Tuesday, April 28, 2009
CHAT WITH COMMAND PROMOPT
All you need is your friends IP address and Command Prompt.
Firstly, open Notepad and enter:
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
Now save this as "Messenger.bat". Open the .bat file and in Command Prompt you should see:
MESSENGER
User:
After "User" type the IP address of the computer you want to contact.
After this, you should see this:
Message:
Now type in the message you wish to send.
Before you press "Enter" it should look like this:
MESSENGER
User: 56.108.104.107
Message: Hi
Now all you need to do is press "Enter", and start chatting!
Make your xp talk ....
Dim msg, sapi
msg=InputBox("Enter your text","Talk it")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg
Save the file with a (*.vbs) extension, it will create a VBScript File.
It will prompt you for a text while opening the file, input the text and press ok it will speak whtaever u type in..........................enjoyyyyyyyyyyyy
XP Game secrets.......
Secret 1. - Instant Win
Instructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.
Secret 2. - Hidden Game Modes
Instructions - In the "Game" menu choose "Select Game". Enter -1 or -2 to activate the hidden game modes.
Hearts
Secret - Show All Cards
Instructions - Edit this registry key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Applets\Hearts and create a new String value named ZB with a Data value of 42. Start Hearts and Press Ctrl + Alt + Shift + F12 to show all the cards.
Minesweeper
Secret - Reveal Mines
Instructions - Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.
Secret - Stop Timer
Instructions - Launch Minesweeper and start a game so the timer starts counting, then press the Windows Key + D to show the desktop. Now when you select minesweeper from the taskbar you can continue playing with the timer stopped.
Pinball
Secret - Extra Balls
Instructions - Type 1max at the start of a new ball to get extra balls.
Secret - Gravity Well
Instructions - Type gmax at the start of a new game to activate the Gravity Well.
Secret - Instant Promotion
Instructions - Type rmax at the start of a new game to go up in ranks.
Enjoyyyyyyy gaming but do leave ur comments...
Hidden XP programms !!!
Do Comment If U Like IT
Programs :
1. Private Character Editor :
Used for editing fonts,etc.
** start>>Run
** Now, type eudcedit
2. Dr. Watson :
This an inbuilt windows repairing software !
** start>>Run
** Now, type drwtsn32
3. Media Player 5.1 :
Even if you upgrade your Media Player, you can still access your old player in case the new one fails !!!
** start>>Run
** Now, type mplay32
4. iExpress :
Used to create SetupsYou can create your own installers !
** start>>Run
** Now, type iexpress
HOW TO SECURE A PC...
now you are at
C:\Documents and Settings\dia\
type "attrib"............remove inverted comos
you will get all processes and viruse on you computer
mostly "SHR "files are viruses
but there are also SHR system files , so becareful
so better to check D, e F,G ...drives first
delete command
e.g
you wanna remove Rovman.exe virus from d drice
oped D: in command prompt
attrib........press enter
// list of working process will we open
//if it has ROVMAN.exe file too ,as we know it is a virus
type
attrib -s -h -r ROVMAN.exe...............press enter
then type
del Ravmon.exe
so RAVmon is deleted
now same process for other viruses.
Change Your IP in less than 1 min.
2. Click on "Run"
3. Type in "command" and hit ok
You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"
You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again
You should now be back to the "Local Area Connection" screen.
15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address
With a little practice, you can easily get this process down to 15 seconds.
Warning:
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back
reply if u found it knowledgeable coz i need response.....!!
Freak Out.....!!
Ten Tips to Keep your Computer Running Smoothly
Following this rule will prevent permanent hard drive defects caused by the hard drive heads contacting the surface of the drive disc, and it will prevent a host of Windows problems.Whenever possible, recover from crashes by pressing the Ctrl + Alt + Delete keys at the same time. Press them again to reboot your computer.
2. I highly recommend that you purchase an UPS (uninteruptable power supply) for your computer. This will keep your computer from crashing during power outages, and will protect your computer from low and high voltage occurrences.
An UPS is far superior to a surge protector and will save your computer from almost any type of power disaster. (See #1 above for what happens when your computer crashes.)
3. Backup, backup, backup, any data you cannot afford to lose to at least two separate physical drives. So backup data to external hard drives, Zip disks, CD-RWs etc.
The time to backup is when you create something you can't afford to lose. Don't wait until tomorrow.
4. Run Scan disk and De fragment at least once a month. This will keep your hard drive healthy and prevent crashes. Alternatively, purchase Norton Utilities and use it to keep your hard drive healthy.
5. Never unplug peripherals from the computer when it is powered up. Unplugging with the power on can short out the connector socket or the motherboard.
The only exception to this rule is if you know a peripheral is "hot pluggable". If you do not know what "hot pluggable" means then ignore this exception.
6. Do keep at least 300 MBs of your C: drive free for Windows to use. If you use Windows XP or Vista then you should have 400-600 MBs of free space on your C: drive.
If you do not have enough free space you will choke Windows and it will start dumping data to your hard drive, or it will just get really, really, slow.
Use the ADD/Delete tool in the Windows Control Panel to delete unneeded programs from your drive.
You can also use Clean sweep included in Norton Utilities to clean up your drive. If you do use Clean sweep or another hard drive cleaner, do not delete shared files unless you back them up. The cleaners do a rotten job of knowing if another program uses shared files.
7. Do not let a lot of programs load up when you start your computer. They use valuable memory and Windows Resources (Windows internal workspace).
All programs in your Windows System Tray (in the lower left of your screen) are running on your computer. Close them if you don't need them or run them and configure them not to load when you boot up.
Other programs running in the background can be found by pressing Ctrl + Alt + Delete at the same time.
8. Do use a virus checker regularly. Everyone should use a virus checker. The best type of protection is continuous monitoring from a dedicated anti-virus program like Norton Antivirus.
The second best thing is to use is the free online virus checkers such as Housecall provided by Trend Micro.
9. If you have a high speed Internet connection you need a firewall program. A firewall program keeps those who want to hijack your computer from gaining access to your system. You really do not want someone else running your computer.
I suggest you purchase and run Norton's Personal Firewall program. Your firewall should boot up with your computer to protect it from invasion.
Case in point: When I am online 10 hours or more with my DSL connection, my computer is usually attacked by a hacker at least once.
Do not think you are safe from hackers!! Hackers use search programs to seek out computers at random. Get a firewall program and use it.
10. Keep track of the software disks you receive with your computer and new peripherals. These disks contain valuable software drivers and programs for Windows and are needed when Windows must be reloaded. Keep these disks and your Windows software disks in a safe, dry, place -- you never know when you will need them.
Hopefully these computer maintenance tips will keep you out of trouble. However, if you have problems with your computer, feel free to ask.
Computer related terms
A program that converts symbolically-coded programs into object level, machine code. In an assembler program, unlike a compiler, there is a one-to-one correspondence between human-readable instructions and the machine-language code.
2 - Compiler
A program that translates human-readable programs into a form the computer understands. The input (source code) to the compiler is a description of an algorithm in a problem- oriented language; its output (object code) is an equivalent description of the algorithm in a machine-oriented language
3 - Bandwidth
A piece of the spectrum occupied by some form of signal, where it is television, voice, fax data, etc.. Signals require a certain size and location of bandwidth in order to be transmitted. The higher the bandwidth, the faster the signal transmission, and thus allowing for a more complex signal such as audio or video. Because bandwidth is a limited space, when one user is occupying it, others must wait their turn. Bombarding the Internet with unnecessary information is referred to as "taking up bandwidth."
4 - Batch processing
Originally, a method of organizing work for a computer system, designed to reduce overhead by grouping similar jobs. In one scheme, jobs were collected into batches, each requiring a particular compiler. The compiler was loaded, and the jobs submitted in sequence to the compiler. The term has come to be applied to background processing of jobs not requiring user intervention on multiuser systems.
5 - Broadband
A communications medium on which multiple signals are simultaneously transmitted at different frequencies. Also refers to switching capability implemented on this medium that allows communication between devices connected to it. In telecommunications it is defined as any channel with a bandwidth greater than voice grade (4 KHz).
6- Debug
To detect, trace and eliminate errors in computer programs.
7 - Ethernet
A local area network originally developed by Xerox for linking personal computers. Later adapted by DEC and Intel as well and subsequently adopted as an international standard called 802.3. It transmits data at 10 megabits per second. All computers on a network were originally connected to a coaxial cable up to one kilometer. Each computer monitors all transmissions, looking for packets containing its identifier as the destination. Only one signal may be present on the channel at a time and no single computer controls transmissions. Several upper layer protocols, such as DECnet and TCP/IP use Ethernet as an underlying transport mechanism. Ethernet is to be contrasted with other data link protocols such as token ring, DDCMP or SDLC. Uses CSMA/CD.
8 - Fiber optics
A high speed channel for transmitting data. Made of high-purity glass sealed within an opaque tube. Much faster than conventional copper wire such as coaxial cable.
9 - FAQ
Frequently Asked Questions. A collection of information on the basics of any given subject. Often put together and archived on a server so that people don't waste bandwidth asking simple questions.
10 - FTP
File Transfer Protocol. A program that allows for file transfers over the Internet.
11 - Hardwired
Circuits that are permanently interconnected to perform a specific function, as distinct from circuits addressed by software in a program and, therefore, capable of performing a variety of functions, albeit more slowly. Also used to describe a non-switched connection between devices.
12 - Hierarchical file
A hierarchical file is one that contains information collected on multiple units of analysis where each unit of analysis is subordinate to another unit. For example, if the physical housing structure is one unit, and individual persons within the structure is another unit, the person records are subordinate
13 - Hierarchical file structure
A format for storing hierarchical files . Each unit of analysis has its own record structure or record type . Different units of analysis do not necessarily have the same number of bytes or characters as the records for other units of analysis. In order to give such a file a common physical record length , short logical records are typically "padded" with blanks so that they will all be the same physical record length. A hierarchical file can be also be stored in a rectangular file . For instance, the Survey of Income and Program Participation is distributed both ways; users can choose the format they prefer. Typically, the hierarchical file structure is more space-efficient but more difficult to use.
14 - Hub
A device that is a center of network activity because it connects multiple networks together
15 - ISDN
Integrated Services Digital Network. An international communications standard for a common interface to digital networks that allows the integration of voice and data on a common transport mechanism. Proposed by Bellcore for transmission of data, voice and higher-bandwidth technologies over phone lines.
16 - JPEG
Joint Photographic Experts Group. The ISO proposed standard for compression of digital data, especially 24-bit color images. It is lossy in that it reduces the file size at the expense of image quality. PostScript Level 2 color printers are supposed to be able to receive, decompress and print JPEG compressed images. Uses quantization and Huffman encoding.
17 - Modem
Short for MOdulation/DEModulation, it is a device that can convert a digital bit stream into an analog signal (modulation) and can convert incoming analog signals back into digital signals (demodulation). The analog communications channel is typically a telephone line and the analog signals are typically sounds.
18 - Mosaic
An Internet-based, global hypermedia browser that provides a unified interface to the various protocols, data formats, and information archives (i.e. gopher) used on the Internet and enables powerful new ways for discovering, using, viewing, and sharing information. It was developed by NCSA as part of the WWW project.
19 - Ping
Packet Internet Groper. Probably originally contrived to match the submariners term for a sonar pulse.
n. Slang term for a small network message (ICMP ECHO) sent by a computer to check for the presence and aliveness of another.
v. To verify the presence of. To get the attention of.
20 - Router
A device connecting separate networks that forwards a packet from one network to another based only on the network address for the protocol being used. For example, an IP router looks only at the IP network number.
21 - SPARC
Scalable Processor ARChitecture. Trademark of SunMicrosystems 32-bit RISC microprocessor architecture. The architecture is open in the sense that other vendors can obtain the processor chips and documentation sufficient to build computers using it.
22 - SQL
Structured Query Language. ANSI standard data manipulation language used in most relational data base systems. A language for requesting data from a relational database.
23 - URL
Uniform Resource Locater. A scheme used to locate a document accessible over the Internet.
24 - CMOS--- Complementary Metal-Oxide Semiconductor
25 - BIOS--- Basic Input Output System
26 - USB--- Universal Serial Bus
27 - ATM--- Automatic Teller Machine
Boost the browser speed
Open up the Registry and go to : HKEY_LOCAL_MACHINE/Software/Microsoft/Wi
Under that branch, select the key :
{D6277990-4C6A-11CF-8D87-00AA0060F5BF}
>and delete it.
This is key that instructs Windows to search for Scheduled Tasks. If you like you may want to export the exact branch so that you can restore the key if necessary.
This fix is so effective that it doesn't require a reboot and you can almost immediately determine yourself how much it speeds up your browsing processes.
Removing virus from usb drive
Whenever you plug a USB drive in your system, autorun window will display.
Don’t click on Ok , just choose ‘Cancel’. Open the Command Prompt by typing ‘cmd‘ in the run box. In the command prompt type the drive letter: and press enter . Now type dir /w/a and press enter.
This will display a list of the files in the pen drive. Check whether the following files are there or not
•Autorun.inf
•Ravmon.exe
•New Folder.exe
•svchost.exe
•Heap41a
•or any other exe file which may be suspicious.
If any of the above files are there, then probably the USB drive is infected. In command prompt type attrib -r -a -s -h *.* and press enter. This will remove the Read Only, Archive, System and hidden file attribute from all the files. Now just delete the files using the command del filename. example del Ravmon.exe. Delete all the files that are suspicious. To be on a safer side, just scan the USB drive with an anti virus program to check whether it is free of virus or not. Now remove the drive and plug it again. In most of the cases, the real culprit turns out to be the “Autorun.inf” file which mostly gets executed when someone clicks Ok in the dialog window which appears above. Thus the infections can spread.Common viruses such as ’Ravmon’ , ‘New Folder.exe’, ‘Orkut is banned’ etc are spreading through USB drives. Most anti virus programs are unable to detect them and even if they do, in most cases they are unable to delete the file, only quarantine it. Here are the things which you can do if you want to remove such viruses from your USB Drive
Whenever you plug a USB drive in your system, autorun window will display.
Don’t click on Ok , just choose ‘Cancel’. Open the Command Prompt by typing ‘cmd‘ in the run box. In the command prompt type the drive letter: and press enter . Now type dir /w/a and press enter.
This will display a list of the files in the pen drive. Check whether the following files are there or not
•Autorun.inf
•Ravmon.exe
•New Folder.exe
•svchost.exe
•Heap41a
•or any other exe file which may be suspicious.
If any of the above files are there, then probably the USB drive is infected. In command prompt type attrib -r -a -s -h *.* and press enter. This will remove the Read Only, Archive, System and hidden file attribute from all the files. Now just delete the files using the command del filename. example del Ravmon.exe. Delete all the files that are suspicious. To be on a safer side, just scan the USB drive with an anti virus program to check whether it is free of virus or not. Now remove the drive and plug it again. In most of the cases, the real culprit turns out to be the “Autorun.inf” file which mostly gets executed when someone clicks Ok in the dialog window which appears above. Thus the infections can spread.
Restarting system automaticaly in dumb state
* Right click on My Computer and Click Properties
* Click on settings of System and Recovery.
* Remember this place is you can configure what the system will do when it gets into system failure.
* Just check the check box which says Automatically restart
Now the next time your computer goes for a system failure it will auto restart. But You will have to wait for the dumb to get created. Moreover you can also check for Overwriting the old dump file in case you want to save some space.
Change XP password
just open CMD PROMPT and type as shown below
C:/ net user username newpassword <----|
for example...
If your friend's username is Gaurav, and you want to change itz password to Bhatia
Type as shown below:
C:/net user Gaurav Bhatia <====
tats all u have successfully changed ur friendz password to "Bhatia"
If you are the admin of pc then go to CMD prompt and type
"""""control userpasswords2""""""
here you can change the password
Information about LCD
lcd is mainly divided into 6 parts
1> virtical polarizer
2>vertical conductor
3>liquid crystals>
4>horizontal conductor
5>horizontal polarizer
6>reflective layer
advantages:
1>low cost
2>less power consumption
3>it requires less space coz screen is totaly flat
4>low weight
5>produce littile heat
disadvantages:
1>low quality resolution
2>lower contrast
3>not suitable 4 use in dark envoirment
Hard drive cleanup
The temporary files can be just some text files or images. Yes, images! whenever you visit a website, almost everything you see on the page is downloaded to your local hard drive, stored into the temporary storage as "temporary internet files". You might notice the next time you revisit the same page, the loading speed is somehow faster. This is because Windows reuses the temporary files which it found unchanged comparing to the page content. (no wonder why you've been told to refresh the page?)
Now these files can be large! since a file can be one big file that you downloaded off the internet. Then you've used it and thought you have deleted it... but in many cases, a copy of it is still there, as a temporary file.
Follow the instructions below to perform a disk cleanup for your hard drives, especially the one that has Windows systems files (normally "C" drive).
1. Launch the Disk Cleanup utility by either:
- "Start" >> "Programs" >> "Accessories" >> "System Tools" >> "Disk Cleanup", or:
- "Start" >> "Run", enter "cleanmgr" then press Enter.
2. Select the disk you want to clean up from the drop-down box (i.e. "Local Disk C") and click "OK":
3. Windows will calculate the space on your selected hard drive. This might take a few minutes depending on the size of your hard drive:
4. Once Windows is done with the calculation, Disk Cleanup Utility displays. Here you can select which storages you want to clean up (under "Files to delete"). It doesn't hurt if you select them all when you really need free spaces on your hard drive. Notice the usage size on some of these storages might be huge:
5. Click "OK" after your selections, then click "Yes" on the prompt.
6. Disk Cleanup Utility starts to clean up your hard drive. This might take a while depending on the current usage level on the storage. During the cleanup process, your computer might be very slow, so give it some time. After cleanup your hard disks, perform a disk defragmentation would really help your pc run faster.
INFORMATION ABOUT AUDIO CD AND MP3 CD
An audio CD (Compact Disc Digital Audio) is one that you buy from stores and contains only audio tracks. You can play an audio CD in any CD players, including your car CD player, and your computer CD-ROM. The standard for Audio CDs is called "Red Book".
The audio tracks are uncompressed digital data (essentially WAV). When you look at the contents of an audio CD, you may notice the files are .CDA files. A CDA file simply points to the location of the audio track on the CD. You cannot just copy these CDA files to another location since they are just "pointer" files, contain no audio data. The actual audio data is stored on the CD sectors and cannot be viewable on your computers.
An audio CD normally can hold up to 74 or 80 minutes of audio. So when you create an audio CD from some MP3 files, for example, no matter how big or small your mp3 files are, the CD can only fit in up to 80 minutes of audio.
Pro & Con
Audio CD is a very first generation of digital audio compact disc and because of this, audio CD can be played on any CD players.
However, an audio can only hold up to 80 minutes of audio. This is about 10-15 songs if the average length of the songs are 4-5 minute. Not much at all! if you want to put more songs onto a CD, you'll an MP3 CD.
The frequency response: from 20 Hz to 20 kHz.
Bit rate = 44100 samples/s × 16 bit/sample × 2 channels = 1411.2 kbit/s (more than 10 MB per minute)
Sample values: range from -32768 to +32767.
On the disc, the data are stored in sectors of 2352 bytes each, read at 75 sectors/s.
MP3 CD
An Mp3 ("MPEG-1 Audio Layer 3") file is just like a computer data file. The Mp3 format is audio encoding format, sometimes called "compressed" format. The Mp3 format was invented by a team of European engineers at Philips and became an ISO/IEC standard in 1991.
Late 1990s, the internet users started to encode more and more audio files using the Mp3 format and spread them over the internet. This lead to the creations of many Mp3 player software such as WinAmp, Nullsoft, etc... The Mp3 format became the most popular audio format for computer because of the advantages of it.
You can compress an audio track from 40-50 MB to create an mp3 file of 4-5 MB with the same quality. Well, the quality actually depends on the encoding methods. The low bit-rate would give you a smaller Mp3, but with lower quality.
Pros & Cons
An Mp3 CD can hold up to 700 MB of data/mp3 files. If you have Mp3 files with an average of 4-5 MB each, for example, you can store up to 160 songs on a CD, about 10 times of an Audio CD.
However, not all CD players can play Mp3 CD. More and more CD players are now Mp3 compatible, but not all of them. So you might need to question yourself when you want to create an Mp3 CD; for example, if the target CD player can handle it.
Information about COMPUTER BIOS
Whenever you startup a computer, the first thing you see is the BIOS software running. To enter the BIOS setup you will have to press a certain key or combination of keys in the initial startup screen (Esc, Del, Ctrl-Esc, F2, F1, Ctrl-Alt-Esc, ect…). There is usually a command line that shows up. When it does, press the specified key or keys to enter setup. Depending on the BIOS manufacturer you will see a number of options. (Examples: time/date, memory, plug and play, security, power management, boot sequence, drive configuration, exit, ect…) Be cautious when making changes to the setup. Some changes can cause the computer to not boot properly. When you finish you should save your settings and exit. The BIOS should restart your computer and the new settings should take effect.
The BIOS (Basic input/output system) is software that is usually stored on a flash memory chip and is located on the motherboard. What BIOS does is make sure that the CPU, hard drive(s), ports, and other chips in the computer work together. BIOS plays a huge part in starting up a computer. The BIOS provides the CPU with the instructions to start the operating system. A computer might have more than one bios chip. For example: A video card might have its own bios chip installed. The BIOS is in charge of setting up and managing things like the monitor, keyboard, and other ports on the computer especially when the computer system is starting up. Upon starting a computer system, the bios runs a POST (Power on self test) to check all of the hardware components to make sure they are functioning properly.
Information about RAM (RANDOM ACCESS MEMORY)
DIfferent Types of RAM:
RAM Type: Pins: Usage:
SD RAM 168 Typically only used in older and slower computers.
Rambus RAM 184 Only used in certain Pentium 4’s with certain Intel chipsets.
DDR RAM 184 Faster version of SD RAM used in Pentium 4’s and Athlon
DDR2 RAM 240 Newer version of DDR RAM with higher clock frequencies
DDR3 RAM 240 Newer version of DDR2 with higher clock frequencies
When looking to upgrade your computer’s RAM, you will find RAM information typically displayed like this:
1GB, 240-pin DIMM, DDR2 PC2-5300,
* 1GB refers to the size of the memory
* 240-pin refers to the number of pins used to connect to the motherboard
* DIMM- Dual In-line Memory Module
* SIMM- Single In-line Memory Module
* DDR2 refers to the type of memory
* PC2-5300 refers to the module type
Some other pieces of information you might find in a RAM description are:
Clock frequency-refers to speed of the RAM in MHz (800MHz)
CAS (Column Address Strobe) Latency-refers to the number of clock cycles that elapse from the time the request for data is sent to the actual memory location until the data is transmitted from the module. This is represented by a set of 4 numbers also known as RAM timing (4-4-4-12). These numbers stand for:
TCL - CAS Latency Time
Trcd - DRAM RAS# to CAS# Delay
Trp - DRAM RAS# Precharge
Tras - Precharge delay
Normally the BIOS will allow a user to adjust RAM timing to increase performance and stability.
RAM is considered the most critical component in a computer system. Every bit of data must pass through RAM to get to the processor. Generic, low-cost RAM is most often the cause of data corruption and program crashes, so never skimp on the quality of RAM when upgrading RAM. Make sure the RAM you choose is considered Grade A RAM. Grade A RAM can only be found through major manufacturers of RAM, such as: Crucial.com.
Information about Computer Memory
RAM:
RAM (Random Access Memory) is the best known form of memory your computer uses. Every file or application opened is placed in RAM. Any information the computer needs or uses becomes part of a continuous cycle where the CPU requests data from RAM, processes it and then writes new data back to RAM. This can happen millions of times a second. However, this is usually just for temporary file storage, so unless the data is saved somewhere, it is deleted when the files or applications are closed.
Hard Drive:
A Hard Drive is a form of computer memory that allows you to permanently store data. This is where all of your permanent files and programs are stored. On computers running with Microsoft windows the Hard Drive is often called C-Drive. The size of a Hard Drive is typically measured in gigabytes.
Virtual Memory:
Virtual memory typically comes into place when applications are too large for the RAM to handle. The operating System uses the hard drive to temporarily store information and take it back when needed. This is normally a lot slower than actual RAM and can possibly degrade performance if used to heavily.
Cache Memory:
Cache Memory is used in-between the CPU and the RAM and holds the most frequently used data or instructions to be processed. There are three different grades of Cache. Some systems will only have level 1 and level 2. More advanced systems will include the level 3.
Level 1 (L1) - Is the primary and is on or very close to the processor. This is used for the most frequently used data and instructions.
Level 2 (L2) - Is second closest to the CPU and is more common to be on the motherboard. Depending on your motherboard it might be able to be updated. This is used for the most frequently used data and instructions.
Level 3 (L3) - This is the most advanced cache and will speed up the memory even further. This is used for the most frequently used data and instructions
Information about Advanced Graphics Port Video Cards
AGP uses pipelining and sideband addressing to improve its overall speed. Pipelining is a way to improve performance by letting tasks overlap themselves (For instance: AGP makes multiple requests for information during bus or memory access and PCI makes one request and does not make another until the data has been transferred). Sideband addressing separates the address bus from the data bus, which allows the graphics controller to issue new AGP commands while the main address/data lines are still operating. These two features greatly improve the speed of this style video card.
There are three versions and four basic speeds of AGP Video Cards:
AGP 1.0- supports 1x and 2x speeds and has a 3.3v connector
AGP 2.0- this version is compatible with 1.0 but adds 4x and 1.5v support
APG 3.0-supports 4x and 8x speeds and is only compatible with the 4x version in 2.0
There are three different types of AGP mechanical board connectors. The 3.3v (which usually has a notch at the front end), the 1.5v (which usually has a notch at the back end), and the universal AGP slot which supports multiple voltages (there are no notches so both style cards can fit in it). The AGP card and the monitor are what determine the quality of a computer’s video display, so keep in mind that the newer versions are better for more advanced graphics.
Increase your system speed
1) Wallpaper slows down your system speed. Try to use the plain desktop.
2) If you are working with multiple windows at at a time, minimize the remaining windows so that ram can work with max speed.
3) Updates your installed drivers. Especially graphic card driver's updating help to improve the speed.
How to create partition in Windows Vista
But its not true.... You can create new partition without formatting the disk. You have to follow the following steps:
1)Open disk manager.
2)Right click on the volume which u want to shrink.
3)choose shrink volume option,
4)Follow the instructions as on the screen.
Block websites without any software
Steps:
1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.orkut.com , and that site will no longer be accessable.
5] Done!
example :
127.0.0.1 localhost
127.0.0.2 www.orkut.com-
www.orkut.com is now unaccessable
For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.
ie:
127.0.0.3 www.yahoo.com127.0.0.4 www.msn.com127.0.0.5 www.google.com
This also works with banner sites, just find the host name of the server with the banners and do the same thing with that addy.
Hope this small tutorial could keep you going in simple way of blocking websites.
Hide drives using registry
This is a great trick you can play on your friends. To disable the display of local or networked drives when you click My Computer.
1.Go to start->run.Type regedit.Now go to:
HKEY_CURRENT_USER\Software\Microsoft\Win
dows\CurrentVersion\Policies\Explorer
Now in the right pane create a new DWORD item and name it NoDrives(it is case sensitive). Now modify it's value and set it to 3FFFFFF (Hexadecimal) .Now restart your computer. So, now when you click on My Computer, no drives will be shown(all gone...). To enable display of drives in My Computer, simply delete this DWORD item that you created.Again restart your computer. You can now see all the drives again.
Create a Hidden User Account
To log on using the account it's necessary to use the Log On To Windows dialog box similar to the one in Windows 2000 i.e. press CTRL+ALT+DEL twice.
1. Open Registry Editor.
2. Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Modify/Create DWORD Value of Data type REG_DWORD Named [Type Name of Account to be Hidden]
Setting for Value Data: [0 = Account is Hidden / 1 = Enabled]
3. Exit Registry / Reboot
While the account is hidden on the Welcome screen, note that the account profile will be visible in C:\Documents and Settings or wherever user profiles are stored as well as in Local Users and Groups.
Open Folder with Key Combination
For that, right-click the folder > Send To > Desktop. (Works only with desktop shortcuts)
2. Now, on your desktop, right-click the new shortcut, and then view its Properties.
3. Click On the "Shortcut" Tab and then on "Shortcut Key" box.
4 .By Default it will be "None" .So press the letter in the box…..on your keyboard that you want to use to open the folder. (Note: In the Shortcut key box CTRL+ALT is automatically added before the key you press)
5. Click Ok
Now u can press ctrl+Alt+ur selected letter........And folder will be opened....
How to search on Google
Whenever you search for more than one keyword at a time, Google will search for all of them. If you search for
XML Java “web Services”
Google will search for all the words. If you want to specify that either word is acceptable, you put an OR between each item
XML OR Java OR “Web Services”
If you want to have definitely one term and one of two or more other terms, you group them with parentheses, like this
XML (Java OR “Web Services”)
This query searches for the word “Java” or phrase “Web Services” along with the word “XML.” A stand-in for OR borrowed from the computer programming realm is the | (pipe) character, as in
XML (Java | “Web Services”)
If you want to specify that a query item must not appear in your results, use a -.(minus sign or dash).
XML Java -”Web Services”
This will search for pages that contain both the words “XML” and “Java” but not the phrase “Web Services.”
Operators
In addition to the basic AND, OR, and quoted strings, Google offers some rather extensive special syntaxes for honing your searches. Google being a full-text search engine, it indexes entire web pages instead of just titles and descriptions. Additional commands, called special syntaxes, let Google users search specific parts of web pages or specific types of information. Specifying that your query words must appear only in the title or URL of a returned web page is a great way to have your results get very specific without making your keywords themselves too specific.
Here are some of the common keywords that you can add to your query in Google
intitle, allintitle
Restricts your search to the titles of web pages. The variation, allintitle: finds pages wherein all the words specified make up the title of the web page. It’s probably best to avoid the allintitle: variation, because it doesn’t mix well with some of the other syntaxes.
Eg: intitle:”george bush”
allintitle:”money supply” economics
inurl, allinurl
Restricts your search to the URLs of web pages. This syntax tends to work well for finding search and help pages, because they tend to be rather regular in composition. An allinurl: variation finds all the words listed in a URL but doesn’t mix well with some other special syntaxes.
Eg: inurl:help
allinurl:search help
intext, allintext
Searches only body text (i.e., ignores link text, URLs, and titles). There’s an allintext: variation, but again, this doesn’t play well with others. While its uses are limited, it’s perfect for finding query words that might be too common in URLs or link titles.
Eg: intext:”yahoo.com”
allintext:html
inanchor
Searches for text in a page’s link anchors. A link anchor is the descriptive text of a link. For example, the link anchor in the HTML code O’Reilly and Associates is “O’Reilly and Associates.”
Eg: inanchor:”tom peters”
site
Allows you to narrow your search by either a site or a top-level domain. AltaVista, for example, has two syntaxes for this function (host: and domain:), but Google has only the one.
Eg: site:loc.gov
site:thomas.loc.gov
site:edu
site:nc.us
You can also use site: operator to exclude certain domains from a search
Eg: google -site:google.com
This is particularly useful for ego searches. You can find out all those sites which mention your name expect your site.
Eg: bill gates -site:microsoft.com -site:wikipedia.org
link
Returns a list of pages linking to the specified URL. Enter link:www.google.com and you’ll be returned a list of pages that link to Google. Don’t worry about including the http:// bit; you don’t need it, and, indeed, Google appears to ignore it even if you do put it in. link: works just as well with “deep” URLs-http://www.raelity.org/apps/blosxo
Eg: link:www.google.com
cache
Finds a copy of the page that Google indexed even if that page is no longer available at its original URL or has since changed its content completely. This is particularly useful for pages that change often. If Google returns a result that appears to have little to do with your query, you’re almost sure to find what you’re looking for in the latest cached version of the page at Google.
Eg: cache:www.yahoo.com
filetype
Searches the suffixes or filename extensions. These are usually, but not necessarily, different file types. I like to make this distinction, because searching for filetype:htm and filetype:html will give you different result counts, even though they’re the same file type. You can even search for different page generators, such as ASP, PHP, CGI, and so forth-presuming the site isn’t hiding them behind redirection and proxying. Google indexes several different Microsoft formats, including: PowerPoint (PPT), Excel (XLS), and Word (DOC).
Eg: homeschooling filetype:pdf
“leading economic indicators” filetype:ppt
related
Finds pages that are related to the specified page. Not all pages are related to other pages. This is a good way to find categories of pages; a search for related:google.com would return a variety of search engines, including HotBot, Yahoo!, and Northern Light.
Eg: related:www.yahoo.com
related:www.cnn.com
info
Provides a page of links to more information about a specified URL. Information includes a link to the URL’s cache, a list of pages that link to that URL, pages that are related to that URL, and pages that contain that URL. Note that this information is dependent on whether Google has indexed that URL or not. If Google hasn’t indexed that URL, information will obviously be more limited.
Eg: info:www.oreilly.com
info:www.nytimes.com/technology
define
Will get the definition of the term that you have entered. This syntax can be used to get the definitions of words, phrases, and acronyms
Eg: define:dreaming
This query will get you the definition of the word dreaming
numrange
If you want to search for a range of numbers then you can use two dots (without spaces) to represent a range of numbers
Eg: inventions 1850..1899
This query will get you all the inventions between 1850 and 1899
stocks
If you start your query with stocks:, Google will interpret the rest of the query terms as NYSE, NASDAQ, AMEX, or mutual fund stock ticker symbols, and will open a page showing stock information for the symbols you specify.
Eg: stocks:goog
This will show information about Google’s stock. Specify ticker symbols not company names. If you enter an invalid ticker symbol, you’ll be told so and given a link to a page where you can look up a valid ticker symbol.
The Special Syntaxes
Currency Conversion
Google makes it easy to calculate money conversions from one form of currency to another.
Eg: $5 in yenThe above query will let you know that five dollars is worth about 566.599846 yen.
If you’re not sure of the name of a currency, use nationality instead.
Eg: 25 Australian money in Italian money
This may sound awkward but it does the job.
Eg: $5 in indian money
This will let you know that 5 US dollars is worth about 224.477976 Indian rupees
You can even convert units in this fashion.
Eg: $2.85 per gallon in British money per literThis query will tell you that it is about 42 pence per liter and provides an international basis for discussing gas prices at the pump.
Check Airfares
When you google for the names of two major cities, Google automatically offers to search for flights.
Eg: Denver Fort Lauderdale
In the form labeled “Flights from Denver, CO to Fort Lauderdale, FL”, enter a departure and return date and choose whether to search using Expedia, Hotwire or Orbitz. Do not use quotation marks in your initial search. Denver “Fort Lauderdale” will not bring up the flight search form.
Find Song Lyrics
If you are looking for the title or lyrics of a song then you can use Google search phrases and wildcards to find them.
Eg: “Friday I am in love” lyrics
Or use the wildcard operator to get lyrics with certain words in them, like this
“Friday * love” lyrics
Risk Of Using "Ctrl+C"
Its risky online.... To know this do following...
1.Copy any text by pressing Ctrl+C.
2.go to http://www.sourcecodesworld.com/special
3.You will see ur text their. This was accessed by this page.
Do Comment....
Unload Unused DLLs
Follow the trick to change it.
1. Type regedit in run.
2. Navigate to, HKEY_LOCAL_MACHINE\software\microsoft\windows\current version\AlwaysUnloadDll.
3. Double Click it. Set the value to 1.
Thursday, March 19, 2009
Make Your Windows Truly personalized Part -I
Shortcut to restarting xp..
You can restart a Windows XP Pro and Home machine easily by creating a shortcut with following path. (Assume you installed Windows XP on your C: Partition) “c:\windows\system32\shutdown.exe -r -f -t 00″ -r is for restarting the computer. -f is to force close all programs without saving. -t 00 is used to restart in zero seconds. i.e. as soon as you D.Click on the shortcut. You can log off from a Windows XP Professional or Home edition by running “C:\windows\system32\shutdown.exe -l -f -t 00″. Also you can shutdown a Windows XP Home or Professional edition by running “c:\windows\system32\shutdown.exe -s -f -t 00″. You always have to turn from the CPU after running this command. (Same with AT and ATX powered machines.) If you want to turn down power of ATX machine automatically, run “c:\windows\system32\tsshutdn.exe 00 /POWERDOWN /DELAY:00″ This is used to turn off a server. Even though your computer will be shutdown completely, this whole operation will take 30 seconds to finish. Even though you don’t have networked computers attached to your computer, this works.
1) Disabling Display of Drives in My Computer :
This is yet another trick you can play on your geek friend. To disable the display of local or networked drives when you click My Computer go to : HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer Now in the right pane create a new DWORD item and name it NoDrives. Now modify it’s value and set it to 3FFFFFF (Hexadecimal) Now press F5 to refresh. When you click on My Computer, no drives will be shown. To enable display of drives in My Computer, simply delete this DWORD item. It’s .reg file is as follows: REGEDIT4 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explore r] “NoDrives”=dword:03ffffff
2) Pop a banner each time Windows Boots :
To pop a banner which can contain any message you want to display just before a user is going to log on, go to the key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WinLogon Now create a new string Value in the right pane named LegalNoticeCaption and enter the value that you want to see in the Menu Bar. Now create yet another new string value and name it: LegalNoticeText. Modify it and insert the message you want to display each time Windows boots. This can be effectively used to display the company’s private policy each time the user logs on to his NT box. It’s .reg file would be: REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Winlogon] “LegalNoticeCaption”=”Caption here.”
3) Great trick Lock ur PC yourself
lock ur pc.. open notepad copy and paste the script below and save it .VBS extentionThis wil create a shortcut.. run(click) it
set WshShell = WScript.CreateObject(”WScript.Shell”)set oShellLink = WshShell.CreateShortcut(wshShell.SpecialFolders(”Desktop”) & “\LockWorkstation.lnk”)oShellLink.TargetPath = “%windir%\system32\rundll32.exe”oShellLink.Arguments = “user32.dll,LockWorkStation”oShellLink.Save
first select a folder for example i’ll use a folder name movies in D drive D:\movies\
in the same drive u create a text file and type
ren movies movies.{21EC2020-3AEA-1069-A2DD-08002B30309D}
and save it as loc.bat
again u type in a notepad as
ren movies.{21EC2020-3AEA-1069-A2DD-08002B30309D} movies
and save it as key.bat
now in D drive u can see two batch files loc and key.. when u double click loc the movie folder will change to control panel and when u double click key the control panel will change to normal folder..
there are two more different tricks in this site to lock your pc down in a unique ways.. don’t know where i have typed it.. !!!
4) Deleting System Options from the Start menu :
You can actually remove the Find and Run options from the start menu by performing a simple registry hack. Again like always Launch the registry editor and scroll down to the below key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer Right-click on the right pane and select New, DWORD Value. Name it NoFind.(To remove the RUN option name it NoRun). Double-click the newly create DWORD to edit it’s value and enter 1 as its value. This will disable the FIND option of the Start Menu and will also disable the default Shortcut key(F3 for Find.) To restore the Run or find command modify the value of the DWORD to 0 or simply Delete the DWORD value.
5) Cleaning Recent Docs Menu and the RUN MRU :
The Recent Docs menu can be easily disabled by editing the Registry. To do this go to the following Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer Now in the right pane, create a new DWORD value by the name: NoRecentDocsMenu and set it’s value to 1. Restart Explorer to save the changes. You can also clear the RUN MRU history. All the listings are stored in the key: HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMR U You can delete individual listings or the entire listing. To delete History of Find listings go to: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Doc Find Spec MRU and delete
6) Can u Delete Recycle Bin?
1 thing is 4 sure, delete option can be added 2 recycle bin…the old registry thing will work out…..* launch d registry…* open HKEY_CLASSES_ROOT\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\ShellFolder* to add a rename and delete option, change the Dword attribute to 70 01 00 20* refresh and reboot the system….. u r done.
PS: always backup y ur data as well as registry b4 attempting 2 work on it if u r a newbie….
7) To change the icons used for specific drives in explorer
Open regedit by typing regedit into start->run
then navigate to
HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/Explorer
now create a key(KEY not VALUE!!) called DriveIcons under Explorer…now within DriveIcons, create another key with the drive letter you want to change (e.g.,HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\DriveIcons\K)…create another key within the drive letter key called DefaultIcon… now set the default String value equal to the icon you want to use. if you have a file that has more than one icon in it, such as a DLL file, use the standard C:\full_path\icon_file.dll,n
~ c h e e r s! ~
More
change drive icons…..
first of all copy a icon file to the root of the drive.example: c:\icon.ico
then create a file called: autorun.inf in c:\autorun.infthen open that file and type the following:
[autorun]icon=icon.ico
save and close the file.
now open my computer and refresh.. and woh! icon changed….you can apply to other drives too.
be carefull
“autorun.inf” and “ico.ico” must be in the root of the drive.example: c:\autorun.inf and c:\icon.ico.same on the root.
ENJOY, this works on 98 too!!!!!!!!!!!!!!!!!!
8) Hacking windows SEND TO MENU
I know this is a very simple thing but the problem, as like many other issues, is the ignorance about it.
How often do you copy songs from a CD? Or some photos from a CD?
What do you do? You select the required files and do a CTRL –C. Open the destination folder and do a CTRL-V. Here is something you can benefit time from. Customize your SEND TO MENU.
This sounds simple and you can do it in less than sixty seconds. You can create your own BASKET.
First you’ll need access to hidden files. So change your view settings to make all hidden files visible. Tools -> folder options -> view (tab) and select the show hidden files and folders. go to parent drive:/documents and settings/(user name)/send to
Open up my computer and locate your most used folders.
Create a shortcut of the most used folders in SEND TO FOLDER. You can do this in a number of ways.
Right click -> send to desktop(create shortcut) and move the shortcut from the desktop to the SEND TO FOLDER
Copy the most used folder and go to SEND TO FOLDER and right click -> paste shortcut.
Also remember to rename the shortcuts to send to videos or send to photos. We don’t need confusion when we use the same later.
5. DONE
~ c h e e r s! ~
9) How to remove the shortcut arrow from the desktop ?
Open Regedit and navigate to the following key:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Shell IconsBackup the key. More information. In the right-pane, create a new String value named “29″Double-click 29 and set its data to:
C:\Windows\System32\shell32.dll,50 (an empty icon) Close Registry Editor.
Now,
Right-click Desktop, choose Properties Click the Appearance Tab.
Click Advanced button.
Choose Icon from the drop-down list
Set it’s size to 31 and press OK, OK.
The changes will be applied now. Repeat the above steps and then set the Icon size back to 32 (defaults). The above steps are required to force Windows to redraw the icons
10) The Complete list ! Can u Do it!
Try to create a folder in Windows with either of these names–”con” or “nul” or “Aux” or “Lpt1″.Windows will not let u create ….
This s coz these refer 2 some well known ports….-con corresponds to the console-Lpt1 corresponds to printer and so on….
well that was common but hw but this ? Try these more
CON, PRN, AUX, CLOCK$, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5, LPT6, LPT7, LPT8, and LPT9.
11) TURN NUMLOCK ON AT LOGON.!!
NumLock does not toggle on by default (system-wide), even if you have it set in your PC’s BIOS, because of XP’s multi-user functionality. Guess Microsoft doesn’t know everyone actually turns it on, which should be reason enough for what acts as “default”…Anyway, you can hack the Windows Registry to change this behavior, or run a script at logon to turn NumLock on.1. To enable NumLock through the Registry:* Open Windows’ Registry Editor (START > RUN, type “REGEDIT”).*. Navigate to HKEY_USERS\.Default\Control Panel\Keyboard.*. Change the value for InitialKeyboardIndicators from 0 to 2.2. To enable NumLock using a script, see this MS Knowledgebase article for complete instructions:CODEhttp://support.microsoft.com/directory/article.asp?ID=KB;EN-US;Q262625Option 1 is the quicker method, but if you have more than one user on your system and one or more don’t want NumLock on (stranger things have been known of), then option 2 is the way to go since it allows you to only attach the script to specific users.
12) REMOVING SERVICES DEPENDENCIES.!!
This will allow you to disable a service or uninstall it from your system without effecting another service that depends on it. Here’s how you do it1. After you have set your services the way you want them and you have disabled/uninstalled something that another services depends on, run “regedit”2. Under HKEY_LOCAL_MACHINE\System\find the service that will not function, do to another service being disabled/uninstall (found in ControlSet001\Services, ControlSet002\Services, and CurrentControlSet\Services)3. Once you have found the service right-click on the string value, “DependOnService,”and modify4. You should now see a list of services that it is dependent on. Simply delete the service that you have disabled/uninstalled5. Restart your computer and your ready to go Disclaimer REMEMBER TO BACKUP YOU REGISTRY FIRST I’m not totally sure if this will have any negative effects on your system. I used this method after uninstalling “Netbios over Tcpip” from my system completely, so that my Dhcp service would function and I have had NO negative effects on my system.
13) TURN ON UR PC IN JUST 10 SECONDS
Alight so u want to know how to turn the pc on in 10 seconds (may vary). Alright here’s what u have to do to turn your pc on in 10 seconds
Click on the start button then press R it will take u to Run well go to run type Regeditpress enterthis will open Registry Edit or now look for the key
HKEY_LOACAL_MECHINE\SYSTEM\CurrentControlSet\Control\ContentIndex
now there find the Key Called “Startup Delay”Double Click On It Now where its BaseClick Decimal Now its Default Value Is 4800000 (75300:hexadecimal)Change The Value To 40000here u go u have done it now close the Registry Editor and Restart Your Computer
CHEAT YOUR BROAD BAND
Step 1: Download any port Scanner (i preffer Super Scan, IPscanner, gfi LAN nat secirity scanner)
Step 2: First Get your ip
Go to Command prompt type ipconfig /all
Hit enter.
You will see your ip as a clients ip.
suppose its 61.1.1.51
Step 3: write your ip in IP scanner Software and scan for alive IPs in the below range
start:61.1.1.1 to End:61.1.255.255
Step 4: Then check in your scanner which alive IPs has the port 80 open or 23 for telnet.
Step 5: if port 80 is open then Enter that IP in your web browser
if 23 port is open then u shd knw how to telnet it frm cmd........
Step 6: It asks for user ID AND password type
username =admin
password =admin or password
It is the default password for most of the routers.
if denied then use on another alive IP
Step 7: If success then it will show router settings page of tht IP user
There goto Home -> Wan Setting and the username and password of his account will appear there.
Step 8: use Show Password tools to view the password in asterisks ********.
now you have user name and password ready for use.
Wednesday, March 18, 2009
OPTIMIZE WINDOWS START UP BY EDITING STARTOP UP PROGRAMS
To Open the MSCONFIG window click on Start Button, then Run, and then enter msconfig in the Run dialog box. Hit enter and you will be greeted with the window shown in the image above.
The tab which is of your importance in the Services Tab and the Startup Tab. Now it depends on you as to which service you need to disable and which shouldn’t be disabled. I will recommend not to touch Windows Services if you are not aware of what exactly you are up to.
You will have to restart your computer for the settings to take effect and after the restart you will be told once by Windows that you have disabled some services. Just click Ok and you are all set to use the quicker version of your Windows.
QUALITY OF SERVICE( QoS) CAN EAT UP YOUR BANDHWIDTH
Browse to the following registry key:
HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer
Now look for the DWORD value named NoInstrumentation and if it isn’t available then create it. You need to set this to 1 and hence all the user tracking will be disabled.
It will surely save some space and time of yours in the long run.
To open QoS you first need to open up Group Policy Editor.
- Click on Start button.
- Click on Run.
- Enter gpedit.msc in the Run dialog box.
- Now in the left pane you need to follow this path. Computer Configuration > Administrative Templates > Network > QoS Packet Scheduler.
- Once you reach here then in the right pane you will find Limit Reservable Bandwidth. Double Click on this and you will see a window.
- All you need to do is Enable the service and then set the Bandwidth Limit to 0%. Click Apply and then OK. Congrats! You now have 20% extra bandwidth for use.
DISABLE USER TRACKING IN WINDOWS XP TO IMPROVE PERFORMANCE
This won’t jump start your XP installation by many minutes but for sure it will make a difference in the long run. Windows XP has a User Tracking feature which keeps track of every activity of users and this data is available to the admin for use. This data is totally useless and hence it is always recommended to disable this service.
Browse to the following registry key:
HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer
Now look for the DWORD value named NoInstrumentation and if it isn’t available then create it. You need to set this to 1 and hence all the user tracking will be disabled.
It will surely save some space and time of yours in the long run.
AUTO DELETE DLLs AND OVERCAOME SILLY ERRORS
You must be very well aware that Windows XP has the habit of creating Dynamic Link Libraries (DLL files) whenever it is about to start a new program and during installation. These DLL files hog the useful space and many times make the system unstable even when they are of no use. Thus it is always recommended that you delete these DLL files and hence save your system from behaving awkwardly.
Browse to the following registry key:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer
You will have to look for the DWORD value AlwaysUnloadDLL in the right pane and create the same if it isn’t already present. Assign 1 to this DWORD value and from now on your OS will willingly unload all DLLs when the application which was responsible for these DLLs is no longer in use.
VISTA LOOK IN XP
Not exactly Windows Vista but FlyKiteOSX will give your Windows XP the look of MAC OS X. If you are one of those who wanted to enjoy Windows XP for ever but also love the interface of Mac OS X (or Windows Vista, both are almost similar ) then this application is a must try for you.
Some of the features are:
- Object Dock.
- WinRoll programs for extra elements of Mac OSX.
- Changes the icons in the Start Menu.
- New boot / login screen for Windows.
- Converts the font and icons for Windows.
Monday, March 16, 2009
Web based Video Conferencing
1) You don't need a standalone application such as Skype to make free calls over the net.
2) You don't need a separate Video Conferencing application.
3) You can talk without the need to download VOIP softphones or Skype etc.
4) You can talk and video conference from anywhere in the world.
5) No Signup, No Login Accounts. You can talk/Video conference with upto 2 people simultaneously. The best part we liked about Ekko is the simplicity in Web Conferencing. When you go to Ekko, you will be given a Video Conferencing URL. Its like your conference room, All you need to do is share that link with others. When they follow that link, they automatically get added to your Video conferencing session. You can adjust your microphone and Webcam. Done. Now 3 people can talk to each other for FREE and can video conference at the same time. No frills attached.
Web Conferencing is becoming a big market as people are moving towards interactivity in communication. Video Conferencing via mobile phone is now a reality. With the introduction of 3G and Wifi, making their way into your phone, you would now be able to start making video conference calls via your Mobile Phone. But for that you have to pay a good some of money. So, here is web based video conferencing which is FREE to try.. We are really impressed by Ekko.
Ekko is definitely one of the most Simple, Interactive and cool Video Conferencing Service.
Web Conference Call Services
Any web conference calling requires some initial setup for each of the participants involved in it. Each one must have a computer, and every computer should be connected to other participants through a reliable Internet connection. A Web conference call involves the features of audio and video. The presenter or the calling party shares the screen of its computer with other participants so as to enable them to see what is on its screen. The audio part is accompanied to this screen through telephone equipments or VOIP. Though it is not mandatory to use
Sometimes conventional corporate professionals and people who are not versed in the advanced technologies find it very difficult to adapt to the new system of conferencing, which is gaining firm hold in the business world. The use of web conferencing is breaking the boundaries of corporate sector and entering new arenas also. Web conference calling provides economic arrangement of meetings, and eliminates the need of travelling for conventional face-to-face meetings. Web conference calling is quick in its operation and saves a lot of time, apart from the fact that web conference calls can be recorded for playback option at later times.
Web conference calls are also helpful in business sectors that are more dependent of IT tools and computers. Application and file sharing features of web conference calls make it a must for all IT-based businesses. So, we can well-judge that web conference calling offers new vistas for the technology-based business, and at the same time, saves a lot of time and money for the other types of business.
ATT Conference Call
The ATT Conference Call System can handle up to 200 people per call. This is really an amazing feature, since small businesses can have company-wide calls, and large corporations can have department wide meetings without using up all the call-space. People don't have to crowd into cramped conference rooms using the ATT Conference Call Another great feature of the ATT Conference Call System is that there is no setup fee for
Here are some highlights of the ATT Conference Call Service:
-Desktop Sharing and File Transfer
-Public Message Whiteboard- Supposed to be used for business purposes, but who can resist drawing silly things?
-Public and Private Chat Rooms
-Voting Capabilities
-Desktop / Application Sharing
-Audio Record and Playback
-Video Conferencing
FREE WEB HOSTING SERVER LIST
Here is the list:-
1. 50Webs
50Webs- Free Web Hosting
* 60 Mb storage
* Unlimited bandwidth per month
* 1 Subdomain : mysite.50webs.com
***NO Ads
***Your Ads -> Allowed
* 1 FTP account
* 1 POP3 account
* Host Unlimited Domains
* Host Unlimited WebSites
2. Your-Websites.com
Your-Websites = MFA site
- 100 MB Web Space
- PHP and MySQL Database Support
- cPanel hosting with Fantastico
- No file size restrictions
- 1 GB Monthly Traffic
- POP3, SMTP, and Web-based Email (Webmail)
- English web sites only.
- Subdomain : yourname.your-websites.com
***Your Ads -> Allowed
***NO Forced Ads (bannerless) - Ad-FREE Hosting
3. PhpNet.us
- 300 MB Web Space
- PHP and MySQL Database Support
- No file size restrictions
- 80 GB Monthly Traffic
- POP3 Email Support
- Subdomain : yourname.phpnet.us
***Your Ads -> Allowed
***NO Forced Ads
4. Cjhost.com- Free Web Hosting
* 1000 mb of Space
* 2000 mb of Traffic/Bandwith
***Forced Ads - TextLinks
***Your Ads -> Allowed
* Free Easy to Use Upload Manager
* Free Message Boards
* Free Personal Guest Book
* Free Search Engine Submissions
* Free Form Mailer
* Free Site Builder
* Subdomain :
5. 125mb.com- Free Web Hosting
* 125 MB of Web Space
* 5GB of bandwidth/mounth
*** Ads = Popunders
***Your Ads -> Allowed
* 1 FTP account
* Free Subdomain yourwebsite.125mb.com
6. 95mb.com- Free Web Hosting
* 95 Mb storage
* UNLimited traffic
* No banners or textlinks = NO ADS
* Subdomain : http://yourname.95mb.com
* FTP and File Manager Upload
7.Noads.biz- Free Web Hosting
* 50 Mb storage
* Limited http traffic - FTP traffic is not metered.
***NO Ads
***Your Ads -> Allowed
* 1 FTP account
* PHP 5.0.4
* Host 1 domain
* Free Subdomain yourchoice.noads.biz
* No Restrictions for file size, type, etc.
* ImageMagick 6
* Advanced Control Panel
8. Freehostia- Free Web Hosting
* 250 Mb storage
* 5 GB bandwidth per month
***NO Ads
***Your Ads -> Allowed
* 1 FTP account
* 3 POP3 accounts
* Host 1 domain
* Host 5 subdomains
* 1 MySQL database
* Perl enabled
* PHP enabled
* PHPMyAdmin
* FrontPage Extensions
* Advanced Control Panel
* Web-based file manager
* you need a domain to sign up
9. Cabspace- Free Web Hosting
* 100MB Disk Space
* 1 Giga per day Bandwidth
* 1 Subdomain : yourname.cabspace.com
***NO Ads
***Your Ads -> Allowed
* 1 FTP account
* 1 POP3 account
* Free Fully Customizable PHPBB Forum
* Custom Control PanelRobust Intel Hardware
WorldWide Ventrilo and Teamspeak Server Network
VoipServers.net offer a free demo servers if you feel that your existing voip server not meet your expectation in terms of perfect quality and performance.
TeamSpeak Server
Instant server setup
24/7/365 Customer service
Easy Online control panel
No Bandwidth Limie
No codec restrictions
Mac code available !
100% Gaming Network
9 worldwide locations
Ventrilo Server
Instant server setup
24/7/365 Customer service
Easy Online control panel
No Bandwidth Limie
No codec restrictions
Mac code available !
100% Gaming Network
21 worldwide locations
Change your server now and start subscribe with VoipServers.net for quality and performance satisfaction.
Control pc via bluetooth mobile | Bluetooth Remote Control 4.0
Bluetooth Remote Control 4.0 is the upgraded version of Bluetooth remove control 3.0 which allows you to control your pc via bluetooth mobile .This is the only best software which we can use to control our pc via bluetooth mobile. Transform your phone with Bluetooth in a universal remote control for the PC. Now a days blutooth remote control is mostly used in business and pleasure! We can easily operate Powerpoint Presentation and we can see slides in the mobile phone. No need for extra settings. we can easily control pc via bluetooth mobile by just installing bluetooth remote control 4.0 software. That is we can romote or control pc with our mobile phone via bluetooth. We can change songs, play video songs, movies, media player, we can browse for artists, albums and we can change volume and much more…. Bluetooth Remote Control is a true universal remote control.You can add support by writing Java or VB scripts, defining key maps and file actions. It completely allows the user to modify the current behavior as well as add support for many applications.From this we can say Bluetooth Remote Control is a true universal remote control.
features :
ITunes
Shows song name, artist & track time and UI objects
Browse playlists, songs, artist, album and composers
Search for songs
Rank tracks
Toggle shuffle
Repeat track or library
Play/pause, rewind, fast forward, change volume, previous/next track
Mute
PowerPoint
Shows next slide and slide notes
Shows actual slides
Play/stop presentation, previous/next slide
Load recently used file
Browse/Goto all/any slide
Presentation time
Scroll slide notes
Vibrate when time expires
WinAMP
Shows song name, artist & track time and UI objects
Search for song and artists
Play/pause, rewind, fast forward, change volume, previous/next track
Toggle shuffle mode
Change volume
UI objects
Toggle repeat mode
Windows Media Player
Shows song name, artist & track time and UI objects
Browse playlists and artists
Rank tracks
Toggle shuffle
Repeat track or library
Play/pause, rewind, fast forward, change volume, previous/next track
Mute
Mouse mode
Full support for controlling the PC mouse
See the computer desktop on the phone
Zoom in and out of the desktop
B&W colors for faster response time
Enter text
File Browser
Allows launching of files
System
Change system volume
Start screensaver
Lock workstation
Shutdown Windows
Start screensaver
Advantages and disadvantages of internet banking
Internet Banking: Internet banking also called as Online Banking. It allows customers to conduct financial transactions on highly secure websites operated by government services. In today’s technology Internet banking assumes a special significance. Before internet banking came in to existence, funds transactions felt a bit difficult. We have to go bank and have to write demand draft or cheque in favor of customer and we have to drop in cheque box. After internet banking came into digital world money transactions became much simpler and faster. Not only funds transfer the use of Internet has revolutionized the way people deal with so many things around the world, like shopping, chatting with friends, currency exchange, selling products etc. Totally everything is online now. Even we can pay current bills, telephone bills; order food and many more we can do online. We can handle each and everything just by sitting before net.
Advantages disadvantages for internet banking:
First let us talk about some advantages of Internet banking.
1) As we know banks will not be open for 24 hours. We cannot withdraw money if the bank has closed. But ATM’s are always open for 24hours. This is the greatest advantage of Internet banking. We can withdraw money any time using this service. Our government has provided extraordinary facility that we can find number of ATM centers around our residential areas. One doesn’t have to go to the bank to request account statement. Everything is provided online by bank officials.
2) Internet banking reduces man power. Few years back we have seen many clerks and cashiers helping clients. But internet banking has
3) Great expenditure on paper slips, cheque books, stationary, electricity and man power has got down and profit margin of the banks has grown up.
4) We can buy any product through online using credit facility. This is also great advantage of Internet banking.
5) We can easily transfer funds from one bank to another bank with zero percent interest. This facility helps when we are away from our station. For example if you are in some Y station and you don’t find your bank in Y station. What will you do? You just transfer your money from your bank to any bank which presents in Y station. Everything happens in seconds.
6) You can also trade using Internet banking and you can also apply for loan without visiting bank. Internet banking has made life much easier and simpler. It is more pleasant for bankers as well as for customers.
Disadvantages using Internet Banking:
Really I don’t find much disadvantages using internet banking. But we have to be much careful about our credit cards. We should not have to buy any products from unlicensed websites. There may be chances of loosing our money from those kinds of website. Don’t install any softwares in your pc which doesn’t have any license. Why because many softwares comes with viruses. Those viruses cannot be found even if we scan our complete PC. Whenever we login our online bank account these virus export our passwords to their emails. This is how passwords are being hacked without knowingly. Thus the activities of Internet banking has became more benefits to its disadvantages.
These are the few Advantages and disadvantages for Internet banking
Procedure to Restore Your PayPal Account Limited Access
In this article I am going to explain you how to get restored from Paypal limited access. As you know Paypal is very strict in their rules and regulations. If they doubt on your account, immediately they will give Limited account access. Recently my Paypal Personal Account was limited and I was shocked after seeing my inbox. Just checkout the image what paypal said to me?
I was completely frustrated because of limited access 2nd time for me after long wait time in paypal queue. First time I waited for 1months for my account limited access. I left my paypal account after getting limited access. I haven’t taken any step to remove limited access why because I haven’t read any TOS and at that time I don’t know the rules and regulations.
2nd time I have taken very serious. With in 24 hours my paypal account gets restored
I felt very very happy with paypal team. You just have to follow what paypal says. Send the complete proofs what paypal required.
steps to follow:
1) First you have to find out the reason why paypal limited your account. In my last article How to protect your Paypal account from Limited Access I have given you many reasons why paypal limits your account.
2) You have to send complete documentations what paypal requires. You may get a mail like this:
To regain access to your account, provide the following documentation
Within the next seven days:
• A copy of government-issued photograph identification (i.e. passport,
driver’s license) that provides date of birth
• A copy of a utility bill verifying your address
Include the email
copies.
———————————–
3) I hope you people are having all proofs. I have submitted a copy of my License proof, Address proof with my full name and mainly Passport.
4)Paypal needs Utility bill. I hope many of you are not having. I have also faced with this problem. I have searched in net How to provide Current Utility bill to Paypal? But I haven’t found exact answer from any website. Lastly I have attached my residential current bill and phone bill (not mobile number). Why because those bills comes with my surname. And i have written clearly about my problem to paypal.
Lastly I have attached my bank statement saying that I am paying college fees through my bank and please consider this proof as a current utility bill. (Your bank statement should consider your full name as in Paypal, residential address, bank account number, bank name)
4)Fax or attach all those copies through your paypal email address. After attachment send a mail to Paypal (spoof@paypal.com) in a pleasing manner that you have attached all those copies and request them to restore your account as soon as possible. Paypal is a very big team that they give reply for every mail in a polite manner. Just checkout the below mail i have received from paypal.
5) My Paypal account has been restored in next 24 hours. You can have the proof of my restored account. I was really shocked and I sincerely thank to paypal team.