tag:blogger.com,1999:blog-76228522619469391942024-03-04T20:42:26.421-08:00EthicalHackingprismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.comBlogger47125tag:blogger.com,1999:blog-7622852261946939194.post-8694257882912500952015-12-21T04:34:00.001-08:002015-12-21T04:34:44.209-08:00MMM Paid Me Daily <div dir="ltr" style="text-align: left;" trbidi="on">
MMM paid me on daily basis its a perfect opportunity of time This community is beyond words, I am so greatful that MMM have included
us into their family of countries to uplift this community out of
poverty and to become financially free of the banking system, Yahoo Viva
MMM.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbNASapmHqiPKR-ryF8sfAmATndFjRSg_ZtwFIEbZFM_HLeLWhtsMljad375kaQb_Xjt6cCOq-8Qm9Wn-sbyWsrAMUyCvYKyXsXk37HsdJD-lod-G5nRctPi1pRlPdp6ZuNFi52ImbcvM/s1600/mmm.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbNASapmHqiPKR-ryF8sfAmATndFjRSg_ZtwFIEbZFM_HLeLWhtsMljad375kaQb_Xjt6cCOq-8Qm9Wn-sbyWsrAMUyCvYKyXsXk37HsdJD-lod-G5nRctPi1pRlPdp6ZuNFi52ImbcvM/s320/mmm.jpg" width="320" /></a></div>
</div>
prismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-49267873433357432492009-08-27T11:01:00.000-07:002009-08-27T11:26:33.002-07:00How to hack Rapid share and Mega uploadHi all, This is for those who have to wait for about an hour after downloading certain amount of stuff from rapid share. To overcome this time constraint follow these steps:<br />mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.<br /><br /><br /><br />RAPID SHARE<br /><br /><br />mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.<br /><br />Method 1<br /><br />1.open your rapid share link<br />2.then click on free.<br />3.As soon as timer start type this in address bar and click enter<br />javascript:alert(c=0)<br />4.a pop up message will come click ok your counter is zero just download the stu<br />mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.<br /><br />Method 2<br /><br />1.Delete the cookies in your browser internet explorer or Firefox or opera or whatever u use).<br />2.Press start->run,type cmd.<br />3.In the command prompt,type ipconfig/flushdns press enter.Then type ipconfig/release,then ipconfig/renew .Now type exit.<br />4.Now try downloading, for many people this may work if their ISP provides a dynamic ip.<br />mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.<br /><br />Method 3<br /><br />1.Just switch off your router or modem) and switch it back on.<br />2.This may work for some users Mtnl and Bsnl) and maybe some others too.<br /><br />Actually these methods generally work for those people whose ISP gives them dynamic ip.<br />If these don't work then one more thing that can be done is to use proxies.<br />mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.<br /><br /><br />MEGA UPLOAD<br /><br /><br />mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.<br />Mega upload is very easy to hack to solve the download slots problem). Just go to http://<a href="http://leech.megaleecher.net/">leech.megaleecher.net/</a><br />Here you will find a place to put your original link. Put it there press enter and then you will get a direct link within some seconds. You are done!!!!!prismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-65515376065388259522009-08-19T15:23:00.000-07:002009-08-19T15:28:11.936-07:00Username and password of NOD32 AntivirusUsername:EAV-08784929<br />Password:2b6u8efpx7<br />Username:EAV-08784931<br />Password:tm6xdk62wd<br />Username:EAV-08802249<br />Password:jh6mmse65c<br />Username:EAV-08802242<br />Password:2etv8t36dc<br />Username:EAV-08676150<br />Password:56s67pjsfa<br />Username:EAV-08654491<br />Password:tx6rre3bbw<br />Username:EAV-08653425<br />Password:t6uhv4hfmkprismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-39737381545489824112009-08-19T13:16:00.000-07:002009-08-21T09:57:35.368-07:00CISCO scurity auditing tools<strong>CPFPC</strong><br /><br /><a href="http://www.oxid.it/cpfpc.html">http://www.oxid.it/cpfpc.html</a><br /><br />CISCO PIX FIREWALL PASSWORD CALCULATOR) PRODUCES THE ENCRYPTED FORM OF CISCO PIX ENABLE MODE PASSWORDS WITHOUT THE NEED TO ACCESS THE DEVICE.<br /><br /><strong>ULTIMA RATIO</strong><br /><a href="http://www.phenoelit.de/ultimaratio/index.html"><br />http://www.phenoelit.de/ultimaratio/index.html</a><br /><br />A REMOTE CISCO IOS EXPLOIT<br /><br /><strong>NIPPER</strong><br /><br /><a href="http://sourceforge.net/projects/nipper">http://sourceforge.net/projects/nipper</a><br /><br />NIPPER IS A NETWORK INFRASTRUCTURE CONFIGURATION PARSER. NIPPER TAKES A NETWORK INFRASTRUCTURE DEVICE CONFIGURATION, PROCESSES THE FILE AND DETAILS SECURITY-RELATED ISSUES WITH THE CONFIGURATION TOGETHER WITH DETAILED RECOMMENDATIONS. NIPPER WAS PREVIOUS KNOWN AS CISCOPARSE. NIPPER CURRENTLY SUPPORTS CISCO SWITCHES (IOS), CISCO ROUTERS (IOS), CISCO FIREWALLS (PIX/ASA/FWSM) AND JUNIPER NETSCREEN (SCREENOS). OUTPUT IS IN HTML, LATEX, XML AND TEXT. ENCRYPTED PASSWORDS CAN BE OUTPUT TO A JOHN-THE-RIPPER FILE FOR STRENGTH TESTING.<br /><br /><strong>VOMIT</strong><br /><br /><a href="http://http://vomit.xtdnet.nl">http://vomit.xtdnet.nl/</a><br /><br />THE VOMIT UTILITY CONVERTS A CISCO IP PHONE CONVERSATION INTO A WAVE FILE THAT CAN BE PLAYED WITH ORDINARY SOUND PLAYERS. VOMIT REQUIRES A TCPDUMP OUTPUT FILE.<br /><br /><strong>CISCO GLOBAL EXPLOITER</strong><br /><a href="http://packetstormsecurity.org/0405-exploits/cge-13.tar.gz">http://packetstormsecurity.org/0405-exploits/cge-13.tar.gz</a><br /><br />CISCO GLOBAL EXPLOITER IS A TOOL THAT DEMONSTRATES EXPLOITATION OF THE CISCO 677/678 TELNET BUFFER OVERFLOW VULNERABILITY, IOS ROUTER DENIAL OF SERVICE VULNERABILITY, IOS HTTP AUTH VULNERABILITY AND CISCO IOS HTTP CONFIGURATION ARBITRARY ADMINISTRATIVE ACCESS VULNERABILITY, CISCO CATALYST SSH PROTOCOL MISMATCH DENIAL OF SERVICE VULNERABILITY, CISCO 675 WEB ADMINISTRATION DENIAL OF SERVICE VULNERABILITY, CISCO CATALYST 3500 XL REMOTE ARBITRARY COMMAND VULNERABILITY, CISCO IOS SOFTWARE HTTP REQUEST DENIAL OF SERVICE VULNERABILITY, CISCOSECURE ACS FOR WINDOWS NT SERVER DENIAL OF SERVICE VULNERABILITY, CISCO CATALYST MEMORY LEAK VULNERABILITY, CISCO CATOS CISCOVIEW HTTP SERVER BUFFER OVERFLOW VULNERABILITY, %U ENCODING IDS BYPASS VULNERABILITY (UTF), AND CISCO IOS HTTP DENIAL OF SERVICE VULNERABILITY.<br /><br /><strong>CISTO</strong><br /><a href="http://http://sourceforge.net/projects/cisto/"><br />http://sourceforge.net/projects/cisto/</a><br /><br />CISTO (CISCO SCRIPT TOOL) TOOL FOR MANAGING CISCO DEVICES (IOS, CATOS). ALLOWS TO GET CONFIGS, DO CONFIGURATION, INSTALL NEW IMAGES, CHANGE PASSWORDS, DO SINGLE OR LIST OF SHOW COMMANDS AND LOTS MORE FOR A GIVEN LIST OF DEVICES (RUNNING PARALLEL PROZ.)<br /><br /><strong>SWITCHMAP</strong><br /><br /><a href="http://http://sourceforge.net/projects/switchmap/">http://sourceforge.net/projects/switchmap/</a><br /><br /><strong>EXAMPLE CAPTURES ARE LOCATED HERE:</strong><br /><br /><a href="http://switchmap.sourceforge.net/portlists/">http://switchmap.sourceforge.net/portlists/</a>SWITCHMAP IS A PERL PROGRAM THAT CREATES HTML PAGES THAT SHOW INFORMATION ABOUT A SET OF CISCO ETHERNET SWITCHES. THIS PROGRAM USES SNMP TO GATHER DATA FROM THE SWITCHES.<br /><br /><strong>RANCID</strong><br /><br /><a href="http://www.shrubbery.net/rancid/">http://www.shrubbery.net/rancid/</a><br /><br />RANCID MONITORS A ROUTER'S (OR MORE GENERALLY A DEVICE'S) CONFIGURATION, INCLUDING SOFTWARE AND HARDWARE (CARDS, SERIAL NUMBERS, ETC) AND USES CVS (CONCURRENT VERSION SYSTEM) OR SUBVERSION TO MAINTAIN HISTORY OF CHANGES.<br /><strong><br />RANCID DOES THIS BY THE VERY SIMPLE PROCESS SUMMARIZED HERE:</strong><br /><br /><br />LOGIN TO EACH DEVICE IN THE ROUTER TABLE (ROUTER.DB),<br />RUN VARIOUS COMMANDS TO GET THE INFORMATION THAT WILL BE SAVED,<br />COOK THE OUTPUT; RE-FORMAT, REMOVE OSCILLATING OR INCREMENTING DATA,<br />EMAIL ANY DIFFERENCES (SAMPLE) FROM THE PREVIOUS COLLECTION TO A MAIL LIST,<br />AND FINALLY COMMIT THOSE CHANGES TO THE REVISION CONTROL SYSTEM<br />RANCID ALSO INCLUDES LOOKING GLASS SOFTWARE. IT IS BASED ON ED KERN'S LOOKING GLASS WHICH WAS ONCE USED FOR HTTP://NITROUS.DIGEX.NET/, FOR THE OLD-SCHOOL FOLKS WHO REMEMBER IT. OUR VERSION HAS ADDED FUNCTIONS, SUPPORTS CISCO, JUNIPER, AND FOUNDRY AND USES THE LOGIN SCRIPTS THAT COME WITH RANCID; SO IT CAN USE TELNET OR SSH TO CONNECT TO YOUR DEVICES(S).<br /><br />RANCID CURRENTLY SUPPORTS CISCO ROUTERS, JUNIPER ROUTERS, CATALYST SWITCHES, FOUNDRY SWITCHES, REDBACK NASS, ADC EZT3 MUXES, MRTD (AND THUS LIKELY IRRD), ALTEON SWITCHES, AND HP PROCURVE SWITCHES AND A HOST OF OTHERS.<br />RANCID IS KNOWN TO BE USED AT: AOL, GLOBAL CROSSING, MFN, NTT AMERICA, CERTAINTY SOLUTIONS INC.<br /><br /><strong>SIPTIGER</strong><br /><br /><a href="http://www.vovida.org/applications/downloads/siptiger">http://www.vovida.org/applications/downloads/siptiger</a><br /><br />SIPTIGER IS A WEB-BASED PROVISIONING UTILITY FOR CISCO'S LINE OF 7960 AND 7940 SESSION INITIATION PROTOCOL (SIP) IP PHONES AND CISCO SIP PROXY SERVERS (CSPS). THIS UTILITY IS USEFUL FOR ANYONE DEPLOYING CISCO 7960/7940 SIP IP PHONES.<br /><br /><strong>IOSTACK.PL</strong><br /><br /><a href="http://www.phenoelit-us.org/ultimaratio/IOStack2.tgz">http://www.phenoelit-us.org/ultimaratio/IOStack2.tgz</a><br /><br />IOSTACK.PL IS A SCRIPT TO READ OUT IOS STACK RETURN ADDRESS LOCATIONS.<br /><br /><strong>CISCO ROUTER PASSWORD DECODER</strong><br /><br /><a href="http://www.loud-fat-bloke.co.uk/tools/ciscopass.txt">http://www.loud-fat-bloke.co.uk/tools/ciscopass.txt</a><br /><br />Simple little perl script to decode router passwords.prismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-21466840790934394092009-08-19T12:35:00.000-07:002009-08-19T12:37:12.959-07:00Run real Cisco IOS on your PCOne of my coworkers pointed this out to me the other day. It looks like a realy good resource to run real Cisco IOS on your PC via a emulator (NOT simulator).<br /><br />Check it out Here where they have some config files already made (<a href="http://">http://www.internetworkexpert.com/resources/iosonpc.htm</a>). and here for the actual emulator. (<a href="http://">http://dyna-gen.sourceforge.net/</a>)<br /><br />You can create Serial, ethernet and other interfaces, and either bridge them to your network interface(s) on your PC or directly to each other (no need for physical interface.)<br /><br />For those people looking to build their own Cisco lab this may be a good substituteprismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-8747280797458440982009-08-19T12:32:00.000-07:002009-08-19T12:33:42.160-07:00Hide file extension for key loggerThis is a good trick to hide your exe files into a jpg file..!<br />How about sending a trojan or a keylogger into your victim using this trick..??<br /><br />1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.<br />Basically what you need is to see hidden files and see the extension of all your files on your pc.<br /><br />2) Paste a copy of your server on the new created folder. let's say it's called 'server.exe' (that's why you need the extension of files showing, cause you need to see it to change it)<br /><br />3) Now you’re going to rename this 'server.exe' to whatever you want, let’s say for example 'picture.jpeg'<br /><br />4) Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES.<br /><br />5) Now create a shortcut of this 'picture.jpeg' in the same folder.<br /><br />6) Now that you have a shortcut, rename it to whatever you want, for example, 'me.jpeg'.<br /><br />7) Go to properties (on file me.jpeg) and now you need to do some changes there.<br /><br />8) First of all delete all the text on field 'Start In' and leave it empty.<br /><br />9) Then on field 'Target' you need to write the path to open the other file (the server renamed 'picture.jpeg') so you have to write this :-<br />'C:\WINDOWS\system32\cmd.exe /c picture.jpeg'<br /><br />10) The last field, 'c picture.jpeg' is always the name of the first file. If you called the first file 'soccer.avi' you gotta write 'C:\WINDOWS\system32\cmd.exe /c soccer.avi'. <br />11) So what you’re doing is when someone clicks on 'me.jpeg', a cmd will execute the other file 'picture.jpeg' and the server will run.<br />12) On that file 'me.jpeg' (shortcut), go to properties and you have an option to change the icon. Click that and a new window will pop up and you have to write this :-<br />%SystemRoot%\system32\SHELL32.dll . Then press OK.<br />13) You can set the properties 'Hidden' for the first file 'picture.jpeg' if you think it’s better to get a connection from someone.<br />14) But don’t forget one thing, these 2 files must always be together in the same folder and to get connected to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.<br />15) For me for example I always want the shortcut showing first so can be the first file to be opened. So I rename the server to 'picture2.jpeg' and the shortcut to 'picture1.jpeg'.<br />This way the shortcut will show up first. If you set hidden properties to the server 'picture.jpeg' then you don’t have to bother with this detail but I’m warning you, the hidden file will always show up inside of a Zip or a Rar file.<br />16) So the best way to send these files together to someone is compress them into Zip or Rar.<br />17) inside the Rar or Zip file you can see the files properties and even after all this work you can see that the shortcut is recognized like a shortcut but hopefully the person you sent this too doesn’t know that and is going to open it.prismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-46939254020203306892009-08-19T12:28:00.001-07:002009-08-19T12:30:12.468-07:00Class Identifier of folders in XPThe batch file basically renames the folder with name abc to abc.{21EC2020-3AEA-1069-A2DD-08002B30309D}. So instead of writing a batch file you can directly rename a folder by appending given number.<br /><br />The numbers specified after the folder name is actually CLSID (Class Identifier) of folder and the number in particular used here is GUID for Control Panel. That’s why when you try to open the folder after renaming, it opens the Control Panel. Also the icon is also of Control panel. Some other similar CLSIDs that can be used are:<br /><br />.{450D8FBA-AD25-11D0-98A8-0800361B1103} - My Documents<br />.{20D04FE0-3AEA-1069-A2D8-08002B30309D} - My Computer<br />.{2227A280-3AEA-1069-A2DE-08002B30309D} - Printers<br />.{645FF040-5081-101B-9F08-00AA002F954E} - Recycle Bin<br />.{FBF23B42-E3F0-101B-8488-00AA003E56F8} - Internet Explorer<br />.{FF393560-C2A7-11CF-BFF4-444553540000} - History<br /><br />And there are many more. You can find more CLSIDs under [HKEY_CLASSES_ROOT\CLSID\], including the above specified CLSIDs.<br /><br />Though the folders are not included in the search, but you can still get the details of files and folders inside it. Suppose you folder was abc and you renamed it to abc.{21EC2020-3AEA-1069-A2DD-08002B30309D}. And consider the folder is present in C drive. Go to comand prompt, at c drive and try dir command<br /><br />c:\>dir<br /><br />It will display all the folders in current directory including you folder with name abc.{21EC2020-3AEA-1069-A2DD-08002B30309D} not just abc. Now try<br /><br />c:\>cd abc.{21EC2020-3AEA-1069-A2DD-08002B30309D}<br />c>\abc.{21EC2020-3AEA-1069-A2DD-08002B30309D}>dir<br /><br />It will list all the files and directory present under that folder.prismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-39813260478849386062009-08-19T12:15:00.000-07:002009-08-19T12:19:38.738-07:00Use your Windows KeyThe Windows logo key, located in the bottom row of most computer keyboards is a little-used treasure. Don”t ignore it. It is the shortcut anchor for the following commands:<br /><br />Windows: Display the Start menu<br />Windows + D: Minimize or restore all windows<br />Windows + E: Display Windows Explorer<br />Windows + F: Display Search for files<br />Windows + Ctrl + F: Display Search for computer<br />Windows + F1: Display Help and Support Center<br />Windows + R: Display Run dialog box<br />Windows + break: Display System Properties dialog box<br />Windows + shift + M: Undo minimize all windows<br />Windows + L: Lock the workstation<br />Windows + U: Open Utility Manager<br />Windows + Q: Quick switching of users (Powertoys only)<br />Windows + Q: Hold Windows Key, then tap Q to scroll thru the different users on your pcprismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-18539659543679934012009-08-19T12:09:00.000-07:002009-08-21T10:02:54.044-07:00How to modify *.exe files1) Don't try to modify a prog by editing his source in a dissasembler.Why?<br />Cause that's for programmers and assembly experts only.<br /><br />try to view it in hex you'll only get tons of crap you don't understand.<br />First off, you need Resource Hacker(last version). It's a resource editor-<br />very easy to use, You can download it at <br /><br /><a href="http://www.users.on.net/johnson/resourcehacker/">http://www.users.on.net/johnson/resourcehacker/</a><br /><br />2) Unzip the archive, and run ResHacker.exe. You can check out the help file too<br /><br /><br />3) You will see that the interface is simple and clean. Go to the menu FileOpen or press Ctrl+O to open a file. Browse your way to the file you would like to edit. You can edit *.exe, *.dll, *.ocx, *.scr and *.cpl files, but this tutorial is to teach you how to edit *.exe files, so open one.<br /><br />4) In the left side of the screen a list of sections will appear.<br />The most common sections are<br />-String table;<br />-RCData;<br />-Dialog;<br />-Cursor group;<br />-Bitmap;<br />-WAV.<br />*Icon: You can wiew and change the icon(s) of the program by double-clicking the icon section,chossing the icon, right-clicking on it an pressing "replace resource". After that you can choose the icon you want to replace the original with.<br />*String table: a bunch of crap, useful sometimes, basic programming knowladge needed.<br />*RCData: Here the real hacking begins. Modify window titles, buttons, text, and lots more!<br />*Dialog:Here you can modify the messages or dialogs that appear in a program. Don't forget to press "Compile" when you're done!<br />*Cursor group: Change the mouse cursors used in the program just like you would change the icon.<br />*Bitmap: View or change images in the programs easy!<br />*WAV:Change the sounds in the prog. with your own.<br /><br /><br />5) In the RCData,Dialog,Menu and String table sections you can do a lot of changes. You can modify or translate the text change links, change buttons, etc.<br /><br /><br />TIP: To change a window title, search for something like: CAPTION "edit this".<br />TIP: After all operations press the "Compile Script" button, and when you're done editing save, your work @ FileSave(Save as).<br />TIP: When you save a file,the original file will be backed up by default and renamed to Name_original and the saved file will have the normal name of the changed prog.<br />TIP: Sometimes you may get a message like: "This program has a non-standard resource layout... it has probably been compressed with an .EXE compressor." That means that Resource Hacker can't modify it because of it's structure.prismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-88402856059158891382009-08-19T12:06:00.000-07:002009-08-19T12:09:35.669-07:00How to Hide file in JPGHide Your Files In A JPEG !!Well, did you know you could hide your files in a JPEG file? For this, you will only need to download WinRAR. You just need to have a little knowledge about Command Prompt and have WinRAR installed.<br /><br />Ok, lets begin…<br /><br />1. Gather all the files that you wish to hide in a folder anywhere in your PC (make it in C:\hidden - RECOMMENDED).<br /><br />2. Now, add those files in a RAR archive (e.g. secret.rar). This file should also be in the same directory (C:\hidden).<br /><br />3. Now, look for a simple JPEG picture file (e.g. logo.jpg). Copy/Paste that file also in C:\hidden.<br /><br />4. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.<br /><br />5. Now type: “COPY /b logo.jpg + secret.rar output.jpg” (without quotes) - Now, logo.jpg is the picture you want to show, secret.rar is the file to be hidden, and output.jpg is the file which contains both. :D<br /><br />6. Now, after you have done this, you will see a file output.jpg in C:\hidden. Open it (double-click) and it will show the picture you wanted to show. Now try opening the same file with WinRAR, it will show the hidden archive .prismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-69799445601110212142009-08-19T12:04:00.000-07:002009-08-19T12:06:12.973-07:00How to add URL in address barYou can add an Internet URL address bar to your Windows XP taskbar. Doing so will let you type in URLs and launch Web pages without first launching a browser. It will also let you launch some native Windows XP applications in much the same way as you would via the Run menu (so you could type in calc to launch the calculator or mspaint to launch Microsoft Paint. Here's how you add the address bar:<br /><br />1. Right-click on the taskbar, select Toolbars, and then click Address.<br /><br />2. The word Address will appear on your taskbar.<br /><br />3. Double click it to access it.<br /><br />4. If that doesn't work, your taskbar is locked. You can unlock it by right-clicking on the taskbar again and uncheck Lock the Taskbar.<br /><br />NOTE: You may also need to grab the vertical dotted lines beside the word Address and drag it to the left to make the Address window appear.prismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-60742161063004896882009-08-19T11:56:00.000-07:002009-08-19T12:02:59.755-07:00Create Folders And Files With NO! NameThis trick will allow you to create files and folders without any name.<br /><br />Just follow the following steps:<br />1.Select any file or folder.<br />2.Right click on it, press rename or simply press F2.<br />3.Press and hold the alt key. While holding the Alt key, type numbers 0160 from the numpad.<br /><br />Note: Type the numbers 0160 from the numpad, that is, the numbers present on the right side of the keyboard. Don't type the numbers which are present on top of the character keys.<br /><br />4.Press Enter and the nameless file or folder will be created.<br /><br />Reason: The file or folder that seems nameless is actually named with a single space.<br /><br />But what if you want to create another nameless file or folder in the same directory ?<br /><br />For this you will have to rename the file with 2 spaces. Just follow these steps below:<br /><br />1.Select file, press F2.<br />2.Hold alt key and type 0160 from the numpad.<br />3.Release the alt key. Now without doing anything else, again hold alt key and press 0160.<br />4.Press enter and you will have second nameless file in the same directory.<br />5.Repeat step 3 to create as many nameless files or folders in the same directory.<br /><br />(we've had a problem with deleting these folders, to do so, start your computer in safe mode and delete it from there.)prismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-8643953475210216192009-08-19T11:43:00.000-07:002009-08-19T11:51:06.743-07:00How to speed up slow computer/pcI see a lot of Windows users always complain "My computer/pc is too slow. How to speed up my pc speed performance?" and they need a new PC. Upgrading the PC is always a viable option for better performance, but here are things that you can do to keep your PC healthy and i am sure this will help you to make your PC faster. But changing pc everytime is a costly affair and hence i have listed below 10 perfect ways to help you improve your computer speed performance. Thus, you will be able to speed up your computer/pc for free.<br /><br />The last time u installed Windows it worked very smoothly on your first boot right? The boot process was faster, applications were running quickly and smoothly, no errors. Now why does it takes such a long time to boot and takes lot of memory? What can i possibly do to restore my PC that earlier state?<br />Speed up windows computerThe answer is pretty simple. You have to take care of your pc and tweak a bit. Overclocking your PC is an option to try at your own risk which i don’t recommend hence not discussing in this post. You only have to understand why your pc is slowing down and do things to prevent from slowing down.<br /><br />Here are 10 simple ways to speed your PC:<br /><br /><strong>1. Using an Anti-Virus, Spyware and Adware removal program:</strong><br />If you use Internet frequently, chances are that you pc is infected by any adware or spyware if you not using a good anti virus/anti-malware program. Most adware’s and spywares open multiple connections to access internet spreading infection all over the web. This may slow down your pc, other harmful viruses might crunch your memory and system resources mostly slowing down startup process. Therefore,<br /><br /> * Use a good antivirus, adware, spyware removal Software.<br /> * Make sure you UPDATE it regularly.<br /> * Enable the auto update mode for better security.<br /> * Run regular scans (weekly scheduled scanning recommended).<br /><br /><strong>2. Defragmenting Hard drives:</strong><br /><br />The files when moved or created on your PC are stored into small fragments randomly on your disk drive. When you open those files it takes time to gather all those chunks and put them back together to form that single file. When you defragment your drive all those scattered fragments are arranged properly on the drive thus loading application bit faster. There is a Disk Defragmenter utility in windows,<br /><br />Open My Computer > Right click on the disk drive you want to defragment > Select Properties > Under Tools tab click Defragment Now. But i recommend Power Defragmenter a small free utility by sysinternals which is faster and with various options.<br /><br /><strong>3. Clean Registry:</strong><br /><br />Windows registry is a database of information of all the files, folders and the windows configuration. This database grows as you use windows, can also become erroneous. Thus, it becomes necessary to clean and repair registry errors regularly. Use CCleaner, a tiny Freeware to scan and fix registry issues.<br /><strong><br />4. Delete Temporary, Junk and Obsolete files/Clear cache:</strong><br /><br />Clean all your drives for free space, i personally recommend keep atleast 20% of your drive space free. Also, you have to clear the windows TEMP files, the web browsers temporary files, caches files, etc. All web browsers has that option.CCleaner will be a good choice for the same, it will analyze and clean all unwanted internet files, Windows Explorer files and system files.<br /><br /><strong>5. Check Disk for errors:</strong><br /><br />Scan your disk for errors regularly. There may be some lost fragments or links which may lead to error in application. Run Scandisk once a week to keep things running smoothly. the error checking utility in windows will scan and attempt to recover bad sectors. Open My Computer > Right click the drive > Properties > Tools > click Check Now Button. Else simply type chkdsk /r at the command prompt.<br /><strong><br />6. Remove Startup items:</strong>Removing unwanted startup programs will speedup the windows boot process and your desktop will be ready quickly. some programs like Limewire or MSN messenger take time to load at startup, you can remove those and run them when needed.to remove Startup items: Start > Run > type msconfig > press OK. Now in the System Configuration Utility uncheck the unwanted programs (better Disable All).<br /><br /><strong>7. Remove unnecessary Programs:</strong><br /><br />Remove those programs which you don’t use anymore. This will free disk space and even help windows perform better. Also, remove the windows unwanted components like Indexing services & Outlook Express from the Add/Remove windows programs.<br /><br /><strong>8. Keep PC updated:</strong><br /><br />Look for regular updates, Enable Windows Updates, Updates includes major bugfixes which can be helpful. Look for new Service packs for better hardware compatibility. Update all device drivers, anti-virus programs and other applications. Hardware Manufactures keep updating their device drivers for better and smooth functioning. I have written earlier on a Free Software To Update Windows Device Drivers do read that.<br /><strong><br />9. Remove unwanted visual effects:</strong>The animated windows and fading menus can slow down your pc unknowingly. You can remove those fading effects, Use windows classic style theme, remove the heavy graphic wallpaper(none), You can even lower the color quality( to medium 16-Bit) and lower the screen resolution. Lower the screen resolution, better the performance.<br /><br /><strong>10.Use Lightweight programs:</strong><br /><br />Replace all those resource consuming programs and look for better alternatives, especially for those who have RAM less then 512 and an old PIII machine.<br /><br />use Lightweight antivirus programs like Avira...the best i found, NOD32, AVG instead of Norton Antivirus.<br /><br />This will really help you improve performance and helped me speed up my pc/computer.Try these out to improve your computer speed and performance.<br /><br />Hey guys...if you have any additional tips to improve slow pc performance, then just mention it below in comments section.prismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-45998925738348180552009-08-12T21:12:00.001-07:002009-08-12T21:26:08.476-07:00How to shutdown pc with TimerHere is another trick to shutdown at a specific time, for example you wish to shutdown at 1:45am. Type this in<br /><br />start=>Run<br />TYPE<br />Code: at 1:45 shutdown -s<br /><br />(Time should put when u want to shutdown ur pc)<br /><br />TO ABORT:<br />Code:shutdown -aprismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-57824730112125726822009-08-12T21:11:00.001-07:002009-08-12T21:11:49.738-07:00Converting FAT to NTFSTo change ur File system from command prompt<br />type: convert c:/fs:ntfs(ex:'c' is the drive letter)prismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-71477333946044665802009-08-12T21:07:00.000-07:002009-08-12T21:26:52.985-07:00Notepad TricksStep 1: Open Notepad<br />Step 2: Write following line in the notepad.<br />this app can break<br />Step 3: Save this file as xxx.txt<br />Step 4: Close the notepad.<br />Step 5: Open the file again.<br /><br />Voilla!!<br /><br />or<br /><br />1> Open Notepad<br />2> Enter four words separated by spaces, wherein the first word has 4 letters, the next two have three letters, and the last word has five letters<br />3> DON'T hit enter at the end of the line.<br />4> Save the file.<br />5> Close Notepad.<br />6> Reopen Notepad.<br />7> Open the file you just saved.<br /><br />or<br /><br />Open a note pad<br />type Bush hid the facts<br />save that file,<br />close it<br />again open and see...prismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-30854759303248677902009-08-12T21:05:00.000-07:002009-08-12T21:07:16.441-07:00Do Not Highlight Newly Installed ProgramsTired of that annoying little window that pops up to tell you that new software is<br />installed? If it gets in the way when you're logging off, turn it off completely. To do<br />this:<br /><br />· Click Start, right-click at the top of the Start menu where your name is displayed,<br />and then click Properties.<br /><br />· In the Taskbar and Start Menu Properties dialog box, on the Start Menu tab, click<br />Customize.<br /><br />· Click the Advanced tab, and then clear the Highlight newly installed programs check<br />box.<br /><br />· Click OK, and then click OK againprismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-33152028497230976642009-08-12T21:04:00.000-07:002009-08-12T21:28:02.784-07:00Activate The Missing dll Files in XPDLL's (dynamic link library),<br />It is basically a combination of executables files that can be used by Windows programs to run properly. Some time you received a sudden pop-up message<br />"System could not find this DLL file" for example binkw32, maxkernl.<br /><br />Normally you received these types of messages when you installed any new application, computer driver program and some time due to computer mishandling. Actually some DLL files are deactivated due to new software's installation but don't worry you can reactivate these file with the help of a simple command called Regsvr32.To activate the missing dll file<br />go the Start<br />then Run and<br />type here "regsrv32 with missing dll file name"<br />for example you missed "urlmon.dll" file then you will type in Run<br />"regsvr32 urlmon.dll"<br />and press Ok button.<br />Your system will activate this missing file and hopefully you will not get this missing message again.prismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-78894577169620112412009-08-12T20:54:00.000-07:002009-08-12T21:28:44.252-07:00Lock folder without any software in XP1.opne notepad.<br />2.copy this code in note pad.<br />3.change ur password in place of Prism<br />4.Save as filename=locker.bat and in save as type=all files<br />5.open ur save file,then it ask ur password.after enter ur pass.a folder is show.<br />6.dont del.ur .BAT file otherwise u loose ur save data in folder.<br /><br /><br /><br />@ECHO OFF<br />title Folder Prism<br />if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK<br />if NOT EXIST Prism goto MDLOCKER<br />:CONFIRM<br />echo Hi Frnds,Myself Shakeel prism [Comp Engg.] from VU PK.if u have query,my id shakeelprism@gmail.com Are you sure u want to Lock the folder(Y/N)<br />set/p "cho=>"<br />if %cho%==Y goto LOCK<br />if %cho%==y goto LOCK<br />if %cho%==n goto END<br />if %cho%==N goto END<br />echo Invalid choice.<br />goto CONFIRM<br />:LOCK<br />ren Prism "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"<br />attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"<br />echo Folder locked<br />goto End<br />:UNLOCK<br />echo Enter password to Unlock folder<br />set/p "pass=>"<br />if NOT %pass%==Prism goto FAIL<br />attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"<br />ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"Prism<br />echo Folder Unlocked successfully<br />goto End<br />:FAIL<br />echo Invalid password<br />goto end<br />:MDLOCKER<br />md Prism<br />echo Prism created successfully<br />goto End<br /><br /><br />**/ Copy this prog into new notepad.<br />Type ur password in place of Prism<br />and save as Filename.bin [Ex.Prism.bat]<br />and don't Delete ur .bat file otherwish ur data will be lost /**<br /><br /><br />Enjoy!!<br />and safe ur file & folderprismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-46727723502455166302009-08-12T20:51:00.000-07:002009-08-12T21:29:53.515-07:00Google has lot of passwords try it !!!put under commands in search engine<br />filetype:htpasswd htpasswd<br />intitle:"Index of” “.htpasswd” -intitle:"dist” -apache -htpasswd.c<br />index.of.private (algo privado)<br />intitle:index.of master.passwd<br />inurl:passlist.txt (para encontrar listas de passwords)<br />intitle:"Index of..etc” passwd<br />intitle:admin intitle:login<br />“Incorrect syntax near” (SQL script error)<br />intitle:"the page cannot be found” inetmgr (debilidad en IIS4)<br />intitle:index.of ws_ftp.ini<br />“Supplied arguments is not a valid PostgreSQL result” (possible debilidad SQL)<br />_vti_pvt password intitle:index.of (Frontpage)<br />inurl:backup intitle:index.of inurl:admin<br />“Index of /backup”<br />index.of.password<br />index.of.winnt<br /><br />inurl:"auth_user_file.txt”<br />“Index of /admin”<br />“Index of /password”<br />“Index of /mail”<br />“Index of /” +passwd<br />Index of /” +.htaccess<br />Index of ftp +.mdb allinurl:/cgi-bin/ +mailto<br />allintitle: “index of/admin”<br />allintitle: “index of/root”<br />allintitle: sensitive filetype:doc<br />allintitle: restricted filetype :mail<br />allintitle: restricted filetype:doc site:gov<br />administrator.pwd.index<br />authors.pwd.index<br />service.pwd.index<br />filetype:config web<br />gobal.asax index<br />inurl:passwd filetype:txt<br />inurl:admin filetype:db<br />inurl:iisadmin<br />inurl:"auth_user_file.txt”<br />inurl:"wwwroot/*.”<br />allinurl: winnt/system32/ (get cmd.exe)<br />allinurl:/bash_history<br />intitle:"Index of” .sh_history<br />intitle:"Index of” .bash_history<br />intitle:"Index of” passwd<br />intitle:"Index of” people.1st<br />intitle:"Index of” pwd.db<br />intitle:"Index of” etc/shadow<br />intitle:"Index of” spwd<br />intitle:"Index of” master.passwd<br />intitle:"Index of” htpasswd<br />intitle:"Index of” members OR accounts<br />intitle:"Index of” user_carts OR user _cartprismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-50838540822766554682009-08-12T20:49:00.000-07:002009-08-12T21:31:43.513-07:00Open acrobat with the speed of NotepadDo u get irritated when acrobat reader takes 5/10 seconds to load when you want to open a pdf document. There is a way to speed up the loading.<br /><br />1. Go to the installation folder of acrobat reader<br />(C:\program files\adobe\acrobat\reader\.. whatever)<br /><br />2. Move all the files and folders from the "plugins" directory to the "Optional" directory. (I repeat.. cut and paste the files NOT copy & paste).<br /><br />Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).<br /><br />Now your acrobat reader will load very fast<br />and almost as good as notepad..prismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-7206061649369191052009-08-12T20:46:00.000-07:002009-08-12T21:32:01.543-07:00Netbios Attack<span style="font-weight:bold;"><br />NetBIOS Hacking-What is it?<span style="font-weight:bold;"></span></span><br />NetBIOS Hacking is the art of hacking into someone else’s computer through your computer. NetBIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.<br /><span style="font-weight:bold;"><br />-How can this be of use to me?-</span><br />Most people don’t even know, but when they’re on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.<br /><br /><span style="font-weight:bold;">-What do I need?-</span><br />Windows OS<br />Cain and Abel (http://www.oxid.it/)<br /><br /><span style="font-weight:bold;">-[Step 1, Finding the target.]-</span><br /><br />So first off we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross<br /><br />Another window will pop up, make sure “All host in my subnet” is selected, and then click ok.<br /><br />It should begin to scan.<br /><br />Then IP’s, computer names, and mac addresses will show up.<br />Now remember the IP address of the computer you are going to be breaking into.<br />If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok.<br />During the next step we will begin our trial and error. <br /><br /><br /><br /><span style="font-weight:bold;">-[Part 2, Trial and Error]-</span><br /><br />Now, we don’t know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN.<br />If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on.<br />Click on the start menu and go to run, type in cmd, and click ok.<br />This should bring up the command prompt.<br />From here we will do most of the hacking.<br />Now I will be referring to certain commands that need to be inputted into the command prompt.<br />I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt.<br />I am only doing this to avoid confusion.<br />Let’s get back to the hacking.<br />Type in “ping (IP address of the target).” For example in this tutorial, “ping 192.168.1.103.”<br />This will tell us if the target is online.<br />If it worked, it will look something like this (note, I have colored out private information):<br /><br />IF it didn’t work, meaning that the target is not online, it will look something like this:<br /><br />If the target is not online, either switch to a different target, or try another time. If the target is online, then we can proceed.<br /><br /><br /><br /><span style="font-weight:bold;">[Part 3, Gathering the Information.]-</span><br /><br /><br />Now, input this command “nbtstat –a (IP address of target).” An example would be “nbtstat –a 192.168.1.103.”<br />This will show us if there is file sharing enabled, and if there is, it will give us the: currently logged on user, workgroup, and computer name.<br /><br />Ok, you’re probably wondering, “What does all this mean to me?” Well, this is actually very important, without this, the hack would not work. So, let me break it down from the top to bottom. I will just give the first line of information, and then explain the paragraph that follows it.<br /><br />The information right below the original command says: “Local Area Connection,” this information tells us about our connection through the LAN, and in my case, I am not connected through LAN, so the host is not found, and there is no IP.<br />The information right below the “Local Area Connection,” is “Wireless Network Connection 2:” It gives us information about the connection to the target through WAN. In my case I am connected through the WAN, so it was able to find the Node IpAddress. The Node IpAddress is the local area IP of the computer you are going to break into.<br /><br />The NetBIOS Remote Machine Name Table, give us the workgroup of our computer, tells us if it is shared, and gives us the computer name. Sometimes it will even give us the currently logged on user, but in my case, it didn’t. BATGIRL is the name of the computer I am trying to connect to. If you look to the right you should see a <20>. This means that file sharing is enabled on BATGIRL. If there was not a <20> to the right of the Name, then you have reached a dead end and need to go find another IP, or quit for now. Below BATGIRL is the computers workgroup, SUPERHEROES. If you are confused about which one is the workgroup, and the computer, look under the Type category to the right of the < > for every Name. If it says UNIQUE, it is one system, such as a printer or computer. If it is GROUP, then it is the workgroup<br /><br /><br /><br /><span style="font-weight:bold;">-[Step 4, Breaking In]-</span><br /><br /><br />Finally it’s time.<br />By now we know: that our target is online, our target has file sharing, and our target’s computer name.<br />So it’s time to break in.<br />We will now locate the shared drives, folders, files, or printers. Type in “net view \\(IP Address of Target)”<br />An example for this tutorial would be: “net view \\192.168.1.103”<br />We have our just found our share name. In this case, under the share name is “C,” meaning that the only shared thing on the computer is C. Then to the right, under Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person’s hard drive.<br />All's that is left to do is “map” the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in “net use K: \\(IP Address of Target)\(Shared Drive). For my example in this tutorial, “net use K: \\192.168.1.103\C.” Ok, let’s say that you plan on doing this again to a different person, do u see the “K after “net use?” This is the letter of the drive that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be “net use G...,” for a different target.As you can see, for my hack I have already used “K,” so I used “G” instead. You may also do the same for multiple hacks.<br />If it worked, it will say “The command completed successfully.”<br />If not, you will have to go retrace you steps.<br />Now open up “my computer” under the start menu, and your newly created network drive should be there.<br /><br />Now, if you disconnect from the WAN or LAN, you will not be able to access this drive, hence the name Network Drive.<br />The drive will not be deleted after you disconnect though, but you won’t be able to access it until you reconnect to the network.<br />So if you are doing this for the content of the drive, I recommend dragging the files and folders inside of the drive onto your computer,<br />because you never know if the target changes the sharing setting.<br />If you are just doing this to hack something, then go explore it and have some well deserved fun!<br /><br /><span style="font-style:italic;">Congratulations! You’re DONE!</span><br /><br />-Commands used in this tutorial:<br />PING<br />NBTSTAT -a (IP Address of Target)<br />NET VIEW \\(IP Address of Target)<br />NET USE K: \\(IP Address of Target)\(SHARENAME)prismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-22134768357281306172009-08-12T20:42:00.000-07:002009-08-12T21:28:02.784-07:00Hidden tricks of registry edit<span style="font-weight:bold;">Disable All Caps on Files and Folders</span><br /><br /><br /><br />Start/Run/Regedit<br />HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Explorer\Advanced] Value Name: DontPrettyPath Data Type: REG_DWORD (DWORD Value) Value Data: (0 = adjust caps, 1 = show caps) Create a new DWORD value, or modify the existing value, called "DontPrettyPath" and set it to equal "1" to display the file using their original capitalization or "0" to adjust the caps. Restart Windows for the change to take effect. <br /><span style="font-weight:bold;"><br />Disable Low Disk Space Message</span><br /><br /><br /><br />Start/Run/Regedit<br />HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer. Create or modify: NoLowDiskSpaceChecks REG_DWORD and set the value to 1. Logoff/Reboot. <br /><br /><span style="font-weight:bold;">Disable Search Assistant</span><br /><br /><br /><br />Start/Run/Regedit<br />HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CabinetState. In the right pane, look for or create a string value called: Use Search Asst set the value to: no <br /><br /><span style="font-weight:bold;">Disable/Turn Off System Beeps</span><br /><br /><br /><br />Start/Run/Regedit<br />HKEY_CURRENT_USER\Control Panel\Sound In the right pane, right click "Beeps", modify, set the value to no. Exit, reboot. <br /><span style="font-weight:bold;"><br />Disable/Stop Error Messages When Booting</span><br /><br /><br /><br />Start/Run/Regedit<br />HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Windows. Value Name: NoPopupsOnBoot, Data Type: REG_DWORD (DWORD Value), Value Data: (1 = disable messages). Stops the annoying Windows pop-up messages notifying you a device is not functioning when you boot-up Windows. Create a REG_DWORD value of 'NoPopupsOnBoot' in the key below (if it doesn't already exist). Set the value to '1' to disable pop-up messages from appearing. <br /><br /><span style="font-weight:bold;">Disable Desktop Cleanup Wizard</span><br /><br /><br /><br />Start/Run/Regedit<br />HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Explorer\Desktop\CleanupWiz. Value Name: NoRun, Data Type: REG_DWORD (DWORD Value), Value Data: (0 = enabled, 1= disable wizard). Create a new DWORD value, or modify the existing value, called 'NoRun' and edit the value according to the settings below. Exit your registry, you may need to restart or log out of Windows for the change to take effect. <br /><span style="font-weight:bold;"><br />Disable Auto-Run of Windows Messenger</span><br /><br /><br /><br />Start/Run/Regedit<br />HKEY_CURRENT_USER\SOFTWARE\ MICROSOFT\WINDOWS\CURRENTVERSION\RUN. Delete the Value named MSMSGS. <br /><br /><span style="font-weight:bold;">Disable Auto-Expanding Trees in Windows Explorer</span><br /><br /><br /><br /><br />Start/Run/Regedit<br />HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced Change the value of "FriendlyTree" to 0. <br /><span style="font-weight:bold;"><br />Disable Tool Tips</span><br /><br /><br /><br />Start/Run/Regedit<br />HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Modify or create, "ShowInfoTip" and set the Value to 0. To restore set the Value to 1. This edit excludes the Start Button. <br /><br /><span style="font-weight:bold;"><br />Disable Status Messages During Boot, Logon, Logoff</span><br /><br /><br /><br />Start/Run/Regedit<br />HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Right click in the right pane and select New, DWord value. Name the new value DisableStatusMessages. Double click the new value and set it to 1. Status messages will no longer show during boot/shutdown/logon/logoff. <br /><span style="font-weight:bold;"><br />Disable Balloon Tips</span><br /><br /><br /><br />Start/Run/Regedit<br />HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Modify or create, "EnableBalloonTips" and set the Value to 0. To restore set the Value to 1. <br /><br /><br /><span style="font-weight:bold;">Disable Error Reporting</span><br /><br /><br /><br />Start/Run/Regedit<br />HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting. Value: DoReport, 1 = Send Reports, 0 = Don't Send. <br /><br /><span style="font-weight:bold;">Disable Run Commands Specified in the Registry</span><br /><br /><br /><br />Start/Run/Regedit<br />HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ Policies\Explorer. Value Name: DisableLocalMachineRun, DisableLocalMachineRunOnce, DisableCurrentUserRun, DisableCurrentUserRunOnce. Data Type: REG_DWORD (DWORD Value), Value Data: (0 = enable run, 1 = disable run). Create a new DWORD value for each of the optional values above depending on which Run function to stop and set the value to "1" to disable. Restart Windows for change to take effect.prismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-51745535676555053102009-08-12T20:38:00.000-07:002009-08-12T21:33:43.544-07:00Use Kav/kis without key for life timeFirst off download either KIS or KAV from the Kaspersky web site.<br />Once installed and it asks you to register, skip through this section.<br />After the computer has rebooted load up Kaspersky, click on “Settings” and go down to “Options” and un-check<br />“Enable Self-Defence”. Click ok.<br />Now disable Kaspersky and exit the program.<br />Next run regedit<br /><br />HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\KasperskyLab\protected\AVP8\environment\<br />Scroll down to Product Status and change from “Release” to “Beta”<br />Exit regedit and reload Kaspersky, you’ll notice that when you goto the area where you<br />normally input your key you now have an option to “Activate Beta Version”.<br />Click this and you’ll get a 30 day BETA trial, the great thing is you can just redo this time and again,<br />so 30 days later just do the same thing.<br />Basically what you’ve done here is fool the Kaspersky server into thinking your using the BETA version of<br />the product when infect your actually using the Release version that will give you all the updates etc like<br />a full release.prismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0tag:blogger.com,1999:blog-7622852261946939194.post-18877653413160968002009-08-12T20:37:00.000-07:002009-08-12T21:28:02.784-07:00Automatically Close "Non Responding" program"When an application fails to respond during shutdown a dialog box is displayed prompting the user to either end it now or to wait. Enabling the value AutoEndTasks will take care of the non-responding application without user intervention.<br /><br /><br />This is how to do it<br /><br /><br />To Implement for All Users<br /><br />[Start] [Run] [Regedit]<br />Registry Key: HKEY_USERS\.DEFAULT\Control Panel\Desktop<br />Data Type: REG_SZ [String Value] // Value Name: AutoEndTasks<br />Modify/Create the Value Name [AutoEndTasks] according to the Value Data listed below.<br />Value Data: [0 = AutoEndTasks Disabled / 1 = AutoEndTasks Enabled]<br />Exit Registry and Reboot<br /><br />To Implement for Individual Users<br /><br />[Start] [Run] [Regedit]<br />Registry Key: HKEY_CURRENT_USER\Control Panel\Desktop<br />Data Type: REG_SZ [String Value] // Value Name: AutoEndTasks<br />Modify/Create the Value Name [AutoEndTasks] according to the Value Data listed below.<br />Value Data: [0 = AutoEndTasks Disabled / 1 = AutoEndTasks Enabled]<br />Exit Registry and Rebootprismhttp://www.blogger.com/profile/04460344607487019525noreply@blogger.com0