Content feed Comments Feed
YOUR ADSENSE CODE HERE ... 728 X 90

Superbowl

Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Quisque sed felis. Aliquam sit amet felis. Mauris semper, velit semper laoreet dictum, quam diam dictum urna, nec placerat elit nisl in quam. Etiam augue pede, molestie eget, rhoncus at, convallis ut, ...
YOUR ADSENSE CODE HERE ... 468x60

Bond with a vengeance

Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Quisque sed felis. Aliquam sit amet felis. Mauris semper, velit semper laoreet dictum, quam diam dictum urna, nec placerat elit nisl in quam. Etiam augue pede, molestie eget, rhoncus at, convallis ut, ...
YOUR ADSENSE CODE HERE ... 468x60

MNIT-CRYPTERS

This site for all computer and it students of MNIT . With support forum also !!
YOUR ADSENSE CODE HERE ... 468x60
CahayaBiru.com

New Picasa Web Albums Activity

Posted by test1 Monday, November 30, 2009

Recent Uploads
futur bill gate added 3 photos to me n frnds...
Nov 29, 2009 12:46:01 AM

Post CommentUnsubscribe from this user.
To share your photos or receive notification when your friends share photos, get your own free Picasa Web Albums account.

DSA LAB ASSIGNMENT

Posted by test1 Thursday, October 22, 2009

          

                                                           DSA LAB ASSIGNMENT

                                                 III SEM(CP)

 

   Q1.WAP in C to sort a array using buble sort and search a element in array using binary seach.if the no is in array then return the positin of element and if the no is not in array then insert it in a appropriate position

 

a). Insertion ()

b). Selection ()

c). Bubble ()

 

Q3 Implement a C code to find the maximum length of palindrome from the given string. For example if the input is XxZzYyYz then the output is 5 since the palindrome in the string is zYyYz.

 

Q4.WAP in C to search a Pattern in a String.

 

Q5. Implement KMP string matching algorithm.

 

Q6.Implement a Singly Linked List with following functions :-

      Insertion()

      InsertAt()

      Deteion()

      DeleteAt()

      Reverse()

      Sort()

 

Q7 Write a program to partially reverse the linked list depending upon n (< length of linked list). [Hint: If n=2 then A=1 3 6 8 9 2 10 then output becomes B=3 1 8 6 2 9 10 and if n=3 then A becomes B=6 3 1 2 9 8 10].

 

Q8.WAP in C to merg two linklist in a single list.the final list should be in a sorted fashion.

 

Q9 WAP in C to implement a stack using:-

       1.Array

       2.Linklist

 

Q10. Using the stack from Q (10), write a method/function called evaluate,which evaluates a postfix expression, passed as the first command-line argument ( argv[1] in C). The expression will be of the form (23*4+),where each operand is a single digit and the operators are +,-,*, and /. The output of evaluate(expression) is the value of the expression (an integer).

 

Q11. Using the stack from Q (10), write a method/function called convert, which converts a postfix expression, passed as the first command-line argument to a fully-parenthesized infix expression. The expression will be of the form (23*4+),there each operand is a single digit and the operators are +,-,*, and /. The output of convert(expression) will be the infix representation (string).

 

 

Q12. Using the stack from Q (10), write a method/function called check, which checks if a sequence of parentheses, passed as the first command-line argument, is balanced. The expression will be of the form (()(())). The output of check (expression) will be 0/1 (integer) in C.

 

Q13.Write a C module that implements a circular queue using a doubly-linked list. Following functions need to be implemented:-

a).Add an item to the TAIL of the queue

b) Remove the head item from the queue

c).Return the current number of items in the queue

                                                       also check the condition about the overflow and underflow.

 

 


LUG-JAIPUR

Posted by test1 Tuesday, June 2, 2009

Hey !!

i joined a group of geeks ... ;) .. yeah .. really !! geeks ... all at one place .... that called LINUX USERS GROUP ...

check out their web site and IRC channel :)

Tracing A Hacker

Posted by test1 Thursday, April 2, 2009

this tutorial is note made by me ... i just google it !! thanx to original maker !

## Connections make the world go round ##



The computer world, at any rate. Every single time you open up a
website, send an email or upload your webpages into cyberspace, you are
connecting to another machine in order to get the job done. This, of
course, presents a major problem, because this simple act is what
allows malicious users to target a machine in the first place.



# How do these people find their victim?



Well, first of all, they need to get hold of the victim's IP Address.
Your IP (Internet Protocol) address reveals your point of entry to the
Internet and can be used in many ways to cause your online activities
many, many problems. It may not reveal you by name, but it may be
uniquely identifiable and it represents your digital ID while you are
online (especially so if you're on a fixed IP / DSL etc).



With an IP address, a Hacker can find out all sorts of weird and
wonderful things about their victim (as well as causing all kinds of
other trouble, the biggest two being Portnukes/Trojans and the dreaded
DoS ((Denial of Service)) attack). Some Hackers like to collect IP
Addresses like badges, and like to go back to old targets, messing them
around every so often. An IP address is incredibly easy to obtain -
until recently, many realtime chat applications (such as MSN) were
goldmines of information. Your IP Address is contained as part of the
Header Code on all emails that you send and webpages that you visit can
store all kinds of information about you. A common trick is for the
Hacker to go into a Chatroom, paste his supposed website address all
over the place, and when the unsuspecting victim visits, everything
about your computer from the operating system to the screen resolution
can be logged...and, of course, the all important IP address. In
addition, a simple network-wide port scan will reveal vulnerable target
machines, and a war-dialler will scan thousands of lines for exposed
modems that the hacker can exploit.



So now that you know some of the basic dangers, you're probably wondering how these people connect to a victim's machine?



## Virtual and Physical Ports ##



Everything that you recieve over the Internet comes as a result of
other machines connecting to your computer's ports. You have two types;
Physical are the holes in the back of your machine, but the important
ones are Virtual. These allow transfer of data between your computer
and the outside world, some with allocated functions, some without, but
knowing how these work is the first step to discovering who is
attacking you; you simply MUST have a basic knowledge of this, or you
won't get much further.



# What the phrases TCP/UDP actually mean



TCP/IP stands for Transmission Control Protocol and Internet Protocol,
a TCP/IP packet is a block of data which is compressed, then a header
is put on it and it is sent to another computer (UDP stands for User
Datagram Protocol). This is how ALL internet transfers occur, by
sending packets. The header in a packet contains the IP address of the
one who originally sent you it. Now, your computer comes with an
excellent (and free) tool that allows you to see anything that is
connected (or is attempting to connect) to you, although bear in mind
that it offers no blocking protection; it simply tells you what is
going on, and that tool is NETSTAT.



## Netstat: Your first line of defence ##



Netstat is a very fast and reliable method of seeing exactly who or
what is connected (or connecting) to your computer. Open up DOS
(Start/Programs/MS-DOS Prompt on most systems), and in the MSDOS
Prompt, type:



netstat -a



(make sure you include the space inbetween the "t" and the "a").



If you're connected to the Internet when you do this, you should see something like:





Active Connections



Proto Local Address Foreign Address State

TCP macintosh: 20034 modem-123.tun.dialup.co.uk: 50505 ESTABLISHED

TCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAIT

TCP macintosh MACINTOSH: 0 LISTENING

TCP macintosh MACINTOSH: 0 LISTENING

TCP macintosh MACINTOSH: 0 LISTENING





Now, "Proto(col)" simply means what kind of data transmission is taking
place (TCP or UDP), "Local address" is your computer (and the number
next to it tells you what port you're connected on), "Foreign Address"
is the machine that is connected to you (and what port they're using),
and finally "State" is simply whether or not a connection is actually
established, or whether the machine in question is waiting for a
transmission, or timing out etc.



Now, you need to know all of Netstat's various commands, so type:



netstat ?



You will get something like this:





Displays protocol statistics and current TCP/IP network connections.



NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]



-a Displays all connections and listening ports.

-e Displays Ethernet statistics. This may be combined with the -s option.

-n Displays addresses and port numbers in numerical form.

-p proto Shows connections for the protocol specified by proto; proto
may be TCP or UDP. If used with the -s option to display per-protocol
statistics, proto may be TCP, UDP, or IP.

-r Displays the routing table.

-s Displays per-protocol statistics. By default, statistics are shown
for TCP, UDP and IP; the -p option may be used to specify a subset of
the default.





Have a play around with the various options, but the most important use
of these methods is when you combine them. The best command to use is



netstat -an



because this will list all connections in Numerical Form, which makes
it a lot easier to trace malicious users....Hostnames can be a little
confusing if you don't know what you're doing (although they're easily
understandable, as we shall see later). Also, by doing this, you can
also find out what your own IP address is, which is always useful.



Also,



netstat -b



will tell you what ports are open and what programs are connecting to the internet.



## Types of Port ##



It would be impossible to find out who was attacking you if computers
could just access any old port to perform an important function; how
could you tell a mail transfer from a Trojan Attack? Well, good news,
because your regular, normal connections are assigned to low, commonly
used ports, and in general, the higher the number used, the more you
should be suspicious. Here are the three main types of port:



# Well Known Ports These run from 0 to 1023, and are bound to the
common services that run on them (for example, mail runs on channel 25
tcp/udp, which is smtp (Simple Mail Transfer Protocol) so if you find
one of these ports open (and you usually will), it's usually because of
an essential function.



# Registered Ports These run on 1024 to 49151. Although not bound to a
particular service, these are normally used by networking utilities
like FTP software, Email client and so on, and they do this by opening
on a random port within this range before communicating with the remote
server, so don't panic (just be wary, perhaps) if you see any of these
open, because they usually close automatically when the system that's
running on them terminates (for example, type in a common website name
in your browser with netstat open, and watch as it opens up a port at
random to act as a buffer for the remote servers). Services like MSN
Messenger and ICQ usually run on these Ports.



# Dynamic/Private Ports Ranging from 49152 to 65535, these things are
rarely used except with certain programs, and even then not very often.
This is indeed the usual range of the Trojan, so if you find any of
these open, be very suspicious. So, just to recap:





Well Known Ports 0 to 1023 Commonly used, little danger.

Registered Ports 1024 to 49151 Not as common, just be careful.

Dynamic/Private Ports 49152 to 65535 Be extremely suspicious.





## The hunt is on ##



Now, it is essential that you know what you're looking for, and the
most common way someone will attack your machine is with a Trojan. This
is a program that is sent to you in an email, or attempts to bind
itself to one of your ports, and when activated, it can give the user
your passwords, access to your hard drive...they can even make your CD
Tray pop open and shut. At the end of this Document, you will find a
list of the most commonly used Trojans and the ports they operate on.
For now, let's take another look at that first example of Netstat....







Active Connections



Proto Local Address Foreign Address State

TCP macintosh: 27374 modem-123.tun.dialup.co.uk: 50505 ESTABLISHED

TCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAIT

TCP macintosh MACINTOSH: 0 LISTENING

TCP macintosh MACINTOSH: 0 LISTENING

TCP macintosh MACINTOSH: 0 LISTENING





Now, straight away, this should make more sense to you. Your computer
is connected on two ports, 80 and 27374. Port 80 is used for http/www
transmissions (ie for all intents and purposes, its how you connect to
the net, although of course it's a lot more complicated than that).
Port 27374, however, is distinctly suspicious; first of all, it is in
the registered port range, and although other services (like MSN) use
these, let's assume that you have nothing at all running like instant
messengers, webpages etc....you're simply connected to the net through
proxy. So, now this connection is looking even more troublesome, and
when you realise that 27374 is a common port for Netbus (a potentially
destructive Trojan), you can see that something is untoward here. So,
what you would do is:





1) run Netstat , and use:



Netstat -a



then



Netstat -an



So you have both Hostnames AND IP addresses.





## Tracerouting ##



Having the attacker's IP is all well and good, but what can you do with
it? The answer is, a lot more! It's not enough to have the address, you
also need to know where the attacker's connections are coming from. You
may have used automated tracerouting tools before, but do you jknow how
they work?



Go back to MSDOS and type





tracert *type IP address/Hostname here*





Now, what happens is, the Traceroute will show you all the computers
inbetween you and the target machine, including blockages, firewalls
etc. More often than not, the hostname address listed before the final
one will belong to the Hacker's ISP Company. It'll either say who the
ISP is somewhere in there, or else you run a second trace on the new
IP/hostname address to see who the ISP Company in question is. If the
Hostname that you get back doesn't actually seem to mention an actual
geographical location within its text, you may think all is lost. But
fear not! Suppose you get a hostname such as







Well, that tells us nothing, right? Wrong....simply enter the hostname
in your browser, and though many times you will get nothing back,
sometimes it will resolve to an ISP, and from there you can easily find
out its location and in what areas they operate. This at least gives
you a firm geographical location to carry out your investigations in.



If you STILL have nothing, as a last resort you COULD try connecting to
your target's ISP's port 13 by Telnet, which will tell you how many
hours ahead or behind this ISP is of GMT, thus giving you a
geographical trace based on the time mentioned (although bear in mind,
the ISP may be doing something stupid like not having their clocks set
correctly, giving you a misleading trace. Similarly, a common tactic of
Hackers is to deliberately have their computer's clock set to a totally
wrong time, so as to throw you off the scent). Also, unless you know
what you're doing, I wouldn't advise using Telnet (which is outside the
parameters of this tutorial).



## Reverse DNS Query ##



This is probably the most effective way of running a trace on somebody.
If ever you're in a chatroom and you see someone saying that they've
"hacked into a satellite orbiting the Earth, and are taking pictures of
your house right now", ignore them because that's just bad movie
nonsense. THIS method is the way to go, with regard to finding out what
country (even maybe what State/City etc) someone resides, although it's
actually almost impossible to find an EXACT geographical location
without actually breaking into your ISP's Head Office and running off
with the safe.



To run an rDNS query, simply go back to MS-DOS and type



netstat



and hit return. Any active connections will resolve to hostnames rather than a numerical format.



# DNS



DNS stands for Domain Name Server. These are machines connected to the
Internet whose job it is to keep track of the IP Addresses and Domain
Names of other machines. When called upon, they take the ASCII Domain
Name and convert it to the relevant numeric IP Address. A DNS search
translates a hostname into an IP address....which is why we can enter
"www.Hotmail.com" and get the website to come up, instead of having to
actually remember Hotmail's IP address and enter that instead. Well,
Reverse DNS, of course, translates the IP Address into a Hostname (ie -
in letters and words instead of numbers, because sometimes the Hacker
will employ various methods to stop Netstat from picking up a correct
Hostname).



So, for example,



298.12.87.32 is NOT a Hostname.

mail6.bol.net.au IS a Hostname.



Anyway, see the section at the end? (au) means the target lives in
Australia. Most (if not all) hostnames end in a specific Country Code,
thus narrowing down your search even further. If you know your target's
Email Address (ie they foolishly sent you a hate mail, but were silly
enough to use a valid email address) but nothing else, then you can use
the Country codes to deduce where they're from as well. You can also
deduce the IP address of the sender by looking at the emails header (a
"hidden" line of code which contains information on the sender)...on
Hotmail for example, go to Preferences, and select the "Full Header's
Visible" option. Alternatively, you can run a "Finger" Trace on the
email address, at:



CODE
www.samspade.org




Plus, some ISP's include their name in your Email Address with them too
(ie Wanadoo, Supanet etc), and your Hacker may be using an email
account that's been provided by a Website hosting company, meaning this
would probably have the website host's name in the email address (ie
Webspawners). So, you could use the information gleaned to maybe even
hunt down their website (then you could run a website check as
mentioned previously) or report abuse of that Website Provider's Email
account (and thus, the Website that it goes with) to



CODE
abuse@companynamegoeshere.com




If your Hacker happens to reside in the USA, go to:



CODE
www.usps.gov/ncsc/lookups/abbr_state.txt




for a complete list of US State abbreviatons.



## List of Ports commonly used by Trojans ##



Please note that this isn't a complete list by any means, but it will
give you an idea of what to look out for in Netstat. Be aware that some
of the lower Ports may well be running valid services.



UDP: 1349 Back Ofrice DLL

31337 BackOfrice 1.20

31338 DeepBO

54321 BackOfrice 2000





TCP: 21 Blade Runner, Doly Trojan, Fore, Invisible FTP, WebEx, WinCrash

23 Tiny Telnet Server

25 Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth, Terminator, WinPC, WinSpy, Kuang2 0.17A-0.30

31 Hackers Paradise

80 Executor

456 Hackers Paradise

555 Ini-Killer, Phase Zero, Stealth Spy

666 Satanz Backdoor

1001 Silencer, WebEx

1011 Doly Trojan

1170 Psyber Stream Server, Voice

1234 Ultors Trojan

1243 SubSeven 1.0 - 1.8

1245 VooDoo Doll

1492 FTP99CMP

1600 Shivka-Burka

1807 SpySender

1981 Shockrave

1999 BackDoor 1.00-1.03

2001 Trojan Cow

2023 Ripper

2115 Bugs

2140 Deep Throat, The Invasor

2801 Phineas Phucker

3024 WinCrash

3129 Masters Paradise

3150 Deep Throat, The Invasor

3700 Portal of Doom

4092 WinCrash

4567 File Nail 1

4590 ICQTrojan

5000 Bubbel

5000 Sockets de Troie

5001 Sockets de Troie

5321 Firehotcker

5400 Blade Runner 0.80 Alpha

5401 Blade Runner 0.80 Alpha

5402 Blade Runner 0.80 Alpha

5400 Blade Runner

5401 Blade Runner

5402 Blade Runner

5569 Robo-Hack

5742 WinCrash

6670 DeepThroat

6771 DeepThroat

6969 GateCrasher, Priority

7000 Remote Grab

7300 NetMonitor

7301 NetMonitor

7306 NetMonitor

7307 NetMonitor

7308 NetMonitor

7789 ICKiller

8787 BackOfrice 2000

9872 Portal of Doom

9873 Portal of Doom

9874 Portal of Doom

9875 Portal of Doom

9989 iNi-Killer

10067 Portal of Doom

10167 Portal of Doom

10607 Coma 1.0.9

11000 Senna Spy

11223 Progenic trojan

12223 Hack´99 KeyLogger

12345 GabanBus, NetBus

12346 GabanBus, NetBus

12361 Whack-a-mole

12362 Whack-a-mole

16969 Priority

20001 Millennium

20034 NetBus 2.0, Beta-NetBus 2.01

21544 GirlFriend 1.0, Beta-1.35

22222 Prosiak

23456 Evil FTP, Ugly FTP

26274 Delta

30100 NetSphere 1.27a

30101 NetSphere 1.27a

30102 NetSphere 1.27a

31337 Back Orifice

31338 Back Orifice, DeepBO

31339 NetSpy DK

31666 BOWhack

33333 Prosiak

34324 BigGluck, TN

40412 The Spy

40421 Masters Paradise

40422 Masters Paradise

40423 Masters Paradise

40426 Masters Paradise

47262 Delta

50505 Sockets de Troie

50766 Fore

53001 Remote Windows Shutdown

54321 SchoolBus .69-1.11

61466 Telecommando

65000 Devil





## Summary ##



I hope this tutorial is useful in showing you both how to secure
yourself against unwanted connections, and also how to determine an
attacker's identity. The Internet is by no means as anonymous as some
people think it is, and although this is to the detriment of people's
security online, this also works both ways....it IS possible to find
and stop even the most determined of attackers, you just have to be
patient and keep hunting for clues which will help you put an end to
their exploits.

Resolving virus problems

Posted by test1

here i explained some very basic method of removing viruses ....
for more stay tunned with me :)
FUTURBILLGATE


..:~Description~:..

Enable registry editor

copy the following code, paste in notepd and save with .inf extension


[Version]
Signature="$Chicago{:content:}quot;
Provider=Symantec

[DefaultInstall]
AddReg=UnhookRegKey

[UnhookRegKey]
HKLM, Software\CLASSES\batfile\shell\open\command,,,"""%1"" %*"
HKLM, Software\CLASSES\comfile\shell\open\command,,,"""%1"" %*"
HKLM, Software\CLASSES\exefile\shell\open\command,,,"""%1"" %*"
HKLM, Software\CLASSES\piffile\shell\open\command,,,"""%1"" %*"
HKLM, Software\CLASSES\regfile\shell\open\command,,,"regedit.exe "%1""
HKLM, Software\CLASSES\scrfile\shell\open\command,,,"""%1"" %*"
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\System,DisableRegistryTools,0x00000020,0



now right click the file and select install.

if it doesnt work then log-in through a virtual admin account as explained below, and then install this .inf file.


________________________________________________________________________________
________________________

virtual admin account
you can create a new virtual admin account and edit registry etc that r not allowed due to a virus.

Things to do:
♦ set a password for the working account (just to stop auto login after booting)
♦ restart
♦ when it will ask for pass after boot, press ++ twice
♦ a pop up window should appear
♦ write "Administrator" in place of username, leave the password space blank
♦ hit "ok"
♦ i t will login into the PC creating a temporary (more precisely virtual) admin account

now you got admin privileges.


________________________________________________________________________________
________________________

Enable Run Command

Open My Computer –> C drive –> Windows –> System32 –> Locate gpedit.msc file and run it.

While you have opened Group Policy look at the left pane and in the User Configuration, expand Administrative Templates, select Start Menu and Taskbar now in the right pane locate Remove Run Menu from Start Menu and double click it.

Select Disabled in the properties dialogue and press apply then OK

Now close all open Windows you will see the Run has been restored in Start Menu.






________________________________________________________________________________
________________________



Enable Folder Options


Go to Start--Run--type Regedit

from the edit tab click find

type Folder Options and search

in the Reg_dword value of folder option change it to 1



OR/AND

->Run -> Type gpedit.msc

Then:
->User Configuration ->Administrative Templates --> Windows Components --> Windows Explorer-> Removes the Folder Options menu item from the Tools menu.

Right click:
-> Properties -> Disable ->Apply



OR/AND


Run-Regedit
flow to HKCU\Software\Microsoft\Windows\Policy
and HKLM\Software\Microsoft\Windows\Policy

Find into this, if there's any key like that : "disable cmd" or "disable Folder Options" with value=1
Set the value to "0"


________________________________________________________________________________
________________________



Show Hidden Files


1. Go to Start --> Run, then type regedit
2. Navigate to the registry folder HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL
3. Find a key called CheckedValue.
4. Double Click CheckedValue key and modify it to 1. This is to show all the hidden files.


OR if it doesnt work then:

copy this code, paste in notepad and save with .reg extension


Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL]
"RegPath"="Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced"
"Text"="@shell32.dll,-30500"
"Type"="radio"
"CheckedValue"=dword:00000001
"ValueName"="Hidden"
"DefaultValue"=dword:00000002
"HKeyRoot"=dword:80000001
"HelpID"="shell.hlp#51105"


now right click the file and select merge



________________________________________________________________________________
________________________



Enable Task Manager

copy the following code and paste in notepad, then save with .reg extension. after that right click the file and select merge


Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
"DisableTaskMgr"=dword:00000000




or, if this doesnt work


. Click Start
. Click Run
. Enter gpedit.msc in the Open box and click OK
. In the Group Policy settings window
. Select User Configuration
. Select Administrative Templates
. Select System
. Select Ctrl+Alt+Delete options
. Select Remove Task Manager
. Double-click the Remove Task Manager option select Disable




OR/AND


Click Start -> Run. Type in regedit and hit Enter.

Search for HKEY_CURRENT_USER -> Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System

Look for: DisableTaskMgr. Click on REG_DWORD. Value: 1=Enable this key (disables TaskManager); Value: 0=Disable (actually enables TaskManager)

Close RegEdit

Reboot

or use this:

its a soft that fixes the Task Manager. just 68kb size

..:~Download Link~:..

CODE
http://www.download3000.com/download_19214.html

this is not made by me :( ... but i find it more intresting :)


When you first turn on you computer (BEFORE DIALING INTO YOUR ISP),
open a MS-DOS Prompt window (start/programs MS-DOS Prompt).
Then type netstat -arn and press the Enter key.
Your screen should display the following (without the dotted lines
which I added for clarification).

-----------------------------------------------------------------------------
Active Routes:

Network Address Netmask Gateway Address Interface Metric
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
255.255.255.255 255.255.255.255 255.255.255.255 0.0.0.0 1

Route Table

Active Connections

Proto Local Address Foreign Address State

--------------------------------------------------------------------------------

If you see anything else, there might be a problem (more on that later).
Now dial into your ISP, once you are connected;
go back to the MS-DOS Prompt and run the same command as before
netstat -arn, this time it will look similar to the following (without
dotted lines).

-------------------------------------------------------------------------------------

Active Routes:

Network Address Netmask Gateway Address Interface Metric
0.0.0.0 0.0.0.0 216.1.104.70 216.1.104.70 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
216.1.104.0 255.255.255.0 216.1.104.70 216.1.104.70 1
216.1.104.70 255.255.255.255 127.0.0.1 127.0.0.1 1
216.1.104.255 255.255.255.255 216.1.104.70 216.1.104.70 1
224.0.0.0 224.0.0.0 216.1.104.70 216.1.104.70 1
255.255.255.255 255.255.255.255 216.1.104.70 216.1.104.70 1

Route Table

Active Connections

Proto Local Address Foreign Address State
TCP 0.0.0.0:0 0.0.0.0:0 LISTENING
TCP 216.1.104.70:137 0.0.0.0:0 LISTENING
TCP 216.1.104.70:138 0.0.0.0:0 LISTENING
TCP 216.1.104.70:139 0.0.0.0:0 LISTENING
UDP 216.1.104.70:137 *:*

--------------------------------------------------------------------------------

What you are seeing in the first section (Active Routes) under the heading of
Network Address are some additional lines. The only ones that should be there
are ones belonging to your ISP (more on that later). In the second section
(Route Table) under Local Address you are seeing the IP address that your ISP
assigned you (in this example 216.1.104.70).

The numbers are divided into four dot notations, the first three should be
the same for both sets, while in this case the .70 is the unique number
assigned for THIS session. Next time you dial in that number will more than
likely be different.

To make sure that the first three notation are as they should be, we will run
one more command from the MS-DOS window.
From the MS-DOS Prompt type tracert /www.yourispwebsite.com or .net
or whatever it ends in. Following is an example of the output you should see.

---------------------------------------------------------------------------------------

Tracing route to /www.motion.net [207.239.117.112]over a maximum of 30 hops:
1 128 ms 2084 ms 102 ms chat-port.motion.net [216.1.104.4]
2 115 ms 188 ms 117 ms chat-core.motion.net [216.1.104.1]
3 108 ms 116 ms 119 ms www.motion.net [207.239.117.112]
Trace complete.

------------------------------------------------------------------------------------------

You will see that on lines with the 1 and 2 the first three notations of the
address match with what we saw above, which is a good thing. If it does not,
then some further investigation is needed.

If everything matches like above, you can almost breath easier. Another thing
which should you should check is programs launched during startup. To find
these, Click start/programs/startup, look at what shows up. You should be
able to recognize everything there, if not, once again more investigation is
needed.

-------------------------------------------------------------------------------------------

Now just because everything reported out like we expected (and demonstrated
above) we still are not out of the woods. How is this so, you ask? Do you use
Netmeeting? Do you get on IRC (Internet Relay Chat)? Or any other program
that makes use of the Internet. Have you every recieved an email with an
attachment that ended in .exe? The list goes on and on, basically anything
that you run could have become infected with a trojan. What this means, is
the program appears to do what you expect, but also does just a little more.
This little more could be blasting ebay.com or one of the other sites that
CNNlive was talking about.

What can you do? Well some anti-virus software will detect some trojans.
Another (tedious) thing is to start each of these "extra" Internet programs
one at a time and go through the last two steps above, looking at the routes
and connection the program uses. However, the tricky part will be figuring
out where to tracert to in order to find out if the addresses you see in
step 2 are "safe" or not. I should forewarn you, that running tracert after
tracert, after tracert might be considered "improper" by your ISP. The steps
outlined above may not work exactly as I have stated depending upon your ISP,
but with a true ISP it should work. Finally, this advise comes with NO
warranty and by following my "hints' you implicitly release me from ANY and
ALL liability which you may incur.


Other options

Display protocol statistics and current TCP/IP network connections.
Netstat [-a] [-e] [-n] [-s] [-p proto] [-r] [intervals]

-a.. Display all connections and listening ports.
-e.. Display Ethernet statistics. This may be combined with the -s option.
-n.. Diplays address and port numbers in the numerical form.
-p proto..Shows connections for the protocol specified by proto; proto may be
TCP or UDP. If used with the -s option to display per-protocol statistics,
proto may be TCP, UDP, of IP.
-r.. Display the routing table.
-s.. Display per-protocol statistics. By default, statistics are shown for TCP
UDP and IP; the -p option may be used to specify a subset of the default
interval..Redisplay selected statistics, pausing intervals seconds between each
display. If omitted. netstat will print the current configuration information
once

again a tutorial from me to explain the stuff ! cheers !!!!
-futurbillgate


WHAT MAKES A SYSTEM SECURE?


"The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete bunker, and is surrounded by nerve gas and very highly paid armed guards. Even then I wouldn't stake my life on it."


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT WOULD BE IDEAL PROTECTION OF A SYSTEM?

Password Access- Get rid of simple passwords; routinely change all passwords; regular review/monitoring of password files.

Physical Access- Lock up terminals, personal computers, disks when not in use; eliminate unnecessary access lines; disconnect modems when not in use.

Other measures- Know who you are talking to; shred all documents; avoid public domain software; report suspicious activity (especially non-working hours access)

What this all means is that hackers must now rely on the ineptitude and laziness of the users of the system rather than the ignorance of SysOps. The SysOps and SecMans (Security Managers) are getting smarter and keeping up to date. Not only that, but they are monitoring the hack/phreak BBSes and publications. So the bottom line is reveal nothing to overinquisitive newbies...they may be working for the wrong side.


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT IS A FIREWALL?

A (Internet) firewall is a machine which is attached (usually) between your site and a Wide Area Network (WAN). It provides
controllable filtering of network traffic, allowing restricted access to certain Internet port numbers and blocks access to pretty well everything else.


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW TO HACK WITHOUT GETTING INTO TROUBLE AND DAMAGING COMPUTERS?

1. Don't do damage intentionally.
2. Don't alter files other than than to hide your presence or to remove traces of your intrusion.
3. Don't leave any real name, handle, or phone number on any system.
4. Be careful who you share info with.
5. Don't leave your phone number with anyone you don't know.
6. Do NOT hack government computers.
7. Don't use codes unless you HAVE too.
8. Be paranoid!
9. Watch what you post on boards, be as general as possible.
10. Ask questions...but do it politely and don't expect to have everything handed to you.


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT DO I DO IF I AM GETTING NOWHERE?

1. Change parity, data length, and stop bits. The system may not respond to 8N1 (most common setting) but may respond to 7E1,8E2, 7S2, etc.
2. Change baud rates.
3. Send a series of carriage returns.
4. Send a hard break followed by a carriage return.
5. Send control characters. Work from ^a to ^z.
6. Change terminal emulation.
7. Type LOGIN, HELLO, LOG, ATTACH, CONNECT, START, RUN, BEGIN, GO, LOGON, JOIN, HELP, or anything else you can think off.


=====================================================================


WHAT ARE COMMON DEFAULT ACCOUNTS ON UNIX?

Common default accounts are root, admin, sysadmin, unix, uucp, rje, guest, demo, daemon, sysbin. These accounts may be unpassworded or the password may possibly be the same (i.e. username uucp has uucp as the passwd).

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW IS THE UNIX PASSWORD FILE SETUP?

The password file is usually called /etc/passwd. Each line of the passwd file of a UNIX system follows the following format:


userid:password:userid#:groupid#:GECOS field:home dir:shell


What each of these fields mean/do---

userid -=> the userid name, entered at login and is what the login searches the file for. Can be a name or a number.

password -=> the password is written here in encrypted form. The encryption is one way only. When a login occurs the password entered is run through the encryption algorithm (along with a salt) and then contrasted to the version in the passwd file that exists for the login name entered. If they match, then the login is allowed. If not, the password is declared invalid.

userid# -=> a unique number assigned to each user, used for permissions

groupid# -=> similar to userid#, but controls the group the user belongs to. To see the names of various groups check /etc/group

GECOS FIELD -=> this field is where information about the user is stored. Usually in the format full name, office number, phone number, home phone. Also a good source of info to try and crack a password.

home dir -=> is the directory where the user goes into the system at (and usually should be brought to when a cd is done)

shell -=> this is the name of the shell which is automatically started for the login

Note that all the fields are separated by colons in the passwd file.


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT DO THOSE *s, !s, AND OTHER SYMBOLS MEAN IN THE PASSWD FILE?

Those mean that the password is shadowed in another file. You have to find out what file, where it is and so on. Ask somebody on your system about the specifics of the Yellow Pages system, but discretely!

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT IS A UNIX TRIPWIRE?

Tripwire is a tool for Unix admins to use to detect password cracker activity, by checking for changed files, permissions, etc. Good for looking for trojan horses like password stealing versions of telnet/rlogin/ypcat/uucp/etc, hidden setuid files, and the like.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

USING SUID/GUID PROGS TO FULL ADVANTAGE.

A SUID program is a program that when executed has the privs of the owner.
A GUID has the privs of the group when executed.

Now imagine a few things (which happen often in reality):

1. Someone has a SUID program on their account, it happens to allow a shell to, like @ or jump to a shell. If it does that, after you execute said file and then spawn a shell off of it, all you do in that shell has the privs of that owner.
2. If there is no way to get a shell, BUT they leave the file writable, just write over it a script that spawns a shell, and you got their privs again.


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW CAN I HACK INTO AN AIX MACHINE?

If you can get access to the 'console' AIX machines have a security hole where you can kill the X server and get a shell with ctrl-alt-bkspce. Also by starting an xterm up from one you are not logged in the utmp for that session because the xterms don't do utmp logging as a default in AIX. Or try the usual UNIX tricks:

ftping /etc/passwd, tftping /etc/passwd, doing a finger and then trying each of the usernames with that username as a password.


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW CAN I INCREASE MY DISK QUOTA ON UNIX?

A UNIX disk quota may be increased by finding a directory on another partition and using that. Find another user who wants more quota and create a directory for the other to use, one that is world writable.
Once they've put their subdirectory in it, change the perms on the directory to only read-execute. The reason this works is that
usually accounts are distributed across a couple of filesystems, and admins are usually too lazy to give users the same quotas on each filesystem. If the users are all on one filesystem, you may be able to snag some space from one of the /usr/spool directories by creating a 'hidden' subdirectory like .debug there, and using that.


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW CAN I FOOL AROUND ON XTERM / XWINDOWS?

Most x commands have a -display option which allows you to pick a terminal to send to. So if you use bitmap to create a bitmap, or download one, etc then:

xsetroot -bitmap bitmapname
[display the bitmap on your screen]

xsetroot -bitmap bitmapname -display xt2500:0
[display the bitmap on another xterm]

Other uses, try xterm -display xt??:0 will give someone else one of your login windows to play with. They are then logged in as you though, and can erase your filespace, etc. Beware!

Slightly irritating:
xclock -geom 1200x1200 -display xt??:0
[fills the entire screen with a clock]

Slightly more irritating:
Use a shell script with xsetroot to flash people's screens different colors.

On the nastier side:
Use a shell script with xsetroot to kill a person's window manager.

Downright nasty:
Consult the man pages on xkill. It is possible to kill windows on any display. So to log someone off an xterm you merely have to xkill their login window.

Protect yourself:
If you use xhost - this will disable other people from being able to log you out or generally access your terminal.


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW CAN I TAKE ADVANTAGE OF THE DECODE DAEMON?

First, you need to make sure that the decode daemon is active.
Check this by telnetting to the smtp port (usually port 25), and expanding user Decode. If it gives you something, you can use it.
If it tells you that the user doesn't exist, or whatever, you can't.


If the daemon is active, this is how to exploit the decode daemon:
1) uuencode an echo to .rhosts
2) pipe that into mail, to be sent to the decode daemon (What happens: the decode daemon (1st) decodes the process, but
leaves the bin priveleges resident. (2nd) the echo command is executed, because now the decoded message assumes the bin priveleges [which are *still* active, even though the daemon didn't issue the command]).
3) If this is done right, you will be able to rlogin to the sysem.


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW CAN I GET THE PASSWORD FILE IF IT IS SHADOWED?

If your system has Yellow Pages file managment:

ypcat /etc/passwd > whatever.filename

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW IS A PASSWORD ENCRYPTED IN UNIX?

Password encryption on UNIX is based on a modified version of the DES [Data Encryption Standard]. Contrary to popular belief, the typed password is not encrypted. Rather the password is used as the key to encrypt a block of zero-valued bytes.
To begin the encryption, the first seven bits of each character in the password are extracted to form the 56-bit key. This implies
that no more than eight characters are significant in a password.
Next, the E table is modified using the salt, which is the first two characters of the encrypted password (stored in the passwd file).
The purpose of the salt is to makae it difficult to use hardware DES chips or a precomputed list of encrypted passwords to attack the algorithm. The DES algorithm (with the modified E table) is then invoked for 25 iterations on the block of zeros. The output of this encryption, which is 64 bits long, is then coerced into a 64-character alphabet (A-Z, a-z, 0-9, "." and "/"). Because this
coersion involves translations in which several different values are represented by the same character, password encryption is essentially one-way; the result cannot be decrypted.

- futurbillgate

Linux/Unix FAQ

Posted by test1

this tutorial is only a composition of varius sites ... i just compiled that stuff !

1. What is Linux/Unix?
2. Where can I get Linux?
3. I'm new to all this, what is an easy distro to learn on?
4. I've heard of Linux distros that just run off a CD, where can I get one of those?
5. What are some basic Linux commands to get me going?
6. Where can I get more software for Linux?
7. How can I dual-boot Linux and Windows?
8. I'm lost. What are some other resources to help me out?


- - - - - - - - - - - - - - - - - - - - - - - - -


1. What is Linux/Unix?

Unix was an OS (Operating System) that was developed in the 1960s by Bell Labs (http://www.belllabs.com/history/unix), specifically by Ken Thompson and Dennis Ritchie. Two major variants of Unix evolved throughout the decades; Bell Labs had given Unix away to MIT and Berkeley -- each of them spawning dozens off their own variants.

Linux is the kernel for an operating system that was written in the early 1990s by Linus Torvalds (Linus + Unix = Linux) as a 'Unix work-alike'. It looks like Unix, it acts like Unix, it can run most Unix software - but it's not Unix.

Linus posted his Linux Kernel source on the Internet and people from all over the world started developing for it -- all under the GNU Public License (www.gnu.org/gpl" target="_blank">http://wwww.gnu.org/gpl). Groups of these developers eventually began creating their own distributions or 'distros', like Slackware, Gentoo, and Debian -- which is technically referred to as GNU/Linux Operating Systems.


2. Where can I get Linux?

The best way to get Linux is to download an 'ISO'. Most distros offer an ISO image of their CDs for download on their web sites or you can go to http://www.linuxiso.org, which has a pretty good variety of distros.

Additionally, you could always pay a few bucks and buy a CD either from an online vendor (usually about 5 bucks) or at a local book or computer store (usually around 25 - 50 bucks... but you also get documentation with the extra cost).


3. I'm new to all this, what's an easy distro to learn on?

For Linux newbies, Mandrake, SuSe, or Redhat are usually the recommended distros; they're easy to install and do a pretty good job of detecting and setting up your hardware.

Once you grow more comfortable with Linux and are looking for something a little more 'hands-on', try Slackware or Debian.


4. I've heard of Linux distros that just run off a CD, where can I get one of those?

These are called 'Live-CDs', with Knoppix (http://www.knoppix.org) being the most common. Basically it works like this, you boot off the Live-CD and it creates a virtual drive out of the RAM of your computer that it loads itself into. From there you have a fully functional Linux distribution. When you're done, just pop put the CD and reboot -- everything will be back to normal.

These are good for the Linux curious who aren't ready make any permanent changes to their computer... they also make useful recovery CDs ;)

Besides Knoppix, thereâ€â„Ã
��¢s also:

Slax - http://slax.linux-live.org/
Morphix - http://www.morphix.org/modules/news/
LNX-BBC - http://www.lnx-bbc.org/
Aurox - http://www.aurox.org/en/
Damn Small Linux - http://www.damnsmalllinux.org/
Gnoppix - http://www.gnoppix.org/

For a more complete list: http://www.frozentech.com/content/livecd.php


5. What are some basic Linux commands to get me going?

There are well over a 1000 commands to Linux/Unix -- starting out, you'll probably only be using the more common ones. Here are a few to get you going:

Directories and Files

ls ................. Show directory, in alphabetical order (use with -a to list hidden files)
mkdir .............. Make a directory
rmdir .............. Remove directory (rm -r to delete folders with files)
rm ................. Remove files
cd ................. Change current directory
more .... Views a file, pausing every screenfull
chmod .............. Changes permissions on a file
pwd ................ Prints your current directory path

Getting System Information

who ................ Shows who is logged into the local system
df ................. Shows disk space available on the system
du ................. Shows how much disk space is being used up by folders
free ............... Shows RAM/Swap usage

User Information

talk (user) ........ Pages user for chat - (user) is a email address
write (user) ....... Write a user on the local system (control-c to end)
passwd ............. Change your password
logout ............. Logs off of system

Misc

man ...... shows help on a specific command

6. Where can I get more software for Linux?

7. How can I dual-boot Linux and Windows?

8. I'm lost. What are some other resources that can help me out?

You could post your question here ! If not, the Linux Documentation Project (http://www.tldp.org) has a wealth of information - How-To's, FAQs, Guides, etc... and of coarse, there's always google.com

Here are some links:

- http://www.ee.surrey.ac.uk/Teaching/Unix/
- http://www.linux.org/docs/index.html
- http://www.tldp.org

How to re-install windows without loosing anything

Posted by test1 Thursday, March 26, 2009

How to re-install windows without loosing anything

Over time, Windows loses stability. If you keep a computer for more than two years, at some point you're going to have to bite the bullet and reinstall Windows from scratch. But contrary to popular belief, you won't have to reformat your hard drive (with one exception, discussed below). The bad stuff you need to get rid of is all in your Windows folder.

Before you begin, gather your Windows and application CD-ROMs. Back up your data files (just to be safe), and then clear two days off your calendar. If everything goes smoothly, you can reinstall Windows in a few hours. But you have to assume something will go wrong: You may not be able to find a necessary CD, or data won't be where you thought it was, or something will simply refuse to work.

There's a difference between a repair reinstall and a complete reinstall. Though a repair (also called a refresh) will let you keep your current settings, a complete reinstall will give you a truly fresh version of Windows. Repairs are fast and easy, but they don't fix anywhere near as many problems. The instructions below are for total reinstalls, except where noted.
Your Vendor's Restore CD

Most computers ship with a vendor-specific restore CD rather than with a Microsoft Windows CD-ROM. (If your PC came with a Microsoft Windows CD, or if you bought a retail copy of Windows, skip to the section for your version.)

Some restore CDs give you all the options of a full Microsoft Windows CD, but with better instructions and the convenience of having all the right hardware drivers. Others can do nothing except reformat your hard drive and restore it to the condition it was in when you bought the PC. (This case is the exception I mentioned above that requires a reformat.)

If your restore CD is reformat-only, back up your data files to a network or a removable medium before reinstalling Windows. If you use Windows 98 or Me, back up C:\My Documents, plus the folders inside C:\Windows discussed in the 98*steroidsRgangstaa section below. If you have Windows 2000 or XP, back up C:\Documents and Settings. Also back up any other folders in which you store your data files.
Windows 98 and ME CDs

These Windows versions keep some important data inside your soon-to-be-erased Windows folder, so you need to copy several of its subfolders to another location. Right-click My Computer and select Explore. Double-click the C: drive icon (in Me, you may then have to click View the entire contents of this drive). Right-click in the right pane and select New, Folder. Name the new folder oldstuff.

Go to the Windows folder (you might have to click View the entire contents of this folder), hold down Ctrl, and select the following subfolders: All Users, Application Data, Desktop, Favorites, Local Settings, Profiles, SendTo, and Start Menu. If you don't see them all, select View, Folder Options (Tools, Folder Options in Me), click the View tab, select Show all files, and click OK. (If you still don't see them all, don't worry about it.) Press Ctrl and drag the folders to C:\oldstuff (see FIGURE 1).

Restart Windows with a start-up disk in your floppy drive. (To make a start-up floppy, insert a disk, select Start, Settings, Control Panel, double-click Add/Remove Programs, click Startup Disk, Create Disk, and follow the prompts.) At the Startup Menu, select Start computer with CD-ROM support. While the drivers load, insert your Windows CD-ROM.

Unless you're doing a repair reinstall, type the command c:\windows\command\deltree /y c:\windows and press Enter. Deleting your old files could take time, but the /y switch suppresses confirmation prompts, so take a break.

When you're back at the A: prompt, type x:setup, where x is your CD drive letter (it's likely one letter past what it usually is in Windows, so if it's D: in Windows, it's probably E: here). Press Enter and follow the prompts.

Once you're back in Windows, reinstall your graphics card driver. If you have Windows set up for more than one user, you'll also have to re-create each account. Select Start, Settings, Control Panel, Users to do so. It's important that the user names match those in the old installation. If you're not sure, open Windows Explorer and navigate to C:\oldstuff\profiles. There you'll find a folder for each registered user name (see FIGURE 2). Don't worry about passwords. Log off and log back on as each user. When you're done, log off and back on one more time, but instead of choosing a user name and a password, press Esc to enter Windows without being a specific user.

Select Start, Programs, MS-DOS Prompt (in Windows 98) or Start, Programs, Accessories, MS-DOS Prompt (in Windows Me). Type xcopy c:\oldstuff\*.* c:\windows /s /h /r /c and press Enter (if you want to know what the xcopy switches do, enter the command xcopy /?). When xcopy asks if it should overwrite a file, press a for All.

When xcopy is through, reboot and log on (as a particular user, if necessary). Open My Documents to make sure all your personal files are where they belong, including your Internet Explorer favorites and your custom Start menu shortcuts.

Now skip ahead to "Finishing the Job."
Windows 2000 and XP CDs

Boot your computer with your Windows CD-ROM inserted. When you get the 'Press any key to boot from CD' message, do so. (If you don't see that message before Windows starts, restart Windows, press the key you're prompted to enter for your PC Setup program, and change the boot order so your CD drive is first.)

At the 'Welcome to Setup' screen, press Enter. The R (repair) option takes you to the Recovery Module, which is useful if Windows won't boot, but it's no help with a reinstallation. Soon you'll be told that there's already a Windows installation on the computer. Press r for a repair reinstall or Esc to begin a complete, destructive one. For a complete restore, select your C: partition and press Enter. When you get the warning that says an operating system is on that partition, press c. When you are asked your partition preference, select Leave the current file system intact (no changes). When you're told that a Windows folder (or Winnt folder for Windows 2000) already exists, press l ('ell') to delete it and create a new one. Follow the series of prompts. When the installation program asks for your name, enter temp.

Once the installation is complete, your system will reboot into Windows, and you'll be logged on as user Temp. If the screen is difficult to read, reinstall your graphics card driver.

If you are reinstalling Windows XP, skip to "For Both Windows XP and 2000."

If you're reinstalling Windows 2000, log off as Temp and back on as Administrator. Now log off and on again, this time as Temp. Open Windows Explorer and navigate to C:\Documents and Settings. One of the subfolders will be named Administrator. Another will be named something like Administrator.computername.

Select Start, Programs, Accessories, Command Prompt. Type cd "\documents and settings" and press Enter. Then type xcopy administrator\*.* administrator.computername /s /h /r /c, replacing computername with the last part of that folder's name (after "Administrator.") in Documents and Settings. Now press Enter, and when you're asked about overwriting files or folders, press a for All.

If you have any users on the old installation besides Administrator, continue with the "For Both Windows XP and 2000" section. Otherwise, open Windows Explorer and make sure your data files are where they belong. Then go to Control Panel's Users and Passwords applet and delete the user Temp before skipping to "Finishing the Job."
For Both Windows XP and 2000

Reopen Windows Explorer. Select your C: drive (you may have to click Show the contents of this folder). Right-click in the right pane and select New, Folder. Name the new folder oldstuff. In the left pane, choose the Documents and Settings folder. It should have subfolders for each user from the previous install, plus one for Temp and a few others. Move the folders for your previous user names to oldstuff.

Select Start, Control Panel, User Accounts (Start, Settings, Control Panel, Users and Passwords in Windows 2000). Create an account for each user who was registered before the reinstall. Be sure to use the exact names. They are the same names as the folders you just moved to oldstuff (as shown in FIGURE 2). In Windows XP, at least one user must have administrator privileges.

Log off and back on as each user, before logging back on as Temp. Make sure that you select Log Off and not Switch User at Windows XP's Log Off dialog box (this isn't an issue in Win 2000).

Log on as Temp, select Start, Programs, Accessories, Command Prompt (in XP, Start, All Programs, Accessories, Command Prompt), type xcopy c:\oldstuff\*.* "c:\documents and settings" /s /h /r /c, and press Enter. Press a when asked if you want to overwrite a file. Log off Temp and log on to each restored account to make sure everyone's documents and data are where they belong. Log on as an administrator and run Control Panel's User Accounts applet again to remove the user Temp.
Finishing the Job

Now you've got Windows going, but not much else. You may have to reinstall your printer, sound card, and so on. Luckily, if a driver for the gadget came on your Windows or vendor restore CD, it was probably reinstalled automatically.

You'll have to reinstall your applications to reintroduce them to Windows. Some of their settings will not be changed by the reinstallation, but those that were stored in the Registry were wiped out.

Once your Internet connection is running again, browse to Windows Update and download all critical updates for your version (see FIGURE 3). Then visit the sites of your hardware vendors to update your drivers.

After the reinstall, some of your data may not show up where it should. Search for it in both your Application Data and oldstuff folders, and see if you can move it to the folder in which Windows or your apps are looking for it. If you find a folder called Identities with two subfolders whose names are long and indecipherable, try moving the contents of one to the other and see if your data reappears.

You've probably guessed that the final step is deleting the c:\oldstuff folder--and the Administrator folder in Windows 2000. Make this the very last step, however. Wait a couple of days, weeks, or even months until you're confident that all of your needed files are accessible.

Some intrsting sites

Posted by test1 Wednesday, March 25, 2009


▬▬> http://www.stumbleupon.com/

StumbleUpon is an Internet community that allows its users to discover and rate Web pages, photos, and videos. It is a personalized recommendation engine which uses peer and social-networking principles.

Web pages are presented when the user clicks the "Stumble!" button on the browser's toolbar . StumbleUpon chooses which Web page to display based on the user's ratings of previous pages, ratings by his/her friends, and by the ratings of users with similar interests. Users can rate or choose not to rate any Web page with a thumbs up or thumbs down, and clicking the Stumble button resembles "channel-surfing" the Web. StumbleUpon also allows their users to indicate their interests from a list of nearly 500 topics to produce relevant content for the user.[3] There is also one-click blogging built in as well.


▬▬> http://www.typenow.net/themed.htm

site for download lot of FONTS .....


▬▬> http://www.looplabs.com/

worlds first online mixer site .. :)

What Really Happens When a Computer Starts

Posted by test1 Tuesday, March 24, 2009

What Really Happens When a Computer Starts


So you want to know what really goes on when you turn on your computer.

Your computer follows a boot process that loads Windows XP, called the boot or startup sequence. This process loads all of the operating system files so you can actually use Windows XP. Here’s what happens:
1. When you first turn on your computer, a power-on self test (POST) process occurs. Your computer checks its hardware and memory and then begins to load your operating system.
2. Windows XP has a database of information called the Registry where information about your computer is kept. The Registry is loaded first so it can be read in order to boot Windows XP.
3. Next, Windows loads a file called System.ini. The System.ini file is used to load older system configuration information.
4. Next, Kernel32.dll is loaded. Kernel32.dll is the main operating system code used by Windows XP.
5. After Kernel32.dll is loaded, Gdi.exe and Gdi32.exe are loaded. These files give you the graphical Windows user interface.
6. Next, User.exe and User32.exe are loaded. These files provide code necessary to manage the user interface, including your windows.
7. Resources and Fonts load next.
8. Then, Win.ini is loaded, which provides older system programs and user support.
9. Next, the Windows shell loads, which is your basic graphical interface settings, and policies for your computer are loaded as well.
10. The desktop components are loaded next.
11. Next, a logon dialog box appears. Once you provide a valid username and password, the logon process begins. If you are connected to a network, any appropriate network policies are loaded.
12. Finally, all of the final information from any policies are loaded, and you see your desktop. The boot process is fast and efficient, and is more stable than ever before in Windows XP.

Change Default Wallpaper Folder to My Pictures on Windows XP


Have you ever wondered why Windows XP had such terribly ugly wallpapers to choose from? On top of that, there's no way to easily change the list of backgrounds to a folder you might actually use… like your My Pictures folder.

There's a fairly simple registry hack you can do to make Windows look in a different folder, but if you want to get rid of Blue Lace 16 you'll also have to delete it manually. (The standard warnings about registry editing apply here)

With a name like "Bliss" you would think I would be less tired of seeing this:


Change Wallpaper Folder

Open up regedit.exe using the start menu Run box, and then navigate down to the following key:

Quote:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion

On the right-hand side you should see a value called WallPaperDir, which defines the folder Windows uses to populate the list. If the key does not exist, then you can create a new string value with the same name.

Double-click to change the value, and then paste in the full path to your My Pictures folder. (Note that you could specify any path here if you wanted to.)


The change should be immediate, the next time you open the Desktop panel… but you'll notice a number of default images still in the list. Turns out that Windows also queries the Windows folder for images…

To get rid of those, browse to C:\Windows and then look for a set of horribly ugly Bitmap files:


You can delete these images to make them stop appearing in the wallpaper selection list, just be careful not to delete anything else in your Windows folder or you likely won't be able to boot anymore.

Change XP Desktop Icons Into Smaller List View


Has it ever bothered you that you can't change the size of the icons on your XP desktop? Thankfully they added this ability into Windows Vista, but what are your options in the meantime?

There's a small utility called Deskview that lets you change the icons from regular mode into the smaller "list" mode with a double-click. It's as simple as that.

Download and extract the zipfile, and then double-click on deskview.exe, and your icons will turn from this:


Into this:


To bring them back to regular mode, just double-click on deskview.exe again.


Download deskview.exe Here:



Q: Desktop Never Appears

Posted by test1

Desktop Never Appears


Windows just won't finish loading. I stare at the Windows logo for what seems like an eternity, and then the pulsating progress bar stops pulsating. That's it; Windows never loads. What's going on?

When Windows boots, it loads all of its drivers, initializes its network connections, and
loads its high-level components (Explorer, fonts, etc.) into memory. These things are loaded in order; if one task cannot complete because of a corrupted file or network error, for instance the next task cannot begin and the boot process stalls.

Note: If you're running off a battery, plug your laptop into its charger and wait for about 20 minutes for the battery to accumulate sufficient charge to start Windows.

If the problem started happening as soon as you added a new hardware device, check the device manufacturer's web site for a driver or BIOS update. Otherwise, first unplug your network cable and try again. If Windows loads, there's something wrong with your network connection, Internet connection, router, or whatever else is on the other end of that cable.

Still stuck? Unplug all the USB and FireWire devices connected to your PC. If Windows loads, reconnect them one by one, restarting Windows after each reconnection, until you find the culprit that hangs the system. Really stuck? Start disconnecting any non-USB peripherals (e.g., keyboard, mouse, parallel printer) attached to your PC and, if necessary/applicable, PCI or PCMCIA cards and any other nonessential devices inside your PC. If the above steps don't work, there may be a problem with your hard disk but if you're getting as far as the Windows logo, it's probably not too serious. To investigate, restart your computer, and just after the beep but before the Windows logo appears, press the F8 key. From the Windows Advanced Options Menu, use the arrow keys to highlight Safe Mode, and press Enter.

Safe Mode allows Windows to load without network support, hardware drivers, some services, and a handful of other components that can sometimes cause this problem. If Safe Mode works, open Windows Explorer, right-click your hard disk (e.g., drive c, select Properties, and choose the Tools tab. In the "Error-checking" section, click the Check Now button. Check the boxes next to both options in the "Check disk" section and click the Start button, and ScanDisk will open and check your drive for errors. When it's finished, restart Windows

Set Up a Wireless Network

Posted by test1

Set Up a Wireless Network


I can't get my wireless network off the ground. I want to use the Internet, share files, and so on, but none of it seems to work. I thought this was going to be easy!

Wireless networking is easy! (Unless it's not.)

Wireless networking can be extremely convenient when it works but an absolute headache when it doesn't. The good news is that if you take the time to set up your router correctly, update your firmware, and install Service Pack 2, most wireless problems will disappear.

Note: If you don't have Service Pack 2 yet, use the Windows Update feature now to get it (open Internet Explorer and select Tools --> Windows Update).


A router lets you connect your PC (or all the PCs in your workgroup) to the Internet, as well as connect multiple PCs to each other. Routers also include built-in firewalls, offering much better protection than software-based firewalls such as the Windows Firewall built into Service Pack 2.

But most importantly, a wireless router acts as an access point, a central hub to which all wireless devices in your home or office can connect. To set up a wireless network, you'll need a wireless router (preferably one that supports the 802.11g standard), and at least one PC with a wireless
network adapter.

Connect your PC directly to your wireless router with a cable; that's right, a cable! You'll need to communicate with your router to set it up properly for wireless access something you won't be able to do wirelessly throughout the whole process. Connect one end of a category-5 patch cable to your PC's Ethernet port, and the other end to one of the numbered LAN ports on the back of the router. Then plug in the router's power cable.

Your router probably came with setup software on a CD; in most cases, you don't need this and can use the router's more flexible web-based setup instead. Open a web browser on your PC, and type the router's IP address (usually 192.168.1.1 , but check the router's manual) into the
address bar. The router's built-in web server should show you a setup page like the one in Figure.

If you can't connect to your router, your computer is probably not on the same subnet as the router. The first three numbers of your computer's IP address must match the first three numbers of your router's IP address, but the fourth number must be different. For instance, if your router's address is 192.168.0.1, you may not be able to connect to it until you manually change your PC's address to 192.168.0.xxx, where xxx is any number between 2 and 255. If all else fails, reset the router, following the instructions in the documentation, and try again.

This image has been resized. Click this bar to view the full image. The original image is sized 814x648.

On the setup page, choose your Internet connection type from the list. If your Internet connection requires a username and password, select PPPoE. If your ISP has provided an IP address for your connection, select Static IP. Otherwise, choose Automatic Configuration -DHCP. (Naturally, the options for your router may be slightly different.)

Click the Apply or Save Settings button at the bottom of the page when you're done. Within a few seconds, you should have Internet access; go ahead and test it by opening a second browser window (press Ctrl-N) and visiting any web site.


Note: If you select PPPoE, the router should prompt you for a login. Type the username and password for your broadband connection, not your login for Windows, your email account, or anything else. If you choose Static IP, enter the IP addresses of your ISP's DNS servers. Your ISP should provide this information to you .

Once your Internet connection is working, visit the router manufacturer's web site and download any available firmware updates. (You can usually find your router's current firmware version on the Status page in the router's web-based setup.) Firmware updates include essential bug fixes,
performance enhancements, security patches, and occasionally new features. Consult your router's documentation for firmware update instructions.

Next, go to your router's wireless setup page (see Figure): this is either a link in the main menu or a tab across the top of the page. Choose a new SSID (the name for your wireless network), and turn off the Wireless SSID Broadcast option to keep your wireless network private Click the Apply or Save Settings button at the bottom of the page when you're done.


This image has been resized. Click this bar to view the full image. The original image is sized 810x498.

Note: If you're using a Wireless-G router (a faster sibling of the 802.11b standard, capable of 54 Mbps), avoid the temptation to select the "G only" option on the wireless setup page. This feature prevents slower Wireless-B devices from joining your WiFi networka fact you'll likely have forgotten when a visiting relative tries to connect to your home network to check her email a few months from now .

You should also enable encryption for the best wireless security. This setting will be accessible either through a button on the current page, or on a separate tab entitled WEP, WPA, Encryption, or simply Wireless Security, like the one in Figure. WEP, the Wireless Encryption Protocol,
prevents anyone without your secret WEP key from connecting to or spying on your wireless network. Some routers also support WPA, or WiFi Protected Access, which provides a slightly higher level of security.

This image has been resized. Click this bar to view the full image. The original image is sized 817x586.

On your router's encryption page, enable WEP, and then choose the highest WEP encryption level supported by your router (in this example, 128-bit). Higher levels provide better protection, but also mean longer (and harder to type) WEP keys.

Some routers have you choose a passphrase , which is a word your router uses to generate the WEP keys. In the example shown in Figure, I typed the word "annoyances" and clicked the Generate button to create four 26-digit WEP keys (the first one, Key 1, is the only one that is used). Generally, all of the computers on your wireless network will have to use the same key.

The Evils of SSID Broadcast


Your SSID is the back door into your wireless network. If you broadcast your SSID, anyone with an SSID sniffer will be able to find it in a matter of seconds, connect to your network, and use your Internet connection (or even snoop around your shared folders).

The same danger exists if you continue to use your router's default SSID; probably a million people around the globe are using "link-sys," which makes it a good guess for anyone trying to gain access to your network. Choose an SSID like you'd choose a password, and your wireless network will stand a better chance of remaining private.

The only time you'll likely want to enable SSID broadcast, other than for testing purposes, is if you're setting up a public WiFi access point, say in a coffee shop or bed and breakfast, and you want to make it easy for your patrons to connect.

ad

Get Solution For your daily faced problems

Followers

About Us