CD
Reboot the computer after partitioning and formatting done. Now place the Protech OS CD into the CD Drive and Boot the computer using Protech. Follow the below steps to begin the Installation Process. 1 . Select Install or Upgrade option available as first in the Boot Menu Screen. 2. If you like to do any Memory or CD/DVD Error check you may do so by selecting the 3 rd and 4 th options. 3. Wait till it loads into desktop. As by default it boots as Live OS we must wait till the Desktop Loads Successfully. Also remember Protech is based on Ubuntu. Hence it is possible to use the Software Repository of Ubuntu as well as Debian by default. 4. Once loaded into the Desktop you can navigate the controls and options by simply doing Right Click in the Mouse.
5 . Application TAB Consist of Editors, Multimedia, Net, Programming and System Utilties. 6 . Next comes the Security Tools option, the one differentiate Protech OS from other Security Distributions. It actually contains a good recognized Security Software that one should play with. 7. You may change the default them to your wish in the Fluxbox Menu. 8 . Let's move on to "HOME" to begin the Installation Process. In the New Window you will see the only icon named as Install when you are in Live CD. 9. In the Pop up window you can select the default setups need to be configured. This is similar to Windows or Ubuntu Installation Steps. 10 . It is very important that you must select the Partition Space alloted previously using Hiren Boot Disk. 11 . Alright ! Configure your Root login and password, then partition selection and finally begin the installation process. 12. Once its started you may need to wait for 20 mins to 30 mins ( Depending on the Processor Speed ) to transfer the Compressed files from CD to the Hard Drive. 13 . Yummy ! Installation completed and it will prompt you for Rebooting ( Remove the CD from the CD / DVD Drive ). 14. It's all done now. You are ready to use the Protech OS with various security Tools. It also works as a Best Desktop OS for me.
Labels:
Hack,
Hacking,
linux,
windows xp
Add Your Name or Application to right click Of My Computer
How To Add Your Name or Application to right click Of My Computer
Play with your windows Xp with these Registry Hacks
To write your name on right click application please follow the steps:
1.Copy & Paste the following code in Notepad And then Save it as "hack.reg"
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\CLS ID\{20 D04 FE0-3 AEA-1069 - A2 D 8-08002 B 30309 D}\shell\Registry Editor]
@="Your Name Or Name of the Application"
[HKEY_CLASSES_ROOT\CLS ID\{20 D04 FE0-3 AEA-1069 - A2 D 8-08002 B 30309 D}\shell\Registry Editor\command]
@="Location Of The Application"
2. Now edit it and then Type your name In
Eg:
[HKEY_CLASSES_ROOT\CLS ID\{20 D04 FE0-3 AEA-1069 - A2 D 8-08002 B 30309 D}\shell\Registry Editor]
@="roney"
3. If u want to get any application, once you click Your name or name of application
Then , Type the location Of the application Which u want to open In:
[HKEY_CLASSES_ROOT\CLS ID\{20 D04 FE0-3 AEA-1069 - A2 D 8-08002 B 30309 D}\shell\Registry Editor\command]
@="Location Of The Application"
For eg . C:\Program Files\Yahoo!\Messenger\ messenger.exe
Thats It finally save it And then Run it .
--------------------------- --------------------------- --------------------------- ---------------
How To add Application Control Panel
[HKEY_LOCAL_MACHINE\SOFTWA RE\Classes\CLSID\{20 D04 FE0-3 AEA-1069 -A2 D 8-08002 B 30309 D}\shell\Control Panel\command]
@="rundll32 .exe shell32.dll , Control_RunDLL"
How To add Application Add/Remove
[HKEY_CLASSES_ROOT\CLSID\{20 D04 FE0-3 AEA-1069 -A2 D 8-08002 B 30309 D}\shell\Add/Remove\command]
@="control appwiz.cpl"
How To add Application Reboot/Restart
[HKEY_CLASSES_ROOT\CLSID\{20 D04 FE0-3 AEA-1069 -A2 D 8-08002 B 30309 D}\shell\[Reboot]\command]
@="shutdown -r -f -t 5"
How To add Application Shutdown
[HKEY_CLASSES_ROOT\CLSID\{20 D04 FE0-3 AEA-1069 -A2 D 8-08002 B 30309 D}\shell\[Shutdown]\command]
@="shutdown -s -f -t 5"
Hope these Old hacks will be useful for you.If you have Some more Registry Hacks Share it here.
Play with your windows Xp with these Registry Hacks
To write your name on right click application please follow the steps:
1.Copy & Paste the following code in Notepad And then Save it as "hack.reg"
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\CLS ID\{20 D04 FE0-3 AEA-1069 - A2 D 8-08002 B 30309 D}\shell\Registry Editor]
@="Your Name Or Name of the Application"
[HKEY_CLASSES_ROOT\CLS ID\{20 D04 FE0-3 AEA-1069 - A2 D 8-08002 B 30309 D}\shell\Registry Editor\command]
@="Location Of The Application"
2. Now edit it and then Type your name In
Eg:
[HKEY_CLASSES_ROOT\CLS ID\{20 D04 FE0-3 AEA-1069 - A2 D 8-08002 B 30309 D}\shell\Registry Editor]
@="roney"
3. If u want to get any application, once you click Your name or name of application
Then , Type the location Of the application Which u want to open In:
[HKEY_CLASSES_ROOT\CLS ID\{20 D04 FE0-3 AEA-1069 - A2 D 8-08002 B 30309 D}\shell\Registry Editor\command]
@="Location Of The Application"
For eg . C:\Program Files\Yahoo!\Messenger\ messenger.exe
Thats It finally save it And then Run it .
--------------------------- --------------------------- --------------------------- ---------------
How To add Application Control Panel
[HKEY_LOCAL_MACHINE\SOFTWA RE\Classes\CLSID\{20 D04 FE0-3 AEA-1069 -A2 D 8-08002 B 30309 D}\shell\Control Panel\command]
@="rundll32 .exe shell32.dll , Control_RunDLL"
How To add Application Add/Remove
[HKEY_CLASSES_ROOT\CLSID\{20 D04 FE0-3 AEA-1069 -A2 D 8-08002 B 30309 D}\shell\Add/Remove\command]
@="control appwiz.cpl"
How To add Application Reboot/Restart
[HKEY_CLASSES_ROOT\CLSID\{20 D04 FE0-3 AEA-1069 -A2 D 8-08002 B 30309 D}\shell\[Reboot]\command]
@="shutdown -r -f -t 5"
How To add Application Shutdown
[HKEY_CLASSES_ROOT\CLSID\{20 D04 FE0-3 AEA-1069 -A2 D 8-08002 B 30309 D}\shell\[Shutdown]\command]
@="shutdown -s -f -t 5"
Hope these Old hacks will be useful for you.If you have Some more Registry Hacks Share it here.
How To: Manage Your Passwords With Credential Manager in Windows 7 or in Vista
Credential Manager is a new SSO solution that Microsoft offers in Windows Server 2003 , Windows XP and also includes in new generation operating systems Windows Vista and in Windows 7 .Single sign-on (SSO) is an approach that attempts to reduce the time users spend performing logon tasks and the number of passwords users must remember.Credential Manager is a central store for all of your usernames, passwords, and X.509 certificates. It's based on a secure client-side credential- caching mechanism.
To use Credential Manager in Windows Vista:
Open Control Panel.
Open User Accounts.
Click Manage My Network Passwords on the Related Tasks panel (on the left side of the window). You'll get a dialog box listing all of your stored usernames and passwords.
Add another username and password, or remove the existing ones or change their properties.
To use Credential Manager in Windows 7:
Microsoft's new generation operating system Windows 7(code named as Vienna) will include a system for managing the online IDs, logons, and passwords that you must manage for all of the Web sites you visit. Dubbed Windows Credentials , this feature utilizes a KeyRing for storing online credentials and a Credential Manager user interface. These settings can be backed up to and restored from a secure online vault. To access Credential Manager in Windows 7 go to Control Panel -> User Accounts -> Credential Manager Download Windows 7 if you doesn't have it
To use Credential Manager in Windows Vista:
Open Control Panel.
Open User Accounts.
Click Manage My Network Passwords on the Related Tasks panel (on the left side of the window). You'll get a dialog box listing all of your stored usernames and passwords.
Add another username and password, or remove the existing ones or change their properties.
To use Credential Manager in Windows 7:
Microsoft's new generation operating system Windows 7(code named as Vienna) will include a system for managing the online IDs, logons, and passwords that you must manage for all of the Web sites you visit. Dubbed Windows Credentials , this feature utilizes a KeyRing for storing online credentials and a Credential Manager user interface. These settings can be backed up to and restored from a secure online vault. To access Credential Manager in Windows 7 go to Control Panel -> User Accounts -> Credential Manager Download Windows 7 if you doesn't have it
Labels:
administrators,
pc tips,
windows 7,
windows vista
Saturday, August 29, 2009
Bug in Google Search Results:This Site May Harm Your Computer On Every Sites
Google has been working flawlessly so far even though get hit with millions of requests per hour. But not today. Every search results in Google search now tagged with "This site may harm your computer". The direct links to the URL of the sites listed in the search results are been redirected to a interstitial page labeled "Warning - visiting this website may harm your computer!" and various links to Google and StopBadware.org.
To make matter worse, all major established sites are been labeled as possible harmful or malicious badware sites, such as Microsoft, Yahoo, My Digital Life, and even Google itself. Even localized Google search engines in another languages such as French, German, Japanese, Chinese and etc. are affected by the major bug.
The bug appears to have happened for several hours, but not yet been fixed. It will only cause problem to webmasters though, as ads that appear with the search results appear to be working fine without problem. Only organic search results are been affected. Currently, the only workaround is to directly type in the URL into the address bar in order to access the website, or switch to Google Blog Search or Image Search or Google Mobile Search. More useful workaround is probably using Yahoo or Windows Live (MSN) Search. Note: The bug has been fixed.
To make matter worse, all major established sites are been labeled as possible harmful or malicious badware sites, such as Microsoft, Yahoo, My Digital Life, and even Google itself. Even localized Google search engines in another languages such as French, German, Japanese, Chinese and etc. are affected by the major bug.
The bug appears to have happened for several hours, but not yet been fixed. It will only cause problem to webmasters though, as ads that appear with the search results appear to be working fine without problem. Only organic search results are been affected. Currently, the only workaround is to directly type in the URL into the address bar in order to access the website, or switch to Google Blog Search or Image Search or Google Mobile Search. More useful workaround is probably using Yahoo or Windows Live (MSN) Search. Note: The bug has been fixed.
Labels:
Google,
Google Secrets
Remove PDF files Restriction on Print,Copy,Paste etc..
Some PDF documents prevent the user from copying and pasting or printing it's contents. This sometimes presents a problem since the creator of the PDF file might have used a font that is not available in the system trying to read it. Ensode contains a free online utility that allows you to upload a PDF, once uploaded, a version of the PDF without printing or copying/pasting restrictions is displayed in a new browser window.
How to Remove Restrictions on Printing & Copying - Unlock the Pdf File
Method 1
To unlock a PDF file, enter it's location in the "PDF file to unlock" field, by either typing it in the field or clicking on the "browse" button, then navigating to it's location. See Screenshot Below
Method 2
The Tricks Given by us in our previous post for hacking password protected PDF's in Remove Restrictions from PDF Files
The unlocked version of the PDF will be displayed in a new browser window, opened in the default PDF application for your system (usually Adobe Acrobat Reader).
How to Remove Restrictions on Printing & Copying - Unlock the Pdf File
Method 1
To unlock a PDF file, enter it's location in the "PDF file to unlock" field, by either typing it in the field or clicking on the "browse" button, then navigating to it's location. See Screenshot Below
Method 2
The Tricks Given by us in our previous post for hacking password protected PDF's in Remove Restrictions from PDF Files
The unlocked version of the PDF will be displayed in a new browser window, opened in the default PDF application for your system (usually Adobe Acrobat Reader).
Back Up your Hard Drive Automatically
When was the last time you backed up your important files? Last year when your friend called in tears after the Blue Screen of Death ate his thesis? We thought so. Learn to set up a program called SyncBack which automatically generates password protected zip files of your important documents.
Benefits:
It's free and pretty easy to use.
You can choose to save them to an external hard drive or upload them to an FTP server.
Schedule nightly, weekly, and monthly backups so you don't have to lift a finger.
No, don't just bookmark this post and do it later. Do it now! Before it's too late! If you need assistance automating backup, see a full guide to using SyncBack
Benefits:
It's free and pretty easy to use.
You can choose to save them to an external hard drive or upload them to an FTP server.
Schedule nightly, weekly, and monthly backups so you don't have to lift a finger.
No, don't just bookmark this post and do it later. Do it now! Before it's too late! If you need assistance automating backup, see a full guide to using SyncBack
Thursday, August 27, 2009
Use Gmail Account to Send Emails from Multiple Addresses
In this post I am going to show you how to use your Gmail account to send and receive emails from multiple addresses. Most of us own more than one email account say for example, one from Gmail , one from Yahoo and one from Hotmail . If you are tired of logging into multiple accounts to check your inbox or to send emails, I have a solution here. Gmail has an option to integrate multiple email accounts (email addresses) into a single Gmail account. Once you integrate multiple email addresses into your Gmail account, you can use the same account to send emails from different addresses and receive emails for different addresses. Let's take a simple example Suppose you have three email addressess (email accounts) 1.Roneysidhu@gmail.com 2. Roney.Sidhu@yahoo.com 3. Roneysidhu@hotmail.com You can integrate the emails roney.sidhu@yahoo.com and roneysidhu@hotmail.com to roneysidhu@gmail.com and operate all the three accounts from your single gmail account. Here is a step- by-step procedure to do this. 1. Login to your gmail account. 2. Click on Settings at the top right corner. 3. Under Settings, click on Accounts tab. 4. Now you'll see the first option " Send mail as: " 5. Under this option, click on Add another email address you own 6. Now a small new window will pop-up asking you to enter the details of your new email address . 7. Here you can enter any name and any email address. The email address need not belong to gmail only . You can enter your yahoo , hotmail or any other valid email address. 8. A Verification email will be sent to the address that you specify. Once you verify that you own the email address, it will be integrated to your Gmail account. Now when you compose a new email, you'll see an option to select from multiple address to send the mail. Also you'll receive the incoming mails for multiple addresses to a single mailbox . I hope this will benefit you. Before you leave, I should also tell you one good advantage of this. According to Gmail privacy policy , they will not send the user's IP address in the outgoing emails. That means when you send an email from your Gmail account, the receiver will not be able to find out your IP address. But you don't have this advantage in Yahoo or other email providers.
Hack Passwords Using USB Drive
Today I will show you how to hack Passwords using an USB Pen Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend's/college Computer. We need the following tools to create our rootkit. MessenPass : Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4 .x/2003 , AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM. il PassView : Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002 /2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts. IE Passview : IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0 , as well as older versions of Internet explorer, v4.0 - v6.0 Protected Storage PassView : Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more... PasswordFox : PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename. Here is a step by step procedre to create the password hacking toolkit. NOTE: You must temporarily disable your antivirus before following these steps. 1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive. ie: Copy the files - mspass.exe , mailpv.exe , iepv.exe , pspv.exe and passwordfox.exe into your USB Drive. 2. Create a new Notepad and write the following text into it [autorun]
open=launch.bat
ACTION= Perform a Virus Scan save the Notepad and rename it from New Text Document.txt to autorun.inf Now copy the autorun.inf file onto your USB pendrive. 3. Create another Notepad and write the following text onto it. start mspass.exe /stext mspass.txt start mailpv.exe /stext mailpv.txt start iepv.exe /stext iepv.txt start pspv.exe /stext pspv.txt start passwordfox.exe /stext passwordfox.txt save the Notepad and rename it from New Text Document.txt to launch.bat Copy the launch.bat file also to your USB drive. Now your rootkit is ready and you are all set to hack the passwords. You can use this pendrive on your friend's PC or on your college computer. Just follow these steps 1 . Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive). 2. In the pop-up window, select the first option ( Perform a Virus Scan ). 3. Now all the password hacking tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files. 4. Remove the pendrive and you'll see the stored passwords in the .TXT files. This hack works on Windows 2000, XP,Vista and 7
NOTE: This procedure will only recover the stored passwords (if any) on the Computer.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts. IE Passview : IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0 , as well as older versions of Internet explorer, v4.0 - v6.0 Protected Storage PassView : Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more... PasswordFox : PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename. Here is a step by step procedre to create the password hacking toolkit. NOTE: You must temporarily disable your antivirus before following these steps. 1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive. ie: Copy the files - mspass.exe , mailpv.exe , iepv.exe , pspv.exe and passwordfox.exe into your USB Drive. 2. Create a new Notepad and write the following text into it [autorun]
open=launch.bat
ACTION= Perform a Virus Scan save the Notepad and rename it from New Text Document.txt to autorun.inf Now copy the autorun.inf file onto your USB pendrive. 3. Create another Notepad and write the following text onto it. start mspass.exe /stext mspass.txt start mailpv.exe /stext mailpv.txt start iepv.exe /stext iepv.txt start pspv.exe /stext pspv.txt start passwordfox.exe /stext passwordfox.txt save the Notepad and rename it from New Text Document.txt to launch.bat Copy the launch.bat file also to your USB drive. Now your rootkit is ready and you are all set to hack the passwords. You can use this pendrive on your friend's PC or on your college computer. Just follow these steps 1 . Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive). 2. In the pop-up window, select the first option ( Perform a Virus Scan ). 3. Now all the password hacking tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files. 4. Remove the pendrive and you'll see the stored passwords in the .TXT files. This hack works on Windows 2000, XP,Vista and 7
NOTE: This procedure will only recover the stored passwords (if any) on the Computer.
Google Sync for Mobile
Google Sync mainly used in Mobile phones and it began synchronising its free online calendars abd Gmail contact lists with smart phones using softwares licensed from arch- rival Microsoft.
Google Sync updates the Calendars and Gmail contacts in Iphones orWindow-based mobile devices to match changes users make using computers online and others...
Sync uses "push technology" so many changes or addition to your calendar or contacts are reflected in your device in minutes,Google Mobile Engineer Bryan Mawhinney wrote in California's site.
It uses two-way service so that you make changes in Mobile and in Google account.
It goes by wireless connection, so that if phone gets lost the calendar and other information are storeb by Google.
Google Sync updates the Calendars and Gmail contacts in Iphones orWindow-based mobile devices to match changes users make using computers online and others...
Sync uses "push technology" so many changes or addition to your calendar or contacts are reflected in your device in minutes,Google Mobile Engineer Bryan Mawhinney wrote in California's site.
It uses two-way service so that you make changes in Mobile and in Google account.
It goes by wireless connection, so that if phone gets lost the calendar and other information are storeb by Google.
Coding errors that helped Hackers and Intruders
There has been some 25 software coding errors that helped the Cyber criminals helped them to have access the site and accounts to nearly 1.5 million security breaches.
The SANS Institute in Maryland said that in 2008 , just two of the errors led to more than 1.5 m web site security breaches. The organisations, which helped making the list, include the US National Security Agency, the Department of Homeland Security, Microsoft, and Symantec published the document."The top 25 list gives developers a minimum set of coding errors that must be eradicated before software is used by customers," the BBC quoted Chris Wysopal, chief technology officer with Veracode.
SANS director, Mason Brown said: "There appears to be broad agreement on the programming errors. Now it is time to fix them. We need to make sure every programmer knows how to write code that is free of the top 25 errors."While, most of the earlier advice focused on vulnerabilities that could have originated from programming errors, the 25 list examines the actual programming errors themselves.The 25 Most Dangerous Programming Errors are:
CWE-116 :Improper Encoding or Escaping of OutputCWE-89 :Failure to Preserve SQL Query StructureCWE-20 :Improper Input ValidationCWE-79 :Failure to Preserve Web Page StructureCWE-78 :Failure to Preserve OS Command StructureCWE-319 :Cleartext Transmission of Sensitive InformationCWE-352:Cross-Site Request ForgeryCWE-362 :Race ConditionCWE-209 :Error Message Information LeakCWE-119 :Failure to Constrain Operations within the Bounds of a Memory BufferCWE-642 :External Control of Critical State DataCWE- 73:External Control of File Name or Path
CWE-665 :Improper InitializationCWE-426 :Untrusted Search PathCWE-94 :Failure to Control Generation of CodeCWE- 494 :Download of Code Without Integrity CheckCWE-404 :Improper Resource Shutdown or ReleaseCWE-682 :Incorrect CalculationCWE-285 :Improper Access ControlCWE-327:Use of a Broken or Risky Cryptographic AlgorithmCWE-259 :Hard-Coded PasswordCWE-732 :Insecure Permission Assignment for Critical ResourceCWE-330 :Use of Insufficiently Random ValuesCWE- 250 :Execution with Unnecessary PrivilegesCWE-602:Client-Side Enforcement of Server-Side Security (ANI)This List is produced by National Security Agency (NSA) and 30 other organisations to put forward the flaws.
The SANS Institute in Maryland said that in 2008 , just two of the errors led to more than 1.5 m web site security breaches. The organisations, which helped making the list, include the US National Security Agency, the Department of Homeland Security, Microsoft, and Symantec published the document."The top 25 list gives developers a minimum set of coding errors that must be eradicated before software is used by customers," the BBC quoted Chris Wysopal, chief technology officer with Veracode.
SANS director, Mason Brown said: "There appears to be broad agreement on the programming errors. Now it is time to fix them. We need to make sure every programmer knows how to write code that is free of the top 25 errors."While, most of the earlier advice focused on vulnerabilities that could have originated from programming errors, the 25 list examines the actual programming errors themselves.The 25 Most Dangerous Programming Errors are:
CWE-116 :Improper Encoding or Escaping of OutputCWE-89 :Failure to Preserve SQL Query StructureCWE-20 :Improper Input ValidationCWE-79 :Failure to Preserve Web Page StructureCWE-78 :Failure to Preserve OS Command StructureCWE-319 :Cleartext Transmission of Sensitive InformationCWE-352:Cross-Site Request ForgeryCWE-362 :Race ConditionCWE-209 :Error Message Information LeakCWE-119 :Failure to Constrain Operations within the Bounds of a Memory BufferCWE-642 :External Control of Critical State DataCWE- 73:External Control of File Name or Path
CWE-665 :Improper InitializationCWE-426 :Untrusted Search PathCWE-94 :Failure to Control Generation of CodeCWE- 494 :Download of Code Without Integrity CheckCWE-404 :Improper Resource Shutdown or ReleaseCWE-682 :Incorrect CalculationCWE-285 :Improper Access ControlCWE-327:Use of a Broken or Risky Cryptographic AlgorithmCWE-259 :Hard-Coded PasswordCWE-732 :Insecure Permission Assignment for Critical ResourceCWE-330 :Use of Insufficiently Random ValuesCWE- 250 :Execution with Unnecessary PrivilegesCWE-602:Client-Side Enforcement of Server-Side Security (ANI)This List is produced by National Security Agency (NSA) and 30 other organisations to put forward the flaws.
Tuesday, August 25, 2009
Reduce Windows Animation Speed in Windows Vista
Windows Vista comes with several new enhancements, however for these added features you have to pay the price of slow processing speed for even the fastest of computers. The main reason is the visual upgrades, which though looks good can drastically reduce the performance of your system. If your system can not take the load of Window Vista and you still want to use it for considerable performance, you may tweak Windows Vista for certain optimizations. For example; when you minimize, maximize or close any windows/applications, the animation speed to perform these tasks is a default setting which is not under the control of the user. Never the less, you can make this transition run slower while holding the SHIFT key button; after performing the following registry hack as shown below: 1. Click on the Start button and type regedit in the Start Search field, then press enter. 2. If User Account Control prompts you for consent, click on Continue. 3. Navigate to HKEY_CURRENT_USER\Software\Microsoft\Windows\DWM 4. In the right hand pane, right click on an empty space and from the context menu that appears choose “New > DWORD (32-bit) Value”. 5. Give the new DWORD (32-bit) Value a name of AnimationsShiftKey. 6. Double click on the “AnimationsShiftKey” value and give it a value of 1. 7. Close the Registry Editor and log off of Windows and log back in for this to take effect. If you have successfully edited the registry, you will notice that the animation speed has become slower when compared to previous without holding the SHIFT key. Enjoy!
Labels:
tips,
tricks,
tutorial,
windows vista
Automated scp on Linux
Scenario You would like to automate the export of SQL dump files from one Linux server to another using scp. These dump files are to be generated and exported once every two weeks. You also wish to archive these dump files on the source server. So let’s say the servers and directories are as follows: Source Hostname: perak
Username: nazham
Dump file directory: /home/nazham/data_export/current
Archive directory: /home/nazham/data_export/archive/yyyymmdd Target Hostname: selangor
Username: romantika
Target directory: /home/romantika/data_import Passwordless scp First you need to set it up so that you don’t need to enter a password for scp. The overall picture is as follows:
At the source server, generate a pair of public and private keys [1] using RSA.
Store the private key in a specific place in the source server.
Store the public key in a specific place in the destination server.
And that’s it! Now you’ll no longer be prompted for a password when using scp.
One-off steps # login to perak with username nazham
ssh-keygen -t rsa
# choose default location, no passphrase - just press enter at all prompts
scp ~/.ssh/id_rsa.pub romantika@selangor:/home/romantika/.ssh/authorized_keys
# I'm assuming the file authorized_keys does not exist!
# otherwise, you need to append the contents of id_rsa.pub to it.
crontab -e
# add the following:
# 1 0 1,15 * * nazham /home/nazham/run_data_export >> /dev/null 2>&1
# which means, run at 12:01 am every 1st and 15th of the month
mkdir ~/data_export
mkdir ~/data_export/current
mkdir ~/data_export/archive The run_data_export script todaysDate=`date +%Y%m%d`
oldDate=`date -d '1 year ago' +%Y%m%d`
exportDir=data_export
mysqldump -u username -ppassword -r ~/$exportDir/current/filename dbname tablenames
echo $todaysDate > ~/$exportDir/current/importdate.txt
scp ~/$exportDir/current/* romantika@selangor:/home/romantika/data_import
mkdir ~/$exportDir/archive/$todaysDate
rm ~/$exportDir/current/importdate.txt
mv ~/$exportDir/current/* ~/$exportDir/archive/$todaysDate
if [ -d ~/$exportDir/archive/$oldDate ]; then rm -r ~/$exportDir/archive/$oldDate; fi The Linux date command I’m very impressed by the Linux date command. This might be old news to some, but the fact that I’m able to say date -d '1 year ago' or date -d '30 days ago' completely blows the mind. Notes [1] From Pass on Passwords with scp: “If you’re not familiar with public key cryptography, here’s the 15-second explanation. In public key cryptography, you generate a pair of mathematically related keys, one public and one private. You then give your public key to anyone and everyone in the world, but you never ever give out your private key. The magic is in the mathematical makeup of the keys; anyone with your public key can use it to encrypt a message, but only you can decrypt it with your private key.”
Username: nazham
Dump file directory: /home/nazham/data_export/current
Archive directory: /home/nazham/data_export/archive/yyyymmdd Target Hostname: selangor
Username: romantika
Target directory: /home/romantika/data_import Passwordless scp First you need to set it up so that you don’t need to enter a password for scp. The overall picture is as follows:
At the source server, generate a pair of public and private keys [1] using RSA.
Store the private key in a specific place in the source server.
Store the public key in a specific place in the destination server.
And that’s it! Now you’ll no longer be prompted for a password when using scp.
One-off steps # login to perak with username nazham
ssh-keygen -t rsa
# choose default location, no passphrase - just press enter at all prompts
scp ~/.ssh/id_rsa.pub romantika@selangor:/home/romantika/.ssh/authorized_keys
# I'm assuming the file authorized_keys does not exist!
# otherwise, you need to append the contents of id_rsa.pub to it.
crontab -e
# add the following:
# 1 0 1,15 * * nazham /home/nazham/run_data_export >> /dev/null 2>&1
# which means, run at 12:01 am every 1st and 15th of the month
mkdir ~/data_export
mkdir ~/data_export/current
mkdir ~/data_export/archive The run_data_export script todaysDate=`date +%Y%m%d`
oldDate=`date -d '1 year ago' +%Y%m%d`
exportDir=data_export
mysqldump -u username -ppassword -r ~/$exportDir/current/filename dbname tablenames
echo $todaysDate > ~/$exportDir/current/importdate.txt
scp ~/$exportDir/current/* romantika@selangor:/home/romantika/data_import
mkdir ~/$exportDir/archive/$todaysDate
rm ~/$exportDir/current/importdate.txt
mv ~/$exportDir/current/* ~/$exportDir/archive/$todaysDate
if [ -d ~/$exportDir/archive/$oldDate ]; then rm -r ~/$exportDir/archive/$oldDate; fi The Linux date command I’m very impressed by the Linux date command. This might be old news to some, but the fact that I’m able to say date -d '1 year ago' or date -d '30 days ago' completely blows the mind. Notes [1] From Pass on Passwords with scp: “If you’re not familiar with public key cryptography, here’s the 15-second explanation. In public key cryptography, you generate a pair of mathematically related keys, one public and one private. You then give your public key to anyone and everyone in the world, but you never ever give out your private key. The magic is in the mathematical makeup of the keys; anyone with your public key can use it to encrypt a message, but only you can decrypt it with your private key.”
Monday, August 24, 2009
PDF Merger:Merge PDF Files into single File
MergePDF, like what the name suggests, is an online tool that you can use to merge PDF Documents into a single file. If you have multiple, small sized PDF documents that you want combined, you might want to try using this tool.In the website MergePDF
For each process, you are allowed to merge up to 10 PDFs with sizes not exceeding 5MB. If you think that the file size limit is rather small, you’ll have to do it using desktop applicatons such as Acrobat PRO or some other PDF related desktop software. If you’re merging large files, then most probably you don’t want them to be lurking around the internet anyway. Even if MergePDF stated that the files that are uploaded are removed right after the merge process is completed. The only thing that is not safe in itself is the data transfer as we are not transferring through SSL. If our users send us an email requesting SSL, we will happily address that and provide upload over https. This is a neat and simple tool for doing a simple task and it won’t cost you anything. It merges PDFs, no manipulating no editing,that’s as simple as it gets.
For each process, you are allowed to merge up to 10 PDFs with sizes not exceeding 5MB. If you think that the file size limit is rather small, you’ll have to do it using desktop applicatons such as Acrobat PRO or some other PDF related desktop software. If you’re merging large files, then most probably you don’t want them to be lurking around the internet anyway. Even if MergePDF stated that the files that are uploaded are removed right after the merge process is completed. The only thing that is not safe in itself is the data transfer as we are not transferring through SSL. If our users send us an email requesting SSL, we will happily address that and provide upload over https. This is a neat and simple tool for doing a simple task and it won’t cost you anything. It merges PDFs, no manipulating no editing,that’s as simple as it gets.
Top 5 iPhone tips and tricks
OK, so might already know one or two of these tips and shortcuts to improving your iPhone experience, but hopefully a few of these following pointers will be news to you. Print out the list and give 'em a try, and feel free to post your own to the comments section.
Some of these iPhone tricks were revealed in a recent sit-down chat with Bob Borchers, senior product executive at Apple.
1. Two ways to save images
You're surfing the Internet in Safari and stumble upon a photo you'd like to save. Simply press and hold on a photo when on a website and you'll be prompted with a menu asked if you'd like to "Save Image." Once the photo is saved, you can view it offline, email it or set it as wallpaper.
On a related note, if you want to take a screenshot of a website or application, press down on the Home button and tap the Sleep button. You'll hear the camera click, see a white flash and the screenshot will be saved.
2. Oh those magic headphones
Those trendy white earbuds do more than you might realize. The iPhone's headphones have a small button on the microphone and it performs multiple functions. For example, press once to start the iPod and begin playing a song. Press again to pause the track or double-tap to skip to the next song.
If a call comes in, press the button once to answer or double-tap to send the call right to voicemail. During a call, press once to hang up.
3. Browser tricks
Want to know an easy way to scroll to the top of a website in Safari? Simply tap at the top of the phone screen, where the time, battery and signal bars are. Doing this works in most applications, but in Safari it also brings up the URL to type in a new website.
If your preferred search engine is set to Google in Safari you don't need type in the "www" and ".com" for many websites. For example, simply type "usatoday" (without the quotes) in the URL window. If you need to type a domain suffix (e.g. ".net"), press and hold the ".com" button for ".net," ".edu," ".org" shortcut keys and use your finger to slide between them.
4. No place like Home
There are many uses for that circular Home button, located in the center and bottom of your iPhone. If you've got ten pages of applications to peruse through, you can quickly go back to the first page by pressing the Home button once (here's where you should drag and drop your most used apps). By the way, you can also tap the bottom left or right corners of the screen to switch between pages instead of swiping your finger across.
Double-tapping the Home button brings up your phone's Favorites screen, where you can list the people you call the most. If you prefer, edit the Home button's function in Settings so when you double-tap the Home button it takes you right to your music playlists.
5. Little-known email tips
You can delete unwanted emails en masse rather than deleting one at a time. In your Inbox, simply click the Edit button and check off the emails you want to delete with your finger and then choose Delete. Otherwise, to delete a single email, simply swipe the email sideways and you'll see the red "Delete" button option.
One of the biggest issues iPhone users have is typing an email on the "soft keyboard" with the email's vertical screen layout. But there are a handful of free App Store downloads, such as EasyWriter, that can resolve this by letting you hold the phone horizontally (landscape view) and thus offering a wider keyboard with bigger buttons
Some of these iPhone tricks were revealed in a recent sit-down chat with Bob Borchers, senior product executive at Apple.
1. Two ways to save images
You're surfing the Internet in Safari and stumble upon a photo you'd like to save. Simply press and hold on a photo when on a website and you'll be prompted with a menu asked if you'd like to "Save Image." Once the photo is saved, you can view it offline, email it or set it as wallpaper.
On a related note, if you want to take a screenshot of a website or application, press down on the Home button and tap the Sleep button. You'll hear the camera click, see a white flash and the screenshot will be saved.
2. Oh those magic headphones
Those trendy white earbuds do more than you might realize. The iPhone's headphones have a small button on the microphone and it performs multiple functions. For example, press once to start the iPod and begin playing a song. Press again to pause the track or double-tap to skip to the next song.
If a call comes in, press the button once to answer or double-tap to send the call right to voicemail. During a call, press once to hang up.
3. Browser tricks
Want to know an easy way to scroll to the top of a website in Safari? Simply tap at the top of the phone screen, where the time, battery and signal bars are. Doing this works in most applications, but in Safari it also brings up the URL to type in a new website.
If your preferred search engine is set to Google in Safari you don't need type in the "www" and ".com" for many websites. For example, simply type "usatoday" (without the quotes) in the URL window. If you need to type a domain suffix (e.g. ".net"), press and hold the ".com" button for ".net," ".edu," ".org" shortcut keys and use your finger to slide between them.
4. No place like Home
There are many uses for that circular Home button, located in the center and bottom of your iPhone. If you've got ten pages of applications to peruse through, you can quickly go back to the first page by pressing the Home button once (here's where you should drag and drop your most used apps). By the way, you can also tap the bottom left or right corners of the screen to switch between pages instead of swiping your finger across.
Double-tapping the Home button brings up your phone's Favorites screen, where you can list the people you call the most. If you prefer, edit the Home button's function in Settings so when you double-tap the Home button it takes you right to your music playlists.
5. Little-known email tips
You can delete unwanted emails en masse rather than deleting one at a time. In your Inbox, simply click the Edit button and check off the emails you want to delete with your finger and then choose Delete. Otherwise, to delete a single email, simply swipe the email sideways and you'll see the red "Delete" button option.
One of the biggest issues iPhone users have is typing an email on the "soft keyboard" with the email's vertical screen layout. But there are a handful of free App Store downloads, such as EasyWriter, that can resolve this by letting you hold the phone horizontally (landscape view) and thus offering a wider keyboard with bigger buttons
Sunday, August 23, 2009
Make a Shortcut to Lock Your Computer
Leaving your computer in a hurry but you don?t want to log off? You can double-click a shortcut on your desktop to quickly lock the keyboard and display without using CTRL+ ALT+DEL or a screen saver.
To create a shortcut on your desktop to lock your computer:
Right-click the desktop.
Point to New, and then click Shortcut.
The Create Shortcut Wizard opens. In the text box, type the following:
rundll32 .exe user32.dll,LockWorkStation
Click Next.
Enter a name for the shortcut. You can call it "Lock Workstation" or choose any name you like.
Click Finish.
You can also change the shortcut's icon (my personal favorite is the padlock icon in shell32.dll).
To change the icon:
Right click the shortcut and then select Properties.
Click the Shortcut tab, and then click the Change Icon button.
In the Look for icons in this file text box, type:
Shell32.dll.
Click OK.
Select one of the icons from the list and then click OK
You could also give it a shortcut keystroke such CTRL+ ALT+L. This would save you only one keystroke from the normal command, but it could be more convenient.
To create a shortcut on your desktop to lock your computer:
Right-click the desktop.
Point to New, and then click Shortcut.
The Create Shortcut Wizard opens. In the text box, type the following:
rundll32 .exe user32.dll,LockWorkStation
Click Next.
Enter a name for the shortcut. You can call it "Lock Workstation" or choose any name you like.
Click Finish.
You can also change the shortcut's icon (my personal favorite is the padlock icon in shell32.dll).
To change the icon:
Right click the shortcut and then select Properties.
Click the Shortcut tab, and then click the Change Icon button.
In the Look for icons in this file text box, type:
Shell32.dll.
Click OK.
Select one of the icons from the list and then click OK
You could also give it a shortcut keystroke such CTRL+ ALT+L. This would save you only one keystroke from the normal command, but it could be more convenient.
MySQLi Dumper
Table of contents:
1.Introduction
2.Getting the program
3.Running the Scan
4.Finding the vulnerabilities
5.Understanding the program
6.Exploitation
7.Getting the Tables
8.Leaving your message
Disclaimer:
We by no means encourage or take responsibility of the tutorial of this program. Blah blah blah...don't do anything stupid guys.
Introduction:
Welcome to my second article, in this article basically we will be looking at the program: MySQLi Dumper, which is a SQL vulnerability Scanner, that deals with the dumping of data through SQL injection. Now it has only been recently that i have discovered the uses of having a SQL scanner, and i have still not yet mastered it or configured it to a wider range of exploits. However, i had to spread the word.
Basically the role of a scanner is to use search engine's results (Google/Yahoo) to find pages that have queries that may be vulnerable. In this article, my goal is to basically run you through how to use MySQLi and also run through a bit of the theory behind the exploit/attack.
Getting the Program:
Before we begin scanning any sites, we must first all have our own copies of the program. To get the program, all we have to do is download it from this site: Click Me
Once u have it downloaded, extract the files and save it to a safe and secure folder and open the program.
Running the Scan:
Okay, well now you should have to program open and on the page you should see essentially a blank page, which at the top has a set of tabs:
- Scanner
- Num.Blind
- Dump MySQL
- ETC
Logically, if we are to have any chance of finding an exploit, we must first have our archive of possible, vulnerable sites. Hence, we come to the scanner tab.
This tab basically allows us to put in which criteria we want to scan for, and from what search engine we are going to do it from.
So for this example we are going to be searching for pages with SQL based queries. This is going to be our first search type:
Click Me
Here we have the following criteria:
- URL has ".php?newsid="
- From Google
- Timeout of 5 seconds (increase this if your internet is slow and vice versa)
- Results of 100pages
Once, we have our settings dialed right, we have to click "Start Scann SQLi" and away we go.
/* on a side note, you can change these values for different sites *\
Finding the Vulnerabilities:
Now comes the beauty of this program, the ability to inject chosen SQL into the archive to find a vulnerability.
- To get there click on the Vuln.SQLi tab
- Configure your settings to that of your internet standards.
- Also there is now a SQL injection drop down box, you can configure that to determine which SQL injection you want to produce the errors.
Now all you do is click Start Scan .
Understanding the program:
Now with all programs like these, it is essentially very easy to know the process of running the application, without actually knowing the theory of how the program is working.
When scanning for vulnerable sites, the program injects code into the database that will output an error.
A very common (and default) way of returning an error is to input something that is essentially incorrect.
A MYSQL page for example uses SQL queries to search a given database for given results. Now if we were to input an error after this, the database would return an error, and if the page is vulnerable, will also return that error.
In the SQL injection part of the Vuln.SQLi tab, we will find the default SQL injection as being:
CODE :
+ and+0 =1+ union+ select+
What this does is input corrupt data into the database and hope for a result.
CODE :
An example: www.vulnsite.com/index.php?id=0
Now this site has a PHP query for the variable id.
If we were to inject arbitrary code after it, we could possibly output and error and we would know we may exploit it.
So for hypothetical sake, we input the following:
CODE :
www.vulnsite.come/index.php?i d=0+ AND+0 =1+ UNION+ SELECT+
And the page outputs an error, we know we have a probable:
CODE :
mysql_num_rows() line 255
Exploitation:
Alright, now at this point, we should have a list of vulnerable sites, and we now need to see if they are exploitable.
So, once we have these pages we copy and paste our first page, and we go to the "Num.Blind Tab".
Now we should have pasted the page into the main form and click GET.
Page should look like this:
Click Me
Now part of this exploitation is searching through errors to see when they disappear or when the error no longer applies. So the program will guide us through this process with the GET PAGE button.
OK to get started I'll make easy I'll do it in steps:
- Put page into the top bar and click GET PAGE
- The page should come up with an error of some sort on the screen, make note of it and click GET PAGE again.
- Keep clicking GET PAGE until the error disappears....WE have our point of exploitation
- Now since the code is now true we must change:
CODE :
id=1 to id=-1
- Once it's edited click 'GET PAGE MANUALLY'
- If you have done everything right, the errors should disappear and we should get an output... An example is here... Click Me
Making the attack:
Now we have found an insecure site, we need to go to the DUMP MYSQL tab, and paste in the top form.
Once it is pasted, you must remember the output for which the database echoed...In my example it was '3', however this will change.
1.Introduction
2.Getting the program
3.Running the Scan
4.Finding the vulnerabilities
5.Understanding the program
6.Exploitation
7.Getting the Tables
8.Leaving your message
Disclaimer:
We by no means encourage or take responsibility of the tutorial of this program. Blah blah blah...don't do anything stupid guys.
Introduction:
Welcome to my second article, in this article basically we will be looking at the program: MySQLi Dumper, which is a SQL vulnerability Scanner, that deals with the dumping of data through SQL injection. Now it has only been recently that i have discovered the uses of having a SQL scanner, and i have still not yet mastered it or configured it to a wider range of exploits. However, i had to spread the word.
Basically the role of a scanner is to use search engine's results (Google/Yahoo) to find pages that have queries that may be vulnerable. In this article, my goal is to basically run you through how to use MySQLi and also run through a bit of the theory behind the exploit/attack.
Getting the Program:
Before we begin scanning any sites, we must first all have our own copies of the program. To get the program, all we have to do is download it from this site: Click Me
Once u have it downloaded, extract the files and save it to a safe and secure folder and open the program.
Running the Scan:
Okay, well now you should have to program open and on the page you should see essentially a blank page, which at the top has a set of tabs:
- Scanner
- Num.Blind
- Dump MySQL
- ETC
Logically, if we are to have any chance of finding an exploit, we must first have our archive of possible, vulnerable sites. Hence, we come to the scanner tab.
This tab basically allows us to put in which criteria we want to scan for, and from what search engine we are going to do it from.
So for this example we are going to be searching for pages with SQL based queries. This is going to be our first search type:
Click Me
Here we have the following criteria:
- URL has ".php?newsid="
- From Google
- Timeout of 5 seconds (increase this if your internet is slow and vice versa)
- Results of 100pages
Once, we have our settings dialed right, we have to click "Start Scann SQLi" and away we go.
/* on a side note, you can change these values for different sites *\
Finding the Vulnerabilities:
Now comes the beauty of this program, the ability to inject chosen SQL into the archive to find a vulnerability.
- To get there click on the Vuln.SQLi tab
- Configure your settings to that of your internet standards.
- Also there is now a SQL injection drop down box, you can configure that to determine which SQL injection you want to produce the errors.
Now all you do is click Start Scan .
Understanding the program:
Now with all programs like these, it is essentially very easy to know the process of running the application, without actually knowing the theory of how the program is working.
When scanning for vulnerable sites, the program injects code into the database that will output an error.
A very common (and default) way of returning an error is to input something that is essentially incorrect.
A MYSQL page for example uses SQL queries to search a given database for given results. Now if we were to input an error after this, the database would return an error, and if the page is vulnerable, will also return that error.
In the SQL injection part of the Vuln.SQLi tab, we will find the default SQL injection as being:
CODE :
+ and+0 =1+ union+ select+
What this does is input corrupt data into the database and hope for a result.
CODE :
An example: www.vulnsite.com/index.php?id=0
Now this site has a PHP query for the variable id.
If we were to inject arbitrary code after it, we could possibly output and error and we would know we may exploit it.
So for hypothetical sake, we input the following:
CODE :
www.vulnsite.come/index.php?i d=0+ AND+0 =1+ UNION+ SELECT+
And the page outputs an error, we know we have a probable:
CODE :
mysql_num_rows() line 255
Exploitation:
Alright, now at this point, we should have a list of vulnerable sites, and we now need to see if they are exploitable.
So, once we have these pages we copy and paste our first page, and we go to the "Num.Blind Tab".
Now we should have pasted the page into the main form and click GET.
Page should look like this:
Click Me
Now part of this exploitation is searching through errors to see when they disappear or when the error no longer applies. So the program will guide us through this process with the GET PAGE button.
OK to get started I'll make easy I'll do it in steps:
- Put page into the top bar and click GET PAGE
- The page should come up with an error of some sort on the screen, make note of it and click GET PAGE again.
- Keep clicking GET PAGE until the error disappears....WE have our point of exploitation
- Now since the code is now true we must change:
CODE :
id=1 to id=-1
- Once it's edited click 'GET PAGE MANUALLY'
- If you have done everything right, the errors should disappear and we should get an output... An example is here... Click Me
Making the attack:
Now we have found an insecure site, we need to go to the DUMP MYSQL tab, and paste in the top form.
Once it is pasted, you must remember the output for which the database echoed...In my example it was '3', however this will change.
Saturday, August 22, 2009
Windows 7 Geniune activation keys
If you have downloaded Windows 7 beta version, you will probably need an activation to extend its period more than 30 days. Various tricks were published on some blogs to get activation key for free but the URL provided didn't work out. Microsoft is giving away some Windows Activation keys to its users so read on to know how to get it.
You can get unlimited number of Windows Seven genuine activation keys from microsoft immediately after reaching the provided URL.
Visit Microsoft TechNet .
Click on Sign In link on the top right corner, and login to Microsoft TechNet with a valid Windows Live ID. You can log in even if you're not a TechNet subscriber.
Copy and paste the following URL to the address bar of the web browser tab or window used to login to Microsoft TechNet:
32-bit Product Key : https://www.microsoft.com/be taexperience/scripts/gcs.aspx ?Product=tn-win7-32 - ww&LCID=1033
64-bit Product Key : https://www.microsoft.com/be taexperience/scripts/gcs.aspx ?Product=tn-win7-64 - ww&LCID=1033
After several retires, it wa observed that activation keys were repeated so if you are getting server error or some any other problem getting the key, use the following keys to activate Windows 7.
Windows 7 Beta 32-bit Product Key
6 JKV2 -QPB8 H-RQ893 -FW7 TM- PBJ73
TQ32 R-WFBDM-GFHD2 -QGVMH-3 P9GC
GG4 MQ-MGK72 -HVXFW-KHCRF- KW6KY
4 HJRK-X6 Q28 -HWRFY-WDYHJ- K8HDH
QXV7 B-K78 W2 -QGPR6-9 FWH9 - KGMM7
Windows 7 Beta 64-bit Product Key
7XRCQ-RPY28-YY9P8-R6HD8-84GH3JYDV8-H8 VXG-74RPT-6BJPB-X42V4482XP-6J9WR-4JXT3-VBPP6-FQF4MJYDV8-H8VXG-74RPT-6BJPB-X42V4D9RHV-JG8XC-C77H2-3YF6D-RYRJ9
You can get unlimited number of Windows Seven genuine activation keys from microsoft immediately after reaching the provided URL.
Visit Microsoft TechNet .
Click on Sign In link on the top right corner, and login to Microsoft TechNet with a valid Windows Live ID. You can log in even if you're not a TechNet subscriber.
Copy and paste the following URL to the address bar of the web browser tab or window used to login to Microsoft TechNet:
32-bit Product Key : https://www.microsoft.com/be taexperience/scripts/gcs.aspx ?Product=tn-win7-32 - ww&LCID=1033
64-bit Product Key : https://www.microsoft.com/be taexperience/scripts/gcs.aspx ?Product=tn-win7-64 - ww&LCID=1033
After several retires, it wa observed that activation keys were repeated so if you are getting server error or some any other problem getting the key, use the following keys to activate Windows 7.
Windows 7 Beta 32-bit Product Key
6 JKV2 -QPB8 H-RQ893 -FW7 TM- PBJ73
TQ32 R-WFBDM-GFHD2 -QGVMH-3 P9GC
GG4 MQ-MGK72 -HVXFW-KHCRF- KW6KY
4 HJRK-X6 Q28 -HWRFY-WDYHJ- K8HDH
QXV7 B-K78 W2 -QGPR6-9 FWH9 - KGMM7
Windows 7 Beta 64-bit Product Key
7XRCQ-RPY28-YY9P8-R6HD8-84GH3JYDV8-H8 VXG-74RPT-6BJPB-X42V4482XP-6J9WR-4JXT3-VBPP6-FQF4MJYDV8-H8VXG-74RPT-6BJPB-X42V4D9RHV-JG8XC-C77H2-3YF6D-RYRJ9
Labels:
activation,
key,
product,
seven
Subscribe to:
Posts (Atom)
Follow Me... Stay Connected
MY STATS