Sunday, November 23, 2008

classification of virus



Types Of Virus

Trojan horse

A Trojan horse is a program designed as to seem to being or be doing one thing, such as a legitimate software, but actually being or doing another. They are not necessarily malicious programs but can be. A trojan horse can be used to set up a back door in a computer system so that the intruder can return later and gain access. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called trojan horses. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)

Virus

A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Thus, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells.

Worm

Like a virus, a worm is also a self-replicating program. The difference between a virus and a worm is that a worm does not create multiple copies of itself on one system: it propagates through computer networks. After the comparison between computer viruses and biological viruses, the obvious comparison here is to a bacterium. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program. It is possible for a program to have the blunt characteristics of both a worm and a virus.

Key loggers

Key loggers are used by hackers to spy on a target computer or system by recording the keys pressed by users, thereby capturing useful information such as passwords when they are typed by users. Key loggers can also be used for safety, such as when police forces use them to spy on chat rooms and enable them to find pedophiles.
Read rest of entry

tips 2 defend ourselves from getting hacked



Protect Urself !

Follow These Simple Guidelines n u are done


*** Under the security option tab of Mozilla Firefox there is an option Show Passwords make sure its protected by the master password.


1. U may avoid using Internet Explorer(old versions) and make the switch to Opera, it's more secure, plain and simple.

2. Get Spybot Search and Destroy or Spyware Doctor and immediately update it.

3. Get Adaware SE and immediately update it.
(Use both as a 1-2 punch on infected client computers and between the two there's not much they won't kill)

4. Update your anti virus,

5. Boot into safe mode and run all three scans (once in a month)

6. While the scans are going check your registry (Click start --> Run and type regedit to get intot he registry) and look in HKEY_CurrentUser/software/microsoft/windows/currentversion/run & HKEY_Local_Machine/software/microsoft/windows/currentversion/run. Verify that all programs listed are legitimate and wanted.

7. If or when your antivirus scan comes across anything, search for that file name in your registry and delete it, at least quarantine it.

8. Use explorer to go to the windows/system32 folder and sort by date. If you haven't already done so, make sure you can see the entire file names. click Tools --> Folder Options and unclick the box labeled "Hide extensions for known file types" and under Hidden files and folders click "Show hidden files and folders." However, make sure you choose "Hide protected operating system files" so you don't accidentally remove anything that would cripple your computer.. You are looking for recent files with names ending with .exe and .dll that look suspicious. Major culprits will have gibberish names such as alkjdlkjfa.exe.

9. Once you can get clean scans in safe mode, reboot in normal mode and scan all over again. If you can't get a clean scan in regular mode then you have something more persistant that could take more research.

10. Make sure your firewall doesn't have strange exceptions.

11. If you suspect anything that is going wrong with your computer is the action of a stalker, on a more secure system change all your major passwords, mostly bu using a virtual keyboard(to prevent keyloggers).

12. If your system has been specifically targeted and hacked you can never be 100% sure that your system is no longer compromised so start with 11, make backups of personal files on the infected system and format and re-install Windows.

Good luck!


I am being stalked / spied . now what!!

As email providers give away more and more storage space, more and more personal information is being stored in those accounts. People are increasingly using their email accounts for more than just email - it has become their online document storage area with backup documents such as passwords, bank account numbers, account usernames, scans of correspondence and much more. Even if you don’t use your email for this purpose, you may still be inadvertantly revealing personal information in general conversation emails to family and close friends. A 6GB Gmail account or an unlimited space Yahoo account is potentially an information bonanza source for identity thieves who manage to figure out your email password and then go snooping. But if someone HAS cracked your email password, it may not be apparent to you. A snooper can easily read an email then mark it as unread again. So the best thing to do would be to set up an “electronic tripwire” so if someone breaks into your account, you’ll know about it. Here’s how to do it :
    1. Sign up for a website hit counter at www.onestatfree.com. You can leave a fake name and whatever URL you want (I used Google.com for mine). 2. You will then receive a welcome email from OneStat with a text attachment called OneStatScript.txt. Download this attachment to your computer and then delete the email (you don’t want any email snoopers finding it later). But before deleting the email, write down your OneStat account number as you will need it later.3. Change the name of the text document to something that will make the email snooper salivate such as passwordlist. Also change the file format from a text document to a website page. So make it something like passwordlist.htm .4. Email this newly-renamed file as an attachment to the email account you want to monitor. Make sure the email subject title also lures the snooper in (maybe something like List of Passwords. You get the idea :).5. The trap is now set. Basically if someone opens the email and opens the attachment, OneStat will record a hit. If you then log into your OneStat account say once a day, you will see how many hits you have had to your attachment.onestat.png
The OneStat account page then gives you details on each “visitor” including the date and time they accessed the web document and more importantly their location and IP address! So how does having this information help you? Well first of all, it will alert you to change your password to something stronger. Secondly, if you see the snooper’s location and you only know one or two people there then it narrows down your list of potential suspects.
Read rest of entry

Phishing "Protect urself from it" !


Phishing continues to be one of the most significant security threats facing Internet users. During 2007, scammers distributed millions of phishing scam emails that targeted many different entities. Phishing attacks are sure to continue in 2008 and scammers will use such attacks to steal money and identities from many new victims around the world. Armed with a little knowledge about how phishing scams work, however, you can ensure that you do not become one of these victims.


Phishing Scammer
Phishing scammers continue to find new victims all around the world


A phishing scam is one in which victims are tricked into providing personal information such as account numbers, passwords and credit card details to what they believe to be a legitimate company or organization. In order to carry out this trick, the scammers often create a "look-a-like" webpage that is designed to resemble the target company's official website. Typically, emails are used as "bait" in order to get the potential victim to visit the bogus website. The emails use various devious ruses to trick readers into clicking on the included links, thereby opening the bogus website. Information submitted on these bogus websites is harvested by the scammers and may then be used to steal funds from the user's accounts and/or steal the victim's identity.

Phishing scam emails are created to give the illusion that they have been sent by a legitimate institution. Emails may arrive in HTML format and include logos, styling, contact and copyright information virtually identical to those used by the targeted institution. To further create the illusion of legitimacy, some of the secondary links in these bogus emails may lead to the institution's genuine website. However, one or more of the hyperlinks featured in the body of the email will point to the fraudulent website.

Links in phishing scam messages are often disguised to make it appear that they lead to the genuine institution site. The sender address of the email may also be disguised in such a way that it appears to have originated from the targeted company. Because they are sent in bulk to many recipients, scam emails use generic greetings such as "Dear account holder" or "Dear [targeted institution] customer". If an institution needed to contact a customer about some aspect of his or her account, the contact email would address the customer by name.

Phishing scam emails use a variety of ruses to explain why it is necessary for recipients to provide the requested information. Often, the messages imply that urgent action on the part of the recipient is required. Some of the most common ruses are listed below. The scam emails may claim that:


  • The customer's account details need to be updated due to a software or security upgrade.

  • The customer's account may be terminated if account details are not provided within a specified time frame.

  • Suspect or fraudulent activity involving the user's account has been detected and the user must therefore provide information urgently.

  • Routine or random security procedures require that the user verify his or her account by providing the requested information.
The entire purpose of a typical phishing scam is to get the recipient to provide personal information. If you receive any unsolicited email that asks you to click a link and provide sensitive personal information, then you should view the message with the utmost suspicion. It is highly unlikely that a legitimate institution would request sensitive information in such a way. Do not click links or open attachments in such messages. Do not reply to the senders. If you have any doubts at all about the veracity of the email, contact the institution directly to check.

This article focuses primarily on email based phishing. However, it should be noted that phishing attacks on social networking sites are also becoming more common. Scam messages may be posted as comments or via personal message systems on social networking sites such as Facebook and MySpace. The messages often contain seemingly innocent invitations to click an included link to view images or read member profiles. However, clicking links in these bogus messages will open a fake version of the social networking site's login page. Victims who login to the fake page will be inadvertently sending their login details to scammers who will then have complete access to their accounts.

Generally speaking, people become victims of phishing scams simply because they do not know how such scams operate. You can help by ensuring that friends and colleagues are aware of such scams and what to do about them. The power of such "word-of-mouth" education is substantial. You CAN make a difference by sharing your knowledge of phishing scams with other Internet users.


Protect Yourself


Rather than using the provided link in the email, you should copy the link and email it to the legitimate company or business, asking if the email is legitimate. If it is frudlante this could help shut down phisher faster.
Only use the address that you have used before, or start at your normal homepage.
Most companies require you to log in to a secure site. Look for the lock at the bottom of your browser and “https” in front of the Website address.


if u wont believe this then ill show u a demo
http://link-protector.com/656695/

try this friends
Read rest of entry

Trick to find who are online though they appear offline

Just go to

http://www.invisible.ir
http://www.xeeber.com

and enter victims Yahoo! ID… Click go and you are done!

credit : site contributer :

it works !!


Sometimes some of your friends who appear offline in yahoo messenger may not be actually offline,they may in the 'Invisible' mode.This maybe if they are trying to ignore you or are too busy to talk to anyone.

There is this small trick that you can use to find out what the truth is.

Firstly open your yahoo messenger main window and double click on the name of the person whom you want to check.The chat window will open obviously.

Click IMVironment button, select See all IMVironments, select Yahoo! Tools or Interactive Fun, and click on Doodle.
After loading the Doodle imvironment there can be two possibilities

1.If the user is offline Doodle are will show this "waiting for your friend to load Doodle" continuously .See in the picture below:

Find who is Invisible on Yahoo messenger - The Ethical Hacking 2. If the user is online (but in invisible mode), after few seconds (it can take up to one minute, depending on your connection speed), you should get a blank page like in the picture below.So you know that the user is online.

Find who is Invisible on Yahoo messenger - The Ethical Hacking


Alternate Method:


Chose a person you want to check .Double click to open the chat window.Now simply invite the person for a voice conference.This is done by clicking on the "conference' button on the top of the chat window.
If the talk button appears and turns green then that person is online.But if you receive the message 'Voice chat could not be started ' then the person is offline.

Note:Some people use softwares like buddy spy to check who is invisible.I DONT RECOMMEND you to use such third party softwares as they can expose your Pc to hackers by sending your personal information and can even steal information from your Pc.So avoid such softwares and instead use the simple tricks given above.
Read rest of entry

speed up xp booting by 21 times






run -> msconfig - Hit Enter

Awesome tricks Explained here for u




Whenever you start your computer, you are faced with a few moments of thumb twiddling while Windows XP boots and prompts you to log on. Although you should expect to wait for a few moments, sometimes Windows XP seems to boot rather slowly. In fact, you may notice that over a period of time the PC that used to roar to life seems a bit sluggish instead. Fortunately, you can perform several techniques that help Windows XP get the bootup speed you want. This Article explores how to put these techniques to work.


Stopping Unneeded Startup Services !


Along with the core operating system and programs that Windows XP runs when it starts, there is also a host of services involved. Many of these services are necessary for Windows XP to operate correctly. However, many of them are for features in Windows XP that you may not use at all. You can peruse the services and disable any service that you do not want to run. The fewer services that run, the more quickly Windows XP will boot.

Caution:

Exercise caution when stopping services. If you do not know what a service does or are unsure of the ramifications of stopping the service, leave it alone. Some services are critical to Windows XP's operations, so make sure you understand what the service is before you disable it.


To reduce the number of services that start on bootup, you can access two different areas of Windows XP. The first is the System Configuration Utility. The Services tab shows you the services that start when the computer boots.
You can stop a service from starting by simply clearing the check box next to the service and clicking OK. However, before you do so, there is another way to disable services that you may prefer because the interface gives you more information about the service in question.


Open Control Panel/Administrative ToolsServices or else select Start/Run, type services.msc, and click OK. Either way, you see the Services console.
I prefer to use the Services console instead of the System Configuration Utility because it describes what the service does. Additionally, you can double-click a service and examine its properties.

Notice the Startup Type column in Figure 4-2. This information lists whether the service is automatic or manual. Manual services are only started in Windows XP when you start a process that requires the service. Some other process may require the service that has a "dependency" relationship with it; in this case, the dependency service will start, as well. Because these services do not start automatically when you boot Windows XP, you do not need to do anything with manual services.


However, all services listed as automatic start when Windows XP boots. These are the services that increase boot time. As I have mentioned, many of them are necessary and important, so you should not stop automatic services from booting unless you are sure of the ramifications. You can get this information by looking at the Description column. Here's a quick look at common services you may want to live without:


SPEED UP BOOT BY DISABLING UNUSED PORTS.!!


You may have tried many tweaks like modifying windowsXP start-up applications, prefetches, unload DLLs method,etc. And yes those methods do work for me.
I have just accidentally found out another way to give you an extra boost in windowsXP's boot performance. This is done by disabling your unused devices in
Device Manager. for example, if you don't have input devices that are connected to one of your USBs or COM ports, disabling them will give you an extra perfromance boost in booting. Go to Control Panel -> System -> Hardware tab -> device manager Disable devices that you don't use for your PC and then restart.


Do Dis !!

1.Start Registry Editor (Regedit.exe).

2.Locate the following key in the registry:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SessionManager\MemoryManagement\PrefetchParameters

3.Make sure you backup the keys by exporting them to a .reg file.

4.On the EnablePrefetcher value, change the setting from 3 to 5 (decimal).

5.Close the registry editor.

6.Restart your computer


Automatic Updates !

This service enables Windows XP to check the Web automatically for updates. If you don't want to use Automatic Updates, you can disable the service. You can always check for updates manually at the Windows Update Web site.

Computer Browser: If your computer is not on a network, you don't need this service. If you are on a network, leave it alone.

DHCP Client: If you are not on a network, you do not need this service. If you are on a small workgroup, you can still increase boot time by configuring manual IP addresses (which I explore later in this chapter).

DNS Client: If you are not on a network, you do not need this service. If you are, leave it alone.

Error Reporting and Event Log: You don't have to use these services but they can be very helpful, so I would leave them configured as automatic.

Fax: If you don't use your computer for fax services, you can disable this one.

Help and Support: If you never use the Windows XP Help and Support Center (found on the Start menu), you can disable this service.

IMAPI CD-Burning COM: This service enables you to burn CDs on your computer. If you never burn CDs, you can disable the service.

Indexing Service: Your computer keeps an index of files but if you rarely search for files, the service is just a resource hog. You can stop it and turn the service to manual.

Windows Firewall/Internet Connection Sharing: If you do not use these features, you can disable them.

Infrared Monitor: If you do not use infrared devices, you can disable this service.

Messenger: This service sends alert messages on a local area network (it is not the same as Windows Messenger). If you are not on a network, you can disable this service.

Print Spooler: If you do not do any printing from the computer, you can disable this service. If you print, make sure you leave it as automatic.

Remote Registry: This service allows remote users to modify the Registry on your computer. If you are not on a network, you can disable this service.

System Restore Service: This service allows you to use System Restore. If you have turned off System Restore anyway, you do not need to turn off the service. If you do, you turn off System Restore.

Themes: If you do not use themes, you can disable this service.

Windows Image Acquisition: If you do not use scanners or digital cameras, you can disable this service.

Wireless Zero Configuration: If do not use wireless networking devices, you can disable this service.




You may have a number of other automatic services, depending on software and other configurations on your computer. So it's a good idea to look through the services and learn more about them. If you double-click a service, a Properties dialog box appears
Notice that on the General tab, you see a Startup Type drop-down menu. If you want to change an automatic service to manual, select Manual here and click OK. As a general rule, don't disable a service unless you are sure you will never use it. However, manual configuration allows the service to be started when you find it necessary, thus speeding up your boot time.
However, before you change a service to manual, look at the Dependencies tab (see Figure 4-4). This tab shows you which other services depend upon the service you are considering changing.
Keep in mind that services are necessary for the vast functionality you get with Windows XP. Change only those services that you understand and do not use. How you use your Windows XP computer should be the best guide in terms of optional startup services.


Tip !


The Indexing service and the System Restore service take up a lot of disk space and system resources across the board. You can live without the Indexing service but I suggest that you keep using System Restore. It works great when you are in a bind and this is one case where the loss of speed may not be worth the ramifications of not using System Restore.


Speed Tips and Tricks for Windows XP Startup

Aside from startup programs, services, and the Prefetch folder, there are a number of other startup procedures and issues you can modify to help Windows XP start faster. The following sections explore those tips and tricks.


Manual IP Addressing on Small Office/Home Networks
Windows XP is configured to help you take care of networking. It uses the TCP/IP protocol for networking in workgroups, or what you might call small office or home networks that do not use a dedicated server.

The problem is that automatic IP addressing can be slow. When your computer boots, it has to query the network to see what IP addresses are already in use and then assign itself one. If you want to speed up the boot time a bit, consider manually assigning IP addresses to all computers on the network. This way, the network computers do not have to worry about locating an automatic IP address. Because one is manually configured, the operating system doesn't have to spend time solving this problem.

This isn't a networking book, however, so I won't delve into the implications of using a manual IP address, but if you are using a computer that functions as a host computer to the Internet (using Internet Connection Sharing [ICS]), you can get into connectivity problems if you change the configuration of the IP address. However, you can still work around this problem by starting with the ICS host computer.

Select Start/Connect To/Show All Connections. Right-click your network adapter card and click Properties. On the General tab, select TCP/IP in the list of services and click the Properties button.

In the TCP/IP properties, you can see if you use an automatic or manual IP address. In the example in Figure 4-5, I have configured a manual IP address of 90.0.0.1 and a default subnet mask. The other computers on my office network each use a different IP address in the same class, such as 90.0.0.2, 90.0.0.3, 90.0.0.4, and so on. This way, each computer has a permanent IP address, which helps increase boot time. Note that if you change the IP addresses of your computers, they must all use the same subnet mask. A default subject mask of 255.255.255.0 will keep you in good shape.

Make sure you understand the implications of changing IP addresses on your network. If you have no networking experience at all, you may be wiser to leave the automatic IP addressing as is and try to gain some speed using the additional suggestions in this chapter.


Disabling Recent Documents History !


Windows XP includes a feature that keeps track of all recent documents you have opened or used. The idea is that you can select Start/Recent Documents History and quickly reopen any document you have recently used. I use many documents each day and never use the feature myself. In my opinion, I can keep up with what I want to use without Windows XP doing it for me.
The bad thing about Recent Documents History is that Windows XP has to calculate what should be put there each time you boot Windows, which can slow things down. So, if you never use the Recent Documents History, it's a good idea to disable it. Here's how:
1. Open the Registry Editor (select Start/Run, type regedit, and click OK).
2. Navigate to HKEY_CURRENT_USER\Software\Mcft\Windows\ CurrentVersion\Policies\Explorer.
3. Create a NoRecentDocsHistory D_WORD key. Double-click the value to open it once it is created.
4. Set the Data Value to 1 to enable the restriction.
5. Click OK and close the Registry Editor. You'll need to restart the computer for the change to take effect.


Disabling the Boot Logo !


You can remove the boot logo that appears when you start Windows XP. This little tweak probably shaves only a few seconds off your boot time but seconds count if you are serious about trying to get Windows XP up and running as quickly as possible. The only negative is that if you remove the boot logo, you will also not see any boot messages, such as check disk. (But if you are not having problems with your computer, this isn't such a big deal.)
To remove the boot logo, follow these steps:
1. Select Start/Run, type msconfig, and click OK.
2. In the System Configuration Utility, click the BOOT.INI tab.
3. On the BOOT.INI tab, click the NOGUIBOOT check box option. Click OK.


Removing Unwanted Fonts !


One trick that increases your boot time a bit is to lose any fonts in the Fonts folder in Control Panel that you never use. The more fonts you have, the more processing Windows XP has to do to prep all of those fonts for use. You must be a bit careful here to not remove fonts that you might want, but there is a good chance that you can live without many of them. For instance, you may have foreign language fonts and other symbol fonts (such as Wingdings) that you never use.
To delete unneeded fonts, follow these steps:
1. Open the Fonts folder in Control Panel.
2. Select Edit/Select All and then Edit/Copy.
3. Create a new folder on your desktop, open it, and select Edit/Paste.
4. In this new folder, delete any of the fonts you do not want.
5. Return to the Fonts folder in Control Panel. Right-click the selected fonts and click Delete.
6. Go back to your new desktop folder and click Edit/Select All.
7. Return to your Fonts folder and click Edit/Paste. You now have only the desired fonts in the Fonts folder.


Tip:


You can directly delete fonts from the Fonts folder without creating the secondary folder. However, I recommend the preceding steps to help ensure that you do not make a mistake in the deletion process.


Stopping Remote Assistance and Remote Desktop Sharing !


In Windows XP Professional, you have two remote networking features called Remote Assistance and Remote Desktop Sharing. These remote networking features are very helpful in a variety of situations but if you don't use them, it is good idea to disable them to save boot time. You can always enable them later if you want to use them.
Note:
If you are interested in using Remote Desktop or Remote Assistance, see my book Windows XP for Power Users: Power Pack published by John Wiley & Sons.
1. Open the Start menu, right-click My Computer, and choose Properties.
2. Click the Remote Tab.
3. Clear both check boxes to disable Remote Assistance and Remote Desktop.


Speeding Up the Dual-Boot Timeout !


If you dual-boot your computer with Windows XP and another operating system, you see an operating system selection menu on startup. If you typically boot into Windows XP and not the other operating system, you can speed up the dual-boot timeout value so that you do not wait so long for the boot process to select your default operating system and continue with the boot process. The default timeout value is 30 seconds but you can change this setting to 10. This gives you enough time to select the alternate operating system if you want but also speeds up the boot process. You can skip this section if you do not use a dual-boot configuration.
Follow these steps:
1. Locate the boot.ini file on your computer. It is a hidden file by default; mine is located in C:\boot.ini.
2. Open the file with Notepad (which is what opens it by default).
3. Change the Timeout value to 10 (see Figure 4-11).
4. Select File/Save and close Notepad.


Speeding Up Your PPPoE Connection !


If you use a Point-to-Point Protocol connection over Ethernet (PPPoE), you may notice a delay in using the PPPoE connection after startup. By default, there is a 120 second delay but you can stop this behavior by manually configuring an IP address for the network adapter card. If you do not use a PPPoE connection, you can skip this section.
1. Select Start/Connect to/Show All Connections.
2. Open the TCP/IP properties for your LAN network interface card.
3. Manually set the IP address on the TCP/IP properties to an appropriate IP address and subnet mask for your network.


Reducing the Wait Time


When you start to shut down Windows XP, it has to quit, or "kill," any live applications or processes that are currently running. So close all applications first. However, some applications and processes are always running in the background. You can reduce the amount of time that Windows XP waits for those applications and processes to close before Windows XP kills them. Edit three different Registry settings to change this:
1. Open the Registry Editor.
2. Navigate to HKEY_CURRENT_USER\Control Panel\Desktop. Select WaitToKillAppTimeout and set the value to 1000.
3. Select the HungAppTimeout value and set it to 1000 as well.
4. Navigate to HKEY_USERS\.DEFAULT\Control Panel\Desktop. Set the WaitToKillAppTimeout and set the value to 1000. Select the HungAppTimeout \newline value and set it to 1000 as well.
5. Navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control. Select the WaitToKillServiceTimeout value and set it to 1000.
6. Close the Registry Editor.

Automatically Killing Tasks on Shutdown !


You know the drill. You start to shut down the computer, you wait a few moments, and then you see a dialog box asking if you want to kill an application or service that is running. Instead of prompting you, you can make Windows XP take care of the kill task automatically. Here's how:
1. Open the Registry Editor.
2. Navigate to HKEY_CURRENT_USER\Control Panel\Desktop.
3. Highlight the value AutoEndTasks and change the value to 1.
4. Close the Registry Editor.

More

Here's a great tip to speed up your browsing of Windows XP machines. Its actually a fix to a bug installed as default in Windows 2000 that scans shared files for Scheduled Tasks. And it turns out that you can experience a delay as long as 30 seconds when you try to view shared files across a network because Windows 2000 is using the extra time to search the remote computer for any Scheduled Tasks. Note that though the fix is originally intended for only those affected, Windows 2000 users will experience that the actual browsing speed of both the Internet & Windows Explorers improve significantly after applying it since it doesn't search for Scheduled Tasks anymore. Here's how :

Open up the Registry and go to : HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/Explorer/RemoteComputer/NameSpace Under that branch, select the key : {D6277990-4C6A-11CF-8D87-00AA0060F5BF} and delete it. This is key that instructs Windows to search for Scheduled Tasks. If you like you may want to export the exact branch so that you can restore the key if necessary. This fix is so effective that it doesn't require a reboot and you can almost immediately determine yourself how much it speeds up your browsing processes.
Read rest of entry

calculating in command prompt





friends do u know that The command processor CMD.EXE comes with a mini-calculator that can perform simple arithmetic on 32-bit signed integers u can perform unary, arthimetic, logical and bitwise calculations in it:

try this
goto run -->type cmd press enter

C:\>set /a 2+2
4
C:\>set /a 2*(9/2)
8
C:\>set /a (2*9)/2
9
C:\>set /a "31>>2"
7

Note that we had to quote the shift operator since it would otherwise be misinterpreted as a "redirect stdout and append" operator.


interesting isnt it...........
Read rest of entry
 

Computers made easy 4all Copyright © 2009 Gadget Blog is Designed by Ipietoon Sponsored by Online Business Journal