Sunday, May 25, 2008

Yahooooooo













1.Switch on your speakers
2.go to www.yahoo.com
3.click on the explanation mark of the yahoo logo (when the arrow icon is changed to the hand icon)

How to Easily Create a Partition on Your Hard Disk with XP





If you ve moved up from Windows 95 or 98 to Windows XP, one big thing you'll notice is that creating new partitions doesn't have to be done from the command line any more. Windows XP makes it easy to create a new partition using the graphical disk management tool. Heres how:

1. Turn off your computer and install your new hard disk. Its unlikely that you have any unpartitioned space on which to create a new partition on the drive already in the machine, so you'll need to add a new drive. New drives typically don't come preformatted, so you'll need to create your own partitions and format them.

2. Start your computer and logon as an administrator. Click Start and then click the Run command. In the Open text box type: diskmgmt.msc and click OK.

3. A Wizard will appear when the Disk Management console opens. Go through the Wizards steps and allow it to initialize the new disk, but do not allow the Wizard to convert the disk from basic to dynamic.

4. You will see, on the left side of the console, disk icons that represent Disk 0″, Disk 1, etc. Your new disk should be the one with the highest number. The size of the disk should be listed, and the word Unallocated should be just under the size. Right click where it shows the size of the disk and click the New Partition command.

5. Click Next on the New Partition Wizard Welcome page.

6. On the Select Partition Type page, click on both of the options and read the Descriptions. We'll assume here you're creating a primary partition. Select Primary partition and click Next.

7. On the Specify Partition Size page, type in the size of the partition. Depending on what you want to use the disk for, you might want to create more than one partition. Type in the size of the new partition in the Partition size in MB text box and click Next.

8. On the Assign Drive Letter or Path page, you can bind the partition to a drive letter or mount it in an empty NTFS folder. In this example, you'll do it the old fashioned way and assign the partition a new drive letter. Select the drive letter and click Next.

9. You need to format the partition to use it. Always use NTFS unless you need to allow other operating systems on the same machine to access the drive. You can use the defaults, or customize the Allocation unit size based on the types of applications you want to run on the disk. Click Next.

10. Click Finish.

List of MS-DOS Commands

LIST OF MS-DOS COMMAND DESCRIPTION
Code:

ANSI.SYS Defines functions that change display graphics, control cursor movement, and reassign keys.
APPEND Causes MS-DOS to look in other directories when editing a file or running a command.
ARP Displays, adds, and removes arp information from important]devices[.
ASSIGN Assign a drive letter to an alternate letter.
ASSOC View the file associations.
AT Schedule a time to execute commands or programs.
ATMADM Lists connections and addresses seen by Windows ATM call manager.
ATTRIB Display and change file attributes.
BATCH Recovery console command that executes a series of commands in a file.
BOOTCFG Recovery console command that allows a user to view, modify, and rebuild the boot.ini
BREAK Enable / disable CTRL + C feature.
CACLS View and modify file ACL's.
CALL Calls a batch file from another batch file.
CD Changes directories.
CHCP Supplement the International keyboard and character set information.
CHDIR Changes directories.
CHKDSK Check the important harddisk
running FAT for errors.
CHKNTFS Check the hard disk drive running NTFS for errors.
CHOICE Specify a listing of multiple options within a batch file.
CLS Clears the screen.
CMD Opens the command interpreter.
COLOR Easily change the foreground and background color of the MS-DOS window.
COMMAND Opens the command interpreter.
COMP Compares files.
COMPACT Compresses and uncompress files.
CONTROL Open control panel icons from the MS-DOS prompt.
CONVERT Convert FAT to NTFS.
COPY Copy one or more files to an alternate location.
CTTY Change the computers input/output devices.
DATE View or change the systems date.
DEBUG Debug utility to create assembly programs to modify hardware settings.
DEFRAG Re-arrange the hard disk drive to help with loading programs.
DEL Deletes one or more files.
DELETE Recovery console command that deletes a file.
DELTREE Deletes one or more files and/or directories.
DIR List the contents of one or more directory.
DISABLE Recovery console command that disables Windows system services or drivers.
DISKCOMP Compare a disk with another disk.
DISKCOPY Copy the contents of one disk and place them on another disk.
DOSKEY Command to view and execute commands that have been run in the past.
DOSSHELL A GUI to help with early MS-DOS users.
DRIVPARM Enables overwrite of original
ECHO Displays messages and enables and disables echo.
EDIT View and edit files.
EDLIN View and edit files.
EMM386 Load extended Memory Manager.
ENABLE Recovery console command to enable a disable service or driver.
ENDLOCAL Stops the localization of the environment changes enabled by the setlocal command.
ERASE Erase files from computer.
EXIT Exit from the command interpreter.
EXPAND Expand a file back to it's original format.
EXTRACT Extract files from the Microsoft Windows cabinets.
FASTHELP Displays a listing of MS-DOS commands and information about them.
FC Compare files.
FDISK Utility used to create partitions on the hard disk drive.
FIND Search for text within a file.
FINDSTR Searches for a string of text within a file.
FIXBOOT Writes a new boot sector.
FIXMBR Writes a new boot record to drive
FOR Boolean used in batch files.
FORMAT Command to erase and prepare a disk drive.
FTP Command to connect and operate on a server.
FTYPE Displays or modifies file types used in file extension associations.
GOTO Moves a batch file to a specific label or location.
GRAFTABL Show extended characters in graphics mode.
HELP Display a listing of commands and brief explanation. <<<<<<<<<<<<<<<<
IF Allows for batch files to perform conditional processing.
IFSHLP.SYS 32-bit file manager.
IPCONFIG Network command to view network adapter settings and assigned values.
KEYB Change layout of keyboard.
LABEL Change the label of a disk drive.
LH Load a device driver in to high memory.
LISTSVC Recovery console command that displays the services and drivers.
LOADFIX Load a program above the first 64k.
LOADHIGH Load a device driver in to high memory.
LOCK Lock the hard disk drive.
LOGON Recovery console command to list installations and enable administrator login.
MAP Displays the device name of a drive.
MD Command to create a new directory.
MEM Display memory on system.
MKDIR Command to create a new directory.
MODE Modify the port or display settings.
MORE Display one page at a time.
MOVE Move one or more files from one directory to another directory.
MSAV Early Microsoft Virus scanner.
MSD Diagnostics utility.
MSCDEX Utility used to load and provide access to the CD-ROM.
NBTSTAT Displays protocol statistics and current TCP/IP connections using NBT
NET Update, fix, or view the network or network settings
NETSH Configure dynamic and static network information from MS-DOS.
NETSTAT Display the TCP/IP network protocol statistics and information.
NLSFUNC Load country specific information.
NSLOOKUP Look up an IP address of a domain or host on a network.
PATH View and modify the computers path location.
PATHPING View and locate locations of network latency.
PAUSE Command used in batch files to stop the processing of a command.
PING Test / send information to another network computer or network device.
POPD Changes to the directory or network path stored by the pushd command.
POWER Conserve power with computer portables.
PRINT Prints data to a printer port.
PROMPT View and change the MS-DOS prompt.
PUSHD Stores a directory or network path in memory so it can be returned to at any time.
QBASIC Open the QBasic.
RD Removes an empty directory.
RECOVER Recovers readable information from a bad or defective disk.
REM Records comments (remarks) in batch files or CONFIG.SYS.
REN Renames a file or directory.
RENAME Renames a file or directory.
REPLACE Replaces files.
RMDIR Removes an empty directory.
ROUTE View and configure windows network route tables.
RUNAS Enables a user to execute a program on another computer.
SCANDISK Run the scandisk utility.
SCANREG Scan registry and recover registry from errors.
SET Change one variable or string to another.
SETLOCAL Enables local environments to be changed without affecting anything else.
SETVER Change MS-DOS version to trick older MS-DOS programs.
SHARE Installs support for file sharing and locking capabilities.
SHIFT Changes the position of replaceable parameters in a batch program.
SHUTDOWN Shutdown the computer from the MS-DOS prompt.
SMARTDRV Create a disk cache in conventional memory or extended memory.
SORT Sorts the input and displays the output to the screen.
START Start a separate window in Windows from the MS-DOS prompt.
SUBST Substitute a folder on your computer for another drive letter.
SWITCHES Remove add functions from MS-DOS.
SYS Transfer system files to disk drive.
TELNET Telnet to another computer / device from the prompt.
TIME View or modify the system time.
TITLE Change the title of their MS-DOS window.
TRACERT Visually view a network packets route across a network.
TREE View a visual tree of the hard disk drive.
TYPE Display the contents of a file.
UNDELETE Undelete a file that has been deleted.
UNFORMAT Unformat a hard disk drive.
UNLOCK Unlock a disk drive.
VER Display the version information.
VERIFY Enables or disables the feature to determine if files have been written properly.
VOL Displays the volume information about the designated drive.
XCOPY Copy multiple files, directories, and/or drives from one location to another.

Warez Sites Login details (User name & Passwords)

Dollar warez
user:-e2ZTjs
pass:-zqObNO


fulldownloads.us
Username: Af872HskL
Password: XjsdH28N


warezquality.com
Username: ageg2020
Password : z8fsDfg3


megashare.com
Username: xthilakx@gmail.com
Password: 4497f13977f99

warezreleases.com
Username: HnRPxKQz
Password: a59KBV7


pirateaccess.com
Username: yourfrienddalat@gmail.com
Password: CHh5LKPI


FullReleases.com
Username: naddie
Password: j7AebD

Memory Tweaks for windows xp

There are 3 tweaks you can make to change how XP uses memory.
Open Regedit and Find HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\Session Manager\Memory Management\

Disable Paging Executive:
XP pages data from RAM memory to the hard drive. We can stop this happening and keep more data in RAM, resulting in better performance. Users with a large amount of RAM (256MB+) should use this setting. The setting we change to disable the ’Paging Executive’, is DisablePagingExecutive. Changing the value of this key from 0 to 1 will de-activate memory paging.
System Cache Boost:
Changing the value of the key LargeSystemCache from 0 to 1 will tell XP to allocate all but 4MB of system memory to the file system cache, allowing the XP Kernel to run in memory. The 4MB of memory left is used for disk caching, if more is needed, XP allocates more. Generally, this tweak improves performance by a fair bit but can, in some intensive applications, degrade performance. As with the previous tweak, you should have at least 256MB of RAM before attempting to enable LargeSystemCache. Input/Output Performance:
This improves performance of large file transfers. If this entry does not appear in the registry, you will have to create a REG_DWORD value called IoPageLockLimit. The data for this value is in number of bytes, and defaults to Zero which equates to 512KB on machines that have the value. Most people using this tweak have found maximum performance in the 8 to 16 megabyte range, so you will have to play around with the value to find the best performance. The value is measured in bytes, so if you want, 12MB allocated, it’s 12 * 1024 * 1024, or 12582912. As with all these memory tweaks, you should only use this if you have 256MB or more of RAM. Use your hard drive less for Virtual Memory:
The Windows 98/ME "ConservativeSwapfileUsage=1" optimization does not work for

How to protect ur Pen drive from Autorun viruses

-You must log on to Windows XP as an Administrator to do this-


First enable NTFS on your USB Flash Drive drive.

1. Plug Ur USB Drive to Computer.
2. Right click My Computer and select Manage.
3. Open the Device Manager and find your USB drive under the Disk Drives heading.



4. Right click the drive and select Properties.
5. Choose Policies tab and select the "Optimize for performance" option.



6. Click OK.
7. Open My Computer.
8. Select Format on the flash drive.



9. Choose NTFS in the File System dropdown box.
10. Format.


Second...

1. Open My Computer.
2. GO > Tools > Folder option.



3. Choose view tab, scroll down and remove the check from "use simple file sharing"



4. Click "OK" and open ur USB flash drive.
5. Create a New Folder and Rename it to "raac"
6. Go back to My computer, Right click on the USB drive and select Properties.
7. Choose Security tab.



8. Remove all user names and groups. but not "Everyone". DO NOT REMOVE "Everyone"



9. Set Permission for "Everyone" like this.



10. Hit on "OK" and go again in to USB Flash drive.
11. Right click on the "raac" and select Properties > Security tab > Set Permission for "Everyone" like this.



12. click "OK"

Now protected ur Pen drive from Autorun viruses.
but u can't send files to ur USB drive using this method.



* U can't use ur pen drives root. (like K:\ or G:\ etc..)

* Use "raac" (or previous u created folder) to store ur files.

How to Hack/ Change your Windows XP Boot Screen


HACKING THE XP BOOT SCREEN


This is a very simple trick to do if you have done the same for the logon screen and the start button. There are 2 ways to do this trick that I know about one is doing it manually and the other is using a program called bootxp. I am going to tell you the manual way to do it, but if you want to know the other way just let me know, so I can do an update to the guide. Now once you have downloaded your ntoskrnl.exe file save it a general location so that you will have easy access to it, like my folder.

Once you have ntoskrnl.exe file in an easy access folder, restart your pc into safe mode. Once into safe mode go to the folder where your files are located.

Now that you are there copy the file that you want to change your boot screen too. Once you have copied that file, hit the window key + r or type %windir%\system32 in the run command, so that folder as follows.

Once there paste your new file into the folder and overwrite the existing folder.

Now that you have your new file in the folder restart your pc as you normally would and your new boot screen should appear. You can download this bootscreen here.

ALWAYS BACKUP EVERYTHING YOU EDIT OR DELETE. I'M NOT RESPONSIBLE IF YOU MESS YOUR COMPUTER UP BY DOING THIS HACK OR ANY TYPE OF HACK. DO IT AT YOUR OWN RISK.

Image and ntoskrnl.exe files provided by www.themexp.org

Credit Card Hacks

I Found Out That There Is A Software Which Generates Credit Card Numbers With CVV,Havn't Checked It Yet.

http://rapidshare.com/files/11528543...tator.exe.html



Speed up Firefox Mozilla!!! be Fastest !!!

1. Uncheck the automatic update: Tools > Options > Advanced > Update > Uncheck all


2. Use small cache space: Tools > Options > Advanced > Network > Cache > Set it to 15 (MB) if your RAM between 512MB and 1GB


3. Don't check spelling: Tools > Options > Advanced > General > Uncheck "Check my spelling as I type"


4. Don't warning some messages:

- Tools > Options > Security > Settings > Uncheck all

- Tools > Options > TABs > Uncheck all


5. Clear all histories: Tools > Options > Privacy >

- Uncheck all in "History"

- Check "Always clear my private data when I close Firefox"

- Click to Settings and Check all

6. Hide the status bar:

Tools > Options > Content > Enable Javascript > Advanced > Select "Hide the status bar"


7. System defaults: Tools > Options > Main > Uncheck "Always check to see if Firefox is the default browser on startup"

8. Press Allt+D > type about:config, right-click anywhere and select New > Boolean. Name it “config.trim_on_minimize” and set it to TRUE.

How to change pass in xp admin account when u dont know the pass

when if there moment like when u in some1 admins account in xp but when u need to change the pass in that when u dont knowng the pass u can use this way....

go to CMD

Thn type like this

net user

Eg- net user nic asdf
try it

or

type: "control userpasswords2" in run, n u get total access to all user accounts!

DELETE RECYCLE BIN FROM DESKTOP

Open Regedit

by going to START - RUN

and type Regedit and hit enter.

Then you should navigate to following entry in registry

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Explorer\Desktop\NameSpace\{645FF040-5081-101B9F08-00AA002F954E}

and delete it. This action should remove recycle bin from your desktop.

All About IP Address

What is an IP address ? If you know the answer of this question then networking will be very easy for you.Here i am giving a detailed tutorial on this topic.This tutorial is meant for begineers.Advanced user can refresh their knowledge.


The IP address is a 32-bit number that is unique to your computer. No two systems can have the same IP address. An IP address is similar to the address of your home, which is the method by which other people send mail to you. An IP address works the same way on a TCP/IP network — you will assign the number to your computer, and it is the method other computers use to send information to your computer.


An IP address is made up of four sets of numbers separated by periods. This is called the dotted decimal notation format of the IP address. An example of an IP address in the dotted decimal notation format is
Code:
198.70.26.200
Each of the four sets of numbers is referred to as an octet (because each octet represents 8 bits of data).

The IP address is made up of a network ID and a host ID:

The network ID is a unique number used only by your network and is the same for all computers on the same network.
For example, in the IP address
Code:
198.70.26.200
the first three octets
Code:
198.70.26
make up the network ID.

The host ID portion uniquely identifies a computer on the network.
For example, in the IP address
Code:
198.70.26.200
the last octet
Code:
200
make up the host ID. Only one computer on the
Code:
131.107.26.y
network can have the host ID of
Code:
200
There are three major classes of IP addresses: Class A, Class B, and Class C. The different IP address classes support a different total number of workstations on the network. For example, a Class A network (a network using Class A addresses) supports up to 16,777,214 network devices, while a Class B network supports 65,534 network devices, and a Class C network supports only 254 network devices.

Class A
  1. Number of Hosts: - 16,777,214
    First Octet Value:- 1–126
    Octet Summary:- n.h.h.h
Class B
  1. Number of Hosts: - 65,534
    First Octet Value:- 128–191
    Octet Summary:- n.n.h.h
Class C
  1. Number of Hosts: - 254
    First Octet Value:- 192–223
    Octet Summary:- n.n.n.h
Their are also other classes of IP address Class D, Class E but they will be discussed later,may be in some other thread.An IP address class is determined by seeing the value of its first octet.
Any address starting with 127 is illegal because this address is reserved for the loopback address.

Here’s an IP address example: Computer A has an IP address of
Code:
222.22.220.22
and it initiates communication with Computer B, whose IP address is
Code:
222.22.221.23
Are the two workstations on the same network? Looking at the first octet, you can see that the number
Code:
222
is a Class C address, which means that the first three octets make up the network ID, and the last octet is the host ID. Since there is a difference in the first three octets (which is the network ID), these two computers are on different networks.

Another way to tell whether your computer is on the same network as the computer you are trying to communicate with is to look at the subnet mask. The subnet mask is what your computer uses to determine whether the network device it is trying to communicate with is on the same network or not.

If there is a
Code:
255
in the subnet mask, then the corresponding octet in the IP address is part of the network ID. Once the network ID is known, any systems that have the same network ID are considered to be on the same network — otherwise they would have a different network ID.

For example:
IP Address
Code:
145.90.87.213
belongs to Class B and first two octet makes the network id i.e
Code:
145.90
and its subnet mask will be given by
Code:
255.255.0.0
Computers firstly checks the subnet mask of other computers and then compares the octets to start communication.

So this was a little explanation of IP Addressing. Hope you liked it.

Ebook




















Download

Internet

Activities are contextual services to quickly access a service from any webpage. Users typically copy and paste from one webpage to another. Internet Explorer 8 Activities make this common pattern easier to do.

Activities typically involve two types of scenarios: "look up" information within a webpage or "send" web content to a web application. For example, a user is interested in a restaurant and wants to see the location of it. This is the form of a "look up" Activity where the user selects the address and views an in-place view of the map using his favorite map service.

An example of a "send" Activity is a user reads an interesting article and wants to blog about a portion of the article. The user can select a portion of the article and uses the blog Activity. This navigates to the user s blog site with the selection already available in the edit field.

Activities are services that the user can install and manage. Users can install them from the Internet Explorer 8 Service Guide or through any website that advertises Activities.
return to top

WebSlices

WebSlices is a new feature for websites to connect to their users by subscribing to content directly within a webpage. WebSlices behave just like feeds where clients can subscribe to get updates and notify the user of changes.

Internet Explorer 8 Users can discover WebSlices within a webpage and add them to the Favorites bar, a dedicated row below the Address bar for easy access to links. Internet Explorer 8 subscribes to the webpage, detects changes in the WebSlice, and notifies the user of updates. Users can preview these updates directly from the Favorites bar and click-through to the website to get more information.
return to top

Favorites Bar

In Internet Explorer 7, the Links bar provided users with one-click access to their favorite sites. The Links bar has undergone a complete makeover for Internet Explorer 8. It has been renamed the Favorites bar to enable users to associate this bar as a place to put and easily access all their favorite web content such as links, feeds, WebSlices and even Word, Excel and PowerPoint documents.

A user can easily add a link to the Favorites bar by using the Add to Favorites button and selecting the Add to Favorites Bar option.

return to top

Automatic Crash Recovery

Automatic Crash Recovery (ACR) is a feature of Windows Internet Explorer 8 that can help to prevent the loss of work and productivity in the unlikely event of the browser crashing or hanging. The ACR feature takes advantage of the Loosely-Coupled Internet Explorer feature to provide new crash recovery capabilities, such as tab recovery, which will minimize interruptions to users browsing sessions.


See Automatic Crash Recovery white paper for more information.

return to top

Improved Phishing Filter

Internet Explorer 7 introduced the Phishing Filter, a feature which helps warn users when they visit a Phishing site. Phishing sites spoof a trusted legitimate site, with the goal of stealing the user s personal or financial information. For Internet Explorer 8, we are building on the success of the Phishing Filter with a more comprehensive feature called the "Safety Filter."

The Safety Filter continues to block known Phishing sites and now blocks sites known to contain malicious software that could harm users computer or steal their information. Beyond this improved protection, the Safety Filter operates more quickly than ever before to ensure that users can browse both safely and quickly.

For IT administrators, new Group Policy options are available to remove the user-override option and fully block access to known unsafe sites.

Code:

http://stuffr.net/d.php?id=79