Monday, October 27, 2008

How to free more RAM on your phone

Method 1 : Flight mode:Put your phone in "Flight mode" with Psiloc System Tools. Install System Tools, open it and select "Flight mode". This way you can restart the phone without your SIM card so there will be no running phone tasks in the background. Now you can have up to 3,5 MB of free RAM!Note: ironically enough, Flight mode doesn't work when Smart Launcher is installed, at least in my case. But i've also heard several reports of people who have both apps running without any problems.

Method 2 : Smart Launcher trick:Install Smart Launcher and open it. Go to Options, Settings and put Launcher ON.Now plug in your charger and switch off your phone. Wait untill the battery meter appears and short press the Menu button (don't hold).The menu should appear and now you can have 3,5 to 4,5 MB free RAM! (Hold Menu button to check RAM).The trick is that with the charger plugged in, the phone must get a minimum software support
for charging, even whenthe phone is switched off. And somehow Smart Launcher has still got it's shortcut running and that's the Menu button. So whenyou press the Menu button, you go directly to the Menu without any other phone tasks running in the background soyou trick the phone and you have more free RAM!Note: when you unplug the charger, the phone will switch off.

Method 3 : This method I found it by myself, it frees a little about 100~200 KB but I guess it's useful sometimeClose your menu not by selecting the right selection key "exit", or pressing the menu key another time, they only hide the menu app but do not close it, to close it select the left selection key "option" and scroll down and select "exit"So when you open an app needs more ram reopen menu and close it, it's useful when play low bit rate video in realplayer paradis.

KILL MOSQUITOES WITH YOUR COMPUTER

Stop using chemical based Insecticides to kill mosquitoes, because you might kill yourself.

Download these Anti Mosquito software to repel those annoying insects and be safer & greener

How does it work?

Dragonflies are the mortal enemy for mosquitoes and in flight they generate sound frequencies (approximately) between 67 Hz and 45 Hz, depending on their sizes.

56 Hz is a good average number in between those frequencies. Your PC sound card and speakers will work well for this purpose. There are many sound and tone generator programs available on the internet for both the Mac and Windows PC. Setup your computer with the sound/tone generator program running and then play the sound through your computer speakers. The speakers can be aimed directionally for complete room coverage.

The sound level on the speakers should be adjusted so it is barely audible. This arrangement can be setup in a bedroom where you would like to have the window open but are worried about mosquitoes. One speaker should be fairly close to where you are sleeping.

Here are some links to more advanced tone generator software which can actually sweep between the 45 Hz and 67 Hz frequencies:

http://www.nch.com.au/tonegen/index.html
http://www.esseraudiosolutions.com/ttg.htm

Top 10 Hacks of all time

Here is a list off the top 10 hacks of all time.
Early 1990s

Kevin Mitnick, often incorrectly called by many as god of hackers, broke into the computer systems of the world's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Microsystems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering.
November 2002


Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a "fast-track extradition" to the US where he is a wanted man. The next hearing in the case is slated for today.
1995

Russian computer geek Vladimir Levin effected what can easily be called The Italian Job online - he was the first person to hack into a bank to extract money. Early 1995, he hacked into Citibank and robbed $10 million. Interpol arrested him in the UK in 1995, after he had transferred money to his accounts in the US, Finland, Holland, Germany and Israel.
1990

When a Los Angeles area radio station announced a contest that awarded a Porsche 944S2 for the 102nd caller, Kevin Poulsen took control of the entire city's telephone network, ensured he is the 102nd caller, and took away the Porsche beauty. He was arrested later that year and sentenced to three years in prison. He is currently a senior editor at Wired News.
1983

Kevin Poulsen again. A little-known incident when Poulsen, then just a student, hacked into Arpanet, the precursor to the Internet was hacked into. Arpanet was a global network of computers, and Poulsen took advantage of a loophole in its architecture to gain temporary control of the US-wide network.
1996

US hacker Timothy Lloyd planted six lines of malicious software code in the computer network of Omega Engineering which was a prime supplier of components for NASA and the US Navy. The code allowed a "logic bomb" to explode that deleted software running Omega's manufacturing operations. Omega lost $10 million due to the attack.
1988

Twenty-three-year-old Cornell University graduate Robert Morris unleashed the first Internet worm on to the world. Morris released 99 lines of code to the internet as an experiment, but realised that his program infected machines as it went along. Computers crashed across the US and elsewhere. He was arrested and sentenced in 1990.
1999

The Melissa virus was the first of its kind to wreak damage on a global scale. Written by David Smith (then 30), Melissa spread to more than 300 companies across the world completely destroying their computer networks. Damages reported amounted to nearly $400 million. Smith was arrested and sentenced to five years in prison.
2000

MafiaBoy, whose real identity has been kept under wraps because he is a minor, hacked into some of the largest sites in the world, including eBay, Amazon and Yahoo between February 6 and Valentine's Day in 2000. He gained access to 75 computers in 52 networks, and ordered a Denial of Service attack on them. He was arrested in 2000.
1993

They called themselves Masters of Deception, targeting US phone systems. The group hacked into the National Security Agency, AT&T, and Bank of America. It created a system that let them bypass long-distance phone call systems, and gain access to the pbx of major carriers.

How to Clone a Hard Drive

Did know that you could clone your current Hard Drive without having to by extra software? Maybe you didn't know that all that you needed, was already set up on your current system? Well, it is... and if you follow this tut, you shouldn't have much of a problem.

Make sure that you have a Master and a Slave setup on your system. The Slave drive, in this case, is where all the data on the Master is going to go to.

First: Perform a Scandisk your Master drive and follow that with a thorough Defrag. If you have an Antivirus program, do a thorough sweep with the AV first, then do the Scandisk, followed by the Defrag.

Second: Do the same thing to the target drive, as you did the Master: Scandisk then a thorough Defrag.

Third: Right-click on the Target drive and click on Format. When the box comes up, click your mouse onto the "Full" button.

Fourth: After Formatting the Target drive, run a Scandisk again and click on the button that says "Autofix Errors".

Fifth: In this final part, you might want to cut-and-paste to code in, unless you are sure that you can do it without making any mistakes:

Click on the "Start" button, then click on the "Run..." button, then place the following into the Run box:

"XCOPY C:\*.*D:\ /c/h/e/k/r" (minus the quotes, of course) then press the "Enter" button.

If you receive an error message, then remove the space from between XCOPY and C:\

Anything that should happen to come up in the DOS box, just click "Y" for "Yes". When its all finished, pull the original Master from the system, designate the Slave as the Master (change your jumpers), then check your new Master out.

This tut has worked and has been tested on all systems except for Windows 2000, so you really shouldn't have any problems. If, by any chance, you should come across a snag, message me and I'll walk you through it.

What is Double Password?

Strong passwords should have a significant length and cannot contain normal words. Only random digits and letters of different case. Such passwords are extremely hard to remember and it takes time to enter. But, even strong passwords have their weaknesses. When you type a password, it can be intercepted by a spy program that logs all your keystrokes. Others can see what you type (even if the password field on the screen is masked, the password can be read by buttons you hit on your keyboard.)

Until now, the only solution was to buy a secure token. A secure token is a hardware key that is used instead of or in addition to your normal password authentication. There are two main problems with the hardware solution, though. First, it is expensive. And second, you can use them only with software that has built-in support for this method of authentication.

But, from now on, you can turn any USB flash drive into a secure token! No need to purchase an additional expensive device. All you need is about 2 megabytes of free space on your flash drive or other USB gadget, such as an MP3 player, PDA or even a USB-pluggable mobile handset.

Strong Password



How does it work?
Our software, Double Password, installs onto your flash drive. When you type a password, the program intercepts it and converts it into a super-strong password string on-the-fly. You can use simple, easy-to-remember passwords without the risk of being cracked.

Another benefit of using Double Password is that nobody can steal your passwords. Spy programs are useless. Even if someone gets the "weak" password that you type on the keyboard, it means nothing. This password will only work when your USB flash is inserted.

While typical hardware locks will work only with software that supports secure tokens, Double Password works with any software. It simply substitutes your weak password with a strong one.

Double Password can be effectively used to securely lock your Windows account, to protect your laptop and to bring a new level of security to all software that uses password authentication.

How does Worms work ?

People use e-mail more than any other application on the internet, but it can be a frustrating experience, with spam and especially e-mail worms filling our inboxes.

Worms can spread rapidly over computer networks, the traffic they create bringing those networks to a crawl. And worms can cause other damage, such as allowing unauthorized access to a computer network, or deleting or copying files.

What's a worm?

A worm is a computer virus designed to copy itself, usually in large numbers, by using e-mail or other form of software to spread itself over an internal network or through the internet.

How do they spread?

When you receive a worm over e-mail, it will be in the form of an attachment, represented in most e-mail programs as a paper clip. The attachment could claim to be anything from a Microsoft Word document to a picture of tennis star Anna Kournikova (such a worm spread quickly in February 2001).

If you click on the attachment to open it, you'll activate the worm, but in some versions of Microsoft Outlook, you don't even have to click on the attachment to activate it if you have the program preview pane activated. Microsoft has released security patches that correct this problem, but not everyone keeps their computer up to date with the latest patches.

After it's activated, the worm will go searching for a new list of e-mail addresses to send itself to. It will go through files on your computer, such as your e-mail program's address book and web pages you've recently looked at, to find them.

Once it has its list it will send e-mails to all the addresses it found, including a copy of the worm as an attachment, and the cycle starts again. Some worms will use your e-mail program to spread themselves through e-mail, but many worms include a mail server within their code, so your e-mail program doesn't even have to be open for the worm to spread.

Other worms can use multiple methods of spreading. The MyDoom worm, which started spreading in January 2004, attempted to copy infected files into the folder used by Kazaa, a file-sharing program. The Nimda worm, from September 2001, was a hybrid that had four different ways of spreading.

What do they do?

Most of the damage that worms do is the result of the traffic they create when they're spreading. They clog e-mail servers and can bring other internet applications to a crawl.

But worms will also do other damage to computer systems if they aren't cleaned up right away. The damage they do, known as the payload, varies from one worm to the next.

The MyDoom worm was typical of recent worms. It opened a back door into the infected computer network that could allow unauthorized access to the system. It was also programmed to launch an attack against a specific website by sending thousands of requests to the site in an attempt to overwhelm it.

The target of the original version of MyDoom attack was the website of SCO Group Inc., a company that threatened to sue users of the Linux operating system, claiming that its authors used portions of SCO's proprietary code. A second version of MyDoom targeted the website of software giant Microsoft.

The SirCam worm, which spread during the summer of 2001, disguised itself by copying its code into a Microsoft Word or Excel document and using it as the attachment. That meant that potentially private or sensitive documents were being sent over the internet.

How do I get rid of them?

The best way to avoid the effects of worms is to be careful when reading e-mail. If you use Microsoft Outlook, get the most recent security updates from the Microsoft website and turn off the preview pane, just to be safe.

Never open attachments you aren't expecting to receive, even if they appear to be coming from a friend. Be especially cautious with attachments that end with .bat, .cmd, .exe, .pif, .scr, .vbs or .zip, or that have double endings. (The file attachment that spread the Anna Kournikova worm was AnnaKournikova.jpg.vbs.)

Also, install anti-virus software and keep it up to date with downloads from the software maker's website. The updates are usually automatic.

Users also need to be wary of e-mails claiming to have cures for e-mail worms and viruses. Many of them are hoaxes that instruct you to delete important system files, and some carry worms and viruses themselves.

As well, some users should consider using a computer with an operating system other than Windows, the target of most e-mail worms. Most of the worms don't affect computers that run Macintosh or Linux operating systems.

Recycling Toner Cartridges: Is It Worth The Effort?

Millions of businesses, schools and other organizations around the world purchase and use billions of printer and copier toner cartridges every year. Toner cartridges are just another item on the laundry list of things that humans use and commonly throw away, but why? Anyone who has ever changed the toner in a copy machine or printer knows that it is usually a very large, bulky plastic container which gets changed once a week or month and then has no use to you whatsoever afterwards. Although it may not be of use to you personally or your company, there are benefits to hanging on to toner cartridges and contributing them to a recycle or re manufacturer.

When you recycle your toner cartridges, you should first take a moment to pat yourself on the back for your valiant efforts helping to reduce pollution and make the world a better place for everyone on it. When you're finished with that it's time to put on your capitalist hat and get moving because there are financial benefits to recycling toner cartridges too. There are companies that refill and sell previously used toner cartridges that will pay a few dollars per cartridges for your empties. You probably won’t become rich turning in your old cartridges, just like you won’t by recycling cans, but coupled with a few other financial benefits, you might begin to see why recycling is worth it.

If you want to recycle toner cartridges, first you need to use them. If this does not apply to you then you should probably skip the reading and start picking up cans. Seriously though, if you use one or two toner cartridges per year, you should still recycle them but your will probably not see much reason to sell them to a re manufacturer. It may also be difficult to get them to purchase just one or two from you. Most re manufacturers are looking to purchase from large companies that can send them pallets or even truckloads once every month or two. Otherwise you can donate your empties to a charity that is collecting them to sell in bulk to re manufacturers in order to make money for their organization. This is a common fund raiser for schools, churches, youth organizations and others. If it is not available in your community, you might want to suggest it within a charity or non-profit you are affiliated with.

Where most individuals will see the greatest benefit of recycled toner cartridges is in purchasing re manufactured ones. Professional, quality refilled cartridges can be much less expensive than new name brand ones and often just as good. When purchasing these, however, make sure it is a reputable re manufacturer that gives some form of guarantee with their product both for its malfunction and any damage it could cause to your machine. This is especially important because most manufacturers of printers and copiers will only warranty malfunction caused by their machine and their print cartridges. As long as the re manufacturer does a quality job, you will probably find that the best reason to recycle toner cartridges is to buy them again refilled, as good as new and much less expensive.

A Basic Tutorial on how to secure your computer from Internet threats for Beginners

Once you are connected to the Internet, there are many Internet threats such as viruses, Trojans, spy wares, hackers that may damage, slow down or steal information from your PC.

The following points will provide some insights on how you can better protect your computer against common Internet threats. It is written in simple non-technical terms so that beginners or non-technical personnel are able to understand. Every security safeguard a computer user takes will reduce the number of people skilled enough to break into their computer using various attack methods.

(1) One of the common Internet threats is virus attacks. What is a virus ?

Viruses are computer programs which has these characteristics:

1. The program is able to self-replicate.

2. The program is able to activate itself. In addition, viruses spread by infecting files.

Here is my encounter with viruses:

"Back when I was administering multiple office networks across the region, I have seen some viruses such as "Netsky" attacking the computer networks and they come in by the thousands (20,000 in a night to be precise !).

Fortunately, I had an anti-virus program that was blocking these virus onslaught from entering into the Computer Data Center which holds the company critical operations and data storage. The unsung hero (The anti-virus) did it's job well and not a single virus came through the company network. Unfortunately, the server that runs the anti-virus had a hardware failure due to the extremely high traffic of cleaning these viruses.

I had to immediately get ready a standby server to take over the anti-virus job and later installed a clustered anti-virus solution for high availability. This meant an anti-virus software is the absolutely the first protection that a computer cannot do without".

So how to get protection and are there FREE Anti-Virus ?

The ANSWER is yes. One of the popular Anti-Virus is AVG Free Edition Anti-Virus.

(2) Another form of Internet threat is Spyware.

Spy ware programs are able to retrieve various types of personal information and can also by itself install additional software, pointing your web to other web sites that may have viruses. Furthermore, multiple spy wares can cause your computer to slow down as it takes up your CPU, Memory and Disk space. Your network performance may also suffer as spyware redirect unwanted network traffic.

Traditionally an Anti-Virus is adequate to protect a PC but now it is essential to also include Anti-spyware program to counter this threat. Anti-spyware programs are to monitor your PC for spyware while giving you a peace of mind while going about your on-line activity.

There are also FREE and popular Anti-Spy ware programs such as Spybot Search and Destroy and Lava soft Ad ware Personal.

(3) Trojans

These are computer programs that can hide themselves behind an innocent looking e-mail attachment (e.g. a tempting computer game). Once the attachment is executed, the Trojan will install itself into the computer and it can now start doing damage to your computer.

Some Trojans has spy ware, which is software that keeps track of Internet usage statistics and it will send these information back to the creator.

Most anti-virus comes with Trojan removal. However, nowadays it is better to equip your PC with a personal firewall. It will help you to block unwanted applications/virus from trying to penetrate your PC.

This site is setup to provide information, recommendation on hacking prevention, controls to minimize security threats from viruses, Trojans, spy wares, hacking based real life experience while conducting security assessment and penetration tests. There is a beginner section that guides new Internet users step by step to install the security defenses.

The above represent the basic defense against Internet threats. Of course there many more measures to minimize these threats. If you require more information and step by step guide to install the above security software, please refer to the website listed above.

Some ways to download torrentz faster !


1. Cap your upload (most important)

Limit your upload speed to approximately 80 percent of your maximum upload rate. You can check your upload speed over here (never trust your isp). Once you know your maximum upload speed, change the max upload (to 80%) speed in your torrent client’s preferences.

Don’t get me wrong, everyone should share as much as possible, but if your upload rate reached it’s max, your download rate suffers significantly.

2. Hack the max TCP connections

If you’re on XP sp2, your TCP connections are limited to a maximum of 10. This seriously hurts your downloading speed because it wont let you connect to a high amount of ip numbers. It is supposed to slow down viruses because their spreading strategy is to connect to a high amount of ip numbers, but it also cripples your torrent downloads.
A nice way to fix this is to download this patch, it allows you to set the maximum allowed connections to any number you want. Any number between 50 and 100 is ok (more on this).

3. Check seeds and peers

A simple tip, but o so important. Always look for torrents with the best seed/peer ratio. The more seeds (compared to peers) the better (in general). So 50 seeds and 50 peers is better than 500 seeds and 1000 peers. So, be selective.

4. Change the default port.

By default, BitTorrent uses a port 6881-6999. BitTorrent accounts for a lot of the total internet traffic (1/3), so isp’s like to limit the connection offered on the these ports. So, you should change these to another range. Good clients allow you to do this, just choose anything you like. If you’re behind a router, make sure you have the ports forwarded or UPnP enabled.

5. Disable Windows Firewall

It sucks. Windows Firewall hates P2P and often leads a life of it’s own. So disable it and get yourself a decent firewall, Kerio or Zone Alarm for example.

What is Spyware..?

Spyware is one of the biggest threats to your privacy and the security
of your data. It's also the number one cause of system slowdowns on computers
because it uses precious system resources including RAM (memory) and
hard drive space.

Some Symptoms of Spyware, Adware, Malware Infection:
The symptoms of a malware infection vary. Your web browsing speed may be slow. Your computer, in general, may be slower that it was and may take much longer to start up than
it used to.

It is likely Internet Explorer is modified. You homepage and/or search
page may be changed, new favorites that you didn't create may appear,
a new toolbar may appear or you may end up at unknown web sites when
you try to do a search.

Download Windows XP Service Pack-III as an ISO Image

Download Windows XP Service Pack-III as an ISO Image at the following link.

It’s not particularly easy installing some of the official Service Packs on your computer. For instance, installing the Vista SP1 on one of our PCs took an age, after downloading, rebooting, fixing our drive and so on. It’s frustrating. Try doing this across multiple computers and the process can take longer than you may anticipate.

The answer is to install from a disc. Burn the Service Pack to a disc, then insert the disc on your computers and then update each one individually.

Microsoft have released the XP SP3 as an ISO image, which enables you to download, burn to a disc with your regular burning software and then install from your CD, from than from an installer package. This CD contains all the fixes, updates and security hotfixes released previously, so it’s a large file at around 540MB. If you’re installing on one computer, you’d be more wise installing from the Windows Update which will find and install the Service Pack most relevant to your system.

Gtalk -Tips & Tricks

Wumpus Game : - First noted by a GoogleRumors commentor, if you add the buddy wumpus.game@gmail.com you can play the classic text-based game. Wumpus is an easter egg game that came with Google Talk (unfortunately, he didn't’t accept my invitation, so I can’t play).
  • Change the font size - While holding the control key, move the scroll wheel on your mouse either up or down. This trick works while being focused in either the read or write area.
  • Insert line breaks - If you want to have a message that spans multiple paragraphs, just hold shift and hit enter. You can add as many new lines as you want to create.
  • Bold Text - To write something bold, you can use an asterisk before and after the word, like *this* .
  • Italic Text - To use italics, use an underscore before an after the word, like _this_ .
  • Switch windows - Hitting tab will cycle through open windows. It will select minimized conversations, to expand them just hit enter. If you just want to cycle through IM's and don't care about the buddy list, control-tab will do that and will automatically expand a minimized conversation if you settle on one.
  • Invitation Tips - You don’t need to say Yes or No when someone wants to add you as a friend; you can simply ignore it, the request will go away. (On the other hand, someone with whom you chat often will automatically turn to be your friend, unless you disable this in the options).
  • Show Hyperlinks - You can show your homepage or blog URL simply by entering the it in your away message (at the top of the main window). It will automatically turn to a link visible to others.
  • Google Talk Game - “Google Talk” also was the name of a word game which uses Google.
  • A message can be 32767 characters long.

Keyboard Shortcuts

  • Ctrl + E - It centralizes the selected text, or the current line.
  • Ctrl + R - It justifies to the right the selected text, or the current line.
  • Ctrl + L - It justifies to the left the selected text, or the current line.
  • Ctrl + I - The same thing does that Tab.
  • Tab - It is giving the area to each of the windows opened by Google Talk.
  • Ctrl + Tab - The same thing does that Shift + Tab .
  • Shift + Tab - The same thing does that Tab but in reverse.
  • Ctrl + Shift + L -Switch between points, numbers, letters, capital letters, roman numbers and capital roman numbers
  • Ctrl + 1 (KeyPad) - It does a simple space between the lines.
  • Ctrl + 2 (KeyPad) - It does a double space between the lines.
  • Ctrl + 5 (KeyPad) - A space does 1.5 between the lines.
  • Ctrl + 1 (NumPad) - It goes at the end of the last line.
  • Ctrl + 7 (NumPad) - It goes at the begin of the last line.
  • Ctrl + F4 - It closes the current window.
  • Alt + F4 - It closes the current window.
  • Alt + Esc - It Minimize all the windows.
  • Windows + ESC - Open Google Talk (if it's minimized, or in the tray)
  • F9 - Open Gmail to send an email to the current contact.
  • F11 - It initiates a telephonic call with your friend.
  • F12 - It cancels a telephonic call.
  • Esc - It closes the current window.

Gtalk Emotions
  • :-|
  • :-O
  • :-x
  • :-P
  • :-D
  • ;-)
  • :-(
  • :-)
  • B-)
  • :'(
  • :|
  • :O
  • :x
  • :P
  • :D
  • :)
  • :(
  • :)

Conference Calls

What you need to do to have conference calls: Open up a copy of Google Talk on all computers with which you wish to conference. After one copy is opened make a new shortcut for Google Talk but at the end of it add /nomutex. If you installed it to the default folder then your shortcut should read "C:\Program Files\Google\Google Talk\googletalk.exe" /nomutex. Open 2nd instances of the software on every user's computer. After this start a chain: User 1 should connect on one instance to user 2. User 2 will connect on his second instance to user 3. User 3 will connect using his second instance back to user 1. With this chain everyone is connected to everyone.

Restore Show Desktop on taskbar

It's a common issue when you are dealing with spyware or other software unistallation on Windows XP your favorite Show Desktop icon to disappear from taskbar. Here is one relatively simple way how you can restore this useful icon:
  • Create file named: Show Desktop.scf
  • Open notepad and paste this content:
[Shell]
Command=2
IconFile=explorer.exe,3
[Taskbar]
Command=ToggleDesktop
  • Save the file
  • Go to C:\Documents and Settings\your_username\Application Data\Microsoft\Internet Explorer\Quick Launch
  • Paste the file there.

Invisible detection in Yahoo

Doodle Method

1: Double Click on de user whose status u want to check.

2: A message window will open.

3: Click IMVironment button, select See all IMVironments, select Yahoo! Tools or Interactive Fun, and click on Doodle.

4: After loading the Doodle IMVironment, dere will be two possibilities.

*If the user is offline, the Doodle area will show “waiting for your friend to load Doodle” continuously.

*If the user is online (in invisible mode), after few seconds (it can take up to one minute, depending on connection speed), you will get a blank page. So the user is online

Using Conference Invitation

1: Right Click on de user whose status u wants to check.

2: When de menu appears select Invite to Conference...

3: Now a window will appear. See at de right pane, the username u selected will be there. Now, select Invite.

It’s a simple 4 step process.

Change STARTUP and SHUTDOWN sounds in XP


Have you ever felt bugged-up with the Start-up and Shutdown jingle of your Windows XP or Vista ? If yes, here is the solution, now you use any of your favorite voice or music or dialogue as your PC’s shutdown and start up.

Step 1.

Choose the track which you want to play at start-up and shutdown jingles,

Limitations are

* It should be in .WAV format.
* The size of file should not be large, prefer keeping them within in 1 Mb, otherwise your startup will take a bit longer.

If the file you want to make your start-up or shutdown is not in .WAV format, you can easily convert them using Jet Audio 7, or any other converter.

Step 2.

Now rename these files as “Windows XP Startup.WAV” and “Windows XP Shutdown.WAV” respectively.

Step 3.

Now Go to “C:\WINDOWS\MEDIA”, here you will find files “Windows XP Startup.WAV” and “Windows XP Shutdown.WAV”, move them to some other locations, this step is required for, in case you need to revert back these sounds, else you can ignore this step.

Step 4.

Now the files you have chosen and renamed, just copy-paste or cut paste them in “C:\WINDOWS\MEDIA”, here you go, now you can enjoy the new Start-up and shutdown.

Send free sms to mobile from your pc

here is the list

ENJOY

https://zyb.com/

http://www.mobyko.com/

http://stepsms.com/

http://www.smstxtbox.com/web/

http://www.junglesms.com/

http://50sms.com/

http://www.ecosms.ch/

http://www.free--sms.com/index.go

http://www.pimpmysms.com/

http://www.islamweb.net/

http://www.phones.com/

http://www.devinosms.com/

http://gsms.se/

http://www.themobiweb.com/en/sms.html

http://my.phonegnome.com/

http://sms4u.biz/signup.php

http://simsor.com/register

http://www.mobik.com/mobik/client/

http://www.smsdiscount.com/en/index.html

http://4usms.net/

http://www.sendsmsnow.com/

http://www.unisms.uni.cc/

http://www.atrochatro.com/

http://www.gsmvault.com/

http://smscity.com/

http://www.sms2india.org/

http://www.freesms.web.tr.tc/

http://www.d1g.com/

http://thesmszone.com/

http://zyb.com/

http://www.vazu.com/

http://www.sms.ac/

http://www.agentsms.com/

http://www.mobizone.com/

http://www.yellowpages.com.eg/

http://www.boswtol.com/

www.masrawy.com/sms

http://www.resalh.com/

http://free-sms-message.com/index.htm

http://adleel.com/sms.htm

http://mobile.fares.net/sms/uae

http://www.itsalat.com/

http://www.quios.com/

http://www.clickatell.com/

www.ulluminati.ch/Nexus/sms.html

http://www.freesms.net/

http://www.free-sms.com/

http://www.lycos.co.uk/

http://www.sms.at/

http://www.sms.com/

http://www.smsyes.com/

www.smsuae.com/sms-uae

http://www.edihasms.com/

http://www.shortmessage.com/

www.worldxs.net/sms.html

www.hot.it/sms

Restrict PC Shutdown

Both Vista and Windows XP let you take control of preventing a user not to shutdown the machine by editing the group policy. For example if your friend is using your computer and you went somewhere ( and you have still some unsaved document left) and he shutdowns the pc without saving them…you loose a good amount of data. ( Trust me I have lost one whole blog post and project code at same time ). This is what you can do

Restrict PC Shutdown

* Type gpedit.msc in run dialog box [ WIN KEY + R ]
* This will open Group Policy Editor. Now there are two things in it, Computer Configuration and User Configuration
* Click on User Configuration > Administrative Templates > Start Menu and Task Bar
* Now look for “remove and prevent access to shutdown command”
* Double Click and Enable it.
* Exit the group policy editor.

This setting removes the Shut Down option from the Start menu and disables the Shut Down button on the Windows Security dialog box, which appears when you press CTRL+ALT+DEL. This setting prevents users from using the Windows user interface to shut down the system.

Now if you try to shutdown by clicking on start , the shutdown button must have disappeared. Moreover check the task manager and you will find all shutdown,restart and others disabled except switch user.

Wednesday, October 22, 2008

Some Windows XP Tricks

Launch Regedit and go to the following Registry Key:

HKEY_CURRENT_USER/Software/Microsoft/CurrentVersion/Policies

Under this key, there will definitely be a key named explorer. Now under this explorer key we can create new DWORD values and modify it's value to 1 in order to impose the restriction. If you want to remove the Restriction, then you can simply delete the respective DWORD values or instead change their values to 0. The following is a list of DWORD values that can be created under the Explorer Key-:

NoDeletePrinter: Disables Deletion of already installed Printers

NoAddPrinter: Disables Addition of new Printers

NoRun : Disables or hides the Run Command

NoSetFolders: Removes Folders from the Settings option on Start Menu (Control Panel, Printers, Taskbar)

NoSetTaskbar: Removes Taskbar system folder from the Settings option on Start Menu

NoFind: Removes the Find Tool (Start >Find)

NoDrives: Hides and does not display any Drives in My Computer

NoNetHood: Hides or removes the Network Neighborhood icon from the desktop

NoDesktop: Hides all items including, file, folders and system folders from the Desktop

NoClose: Disables Shutdown and prevents the user from normally shutting down Windows.

NoSaveSettings: Means to say, 'Don't save settings on exit'

DisableRegistryTools: Disable Registry Editing Tools (If you disable this option, the Windows Registry Editor(regedit.exe) too will not work.)

NoRecentDocsHistory: Removes Recent Document system folder from the Start Menu (IE 4 and above)

ClearRecentDocsOnExit: Clears the Recent Documents system folder on Exit.

Nolnternetlcon: Removes the Internet (system folder) icon from the Desktop

Under the same key: HKEY_CURRENT_USER/Software/Microsoft/CurrentVersion/Policies you can create new subkeys other than the already existing Explorer key. Now create a new key and name it System. Under this new key, system we can create the following new DWORD values(1 for enabling the particular option and 0 for disabling the particular option):

  • NODispCPL: Hides Control Panel

  • NoDispBackgroundPage: Hides Background page.

  • NoDispScrsavPage: Hides Screen Saver Page

  • NoDispAppearancePage: Hides Appearance Page

  • NoDispSettingsPage: Hides Settings Page

  • NoSecCPL: Disables Password Control Panel

  • NoPwdPage: Hides Password Change Page

  • NoAdminPaqe: Hides Remote Administration Page

  • NoProfilePage: Hides User Profiles Page

  • NoDevMgrPage: Hides Device Manager Page

  • NoConfigPage: Hides Hardware Profiles Page

  • NoFileSysPage: Hides File System Button

  • NoVirtMemPage: Hides Virtual Memory Button
Similarly, if we create a new subkey named WinOldApp, we can add the following DWORD values under it(1 for enabling the particular option and 0 for disabling the particular option):

Disabled: Disable MS-DOS Prompt

NoRealMode: Disable Single-Mode MS-DOS.

Sunday, October 19, 2008

How 2 find a Remote IP ?

Method 1

To view someone's IP# when they send you hotmail email do this:
1) Click "Options" on the upper right side of the page.
2) On the left side of the page, Click "Mail"
3) Click "Mail Display Settings"
4) Under "Message Headers" select "Full" or "Advanced"
5) Click ok

Method 2
reg a dydns account and install the ip pointer, so each time you ping the host name you regestored

for example:
you regestor the host name myhost.dydns.com, then you keep a little software running on the target host. The little software will keep update your IP to dydns.com server.

so at your pc just start cmd, and ping myhost.dydns.com, it will give you the most updated ip address.

Method 3
neverender, what doesn't work for you? Simply type in nc -vvv -l -p 80 on your box, which will set it to listen in verbose mode on port 80. Then give them a link to your IP address (for example: 111.111.111.11) and tell them to type it in their browser. The browser should resolve the address as well as append port 80 automatically. Just make sure that your friend is not very computer literate.

Method 4
Just download a very simple server such as this one and install it on your comp. Then run it and give your ip to the person you want and tell them to connect to it through a browser. Your server will log their connection and you will get their IP.

link:http://www.download.com/Abyss-Web-Server/3000-2165-10283992.html?tag=lst-0-6

Other Ways
-www.imchaos.com and make a "spy poll" to put in ur profile, this will tell u the IP of anybody who answers ur poll
-originalicons.com there is a page for doin it (i dont like it, but it works)
-or irc

Here is a more detailed tutorial about using NetCat.

http://www.onlamp.com/pub/a/onlamp/2003/05/29/netcat.html

Windows users can download NetCat from here:

http://www.atstake.com/research/tools/network_utilities/

How to Backup PS2 Games ?

INFO: Text didn't write by me!

Okay, these are some methods to backup PS2 titles and Xbox titles, in order to play a backup you need a modchip of some sort, I have also included a tutorial on boot methods. Follow any one of these instructions to fit your needs. You can tell what format the PS2 title is by looking at the written side of the disc, DVD's are Silver and CD's are Purple. The DVD backup methods here consist of reading the image to the hard drive then burning it to the media for an easier backup, this depends on your hardware and it?s setup. I say that because the proper setup would be to have the Reader and Writer on separate IDE cables. This allows no cross information when doing Disc to Disc/On the fly copying. But, since most people would not know how to check or fix this, I suggest reading the image to your Hard Drive and then burning from there. *A little useful trick*, If the DVD backup "image" is small enough in size you can fit it onto a CD-R (80 minute or larger if need be) instead of using a more expensive DVD-R. I have done this succesfully using Prassi and the first tutorial for it below. In addition a DVD Movie backup will play on a PS2/Xbox without a chip. As I get more info I will update. Dexter


PS1/PS2 CD backup tutorials


Using CloneCD (v4.x.xx) for PS1/PS2

1. Start CloneCD
2. Select "Copy CD"
3. Select your Reader, press Next
4. Select "Game CD", press Next
5. Select/Deselect your options here (on the fly, cue or delete) then press Next
6. Select your Writer, press Next
7. Select your burn speed and "Game CD"
8. Press "OK" to begin


Using Alcohol 120% for PS1/PS2

1. Start Alcohol 120%
2. Select ?Copy Wizard?
3. Select your Reader & Read Speed
4. Select or Deselect ?Copy current disc on the fly?
5. For Datatype select which console PS1 or PS2, press Next
6. Select your Image location and Name for it, press Next
7. Select you Writer, Write Speed and anything else you feel you might need
8. Make sure the Datatype selected is the same you chose above
9. Press Start to begin


PS2 DVD backup tutorials


Using Prassi

1. Start Primo
2. Select "go to full application"
3. Right Click the drive that has your original in it
4. Select "build global image" and choose a path for the image (preferably on an NTFS opsys)
5. After the image is extracted go to next step
6. Choose the 3rd disc icon from the left *or* click file, new job, Global/Other Image
7. Then just burn the .gi (global image) of the game


This next way has one less step which saves some time because once you press record it does everything by itself (if you have a DVD reader and DVD Writer)

1. Start Primo
2. Use the "PrimoDVD Starter" (it's easier, and less confusing)
3. Choose "disc copy"
4. Select your Reader and Also your Writer
5. Select "make a temp image on HD..."
6. Select your burn speed and then record to begin


Using Nero

1. Start Nero, Use the Wizard (for easy use)
2. Select "DVD" then select Next
3. Select "Copy a DVD" then select Next
4. Select your source drive
5. Check OFF "copy on the fly" then select next
6. Select your write speed
7. Select either "Test", "Test and Burn" or "Burn"
8. Press "Burn" to begin

This next way is without the Wizard

1. Start Nero, and select "File" then "New..."
2. On upper left side of the window from the drop down menu select "DVD"
3. Select "DVD Copy" Icon
4. Select "Copy options" tab
5. Check OFF "copy on the fly"
6. Select source drive and read speed
7. If needed Select "Image" tab to choose image directory and select/deselect "delete image..."
8. Select "Burn" tab and choose your settings
9. Press "Copy" to begin


Using Alcohol 120%

1. Start Alcohol 120%
2. Select ?Copy Wizard?
3. Select your Reader
4. For ?Separate Image file every:? choose ?Never Separate?
5. Select or Deselect ?Copy current disc on the fly?, press Next
6. Select your Image location and Name for it, press Next
7. Select you Writer, Write Speed and anything else you feel you might need
8. Select or Deselect ?Delete image file after recording?
9. Press Start to begin


XBOX backup tutorials


Xbox original games are burned from the outside in. The only way to backup a title is to have a modchip like X-exuter (best), Enigma, or Xodus/Matrix. You also have to flash the bios and have a CD program inserted or installed into the X-Box named EVO-X (this allows you to assign the X-Box an IP address). The game has to be stored on the X-Box's HD, this allows you to file transfer the title to your PC using an ftp program like FlaxhFXP (best) or similar. From there you use a burning application to make the backup. Some applications allows you to "drag & drop" right from the Xbox or you can build an ISO of the image then burn to CD-R/W or DVD-R/W backup. (I will update this to show steps as soon as I have a minute)


Modded PS2 with or without Action Replay/GameShark CD & DVD backup booting methods

PS2 with NeoKey/Sbox & AR/GS, PS1 CD backup booting

1. Turn on PS2 and NeoKey/Sbox
2. Press Eject
3. Insert PS1 CD backup
4. Press reset
5. PS2 tray will close
6. PS1 CD backup will now boot


PS2 with NeoKey/Sbox & AR/GS, PS2 CD backup booting

1. Have AR/GS dongle in a memory card slot
2. Power on your PS2
3. Insert AR/GS disc
4. At the AR/GS menu, select Start Game, With/Without codes
5. Eject and swap to your PS2 CD backup and press X.
6. Screen will change and game will now boot

* Note - Neokey will not play DVD-R!
* Note - Old versions of AR2/GS2 you might need to press R1+O instead of X to boot games


PS2 with Neo 2.2, PS1 CD backup booting

1. Turn on PS2
2. Press Eject
3. Insert PS1 CD backup
4. Press reset
5. PS2 tray will close
6. PS1 CD backup will now boot


PS2 with Neo 2.2 & AR/GS, PS2 CD backup booting

1. Have AR/GS dongle in a memory card slot
2. Power on your PS2
3. Insert AR/GS disc
4. At the AR/GS menu, select Start Game, With/Without codes
5. Eject and swap to your PS2 CD backup and press X.
6. Screen will change and game will now boot


PS2 with Neo 2.2 & AR/GS, PS2 DVD backup booting

1. Have AR/GS dongle in a memory card slot
2. Power on your PS2
3. Insert AR/GS disc, close tray
4. Power off your PS2, wait a few seconds
5. Press and Hold Reset button to load AR/GS
6. At the AR2/GS2 menu, press EJECT while still holding Reset
7. Swap AR/GS disc for an Original-TOC-DVD* and wait 10 seconds
8. Select "AR/GS Codes"
9. Highlight "Add new code" and press X to get to the next screen
10. Press X three times. You will see "Updating code list please wait" each time)
11. Press "Start" on controller
12. Select "Without codes", press X
13. Then Press X again, and immediately release the Reset button, you will see "Updating code list please wait"
14. The PS2 tray will eject allowing you to swap Original-TOC-DVD* for DVD backup and then close on it?s own
15. Screen will change and game will now boot

* Note - "Original-TOC-DVD" is an original DVD that is a larger file size than the backup
* Note ? For a shortcut make a few ?Add new codes? and after step 8 just highlight one of them and press square to delete it, then proceed on with step 11

PS2 with Messiah

1. PSX Backups will boot directly.
2. PS2 CD-R Backups will boot directly.
3. PS2 Unpatched EA backups will boot directly.
4. PS2 DVD-R Backups will boot directly.


PS2 with Magic 2, 3 or 3.5

1. PSX Backups will boot directly.
2. PS2 CD-R Backups will boot directly.
3. PS2 Unpatched EA backups will boot directly.
4. PS2 DVD-R Backups will boot directly.


Ps2 with Apple Mod

1. PSX Backups will boot directly.
2. PS2 CD-R Backups will boot directly.
3. PS2 Unpatched EA backups will boot directly.
4. PS2 DVD-R Backups will boot directly.[CODE]

How Long Has Your System Been Running?

Here's how you verify system uptime:

Click Start | Run and type cmd to open a command prompt.
At the prompt, type systeminfo

Scroll down the list of information to the line that says System Up Time.

This will tell you in days, hours, minutes and seconds how long the system has been up.

Note that this command only works in XP Pro, not in XP Home. You can, however, type net statistics workstation at the prompt in Home. The first line will tell you the day and time that the system came online.

How do I Test My VirusScan Installation?

Description

After installing VirusScan, you may logically wonder, how do I know if it's working? The answer is a test virus. The EICAR Standard AntiVirus Test File is a combined effort by anti-virus vendors throughout the world to implement one standard by which customers can verify their anti-virus installations.

Solution

To test your installation, copy the following line into its own file, then save the file with the name EICAR.COM. More detailed instructions are found below.

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

The file size will be 68 or 70 bytes.

If VirusScan is running and configured correctly, when you try to save the file, VirusScan will detect the virus. If VirusScan is not running, start it and scan the directory that contains EICAR.COM. When your software scans this file, it will report finding the EICAR test file.

Note that this file is NOT A VIRUS. Delete the file when you have finished testing your installation to avoid alarming unsuspecting
users.

The eicar test virus is available for download from the following website:
http://www.eicar.org/download/eicar.com

Creating Eicar.com

1. Click on Start.
2. Select Run.
3. In the Open box type: notepad
4. Maximize the window.
5. Highlight the following on the following line of text:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
6. Right click on the highlighted text and choose 'copy'.
7. Switch back to Notepad.
8. Right click anywhere inside of Notepad and select 'paste'.
9. Click the File menu and select 'save as'.
10. Change the 'Save as Type' to 'all files'.
11. Name the file eicar.com.

Get in windows 2000 as Administrator.

> NOTE: Requires a boot disk.
>
> Get the command prompt and go to C:\winnt\sytem32\config\ and do
the following commands:
> attrib -a -r -h
> copy sam.* a:\
> del Sam.*
>
> reboot the computer. there should be no administrator password.
just put in administrator and hit enter. replace the sam files to
restore the password to hide intrusion.

This was originally posted by andro11meda in Hardware and Networking Support. It worked so well for me on a problem-computer that I was working on that I had to post it in tutorials. Thanks andro11meda!!

This is my favorite way to wipe it clean:

1. Create a MSDOS bood disk with Debug

2. At DOS command prompt type the following: Debug[Enter] (Where enter is to press the enter key once)

NOTE: Type the following bolded text only. You will recieve an error if you type anything other than the bold text. The non-bolded text represents what will appear on you screen once you press [Enter] after each command.

-F 200 L1000 0 [Enter]
-A CS:100 [Enter]
xxxx:0100 MOV AX,301 [Enter]
xxxx:0103 MOV BX,200 [Enter]
xxxx:0106 MOV CX,1 [Enter]
xxxx:0109 MOV DX,80 [Enter]

NOTE: ( --- "80" for hd0, "81" for hd1)

xxxx:010c INT 13 [Enter]
xxxx: 010e INT 20 [Enter]
xxxx: 0110 [Enter]

-G [Enter]
"Program terminated normally"

3. Turn off the computer. On the next startup the hard drive will need to be partitioned and formatted.

CAUTION: This debug script is for advanced users only. Its Purpose is to remove all formatting and partitioning information from your hard disk when FDISK is unable to do so. THIS WILL REMOVE ALL DATA AND PROGRAMS FORM THE DRIVE.

DVD Regions Information

The DVD region code identifies a DVD's compatibility with the players typically sold in a particular region.

The following graphic shows the approximate location of each region.

Image

Region 0 (or "region free") is compatible with DVD players from any region.

The majority of all current titles play only in one specific region unless otherwise noted. DVDs sold by Amazon.co.uk are encoded for Region 2 or Region 0. Region 2 DVDs may not work on DVD players in other countries.

Region 1 DVDs sold by Marketplace sellers

Region 1 discs are intended for use with standard DVD players in North America (Canada and the USA). In most instances they can also be played on compatible "multi-region" DVD players (also known as "chipped" or "region-free" players).

They also require an NTSC-compatible television. NTSC is the standard picture format in North America, and differs from the PAL format adopted in Britain and Europe. Region 1 DVDs are usually presented in NTSC format, so you should ensure that your TV is capable of reading the NTSC signal before purchasing Region 1 DVDs.

Regional Coding Enhancement (RCE)

Regional Coding Enhancement (RCE) has been added by some film studios (specifically Warner and Columbia) to selected Region 1 DVDs, with the intention of preventing these discs from playing on some multi-region DVD players. We are therefore unable to guarantee that all Region 1 discs will be compatible with all multi-region players.

Global DVD region countries

This is not a definitive list and is intended only as a guide.

Region 1 - US, US Territories and Canada

American Samoa, Canada, Guam, Palau, Mariana Islands, Marshall Islands, Puerto Rico, Micronesia, United States, U.S. Virgin Islands


Region 2 - UK, Europe, Japan, South Africa and Middle East

Albania, Andorra, Austria, Bahrain, Belgium, Bosnia and Herzegovina, Bulgaria, Croatia, Czech Republic, Denmark, Egypt, Finland, France, Germany, Gibraltar, Greece, Greenland, Hungary, Iceland, Iran, Iraq, Ireland, Israel, Italy, Japan, Jordan, Kuwait, Lebanon, Liechtenstein, Luxembourg, Macedonia, Malta, Moldova, Monaco, Netherlands, Norway, Oman, Poland, Portugal, Qatar, Romania, San Marino, Saudi Arabia, Slovakia, Slovenia, South Africa, Spain, Sweden, Switzerland, Syria, United Arab Emirates, United Kingdom, Vatican City, Yemen, Yugoslavia

Region 3 - Southeast and East Asia

Cambodia, Hong Kong, Indonesia, Laos, Malaysia, Myanmar, Phillipines, South Korea, Taiwan, Thailand, Vietnam

Region 4 - Australia, New Zealand, Central and South America

Antigua, Argentina, Aruba, Australia, Bahamas, Barbados, Barbuda, Belize, Bolivia, Brazil, Chile, Colombia, Costa Rica, Cuba, Dominica, Dominican Republic, Ecuador, El Salvador, Falkland Islands, French Guiana, Grenada, Guatemala, Guyana, Haiti, Honduras, Jamaica, Mexico, New Guinea, New Zealand, Nicaragua, Panama, Paraguay, Peru, Suriname, Trinidad, Tobago, Uruguay

Region 5 - Former Soviet Union, Indian sub-continent, Africa, North Korea and Mongolia

Afghanistan, Algeria, Angola, Bangladesh, Belarus, Benin, Botswana, Burkina Faso, Burundi, Cameroon, Cape Verde, Central African Republic, Chad, Comoros, Congo, Djibouti, Equatorial Guinea, Eritrea, Estonia, Ethiopia, Gabon, Gambia, Georgia, Ghana, Guinea, Guinea-Bissau, India, Ivory Coast, Kazakhstan, Kenya, Latvia, Lesotho, Liberia, Libya, Lithuania, Madagascar, Malawi, Mali, Mauritania, Mauritius, Mongolia, Morocco, Mozambique, Namibia, Niger, Nigeria, North Korea, Pakistan, Russia, Rwanda, Sao Tome and Principe, Senegal, Seychelles, Sierra Leone, Somalia, Sri Lanka, St. Helena, Sudan, Tanzania, Togo, Tunisia, Turkmenistan, Uganda, Ukraine, Uzbekistan, Zambia, Zimbabwe

Region 6 - China

China

Region 7 - Reserved for future use

Region 8 - International Territories (ships, planes, etc)

Delete An "undeletable" File

Open a Command Prompt window and leave it open.
Close all open programs.
Click Start, Run and enter TASKMGR.EXE
Go to the Processes tab and End Process on Explorer.exe.
Leave Task Manager open.
Go back to the Command Prompt window and change to the directory the AVI (or other undeletable file) is located in.
At the command prompt type DEL where is the file you wish to delete.
Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the GUI shell.
Close Task Manager.

Or you can try this

Open Notepad.exe

Click File>Save As..>

locate the folder where ur undeletable file is

Choose 'All files' from the file type box

click once on the file u wanna delete so its name appears in the 'filename' box

put a " at the start and end of the filename
(the filename should have the extension of the undeletable file so it will overwrite it)

click save,

It should ask u to overwrite the existing file, choose yes and u can delete it as normal

Here's a manual way of doing it. I'll take this off once you put into your first post zain.

1. Start
2. Run
3. Type: command
4. To move into a directory type: cd c:\*** (The stars stand for your folder)
5. If you cannot access the folder because it has spaces for example Program Files or Kazaa Lite folder you have to do the following. instead of typing in the full folder name only take the first 6 letters then put a ~ and then 1 without spaces. Example: cd c:\progra~1\kazaal~1
6. Once your in the folder the non-deletable file it in type in dir - a list will come up with everything inside.
7. Now to delete the file type in del ***.bmp, txt, jpg, avi, etc... And if the file name has spaces you would use the special 1st 6 letters followed by a ~ and a 1 rule. Example: if your file name was bad file.bmp you would type once in the specific folder thorugh command, del badfil~1.bmp and your file should be gone. Make sure to type in the correct extension.

BIOS Update Procedure

All latest Motherboards today, 486/ Pentium / Pentium Pro etc.,ensure that upgrades are easily obtained by incorporating the system BIOS in a FLASH Memory component. With FLASH BIOS, there is no need to replace an EPROM component. Once downloaded, the upgrade utility fits on a floppy disc allowing the user to save, verify and update the system BIOS. A hard drive or a network drive can also be used to run the newer upgrade utilities. However, memory managers can not be installed while upgrading.

Most pre-Pentium motherboards do not have a Flash BIOS. The following instructions therefore do not apply to these boards. If your motherboard does not have a Flash BIOS (EEPROM) you will need to use an EPROM programmer to re-program the BIOS chip. See your dealer for more information about this.

Please read the following instructions in full before starting a Flash BIOS upgrade:
A. Create a Bootable Floppy (in DOS)

•With a non-formatted disk, type the following:

format a:/s

•If using a formatted disk, type:

sys a:

This procedure will ensure a clean boot when you are flashing the new BIOS.

B. Download the BIOS file

•Download the correct BIOS file by clicking on the file name of the BIOS file you wish to download.

•Save the BIOS file and the Flash Utility file in the boot disk you have created. Unzip the BIOS file and the flash utility file. If you don't have an "unzip" utility, download the WinZip for Windows 95 shareware/ evaluation copy for that one time use from _www.winzip.com or _www.pkware.com. Most CD ROMs found in computer magazines, have a shareware version of WinZip on them.

•You should have extracted two files:

Flash BIOS utility eg: flash7265.exe (for example)

BIOS eg: 6152J900.bin (example)

Use the latest flash utility available unless otherwise specified (either on the BIOS update page or in the archive file). This information is usually provided.

C. Upgrade the System BIOS

During boot up, write down the old BIOS version because you will need to use it for the BIOS backup file name.

Place the bootable floppy disk containing the BIOS file and the Flash Utility in drive a, and reboot the system in MS-DOS, preferably Version 6.22

•At the A:> prompt, type the corresponding Flash BIOS utility and the BIOS file with its extension.

For example:

flash625 615j900.bin

•From the Flash Memory Writer menu, select "Y" to "Do you want to save BIOS?" if you want to save (back up) your current BIOS (strongly recommended), then type the name of your current BIOS and its extension after FILE NAME TO SAVE: eg: a:\613J900.bin

Alternatively select "N" if you don't want to save your current BIOS. Beware, though, that you won't be able to recover from a possible failure.

•Select "Y" to "Are you sure to program?"

•Wait until it displays "Message: Power Off or Reset the system"

Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system. If you write to BIOS but cannot complete the procedure, do not switch off, because the computer will not be able to boo, and you will not be given another chance to flash. In this case leave your system on until you resolve the problem (flashing BIOS with old file is a possible solution, provided you've made a backup before)

Make sure the new BIOS version has been loaded properly by taking note of the BIOS identifier as the system is rebooting.

For AMI BIOS
Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system holding the "END" key prior to power on until you enter CMOS setup. If you do not do this the first time booting up after upgrading the BIOS, the system will hang.

BIOS Update Tips
note:
1.Make sure never to turn off or reset your computer during the flash process. This will corrupt the BIOS data. We also recommend that you make a copy of your current BIOS on the bootable floppy so you can reflash it if you need to. (This option is not available when flashing an AMI BIOS).

2. If you have problems installing your new BIOS please check the following:

Have you done a clean boot?
In other words, did you follow the above procedure for making a bootable floppy? This ensures that when booting from "A" there are no device drivers on the diskette. Failing to do a clean boot is the most common cause for getting a "Memory Insufficient" error message when attempting to flash a BIOS.

If you have not used a bootable floppy, insure a clean boot either by

a) pressing F5 during bootup

b) by removing all device drivers on the CONFIG.SYS including the HIMEM.SYS. Do this by using the EDIT command.

Have you booted up under DOS?
Booting in Windows is another common cause for getting a "Memory Insufficient" error message when attempting to flash a BIOS. Make sure to boot up to DOS with a minimum set of drivers. Important: Booting in DOS does not mean selecting "Restart computer in MS-DOS Mode" from Windows98/95 shutdown menu or going to Prompt mode in WindowsNT, but rather following the above procedure (format a: /s and rebooting from a:\).

Have you entered the full file name of the flash utility and the BIOS plus its extension?
Do not forget that often you will need to add a drive letter (a:\) before flashing the BIOS. Example: when asked for file name of new BIOS file which is on your floppy disk, in case you're working from c:\ your will need to type a:\615j900.bin, rather than 615j900.bin only.

Note : Your Computer may not work if the above said procedures has not been followed correctly & its risky job to upgrade your BIOS............. So.................. Plz... try this on your own risk.......... I cannot be held responsible for any loss, damages caused.

Burn .bin file Without A .cue file

You do exactly the same as for iso files, but when you click on “burn image,” you don’t browse to the bin itself, but instead to the cue file, and you open that one.
When the writer starts to burn, it will automatically search for the bin file and start burning it. In fact, the cue file tells the burning program where it can find the bin file that is attached to it. It is VERY IMPORTANT that you use the right cue file when you burn a bin. i.e both cue and bin files that are attached to each other must be located in the same folder, and every bin file has it’s own cue file.


Normally, when you download a bin file, you can download the appropriate cue file as well. If you do not have the cue file (or feel bold) you can make the cue file yourself, which is really easy to do:

a. Open notepad

b. Copy the folowing text into notepad:

FILE“nameofimage“BINARY
TRACK 01 MODE1/2352
INDEX 01 00:00:00

Where nameofimage.bin is the name of the bin file you want ot burn.

c. The rest is easy: just save the notepad text with the name of the bin, but with the cue extension.

d. The file should be saved in the same folder as its appropriate bin file and should be something like myfile.cue

Or you can use Alcohol 120% to burn directly from the bin file

Thursday, October 9, 2008

How to Send a Free Fax from the Web

FAX means making a similar copy is a technology used to transfer duplicate copies of information over the telephonic network. The advantage of FAX is that you can send a copy of your important document almost instantly rather than sending a copy via courier though you are able to just send in a duplicate copy and this can lead to lower quality.

Send FAX Free

FaxZero Send Free FAXGenerally many people dont own a Fax machine to send a FAX and they keep searching for optional services using which they can send a FAX. Sending Fax online is generally not a free service and you need to signup with companies who charge you for signing up a trial account. One of the best website which really offers a free FAX sending service is FaxZero which allows you to send FAX to any Fax machine in US and Canada. To start up you just need a computer and a email address to signup with FaxZero.

Send Fax Machine

FaxZero does offer you with a Free FAX sending service but the final FAX would be add supported on the cover page with a maximum of sending 2 FAX/day and if you want to increase this sending limit you need to make a payment of 1.99USD/FAX sent under the premium FAX Services. Just fill up the FAX form, confirm the details with your valid email address, type/attach your file for sending and click on Send Free Fax Now button.

How to Check Latest Google Page Rank without any Tools

Google has again updated their toolbar page rank which was already announced by mattcutts yesterday and i can find that there was a small drop on the homepage of this blog which dropped from PR5 to PR4 but well all the new sections like Career Guides, Apple Blog, Auto News etc recieved some Page Rank which is better than the unranked position because they were recently started.

You cannot directly find the updated page rank on your toolbar because it takes time for the datacenter to be updated and it can take from 24 hours to couple days but here is a small trick which a friend Sharat Jaswal gave me a neat 1 minute trick to make sure you can instantly start viewing the updated page rank on your Google Toolbar.

Click on Start > Run > C:\WINDOWS\system32\drivers\etc

Computer Run Query

Now you will be redirected to a windows directory named ‘etc’ with some files within it and you need to select the file called ‘hosts’ and open it in notepad.

Hosts File Open

You need to make sure that you open this file ‘Hosts’ in Notepad and add this following line at the end of the file which is generally below your local host ip.

209.85.173.147 toolbarqueries.google.com

Once you add the above link, save the ‘hosts’ file and restart your browser, and there you go with the latest Page Rank being shown on your toolbar. Now you dont need any page rank checker tools or scripts to check out the latest page rank because the above mentioned tricks works out 100 perfectly. Let me know if you get any problems in getting this thing done.

How to Convert VHS to DVD

VHS format has become obsolete in today’s world. Irrespective of whether you like it or not, it is high time to change. There are lots of professional services in the market today which would do it for you. In this article I am going to describe two simple ways through which you can do it by yourself and save your old VHS memories to the new DVD way.

Recording with a DVD Recorder is the most convenient thing to do as it does not even require a computer to do this job. DVD recorders have the capability to record form almost anything. They can even record your cable TV. They offer a lot of advantages like not needing a PC to do all the conversion. They come at a hefty price of about 210$. Some DVD recorders have too may functions confusing the user to the core.

VHS to DVD Conversion

Now, let me tell you how to convert VHS Recoding to DVD step by step

  • 1. Connect your VHS video source to the DVD recorder. Always use the S-video cable, if you don’t have one, go out and buy one from your nearby electronic store. Consult your recorder’s manual if any doubts arise.
  • 2. Use a standard DVD disc. Initially use a blank DVD-RW disk so that after 5 to minutes of recording, you can check the quality and then make the necessary changes to improve your video quality.
  • 3. First check the preview. Do this by setting up your recorder. Press record and pause.
  • 4. You need to align the VHS tape to the beginning and check the DVD Recorder’s input. This is a vital step for correct recording. If you don’t set this right, you will end up with inferior low quality recording. Just ensure that you follow these steps to the optimum.
  • 5. Start the recording feature in the DVD Recorder and simultaneously start playing the VHS source. There is nothing wrong in having a blank recording on DVD for the initial – 10 seconds. Synchronize both of them properly or you may have a recording with 5-10 seconds of beginning scenes missing. Take some extra care at this time.
  • 6. You do know that DVD has a bigger storage capability than your conventional VHS. So after a period of time pause your recorder and insert your next part or the next tape. Do not move away while recording or you may end up with many minutes of static recording on your DVD. Or set up a timer to remind you on when to change your tapes.
  • 7. Once your recording is over, it is not like VHS. You just simply cannot rewind and play it. You need to finalize. Before starting this process read your manual again and follow the rules. You can create chapters and all you need is to find the right spot on your recording and press a single button. Creating such chapters would help you to understand what you recorded in a better way. Different recordings would show as different titles. Once you complete the management of the content, the recorder would take care of the next few steps and you are done with all the conversion.
  • The only constant thing in the world I change. VHS may become extinct in less than 2 years. None is using it. If you want your next generation to look into the tapes you loved, it is better to convert them right away. There may be some problems while converting. It is definitely worth going that extra step to save a lot of headaches in the future. You need to make a lot of trial and error runs, to get it right. Once you set it right, converting is indeed a breeze.