just follow the simple steps Below:
1)Right click on the Google Talk shortcut.
2)click on Properties.
3)Go to Shortcut tab on Google Talk Properties window.
4)On the Target textbox, add in the /nomutex to the end of the line so that it looks like below (or you can simply copy and paste the below syntax and replace the original).
“c:\program files\google\google talk\googletalk.exe” /nomutex
5)Click on OK.
I didn't have to do anything after this nd clicking on the shortcut multiple times just gave me different google talk window.
Tuesday, July 29, 2008
Multiple logins of gmail & orkut through firefox
Just follow the following steps and you will be able to login in gmail and orkut with multiple accounts. Through this you will be able to make profiles in your firefox.
Step 1:
Open system properties(by right clicking my computer), choose tab advanced, click to environment variables button. in system variables section, click new. type this information to each textbox.
Step 2:
variable name: moz_no_remote (should be all small letter).
variable value: 1
Step 3:
open firefox icon's properties(from desktop and quick launch). add extension -p to command line(like "c:\program files\mozilla firefox\firefox.exe" -p). press ok.
When you will open firefox it will prompt for profile selection create a profile,open firefox login to orkut open once more use another profile login.
Step 1:
Open system properties(by right clicking my computer), choose tab advanced, click to environment variables button. in system variables section, click new. type this information to each textbox.
Step 2:
variable name: moz_no_remote (should be all small letter).
variable value: 1
Step 3:
open firefox icon's properties(from desktop and quick launch). add extension -p to command line(like "c:\program files\mozilla firefox\firefox.exe" -p). press ok.
When you will open firefox it will prompt for profile selection create a profile,open firefox login to orkut open once more use another profile login.
Netbios Guide
In this guide you will learn how to explore the Internet using Windows XP and NetBIOS:
How to Install NetBIOS
How to Use Nbtstat
The Net View Command
What to Do Once You Are Connected
How to Break in Using the XP GUI
More on the Net Commands
How Crackers Break in as Administrator
How to Scan for Computers that Use NetBIOS
How to Play NetBIOS Wargames
An Evil Genius Tip for Win NT Server Users
Help for Windows 95, 98, SE and ME Users
Not many computers are reachable over the Internet using NetBIOS commands - maybe only a few million. But what the heck, a few million is enough to keep a hacker from getting bored. And if you know what to look for, you will discover that there are a lot of very busy hackers and Internet worms searching for computers they can break into by using NetBIOS commands. By learning the dangers of NetBIOS, you can get an appreciation for why it is a really, truly BAD!!! idea to use it.
*****************
Newbie note: a worm is a program that reproduces itself. For example, Code Red automatically searched over the Internet for vulnerable Windows computers and broke into them. So if you see an attempt to break into your computer, it may be either a human or a worm.
*****************
If you run an intrusion detection system (IDS) on your computer, you are certain to get a lot of alerts of NetBIOS attacks. Here's an example:
The firewall has blocked Internet access to your computer (NetBIOS Session) from 10.0.0.2 (TCP Port 1032) [TCP Flags: S].
Occurred: 2 times between 10/29/2002 7:38:20 AM and 10/29/2002 7:46:18 AM
A Windows NT server on my home network, which has addresses that all start with 10.0.0, caused these alerts. In this case the server was just doing its innocent thing, looking for other Windows computers on my LAN (local area network) that might need to network with it. Every now and then, however, an attacker might pretend to have an address from your internal network even though it is attacking from outside.
If a computer from out on the Internet tries to open a NetBIOS session with one of mine, I'll be mighty suspicious. Here's one example of what an outside attack may look like:
The firewall has blocked Internet access to your computer (NetBIOS Name) from 999.209.116.123 (UDP Port 1028).
Time: 10/30/2002 11:10:02 AM
(The attacker's IP address has been altered to protect the innocent or the guilty, as the case may be.)
Want to see how intensely crackers and worms are scanning the Internet for potential NetBIOS targets? A really great and free IDS for Windows that is also a firewall is Zone Alarm. You can download it for free from http://www.zonelabs.com . You can set it to pop up a warning on your screen whenever someone or some worm attacks your computer. You will almost certainly get a NetBIOS attack the first day you use your IDS.
Do you need to worry when a NetBIOS attack hits? Only if you have enabled NetBIOS and Shares on your computer. Unfortunately, in order to explore other computers using NetBIOS, you increase the danger to your own computer from attack by NetBIOS. But, hey, to paraphrase a famous carpenter from Galilee, he who lives by the NetBIOS gets hacked by the NetBIOS.
********************
Newbie note: NetBEUI (NetBIOS Extended User Interface) is an out-of-date, crummy, not terribly secure way for Windows computers to communicate with each other in a peer-to-peer mode. NetBIOS stands for network basic input/output system.
Newbie note: Shares are when you make it so other computers can access files and directories on your computer. If you set up your computer to use NetBIOS, in Win XP using the NTFS (new technology file system) you can share files and directories by bringing up My Computer. Click on a directory - which in XP is called a "folder". In the left-hand column a task will appear called "Share this folder". By clicking this you can set who can access this folder, how many people at a time can access it, and what they can do with the folder.
********************
There are a number of network exploration commands that only NetBIOS uses. We will show how to use nbtstat and several versions of the net command.
How to Install NetBIOS
You might have to make changes on your system in order to use these commands. Here's how to enable NetBIOS for Windows XP. (If you are stuck with Windows 95, 98, SE or ME, see the end of this Guide for how to enable NetBIOS.) Click:
Control Panel -> Network Connections
There are two types of network connections that may appear here: "Dial-up" and "LAN or High-Speed Internet".
**************
Newbie note: A dial-up connection uses a modem to reach the Internet. LAN stands for local area network. It's what you have if two or more computers are linked to each other with a cable instead of modems. Most schools and businesses have LANs, as well as homes with Internet connection sharing. A DSL or cable modem connection will also typically show up as a LAN connection.
**************
To configure your connections for hacking, double click on the connection you plan to use. That brings up a box that has a button labeled "Properties". Clicking it brings up a box that says "This connection uses the following items:"
You need to have both TCP/IP and NWLink NetBIOS showing. If NWLink NetBIOS is missing, here's how to add it. Click Install -> Protocol -> Add NWlink/IPX/SPX/NetBIOS Compatible Transport Protocol.
**************
Newbie note: NWLink refers to Novell's Netware protocol for running a LAN.
**************
How to Use Nbtstat
To get started, bring up the cmd.exe command. Click Start -> Run and type cmd.exe in the command line box. This brings up a black screen with white letters. Once it is up, we will play with the nbtstat command. To get help for this command, just type:
C:\>nbtstat help
One way to use the nbtstat command is to try to get information from another computer using either its domain name (for example test.target.com), its numerical Internet address (for example, happyhacker.org's numerical address is 206.61.52.30), or its NetBIOS name (if you are on the same LAN).
C:\>nbtstat -a 10.0.0.2
Local Area Connection:
Node IpAddress: [10.0.0.1] Scope Id: []
NetBIOS Remote Machine Name Table
Name Type Status
---------------------------------------------
OLDGUY <00> UNIQUE Registered
OLDGUY <20> UNIQUE Registered
WARGAME <00> GROUP Registered
INet~Services <1c> GROUP Registered
IS~OLDGUY......<00> UNIQUE Registered
OLDGUY <03> UNIQUE Registered
WARGAME <1e> GROUP Registered
ADMINISTRATOR <03> UNIQUE Registered
MAC Address = 52-54-00-E4-6F-40
What do these things tell us about this computer? Following is a table explaining the codes you may see with an nbtstat command (taken from the MH Desk Reference, written by the Rhino9 team).
Name Number Type Usage =========================================================
00 U Workstation Service
01 U Messenger Service
<\\_MSBROWSE_> 01 G Master Browser
03 U Messenger Service
06 U RAS Server Service
1F U NetDDE Service
20 U File Server Service
21 U RAS Client Service
22 U Exchange Interchange
23 U Exchange Store
24 U Exchange Directory
30 U Modem Sharing Server Service
31 U Modem Sharing Client Service
43 U SMS Client Remote Control
44 U SMS Admin Remote Control Tool
45 U SMS Client Remote Chat
46 U SMS Client Remote Transfer
4C U DEC Pathworks TCPIP Service
52 U DEC Pathworks TCPIP Service
87 U Exchange MTA
6A U Exchange IMC
BE U Network Monitor Agent
BF U Network Monitor Apps
03 U Messenger Service
00 G Domain Name
1B U Domain Master Browser
1C G Domain Controllers
1D U Master Browser
1E G Browser Service Elections
1C G Internet Information Server
00 U Internet Information Server
To keep this Guide from being ridiculously long, we'll just explain a few of the things what we learned when we ran nbtstat -a against 10.0.0.2:
* it uses NetBIOS
* its NetBIOS name is Oldguy
* one of the users is named Administrator
* it runs a web site with Internet Information Server, and maybe an ftp - file transfer protocol -- server
* it is a member of the domain Wargame
* it is connected on a local area network and we accessed it through an Ethernet network interface card (NIC) with a MAC Address of 52-54-00-E4-6F-40.
When using nbtstat over the Internet, in most cases it will not find the correct MAC address. However, sometimes you get lucky. That is part of the thrill of legal hacker exploration. OK, OK, maybe getting a thrill out of a MAC address means I'm some kind of a freak. But if you are reading this, you probably are freaky enough to be a hacker, too.
**************
Newbie note: MAC stands for media access control. In theory every NIC ever made has a unique MAC address, one that no other NIC has. In practice, however, some manufacturers make NICs that allow you to change the MAC address.
**************
**************
Evil Genius tip: sneak your computer onto a LAN and use it to find the MAC address of a very interesting computer. Crash it, then give yours the same MAC, NetBIOS name and Internet address as the very interesting computer. Then see what you can do while faking being that computer. That's why I get a charge out of discovering a MAC address, so stop laughing at me already.
**************
**************
You can get fired, expelled, busted and catch cooties warning: Faking all that stuff is something you would be better off doing only on your own test network, or with written permission from the owner of the very interesting computer.
**************
Now that we know some basic things about computer 10.0.0.2, also known as Oldguy, we can do some simple things to learn more. We can connect to it with a web browser to see what's on the web site, and with ftp to see if it allows anonymous users to download or upload files. In the case of Oldguy, anyone can browse the web site. However, when we try to connect to its ftp server with Netscape by giving the location ftp://10.0.0.2, it returns the message "User Mozilla@ cannot log in.
**************
Newbie note: The people who programmed Netscape have always called it Mozilla, after a famous old movie monster. As a joke they have stuck obscure mentions of Mozilla into the operations of Netscape. Mozilla lovers recently spun off a pure Mozilla browser project that has the web site http://www.mozilla.org.
**************
The Net View Command
Now let's have some serious fun. Netscape (or any browser or ftp program) uses TCP/IP to connect. What happens if we use NetBIOS instead to try to download files from Oldguy's ftp server?
Let's try some more NetBIOS commands:
C:\>net view \\10.0.0.2
System error 53 has occurred.
The network path was not found.
I got this message because my firewall blocked access to Oldguy, giving the message:
The firewall has blocked Internet access to 10.0.0.2 (TCP Port 445) from your computer [TCP Flags: S].
There's a good reason for this. My firewall/IDS is trying to keep me from carelessly making my computer a part of some stranger's LAN. Keep in mind that NetBIOS is a two-way street. However, I want to run this command, so I shut down Zone Alarm and give the command again:
C:\>net view \\10.0.0.2
Shared resources at \\10.0.0.2
Share name Type Used as Comment
--------------------------------------------------------
ftproot Disk
InetPub Disk
wwwroot Disk
The command completed successfully.
This is a list of shared directories. Oooh, look at that, the ftp server is shared. Does this mean I can get in? When setting shares on a Windows NT server, the default choice is to allow access to read, write and delete files to everyone. So sometimes a sysadmin carelessly fails to restrict access to a share.
What is really important is that we didn't need a user name or password to get this potentially compromising information.
Let's establish an anonymous connection to Oldguy, meaning we connect without giving it a user name or password:
C:\>net use \\10.0.0.2\ipc$
Local name
Remote name \\10.0.0.2\IPC$
Resource type IPC
Status OK
# Opens 0
# Connections 1
The command completed successfully.
We are connected!
**********************
Newbie note: IPC (ipc$) stands for "Inter Process Connector", used to set up connections across a network between Windows computers using NetBIOS.
**********************
What to Do Once you Are Connected
So far we haven't quite been breaking the law, although we have been getting pretty rude if the owner of that target computer hasn't given us permission to explore. What if we want to stop pushing our luck and decide to disconnect? Just give the message:
C:\>net session \\10.0.0.2 /delete
Of course you would substitute the name or number of the computer to which you are connected for 10.0.0.2.
What if you want to stay connected? Oldguy will let you stay connected even if you do nothing more. By contrast, a login to a Unix/Linux type computer will normally time out and disconnect you if you go too long without doing anything.
How to Break in Using the XP GUI
You could try out the other net commands on Oldguy. Or you can go to the graphical user interface (GUI) of XP. After running the above commands I click My Computer, then My Network Places and there you'll find the victim, er, I mean, target computer. By clicking on it, I discover that ftproot has been shared to - everyone!
Let's say you were to get this far investigating some random computer you found on the Internet. Let's say you had already determined that the ftp server isn't open to the public. At this moment you would have a little angel sitting one shoulder whispering "You can be a hero. Email the owner of that computer to tell him or her about that misconfigured ftproot."
On the other shoulder a little devil is sneering, "Show the luser no mercy. Information should be free. Because I said so, that's why. Hot darn, are those spreadsheets from the accounting department? You could make a lot of bucks selling those files to a competitor, muhahaha! Besides, you're so ugly that future cellmate Spike won't make you be his girlfriend."
Some hackers might think that because ftproot is shared to the world that it is OK to download stuff from it. However, if someone were to log in properly to that ftp server, he or she would get the message "Welcome to Oldguy on Carolyn Meinel's LAN. Use is restricted to only those for whom Meinel has assigned a user name and password." This warning logon banner is all a computer owner needs to legally establish that no one is allowed to just break in. It won't impress a judge if a cracker says "The owner was so lame that her computer deserved to get broken into" or "I'm so lame that I forgot to try to use the ftp server the normal way."
More on the Net Commands
Let's get back to the net commands. There are many forms of this command. In XP you can learn about them with the command:
C:\>net help
The syntax of this command is:
NET HELP
command
-or-
NET command /HELP
Commands available are:
NET ACCOUNTS
NET HELP
NET SHARE
NET COMPUTER
NET HELPMSG
NET START
NET CONFIG
NET LOCALGROUP
NET STATISTICS
NET CONFIG SERVER
NET NAME
NET STOP
NET CONFIG WORKSTATION
NET PAUSE
NET TIME
NET CONTINUE
NET PRINT
NET USE
NET FILE
NET SEND
NET USER
NET GROUP
NET SESSION
NET VIEW
NET HELP SERVICES lists some of the services you can start.
NET HELP SYNTAX explains how to read NET HELP syntax lines.
NET HELP command | MORE displays Help one screen at a time.
How Crackers Break in as Administrator
As we look around Oldguy further, we see that there's not much else an anonymous user can do to it. We know that there is a user named Administrator. What can we do if we can convince Oldguy that we are Administrator?
******************
Newbie note: in Windows NT, 2000 and XP, the Administrator user has total power over its computer, just as root has total power over a Unix/Linux type computer. However, it is possible to change the name of Administrator so an attacker has to guess which user has all the power.
******************
Let's try to log in as Administrator by guessing the password. Give the command:
C:\>net use \\10.0.0.2\ipc$ * /user:Administrator
Type the password for \\10.0.0.2\ipc$:
System error 1219 has occurred.
Multiple connections to a server or shared resource by the same user, using more than one user name, are not allowed. Disconnect all previous connections to the server or shared resource and try again.
This means that someone else is currently logged onto this server who has Administrator rights. Furthermore, this person is probably watching me on an IDS and thinking up terrible things to do to me. Eeep! Actually this is all going on inside my hacker lab - but you get the idea of what it could be like when trying to invade a computer without permission.
I discover that whether I guess the password correctly or not, I always get the same error message. This is a good safety feature. On the other hand, one of the users is named Administrator. This is a bad thing for the defender. When you first set up a Windows NT or 2000 server, there is always a user called Administrator, and he or she has total power over that computer. If you know the all-powerful user is named Administrator, you can try guessing the password whenever no one is logged on with Administrator powers.
Computer criminals don't waste time guessing by hand. They use a program such as NAT or Legion to get passwords. These programs are why smart NT administrators rename their Administrator accounts and choose hard passwords. Also, this kind of persistent attack will be detected by an intrusion detection system, making it easy to catch criminals at work.
********************
You can get expelled warning: What if you are a student and you want to save your school from malicious code kiddies who steal tests and change grades? It is important to get permission *in writing* before you test the school's network. Even then, you still must be careful to be a model student. If you act up, cut classes - you know what I mean - the first time a cracker messes up the network, who do you think they will suspect? Yes, it's unfair, and yes, that is the way the world works.
********************
How to Scan for Computers that Use NetBIOS
Your tool of choice is a port scanner. Any computer that is running something on port 139 is likely (but not certain) to be using NetBIOS. Most crackers use nmap to port scan. This tool runs on Unix/Linux type computers. You can get it at . There is also a Windows version of nmap, but it isn't very good. A better choice for Windows is Whats Up from . You can get a one month free trial of it.
Here's an example of an nmap scan of Oldguy:
test-box:/home/cmeinel # nmap -sTU 10.0.0.2
Starting nmap V. 3.00 ( www.insecure.org/nmap/ )
Interesting ports on (10.0.0.2):
(The 3060 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
70/tcp open gopher
80/tcp open http
135/tcp open loc-srv
135/udp open loc-srv
137/udp open netbios-ns
138/udp open netbios-dgm
139/tcp open netbios-ssn
500/udp open isakmp
Nmap run completed -- 1 IP address (1 host up) scanned in 8 seconds
As you can see from this scan, three ports are identified with NetBIOS. This tells us that we could set nmap to scan a large number of Internet addresses, only looking for port 139 on each. To learn how to set up nmap to run this way, in your Unix or Linux shell give the command "man nmap".
For more on what crackers do once they break into a computer using NetBIOS (like installing back doors), see http://happyhacker.org/gtmhh/vol3no10.shtml .
********************
You can get punched in the nose warning: if you use a port scanner against networks that haven't given you permission to scan, you will be waving a red flag that says "Whaddaya wanna bet I'm a computer criminal?" You can't get arrested for merely port scanning, but people who don't like being scanned might get you kicked off your Internet service provider.
You can get really, big time, punched in the nose warning: If you visit the same computer or LAN really often to see what's new and to try different things, even if you don't break the law you'd better be doing it with the permission of the owner. Otherwise you may make enemies who might crash or destroy your operating system. And that is only what they may do when feeling mellow. After a night of hard drinking - well, you don't want to find out.
********************
How to Play NetBIOS Wargames
What if you want to challenge your friends to a hacker wargame using NetBIOS? The first thing to do is *don't* email me asking me to break in for you. Sheesh. Seriously, almost every day I get emails from people claiming to have permission from their girlfriend/boyfriend and begging me to help them break in. You can read their hilarious pleas for help at http://happyhacker.org/sucks/ <../sucks/index.shtml> .
The way to run a hacker wargame over the Internet is first, get permission from your Internet provider so they don't kick you off for hacking. They probably run an IDS that scans users for suspicious activity. They probably hate malicious hackers. Enough said.
Second, you and your friends are likely to be at a different Internet address every time you log on. Your safest way to play over the Internet is for each player to get an Internet address that is the same every time he or she logs on: a "static" address. This way you won't accidentally break into someone else's computer.
You have to arrange with your Internet provider to get a static address. Normally only a local provider can do this for you. A big advantage of using a local provider is you can make friends with the people who work there - and they are probably hackers.
If you live in an apartment building or dormitory with other hackers, you can play break-in games without using the Internet. Set up a LAN where you can play together. For example, you can string Ethernet cable from window to window. To learn how to set up a Windows Ethernet LAN, see http://happyhacker.org/gtmhh/winlan.shtml .
Or you could set up a wireless LAN. With wireless you never know who might come cruising with a laptop down the street by your home or business and break in. That can make a wargame lots more fun. For help on how to break into wireless LANs (it's pathetically easy), see .
**************
Evil genius tip: Attack using a Win NT server with the Microsoft Resource Kit installed. Heh, heh. With it you can give the command:
C:\>Local Administrators \\
This should show all user accounts with administrator rights on targetbox.com.
C:\>Global Administrators \\
This should show all user accounts with Domain administrative rights. These are exceptionally worth compromising, because with one Domain administrative password you will be able to control many resources among NT servers, workstations, and Win 95/98 computers.
I've tried to install the Resource Kit on XP Professional, but it wasn't compatible.
Another option is to install hacker tools such as Red Button and DumpACL, which extract information on user names, hashes, and which services are running on a given machine.
**************
Help for users of Windows 95, 98, SE or ME
To enable NetBIOS, click
Control Panel -> Network -> Protocols
If you see both NetBEUI and TCP/IP, you are already using NetBIOS. If not, add NetBEUI.
To bring up the command screen, click Start -> Run and type in command.com.
How to Install NetBIOS
How to Use Nbtstat
The Net View Command
What to Do Once You Are Connected
How to Break in Using the XP GUI
More on the Net Commands
How Crackers Break in as Administrator
How to Scan for Computers that Use NetBIOS
How to Play NetBIOS Wargames
An Evil Genius Tip for Win NT Server Users
Help for Windows 95, 98, SE and ME Users
Not many computers are reachable over the Internet using NetBIOS commands - maybe only a few million. But what the heck, a few million is enough to keep a hacker from getting bored. And if you know what to look for, you will discover that there are a lot of very busy hackers and Internet worms searching for computers they can break into by using NetBIOS commands. By learning the dangers of NetBIOS, you can get an appreciation for why it is a really, truly BAD!!! idea to use it.
*****************
Newbie note: a worm is a program that reproduces itself. For example, Code Red automatically searched over the Internet for vulnerable Windows computers and broke into them. So if you see an attempt to break into your computer, it may be either a human or a worm.
*****************
If you run an intrusion detection system (IDS) on your computer, you are certain to get a lot of alerts of NetBIOS attacks. Here's an example:
The firewall has blocked Internet access to your computer (NetBIOS Session) from 10.0.0.2 (TCP Port 1032) [TCP Flags: S].
Occurred: 2 times between 10/29/2002 7:38:20 AM and 10/29/2002 7:46:18 AM
A Windows NT server on my home network, which has addresses that all start with 10.0.0, caused these alerts. In this case the server was just doing its innocent thing, looking for other Windows computers on my LAN (local area network) that might need to network with it. Every now and then, however, an attacker might pretend to have an address from your internal network even though it is attacking from outside.
If a computer from out on the Internet tries to open a NetBIOS session with one of mine, I'll be mighty suspicious. Here's one example of what an outside attack may look like:
The firewall has blocked Internet access to your computer (NetBIOS Name) from 999.209.116.123 (UDP Port 1028).
Time: 10/30/2002 11:10:02 AM
(The attacker's IP address has been altered to protect the innocent or the guilty, as the case may be.)
Want to see how intensely crackers and worms are scanning the Internet for potential NetBIOS targets? A really great and free IDS for Windows that is also a firewall is Zone Alarm. You can download it for free from http://www.zonelabs.com . You can set it to pop up a warning on your screen whenever someone or some worm attacks your computer. You will almost certainly get a NetBIOS attack the first day you use your IDS.
Do you need to worry when a NetBIOS attack hits? Only if you have enabled NetBIOS and Shares on your computer. Unfortunately, in order to explore other computers using NetBIOS, you increase the danger to your own computer from attack by NetBIOS. But, hey, to paraphrase a famous carpenter from Galilee, he who lives by the NetBIOS gets hacked by the NetBIOS.
********************
Newbie note: NetBEUI (NetBIOS Extended User Interface) is an out-of-date, crummy, not terribly secure way for Windows computers to communicate with each other in a peer-to-peer mode. NetBIOS stands for network basic input/output system.
Newbie note: Shares are when you make it so other computers can access files and directories on your computer. If you set up your computer to use NetBIOS, in Win XP using the NTFS (new technology file system) you can share files and directories by bringing up My Computer. Click on a directory - which in XP is called a "folder". In the left-hand column a task will appear called "Share this folder". By clicking this you can set who can access this folder, how many people at a time can access it, and what they can do with the folder.
********************
There are a number of network exploration commands that only NetBIOS uses. We will show how to use nbtstat and several versions of the net command.
How to Install NetBIOS
You might have to make changes on your system in order to use these commands. Here's how to enable NetBIOS for Windows XP. (If you are stuck with Windows 95, 98, SE or ME, see the end of this Guide for how to enable NetBIOS.) Click:
Control Panel -> Network Connections
There are two types of network connections that may appear here: "Dial-up" and "LAN or High-Speed Internet".
**************
Newbie note: A dial-up connection uses a modem to reach the Internet. LAN stands for local area network. It's what you have if two or more computers are linked to each other with a cable instead of modems. Most schools and businesses have LANs, as well as homes with Internet connection sharing. A DSL or cable modem connection will also typically show up as a LAN connection.
**************
To configure your connections for hacking, double click on the connection you plan to use. That brings up a box that has a button labeled "Properties". Clicking it brings up a box that says "This connection uses the following items:"
You need to have both TCP/IP and NWLink NetBIOS showing. If NWLink NetBIOS is missing, here's how to add it. Click Install -> Protocol -> Add NWlink/IPX/SPX/NetBIOS Compatible Transport Protocol.
**************
Newbie note: NWLink refers to Novell's Netware protocol for running a LAN.
**************
How to Use Nbtstat
To get started, bring up the cmd.exe command. Click Start -> Run and type cmd.exe in the command line box. This brings up a black screen with white letters. Once it is up, we will play with the nbtstat command. To get help for this command, just type:
C:\>nbtstat help
One way to use the nbtstat command is to try to get information from another computer using either its domain name (for example test.target.com), its numerical Internet address (for example, happyhacker.org's numerical address is 206.61.52.30), or its NetBIOS name (if you are on the same LAN).
C:\>nbtstat -a 10.0.0.2
Local Area Connection:
Node IpAddress: [10.0.0.1] Scope Id: []
NetBIOS Remote Machine Name Table
Name Type Status
---------------------------------------------
OLDGUY <00> UNIQUE Registered
OLDGUY <20> UNIQUE Registered
WARGAME <00> GROUP Registered
INet~Services <1c> GROUP Registered
IS~OLDGUY......<00> UNIQUE Registered
OLDGUY <03> UNIQUE Registered
WARGAME <1e> GROUP Registered
ADMINISTRATOR <03> UNIQUE Registered
MAC Address = 52-54-00-E4-6F-40
What do these things tell us about this computer? Following is a table explaining the codes you may see with an nbtstat command (taken from the MH Desk Reference, written by the Rhino9 team).
Name Number Type Usage =========================================================
00 U Workstation Service
01 U Messenger Service
<\\_MSBROWSE_> 01 G Master Browser
03 U Messenger Service
06 U RAS Server Service
1F U NetDDE Service
20 U File Server Service
21 U RAS Client Service
22 U Exchange Interchange
23 U Exchange Store
24 U Exchange Directory
30 U Modem Sharing Server Service
31 U Modem Sharing Client Service
43 U SMS Client Remote Control
44 U SMS Admin Remote Control Tool
45 U SMS Client Remote Chat
46 U SMS Client Remote Transfer
4C U DEC Pathworks TCPIP Service
52 U DEC Pathworks TCPIP Service
87 U Exchange MTA
6A U Exchange IMC
BE U Network Monitor Agent
BF U Network Monitor Apps
03 U Messenger Service
00 G Domain Name
1B U Domain Master Browser
1C G Domain Controllers
1D U Master Browser
1E G Browser Service Elections
1C G Internet Information Server
00 U Internet Information Server
To keep this Guide from being ridiculously long, we'll just explain a few of the things what we learned when we ran nbtstat -a against 10.0.0.2:
* it uses NetBIOS
* its NetBIOS name is Oldguy
* one of the users is named Administrator
* it runs a web site with Internet Information Server, and maybe an ftp - file transfer protocol -- server
* it is a member of the domain Wargame
* it is connected on a local area network and we accessed it through an Ethernet network interface card (NIC) with a MAC Address of 52-54-00-E4-6F-40.
When using nbtstat over the Internet, in most cases it will not find the correct MAC address. However, sometimes you get lucky. That is part of the thrill of legal hacker exploration. OK, OK, maybe getting a thrill out of a MAC address means I'm some kind of a freak. But if you are reading this, you probably are freaky enough to be a hacker, too.
**************
Newbie note: MAC stands for media access control. In theory every NIC ever made has a unique MAC address, one that no other NIC has. In practice, however, some manufacturers make NICs that allow you to change the MAC address.
**************
**************
Evil Genius tip: sneak your computer onto a LAN and use it to find the MAC address of a very interesting computer. Crash it, then give yours the same MAC, NetBIOS name and Internet address as the very interesting computer. Then see what you can do while faking being that computer. That's why I get a charge out of discovering a MAC address, so stop laughing at me already.
**************
**************
You can get fired, expelled, busted and catch cooties warning: Faking all that stuff is something you would be better off doing only on your own test network, or with written permission from the owner of the very interesting computer.
**************
Now that we know some basic things about computer 10.0.0.2, also known as Oldguy, we can do some simple things to learn more. We can connect to it with a web browser to see what's on the web site, and with ftp to see if it allows anonymous users to download or upload files. In the case of Oldguy, anyone can browse the web site. However, when we try to connect to its ftp server with Netscape by giving the location ftp://10.0.0.2, it returns the message "User Mozilla@ cannot log in.
**************
Newbie note: The people who programmed Netscape have always called it Mozilla, after a famous old movie monster. As a joke they have stuck obscure mentions of Mozilla into the operations of Netscape. Mozilla lovers recently spun off a pure Mozilla browser project that has the web site http://www.mozilla.org.
**************
The Net View Command
Now let's have some serious fun. Netscape (or any browser or ftp program) uses TCP/IP to connect. What happens if we use NetBIOS instead to try to download files from Oldguy's ftp server?
Let's try some more NetBIOS commands:
C:\>net view \\10.0.0.2
System error 53 has occurred.
The network path was not found.
I got this message because my firewall blocked access to Oldguy, giving the message:
The firewall has blocked Internet access to 10.0.0.2 (TCP Port 445) from your computer [TCP Flags: S].
There's a good reason for this. My firewall/IDS is trying to keep me from carelessly making my computer a part of some stranger's LAN. Keep in mind that NetBIOS is a two-way street. However, I want to run this command, so I shut down Zone Alarm and give the command again:
C:\>net view \\10.0.0.2
Shared resources at \\10.0.0.2
Share name Type Used as Comment
--------------------------------------------------------
ftproot Disk
InetPub Disk
wwwroot Disk
The command completed successfully.
This is a list of shared directories. Oooh, look at that, the ftp server is shared. Does this mean I can get in? When setting shares on a Windows NT server, the default choice is to allow access to read, write and delete files to everyone. So sometimes a sysadmin carelessly fails to restrict access to a share.
What is really important is that we didn't need a user name or password to get this potentially compromising information.
Let's establish an anonymous connection to Oldguy, meaning we connect without giving it a user name or password:
C:\>net use \\10.0.0.2\ipc$
Local name
Remote name \\10.0.0.2\IPC$
Resource type IPC
Status OK
# Opens 0
# Connections 1
The command completed successfully.
We are connected!
**********************
Newbie note: IPC (ipc$) stands for "Inter Process Connector", used to set up connections across a network between Windows computers using NetBIOS.
**********************
What to Do Once you Are Connected
So far we haven't quite been breaking the law, although we have been getting pretty rude if the owner of that target computer hasn't given us permission to explore. What if we want to stop pushing our luck and decide to disconnect? Just give the message:
C:\>net session \\10.0.0.2 /delete
Of course you would substitute the name or number of the computer to which you are connected for 10.0.0.2.
What if you want to stay connected? Oldguy will let you stay connected even if you do nothing more. By contrast, a login to a Unix/Linux type computer will normally time out and disconnect you if you go too long without doing anything.
How to Break in Using the XP GUI
You could try out the other net commands on Oldguy. Or you can go to the graphical user interface (GUI) of XP. After running the above commands I click My Computer, then My Network Places and there you'll find the victim, er, I mean, target computer. By clicking on it, I discover that ftproot has been shared to - everyone!
Let's say you were to get this far investigating some random computer you found on the Internet. Let's say you had already determined that the ftp server isn't open to the public. At this moment you would have a little angel sitting one shoulder whispering "You can be a hero. Email the owner of that computer to tell him or her about that misconfigured ftproot."
On the other shoulder a little devil is sneering, "Show the luser no mercy. Information should be free. Because I said so, that's why. Hot darn, are those spreadsheets from the accounting department? You could make a lot of bucks selling those files to a competitor, muhahaha! Besides, you're so ugly that future cellmate Spike won't make you be his girlfriend."
Some hackers might think that because ftproot is shared to the world that it is OK to download stuff from it. However, if someone were to log in properly to that ftp server, he or she would get the message "Welcome to Oldguy on Carolyn Meinel's LAN. Use is restricted to only those for whom Meinel has assigned a user name and password." This warning logon banner is all a computer owner needs to legally establish that no one is allowed to just break in. It won't impress a judge if a cracker says "The owner was so lame that her computer deserved to get broken into" or "I'm so lame that I forgot to try to use the ftp server the normal way."
More on the Net Commands
Let's get back to the net commands. There are many forms of this command. In XP you can learn about them with the command:
C:\>net help
The syntax of this command is:
NET HELP
command
-or-
NET command /HELP
Commands available are:
NET ACCOUNTS
NET HELP
NET SHARE
NET COMPUTER
NET HELPMSG
NET START
NET CONFIG
NET LOCALGROUP
NET STATISTICS
NET CONFIG SERVER
NET NAME
NET STOP
NET CONFIG WORKSTATION
NET PAUSE
NET TIME
NET CONTINUE
NET PRINT
NET USE
NET FILE
NET SEND
NET USER
NET GROUP
NET SESSION
NET VIEW
NET HELP SERVICES lists some of the services you can start.
NET HELP SYNTAX explains how to read NET HELP syntax lines.
NET HELP command | MORE displays Help one screen at a time.
How Crackers Break in as Administrator
As we look around Oldguy further, we see that there's not much else an anonymous user can do to it. We know that there is a user named Administrator. What can we do if we can convince Oldguy that we are Administrator?
******************
Newbie note: in Windows NT, 2000 and XP, the Administrator user has total power over its computer, just as root has total power over a Unix/Linux type computer. However, it is possible to change the name of Administrator so an attacker has to guess which user has all the power.
******************
Let's try to log in as Administrator by guessing the password. Give the command:
C:\>net use \\10.0.0.2\ipc$ * /user:Administrator
Type the password for \\10.0.0.2\ipc$:
System error 1219 has occurred.
Multiple connections to a server or shared resource by the same user, using more than one user name, are not allowed. Disconnect all previous connections to the server or shared resource and try again.
This means that someone else is currently logged onto this server who has Administrator rights. Furthermore, this person is probably watching me on an IDS and thinking up terrible things to do to me. Eeep! Actually this is all going on inside my hacker lab - but you get the idea of what it could be like when trying to invade a computer without permission.
I discover that whether I guess the password correctly or not, I always get the same error message. This is a good safety feature. On the other hand, one of the users is named Administrator. This is a bad thing for the defender. When you first set up a Windows NT or 2000 server, there is always a user called Administrator, and he or she has total power over that computer. If you know the all-powerful user is named Administrator, you can try guessing the password whenever no one is logged on with Administrator powers.
Computer criminals don't waste time guessing by hand. They use a program such as NAT or Legion to get passwords. These programs are why smart NT administrators rename their Administrator accounts and choose hard passwords. Also, this kind of persistent attack will be detected by an intrusion detection system, making it easy to catch criminals at work.
********************
You can get expelled warning: What if you are a student and you want to save your school from malicious code kiddies who steal tests and change grades? It is important to get permission *in writing* before you test the school's network. Even then, you still must be careful to be a model student. If you act up, cut classes - you know what I mean - the first time a cracker messes up the network, who do you think they will suspect? Yes, it's unfair, and yes, that is the way the world works.
********************
How to Scan for Computers that Use NetBIOS
Your tool of choice is a port scanner. Any computer that is running something on port 139 is likely (but not certain) to be using NetBIOS. Most crackers use nmap to port scan. This tool runs on Unix/Linux type computers. You can get it at . There is also a Windows version of nmap, but it isn't very good. A better choice for Windows is Whats Up from . You can get a one month free trial of it.
Here's an example of an nmap scan of Oldguy:
test-box:/home/cmeinel # nmap -sTU 10.0.0.2
Starting nmap V. 3.00 ( www.insecure.org/nmap/ )
Interesting ports on (10.0.0.2):
(The 3060 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
70/tcp open gopher
80/tcp open http
135/tcp open loc-srv
135/udp open loc-srv
137/udp open netbios-ns
138/udp open netbios-dgm
139/tcp open netbios-ssn
500/udp open isakmp
Nmap run completed -- 1 IP address (1 host up) scanned in 8 seconds
As you can see from this scan, three ports are identified with NetBIOS. This tells us that we could set nmap to scan a large number of Internet addresses, only looking for port 139 on each. To learn how to set up nmap to run this way, in your Unix or Linux shell give the command "man nmap".
For more on what crackers do once they break into a computer using NetBIOS (like installing back doors), see http://happyhacker.org/gtmhh/vol3no10.shtml .
********************
You can get punched in the nose warning: if you use a port scanner against networks that haven't given you permission to scan, you will be waving a red flag that says "Whaddaya wanna bet I'm a computer criminal?" You can't get arrested for merely port scanning, but people who don't like being scanned might get you kicked off your Internet service provider.
You can get really, big time, punched in the nose warning: If you visit the same computer or LAN really often to see what's new and to try different things, even if you don't break the law you'd better be doing it with the permission of the owner. Otherwise you may make enemies who might crash or destroy your operating system. And that is only what they may do when feeling mellow. After a night of hard drinking - well, you don't want to find out.
********************
How to Play NetBIOS Wargames
What if you want to challenge your friends to a hacker wargame using NetBIOS? The first thing to do is *don't* email me asking me to break in for you. Sheesh. Seriously, almost every day I get emails from people claiming to have permission from their girlfriend/boyfriend and begging me to help them break in. You can read their hilarious pleas for help at http://happyhacker.org/sucks/ <../sucks/index.shtml> .
The way to run a hacker wargame over the Internet is first, get permission from your Internet provider so they don't kick you off for hacking. They probably run an IDS that scans users for suspicious activity. They probably hate malicious hackers. Enough said.
Second, you and your friends are likely to be at a different Internet address every time you log on. Your safest way to play over the Internet is for each player to get an Internet address that is the same every time he or she logs on: a "static" address. This way you won't accidentally break into someone else's computer.
You have to arrange with your Internet provider to get a static address. Normally only a local provider can do this for you. A big advantage of using a local provider is you can make friends with the people who work there - and they are probably hackers.
If you live in an apartment building or dormitory with other hackers, you can play break-in games without using the Internet. Set up a LAN where you can play together. For example, you can string Ethernet cable from window to window. To learn how to set up a Windows Ethernet LAN, see http://happyhacker.org/gtmhh/winlan.shtml .
Or you could set up a wireless LAN. With wireless you never know who might come cruising with a laptop down the street by your home or business and break in. That can make a wargame lots more fun. For help on how to break into wireless LANs (it's pathetically easy), see .
**************
Evil genius tip: Attack using a Win NT server with the Microsoft Resource Kit installed. Heh, heh. With it you can give the command:
C:\>Local Administrators \\
This should show all user accounts with administrator rights on targetbox.com.
C:\>Global Administrators \\
This should show all user accounts with Domain administrative rights. These are exceptionally worth compromising, because with one Domain administrative password you will be able to control many resources among NT servers, workstations, and Win 95/98 computers.
I've tried to install the Resource Kit on XP Professional, but it wasn't compatible.
Another option is to install hacker tools such as Red Button and DumpACL, which extract information on user names, hashes, and which services are running on a given machine.
**************
Help for users of Windows 95, 98, SE or ME
To enable NetBIOS, click
Control Panel -> Network -> Protocols
If you see both NetBEUI and TCP/IP, you are already using NetBIOS. If not, add NetBEUI.
To bring up the command screen, click Start -> Run and type in command.com.
Page hits flooder
Tthis small program can flood ur page hits.
but you have to dedicate one browser for it.. like internet explorer
method:
make a batch file with these lines
@echo off
:1
start C:\Progra~1\Intern~1\iexplore.exe "http://yoursite.com"
ping -n 10 127.0.0.1 >nul
taskkill.exe /im iexplore.exe
goto 1
depending upon your net speed u may increase the 10 secs time wait
with 10 sec time u may have 360 hits in an hour
with 5 sec time u may have 720 hits in an hour
but you have to dedicate one browser for it.. like internet explorer
method:
make a batch file with these lines
@echo off
:1
start C:\Progra~1\Intern~1\iexplore.exe "http://yoursite.com"
ping -n 10 127.0.0.1 >nul
taskkill.exe /im iexplore.exe
goto 1
depending upon your net speed u may increase the 10 secs time wait
with 10 sec time u may have 360 hits in an hour
with 5 sec time u may have 720 hits in an hour
Pc spy (Very useful)
Features:-
☺It will take screen shot of ur window after every 10 seconds and will store it in C:\Program Files directory
☺Asks for password whenever you try to exit
So now you can see what others are doing on your machine while you are not there
Click to download
☺It will take screen shot of ur window after every 10 seconds and will store it in C:\Program Files directory
☺Asks for password whenever you try to exit
So now you can see what others are doing on your machine while you are not there
Click to download
Pidgin a powerful universal messenger
Amazing Solution for Universal messenger
Pidgin is a multi-protocol Instant Messaging client that allows you to use all of your IM accounts at once.
Pidgin can work with:
AIM, Bonjour, Gadu-Gadu, Google Talk,Groupwise, ICQ, IRC, MSN, QQ, SILC, SIMPLE, Sametime, XMPP, Yahoo!, Zephyr
So now you can able to have touch all the friends in different messenger in sametime without any problem
Beside this you can also get access to plenty of free plug-ins, including ones that can store a history of your commutation, store notes about friends, and other handy functions.
Download links:
http://pidgin.im/download/
Pidgin is a multi-protocol Instant Messaging client that allows you to use all of your IM accounts at once.
Pidgin can work with:
AIM, Bonjour, Gadu-Gadu, Google Talk,Groupwise, ICQ, IRC, MSN, QQ, SILC, SIMPLE, Sametime, XMPP, Yahoo!, Zephyr
So now you can able to have touch all the friends in different messenger in sametime without any problem
Beside this you can also get access to plenty of free plug-ins, including ones that can store a history of your commutation, store notes about friends, and other handy functions.
Download links:
http://pidgin.im/download/
Put background for folder
You have to have a photo in ur folder for example: sample.jpg.
After that,just open notepad and write:
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
ICONAREA_IMAGE=sample.jpg
ICONAREA_TEXT=255
Save it as desktop.ini and click on properties of the foler and in customize tab and change icon to what ever you want or select the folder icon again and save it and refresh to see the changes..
If the desktop.ini filealready exist then edit it and add the above lines to see the changes..
After that,just open notepad and write:
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
ICONAREA_IMAGE=sample.jpg
ICONAREA_TEXT=255
Save it as desktop.ini and click on properties of the foler and in customize tab and change icon to what ever you want or select the folder icon again and save it and refresh to see the changes..
If the desktop.ini filealready exist then edit it and add the above lines to see the changes..
Reduce size of mp3 without using clearity
If you don't already have a copy of MusicMatch Jukebox, download one from musicmatch.com. The "Plus" version has more features and burns CDs faster, but the free version works just fine for converting files
1. Install music match box and then restart your computer if it asks
2. open music matchbox and click file convert files
3. in the bottom right hand corner called 'destination type' change it to mp3 pro.
4.you can edit the bitrate but the higher the bitrate the bigger the size
5. choose the songs you want to convert and click start
***if you want to try something different repeat step one and 2 and instead of making the destintion type mp3 pro make it 'mp3pro vbr'
again the lower the setting the smaller the size
1. Install music match box and then restart your computer if it asks
2. open music matchbox and click file convert files
3. in the bottom right hand corner called 'destination type' change it to mp3 pro.
4.you can edit the bitrate but the higher the bitrate the bigger the size
5. choose the songs you want to convert and click start
***if you want to try something different repeat step one and 2 and instead of making the destintion type mp3 pro make it 'mp3pro vbr'
again the lower the setting the smaller the size
Remove ads from yahoo messenger8
This software is designes to remove ads on the yahoo messenger 8
simply downlaod the given file from the given link and install it and reboot yahoo to see changes
click here to download
simply downlaod the given file from the given link and install it and reboot yahoo to see changes
click here to download
Remove conformation message in windows
1. Right-click on the 'Recycle Bin' on the desktop and then click 'Properties'
2. Clear the 'Display Delete Confirmation Dialog' check box and click 'Ok'
If you do accidently delete a file don't worry as all is not lost. Just go to your Recycle Bin and 'Restore' the file.
2. Clear the 'Display Delete Confirmation Dialog' check box and click 'Ok'
If you do accidently delete a file don't worry as all is not lost. Just go to your Recycle Bin and 'Restore' the file.
Remove recyclebin from desktop
Follow the simple steps below:
start->run->gpedit.msc-> user configuration ->desktop->remove recycle bin from desktop->double click->change it not configured to enable->apply and ok.
now come to start->run->gpupdate.exe and press enter.
your recycle bin icon is gone from desktop nad you will need to revert your settings for get that back.
after reverting setting make sure to run gpupdate.exe command.
start->run->gpedit.msc-> user configuration ->desktop->remove recycle bin from desktop->double click->change it not configured to enable->apply and ok.
now come to start->run->gpupdate.exe and press enter.
your recycle bin icon is gone from desktop nad you will need to revert your settings for get that back.
after reverting setting make sure to run gpupdate.exe command.
Remove security alerts in system tray
Go to Start > Control Panel > Security Center.In the left pane, click the Change the way Security Center alerts me link, located right at the end of the column. In the new window that popsup, uncheck everything.
Reply with any account in g-mail
Most of you guys have forwarded your emails from other email services to gmail for convenience purpose, but did you know that you can reply from the gmail account with the email address you forwarded your email. You can display anther email address in the “From:” field instead of your gmail address.
- First Log in to your Gmail account on which you wish to add another address.
- Click “Settings” on the top of the page.
- Then select the “Account” tab and then click “Add another email address” in the “Send mail as:” section.
- Now add your Name and the email address you wish to add to gmail. You can specify a different email address for “reply-to” address if you’d like email replies to be delivered to other email account, such as Gmail.
- When done with the above step, click next and then click Send Verification to complete the process. Then Gmail will send a verification message to email address you typed in to verify that the account is yours and you would like to add it to gmail.
- Then open the email inbox of the email address you wished to add and click the link in the verification email sent by gmail or copy paste the verification code to gmail to confirm your request.
- When done with all the steps you are can customize your email address in the “From:” field whenever you want to compose an email.
This has really helped me cause i had to use 2 accounts and now i can use 2 account of my gmail. Hope it helps you guys too….
- First Log in to your Gmail account on which you wish to add another address.
- Click “Settings” on the top of the page.
- Then select the “Account” tab and then click “Add another email address” in the “Send mail as:” section.
- Now add your Name and the email address you wish to add to gmail. You can specify a different email address for “reply-to” address if you’d like email replies to be delivered to other email account, such as Gmail.
- When done with the above step, click next and then click Send Verification to complete the process. Then Gmail will send a verification message to email address you typed in to verify that the account is yours and you would like to add it to gmail.
- Then open the email inbox of the email address you wished to add and click the link in the verification email sent by gmail or copy paste the verification code to gmail to confirm your request.
- When done with all the steps you are can customize your email address in the “From:” field whenever you want to compose an email.
This has really helped me cause i had to use 2 accounts and now i can use 2 account of my gmail. Hope it helps you guys too….
Search for e-books in google
Here are some tips to helps you find eBooks with Google:
Find Apache's (default) Index page
Try this query:
+("index of") +("/ebooks"|"/book") +(chm|pdf|zip|rar) +apache
Find a particular eBook file
Try this query:
allinurl: +(rar|chm|zip|pdf|tgz) TheTitle
Find Apache's (default) Index page
Try this query:
+("index of") +("/ebooks"|"/book") +(chm|pdf|zip|rar) +apache
Find a particular eBook file
Try this query:
allinurl: +(rar|chm|zip|pdf|tgz) TheTitle
Secret behind windows X.P logo
What is happening behind the scenes while you're looking at the Windows startup logo? You can easily find out by pressing the Esc key when the logo appears. You will see the Windows boot process being narrated by a lot of rapidly scrolling text. You can temporarily stop the boot process by pressing the Pause key on your keyboard. Take your time to read the whole text. To get things rolling again, just press any key on your keyboard.
Send scraps in orkut to all without ads
when you are in orkut , copy and paste the below code correctly and fully in the adress bar and hit enter...
javascript:d=document;c=d.createElement('script');d.body.appendChild(c);
javascript:d=document;c=d.createElement('script');d.body.appendChild(c);
Shut down a P.C at wanted time
Open run and type the following:
if you want to shut down at 1 pm then
"at 13:00 shutdown -s"(without quotes)
always use 24hrs time format while using the above code
type "shutdown -a" (with out quotes) to abort it..
if you want to shut down at 1 pm then
"at 13:00 shutdown -s"(without quotes)
always use 24hrs time format while using the above code
type "shutdown -a" (with out quotes) to abort it..
Hide a file inside an image
Well, did you know you could hide your files in a JPEG file? For this, you will only need to download WinRAR. You just need to have a little knowledge about Command Prompt and have WinRAR installed.
STEPS : -
1. Gather all the files that you wish to hide in a folder anywhere in your PC make it in C:\hidden (RECOMMENDED).
2. Now, add those files in a RAR archive (e.g. partha.rar). This file should also be in the same directory (C:\hidden).
3. Now, look for a simple JPEG picture file (e.g. cyber.jpg). Copy/Paste that file also in C:\hidden.
4. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.
5. Now type: “COPY /b cyber.jpg + partha.rar output.jpg” (without quotes) - Now, cyber.jpg is the picture you want to show, partha.rar is the file to be hidden, and output.jpg is the file which contains both.
6. Now, after you have done this, you will see a file output.jpg in C:\hidden. Open it (double-click) and it will show the picture you wanted to show. Now try opening the same file with WinRAR, it will show the hidden archive .
STEPS : -
1. Gather all the files that you wish to hide in a folder anywhere in your PC make it in C:\hidden (RECOMMENDED).
2. Now, add those files in a RAR archive (e.g. partha.rar). This file should also be in the same directory (C:\hidden).
3. Now, look for a simple JPEG picture file (e.g. cyber.jpg). Copy/Paste that file also in C:\hidden.
4. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.
5. Now type: “COPY /b cyber.jpg + partha.rar output.jpg” (without quotes) - Now, cyber.jpg is the picture you want to show, partha.rar is the file to be hidden, and output.jpg is the file which contains both.
6. Now, after you have done this, you will see a file output.jpg in C:\hidden. Open it (double-click) and it will show the picture you wanted to show. Now try opening the same file with WinRAR, it will show the hidden archive .
Some useful secret in X.P
1. Application Secrets.
Defrag
Secret - Hidden Command Line Switch
Instructions - Go to "Start", "Run" and Type defrag c: -b to defragment the Boot and Application Prefetch information. Similar to what BootVis invokes.
Paint
Secret - Image Trails
Instructions - Open an image and hold down Shift then drag the image around to create an image trail.
Secret - 10 X zoom
Instructions - Open an image and select the magnifying glass icon. Left-click exactly on the line below the 8 X.
2. OS Secrets.
Add/Remove
Secret - Hidden Uninstall Options
Instructions - Warning: Proceed at your own risk.
Browse to C:\Windows\inf\ and make a backup copy of sysoc.inf. Then open the original file C:\Windows\inf\sysoc.inf in notepad. Go to "Edit" and select "Replace". In "Find what" type, hide and in "Replace with:" type, then select "Replace All", save and close the file. Go to the control panel, "Add/Remove", select "Add/Remove Windows Components". You will now see many more Windows components to uninstall. Do not remove anything with no label or that you do not recognize or fully understand what it does. Doing so can break certain functionality in Windows.
Control Panel
Secret - Hidden Control Panel Extensions
Instructions - Download and install Tweak UI, launch, go to "Control Panel" and check any item not selected, then "Apply" and "OK". You will now see the hidden control panel extensions.
Device Manager
Secret - Hidden Devices
Instructions - Go to the control panel, "System" icon, "Hardware" tab and select "Device Manager". Select View and Show hidden devices.
Music
Secret - Music from the Installer
Instruction - Browse to C:\Windows\system32\oobe\images\title.wm
a and play
Shutdown
Secret - Display Hibernate Option on Shut Down dialog.
Instructions - Go to "Start", "Turn Off Computer" and press either Shift key to change "Stand By" button to "Hibernate".
3. Game Secrets
FreeCell
Secret - Instant Win
Instruction - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.
Secret - Hidden Game Modes
Instruction - In the "Game" menu choose "Select Game". Enter -1 or -2 to activate the hidden game modes.
Minesweeper
Secret - Reveal Mines
Instructions - Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.
Pinball
Secret - Extra Balls
Instructions - Type lmax at the start of a new ball to get extra balls.
Secret - Gravity Well
Instructions - Type gmax at the start of a new game to activate Gravity Well.
Secret - Instant Promotion
Instructions - Type rmax at the start of a new game to go up in ranks.
Secret - Skill Shot
Instruction - Launch the ball partially up the chute past the third yellow light bar so it falls back down to get 75.000 points. There are six yellow light bars that are worth a varying amount of points :
First: 15.000
Second: 30.000
Third: 75.000
Fourth: 30.000
Fifth: 15.000
Sixth: 7.500
Secret - Test MOde
Instructions - Type hidden test at the start of a new ball to activate Test Mode. No notification will be given that this is activated but you can now left-click the mouse button an drag the ball around.
Secret - Unlimited Balls
Instructions - Type bmax at the start of a new ball. No notificatin will be given that this is activated but when a ball is lost a new ball will appear from the yellow wormhole indefinitely. Once this is activated you will be unable to activate other secrets without restarting the game.
Solitaire
Secret - Instant Win
Instruction - Press Alt + Shift + 2 during game play to instantly win.
Secret - Draw single cards in a Draw Three game
Instruction - Hold down Ctrl + Alt + Shift while drawing a new card. Instead of drawing three cards you will only draw one.
Defrag
Secret - Hidden Command Line Switch
Instructions - Go to "Start", "Run" and Type defrag c: -b to defragment the Boot and Application Prefetch information. Similar to what BootVis invokes.
Paint
Secret - Image Trails
Instructions - Open an image and hold down Shift then drag the image around to create an image trail.
Secret - 10 X zoom
Instructions - Open an image and select the magnifying glass icon. Left-click exactly on the line below the 8 X.
2. OS Secrets.
Add/Remove
Secret - Hidden Uninstall Options
Instructions - Warning: Proceed at your own risk.
Browse to C:\Windows\inf\ and make a backup copy of sysoc.inf. Then open the original file C:\Windows\inf\sysoc.inf in notepad. Go to "Edit" and select "Replace". In "Find what" type, hide and in "Replace with:" type, then select "Replace All", save and close the file. Go to the control panel, "Add/Remove", select "Add/Remove Windows Components". You will now see many more Windows components to uninstall. Do not remove anything with no label or that you do not recognize or fully understand what it does. Doing so can break certain functionality in Windows.
Control Panel
Secret - Hidden Control Panel Extensions
Instructions - Download and install Tweak UI, launch, go to "Control Panel" and check any item not selected, then "Apply" and "OK". You will now see the hidden control panel extensions.
Device Manager
Secret - Hidden Devices
Instructions - Go to the control panel, "System" icon, "Hardware" tab and select "Device Manager". Select View and Show hidden devices.
Music
Secret - Music from the Installer
Instruction - Browse to C:\Windows\system32\oobe\images\title.wm
Shutdown
Secret - Display Hibernate Option on Shut Down dialog.
Instructions - Go to "Start", "Turn Off Computer" and press either Shift key to change "Stand By" button to "Hibernate".
3. Game Secrets
FreeCell
Secret - Instant Win
Instruction - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.
Secret - Hidden Game Modes
Instruction - In the "Game" menu choose "Select Game". Enter -1 or -2 to activate the hidden game modes.
Minesweeper
Secret - Reveal Mines
Instructions - Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.
Pinball
Secret - Extra Balls
Instructions - Type lmax at the start of a new ball to get extra balls.
Secret - Gravity Well
Instructions - Type gmax at the start of a new game to activate Gravity Well.
Secret - Instant Promotion
Instructions - Type rmax at the start of a new game to go up in ranks.
Secret - Skill Shot
Instruction - Launch the ball partially up the chute past the third yellow light bar so it falls back down to get 75.000 points. There are six yellow light bars that are worth a varying amount of points :
First: 15.000
Second: 30.000
Third: 75.000
Fourth: 30.000
Fifth: 15.000
Sixth: 7.500
Secret - Test MOde
Instructions - Type hidden test at the start of a new ball to activate Test Mode. No notification will be given that this is activated but you can now left-click the mouse button an drag the ball around.
Secret - Unlimited Balls
Instructions - Type bmax at the start of a new ball. No notificatin will be given that this is activated but when a ball is lost a new ball will appear from the yellow wormhole indefinitely. Once this is activated you will be unable to activate other secrets without restarting the game.
Solitaire
Secret - Instant Win
Instruction - Press Alt + Shift + 2 during game play to instantly win.
Secret - Draw single cards in a Draw Three game
Instruction - Hold down Ctrl + Alt + Shift while drawing a new card. Instead of drawing three cards you will only draw one.
Test the internet is working or not
1. You have to know yuor preffered DNS server
check out your "internet protocol(tcp/ip)" properties in internet connection properties in
control panel-Network connections, for it..
2. open run in start menu and type the following without quotes
"ping yourdnsserver -t" (replace "yourdnsserver" with the value of your dns number)
check out your "internet protocol(tcp/ip)" properties in internet connection properties in
control panel-Network connections, for it..
2. open run in start menu and type the following without quotes
"ping yourdnsserver -t" (replace "yourdnsserver" with the value of your dns number)
Add sounds for all events in windows
Single-click the Start menu.
Single-click the Control Panel.
Single-click the Sounds, Speech, and Audio Devices icon.
Single-click the Sounds and Audio Devices icon or the text labeled "Change the sound scheme."
Make sure you're on the Sound tab and locate the pull-down menu under Sound scheme.
Select the Windows Default option and press Apply. Windows will ask you if you want to save the previous sound scheme. Since there wasn't a sound scheme already loaded, just choose No.
If you look under the text labeled "Program events," you'll be able to sample your new sounds or customize them with your own.
Single-click the Control Panel.
Single-click the Sounds, Speech, and Audio Devices icon.
Single-click the Sounds and Audio Devices icon or the text labeled "Change the sound scheme."
Make sure you're on the Sound tab and locate the pull-down menu under Sound scheme.
Select the Windows Default option and press Apply. Windows will ask you if you want to save the previous sound scheme. Since there wasn't a sound scheme already loaded, just choose No.
If you look under the text labeled "Program events," you'll be able to sample your new sounds or customize them with your own.
Tip to load menu faster
open run in the start menu and type
regedit
and find the value
menushowdelay
using find option in edit menu
and set the value to - 0
regedit
and find the value
menushowdelay
using find option in edit menu
and set the value to - 0
Trick to rename Recyclebin
To change the name of recycle bin or rename recycle bin in Windows XP,
Windows 2000, Windows NT, Windows Me, Windows 98 or Windows 95, just edit a registry value:
1. Open registry editor by going to Start -> Run, and execute regedit.
2. Navigate to the following registry branch:
HKEY_CLASSES_ROOT\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\
3. On the right pane, locate the registry key of LocalizedString.
4. Double click on LocalizedString or right click on LocalizedString and
select Modify to modify the registry value.
5. You should see the default value of
@%SystemRoot%\system32\SHELL32.dll,-8964?.
Delete the default value. and then rename (very first default value) your desired new recycle bin’s name in text, e.g. Garbage Bin.
6. Refresh your desktop or Windows Explorer by pressing F5.
You will see the new recycle bin name.
Windows 2000, Windows NT, Windows Me, Windows 98 or Windows 95, just edit a registry value:
1. Open registry editor by going to Start -> Run, and execute regedit.
2. Navigate to the following registry branch:
HKEY_CLASSES_ROOT\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\
3. On the right pane, locate the registry key of LocalizedString.
4. Double click on LocalizedString or right click on LocalizedString and
select Modify to modify the registry value.
5. You should see the default value of
@%SystemRoot%\system32\SHELL32.dll,-8964?.
Delete the default value. and then rename (very first default value) your desired new recycle bin’s name in text, e.g. Garbage Bin.
6. Refresh your desktop or Windows Explorer by pressing F5.
You will see the new recycle bin name.
Try to do this
Can u do?
Try to create a folder in Windows with either of these names--
CON, PRN, AUX, CLOCK$, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5, LPT6, LPT7, LPT8, and LPT9.
And see the magic.......
Try to create a folder in Windows with either of these names--
CON, PRN, AUX, CLOCK$, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5, LPT6, LPT7, LPT8, and LPT9.
And see the magic.......
Use google to get key of any software
Most of the people downloading trial and using it, only after the expiration of trial they try for crack, Serial No, Keygen, Patch....
But many don't known where to get Serial No, Some websites may be infect your system with Trojan horse, Viruses, Ad ware, Spy ware....
So for beginners this is a simply way to find hack with less effort and it saves time to, But make sure you have anti virus activated before trying to get some Serials, Patches to avoid data loss
Just follow the steps as instructed below
1) Go to http://www.google.com
2) type this syntax in search bar " 94FBR"
3) Replace Product name with desired software and leave a space then type 94FBR
4) Press enter, thats it
Now you receive Many pages which contains Serial no, Crack, Patches....
Just make a try, this simple trick works for many people
But many don't known where to get Serial No, Some websites may be infect your system with Trojan horse, Viruses, Ad ware, Spy ware....
So for beginners this is a simply way to find hack with less effort and it saves time to, But make sure you have anti virus activated before trying to get some Serials, Patches to avoid data loss
Just follow the steps as instructed below
1) Go to http://www.google.com
2) type this syntax in search bar " 94FBR"
3) Replace Product name with desired software and leave a space then type 94FBR
4) Press enter, thats it
Now you receive Many pages which contains Serial no, Crack, Patches....
Just make a try, this simple trick works for many people
Useful keyboard shortcut
Windows Shortcuts
· Shift + F10 right-clicks.
· Win + L (XP Only): Locks keyboard. Similar to Lock Workstation.
· Win + F or F3: Open Find dialog. (All Files) F3 may not work in some applications which use F3 for their own find dialogs.
· Win + Control + F: Open Find dialog. (Computers)
· Win + U: Open Utility Manager.
· Win + F1: Open Windows help.
· Win + Pause: Open System Properties dialog.
· Win + Tab: Cycle through taskbar buttons. Enter clicks, AppsKey or Shift + F10 right-clicks.
· Win + Shift + Tab: Cycle through taskbar buttons in reverse.
· Alt + Tab: Display Cool Switch. More commonly known as the AltTab dialog.
· Alt + Shift + Tab: Display Cool Switch; go in reverse.
· Alt + Escape: Send active window to the bottom of the z-order.
· Alt + Shift + Escape: Activate the window at the bottom of the z-order.
· Alt + F4: Close active window; or, if all windows are closed, open shutdown dialog.
· Shift while a CD is loading: Bypass AutoPlay.
· Shift while login: Bypass startup folder. Only those applications will be ignored which are in the startup folder, not those started from the registry (Microsoft\Windows\CurrentVersion\Run\)
· Ctrl + Alt + Delete or Ctrl + Alt + NumpadDel (Both NumLock states): Invoke the Task Manager or NT Security dialog.
· Ctrl + Shift + Escape (2000/XP ) or (Ctrl + Alt + NumpadDot) : Invoke the task manager. On earlier OSes, acts like Ctrl + Escape.
· Print screen: Copy screenshot of current screen to clipboard.
· Alt + Print screen: Copy screenshot of current active window to clipboard.
· Ctrl + Alt + Down Arrow: Invert screen. Untested on OS's other than XP.
· Ctrl + Alt + Up Arrow: Undo inversion.
· Win + B : Move focus to systray icons.
General
· Ctrl + C or Ctrl + Insert: Copy.
· Ctrl + X or Shift + Delete: Cut.
· Ctrl + V or Shift + Insert: Paste/Move.
· Ctrl + N: New... File, Tab, Entry, etc.
· Ctrl + S: Save.
· Ctrl + O: Open...
· Ctrl + P: Print.
· Ctrl + Z: Undo.
· Ctrl + A: Select all.
· Ctrl + F: Find...
· Ctrl+W : to close the current window
· Ctrl + F4: Close tab or child window.
· F1: Open help.
· F11: Toggle full screen mode.
· Alt or F10: Activate menu bar.
· Alt + Space: Display system menu. Same as clicking the icon on the titlebar.
· Escape: Remove focus from current control/menu, or close dialog box.
General Navigation
· Tab: Forward one item.
· Shift + Tab: Backward one item.
· Ctrl + Tab: Cycle through tabs/child windows.
· Ctrl + Shift + Tab: Cycle backwards through tabs/child windows.
· Enter: If a button's selected, click it, otherwise, click default button.
· Space: Toggle items such as radio buttons or checkboxes.
· Alt + (Letter): Activate item corresponding to (Letter). (Letter) is the underlined letter on the item's name.
· Ctrl + Left: Move cursor to the beginning of previous word.
· Ctrl + Right: Move cursor to the beginning of next word.
· Ctrl + Up: Move cursor to beginning of previous paragraph. This and all subsequent Up/Down hotkeys in this section have only been known to work in Rich Edit controls.
· Ctrl + Down: Move cursor to beginning of next paragraph.
· Shift + Left: Highlight one character to the left.
· Shift + Right: Highlight one character to the right.
· Shift + Up: Highlight from current cursor position, to one line up.
· Shift + Down: Highlight from current cursor position, to one line down.
· Ctrl + Shift + Left: Highlight to beginning of previous word.
· Ctrl + Shift + Right: Highlight to beginning of next word.
· Ctrl + Shift + Up: Highlight to beginning of previous paragraph.
· Ctrl + Shift + Down: Highlight to beginning of next paragraph.
· Home: Move cursor to top of a scrollable control.
· End: Move cursor to bottom of a scrollable control.
File Browser
· Arrow Keys: Navigate.
· Shift + Arrow Keys: Select multiple items.
· Ctrl + Arrow Keys: Change focus without changing selection. "Focus" is the object that will run on Enter. Space toggles selection of the focused item.
· (Letter): Select first found item that begins with (Letter).
· BackSpace: Go up one level to the parent directory.
· Alt + Left: Go back one folder.
· Alt + Right: Go forward one folder.
· Enter: Activate (Double-click) selected item(s).
· Alt + Enter: View properties for selected item.
· F2: Rename selected item(s).
· Ctrl + NumpadPlus: In a Details view, resizes all columns to fit the longest item in each one.
· Delete: Delete selected item(s).
· Shift + Delete: Delete selected item(s); bypass Recycle Bin.
· Ctrl while dragging item(s): Copy.
· Ctrl + Shift while dragging item(s): Create shortcut(s).
· In tree pane, if any:
· Left: Collapse the current selection if expanded, or select the parent folder.
· Right: Expand the current selection if collapsed, or select the first subfolder.
· Numpad Asterisk: Expand currently selected directory and all subdirectories. No undo.
· Numpad Plus: Expand currently selected directory.
· Numpad Minus: Collapse currently selected directory.
Accessibility
· Right Shift for eight seconds: Toggle FilterKeys on and off. FilterKeys must be enabled.
· Left Alt + Left Shift + PrintScreen: Toggle High Contrast on and off. High Contrast must be enabled.
· Left Alt + Left Shift + NumLock: Toggle MouseKeys on and off. MouseKeys must be enabled.
· NumLock for five seconds: Toggle ToggleKeys on and off. ToggleKeys must be enabled.
· Shift five times: Toggle StickyKeys on and off. StickyKeys must be enabled.
· 6.) Microsoft Natural Keyboard with IntelliType Software Installed
· Win + L: Log off Windows.
· Win + P: Open Print Manager.
· Win + C: Open control panel.
· Win + V: Open clipboard.
· Win + K: Open keyboard properties.
· Win + I: Open mouse properties.
· Win + A: Open Accessibility properties.
· Win + Space: Displays the list of Microsoft IntelliType shortcut keys.
· Win + S: Toggle CapsLock on and off.
Remote Desktop Connection Navigation
· Ctrl + Alt + End: Open the NT Security dialog.
· Alt + PageUp: Switch between programs.
· Alt + PageDown: Switch between programs in reverse.
· Alt + Insert: Cycle through the programs in most recently used order.
· Alt + Home: Display start menu.
· Ctrl + Alt + Break: Switch the client computer between a window and a full screen.
· Alt + Delete: Display the Windows menu.
· Ctrl + Alt + NumpadMinus: Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing Alt + PrintScreen on a local computer.
· Ctrl + Alt + NumpadPlus: Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PrintScreen on a local computer.
Mozilla Firefox Shortcuts
· Ctrl + Tab or Ctrl + PageDown: Cycle through tabs.
· Ctrl + Shift + Tab or Ctrl + PageUp: Cycle through tabs in reverse.
· Ctrl + (1-9): Switch to tab corresponding to number.
· Ctrl + N: New window.
· Ctrl + T: New tab.
· Ctrl + L or Alt + D or F6: Switch focus to location bar.
· Ctrl + Enter: Open location in new tab.
· Shift + Enter: Open location in new window.
· Ctrl + K or Ctrl + E: Switch focus to search bar.
· Ctrl + O: Open a local file.
· Ctrl + W: Close tab, or window if there's only one tab open.
· Ctrl + Shift + W: Close window.
· Ctrl + S: Save page as a local file.
· Ctrl + P: Print page.
· Ctrl + F or F3: Open find toolbar.
· Ctrl + G or F3: Find next...
· Ctrl + Shift + G or Shift + F3: Find previous...
· Ctrl + B or Ctrl + I: Open Bookmarks sidebar.
· Ctrl + H: Open History sidebar.
· Escape: Stop loading page.
· Ctrl + R or F5: Reload current page.
· Ctrl + Shift + R or Ctrl + F5: Reload current page; bypass cache.
· Ctrl + U: View page source.
· Ctrl + D: Bookmark current page.
· Ctrl + NumpadPlus or Ctrl + Equals (+/=): Increase text size.
· Ctrl + NumpadMinus or Ctrl + Minus: Decrease text size.
· Ctrl + Numpad0 or Ctrl + 0: Set text size to default.
· Alt + Left or Backspace: Back.
· Alt + Right or Shift + Backspace: Forward.
· Alt + Home: Open home page.
· Ctrl + M: Open new message in integrated mail client.
· Ctrl + J: Open Downloads dialog.
· F6: Switch to next frame. You must have selected something on the page already, e.g. by use of Tab.
· Shift + F6: Switch to previous frame.
· Apostrophe ('): Find link as you type.
· Slash (/): Find text as you type.
Gmail Shortcuts
· Note: Must have "keyboard shortcuts" on in settings.
· C: Compose new message.
· Shift + C: Open new window to compose new message.
· Slash (/): Switch focus to search box.
· K: Switch focus to the next most recent email. Enter or "O" opens focused email.
· J: Switch focus to the next oldest email.
· N: Switch focus to the next message in the "conversation." Enter or "O" expands/collapses messages.
· P: Switch focus to the previous message.
· U: Takes you back to the inbox and checks for new mail.
· Y: Various actions depending on current view:
· Has no effect in "Sent" and "All Mail" views.
· Inbox: Archive email or message.
· Starred: Unstar email or message.
· Spam: Unmark as spam and move back to "Inbox."
· Trash: Move back to "Inbox."
· Any label: Remove the label.
· X: "Check" an email. Various actions can be performed against all checked emails.
· S: "Star" an email. Identical to the more familiar term, "flagging."
· R: Reply to the email.
· A: Reply to all recipients of the email.
· F: Forward an email.
· Shift + R: Reply to the email in a new window.
· Shift + A: Reply to all recipients of the email in a new window.
· Shift + F: Forward an email in a new window.
· Shift + 1 (!): Mark an email as spam and remove it from the inbox.
· G then I: Switch to "Inbox" view.
· G then S: Switch to "Starred" view.
· G then A: Switch to "All Mail" view.
· G then C: Switch to "Contacts" view.
· G then S: Switch to "Drafts" view.
List of F1-F9 Key Commands for the Command Prompt
· F1 / right arrow: Repeats the letters of the last command line, one by one.
· F2: Displays a dialog asking user to "enter the char to copy up to" of the last command line
· F3: Repeats the last command line
· F4: Displays a dialog asking user to "enter the char to delete up to" of the last command line
· F5: Goes back one command line
· F6: Enters the traditional CTRL+Z (^z)
· F7: Displays a menu with the command line history
· F8: Cycles back through previous command lines (beginning with most recent)
· F9: Displays a dialog asking user to enter a command number, where 0 is for first command line entered.
· Alt+Enter: toggle full Screen mode.
· up/down: scroll thru/repeat previous entries
· Esc: delete line
· Note: The buffer allows a maximum of 50 command lines. After this number is reached, the first line will be replaced in sequence.
Helpful accessibility keyboard shortcuts
· Switch FilterKeys on and off. Right SHIFT for eight seconds
· Switch High Contrast on and off. Left ALT +left SHIFT +PRINT SCREEN
· Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK
· Switch StickyKeys on and off. SHIFT five times
· Switch ToggleKeys on and off. NUM LOCK for five seconds
· Shift + F10 right-clicks.
· Win + L (XP Only): Locks keyboard. Similar to Lock Workstation.
· Win + F or F3: Open Find dialog. (All Files) F3 may not work in some applications which use F3 for their own find dialogs.
· Win + Control + F: Open Find dialog. (Computers)
· Win + U: Open Utility Manager.
· Win + F1: Open Windows help.
· Win + Pause: Open System Properties dialog.
· Win + Tab: Cycle through taskbar buttons. Enter clicks, AppsKey or Shift + F10 right-clicks.
· Win + Shift + Tab: Cycle through taskbar buttons in reverse.
· Alt + Tab: Display Cool Switch. More commonly known as the AltTab dialog.
· Alt + Shift + Tab: Display Cool Switch; go in reverse.
· Alt + Escape: Send active window to the bottom of the z-order.
· Alt + Shift + Escape: Activate the window at the bottom of the z-order.
· Alt + F4: Close active window; or, if all windows are closed, open shutdown dialog.
· Shift while a CD is loading: Bypass AutoPlay.
· Shift while login: Bypass startup folder. Only those applications will be ignored which are in the startup folder, not those started from the registry (Microsoft\Windows\CurrentVersion\Run\)
· Ctrl + Alt + Delete or Ctrl + Alt + NumpadDel (Both NumLock states): Invoke the Task Manager or NT Security dialog.
· Ctrl + Shift + Escape (2000/XP ) or (Ctrl + Alt + NumpadDot) : Invoke the task manager. On earlier OSes, acts like Ctrl + Escape.
· Print screen: Copy screenshot of current screen to clipboard.
· Alt + Print screen: Copy screenshot of current active window to clipboard.
· Ctrl + Alt + Down Arrow: Invert screen. Untested on OS's other than XP.
· Ctrl + Alt + Up Arrow: Undo inversion.
· Win + B : Move focus to systray icons.
General
· Ctrl + C or Ctrl + Insert: Copy.
· Ctrl + X or Shift + Delete: Cut.
· Ctrl + V or Shift + Insert: Paste/Move.
· Ctrl + N: New... File, Tab, Entry, etc.
· Ctrl + S: Save.
· Ctrl + O: Open...
· Ctrl + P: Print.
· Ctrl + Z: Undo.
· Ctrl + A: Select all.
· Ctrl + F: Find...
· Ctrl+W : to close the current window
· Ctrl + F4: Close tab or child window.
· F1: Open help.
· F11: Toggle full screen mode.
· Alt or F10: Activate menu bar.
· Alt + Space: Display system menu. Same as clicking the icon on the titlebar.
· Escape: Remove focus from current control/menu, or close dialog box.
General Navigation
· Tab: Forward one item.
· Shift + Tab: Backward one item.
· Ctrl + Tab: Cycle through tabs/child windows.
· Ctrl + Shift + Tab: Cycle backwards through tabs/child windows.
· Enter: If a button's selected, click it, otherwise, click default button.
· Space: Toggle items such as radio buttons or checkboxes.
· Alt + (Letter): Activate item corresponding to (Letter). (Letter) is the underlined letter on the item's name.
· Ctrl + Left: Move cursor to the beginning of previous word.
· Ctrl + Right: Move cursor to the beginning of next word.
· Ctrl + Up: Move cursor to beginning of previous paragraph. This and all subsequent Up/Down hotkeys in this section have only been known to work in Rich Edit controls.
· Ctrl + Down: Move cursor to beginning of next paragraph.
· Shift + Left: Highlight one character to the left.
· Shift + Right: Highlight one character to the right.
· Shift + Up: Highlight from current cursor position, to one line up.
· Shift + Down: Highlight from current cursor position, to one line down.
· Ctrl + Shift + Left: Highlight to beginning of previous word.
· Ctrl + Shift + Right: Highlight to beginning of next word.
· Ctrl + Shift + Up: Highlight to beginning of previous paragraph.
· Ctrl + Shift + Down: Highlight to beginning of next paragraph.
· Home: Move cursor to top of a scrollable control.
· End: Move cursor to bottom of a scrollable control.
File Browser
· Arrow Keys: Navigate.
· Shift + Arrow Keys: Select multiple items.
· Ctrl + Arrow Keys: Change focus without changing selection. "Focus" is the object that will run on Enter. Space toggles selection of the focused item.
· (Letter): Select first found item that begins with (Letter).
· BackSpace: Go up one level to the parent directory.
· Alt + Left: Go back one folder.
· Alt + Right: Go forward one folder.
· Enter: Activate (Double-click) selected item(s).
· Alt + Enter: View properties for selected item.
· F2: Rename selected item(s).
· Ctrl + NumpadPlus: In a Details view, resizes all columns to fit the longest item in each one.
· Delete: Delete selected item(s).
· Shift + Delete: Delete selected item(s); bypass Recycle Bin.
· Ctrl while dragging item(s): Copy.
· Ctrl + Shift while dragging item(s): Create shortcut(s).
· In tree pane, if any:
· Left: Collapse the current selection if expanded, or select the parent folder.
· Right: Expand the current selection if collapsed, or select the first subfolder.
· Numpad Asterisk: Expand currently selected directory and all subdirectories. No undo.
· Numpad Plus: Expand currently selected directory.
· Numpad Minus: Collapse currently selected directory.
Accessibility
· Right Shift for eight seconds: Toggle FilterKeys on and off. FilterKeys must be enabled.
· Left Alt + Left Shift + PrintScreen: Toggle High Contrast on and off. High Contrast must be enabled.
· Left Alt + Left Shift + NumLock: Toggle MouseKeys on and off. MouseKeys must be enabled.
· NumLock for five seconds: Toggle ToggleKeys on and off. ToggleKeys must be enabled.
· Shift five times: Toggle StickyKeys on and off. StickyKeys must be enabled.
· 6.) Microsoft Natural Keyboard with IntelliType Software Installed
· Win + L: Log off Windows.
· Win + P: Open Print Manager.
· Win + C: Open control panel.
· Win + V: Open clipboard.
· Win + K: Open keyboard properties.
· Win + I: Open mouse properties.
· Win + A: Open Accessibility properties.
· Win + Space: Displays the list of Microsoft IntelliType shortcut keys.
· Win + S: Toggle CapsLock on and off.
Remote Desktop Connection Navigation
· Ctrl + Alt + End: Open the NT Security dialog.
· Alt + PageUp: Switch between programs.
· Alt + PageDown: Switch between programs in reverse.
· Alt + Insert: Cycle through the programs in most recently used order.
· Alt + Home: Display start menu.
· Ctrl + Alt + Break: Switch the client computer between a window and a full screen.
· Alt + Delete: Display the Windows menu.
· Ctrl + Alt + NumpadMinus: Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing Alt + PrintScreen on a local computer.
· Ctrl + Alt + NumpadPlus: Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PrintScreen on a local computer.
Mozilla Firefox Shortcuts
· Ctrl + Tab or Ctrl + PageDown: Cycle through tabs.
· Ctrl + Shift + Tab or Ctrl + PageUp: Cycle through tabs in reverse.
· Ctrl + (1-9): Switch to tab corresponding to number.
· Ctrl + N: New window.
· Ctrl + T: New tab.
· Ctrl + L or Alt + D or F6: Switch focus to location bar.
· Ctrl + Enter: Open location in new tab.
· Shift + Enter: Open location in new window.
· Ctrl + K or Ctrl + E: Switch focus to search bar.
· Ctrl + O: Open a local file.
· Ctrl + W: Close tab, or window if there's only one tab open.
· Ctrl + Shift + W: Close window.
· Ctrl + S: Save page as a local file.
· Ctrl + P: Print page.
· Ctrl + F or F3: Open find toolbar.
· Ctrl + G or F3: Find next...
· Ctrl + Shift + G or Shift + F3: Find previous...
· Ctrl + B or Ctrl + I: Open Bookmarks sidebar.
· Ctrl + H: Open History sidebar.
· Escape: Stop loading page.
· Ctrl + R or F5: Reload current page.
· Ctrl + Shift + R or Ctrl + F5: Reload current page; bypass cache.
· Ctrl + U: View page source.
· Ctrl + D: Bookmark current page.
· Ctrl + NumpadPlus or Ctrl + Equals (+/=): Increase text size.
· Ctrl + NumpadMinus or Ctrl + Minus: Decrease text size.
· Ctrl + Numpad0 or Ctrl + 0: Set text size to default.
· Alt + Left or Backspace: Back.
· Alt + Right or Shift + Backspace: Forward.
· Alt + Home: Open home page.
· Ctrl + M: Open new message in integrated mail client.
· Ctrl + J: Open Downloads dialog.
· F6: Switch to next frame. You must have selected something on the page already, e.g. by use of Tab.
· Shift + F6: Switch to previous frame.
· Apostrophe ('): Find link as you type.
· Slash (/): Find text as you type.
Gmail Shortcuts
· Note: Must have "keyboard shortcuts" on in settings.
· C: Compose new message.
· Shift + C: Open new window to compose new message.
· Slash (/): Switch focus to search box.
· K: Switch focus to the next most recent email. Enter or "O" opens focused email.
· J: Switch focus to the next oldest email.
· N: Switch focus to the next message in the "conversation." Enter or "O" expands/collapses messages.
· P: Switch focus to the previous message.
· U: Takes you back to the inbox and checks for new mail.
· Y: Various actions depending on current view:
· Has no effect in "Sent" and "All Mail" views.
· Inbox: Archive email or message.
· Starred: Unstar email or message.
· Spam: Unmark as spam and move back to "Inbox."
· Trash: Move back to "Inbox."
· Any label: Remove the label.
· X: "Check" an email. Various actions can be performed against all checked emails.
· S: "Star" an email. Identical to the more familiar term, "flagging."
· R: Reply to the email.
· A: Reply to all recipients of the email.
· F: Forward an email.
· Shift + R: Reply to the email in a new window.
· Shift + A: Reply to all recipients of the email in a new window.
· Shift + F: Forward an email in a new window.
· Shift + 1 (!): Mark an email as spam and remove it from the inbox.
· G then I: Switch to "Inbox" view.
· G then S: Switch to "Starred" view.
· G then A: Switch to "All Mail" view.
· G then C: Switch to "Contacts" view.
· G then S: Switch to "Drafts" view.
List of F1-F9 Key Commands for the Command Prompt
· F1 / right arrow: Repeats the letters of the last command line, one by one.
· F2: Displays a dialog asking user to "enter the char to copy up to" of the last command line
· F3: Repeats the last command line
· F4: Displays a dialog asking user to "enter the char to delete up to" of the last command line
· F5: Goes back one command line
· F6: Enters the traditional CTRL+Z (^z)
· F7: Displays a menu with the command line history
· F8: Cycles back through previous command lines (beginning with most recent)
· F9: Displays a dialog asking user to enter a command number, where 0 is for first command line entered.
· Alt+Enter: toggle full Screen mode.
· up/down: scroll thru/repeat previous entries
· Esc: delete line
· Note: The buffer allows a maximum of 50 command lines. After this number is reached, the first line will be replaced in sequence.
Helpful accessibility keyboard shortcuts
· Switch FilterKeys on and off. Right SHIFT for eight seconds
· Switch High Contrast on and off. Left ALT +left SHIFT +PRINT SCREEN
· Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK
· Switch StickyKeys on and off. SHIFT five times
· Switch ToggleKeys on and off. NUM LOCK for five seconds
Useful run commands inX.P
You can access all these programs by going through START/RUN or Simply Click Windows Key+r
SQL Client Configuration - cliconfg
System Configuration Editor - sysedit
System Configuration Utility - msconfig
System File Checker Utility (Scan Immediately)- sfc /scannow
System File Checker Utility (Scan Once At Next Boot)- sfc /scanonce
System File Checker Utility (Scan On Every Boot) - sfc /scanboot
System File Checker Utility (Return to Default Setting)- sfc /revert
System File Checker Utility (Purge File Cache)- sfc /purgecache
System File Checker Utility (Set Cache Size to size x)-sfc/cachesize=x
System Information - msinfo32.
Task Manager – taskmgr
System Properties - sysdm.cpl
Task Manager – taskmgr
TCP Tester - tcptest
Telnet Client - telnet
Tweak UI (if installed) - tweakui
User Account Management- nusrmgr.cpl
Utility Manager - utilman
Windows Address Book - wab
Windows Address Book Import Utility - wabmig
Windows Backup Utility (if installed)- ntbackup
Windows Explorer - explorer
Windows Firewall- firewall.cpl
Windows Magnifier- magnify
Windows Management Infrastructure - wmimgmt.msc
Windows Media Player - wmplayer
Windows Messenger - msmsgs
Windows Picture Import Wizard (need camera connected)- wiaacmgr
Windows System Security Tool – syskey
Windows Update Launches - wupdmgr
Windows Version (to show which version of windows)- winver
Windows XP Tour Wizard - tourstart
Wordpad - write
Password Properties - password.cpl
Performance Monitor - perfmon.msc
Phone and Modem Options - telephon.cpl
Phone Dialer - dialer
Pinball Game - pinball
Power Configuration - powercfg.cpl
Printers and Faxes - control printers
Printers Folder – printers
Private Character Editor - eudcedit
Quicktime (If Installed)- QuickTime.cpl
Real Player (if installed)- realplay
Regional Settings - intl.cpl
Registry Editor - regedit
Registry Editor - regedit32
Remote Access Phonebook - rasphone
Remote Desktop - mstsc
Removable Storage - ntmsmgr.msc
Removable Storage Operator Requests - ntmsoprq.msc
Resultant Set of Policy (XP Prof) - rsop.msc
Scanners and Cameras - sticpl.cpl
Scheduled Tasks - control schedtasks
Security Center - wscui.cpl
Services - services.msc
Shared Folders - fsmgmt.msc
Shuts Down Windows - shutdown
Sounds and Audio - mmsys.cpl
Spider Solitare Card Game - spider
Malicious Software Removal Tool - mrt
Microsoft Access (if installed) - access.cpl
Microsoft Chat - winchat
Microsoft Excel (if installed) - excel
Microsoft Frontpage (if installed)- frontpg
Microsoft Movie Maker - moviemk
Microsoft Paint - mspaint
Microsoft Powerpoint (if installed)- powerpnt
Microsoft Word (if installed)- winword
Microsoft Syncronization Tool - mobsync
Minesweeper Game - winmine
Mouse Properties - control mouse
Mouse Properties - main.cpl
Nero (if installed)- nero
Netmeeting - conf
Network Connections - control netconnections
Network Connections - ncpa.cpl
Network Setup Wizard - netsetup.cpl
Notepad - notepad
Nview Desktop Manager (If Installed)- nvtuicpl.cpl
Object Packager - packager
ODBC Data Source Administrator- odbccp32.cpl
On Screen Keyboard - osk
Opens AC3 Filter (If Installed) - ac3filter.cpl
Outlook Express - msimn
Paint – pbrush
Keyboard Properties - control keyboard
IP Configuration (Display Connection Configuration) - ipconfi/all
IP Configuration (Display DNS Cache Contents)- ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents)- ipconfig /flushdns
IP Configuration (Release All Connections)- ipconfig /release
IP Configuration (Renew All Connections)- ipconfig /renew
IP Configuration(RefreshesDHCP&Re-RegistersDNS)-ipconfig/registerdns
IP Configuration (Display DHCP Class ID)- ipconfig/showclassid
IP Configuration (Modifies DHCP Class ID)- ipconfig /setclassid
Java Control Panel (If Installed)- jpicpl32.cpl
Java Control Panel (If Installed)- javaws
Local Security Settings - secpol.msc
Local Users and Groups - lusrmgr.msc
Logs You Out Of Windows - logoff.....
Accessibility Controls - access.cpl
Accessibility Wizard - accwiz
Add Hardware - Wizardhdwwiz.cpl
Add/Remove Programs - appwiz.cpl
Administrative Tools control - admintools
Adobe Acrobat (if installed) - acrobat
Adobe Designer (if installed)- acrodist
Adobe Distiller (if installed)- acrodist
Adobe ImageReady (if installed)- imageready
Adobe Photoshop (if installed)- photoshop
Automatic Updates - wuaucpl.cpl
Bluetooth Transfer Wizard – fsquirt
Calculator - calc
Certificate Manager - certmgr.msc
Character Map - charmap
Check Disk Utility - chkdsk
Clipboard Viewer - clipbrd
Command Prompt - cmd
Component Services - dcomcnfg
Computer Management - compmgmt.msc
Control Panel - control
Date and Time Properties - timedate.cpl
DDE Shares - ddeshare
Device Manager - devmgmt.msc
Direct X Control Panel (If Installed)- directx.cpl
Direct X Troubleshooter- dxdiag
Disk Cleanup Utility- cleanmgr
Disk Defragment- dfrg.msc
Disk Management- diskmgmt.msc
Disk Partition Manager- diskpart
Display Properties- control desktop
Display Properties- desk.cpl
Display Properties (w/Appearance Tab Preselected)- control color
Dr. Watson System Troubleshooting Utility- drwtsn32
Driver Verifier Utility- verifier
Event Viewer- eventvwr.msc
Files and Settings Transfer Tool- migwiz
File Signature Verification Tool- sigverif
Findfast- findfast.cpl
Firefox (if installed)- firefox
Folders Properties- control folders
Fonts- control fonts
Fonts Folder- fonts
Free Cell Card Game- freecell
Game Controllers- joy.cpl
Group Policy Editor (XP Prof)- gpedit.msc
Hearts Card Game- mshearts
Help and Support- helpctr
HyperTerminal- hypertrm
Iexpress Wizard- iexpress
Indexing Service- ciadv.msc
Internet Connection Wizard- icwconn1
Internet Explorer- iexplore
Internet Setup Wizard- inetwiz
Internet Properties- inetcpl.cpl
SQL Client Configuration - cliconfg
System Configuration Editor - sysedit
System Configuration Utility - msconfig
System File Checker Utility (Scan Immediately)- sfc /scannow
System File Checker Utility (Scan Once At Next Boot)- sfc /scanonce
System File Checker Utility (Scan On Every Boot) - sfc /scanboot
System File Checker Utility (Return to Default Setting)- sfc /revert
System File Checker Utility (Purge File Cache)- sfc /purgecache
System File Checker Utility (Set Cache Size to size x)-sfc/cachesize=x
System Information - msinfo32.
Task Manager – taskmgr
System Properties - sysdm.cpl
Task Manager – taskmgr
TCP Tester - tcptest
Telnet Client - telnet
Tweak UI (if installed) - tweakui
User Account Management- nusrmgr.cpl
Utility Manager - utilman
Windows Address Book - wab
Windows Address Book Import Utility - wabmig
Windows Backup Utility (if installed)- ntbackup
Windows Explorer - explorer
Windows Firewall- firewall.cpl
Windows Magnifier- magnify
Windows Management Infrastructure - wmimgmt.msc
Windows Media Player - wmplayer
Windows Messenger - msmsgs
Windows Picture Import Wizard (need camera connected)- wiaacmgr
Windows System Security Tool – syskey
Windows Update Launches - wupdmgr
Windows Version (to show which version of windows)- winver
Windows XP Tour Wizard - tourstart
Wordpad - write
Password Properties - password.cpl
Performance Monitor - perfmon.msc
Phone and Modem Options - telephon.cpl
Phone Dialer - dialer
Pinball Game - pinball
Power Configuration - powercfg.cpl
Printers and Faxes - control printers
Printers Folder – printers
Private Character Editor - eudcedit
Quicktime (If Installed)- QuickTime.cpl
Real Player (if installed)- realplay
Regional Settings - intl.cpl
Registry Editor - regedit
Registry Editor - regedit32
Remote Access Phonebook - rasphone
Remote Desktop - mstsc
Removable Storage - ntmsmgr.msc
Removable Storage Operator Requests - ntmsoprq.msc
Resultant Set of Policy (XP Prof) - rsop.msc
Scanners and Cameras - sticpl.cpl
Scheduled Tasks - control schedtasks
Security Center - wscui.cpl
Services - services.msc
Shared Folders - fsmgmt.msc
Shuts Down Windows - shutdown
Sounds and Audio - mmsys.cpl
Spider Solitare Card Game - spider
Malicious Software Removal Tool - mrt
Microsoft Access (if installed) - access.cpl
Microsoft Chat - winchat
Microsoft Excel (if installed) - excel
Microsoft Frontpage (if installed)- frontpg
Microsoft Movie Maker - moviemk
Microsoft Paint - mspaint
Microsoft Powerpoint (if installed)- powerpnt
Microsoft Word (if installed)- winword
Microsoft Syncronization Tool - mobsync
Minesweeper Game - winmine
Mouse Properties - control mouse
Mouse Properties - main.cpl
Nero (if installed)- nero
Netmeeting - conf
Network Connections - control netconnections
Network Connections - ncpa.cpl
Network Setup Wizard - netsetup.cpl
Notepad - notepad
Nview Desktop Manager (If Installed)- nvtuicpl.cpl
Object Packager - packager
ODBC Data Source Administrator- odbccp32.cpl
On Screen Keyboard - osk
Opens AC3 Filter (If Installed) - ac3filter.cpl
Outlook Express - msimn
Paint – pbrush
Keyboard Properties - control keyboard
IP Configuration (Display Connection Configuration) - ipconfi/all
IP Configuration (Display DNS Cache Contents)- ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents)- ipconfig /flushdns
IP Configuration (Release All Connections)- ipconfig /release
IP Configuration (Renew All Connections)- ipconfig /renew
IP Configuration(RefreshesDHCP&Re-RegistersDNS)-ipconfig/registerdns
IP Configuration (Display DHCP Class ID)- ipconfig/showclassid
IP Configuration (Modifies DHCP Class ID)- ipconfig /setclassid
Java Control Panel (If Installed)- jpicpl32.cpl
Java Control Panel (If Installed)- javaws
Local Security Settings - secpol.msc
Local Users and Groups - lusrmgr.msc
Logs You Out Of Windows - logoff.....
Accessibility Controls - access.cpl
Accessibility Wizard - accwiz
Add Hardware - Wizardhdwwiz.cpl
Add/Remove Programs - appwiz.cpl
Administrative Tools control - admintools
Adobe Acrobat (if installed) - acrobat
Adobe Designer (if installed)- acrodist
Adobe Distiller (if installed)- acrodist
Adobe ImageReady (if installed)- imageready
Adobe Photoshop (if installed)- photoshop
Automatic Updates - wuaucpl.cpl
Bluetooth Transfer Wizard – fsquirt
Calculator - calc
Certificate Manager - certmgr.msc
Character Map - charmap
Check Disk Utility - chkdsk
Clipboard Viewer - clipbrd
Command Prompt - cmd
Component Services - dcomcnfg
Computer Management - compmgmt.msc
Control Panel - control
Date and Time Properties - timedate.cpl
DDE Shares - ddeshare
Device Manager - devmgmt.msc
Direct X Control Panel (If Installed)- directx.cpl
Direct X Troubleshooter- dxdiag
Disk Cleanup Utility- cleanmgr
Disk Defragment- dfrg.msc
Disk Management- diskmgmt.msc
Disk Partition Manager- diskpart
Display Properties- control desktop
Display Properties- desk.cpl
Display Properties (w/Appearance Tab Preselected)- control color
Dr. Watson System Troubleshooting Utility- drwtsn32
Driver Verifier Utility- verifier
Event Viewer- eventvwr.msc
Files and Settings Transfer Tool- migwiz
File Signature Verification Tool- sigverif
Findfast- findfast.cpl
Firefox (if installed)- firefox
Folders Properties- control folders
Fonts- control fonts
Fonts Folder- fonts
Free Cell Card Game- freecell
Game Controllers- joy.cpl
Group Policy Editor (XP Prof)- gpedit.msc
Hearts Card Game- mshearts
Help and Support- helpctr
HyperTerminal- hypertrm
Iexpress Wizard- iexpress
Indexing Service- ciadv.msc
Internet Connection Wizard- icwconn1
Internet Explorer- iexplore
Internet Setup Wizard- inetwiz
Internet Properties- inetcpl.cpl
Vista cursor for XP
Download the given software from given link and follow the instructions:
1. change the installation directory to where ever you want and install
2. click on copy cursors icon in the installed files
3. click on opencp icon and select Aero cursors
1. change the installation directory to where ever you want and install
2. click on copy cursors icon in the installed files
3. click on opencp icon and select Aero cursors
What is Registry???
The Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.
The physical files that make up the registry are stored differently depending on your version of Windows; under Windows 95 & 98 it is contained in two hidden files in your Windows directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional CLASSES.DAT file, while under Windows NT/2000 the files are contained seperately in the %SystemRoot%\System32\Config directory. You can not edit these files directly, you must use a tool commonly known as a "Registry Editor" to make any changes (using registry editors will be discussed later in the article).
The Structure of The Registry
The Registry has a hierarchal structure, although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer.
Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context.
There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows:
* HKEY_CLASSES_ROOT - This branch contains all of your file association mappings to support the drag-and-drop feature, OLE information, Windows shortcuts, and core aspects of the Windows user interface.
* HKEY_CURRENT_USER - This branch links to the section of HKEY_USERS appropriate for the user currently logged onto the PC and contains information such as logon names, desktop settings, and Start menu settings.
* HKEY_LOCAL_MACHINE - This branch contains computer specific information about the type of hardware, software, and other preferences on a given PC, this information is used for all users who log onto this computer.
* HKEY_USERS - This branch contains individual preferences for each user of the computer, each user is represented by a SID sub-key located under the main branch.
* HKEY_CURRENT_CONFIG - This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardware configuration.
* HKEY_DYN_DATA - This branch points to the part of HKEY_LOCAL_MACHINE, for use with the Plug-&-Play features of Windows, this section is dymanic and will change as devices are added and removed from the system.
The physical files that make up the registry are stored differently depending on your version of Windows; under Windows 95 & 98 it is contained in two hidden files in your Windows directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional CLASSES.DAT file, while under Windows NT/2000 the files are contained seperately in the %SystemRoot%\System32\Config directory. You can not edit these files directly, you must use a tool commonly known as a "Registry Editor" to make any changes (using registry editors will be discussed later in the article).
The Structure of The Registry
The Registry has a hierarchal structure, although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer.
Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context.
There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows:
* HKEY_CLASSES_ROOT - This branch contains all of your file association mappings to support the drag-and-drop feature, OLE information, Windows shortcuts, and core aspects of the Windows user interface.
* HKEY_CURRENT_USER - This branch links to the section of HKEY_USERS appropriate for the user currently logged onto the PC and contains information such as logon names, desktop settings, and Start menu settings.
* HKEY_LOCAL_MACHINE - This branch contains computer specific information about the type of hardware, software, and other preferences on a given PC, this information is used for all users who log onto this computer.
* HKEY_USERS - This branch contains individual preferences for each user of the computer, each user is represented by a SID sub-key located under the main branch.
* HKEY_CURRENT_CONFIG - This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardware configuration.
* HKEY_DYN_DATA - This branch points to the part of HKEY_LOCAL_MACHINE, for use with the Plug-&-Play features of Windows, this section is dymanic and will change as devices are added and removed from the system.
Chat with ur frndz through messenger
1. All you need is your friends IP address and your Command Prompt.
2. Open your notepad and write tis code as it is.................. I would prefer you to copy this !
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
3. Now save this as "Messenger.Bat".
4. Drag this file (.bat file)over to Command Prompt and press enter!
5. You would then see some thing like this:
MESSENGER
User:
6. After "User" type the IP address of the computer you want to contact.
7. Before you press "Enter" it should look like this:
MESSENGER
User: IP_Address
Message: Hi, How are you ?
8. Now all you need to do is press "Enter", and start chatting
2. Open your notepad and write tis code as it is.................. I would prefer you to copy this !
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
3. Now save this as "Messenger.Bat".
4. Drag this file (.bat file)over to Command Prompt and press enter!
5. You would then see some thing like this:
MESSENGER
User:
6. After "User" type the IP address of the computer you want to contact.
7. Before you press "Enter" it should look like this:
MESSENGER
User: IP_Address
Message: Hi, How are you ?
8. Now all you need to do is press "Enter", and start chatting
Windows vista requirement
Hardware Requirements
According to Microsoft corp, computers capable of running Windows Vista are classified as Vista Capable and Vista Premium Ready.
A Vista Capable or equivalent PC needs to have at minimum an 800 MHz processor, 512 MB RAM and a DirectX 9 class graphics card. A computer that meets these requirements will be capable of running all editions of Windows Vista although some of the special features and high end graphics options may require additional or more advanced hardware.
A Vista Premium Ready PC will take advantage of Vista's "high-end" features but will need at least a 1.0 GHz processor, 1 GB main memory, and an Aero-compatible graphics card with at least 128 MB graphics memory and supporting the new Windows Display Driver Model. The company also offers Windows Vista Upgrade Advisor from its website to determine the ability of a PC to run Vista in its various guises. The utility runs on Windows XP (with Service Pack 2) and Windows Vista.
Microsoft lists some Vista capable hardware on their website. The "Windows Vista Premium Ready" laptops they specify have Intel Core 2 Duo T5500 or above CPUs and 1 GB memory.
Windows Vista's "Basic" and "Classic" interfaces will work with virtually any graphics hardware that supports Windows XP or 2000; accordingly, most discussion around Vista's graphics requirements centers on those for the Windows Aero interface. As of Windows Vista Beta 2, the NVIDIA GeForce FX family and later, the ATI Radeon 9500 and later, Intel's GMA 950 integrated graphics, and a handful of VIA chipsets and S3 Graphics discrete chips are supported.Though some XGI Technology Volari chips were DirectX 9 (including the Volari V3XT which was available in PCI cards), with XGI's exit from the graphics card business it appears none of its chips are supported as of Vista Beta 2. A PCI Express (PCIe) video card is not a requirement for Windows Aero, but Microsoft recommends PCIe video over an AGP device due to the interface's greater bandwidth. There are some PCI cards available that are compatible with Windows Vista as well.
Windows Vista system requirements
Vista Capable
Processor 800MHz
Memory 512 MB
Graphics card DirectX 9 capable
HDD capacity 20 GB
HDD free space 15 GB
Other drives DVD-ROM
Vista Premium Ready
Processor 1.0 GMHz
Memory 1 GB
Graphics card DirectX 9 capable GPU with Hardware Pixel Shader v2.0 and WDDM driver support
Graphics memory 28 MB RAM supports up to 2,756,000 total pixels (e.g. 1920 × 1200) or 512 MB+ for greater resolutions such as 560x1600
HDD capacity 40 GB
HDD free space 15 GB
Other drives DVD-RW
According to Microsoft corp, computers capable of running Windows Vista are classified as Vista Capable and Vista Premium Ready.
A Vista Capable or equivalent PC needs to have at minimum an 800 MHz processor, 512 MB RAM and a DirectX 9 class graphics card. A computer that meets these requirements will be capable of running all editions of Windows Vista although some of the special features and high end graphics options may require additional or more advanced hardware.
A Vista Premium Ready PC will take advantage of Vista's "high-end" features but will need at least a 1.0 GHz processor, 1 GB main memory, and an Aero-compatible graphics card with at least 128 MB graphics memory and supporting the new Windows Display Driver Model. The company also offers Windows Vista Upgrade Advisor from its website to determine the ability of a PC to run Vista in its various guises. The utility runs on Windows XP (with Service Pack 2) and Windows Vista.
Microsoft lists some Vista capable hardware on their website. The "Windows Vista Premium Ready" laptops they specify have Intel Core 2 Duo T5500 or above CPUs and 1 GB memory.
Windows Vista's "Basic" and "Classic" interfaces will work with virtually any graphics hardware that supports Windows XP or 2000; accordingly, most discussion around Vista's graphics requirements centers on those for the Windows Aero interface. As of Windows Vista Beta 2, the NVIDIA GeForce FX family and later, the ATI Radeon 9500 and later, Intel's GMA 950 integrated graphics, and a handful of VIA chipsets and S3 Graphics discrete chips are supported.Though some XGI Technology Volari chips were DirectX 9 (including the Volari V3XT which was available in PCI cards), with XGI's exit from the graphics card business it appears none of its chips are supported as of Vista Beta 2. A PCI Express (PCIe) video card is not a requirement for Windows Aero, but Microsoft recommends PCIe video over an AGP device due to the interface's greater bandwidth. There are some PCI cards available that are compatible with Windows Vista as well.
Windows Vista system requirements
Vista Capable
Processor 800MHz
Memory 512 MB
Graphics card DirectX 9 capable
HDD capacity 20 GB
HDD free space 15 GB
Other drives DVD-ROM
Vista Premium Ready
Processor 1.0 GMHz
Memory 1 GB
Graphics card DirectX 9 capable GPU with Hardware Pixel Shader v2.0 and WDDM driver support
Graphics memory 28 MB RAM supports up to 2,756,000 total pixels (e.g. 1920 × 1200) or 512 MB+ for greater resolutions such as 560x1600
HDD capacity 40 GB
HDD free space 15 GB
Other drives DVD-RW
Yahoo multiple log-in
You can login with multiple id's on the same yahoo messenger without any download or patch .
Follow these steps :
1. Go to Start ----> Run . Type regedit, then enter .
2.Navigate to HKEY_CURRENT_USER --------> Software --->yahoo ----->pager---->Test
3.On the right page , right-click and choose new Dword value .
4.Rename it as Plural.
5.Double click and assign a decimal value of 1.
Its done!!
Now close registry and restart yahoo messenger and try Multiple Login
Follow these steps :
1. Go to Start ----> Run . Type regedit, then enter .
2.Navigate to HKEY_CURRENT_USER --------> Software --->yahoo ----->pager---->Test
3.On the right page , right-click and choose new Dword value .
4.Rename it as Plural.
5.Double click and assign a decimal value of 1.
Its done!!
Now close registry and restart yahoo messenger and try Multiple Login
Create a H.D.D to N.T.F.S
Your hard drive must be formatted with a file system such as FAT, FAT32 or NTFS so that Windows can be installed on to it. This system determines how files are named, organised and stored on the drive. If you’re not using it already, NTFS (New Technology File System) is recommended for Windows XP because of the additional functionality it offers. If your PC came with Windows XP pre-installed then there’s a chance that you’re already using NTFS. If you’ve upgraded from Windows 98 or Windows Me you may still be using FAT or FAT 32. The option to change over to NTFS would have been available during the upgrade process. Don’t worry if you skipped this as it’s possible to convert at any time from within Windows XP without losing any data.
The recommended option
There are a number of features in Windows XP that will only work if the NTFS file system is present, which is why it’s suggested you make use of it. File and folder permissions, encryption and privacy options are just some of those you’ll be able to access. In particular, those of you who have set up user accounts will find NTFS invaluable. For instance, if you continue to use FAT or FAT32 anyone with physical access to the drive will be able to access the files and folders that are stored there. However, with NTFS you’ll be able to use a level of encryption (Professional Edition only) that will enable you to protect your data.
You’ll also find NTFS more reliable in that it’s more able to recover from disk errors than its FAT or FAT32 counterparts. A log of all disk activity is kept so should a crash occur, Windows XP can use this information to repair the file system when your PC boots up again. To find out what file system you’re using, open My Computer, right-click your main hard drive and choose Properties. Take a look at the General tab to see confirmation of the file system that’s in use.
Convert now
You can use the convert tool in Windows XP to change the file system on your hard disk from FAT or FAT32 to NTFS. The whole process is safe and your existing data won’t be destroyed. To begin, click Start -> Run, type cmd and press [Return]. At the command prompt type convert c: /fs:ntfs and press [Return] (where ‘c’ is the letter of the drive you’re converting). When you try and run the convert utility, it’s likely that Windows XP will be using your paging file so the process won’t be completed immediately. Therefore, you’ll see a brief message on screen informing you that the conversion will take place instead the next time Windows starts up. Having restarted, the Check Disk utility will run, the conversion will be performed automatically and you may find that your PC will reboot twice more.
The benefits
With your drive now running NTFS, it’s time to take advantage of the new options that are available. Having created a number of different user accounts you can now control the level of access that’s granted to individual users. For example, there are going to be certain files and folders that you’ll want some users to be able to access but not others. If you have Windows XP Professional Edition you can do this immediately.
Right-click any file or folder, choose Properties and select the Security tab. A dialog will be displayed showing the names of all your users. Alongside will be two columns which enable you to select levels of access for each of them, the permissions include Full Control, Modify, Read and Write. You can then check the appropriate box to determine whether or not to Allow or Deny a particular permission. For Windows XP Home Edition users, the Security tab won’t be immediately available. To access this option you’ll need to restart your PC, pressing [F8] until a menu appears. Next select Safe Mode and wait for Windows XP to start up. You can then set your options in the same way.
Another feature is NTFS compression. It’s quick and seamless as your file or folder is decompressed automatically when you access it. (Don’t confuse this with a Zip compression utility where the files need to be extracted before they can be accessed.) Although you may have used NTFS compression on a file or folder, there’s no way of telling just by looking at it. To remedy this, open My Computer, click Tools -> Folder Options and select the View tab. Under Advanced settings, scroll down and check the option ‘Show encrypted or compressed NTFS files in color’, then click Apply and OK. Take a look at your compressed items in My Computer and you’ll see the text label has changed from black to blue. Something else that’s exclusive to Professional Edition users is the Encrypting File System (EFS). You can use this to protect your important data so that no one else can read it. Your encrypted files and folders will only be accessible when you have logged into your user account successfully.
The recommended option
There are a number of features in Windows XP that will only work if the NTFS file system is present, which is why it’s suggested you make use of it. File and folder permissions, encryption and privacy options are just some of those you’ll be able to access. In particular, those of you who have set up user accounts will find NTFS invaluable. For instance, if you continue to use FAT or FAT32 anyone with physical access to the drive will be able to access the files and folders that are stored there. However, with NTFS you’ll be able to use a level of encryption (Professional Edition only) that will enable you to protect your data.
You’ll also find NTFS more reliable in that it’s more able to recover from disk errors than its FAT or FAT32 counterparts. A log of all disk activity is kept so should a crash occur, Windows XP can use this information to repair the file system when your PC boots up again. To find out what file system you’re using, open My Computer, right-click your main hard drive and choose Properties. Take a look at the General tab to see confirmation of the file system that’s in use.
Convert now
You can use the convert tool in Windows XP to change the file system on your hard disk from FAT or FAT32 to NTFS. The whole process is safe and your existing data won’t be destroyed. To begin, click Start -> Run, type cmd and press [Return]. At the command prompt type convert c: /fs:ntfs and press [Return] (where ‘c’ is the letter of the drive you’re converting). When you try and run the convert utility, it’s likely that Windows XP will be using your paging file so the process won’t be completed immediately. Therefore, you’ll see a brief message on screen informing you that the conversion will take place instead the next time Windows starts up. Having restarted, the Check Disk utility will run, the conversion will be performed automatically and you may find that your PC will reboot twice more.
The benefits
With your drive now running NTFS, it’s time to take advantage of the new options that are available. Having created a number of different user accounts you can now control the level of access that’s granted to individual users. For example, there are going to be certain files and folders that you’ll want some users to be able to access but not others. If you have Windows XP Professional Edition you can do this immediately.
Right-click any file or folder, choose Properties and select the Security tab. A dialog will be displayed showing the names of all your users. Alongside will be two columns which enable you to select levels of access for each of them, the permissions include Full Control, Modify, Read and Write. You can then check the appropriate box to determine whether or not to Allow or Deny a particular permission. For Windows XP Home Edition users, the Security tab won’t be immediately available. To access this option you’ll need to restart your PC, pressing [F8] until a menu appears. Next select Safe Mode and wait for Windows XP to start up. You can then set your options in the same way.
Another feature is NTFS compression. It’s quick and seamless as your file or folder is decompressed automatically when you access it. (Don’t confuse this with a Zip compression utility where the files need to be extracted before they can be accessed.) Although you may have used NTFS compression on a file or folder, there’s no way of telling just by looking at it. To remedy this, open My Computer, click Tools -> Folder Options and select the View tab. Under Advanced settings, scroll down and check the option ‘Show encrypted or compressed NTFS files in color’, then click Apply and OK. Take a look at your compressed items in My Computer and you’ll see the text label has changed from black to blue. Something else that’s exclusive to Professional Edition users is the Encrypting File System (EFS). You can use this to protect your important data so that no one else can read it. Your encrypted files and folders will only be accessible when you have logged into your user account successfully.
Track an ip address by sending an e-mail
How to get IP address Just by sending an email:
First of all you need a mail tracking system for tracing the IP of a person sending you an email
www.mailtracking .com has ready set up of IP tracing.
This gives you a free account.
You can connect it with your current email account
When you send email to someone named abc@gmail.com, you simply have to add mailtracking.com to it.
As shown here: abc@gmail.com.mailtracking.com
Now when Your message is opened by the receiver, you‘ll get email to you .
It describes following things to you
1.IP address of receiver,
2.His approximate geographical location,
3.Time of opening the email
4.His browser details
5.His screen resolution
And many more details as this.
Now every time he opens your massage you’ll be notified
So finally by using this site you can simply get IP address of any person whose email address is known.
And good thing is the receiver can’t even notice that we are tracing him.
First of all you need a mail tracking system for tracing the IP of a person sending you an email
www.mailtracking .com has ready set up of IP tracing.
This gives you a free account.
You can connect it with your current email account
When you send email to someone named abc@gmail.com, you simply have to add mailtracking.com to it.
As shown here: abc@gmail.com.mailtracking.com
Now when Your message is opened by the receiver, you‘ll get email to you .
It describes following things to you
1.IP address of receiver,
2.His approximate geographical location,
3.Time of opening the email
4.His browser details
5.His screen resolution
And many more details as this.
Now every time he opens your massage you’ll be notified
So finally by using this site you can simply get IP address of any person whose email address is known.
And good thing is the receiver can’t even notice that we are tracing him.
Subscribe to:
Posts (Atom)