Tuesday, December 2, 2008

Setting up Scheduled Tasks on Windows XP

You may not know what a Scheduled task is, So I will tell you.

A Scheduled Task is something that you can setup to run at a certain time. For example, maybe you want to open Macromedia Dreamweaver every Monday at 4:00PM. Well, I will show you how.

Firstly, Open up Control Panel.

Then look for Scheduled Tasks and click the icon.

That will then bring up the Scheduled Tasks window.

Now to setup a new task, We need to press: Add Scheduled Task,
That then brings up the wizard. This wizard will help ypu setup your task.


Press next.


Select the application you want to run, and press next.



Enter the name of the task, select when you want it to run.

Select the exact time, and what day you want it to run on. You can select more than one day. Then hit next.

And thats it. Thats how you setup a Scheduled Task on Windows XP!

By following this simple tutorial, you should have learnt how!
Read rest of entry

Speed Up XP Boot with Boot Defrag



Speed up your boot time by enabling a Boot Defrag. Enabling Boot Defrag places all boot files next to each other on the disk to allow for faster booting. This should be enabled by default, however it can be changed inadvertently by various software or other means. If you experience a slow boot, you should definitely check to make sure that your Boot Defrag is enabled.
To Enable or Disable the Boot Defrag, do the following:

click start->run->regedit

Navigate to the following key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOptimizeFunction

Note: If you have a hard time seeing the images in thie guide, simply click on the image and you can view it larger
On the right hand side, locate Enable and double click on it and give it a value of Y to enable Boot Defrag or N to disable Boot Defrag

Reboot your computer
Read rest of entry

How to convert from FAT32 to NTFS with Command Prompt without reformating

To see what is the format of the tabulation of your HardDrive, go to My Computer, select a Hard Drive then click on Properties.

1. As a safety measure, you might want to make a complete backup on a CD or DVD. A problem might occur, even if it's usually rare.

2. Click on the Start Menu and select RUN. Type in: cmd in the dialog box.




3. In the Command Prompt Window, type in:




Convert L: /FS:NTFS     (L: is the letter of the drive)

4. If some files are currently in use, the command prompt will probably propose you to force a temporary unmount. If you're trying to convert your main drive with Windows installed on it, you will have to reboot your computer. In that case, the conversion will occur when rebooting.

Read rest of entry

denial of services and their prevention

Taking advantage of a known problem with the Operating System or any running services on the target, a good programmer can build an application that sends some data that causes the targeted system to crash.

The worst case scenario is not when a hacker crashes a service, but when it finds a way to maximize the CPU usage causing a total malfunction on the system.






1. SYN Floods

You should know that when a client and a server want to transmit data over the TCP protocol, a three-way handshake occurs:


  • The client asks for a connection with a SYN (synchronize) package
  • The server replies to the client with a SYN-ACK (syn-acknowledgments)
  • The client sends a third packages as a ACK and the transmission of the data starts.

The SYN flood works by sending SYN packets from false IP addresses (IP spoofing). The server replies to that false IP address with an SYN-ACK and then waits for ACK. Doing this many times will cause the server to end up in the impossibility of opening new connection, creating a network congestion.

Another SYN flood attack involves sending a packet to the server, spoofed with the server's address (let's say the server's IP is 192.168.1.20 then you send a SYN packet from 192.168.1.20 to 192.168.1.20). Repeating this many times will make the server sending SYN-ACK and ACK to itself, blocking it.

Patches to this kind of attack used a connection number limit from the same source/timeframe. SYN cookies also hold down the handling of the packets until the sender's IP address is verified.

2. SMURF attacks

In this kind of attacks a massive amount of ping traffic (ICMP echos) is sent to the broadcast address of the network. The source IP address is spoofed to look like the target's. If this traffic is forwarded to the network, all hosts will reply with an echo to the target, believing that they receive an echo request (PING) from it. In a large networks, a targeted server for example can be flooded by hundreds of replies at once. By sending the spoofed packet several times, the server will be flooded until it crashes from the overload.

This kind of attacks were mostly patched by making the routers not forwarding broadcast directed traffic to the network.

3. LAND attacks

LAND attacks take advantage of opened network services on the target. By using a port sniffer, opened ports and services are found out. Then spoofed packages are sent with IP address source the same as IP address destination (server's address) to make it reply to itself. Let's say for example that it uses SNMP (simple network management protocol - service used to report network and system's usage). By making a SNMP service to reply to itself continuously it finally crashes.

4. Ping of death

This type of DoS attack takes advantage of a known issue with Windows 9x and older NT stations, as well as Linux prior to 2.0.32. Many routers and printers older then 1998 are vulnerable to this too.
It works by sending a malformed format of a ping packet. Usually, ping packets are small-sized (like 32bytes or 64bytes by default). Older Operating Systems and other devices could not handle ping larger than the maximum IP packet size of 65535 bytes (defined by RFC 791). By sending a large packet or a malformed one, any system that doesn't know how to handle it crashes (eg. in Windows 9x a blue screen of death was generated).
Patches are available on the web for any old operating systems or devices.

5. Ping flooding

This is probably the simplest DoS attack that exists. It is also the most used. It works by overwhelming the target with echo requests (pings) having large packets. The target has it's bandwidth occupied by these requests already and floods itself by starting to reply back. Of course, the attacker must have a larger bandwidth than the target (for example flooding a dial-up user from a 1Mbps connection).
With the increase of the servers' bandwidth, this type of attacks became useless for an ADSL user for instance.
The "problem" was solved by using multiple hosts, creating the first DDoS attacks (distributed denial of service).
DDoS attacks work by owning let's say 50 boxes each with 1Mbps bandwidth. Then the attacker uses all of them to ping flood the target, creating a great amount of traffic on the host.
Stacheldraht for example is a console that connects to owned boxes running Stacheldraht server. It then coordinates the attacks from a single point.
The solution to this type of attacks is the firewall, which filters any echo replies from being sent. Of course, firewalls can be crashed as well.

6. Fraggle attacks

A fraggle attack takes place when an attacker send massive amount of UDP echo data to network broadcast addresses, using a the target's IP as the packet's source. All hosts reply to the target, flooding it. It usually uses UDP PORT 7 (echo). This code was written by the same person who written the smurf attack.

7. Teardrop attacks

This attack involves packets sent by the attacker to the target with oversized payloads. This exploits a bug in the TCP/IP protocol stack, crashing the system. Only Windows 3.11, 95 and Linux prior to 2.0.32 were vulnerable to this kind of attack.

8. Other type of attacks

Other type of attacks involve application flooding, like IRC bot raw line which usually crash Windows boxes running mIRC or any other client. These attacks are based on a greater number of raw socket transactions than a computer can handle.



HOW TO PROTECT YOUR COMPUTER FROM ATTACKS



First of all, firewalls (in networking) represent the virtual barrier between your computer and other parts of the network (usually the Internet).
From the home-users point of view, a software-type firewall represents the best choice. You should also know that hardware firewalls exist too in the form of dedicated equipments that are placed to form demilitarized zones (DMZ). That means that it forms a border between the local network and usually the Internet (depending on the needs). These equipments are expensive and require good configuration knowledge - that is why they are considered professional solutions implemented in large networks.
Overall, a firewall's main goal is to filter unwanted traffic that goes both in and out.
How does it do it?
Well firstly, a good firewall software will override application's permissions. This means that it will ask for your approval to allow an application to access the outer network. You can deny the access for the application that you don't want to send information over the network (useful when infected with a Trojan virus that will connect to other hosts and take control of your station). This rule is applied for all programs even usually trusted. In the picture bellow you have an example applied to Yahoo Messenger.


Secondly, a firewall blocks common DoS (Denial of Service) attacks - in theory - that are sent to your computer. This includes SYN floods, Ping of death and many other known attacks. It works by ignoring all traffic that resembles with a known pattern and further ignoring the sender for a period of time. I know that these kind of organized attacks look like a long shot, but you will be surprised to see how many scan your computer for different stuff and try to get access in. Here is part of a firewall log to get a picture of what's happening when connected to the Internet.


Another useful thing that a firewall usually does is filtering the ports. Usually if you have an application that acts like a server, it opens some ports (virtual access points for data) to listen for requests from the network. Someone could "plant" such an application in your PC without even knowing it. And if it's some kind of management software, an antivirus software would not find it suspicious and block it. By doing this, people can gain administrative access in your computer. A firewall will alert you whenever an application starts listening for connections from the network. This comes in two ways, of course. If you do have a server-type application like a FTP server or a remote administration tool, your firewall will usually block it by default. You have to search in the settings of the firewall (these menus come in different forms depending on the producer) and open that port manually. It's simple on most home-user dedicated firewalls.
If you don't use any firewall software you should get one as soons as possible. That if your computer is connected to any kind of network or the Internt, otherwise it's useless.
I personally recommend ZoneAlarm (it exists in freeware version and a paid one that comes with an antivirus too - you can get it fromhttp://www.oldversion.com/program.php?n=zalarm) or Sygate Personal Firewall (get it from http://www.oldversion.com/program.php?n=sygate).
After installing it, the first thing that you should do is to set up your program access rights. So when you are asked for confirmation (let's say) for Mozilla Firefox to access the Internet, click the options that tells to use this setting next time and accept it. It will never ask you again for that confirmation.




Read rest of entry

7 Tricks To Make Working With Windows Command Prompt Easier


winlogo.jpg



1 - Drag and Drop - Being able to open a command prompt from Windows Explorer right click context menu, to the current directory is a big time saver. But what about opening a command prompt to a file location?
Instead of hacking away at the registry to provide this functionality, the easier method is to use drag-and-drop.
After using Command Prompt Here to open the prompt to the current folder location, just right click and hold on a file, then drag and drop it on the command prompt window.

Unfortunately, drag and drop only works in XP and not Vista. Instead you can use Vista's copyfile name and path as text feature as an alternative.
2 - Open Windows Explorer Window From Command Prompt -Now that you know how to open the command prompt from Windows Explorer, how about reversing the process.
Just type the following command at the prompt and press enter:
explorer .
NOTE: Make sure to include the dot (period) after the command.

To open Windows to the parent directory that of the current directory you are at (one folder above), just type the following command:
explorer . .
Or to open Explorer to a different directory:
explorer c:\windows\system32
3 - Copy and Paste - just like using any Windows program, copy and paste text, to and from the command prompt window is no different.
First, make sure Edit Options are enabled by opening a command prompt window and clicking on the icon in the title bar and selecting properties.
Note: If you are unsure how to open a command prompt, click on Start \ Run… and enter cmd in the Run window.


Then make sure QuickEdit Mode and Insert Mode are checked and click OK.

Once edit options are enabled, you can copy (after highlighting text) and paste to and from the command prompt to any window by right clicking, and selecting either Copy or Paste from the context menu.
4 - Change Directories The Easy Way - Navigating around the file system from the prompt requires using thedir (directory) command to 'see' the contents of a directory. But if you are just moving forward through the current directory, there is an easier way to see folders using the keyboard.
To do this, use the Change Directory command by typing cd and pressing the space bar once, then continually press the Tab key to scroll through the list of folders.
Once you see the folder that you want to navigate into, stop and press enter.

.
5 - Search For Text - If you execute many commands,  after a while the window can fill up with a lot text. To quickly locate text output from a command, you can easily search for it using the Find dialog bog.
Click on the icon in the title bar (of the command prompt window you are working in) and select Edit,  thenFind… (you can also right on the Title bar select Edit \ Find ).
In the Find dialog box, just enter the text you are looking for, click on Find Next, and the selected text will be found and highlighted.
6 - Change The Window Title - Sometimes one command prompt window is not enough. You may have situations where multiple windows are needed to perform several tasks. At times this can lead to confusion as to which window is which.
To make it easier with identifying different command prompt sessions, you can name each window with different titles by using the Title command. All you need to do is enter the following at the prompt:
TITLE [string]
Where string Specifies the title for the command prompt window.
For example, to rename a window that is being used with the net stat command, enter the following command and press enter:
title NET STAT

7 - Open Command Prompt As Administrator In Vista - With Vista, to perform certain functions, you need to have Administrator privileges.
To always open a command prompt as an Administrator, follow these steps:
  • Right-click on the desktop and select New \ Shortcut.
  • At the next screen enter %SystemRoot%\System32\cmd.exe (in the Type the location of the item field) and click Next .
  • At the next screen, give the shortcut a name, such as 'cmd prompt' and click Finish.
  • Now, right click on the shortcut you just created and select Properties .
  • Then click on the Advanced… button (at the bottom).

  • Now, just click the check box next to Run as administrator and click on the OK button twice to exit the Property window.

When you double click on the shortcut, you'll be prompted by UAC (User Account Control). Just click the Continue button to confirm and you will have a command prompt running with Administration rights.



Read rest of entry

How To Restart Windows Explorer Shell Without Rebooting Windows


While Windows, overtime with XP and Vista have become more stable with not crashing, every now it  is freezing and becoming unresponsive while using Windows Explorer or some Desktop function.
The usual remedy is to reboot, sometimes losing data before you had a chance to save and close an application. In reality, when you end task Windows Explorer, only the process for Windows Explorer shell is terminated, leaving any applications not effected and still running.
Instead of restarting Windows, either on XP or Vista, you may be able to recover by restarting Windows Explorer Shell from Task Manager following the below steps.
When Explorer's shell freezes, just hit Ctrl + Alt + Del to bring up Task Manager.
After Task Manager opens, sort the processes by clicking on the Image Name column (arrow) then look for theexplorer.exe process.
(NOTE: screenshots are from Vista, but the follow steps also apply to XP)
shell1.png

Right click on explorer.exe and click on End Process.

shell2.png
Then click Yes in the Task Manager Warning window to end the process. This will cause the desktop to disappear. It's possible that any open application(s) will still be visible, while applications that were minimized will not be shown.
At this point Task Manager will remain open. Click on File \ New Task (Run…). In the Create New Task window, type explorer.exe. Click OK.
shell3.png

Windows Explorer Shell will restart, displaying the desktop and all applications that were open before it froze. At this point, it's best to save any data and continue working.
Read rest of entry

all about thumbs.db





Thumbs.db is a hidden file generated automatically by Windows, you will see it in many folders if you have set the "Show hidden files and folders" option in the "Folder Options" window on. Although Windows mostly generates it to speed things up, some times it is annoying especially when you try to zip a folder or upload a folder using ftp to your site, I have found Thumbs.db in most of the folders in my site and had to delete them manually. If you delete Thumbs.db from your windows folders, Windows will generate it again when you re-open the folders if you have Filmstrip or Thumbnails selected in the View menu of those folders. If the Thumbs.db is considered annoying for you, there is an easy way to stop Windows from re-generating it, here is how.

1. Open any folder and click Tools > Folder Options.
2. Click the View tab from the Folder Options window.
3. In the Advanced Settings check "Do not cache thumbnails".


You can choose "Show hidden files and folders", search for Thumbs.db files and delete them all, using the previous steps windows will not generate it again. You can choose "Show hidden files and folders", search for Thumbs.db files and delete them all, using the previous steps windows will not generate it again.
Read rest of entry

unhiding the folder options




some virus usually disables the 'folder options' in our system .They hide them to protect their anonymity .

SO here is the method to get back "folder options" which helps us to c hidden files and to know the file extensions which are potentially harmful to us.

Start -> run -> gpedit.msc
Have a look in the group policy in
"Administrative Templates -> Windows Components -> Windows Explorer"
disable "Removes the Folder Options menu item from the Tools menu"

OR

Edit the registry to get the folder options back.
Go to Start -> Run -> regedit and click Ok.
Find the following key: HKEY_CURRENT_USER\Software\Microsoft\Win
dows\CurrentVersion\Policies\Explorer
Find the NoFolderOptions key and change the vaule to 0 assuming you have this registry key.
Restart your computer
Read rest of entry

Thursday, November 27, 2008

secret door to many sites using google





many of us have experienced this we try to search for something in google; the engine returns with a number of finds, but if you try to open the ones with the most promising content, we are confronted with a registration page instead, and the ccontent we are looking for will not be revealed to us unless we agree to a credit card transaction first or a registration is needed to access the contents....

can we solve this yes we can let me tell u one thing that google can go in or lurk around those dark corners in the internet where we cannot.
so if we use google as our mask then we can also make it
but why google can access???? u r thinking right
lets see for ourselves
In fact, many sites that force users to register or even pay in order to search and use their content, leave a backdoor open for the Googlebot, because a prominent presence in Google searches is known to generate sales leads, site hits and exposure.

How then, can you disguise yourself as a Googlebot? simple: by changing your browser's User Agent. Copy the following code segment and paste it into a fresh notepad file. Save it as Useragent.reg and merge it into your registry.

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Internet Settings\5.0\User Agent]
@="Googlebot/2.1"
"Compatible"="+http://www.googlebot.com/bot.html"

Voila! You're done!

You may always change it back again.... I know only one site that uses you User Agent to establish your eligability to use its services, and that's the Windows Update site...
To restore the IE6 User Agent, save the following code to NormalAgent.reg and merge with your registry:

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Internet Settings\5.0\User Agent]
@="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)"


Opera allows for on-the-fly switching of User Agents through its "Browser Identification" function, while for Mozilla/FireFox browsers a switching utility is available as an installable extension from this url:
help://chrispederick.myacen.com/work/firefox/useragentswitcher/download/
Read rest of entry

hide ur file in an image in a techy way using winrar





1. Gather the file you wish to bind, and the image file, and place them in a folder. I will be using C:\New Folder
-The image will hereby be referred to in all examples as fluffy.jpg
-The file will hereby be referred to in all examples as New Text Document.txt

2. Add the file/files you will be injecting into the image into a WinRar .rar or .zip. From here on this will be referred to as (secret.rar)

3. Open command prompt by going to Start > Run > cmd

4. In Command Prompt, navigate to the folder where your two files are by typing
cd location [ex: cd C:\New Folder]

5. Type [copy /b sun.jpg + secret.rar sun.jpg] (remove the brackets)

Congrats, as far as anyone viewing is concerned, this file looks like a JPEG, acts like a JPEG, and is a JPEG, yet it now contains your file.

In order to view/extract your file, there are two options that you can take

a) Change the file extension from sun.jpg to sun.rar, then open and your file is there
b) Leave the file extension as is, right click, open with WinRar and your file is there
Read rest of entry

figure out ur motherbard


Whenever I install Windows I have to search for my
motherboard CD for installing drivers of sound, LAN, graphics etc and majority of times it takes hell a lot of time to search for driver CD. At least I find it very difficult to keep my CD in a safe place so that I can use it when I need it.

But what will you do if motherboard driver CD gets lost, I know you will say that you'll go to Internet and download all the desired drivers from there but for that you should know the model number also. If you have lost your motherboard CD and do not know your motherboard model number and want to download or update your drivers, here is a very good application for you.

Driver Genius :


Driver Genius Professional manage your PC to get 100% up to date Drivers and optimize PC performance. Driver Genius Professional is a powerful driver manager for Windows that canbackup, restore ,search and update your drivers automatically in several mouse clicks! 


Yes, you can backup all your installed drivers and can restore it back when needed. Without going to any website you can easily download and install required drivers. Isn't this a useful application !!


Have a quick look at some features of this software :


  • Quickly backup device drivers for your computer.
  • Backup your drivers to a ZIP or EXE self-extracting file.
  • Clone your drivers to an auto-setup package.
  • Wizard mode allow you step by step backup or restore your drivers.
  • Get detailed information about your installed devices.
  • Search for drivers for non-Internet connected computer.
  • Easy to get the most recent drivers for your computer.
  • Search all available drivers update by one click.
  • Live update your drivers information database online.
It works on the following Operating Systems : Windows 98/98SE /ME/2000/XP/2003/Vista/XP x64/Server 2003 x64/Vista x64.

This is a must have application and visit their official website to download this application.
Read rest of entry

a brief tutorial on peer to peer (p2p) file sharing


A Peer-to-peer (or P2P) network is a network made up of computers which are connected to each other through the Internet. Files of all types can be shared between computers on the P2P network, allowing Internet users to transfer files directly, rather than through the use of a website or server. Each user (or “node”) connects to the networkusing a “client” program.

File sharing is the practice of making files available for other users to download over the Internet and smaller networks. Usually file sharing follows the peer-to-peer (P2P) model, where the files are stored on and served by personal computers of the users. Most people who engage in file sharing are also downloading files that other users share - usually these two activities are linked together. P2P file sharing is distinct from file trading in that downloading files from a P2P network does not require uploading, although some networks either provide incentives for uploading such as credits or force the sharing of files being currently downloaded.
Some client programs connect to the same network(s), therefore resulting in similar search results within both programs. Click here for more information about P2P, how it works, and a list of clients and networks.
Peer-to-Peer Network (P2P)courtesy Wikipedia.comServer-based Network - courtesy Wikipedia.com

What does P2P file sharing have to offer?

Everything can be found on the P2P networks, all for free. Anything that anyone could possibly have on their computers is out there. Unlike BitTorrent, where ‘uploading’ has to done deliberately, P2P software can simply scan a computer (or folders) to search for files to share. Users that want to share their files need not do anything; it is done by the software. Below is a sample of what types of files are shared on P2P, and our comments about each category.

Movies 

Not great for full movies. The underground movie ’scene’ does NOT release movies here. Quality is often compromised because of size, so you really have to know what to look for. Also, P2P is a target of “spoofing” in which the file is named correctly but upon arrival, it is not what it seems. Also, it is extremely difficult to tell the good from the bad when forty different search results come back for the same movie. There are good releases are out there, it just takes a bit of a trained eye to sort through.

Software 

Mostly atrocious for software, games, and applications as *.EXE downloads can be infected with viruses and/or malware. Very risky business, not recommended at all.

TV Shows 

Not bad for TV shows, as these tend to be smaller. PROs: Users can download the latest episode of their favorite show, and the speed is good. CONs: If you like to have full seasons of television shows, stick with BitTorrent. As with movies, avoid video files with the *.WMV extension.

Video Clips 

Good for miscellaneous movie clips, music videos, trailers, other videos etc. - large selection due to the demography of the people who use P2P.

Music 

Excellent for music. PROs: Users can find and select songs easily, and play them while they’re downloading. HUGE selection of songs, remixes and rare items. Fast downloads with a quick Internet connection.CONs: Most *.mp3 files on P2P sites are only at 128 bitrate. Music on regular CDs is ‘compared’ to 192. If available, select files with a higher than 128 bitrate. I prefer a 256 - 320 bitrate or VBR (Variable bitrate) so I tend to use mIRC and torrents for music. Also, anyone can rip a song off a CD and put it in their “shared” folder, therefore many songs contain small jumps, crackles etc., and these sub-par versions spread fast throughout P2P. I recommend listening through the songs first before making that CD for Dad for Father’s Day.

Miscellaneous 

Great for pictures, clipart, documents, etc.
Read rest of entry

speedup folder browsing in xp








You may have noticed that everytime you open my Windows XP automatically searches for network files and printers everytime you open Windows Explorer. To fix this and to increase browsing significantly:

1. Open My Computer
2. Click on Tools menu
3. Click on Folder Options
4. Click on the View tab.
5. Uncheck the Automatically search for network folders and printers check box
6. Click Apply
7. Click Ok
8. Reboot your computer
Read rest of entry

renaming start button in win-xp


yep we can change the name of the start butoon to any name v want here goes the tutorial



1. Download Resource Hacker on to desktop. It is a small program and doesn't need installation.

2. Go to Tools>Folder Options>"View" tab> Uncheck "Hide Extensions for known file types".

3. Propagate to X:Windows and copy explorer.exe. Paste it on desktop.

4. Open Resource Hacker. Drag & drop the copied explorer.exe file.

5. In the left pane of Resource Hacker, propogate to "String Table" and select "1033" in 37 sub string.
In the right hand side, now you can see a compilation of some strings. The string corresponding to 578 is the "start" tab text.
6. Replace start to desired text. It can be more than 5 characters and can include spaces too. Then click "Compile Script".
7. Now "save" the file and exit Resource Hacker. After saving the file, you will seeexplorer_original.exe created automatically on desktop. This is a back-up created by Resource Hacker.
8. Now your explorer.exe is ready. You need to replace the original file in Windows directory with this one. You can't copy paste or overwrite the file. Windows File protection system will not allow you to do that.
9. Download Replacer on to desktop. It also doesn't need any installation. It is used for replacing files.
10. Open Replacer
11. It will ask for original file to replace. Drag & drop explore.exe from windows directory.
12. Then it will ask for the new file which will replace the original file. Drag & drop alteredexplorer.exe from desktop.
13. Confirm the process by typing "Y".
14. It's all done now. Reboot the system and you will see that the start button text is changed. 
Read rest of entry

Tuesday, November 25, 2008

trick to create a "temporary file cleaner" w/o using any 3rd party software

copy the following code in a notepad and save it with any file name but with a .bat extension(donot forget to save as "all files"

[HIDE]@echo off echo file Cleaner echo waiting del /f /s /q %systemdrive%\*.tmp del /f /s /q %systemdrive%\*._mp del /f /s /q %systemdrive%\*.log del /f /s /q %systemdrive%\*.gid del /f /s /q %systemdrive%\*.chk del /f /s /q %systemdrive%\*.old del /f /s /q %systemdrive%\recycled\*.* del /f /s /q %windir%\*.bak del /f /s /q %windir%\prefetch\*.* rd /s /q %windir%\temp & md %windir%\temp del /f /q %userprofile%\cookies\*.* del /f /q %userprofile%\recent\*.* del /f /s /q ?%userprofile%\Local Settings\Temporary Internet Files\*.*? del /f /s /q ?%userprofile%\Local Settings\Temp\*.*? del /f /s /q ?%userprofile%\recent\*.*? echo complete! echo. & pause [/hide]
Read rest of entry

Sunday, November 23, 2008

classification of virus



Types Of Virus

Trojan horse

A Trojan horse is a program designed as to seem to being or be doing one thing, such as a legitimate software, but actually being or doing another. They are not necessarily malicious programs but can be. A trojan horse can be used to set up a back door in a computer system so that the intruder can return later and gain access. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called trojan horses. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)

Virus

A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Thus, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells.

Worm

Like a virus, a worm is also a self-replicating program. The difference between a virus and a worm is that a worm does not create multiple copies of itself on one system: it propagates through computer networks. After the comparison between computer viruses and biological viruses, the obvious comparison here is to a bacterium. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program. It is possible for a program to have the blunt characteristics of both a worm and a virus.

Key loggers

Key loggers are used by hackers to spy on a target computer or system by recording the keys pressed by users, thereby capturing useful information such as passwords when they are typed by users. Key loggers can also be used for safety, such as when police forces use them to spy on chat rooms and enable them to find pedophiles.
Read rest of entry

tips 2 defend ourselves from getting hacked



Protect Urself !

Follow These Simple Guidelines n u are done


*** Under the security option tab of Mozilla Firefox there is an option Show Passwords make sure its protected by the master password.


1. U may avoid using Internet Explorer(old versions) and make the switch to Opera, it's more secure, plain and simple.

2. Get Spybot Search and Destroy or Spyware Doctor and immediately update it.

3. Get Adaware SE and immediately update it.
(Use both as a 1-2 punch on infected client computers and between the two there's not much they won't kill)

4. Update your anti virus,

5. Boot into safe mode and run all three scans (once in a month)

6. While the scans are going check your registry (Click start --> Run and type regedit to get intot he registry) and look in HKEY_CurrentUser/software/microsoft/windows/currentversion/run & HKEY_Local_Machine/software/microsoft/windows/currentversion/run. Verify that all programs listed are legitimate and wanted.

7. If or when your antivirus scan comes across anything, search for that file name in your registry and delete it, at least quarantine it.

8. Use explorer to go to the windows/system32 folder and sort by date. If you haven't already done so, make sure you can see the entire file names. click Tools --> Folder Options and unclick the box labeled "Hide extensions for known file types" and under Hidden files and folders click "Show hidden files and folders." However, make sure you choose "Hide protected operating system files" so you don't accidentally remove anything that would cripple your computer.. You are looking for recent files with names ending with .exe and .dll that look suspicious. Major culprits will have gibberish names such as alkjdlkjfa.exe.

9. Once you can get clean scans in safe mode, reboot in normal mode and scan all over again. If you can't get a clean scan in regular mode then you have something more persistant that could take more research.

10. Make sure your firewall doesn't have strange exceptions.

11. If you suspect anything that is going wrong with your computer is the action of a stalker, on a more secure system change all your major passwords, mostly bu using a virtual keyboard(to prevent keyloggers).

12. If your system has been specifically targeted and hacked you can never be 100% sure that your system is no longer compromised so start with 11, make backups of personal files on the infected system and format and re-install Windows.

Good luck!


I am being stalked / spied . now what!!

As email providers give away more and more storage space, more and more personal information is being stored in those accounts. People are increasingly using their email accounts for more than just email - it has become their online document storage area with backup documents such as passwords, bank account numbers, account usernames, scans of correspondence and much more. Even if you don’t use your email for this purpose, you may still be inadvertantly revealing personal information in general conversation emails to family and close friends. A 6GB Gmail account or an unlimited space Yahoo account is potentially an information bonanza source for identity thieves who manage to figure out your email password and then go snooping. But if someone HAS cracked your email password, it may not be apparent to you. A snooper can easily read an email then mark it as unread again. So the best thing to do would be to set up an “electronic tripwire” so if someone breaks into your account, you’ll know about it. Here’s how to do it :
    1. Sign up for a website hit counter at www.onestatfree.com. You can leave a fake name and whatever URL you want (I used Google.com for mine). 2. You will then receive a welcome email from OneStat with a text attachment called OneStatScript.txt. Download this attachment to your computer and then delete the email (you don’t want any email snoopers finding it later). But before deleting the email, write down your OneStat account number as you will need it later.3. Change the name of the text document to something that will make the email snooper salivate such as passwordlist. Also change the file format from a text document to a website page. So make it something like passwordlist.htm .4. Email this newly-renamed file as an attachment to the email account you want to monitor. Make sure the email subject title also lures the snooper in (maybe something like List of Passwords. You get the idea :).5. The trap is now set. Basically if someone opens the email and opens the attachment, OneStat will record a hit. If you then log into your OneStat account say once a day, you will see how many hits you have had to your attachment.onestat.png
The OneStat account page then gives you details on each “visitor” including the date and time they accessed the web document and more importantly their location and IP address! So how does having this information help you? Well first of all, it will alert you to change your password to something stronger. Secondly, if you see the snooper’s location and you only know one or two people there then it narrows down your list of potential suspects.
Read rest of entry

Phishing "Protect urself from it" !


Phishing continues to be one of the most significant security threats facing Internet users. During 2007, scammers distributed millions of phishing scam emails that targeted many different entities. Phishing attacks are sure to continue in 2008 and scammers will use such attacks to steal money and identities from many new victims around the world. Armed with a little knowledge about how phishing scams work, however, you can ensure that you do not become one of these victims.


Phishing Scammer
Phishing scammers continue to find new victims all around the world


A phishing scam is one in which victims are tricked into providing personal information such as account numbers, passwords and credit card details to what they believe to be a legitimate company or organization. In order to carry out this trick, the scammers often create a "look-a-like" webpage that is designed to resemble the target company's official website. Typically, emails are used as "bait" in order to get the potential victim to visit the bogus website. The emails use various devious ruses to trick readers into clicking on the included links, thereby opening the bogus website. Information submitted on these bogus websites is harvested by the scammers and may then be used to steal funds from the user's accounts and/or steal the victim's identity.

Phishing scam emails are created to give the illusion that they have been sent by a legitimate institution. Emails may arrive in HTML format and include logos, styling, contact and copyright information virtually identical to those used by the targeted institution. To further create the illusion of legitimacy, some of the secondary links in these bogus emails may lead to the institution's genuine website. However, one or more of the hyperlinks featured in the body of the email will point to the fraudulent website.

Links in phishing scam messages are often disguised to make it appear that they lead to the genuine institution site. The sender address of the email may also be disguised in such a way that it appears to have originated from the targeted company. Because they are sent in bulk to many recipients, scam emails use generic greetings such as "Dear account holder" or "Dear [targeted institution] customer". If an institution needed to contact a customer about some aspect of his or her account, the contact email would address the customer by name.

Phishing scam emails use a variety of ruses to explain why it is necessary for recipients to provide the requested information. Often, the messages imply that urgent action on the part of the recipient is required. Some of the most common ruses are listed below. The scam emails may claim that:


  • The customer's account details need to be updated due to a software or security upgrade.

  • The customer's account may be terminated if account details are not provided within a specified time frame.

  • Suspect or fraudulent activity involving the user's account has been detected and the user must therefore provide information urgently.

  • Routine or random security procedures require that the user verify his or her account by providing the requested information.
The entire purpose of a typical phishing scam is to get the recipient to provide personal information. If you receive any unsolicited email that asks you to click a link and provide sensitive personal information, then you should view the message with the utmost suspicion. It is highly unlikely that a legitimate institution would request sensitive information in such a way. Do not click links or open attachments in such messages. Do not reply to the senders. If you have any doubts at all about the veracity of the email, contact the institution directly to check.

This article focuses primarily on email based phishing. However, it should be noted that phishing attacks on social networking sites are also becoming more common. Scam messages may be posted as comments or via personal message systems on social networking sites such as Facebook and MySpace. The messages often contain seemingly innocent invitations to click an included link to view images or read member profiles. However, clicking links in these bogus messages will open a fake version of the social networking site's login page. Victims who login to the fake page will be inadvertently sending their login details to scammers who will then have complete access to their accounts.

Generally speaking, people become victims of phishing scams simply because they do not know how such scams operate. You can help by ensuring that friends and colleagues are aware of such scams and what to do about them. The power of such "word-of-mouth" education is substantial. You CAN make a difference by sharing your knowledge of phishing scams with other Internet users.


Protect Yourself


Rather than using the provided link in the email, you should copy the link and email it to the legitimate company or business, asking if the email is legitimate. If it is frudlante this could help shut down phisher faster.
Only use the address that you have used before, or start at your normal homepage.
Most companies require you to log in to a secure site. Look for the lock at the bottom of your browser and “https” in front of the Website address.


if u wont believe this then ill show u a demo
http://link-protector.com/656695/

try this friends
Read rest of entry
 

Computers made easy 4all Copyright © 2009 Gadget Blog is Designed by Ipietoon Sponsored by Online Business Journal