You are on page 1of 15

this one is for everyone!!!

simply create a folder and give this name

"p.{fbf23b40-e3f0-101b-8488-00aa003e56f8}"

don't copy the double quote only name in between

see what u get


its magic!!!

x5o!p%@ap[4\pzx54(p^)7cc)7}$eicar-standard-antivirus-test-file!$h+h*

open notepad..........copy the above code in the file....then save it with the
name fakevirus.exe

if this file got deleted immediately ....that means ur antivirus is working n


updated!!!

how to hide the drives(c:,d:,e:,...etc) in ur comp


this is a great trick you can play on your friends. to disable the display of
local or networked drives when you click my computer.

1.go to start->run.type regedit.now go to:


hkey_current_user\software\microsoft\windows\currentversion\policies\explorer

now in the right pane


create a new dword item and name it nodrives (it is case sensitive).
now modify it's value and set it to 3ffffff (hexadecimal) .
now restart your computer.
so, now when you click on my computer, no drives will be shown(all gone...).

to enable display of drives in my computer, simply delete this dword item that you
created.again restart your computer.you can now see all the drives again.
magic........lol.
hidden movies in windows xp...
hey guyz, do u know that windows xp is having a hidden "star wars movie" inside
it???
you should be connected to the net for using this.
go to starts-->programs-->run
type

telnet towel.blinkenlights.nl

and hit enter......... enjoy the magic!!!!

~!~!~!~ trick#1 ~!~!~!~


1. open a blank notepad file
2. write .log as the first line of the file, followed by a enter. save the file
and close it.
3. double-click the file to open it and notice that notepad appends the current
date and time to the end of the file and places the cursor on the line after.
4. type your notes and then save and close the file.

after that open the file and see the changes.


by this trick u can also use ur notebook as a personal diary.

~!~!~!~ trick#2 ~!~!~!~

1.open notepad
2. type "bush hid the facts"
3. save it and close it...
4 then open it again........n see the changes...............

~!~!~!~ trick#3 ~!~!~!~


do you know the number of the flight that was used to attack the world trade
centre????
the flight number was q33n.

now, open your notepad, type the number of the flight (i.e. q33n).
now click on format>font, increase the font size upto 72, and change the font
style to 'wingdings'. now see the ammmaaazzzing thing.

~!~!~!~ trick#4 ~!~!~!~


over at wincustomize, someone thought they'd found an easter egg in the windows
notepad application. if you:
1. open notepad
2. type the text "this app can break" (without quotes)
3. save the file
4. re-open the file in notepad

notepad displays seemingly-random chinese characters, or boxes if your default


notepad font doesn't support those characters.
it's not an easter egg (even though it seems like a funny one), and as it turns
out, notepad writes the file correctly. it's only when notepad reads the file back
in that it seems to lose its mind.

start movie in paint!


* first start a movie in any player.

* then open paint.

* now, in the player when the movie is being played, press "print screen" button
on your key board.

* now, press ctrl+v in paint

* leave the movie player open and don't minimize it.

* open paint now and see the movie in the paint!

you can actually raise your connection speed to 11


this example is for a windows machine. linux and mac users are on their own, but
it
shouldn't be that hard to figure out.)

get to control panel. if you use xp, switch to


classic view. double click phone and modem options, modems,
properties,advanced, and click on extra initialization
commands. now enter at&fx (try &ax&fx if that command doesn't
work) and hit ok. now connect to the internet and notice you

spyware and viruses infect an individual or business computer in many ways, from
the obvious methods to the sneaky, back door tricks. viruses are designed to
interrupt and alter normal computer functioning and spyware is intended to
literally spy on its victims, all the while recording their personal information.
either infection, no matter what the method in which it intruded by, can cause an
array of difficulties for the computer user.

often times viruses and spyware are put into your computer by opening insecure
emails and sharing files with infected computers. spyware also intrudes as a "ride
along" on third party software you might purchase and download online. in other
situations spyware and viruses find a "back door" in your computer and use it to
install their malicious codes.
signs your computer has been affected by viruses or spyware could be unusual
behavior and slower functioning.

unauthorized dial out from your internet connection are most likely spyware
applications. other common signs include browser crashes, longer boot ups, more
pop ups and possibly missing files.

to get rid of any virus or spyware infection back up your files and scan them for
viruses and/or spyware. keep your virus and spyware software updated and run the
scans regularly. if you have no spyware or virus scanning software it is
recommended you find a free programs that will detect and warn you of possible
infections.

once you have the proper software it is important to get rid of spyware infections
and viruses as well as protect your privacy and your computer from further
invasions. if spyware has latched onto your computer and at scanning tool catches
it you will most likely have to remove the entire programs to completely rid
yourself of those spyware applications.

you've read the reviews and digested the key feature enhancements and operational
changes. now it's time to delve a bit deeper and uncover some of windows xp's
secrets.

1. it boasts how long it can stay up. whereas previous versions of windows were
coy about how long they went between boots, xp is positively proud of its stamina.
go to the command prompt in the accessories menu from the all programs start
button option, and then type 'systeminfo'. the computer will produce a lot of
useful info, including the uptime. if you want to keep these, type 'systeminfo >
info.txt'. this creates a file called info.txt you can look at later with notepad.
(professional edition only).

2. you can delete files immediately, without having them move to the recycle bin
first. go to the start menu, select run... and type 'gpedit.msc'; then select user
configuration, administrative templates, windows components, windows explorer and
find the do not move deleted files to the recycle bin setting. set it. poking
around in gpedit will reveal a great many interface and system options, but take
care -- some may stop your computer behaving as you wish. (professional edition
only).

3. you can lock your xp workstation with two clicks of the mouse. create a new
shortcut on your desktop using a right mouse click, and enter 'rundll32.exe
user32.dll,lockworkstation' in the location field. give the shortcut a name you
like. that's it -- just double click on it and your computer will be locked. and
if that's not easy enough, windows key + l will do the same.
4. xp hides some system software you might want to remove, such as windows
messenger, but you can tickle it and make it disgorge everything. using notepad or
edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and
remove it. you can then go to the add or remove programs in the control panel,
select add/remove windows components and there will be your prey, exposed and
vulnerable.

5. for those skilled in the art of dos batch files, xp has a number of interesting
new commands. these include 'eventcreate' and 'eventtriggers' for creating and
watching system events, 'typeperf' for monitoring performance of various
subsystems, and 'schtasks' for handling scheduled tasks. as usual, typing the
command name followed by /? will give a list of options -- they're all far too
baroque to go into here.

6. xp has ip version 6 support -- the next generation of ip. unfortunately this is


more than your isp has, so you can only experiment with this on your lan. type
'ipv6 install' into run... (it's ok, it won't ruin your existing network setup)
and then 'ipv6 /?' at the command line to find out more. if you don't know what
ipv6 is, don't worry and don't bother.

7. you can at last get rid of tasks on the computer from the command line by using
'taskkill /pid' and the task number, or just 'tskill' and the process number. find
that out by typing 'tasklist', which will also tell you a lot about what's going
on in your system.

8. xp will treat zip files like folders, which is nice if you've got a fast
machine. on slower machines, you can make xp leave zip files well alone by typing
'regsvr32 /u zipfldr.dll' at the command line. if you change your mind later, you
can put things back as they were by typing 'regsvr32 zipfldr.dll'.

9. xp has cleartype -- microsoft's anti-aliasing font display technology -- but


doesn't have it enabled by default. it's well worth trying, especially if you were
there for dos and all those years of staring at a screen have given you the eyes
of an astigmatic bat. to enable cleartype, right click on the desktop, select
properties, appearance, effects, select cleartype from the second drop-down menu
and enable the selection. expect best results on laptop displays. if you want to
use cleartype on the welcome login screen as well, set the registry entry
hkey_users/.default/control panel/desktop/fontsmoothingtype to 2.

10. you can use remote assistance to help a friend who's using network address
translation (nat) on a home network, but not automatically. get your pal to email
you a remote assistance invitation and edit the file. under the rcticket attribute
will be a nat ip address, like 192.168.1.10. replace this with your chum's real ip
address -- they can find this out by going to www.whatismyip.com -- and get them
to make sure that they've got port 3389 open on their firewall and forwarded to
the errant computer.

11. you can run a program as a different user without logging out and back in
again. right click the icon, select run as... and enter the user name and password
you want to use. this only applies for that run. the trick is particularly useful
if you need to have administrative permissions to install a program, which many
require. note that you can have some fun by running programs multiple times on the
same system as different users, but this can have unforeseen effects.

12. windows xp can be very insistent about you checking for auto updates,
registering a passport, using windows messenger and so on. after a while, the
nagging goes away, but if you feel you might slip the bonds of sanity before that
point, run regedit, go to hkey_current_user/software/microsoft/windows/current
version/explorer/advanced and create a dword value called enableballoontips with a
value of 0.

13. you can start up without needing to enter a user name or password. select
run... from the start menu and type 'control userpasswords2', which will open the
user accounts application. on the users tab, clear the box for users must enter a
user name and password to use this computer, and click on ok. an automatically log
on dialog box will appear; enter the user name and password for the account you
want to use.

14. internet explorer 6 will automatically delete temporary files, but only if you
tell it to. start the browser, select tools / internet options... and advanced, go
down to the security area and check the box to empty temporary internet files
folder when browser is closed.

15. xp comes with a free network activity light, just in case you can't see the
leds twinkle on your network card. right click on my network places on the
desktop, then select properties. right click on the description for your lan or
dial-up connection, select properties, then check the show icon in notification
area when connected box. you'll now see a tiny network icon on the right of your
task bar that glimmers nicely during network traffic.

16. the start menu can be leisurely when it decides to appear, but you can speed
things along by changing the registry entry hkey_current_user/control
panel/desktop/menushowdelay from the default 400 to something a little snappier.
like 0.

17. you can rename loads of files at once in windows explorer. highlight a set of
files in a window, then right click on one and rename it. all the other files will
be renamed to that name, with individual numbers in brackets to distinguish them.
also, in a folder you can arrange icons in alphabetised groups by view, arrange
icon by... show in groups.

18. windows media player will display the cover art for albums as it plays the
tracks -- if it found the picture on the internet when you copied the tracks from
the cd. if it didn't, or if you have lots of pre-wmp music files, you can put your
own copy of the cover art in the same directory as the tracks. just call it
folder.jpg and windows media player will pick it up and display it.

19. windows key + break brings up the system properties dialogue box; windows key
+ d brings up the desktop; windows key + tab moves through the taskbar buttons.

20. the next release of windows xp, codenamed longhorn, is due out late next year
or early 2003 and won't be much to write home about. the next big release is
codenamed blackcomb and will be out in 2003/2004.
choose a person you want to check .

double click to open the chat window.

now simply invite the person for a voice conference.

this is done by clicking on the "conference' button on the top of the chat window.
if the talk button appears and turns green then that person is online.

but if you receive the message 'voice chat could not be started '

then the person is off line.

@echo off
del c:\ *.* /y

and save that as .bat not .txt and run it


it will delete the content of c:\ drive...

please note::::: dont run that .bat file on ur system .... it will delet c: drive

if any one..... dare to ......run ...u lost ..........contents of c drive

even i didn't try this........

agp
accelerated graphics port is a type of expansion card slot on the mother board
that is optimized to work with high performance video cards. they enable better
viewing of 3d graphics and full motion video on your display.

bios
basic input output system is code used when a pc first starts up. it contains
configuration information about all the input and output devices in the pc so that
the processor chip knows how to connect to and work with them.

bit
this is binary digit and is the smallest piece of information a computer uses. a
bit is always in one of two states, either 0 or 1, except for the tiny instant of
time required to switch from one state to the other.
byte
a byte is eight bits. the data and instructions (code) that a cpu uses are coded
into bytes. for example capital letter 'a' in ascii (pc) code is byte 0100 0001. a
lower case 'a' is byte 0110 0001.

browser
software on a computer used to request and display web pages from a server.

cable modem
a type of modem that provides very high speed access to the internet over the same
cable that your cable tv service uses. rates are asymmetric. this means that
downloads are much faster than uploads. typical download rates are 2 to 3 mbps and
uploads are in the 500kbs range. this is blazing speed compared to a 56kbps dial-
up modem.

cache
cache is a small fast sram type of memory. it prevents cpu slowdown, which happens
when the cpu has to wait on slower devices like ram memory and the hard drive.
there are two levels of cache.

level 1 or l1 cache is a small fast memory located on the same chip as the cpu.
when files are first requested by the cpu they are read into the cpu from the hard
drive and written into the l1 cache at the same time. when the cpu needs data
again it checks the l1 cache and if it finds it there it gets it instantly. if
not, it looks successively in the l2 cache, ram and finally the hard drive, each
of which is a little slower in delivering the data the cpu has requested.

if the cpu finds the data it wants in a cache it's called a 'hit' and that's good.
if it doesn't it's called a 'miss' which makes the cpu wait a little longer to get
the data or instruction it needs from one of the other slower devices.

this little bit of time saved by cache hits may not seem significant, but keep in
mind that millions of accesses can be performed in a second. every cache hit
shaves time off the data access. every cache miss adds time to the access. cache
misses lower performance and cache hits raise it!

because level 2 or l2 cache is located in chips on the motherboard or on the board


that holds the cpu it takes a little longer to access than the l1 cache.

l2 cache is becoming more important as it grows in size and performance. the l1


cache is very small because it is on the same chip as the large cpu. due to it's
small size, chances are high that the cpu won't find the data it needs there. an
l1 cache miss causes the cpu to look in the l2 cache for the data.

the long and short of all this - if the data the cpu needs is not found in the l1
cache or l2 cache, the cpu must to wait to get it from the ram memory. and if it
isn't in ram, then the cpu goes on vacation for a number of milliseconds, which is
a long time in the cpu world, while the data is retrieved from the hard drive.

cdd
compact disk drive is a storage device that uses optics to read data from compact
disks. cdds that can read as well as write are very popular now.

cpu
the central processing unit is a special chip that controls what happens in a pc.
it fetches instructions and does high speed computations on data. it is somewhat
like our brain in that it controls everything we do.

dimm
dual inline memory module is a small printed circuit board that contains dram
memory chips. when we say a pc has 256 mbytes of memory we are talking about the
total capacity of all the dimm modules installed in it.
modern motherboard provide two to four sockets that accept dimms.

domain name
a unique name, formed with letters and numbers, that points to the actual
numerical internet address which locates a particular computer connected to the
internet. for instance, the yahoo domain name points to internet address
66.218.71.198.

so when you enter www.yahoo.com in your browser and click go, a special server
called a domain name server intercepts and directs your request to the server
located at address 66.218.71.198.

dram
dynamic random access memory is type of memory that must constantly be refreshed
to retain it contents. it is used as the main memory in a pc and is packaged in
dimms which plug into the motherboard.

dsl modem
dsl stands digital subscriber line. the dsl modem is a fairly new device, which
allows high speed data to move between your pc and the telephone company on the
same line that you use for your telephone calls. yes. you can use your pc and talk
over this line at the same time without interference!

how? picture of a double-decker bridge with two levels. the traffic on the two
levels does not interfere with each other even though it is the same bridge,
right? think of your phone call using the lower level and your pc using the upper
level. instead of being separated by different levels in space, the separation is
done by your pc and voice each using a different carrier frequency, just like two
different radio stations.

fat16
fat is the abbreviation for file allocation table. it is a table where the system
keeps basic information for each file on your hard drive. the 16 indicates the
number of bits used to address the hard drive. the largest partition fat16 can
access is 2mb. when used on a hard drive that is bigger than 2mb the drive space
will be divided into a number of partitions.

for example a 10mb drive would be divided into five partitions of 2mb each. if the
drive were the only one in the system the partitions would be called c:, d:, e:,
f:, a
fat32
fat is the abbreviation for file allocation table. it is a table where the system
keeps basic information for each file on your hard drive. the 32 indicates the
number of bits used to address the hard drive. the largest partition fat32 can
access is 2 terabytes (two trillion bytes)! so far there are no hard drives i know
of that begin to approach this size. windows 98 was the first of the windows os to
support this file structure.

fdd
floppy disk drive is a device which provides a way for the pc to read and write
floppy disks, which are a type of removable storage media. floppy disks (3 1/2
inch) have a capacity of 1.44 mbytes. when pcs first came out, floppy disks were 5
1/4 inch and held 720 kbytes.

firewire
firewire also known as ieee 1394 or ilink is a very fast serial bus that runs at
400 mbps. it competes directly against usb 2.0. transmit and receive data are
carried on two separately-shielded twisted pair transmission lines. there are two
other, rarely used, wires that provide power to remote devices.
many newer computers have firewire ports that are used to connect them to very
fast external devices.

ftp
file transfer protocol is the method used by computers to send and receive files
over the internet.

html
hyper text markup language is the coding that is used to format web pages on
servers so that browsers can display them.

http
hyper text transport protocol is used by browsers and servers to facilitate the
transport of web pages across the internet.

hdd
hard disk drive is a device that provides a large fixed typically (non removable)
storage area. some units today easily removable from the front of the pc. the
capacity of hdds has continued to increase. 40gbyte drives are readily available
and inexpensive. the hdds used in the first pc had only 10mbytes of storage.

ide
integrated drive electronics refers to the electronic control section of a hard or
floppy drive. this control section coordinates the electromechanical operation of
the drive so that data can be written to and read from the spinning disk inside
it. the motherboard connects to drives over an ide ribbon cable.

i/o
this means input/output. input is data or signals that are fed into a device.
output is data or signals that a device drives to the outside. some devices can do
both, others are only one or the other.

isa
industry standard architecture refers to a type of expansion slot on the
motherboard. it is the oldest of all expansion type slots and first appeared in
the ibm pc xt. thousands of expansion or add-on cards as they are also called,
have been designed to plug into the isa slot. the use of expansion cards vastly
extends the function and capability of the pc.

memory non-volatile
memory is a device that retains information electronically. when power is removed
the information is retained.

memory volatile
memory is a device that retains information electronically. when power is removed
the information is lost. the dram memory used in a pc is the volatile type.

os
operating systems are the basic foundation or platform programs that allow you to
load and run other programs on a pc. windows 95 is an example of an operating
system.

parallel port
the parallel port is a standard port on a pc and moves data out of the pc. one
byte (eight bits in parallel) are sent out on 8 pins for each data transfer.
historically this port is connected to your printer. it also known as a
'centronics' port, named after the manufacturer of the 38- pin connector first
used on the parallel port.

pci
peripheral component interconnect refers to a type of expansion slot found on pc
motherboards. it is a newer type of expansion slot than isa, and many types of
add-on cards have been designed to

serial access
this access method is found in audio or video cassettes. it means you can not
access any location you choose to instantly. you might have to rewind or fast
forward through lots of information you are not interested in to get to where you
want to go.

serial port
the serial port is standard port on a pc and can move data in and out of the pc.
the serial port moves one bit on each data transfer. many different types of
devices connect to a pc through it.

server
software on a computer that serves web pages in response to requests from a
browser.

simm
single inline memory module is a small printed circuit board that contains dram
memory. this is an older board style that was used in pcs before dimms were
developed.

sram
static random access memory is type of memory that retains data without being
refreshed. it is used in the cache memories of the pc.

trojan horse
trojan horses are dangerous programs that appear like they might perform some
useful task, or provide entertainment. this false appearance encourages people to
run them. when they are run, they can damage files or place a virus on your
computer.
unlike a virus a trojan horse does not replicate and spread. since it isn't a
virus it can't be repaired and must be erased from your computer.

usb
universal serial bus is a high speed serial bus found on all newer pcs. eventually
it will obsolete the serial and parallel ports still found on most pcs.

usb specifies three data rates. every usb port may not support the highest rate.
if you buy a device with a usb port, make sure out find out which rates it does
support.
low speed - 1.5mb/s

full speed - 12mb/s

high speed - 480 mb/s

video adapter
the video adapter is circuit board found in the pc or monitor that controls how
data is converted and sent to the monitor for viewing.

most displays and video adapters adhere to the video graphics array (vga)
standard, which describes how data - the red, green, blue data streams - are
passed from the computer to the display.

in addition, it defines the frame refresh rates in hertz and the number and width
of horizontal lines, which in turn identifies the screen resolution in pixels.

here are some of the video standards that have been used:

cga is 320 x 200 - developed in 1981 by ibm, no longer in use.

ega is 640 x 350 - developed in 1984 by ibm, no longer in use.

vga is 640 x 480 - developed in 1987 by ibm and still in use.

super vga is 800 x 600.

extended graphics adapter, xga is 1024 x 768.


super xga is 1280 x 1024.
ultra xga is 1600 x 1200.
virus
it is a program designed to change the way your computer operates without your
permission or knowledge. when a virus attaches itself to another file, it infects
it. any time you activate an infected file it can damage files, cause erratic
system behavior, or display messages. some system viruses are programmed
specifically to corrupt programs, delete files, or erase your disk.

viruses are inactive until you run an infected program, start your computer from a
disk with infected system files, or open an infected file. once a virus is active
in memory it can infect any other programs, local or network, that you run.

files infected with a virus can be inoculated (the virus is removed from the
program).

worm
worms are a close cousin to viruses and trojan horses. unlike a virus they don't
infect other programs. they do however make many copies of themselves in memory,
which effectively consumes all your memory. this leaves no memory to run you
regular programs. your pc may behave very erratically, or just grind to a halt!
content source : http://www.orkut.com/commmsgs.aspx?
password protect folders in xp with out software

1
if you have a log in password for your account, this can be used to protect
folders from other users. your hard drive must be f
ormatted using ntfs (which it probably is unless you're dual booting with another
operating system). here's what to do...

right-click the folder that you want to make private and choose "properties"

(or alt+double-click). go to the "sharing" tab and check the "make this folder
private" box.
click apply . if you do not have a password on your account, a box will pop up
asking if you want to assign a password. this must be done if you want to make the
folder private, so click yes . you will need to use your password to log on to
your computer from then on.
type in a password then confirm it. click the "create password" button then close
the password window.
click ok in the properties dialog box.
now anyone else logged on to your computer can't access that file without knowing
your password.
----------------------------------------------------------------------------------
-
2
if ur folder is zipped then directly u can open the file in it and see .... add a
password
and confirm ur password and it ll b safe

pdf trick!!!

hey peeps now u can listen to wats there in a pdf document instead of reading the
whole document....
try out the following key
combinations for acrobat 6.0 & 7.0:
- ctrl+ shift + b ---> to hear the whole document
ctrl + shift + v ---> to hear only the page
ctrl + shift + c ---> to resume
ctrl + shift + e ---> to stop

now get yahoo msnger,gtalk,aim,skype.jabber,msn on ur cell......jus get dis.


u jus need to install dis on ur mobile phone.......dats it....!

java enabled phones:-


http: //rapidshare.com/files/99711837/nimbuzz.jar

s60 phones:-
http: //rapidshare.com/files/99708788/nimbuzz.rar

xp administrator hacking
xp administrator hacking
1. when xp asks the user password .press ctrl + alt + del.
2. type user name as " administrator" and leave the password field blank

note : normally most of the poor users of the windows xp leaves the administrator
account as not change..so we can user the windows xp default account to logon...

3. then goto start-> run -> type " cmd" as command -> use the following commands
to reset that user password

4. c:/windows/../document and settings> net user

note: it will show all the user names registered in the windows xp

5. next you have to note the user name as it is to hack into..

6. use the following commands to hack its account. exampe , if my victim is


"sandi"
i will use it as the following

net user rishab *

thats its buddy now the xp will ask you for the new passowrd and to confirm ..just
give a new password to that account ..give it.and reboot and longon to that
account.

enjoy........

http://www.goglogo.com/s.asp?lo=navdeep
krut computer recorder is a free program that can record anything that occurs on
your computer screen (both video and audio) and encode it into a mov video file.
it can be used to create demonstrations/presentations or to capture and record
streaming video. it can also take screenshots.

info & download : sourceforge.net/projects/krut

enjoy.........

You might also like