WELCOME GUEST ENJOY YOUR STAY HERE...

TELL A FRIEND ABOUT US.. Share/Save/Bookmark
Showing posts with label tips. Show all posts
Showing posts with label tips. Show all posts

Monday, September 14, 2009

Disable Data Execution Prevention (DEP) in Vista.

Data Execution Prevention (DEP) is a security feature that can help prevent damage to your computer from viruses and other security threats. Harmful programs can try to attack Windows by attempting to run (also known as execute) code from system memory locations reserved for Windows and other authorized programs. These types of attacks can harm your programs and files. DEP can help protect your computer by monitoring your programs to make sure that they use system memory safely. If DEP notices a program on your computer using memory incorrectly, it closes the program and notifies you. It is as such a security feature.
Type cmd in Vista's search bar. Rt click on search results 'cmd' and click on Run as Administrator. Then copy paste
bcdedit.exe /set {current} nx AlwaysOff
and hit enter. Reboot.
To enable back DEP, type instead:
bcdedit.exe /set {current} nx AlwaysOn
Thats it !

Tuesday, August 25, 2009

Reduce Windows Animation Speed in Windows Vista

Windows Vista comes with several new enhancements, however for these added features you have to pay the price of slow processing speed for even the fastest of computers. The main reason is the visual upgrades, which though looks good can drastically reduce the performance of your system. If your system can not take the load of Window Vista and you still want to use it for considerable performance, you may tweak Windows Vista for certain optimizations. For example; when you minimize, maximize or close any windows/applications, the animation speed to perform these tasks is a default setting which is not under the control of the user. Never the less, you can make this transition run slower while holding the SHIFT key button; after performing the following registry hack as shown below: 1. Click on the Start button and type regedit in the Start Search field, then press enter. 2. If User Account Control prompts you for consent, click on Continue. 3. Navigate to HKEY_CURRENT_USER\Software\Microsoft\Windows\DWM 4. In the right hand pane, right click on an empty space and from the context menu that appears choose “New > DWORD (32-bit) Value”. 5. Give the new DWORD (32-bit) Value a name of AnimationsShiftKey. 6. Double click on the “AnimationsShiftKey” value and give it a value of 1. 7. Close the Registry Editor and log off of Windows and log back in for this to take effect. If you have successfully edited the registry, you will notice that the animation speed has become slower when compared to previous without holding the SHIFT key. Enjoy!

Monday, August 24, 2009

Top 5 iPhone tips and tricks

OK, so might already know one or two of these tips and shortcuts to improving your iPhone experience, but hopefully a few of these following pointers will be news to you. Print out the list and give 'em a try, and feel free to post your own to the comments section.

Some of these iPhone tricks were revealed in a recent sit-down chat with Bob Borchers, senior product executive at Apple.



1. Two ways to save images
You're surfing the Internet in Safari and stumble upon a photo you'd like to save. Simply press and hold on a photo when on a website and you'll be prompted with a menu asked if you'd like to "Save Image." Once the photo is saved, you can view it offline, email it or set it as wallpaper.

On a related note, if you want to take a screenshot of a website or application, press down on the Home button and tap the Sleep button. You'll hear the camera click, see a white flash and the screenshot will be saved.







2. Oh those magic headphones
Those trendy white earbuds do more than you might realize. The iPhone's headphones have a small button on the microphone and it performs multiple functions. For example, press once to start the iPod and begin playing a song. Press again to pause the track or double-tap to skip to the next song.

If a call comes in, press the button once to answer or double-tap to send the call right to voicemail. During a call, press once to hang up.





3. Browser tricks
Want to know an easy way to scroll to the top of a website in Safari? Simply tap at the top of the phone screen, where the time, battery and signal bars are. Doing this works in most applications, but in Safari it also brings up the URL to type in a new website.

If your preferred search engine is set to Google in Safari you don't need type in the "www" and ".com" for many websites. For example, simply type "usatoday" (without the quotes) in the URL window. If you need to type a domain suffix (e.g. ".net"), press and hold the ".com" button for ".net," ".edu," ".org" shortcut keys and use your finger to slide between them.





4. No place like Home
There are many uses for that circular Home button, located in the center and bottom of your iPhone. If you've got ten pages of applications to peruse through, you can quickly go back to the first page by pressing the Home button once (here's where you should drag and drop your most used apps). By the way, you can also tap the bottom left or right corners of the screen to switch between pages instead of swiping your finger across.

Double-tapping the Home button brings up your phone's Favorites screen, where you can list the people you call the most. If you prefer, edit the Home button's function in Settings so when you double-tap the Home button it takes you right to your music playlists.





5. Little-known email tips
You can delete unwanted emails en masse rather than deleting one at a time. In your Inbox, simply click the Edit button and check off the emails you want to delete with your finger and then choose Delete. Otherwise, to delete a single email, simply swipe the email sideways and you'll see the red "Delete" button option.

One of the biggest issues iPhone users have is typing an email on the "soft keyboard" with the email's vertical screen layout. But there are a handful of free App Store downloads, such as EasyWriter, that can resolve this by letting you hold the phone horizontally (landscape view) and thus offering a wider keyboard with bigger buttons

Saturday, August 22, 2009

Top 20 Windows 7 tips,tricks,tweaks and secrets [part 2]

Yes its part 2...Lets continue
10) Right-click everything :
Right-click an empty part of the desktop, for instance, and you'll find a menu entry to set your screen resolution. No need to go browsing through the display settings any more. Right-click the Explorer icon on the taskbar for speedy access to common system folders: Documents, Pictures, the Windows folder, and more. And if you don't plan on using Internet Explorer then you probably won't want its icon permanently displayed on the taskbar. Right- click the icon, select " Unpin this program from the taskbar ", then go install Firefox, instead.
11)Hide Windows Live Message Icon: Windows Live Messenger is front and central on the taskbar, where you can easily change status and quickly send an IM to someone:

To hide it from task bar just close Windows Live Messenger, edit the shortcut properties and set the application to run in Windows Vista compatibility mode.Done!
12)Faster video access: Windows 7 now lets you add Videos folder to the Start menu. Just right-click the Start orb, click Properties > Start Menu > Customize , and set the Videos option to " Display as a link ". If you've a TV tuner that works with Windows 7 then you'll appreciate the new option to display the Recorded TV folder on the Start menu, too.
13)Create and Run Web Searches: The Windows 7 search tool can now be easily extended to search online resources, just as long as someone creates an appropriate search connector. To add Flickr support, say Something like [ http://crackinhack.blogspot.com/flickrsearch ], click Download the Connector, choose the Open option and watch as it's downloaded (the file is tiny, it'll only take a moment). A " Flickr Search " option will be added to your Searches folder, and you'll be able to search images from your desktop.
14)User Account Control(UAC) Customization:
Windows Vista's User Account Control was a good idea in practice, but poor implementation put many people off - it raised far too many alerts. Fortunately Windows 7 displays less warnings by default, and lets you further fine-tune UAC to suit your preferred balance between security and a pop-up free life ( Start > Control Panel > Change User Account Control Settings ).
15) Pin Your Favorite Folders: If you're always working in the same four or five folders, you can quickly pin them with the Explorer icon on the taskbar. Hold the right-click button down and drag the folder to the taskbar, and it will be automatically pinned in the Explorer Jump List.
16)Taskbar Fix: The new Windows 7 taskbar acts as one big quick launch toolbar that can hold whatever program shortcuts you like (just right-click one and select Pin To Taskbar). And that's fine, except it does consume a little more screen real estate than we'd like. Shrink it to a more manageable size by right-clicking the Start orb, then Properties > Taskbar > Use small icons.If you've no problem with the taskbar size, but find the way it combines icons to be confusing, then right-click the Start orb, click Properties > Taskbar and set "Taskbar buttons" to "Combine when taskbar is full" for a more familiar XP and Vista-style look.
17)Installing from USB Stick: You can Boot and install Windows 7 from USB. Which i had explained it in my previous post where you can read it Install Windows 7 from USB/Flash Drive .
18)Desktop Peeking:
While you're on the taskbar, it's worth noting a few subtleties. You've probably seen the small rectangle in the bottom right hand corner: this is the feature we call " Aero Peek ", which enables you to see any gadgets or icons you've got on your desktop. I wanted to note that there's a keyboard shortcut that does the same thing - just press Win+Space .
19)BitLocker and BitLocker to Go:


In Windows 7, core BitLocker Drive Encryption functionality is enhanced to deliver an improved experience for end users- from simple enhancements such as the ability to right-click on a drive to enable BitLocker protection to the automatic creation of the required hidden boot partition. Learn about these enhancements and the new BitLocker To Go, which gives system administrators control over how removable storage devices can be used and the strength of protection required.
20)Deployment Image Servicing and Management(DISM): Explore Deployment Image Servicing and Management (DISM), a new command-line tool for Windows 7 and Windows Server 2008 R2. DISM consolidates the core image management functions of multiple tools found in the Windows Automated Installation Kit (AIK) and enables users to view components of an applied or mounted operating system image and add or remove packages, software updates, and drivers.

Top 20 Windows 7 tips,tricks,tweaks and secrets [part 1]

The Latest OS release Windows 7 is very much cool and faster than all of the previous windows versions.
Like the Previous Windows OS there are many secrets,tips,tricks,tweaks and hacks but the top 20 secrets which we 300allpctips recommend to 7 users are as follows.
1)Fix the Clutter:
Remove all background windows while running/using a document by just pressing WIN+HOME keepong the window while ur in the current position,to restore the background windows press WIN+HOME again.
2)Problem Steps Recorder(PSR):
PSR is a great little tool in Windows 7 used for recording the steps to reproduce a problem in the computer. The captured data is stored in a MHTML document which is enclosed in a zip file. You can send the zip file to someone else who can help you fix the problem.


The Problem Steps Recorder provides a simple screen capture tool that enables you to record a series of actions. Once you hit "record", it tracks your mouse and keyboard and captures screenshots with any comments you choose to associate alongside them. Once you stop recording, it saves the whole thing to a ZIP file, containing an HTML-based "slide show" of the steps. It's a really neat little tool and I can't wait for it to become ubiquitous on every desktop! The program is called psr.exe ; you can also search for it from Control Panel under "Record steps to reproduce a problem".
3)Running with Elevated Rights: Want to quickly launch a taskbar-docked application as an administrator? It's easy - hold down Ctrl+Shift while you click on the icon, and you'll immediately launch it with full administrative rights (assuming your account has the necessary permissions, of course!)
4) Keyboard shortcuts :
Windows 7 has several useful new keyboard shortcuts.
Alt+P ->Display/ hide the Explorer preview pane
Windows Logo+G ->Display gadgets in front of other windows
Windows Logo++ (plus key) - >Zoom in, where appropriate
Windows Logo+- (minus key) - >Zoom out, where appropriate
Windows Logo+Up ->Maximise the current window
Windows Logo+Down ->Minimise the current window
Windows Logo+Left ->Snap to the left hand side of the screen
Windows Logo+Right ->Snap to the right hand side of the screen
Windows Logo+Home ->Minimise/ restore everything except the current window
Shift + Click on icon ->Open a new instance
Middle click on icon ->Open a new instance
Ctrl + Shift + Click on icon - >Open a new instance with Admin privileges
Shift + Right-click on icon - >Show window menu (Restore / Minimize / Move / etc) Note: Normally you can just right-click on the window thumbnail to get this menu
Shift + Right-click on grouped icon ->Menu with Restore All / Minimize All / Close All, etc.
Ctrl + Click on grouped icon - >Cycle between the windows (or tabs) in the group
5) Display your drives :
My Computer in Windows 7 hides drives like memory card readers etc.. if they're empty.We think it's helpfull and an improvement, but if you disagree then launch Explorer, click Tools > Folder Options > View and clear "Hide empty drives in the computer folder" to get your empty drives back.
6) Burn images: ISO images can be burned into CD/DVD Drives in windows 7,To burn an ISO Just double-click the ISO image, choose the drive with the blank disc, click Burn and watch as your disc is created.


7)Windows Movie Maker: Windows 7 doesn't include a movie editing tool - it's been moved to the Windows Live Essentials package, along with Photo Gallery, Mail and Messenger. Unfortunately, Windows Live Movie Maker is currently still in an early beta that is missing most of the old feature set.best solution for this is to use Windows Movie Maker 2.6 (which is essentially the same as the most recent update to the Windows XP version). It's missing the full set of effects and transitions from the Windows Vista version, and doesn't support HD editing, but it's pretty functional for the typical usage scenario of home movie editing.


Download Windows Movie Maker 2.6 from here:
http://microsoft.com/download s/details.aspx?FamilyID=d6 ba 5972-328 e-4 df7-8 f9 d-068 fc0 f80cfc
8) Protect your MP3 files :
Along with many good new features, the Windows 7 beta also includes a nasty bug. Its version of Windows Media Player 12 will automatically add missing metadata, including album art, and this can overwrite the first few seconds of the file. Oops. Installing an update may fix this (from http://300 allpctips.blogspot.com/2009 /01 /kb 961367 -windows-7 -beta- wmp-12-corrupt.html ) but it would be a very good idea to back up your MP3 files, too.
9)System Repair Disc: There are always in Bad times when you're in a really bad spot - you can't boot up properly, and what you really want is something you can quickly use to get at a command prompt so you can properly troubleshoot. Windows 7 now includes the ability to create a system repair disc, which is essentially a CD- bootable version of Windows that just includes the command prompt and a suite of system tools. Just type "system repair disc" in the Start Menu search box, and you'll be led to the utility.
Read part 2 to continue

Repair a Laptop Battery

DISCLAIMER:
crackinhack.blogspot.com nor I will be responsible in any way if this article leads you to do something that causes harm in any way, either to a person or property. Thus they nor I will be liable if such an event happens, and by proceeding with the instructions listed in this article you verify that you understand these risks and accept these terms.
Ok so I'm writing another article, because as I have said before, I have no life. So anyway, because I've been procrastinating studying for finals I have been doing a lot more with my computers lately
The last thing I did was to rebuild my laptop battery, and while you might not call it "hacking" I saved myself about $100 on a new laptop battery, and considering we all use computers here, I thought this might be helpfull to a lot of people out there.
What this article will teach you is if your laptop battery is not holding a charge, how to repair it and make it like new again, for either free or a lot cheaper than buying a new one
Note: If you're not experienced with soldering, and electricity you might not want to attempt this because if you do it wrong bad things can happen. I feel that I should list some of the things that can go wrong to try and deter the unexperienced
1. The battery can explode
2. The battery can catch on fire
3. Battery acid can leak on you
4. You can short out your laptop
And thats just to name a few
If you are experienced with things like this (it doesnt even have to be to this level, but I mean expereinced with soldering, and working with batteries and understand a little on how electricity works) as well as you take the proper precautions, this process is very simple. As I am nowhere near an electrical engineer and I was able to do it relativly without a problem. However if you are not experienced, or do not feel confident on this at all I can not stress enough that this project can go bad very quickly and why I felt it necissary to write the above disclamer.
Note: This process involves cutting open your laptop battery, now while some batteries can be re-closed, others can not, and would either have to be glued or taped, so if you dont like this possibility, dont try this
Note2: ok this is the last note in the intro, i have been told that on some newer laptop betteries there are anti-tamper devices, if a battery is disconnected from the unit it will no longer work. This method is still valid in this case, but its much harder, because you must always have all the sets of cells together
************************ *********************What you will need:
1. Old laptop battery you wish to fix
2. Knife/Razor blade
3. Soldering Iron (I prefer a soldering gun)& Solder (if not using an
expensive soldering iron go for low heat solder)
4. New battery cells/another working laptop battery with the same cells that you dont need any more
5. Glue/Tape (I recommend gorilla glue, because it is really strong)
6. Tin strips (or any other metal both conductive and solder can stick to)
7. Multi-Meter (The cells are not always clearly labeled which side is
positive and negative, this will help tell, while there are tricks to do this without a multimeter for the $10 I found it for in the store I thought it well worth it)
************************ *********************Getting Started:
1. Go ahead and open up your laptop battery, to do this cut around the battery on the seam. After you have cut around the full battery try and pry it open. If you're confident you broke the seal, the two pieces are fused together, rather than overlaped, and to close it you will need to either glue it or tape it shut, if this is the case, keep cutting carefully, makeing sure you do not puncture one of the cells inside, until you get it open
2. Look for any markings on the batteries you see inside, if you get lucky you will see a marking indicating how many volts each cell is. Usually its
3.6 V, also you may see it say something like 1200mAh
What that number means is 1200 milliamps, this number and the number on your replacement cells dont need to match, to put it generally, the larger this number is, the longer the battery will retain a charge
If your cell does not state the voltage, remember that google is your friend go ahead and throw the information that is on the cell into google and you should hopefully find the information that you are looking for.
3 . Finding replacement cells- Well one of the easiest things you can do is go ahead and search google for the type of cells that you have and then find them on a website and buy them (I will tell you that I searched stores like CircuitCity, 2 Radio Shacks, Sears, Staples, and a store called Batteries Plus in several different cities, and no one had the ones I needed, so unless you KNOW a store by you has them dont waste your time with anything but online)
Depending on your laptopbattery you might have anyware from 6 to over 12 cells, just for a comparason I found the cells that my laptop used for $5.00 a pop online (so for mine it would have cost me $30 plus shipping, a hell of a lot cheaper than say a new battery that most likely sells for over $100) Another thing you can do is use an old laptop battery if you KNOW that the battery still holds a charge, take it appart and compare the cells
request here to get more info about batteries by commenting

Friday, August 21, 2009

Security Tips and Fraud Prevention

For any User, maintaining the account's security is the top priority. To augment the security measures that the Online Service Provide on your behalf, there are steps that you can take to help protect your account from fraud and scams. Note: Here we will be using the URL www.WebsiteName.com for explaining you. This can be the Domain name of the Online Service you are Using. But for Explanation Purpose we will be using WebsiteName as the Name of the Website and www.WebsiteName.com as the URL. Website Security
Use SSL Connection: To safely and securely access your account, open a new web browser (e.g., Internet Explorer or Netscape) and type the URL in the following way:
https:// www.WebsiteName.com/.
As you can see I have written https:// instead of http:// which you use normally. This can be used in those website which provide SSL Authentication. Not all Websites provide SSL( Secure Sockets Layer) but most of the Online Services like GMail, Yahoo, MSN, Orkut, Facebook, eBay etc provide SSL.
Password Safety
Never share your password: Any Website representative will never ask you for your password. If you believe someone has learned your password, please change it immediately.
Create a secure password: Choose a password that uses a combination of letters, numbers, and symbols. For example, $coo!place2 l!ve or 2 Barry5 Bonds#1. Avoid choosing obvious words or dates such as a nickname or your birth date.
Keep your password unique: Don't use the same password for all the online services such as AOL, eBay, MSN, or Yahoo. Using the same password for multiple websites increases the likelihood that someone could learn your password and gain access to your account.
Email Security
Look for a Greeting: Any Website will never send an email with the greeting "Dear WebsiteName User" or "Dear WebsiteName Member." Real WebsiteName emails will address you by your first and last name or the business name associated with your WebsiteName account. If you believe you have received a fraudulent email, Send a copy of the spoofed e-mail you received to your ISP's abuse desk. The e- mail address for this is usually abuse@yourisp.com or postmaster@yourisp.com but if you are not sure, visit your ISP's Web site and search for the information - it will be there.
Don't share personal information via email: Any Website will never ask you to enter your password or financial information in an email or send such information in an email. You should only share information about your account once you have logged in to your Account.
Don't download attachments: Any Website will never send you an attachment or Software update to install on your computer.

Pc Maintainance Guide part 2

Look for Trouble
Give your PC a periodic checkup with a good hardware diagnostic utility. Two excellent choices are Sandra Standard from SiSoftware and #1 - TuffTest-Lite from #1 -PC Diagnostics. Download the free version of Sandra (the full version of the application costs $35 ) or to download #1 - TuffTest-Lite (the fully functional version is $10).
Sandra Standard:
CODE
http://www.pcworld.com/down loads/file_description/0 ,fid,4005 ,tk,ur,00.asp
#1-TuffTest-Lite:
CODE
http://www.pcworld.com/down loads/file_description/0 ,fid,7725 ,tk,ur,00.asp
Adding and removing system components leaves orphaned entries in the Windows Registry. This can increase the time your PC takes to boot and can slow system performance. Many shareware utilities are designed to clean the Registry.
Windows stores files on a hard drive in rows of contiguous segments, but over time the disk fills and segments become scattered, so they take longer to access. To keep your drive shipshape, run Windows' Disk Defragmenter utility. Click Start, Programs (All Programs in XP), Accessories, System Tools, Disk Defragmenter. If your drive is heavily fragmented, you could boost performance. Defragging may take hours, however. Disable your screen saver and other automatic programs beforehand to keep the defrag from restarting every few minutes.
Disk Defragmenter won't defragment the file on your hard drive that holds overflow data from system memory (also known as the swap file). Since the swap file is frequently accessed, defragmenting it can give your PC more pep. You can defragment your swap file by using a utility such as the SpeedDisk program included with Norton SystemWorks 2004, but there's a way to reset it in Windows.
In Windows XP, right-click My Computer and choose Properties. Click Advanced, and then choose the Settings button under Performance. Click Advanced again and the Change button under Virtual Memory. Select another drive or partition, set your swap file size, and click OK.
If you have only one partition and no way to create a second one, and you have at least 256MB of RAM, disable the swap file rather than moving it: Select "No paging file" in the Virtual Memory settings. If you have trouble booting, start Windows in Safe Mode and re- enable this option.
Hard-Drive Checkup
Windows XP offers a rudimentary evaluation of your hard disk's health with its error-checking utility: Right-click the drive's icon in Windows Explorer and select Properties, Tools, Check Now. (Windows can fix errors and recover bad sectors automatically if you wish.) If the check discovers a few file errors, don't worry, but if it comes up with hundreds of errors, the drive could be in trouble.
To conduct a more thorough examination, download Panterasoft's free HDD Health utility, which monitors hard- drive performance and warns of impending disaster:
CODE
http://www.pcworld.com/down loads/file_description/0 ,fid, 22945 ,tk,ur,00.asp
The program works only with drives that support S.M.A.R.T technology, but nearly all drives released since 2000 are S.M.A.R.T.-compliant.
Many hardware and software designers humbly assume you want their program running on your PC all the time, so they tell Windows to load the application at startup (hence, the ever-growing string of icons in your system tray). These programs eat up system resources and make hardware conflicts and compatibility problems more likely. To prevent them from launching, just click Start, Run, type "msconfig" and press Enter. The programs listed under the Startup tab are set to start along with Windows. Uncheck the box at the left of each undesirable program to prevent it from starting automatically.
Four Tips for Longer PC Life
1. Keep your PC in a smoke-free environment. Tobacco smoke can damage delicate contacts and circuits.
2. Leave your PC running. Powering up from a cold state is one of the most stressful things you can do to your system's components. If you don't want to leave your PC running all the time, use Windows' Power Management settings to put your machine into hibernation rather than completely shutting down. In Windows XP, right-click the desktop and select Properties. Click the Screen Saver tab and select the Power button. Choose the Hibernate tab to ensure that hibernation is enabled, and then select a time beneath "System hibernates" under the Power Schemes tab. (Note that this option is not available on all PCs.) Computers running older versions of Windows may or may not provide similar power- management features. Look under the Power Management icon (Power Options in Windows 2000) in Control Panel to evaluate your machine's capabilities.
3. Don't leave your monitor running. The best way to extend your display's life is to shut it off when it's not in use.
4. Avoid jostling the PC. Whenever you move your system, even if it's just across the desktop, make sure the machine is shut down and unplugged.
uhh....It is long but usefull

Fixing slow logon time

My problem was a 1 min login delay due the aktiveds.dll that loads at startup (thanks to NicTech Networks Inc.). The following advice worked for me so I guess it works for any.dll made by NicTech since they all use the same registry folder....
Open up regedit.exe and find THIS folder. Navigate to it by clicking the +'s to expand
things like you would in Windows explorer:
HKEY_LOCAL_MACHINE\SOFTWA RE\Microsoft\Windows NT\CurrentVersion\Winlogon\No tify\Guardian
Right click over "Guardian" in the left pane.
Left click on "Permissions"
Left click "SYSTEM" once to highlight it.
Check "deny" in all boxes that you can at the bottom (Probably only 2)
Left click Apply
Left Click OK
Say "OK" to any warnings about permissions
**Reboot** the system
then problems solved
I got this information from another forum. I had this problem for about six weeks and was just about ready to reformat my hard drive. Worked great for me, hope this helps out somebody else.

Thursday, August 13, 2009

Tips for Wireless Home Network Security

1) Change Default Administrator Passwords (and Usernames)
2) Turn on (Compatible) WPA / WEP Encryption
3) Change the Default SSID
4) Disable SSID Broadcast
5) Assign Static IP Addresses to Devices
6) Enable MAC Address Filtering
7) Turn Off the Network During Extended Periods of Non-Use
8) Position the Router or Access Point Safely
.. Follow these simple steps to no get hacked

Tuesday, August 11, 2009

5 Things to Do as Soon as You Purchase a New Computer

Increase your computer security and reduce potential headaches later by doing these five things as soon as you purchase a new computer.
Have you just purchased a new desktop or laptop computer? Congratulations, and hopefully you will get plenty of use out of your new machine, whether it is for business, finance, research, multimedia, or purely entertainment (or a little of all the above).
But wait - don't open the boxes, plug in the cords, and try to start surfing the Internet just yet! Take a few minutes and follow these 5 steps that can help increase your computer security and possibly remove some potential headaches down the road.
1. Emergency Disks
Some computers come packaged with CDs or DVDs you can use to reinstall the operating system and pre-installed software in case something goes wrong, such as a hard drive hiccup, malware infestation, or an itchy trigger finger that loves pressing the 'Del' key. If such discs are included, place them in a safe place and make copies once the computer is set up.
If these did not come with your computer, read its manual for instructions on how to create them, if possible. Do so ASAP - before you go online, install new software, uninstall software that came pre-packaged but you do not need, etc. Better yet, make a second copy of these disks for safe keeping.
2. Install Security Software
Before connecting to the Internet, either via a wired or Wi-Fi connection, make sure you have a working firewall and antivirus software at a BARE minimum; surfing without such programs can open your computer up to all types of nasty malware. If your operating system has a built-in firewall, turn this on if nothing else is available, but do consider downloading a replacement.
If you have another computer, use it to download a firewall, anti-virus, and anti-malware applications. Either burn a CD/DVD or use a USB flash drive to copy them to the new machine. Install this software before you ever connect to the Internet to reduce the chances of problems. Once you are online, immediately download updates as needed.
Note that if your computer comes built-in with security software, you may need to remove these packages first if you decide to install alternatives (see below).
3. Uninstall Software
Go through the list of installed software through the computer's "Add/Remove Programs", "Uninstall or change a program", or similar tool (check the Control Panel). Remove any pre-installed " bloatware ", software you may not need such as trial games, photo applications you may never use, website toolbars, links to Internet Service Providers you will never access (especially if you already have one), etc. Do keep the installed security software unless you are offline and ready to install different applications.
4. Consider a New Web Browser
When you go online, you are not stuck with your operating system's default web browser if you want to surf the web. There are plenty of alternatives available such as Mozilla Firefox , Opera, and Google Chrome , and using another web browser may increase your overall security.
Even if you install a new web browser, be sure to keep the one that came with your operating system up-to-date to help prevent malware from attacking your system via an exploit.
5. Update All Software
Speaking of doing software updates, after going online but before browsing the web, immediately update your operating system (including the built-in web browser). Check for updates to document readers such as Adobe Acrobat Reader and any installed multimedia players. Plus, look for updates to installed browser plug-ins such as Adobe Flash, Adobe Shockwave, Java, QuickTime, and RealPlayer. Exploits can potentially be found in any software installed on your system; keeping everything up- to-date helps reduce the risk of your computer getting infected by malware.
While you may immediately be ready to unpack and use your new computer, following these five steps will help increase your security when going online. Create or find emergency recovery discs and store them in a safe place in case 'stuff' happens. Install security software such as firewall, antivirus, and anti-spyware applications before you connect to the Internet. Remove unneeded "bloatware" and consider installing an alternate web browser. Finally, before general web surfing or other activities, ensure your operating system and all installed software are up-to- date. By performing these steps, you can start your computer off right, blocking malware and operating well for hopefully years to come.....

Sunday, August 2, 2009

Hacking hotmail passwords on a network

First of you will need to go and download cain&able at http://www.oxid.it/
And you will need to find a basic key logger (just google it)
Then once you have Cain install it on a computer on a network and click on the network tab then direct down to Microsoft Windows Network / (domain name) / All Computers. There you will find all the computers that are running on the network then just find the computer that you are looking for and click on shears and right click on C drive and map network drive than just install the key logger to that drive and create a shortcut for it and chuck it in the start up folder for all the users and just check it in a few days and if some one logged in to a website or hotmail account you will have there username and password
If some 1 is using the computer at the time go and read shutdown basics and just restart there computer
well but keep in mind one thin else u ll blame RAHUL
1. This will only work if they have shares enable
2. Once again only work if you have write access to the drive
3. Why use cain and abel to do it?
4. Why not use the arp poisoning feature of cain and able to sniff all the packets from the computer you want the account from?

ULTIMATE GUIDE FOR PASSWORD FILES. part 2

5. Shadowed Passwd's
Now if you happen to find a passwd fiel that looks something like this: "joetest:*:102 :100::/home/joetest:/usr/bin/re stsh"
which has a user name, not a programs, you have a shadowed passwd. The shadow file has the encrypted passwords on it. Depending on the Operating System, the passwd file may be in different places. To find out what Operating system your target is running from telnet (connected to that server of course) type uname -a and it should say, if you cannot get to telnet there is other methods of finding out. Here is a guide to systems passwd file locations (taken from a text on passwd files by Kryto.) A token is the * (or other symbol) beside a shadowed passwds user name
UNIX Paths (Courtesy of 2600)
UNIX Path Token
----------------------------AIX 3 /etc/security/passwd !
or /tcb/auth/files/first letter #
A/UX 3.0 s /tcb/files/auth/?/ * BSD4.3 -Reno /etc/master.passwd * ConvexOS 10 /etc/shadpw * ConvexOS 11 /etc/shadow * DG/UX /etc/tcb/aa/user/ * EP/IX /etc/shadow x HP-UX /.secure/etc/passwd * IRIX 5 /etc/shadow x Linux 1.1 /etc/shadow * OSF/1 /etc/passwd [.dir|.pag] * SCO Unix #.2 .x /tcb/auth/files/ / * SunOS4.1+ c2 /etc/security/passwd.adjunct ##username SunOS 5.0 /etc/shadow optional NIS+ private secure maps/tables/whatever
System V Release 4.0 /etc/shadow x System V Release 4.2 /etc/security/* database
Ultrix 4 /etc/auth[.dir|.pag] *
UNICOS /etc/udb * Anyway once you have the passwd file (with user names) and shadow file you can find a unshadowing program which combines the passwd file and the shadow passwd and combines them into what a regualr passwd file would be. A unshadowing program can be found at http://www.hackersclub.com/k m/downloads/password_crack er/ucfjohn2.zip Now some servers have the shadow file on retrictions so no one without a special account on the server can get to it.
________________________6. Crackers
Now that you have gotten a passwd file, what the hell do you do it it to get passwords from it? Thats where crackers come in.
A cracker takes the passwd file and a wordlist and compares the wordlist to the passwd files encrypted passwd. I have used many different crackers. Everyone has their favorite. My personal favorite is one called PaceCrack95 Ver. 1.1
http://tms.netrom.com/~cassi dy/utils/pacec.zip
Many people swear that John the Ripper is the greatest but i have problems with it, but it can be gotten off any decent hacking page. Same for Cracker Jack. A Cracker will load a wordlist and a passwd file and compare the two. When it cracks a password it will tell you the user name and the unencrypted password. You don't need to write it down because the program auto saves it. Cracker Jack saves the file as jack.pot and i think John the Ripper does too. PaceCrack95 Ver. 1.1 saves it to the files name (ex., passwd.txt.db) with the exact name and makes it a.DB file. I like to keep a passwd file once i have cracked it and later try out a new passwd cracker on it with the same wordlist and see if it works or if it is fake. It helps
________________________7. Wordlists
Wordlists are a nessicity to cracking passwd files. They are just huge lists of words. The biggest wordlist is avaliable from here: ftp://ftp.ox.ac.uk/pub/wordlists/
If you get a passwd file from another contry get a wordlist with the same launguage as the worlist came from, as the users would probably use words they are familier with There are some programs which can make random numbers to what you specify but that might not be really great, since there is such a huge amount of number combinations they could use. I am not completly saying they are useless since i have cracked a password with one before, I had fashoned my own list of 4 digit numbers since people might use their phone number and well it worked
________________________8. What to do with a Cracked Passwd file
What you can do with a passwd is up to you. The nice thing to do is inform the administator of the server that, accounts on his (or her) server are insucure and possibly open to anyone hacking an account and bringing havok upon their server. Some other things you can do is fire up good ole telnet and connect to one of theirrts and see what you could do with that account. The possiblities are endless. You could hack a webpage (i wouldn't do that on account of how lame it is to destruct someones piece of work.)
You could use an exploit in sendmail and get root or install a sniffer on the system and get all the passwords you could ever want from it. You could use the account to do work on OTHER servers that you sure as hell wouldn't want to do from your own. If your account is canceled you can use a hacked accounts dial up till you purchase a new one. Like I said the list goes on and on. I am sure noone wants you doing anything destuctive (its lame anyhow.) And the best thing to do is report the problem to the system admin so, if he finds out he won't freak and call your admin and tell him you have been doing naughty things or even call the cops. I hope this text was informative enough to fufill your needs

Password Recovery Techniques Part 2

14. Choose one of these three options:
o To VIEW the password type "show config."
o To CHANGE the password (in case it is encrypted, for example):
a. Type "config mem" to copy the NVRAM into memory.
b. Type "config term" and make the changes to the configuration.
conf t
enable password password
ctrl-z
c. Type "write mem" to commit the changes.
o To ERASE the config, type "write erase."
15. Type "config term" at the prompt.
16 . Type "config-register 0 x2102" or whatever value you recorded in step
2.
17. Hit Ctrl-Z to quit from the editor.
18. Type "reload" at the prompt. You do not need to write memory.
Technique #3
IGS Routers Running Software Earlier Than 9.1
IGS routers have a bank of DIP switches on the rear panel. If they are
running software earlier than 9.1, then these switches are used for
password recovery.
1. Attach a terminal or PC with terminal emulation to the console port of
the router.
2. Power the router down.
3. Record the settings of the switches on the rear panel.
4 . Set switch 7 ON (or down).
5 . Set switches 0-3 OFF (or up).
6. Power the router up. It will boot up to the > prompt.
7. Type "b" at the > prompt. The router is in test-system mode.
8. Press return until the "Test- System>" prompt appears.
9. Type "enable" at the prompt. You'll be in enable mode and see the
"Test-System#" prompt.
10. Choose one of these three options:
o To VIEW the password type "show config."
o To CHANGE the password (in case it is encrypted, for example):
a. Type "config mem" to copy the NVRAM into memory.
b. Type "config term" and make the changes to the configuration.
conf t
enable password password
ctrl-z
c. Type "write mem" to commit the changes.
o To ERASE the config, type "write erase".
11 . Restore the switch setting to those recorded in step 3.
12. Reboot the router.
Technique #4
CGS, MGS, AGS, AGS+ , 70 x0 Running ROMs Lower Than 10.0
1. Attach a terminal or PC with terminal emulation to the console port of
the router.
2. Power the router down.
3 . Remove the processor card (CSC/2 or CSC/3 or CSC/4 on AGS/CGS/MGS, or
RP on a 70 x0).
4 . Change the hardware register from bit position 0 (or 1) to position
15.
5. Re-insert the processor card.
6. Power the router up.
7. Press "b" at the > prompt or "b flash" if you have Flash memory
installed.
8. Press return until the "Test- System>" prompt appears.
9. Type "enable" at the prompt. You'll be in enable mode and see the
"Test-System#" prompt.
10. Choose one of these three options:
o To VIEW the password type "show config."
o To CHANGE the password (in case it is encrypted, for example):
a. Type "config mem" to copy the NVRAM into memory.
b. Type "config term" and make the changes to the configuration.
conf t
enable password password
ctrl-z
c. Type "write mem" to commit the changes.
o To ERASE the config, type "write erase."
11. Power the router down.
12 . Remove the processor card and return the jumper on pin 15 to its
original position.
13. Power the router up.
Technique #5
500-CS Communication Servers
The password cannot be recovered from the 500-CS since it does not have a
console port. Your only option is to erase the configuration.
1. Power the router off by unplugging it.
2. Depress and hold the DEFAULT button on the front of the chassis.
3. Power the router back on.
4. Watch the OK and LAN LEDs. They will blink on, and then off.
5 . When they blink off (after about 15 seconds), release the DEFAULT
button.
6 . In 2-10 minutes, the 500-CS will enter setup mode as if it was factory
new.
7. Configure the router.
You could also recover a password on a 500 by holding the DEFAULT button
down for 30-45 seconds. The system will then be in test mode, and you can
follow the normal procedure for password recovery. See the earlier sections
for details.
Technique #6
Cisco 1020
You must call the Cisco TAC to recover Cisco 1020 passwords. The 1020 will
issue a password override challenge that can only be interpreted by TAC
personnel.
----------------------------

Password Recovery Techniques... part 1

Introduction
This post will explain several password recovery techniques for Cisco
routers. You can perform password recovery on most of the platforms without
changing hardware jumpers, but all platforms require the router to be
reloaded. Password recovery can only be done from the console port
physically attached to the router.
There are three ways to restore enable access to a router when the password
is lost. You can VIEW the password, CHANGE the password, or ERASE the
configuration and start over as if the box was new.
Each procedure follows these basic steps:
1. Configure the er to boot up without reading the configuration
memory (NVRAM). This is sometimes called the test system mode.
2. Reboot the system.
3. Access enable mode (which can be done without a password if you are in
test system mode).
4. VIEW or CHANGE the password, or ERASE the configuration.
5. Reconfigure the router to boot up and read the NVRAM as it normally
does.
6. Reboot the system.
NOTE: Some password recovery requires that a terminal issues a
Break signal; you must be familiar with how your terminal or PC
terminal emulator issues this signal. For example, in ProComm,
the keys Alt-B will by default generate the Break signal, and in
Windows Terminal you press Break or CTRL-Break. Windows Terminal
also allows you to define a function key as BREAK. From the
terminal window, select Function Keys and define one as break by
filling in the characters ^$B (Shift 6 , Shift 4, and Capital B).
The following six sections contain detailed instructions for specific Cisco
routers. Locate your router in the section headings to determine which
technique to use.
Technique #1
All Cisco 2000 Series, 2500 Series, 3000 Series, 680 x0 - Based 4000 Series,
7000 Series Running 10.0 or Later in ROMs, IGS Series Running 9.1 or Later
in ROMs
This technique can be used on the 7000 and 7010 only if the router has 10.0
ROMs installed on the RP card. It may be booting Flash 10.0 software, but
it needs the actual ROMs on the processor card as well.
1. Attach a terminal or PC with terminal emulation to the console port of
the router.
2. Type "show version" and record the setting of the configuration
register. It is usually 0 x2102 or 0 x102.
3. Power the router down, then up.
4 . Press the Break key on the terminal within 60 seconds of the power up.
You will see the > prompt with no router name. If you don't, the
terminal is not sending the correct Break signal. In that case, check
the terminal or terminal emulation setup.
5 . Type "o/r0 x42 " at the > prompt to boot from Flash or "o/r 0 x41" to
boot from the boot ROMs. Note that this is the letter "o," not the
numeral zero. If you have Flash and it is intact, 0 x42 is the best
setting. Use 0 x41 only if the Flash is erased or not installed.
NOTE: If you use 0 x41, you can only view or erase the
configuration. You cannot change the password.
6. Type "i" at the > prompt. The router will reboot but will ignore its
saved configuration.
7. Answer "no" to all the setup questions.
8. Type "enable" at the "Router>" prompt. You'll be in enable mode and
see the "Router#" prompt.
9. Choose one of these three options:
o To VIEW the password type "show config."
o To CHANGE the password (in case it is encrypted, for example):
a. Type "config mem" to copy the NVRAM into memory.
b. Type "config term" and make the changes to the configuration.
conf t
enable password password
ctrl-z
c. Type "write mem" to commit the changes.
o To ERASE the config, type "write erase.
10. Type "config term" at the prompt.
11 . Type "config-register 0 x2102," or whatever value you recorded in step
2.
12. Hit Ctrl-Z to quit from editor.
13. Type "reload" at the prompt. You do not need to write memory.
Technique #2
Cisco 1003 , 4500, or IDT Orion- Based Routers
1. Attach a terminal or PC with terminal emulation to the console port of
the router.
2. Type "show version" and record the setting of the configuration
register. It is usually 0 x2102 or 0 x102.
3. Power the router down, then up.
4 . Press the Break key on the terminal within 60 seconds of the power up.
You will see the "rommon>" prompt. If you don't, the terminal is not
sending the correct Break signal. In that case, check the terminal or
terminal emulation setup.
5. Type "confreg" at the "rommon>" prompt.
6. Answer "y" to the "Do you wish to change configuration[y/n]?" prompt.
7. Answer "n" to all of the questions that appear until you reach the
"ignore system config info[y/n]?" prompt. Answer "y."
8. Answer "n" to the remaining questions until you reach the "change boot
characteristics[y/n]?" prompt. Answer "y."
9 . At the "enter to boot:" prompt, type "2" followed by a carriage
return. If Flash is erased, type "1 ." If all Flash is erased, the 4500
must be returned to Cisco for service.
NOTE: If you use "1," you can only view or erase the
configuration. You cannot change the password.
10. A configuration summary is printed. Answer "n" to the "Do you wish to
change configuration[y/n]?" prompt.
11 . Type "reset" at the "rommon>" prompt, or power cycle your 4500 or
7500.
12. Once it boots up, answer "no" to all the Setup questions.
13. Type "enable" at the "Router>" prompt. You'll be in enable mode and
see the "Router#" prompt.
Read Part 2 to continue...

Saturday, August 1, 2009

TOP ten Tips to increase System Speed

1 .Let your PC boot up completely before opening any applications. 2 .Refresh the desktop after closing any application. This will remove any unused files from the RAM. 3 .Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).
4 .Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM 5 .Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin. 6 .Delete the temporary internet files regularly. 7.Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster. 8 .Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.
9.When installing new Softwares disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application. 10. Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum. RAM IS THE WORKING AREA (DESKTOP) OF THE CPU, KEEP IT AS EMPTY AND UNCLUTTERED AS POSSIBLE!

Friday, July 31, 2009

Tricks to make XP FASteR

Boot XP faster:
1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot- *.* /q" (without the quotes) & save as "ntosboot.bat" in c:\
2. From the Start menu, select "Run..." & type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file &
click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9 . Select the "Advanced Settings" tab then on the device 0 or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
10 . Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.
Increase ur Computers Response time
Indexing services is a small little program that uses large amounts of RAM and can often make a computer endlessly loud and noisy. This system process indexes and updates lists of all the files that are on your computer. It does this so that when you do a search for something on your computer, it will search faster by scanning the index lists. If you don't search your computer often, or even if you do search often, this system service is completley unnessesary.
1.Go to Start
2.Click Settings
3.Click Control Panel
4,Double-click Add/Remove Programs
5,Click the Add/Remove Window Components
6.Uncheck the Indexing services
7.Click Next
That's it, you have now uninstalled the Indexing service, you system will not have more RAM and be more responsive
Correcting System Hang at Startup
If your system hangs about 2 or 3 minutes at startup, where you can't access the Start button or the Taskbar, it may be due to one specific service (Background Intelligent Transfer) running in the background. Microsoft put out a patch for this but it didn't work for me. Here's what you do:
1. Click on Start/Run, type 'msconfig', then click 'OK'.
2. Go to the 'Services' tab, find the 'Background Intelligent Transfer' service, disable it, apply the changes & reboot.
Enhance ur Computers Gaming performance
For Users with 256 MB RAM or more this tweak will boost their Windows- and Game-Performance.
What it does: It tells Windows not to use any Swap File until there is really no more free RAM left.
Open the System Configuration Utility by typing msconfig.exe in the RUN command. There in your System.ini you have to add "ConservativeSwapfileUs age=1 " under the 386enh section.
Restart your Windows and enjoy better Game performance.
[ soon i ll add more tips] roney

Follow Me... Stay Connected

MY STATS

Top Blogs

Learn hacking tips tricks earn online hints cheats

Blog Directory & Search engine

blogarama - the blog directory

BlogsByCategory.com

Technology Blogs - Blog Rankings

Visit blogadda.com to discover Indian blogs

Computers

Computers Blogs