What is your japanese name? Take each letter of your name and substitute it with the Japanese sound to the right of the letter. Names might be kinda long.
A- ka * B- tu * C- mi * D- te * E- ku * F- lu * G- ji
H- ri * I- ki * J- zu * K- me * L- ta * M- rin *
N- to O-mo * P- no * Q- ke * R- shi * S- ari * T-chi U- do *
V- ru * W-mei * X- na * Y- fu * Z- zi
My name is Terikatokatukata
Spell Your Name In Japanese
10 reasons computers crash, and how to fix them
"Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."
You have just been struck by the Blue Screen of Death. Anyone who uses Micr@s@ft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?
1 Hardware conflict
The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.
For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.
If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:
* Start-Settings-Control Panel-System-Device Manager.
Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.
Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.
Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).
When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.
To be fair to Micr@s@ft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.
2 Bad Ram
Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.
But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.
One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.
Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.
EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.
3 BIOS settings
Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.
Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.
A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.
Micr@s@ft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).
4 Hard disk drives
After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to
* Start-Programs-Accessories-System Tools-Disk Defragmenter
This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.
The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).
Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to
* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.
Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.
Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to
* Start-Programs-Accessories-System Tools-ScanDisk
Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.
5 Fatal OE exceptions and VXD errors
Fatal OE exception errors and VXD errors are often caused by video card problems.
These can often be resolved easily by reducing the resolution of the video display. Go to
* Start-Settings-Control Panel-Display-Settings
Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.
If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to
* Start-Settings-Control Panel-System-Device Manager
Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.
If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.
The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.
Another useful way to resolve video problems is to go to
* Start-Settings-Control Panel-System-Performance-Graphics
Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).
Look up your video card's manufacturer on the internet and search for the most recent drivers for it.
6 Viruses
Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to
* Start-Settings-Control Panel-Add/Remove Programs
Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.
A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.
An excellent antivirus programme is Mc@fee VirusScan by Network Associates ( www.nai.com). Another is N0rt0n AntiVirus 2000, made by Symantec ( www.symantec.com).
7 Printers
The action of sending a document to print creates a bigger file, often called a postscript file.
Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.
If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.
8 Software
A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use N0rt0n Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.
The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.
Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org
Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.
Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.
Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.
Remember to restore all the BIOS settings back to their former settings following installation.
9 Overheating
Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.
One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com
CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.
10 Power supply problems
With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.
If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.
It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost
Open A Computer Within 10sec.
Aite Click on the start button then press R it will take u to Run well go to run
n type Regedit
press enter
this will open Registery Editor
now look for the key
HKEY_LOACAL_MECHINE\SYSTEM\CurrentControlSet\Contr ol\ContentIndex
now there find the Key Called
"Startup Delay"
Double Click On It
Now where its Base
Click Decimal
Now its Default Value Is 4800000
Change The Value To 40000
here u go u have done it
now close the Registery Editor and Restart Your Computer
You'll See The Result
hope you can use this!
Learnkey - Windows 2003 Active Directory Infrastructure [5 CD]
The Windows Server 2003 Active Directory Infrastructure course from LearnKey prepares you with the knowledge and skills needed to plan, implement, and maintain a Windows Server 2003 Active Directory Infrastructure. Expert instructor Dale Brice-Nash demonstrates how to set up and maintain Active Directory structure and topology, and how to plan and implement user, computer, and group security. At the conclusion of the course, you will understand the skills required to manage and maintain an Active Directory infrastructure within a Windows Server 2003 environment.
Benefits
???‚?? Develop your IT abilities and credibility.
???‚?? Increase your career opportunities and earning potential.
???‚?? Be prepared to pass MCP exam 70-297.
Download from Rapidshare (No Password)
CD 1 [File type: ISO | Size: 155 MB]
http://rapidshare.com/files/124669749/akhareshe.info_70-294_LearnKey_1-5.part1.rar
http://rapidshare.com/files/124674714/akhareshe.info_70-294_LearnKey_1-5.part2.rar
CD 2 [File type: ISO | Size: 142 MB]
http://rapidshare.com/files/124866161/akhareshe.info_70-294_LearnKey_2-5.part1.rar
http://rapidshare.com/files/124868509/akhareshe.info_70-294_LearnKey_2-5.part2.rar
CD 3 [File type: ISO | Size: 147 MB]
http://rapidshare.com/files/124874875/akhareshe.info_70-294_LearnKey_3-5.part1.rar
http://rapidshare.com/files/124878008/akhareshe.info_70-294_LearnKey_3-5.part2.rar
CD 4 [File type: ISO | Size: 148 MB]
http://rapidshare.com/files/124885318/akhareshe.info_70-294_LearnKey_4-5.part1.rar
http://rapidshare.com/files/124894820/akhareshe.info_70-294_LearnKey_4-5.part2.rar
CD 5 [File type: ISO | Size: 143 MB]
http://rapidshare.com/files/124926805/akhareshe.info_70-294_LearnKey_5-5.part1.rar
http://rapidshare.com/files/124930563/akhareshe.info_70-294_LearnKey_5-5.part2.rar
Password - www.area51warez.info
How To Remove and Add Right-Click Menu Items from Files and Folders
Removing Items:
A lot of programs you install will add themselves to the right-click menu of your files and/or folders. And most times, you have no choice in the matter and, as a result, your right-click menu can get very long with added items you don't even use. The last person I was helping with this had a right context menu so long that the Rename option was no longer visible!
Fortunately, you can easily remove those unwanted menu items, if you know the registry values to edit. And it's not at all difficult once you know the keys responsible for the additions.
For Files, the secret lies in the "context menu handlers" under the shellex subkey for "All Files" which, in the registry, is nothing but an asterisk - like a dos wildcard, which means the values entered apply to all files. It is at the very top of the Root key.
Right here:
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers
Click the the + sign next to the ContextMenuHandlers key, to expand it.
Now you will see some of the programs that have added items to your right-click menu. Simply delete the program keys you don't want.
Yup! It's that simple. If deleting makes you uneasy, just export the key before deleting it. Or, instead of deleting the values, disable them. Simply double click the default value for the program on the right hand pane and rename the clsid value by placing a period or dash in front of it.
ie; - {b5eedee0-c06e-11cf-8c56-444553540000}
Then exit the registry, refresh, and right click a file to see if the item was removed from the menu.
Some programs - like WinZip or WinRar - will add several items to your right click menu but all of them will be removed by deleting or disabling their one context menu handler.
Note that the above key only applies to the right click menu of files.
To remove entries from the right click context menu of folders.
You need to navigate to the Folder and Drive keys:
HKEY_CLASSES_ROOT\Folder\shellex\ContextMenuHandle rs
HKEY_CLASSES_ROOT\Drive\shellex\ContextMenuHandler s
All you have to do is follow the same procedure as for Files - either disable or delete items you wish to remove.
Adding Items
Adding Items to the right click menu of Files and Folders is also fairly simple using the Registry. It just involves the creation of a few new keys for each item you wish to add. You edit the same keys used for removing items. Let's use Notepad as an example of an item you'd like to add to the right click menu of all your files or folders.
For folders, go to this key:
HKEY_CLASSES_ROOT\Folder
Click the + sign next to Folder and expand it so that the Shell key is visible. Right click the Shell key and choose New>Key and name the key Notepad or whatever else you'd prefer (whatever the key is named is what will appear in the right-click menu). Now right click the new key you made and create another key named Command. Then, in the right hand pane, double click "Default" and enter Notepad.exe as the value.
Exit the registry, refresh, and right click any folder. Notepad should now be on the context menu.
For files, go here again:
HKEY_CLASSES_ROOT\*
Expand the * key and see if a Shell key exists. If it does exist, follow the same procedure as for folders. If it does not exist, you'll have to create a new Shell first. Just right click the * key and choose New>Key and name it Shell. Then right click the Shell key and continue on the same way you did for adding items to the right click menu of folders.
Once done, Notepad should appear as an option in the right click menu of all your files.
Hiren's BootCD 9.6
ll in one Dos Bootable CD which has all these utilities
Hiren's BootCD 9.6 incl. keyboard patch | ISO | Bootable | 181 MB
Changelog:
+ HDTune 2.55
+ SIW 2008-09-03
+ Active NTFS Reader Dos 1.0.2
+ 7-Zip 4.57
- F-Prot Antivirus
CPU/Video/Disk Performance Test 5.7
Ghost 11.5
GhostExp.Exe 11.5
Ghost Walker 11.5
HDD Erase 4.0
CTIA CPU Information 2.7
TestDisk 6.10
PhotoRec 6.10
IBM/Hitachi Drive Fitness Test 4.14
IBM/Hitachi Feature Tool 2.11
SeaTools for Dos 1.10
Hard Disk Sentinel 0.02
System Analyser 5.3u
Navratil Software System Information 0.60.32
Astra 5.40
HWiNFO 5.2.2
Drive SnapShot 1.39
Recuva 1.19.350
Restoration 3.2.13
Unstoppable Copier 3.56
HDD Scan 3.1
Express Burn 4.15
JkDefrag 3.36
Process Explorer 11.21
Unlocker 1.8.7
Silent Runners Revision 58
AutoRuns 9.34
CurrPorts 1.50
CPU-Z 1.47
SmitFraudFix 2.354
CCleaner 2.12.651
ProduKey 1.32
WirelessKeyView 1.18
ShellExView 1.23
PC Wizard 2008.1.86
Spybot - Search & Destroy 1.6 (2909)
SpywareBlaster 4.1(2909)
PCI 32 Sniffer 1.4 (2909)
McAfee Antivirus 4.4.50 (2909)
Ad-Aware SE Personal 1.06 (2909)
PCI and AGP info Tool (2909)
Unknown Devices 1.2 (2909)
http://rs77cg.rapidshare.com/files/150069318/Hirens.BootCD.9.6.with.keyboardpatch-MaxT.dk.zip
Longman Student Grammar of Spoken and Written English Workbook
Author: Susan Conrad, Douglas Biber & Geoffrey Leech
Publisher: Longman
File type: PDF
The Longman Student Grammar of Spoken and Written English Workbook gives advanced students of English the practice and tools needed to analyze everyday language. It is linked by direct cross-references to the Longman Student Grammar of Spoken and Written English-the pedagogical coursebook that examines grammatical structure and the how, when, and why of English as it is really used.
- invaluable for students on university and teacher-training courses
- checks your knowledge of how English is actually used in speech and writing
- shows how grammar differs in different contexts or registers
- provides practice with relationships between grammar and vocabulary
- all examples taken from naturally occurring English texts and conversations
- comparisons between British English and American English
- spoken and written extracts throughout
DOWNLOAD:
---original size (14 MB in ZIP)
http://rapidshare.com/files/124747807/lsgswewk.zip.html
or
http://www.zshare.net/download/1413822945e2a6b7/
!!!ALERT!!! Microsoft to check your PC every month!!!
Microsoft has taken authentication of the Microsoft Validation to a whole new level. Starting now, they will be checking your operating system every month. Now, I'm not saying this development is bad or good. I'm just wondering what impact this has on our daily lives. Ever since I received an email stating this new policy I've been wondering why Microsoft felt the need to validate each copy of Windows every month and have come up with a couple of reasons why...
First, I'm sure that each month they uncover more and more previously activated Product Key's and therefore as they find out about them, they deactivate the key codes that look like they're pirated. What this means to you is that you need to be vigilant to follow Microsoft's license agreement and only have one computer running one license at a time. If you have two computers and activated the second computer by calling Microsoft to get around the online activation failure, they will be able to detect that 2 different computers are running off of one license and shut both down. There go any critical updates and extras you would otherwise get by staying legal.
Second, it gives Microsoft the opportunity to poll your hardware configuration each month. This allows them not only to see if your license is running on different computers but also gives them a general idea of what Windows users use hardware-wise. They'll know when you change video cards, motherboards, CPUs, add memory, etc. Is this a big deal? That's not for me to say. I don't mind but I'm sure there are people who would mind. With this information they can aggregate the data and sell it to companies who use that type of information and/or build new software programs that can take advantage of new hardware once they know there is a greater number of users who can run the new software, thus optimizing their ability to sell software.
One of the potential impacts I see is bandwidth. If Microsoft is checking every Windows user every month then that is however many millions of checks that get sent to Redmond, WA. Doing it once per install is one thing but now this number of checks gets multiplied by 12. Could have an impact on their bottom line at the very least, and they'll of course pass this cost on to it's customers...meaning a higher cost of software in the future.
Turn off Indexing to speed up XP
Windows XP keeps a record of all files on the hard disk so when you do a search on the hard drive it is faster. There is a downside to this and because the computer has to index all files, it will slow down normal file commands like open, close, etc. If you do not do a whole lot of searches on your hard drive then I suggest turnning this feature off:
1. Control Panel
2. Administrative Tools
3. Services
4. Disable Indexing Services
Top 15 Ways to Extend Your Laptop??™s Battery Life
1. Defrag regularly - The faster your hard drive does its work - less demand you are going to put on the hard drive and your battery. Make your hard drive as efficient as possible by defragging it regularly. (but not while it??™s on battery of course!) Mac OSX is better built to handle fragmentation so it may not be very applicable for Apple systems.
2. Dim your screen - Most laptops come with the ability to dim your laptop screen. Some even come with ways to modify CPU and cooling performance. Cut them down to the lowest level you can tolerate to squeeze out some extra battery juice.
3. Cut down on programs running in the background. Itunes, Desktop Search, etc. All these add to the CPU load and cut down battery life. Shut down everything that isn??™t crucial when you??™re on battery.
4. Cut down external devices - USB devices (including your mouse) & WiFi drain down your laptop battery. Remove or shut them down when not in use. It goes without saying that charging other devices (like your iPod) with your laptop when on battery is a surefire way of quickly wiping out the charge on your laptop battery.
5. Add more RAM - This will allow you to process more with the memory your laptop has, rather than relying on virtual memory. Virtual memory results in hard drive use, and is much less power efficient. Note that adding more RAM will consume more energy, so this is most applicable if you do need to run memory intensive programs which actually require heavy usage of virtual memory.
6. Run off a hard drive rather than CD/DVD - As power consuming as hard drives are, CD and DVD drives are worse. Even having one in the drive can be power consuming. They spin, taking power, even when they?re not actively being used. Wherever possible, try to run on virtual drives using programs like Alcohol 120% rather than optical ones.
7. Keep the battery contacts clean: Clean your battery??™s metal contacts every couple of months with a cloth moistened with rubbing alcohol. This keeps the transfer of power from your battery more efficient.
8. Take care of your battery - Exercise the Battery. Do not leave a charged battery dormant for long periods of time. Once charged, you should at least use the battery at least once every two to three weeks. Also, do not let a Li-On battery completely discharge. (Discharing is only for older batteries with memory effects)
9. Hibernate not standby - Although placing a laptop in standby mode saves some power and you can instantly resume where you left off, it doesn??™t save anywhere as much power as the hibernate function does. Hibernating a PC will actually save your PC??™s state as it is, and completely shut itself down.
10. Keep operating temperature down - Your laptop operates more efficiently when it??™s cooler. Clean out your air vents with a cloth or keyboard cleaner, or refer to some extra tips by LapTopMag.com.
11. Set up and optimize your power options - Go to ???Power Options??™ in your windows control panel and set it up so that power usage is optimized (Select the ???max battery??™ for maximum effect).
12. Don??™t multitask - Do one thing at a time when you??™re on battery. Rather than working on a spreadsheet, letting your email client run in the background and listening to your latest set of MP3??™s, set your mind to one thing only. If you don??™t you??™ll only drain out your batteries before anything gets completed!
13. Go easy on the PC demands - The more you demand from your PC. Passive activities like email and word processing consume much less power than gaming or playing a DVD. If you??™ve got a single battery charge - pick your priorities wisely.
14. Get yourself a more efficient laptop - Laptops are getting more and more efficient in nature to the point where some manufacturers are talking about all day long batteries. Picking up a newer more efficient laptop to replace an aging one is usually a quick fix.
15. Prevent the Memory Effect - If you??™re using a very old laptop, you??™ll want to prevent the ???memory effect??™ - Keep the battery healthy by fully charging and then fully discharging it at least once every two to three weeks. Exceptions to the rule are Li-Ion batteries (which most laptops have) which do not suffer from the memory effect.
Bonus Tip #1: Turn off the autosave function. MS-Word??™s and Excel??™s autosave functions are great but because they keep saving regular intervals, they work your hard driver harder than it may have to. If you plan to do this, you may want to turn it back on as the battery runs low. While it saves battery life in the beginning, you will want to make sure your work is saved when your battery dies.
Bonus Tip #2: Lower the graphics use. You can do this by changing the screen resolution and shutting off fancy graphic drivers. Graphics cards (video cards) use as much or more power today as hard disks - Thanks Andrew
Update 7/7/07: Bonus Tip #1 to give caution about turning off autosave, tip #8 to change information about discharging batteries - thanks to all who pointed it out. Added Bonus tip #2, Tip #1 to add in clause in regards to Mac OSX, Tip #1 about the spinning of hard drives - thanks to all who pointed it out
Increase DSL Speed
This tweak is for broad band cable connections on stand alone machines with WinXP professional version - might work on Home version also. It will probably work with networked machines as well but I haven??™t tried it in that configuration. This is for windows XP only, it does not work on win2000. I use 3 Com cards so I don??™t know how it works on others at this point. It does not involve editing the registry. This tweak assumes that you have let WinXP create a connection on install for your cable modem/NIC combination and that your connection has tcp/ip - QoS - file and print sharing - and client for Microsoft networks , only, installed. It also assumes that WinXP will detect your NIC and has in-box drivers for it. If it doesn??™t do not try this.
In the ???My Network Places??? properties (right click on the desktop icon and choose properties), highlight the connection then at the menu bar choose ???Advanced??? then ???Advanced Settings???. Uncheck the two boxes in the lower half for the bindings for File and Printer sharing and Client for MS networks. Click OK
1. From the windows XP cd in the support directory from the support cab, extract the file netcap.exe and place it in a directory on your hard drive or even in the root of your C: drive.
2. next, open up a command prompt window and change directories to where you put netcap.exe. then type ???netcap/????. It will list some commands that are available for netcap and a netmon driver will be installed. At the bottom you will see your adapters. You should see two of them if using a 3Com card. One will be for LAN and the other will be for WAN something or other.
3. Next type ???netcap/Remove???. This will remove the netmon driver.
4. Open up control panel / system / dev man and look at your network adapters. You should now see two of them and one will have a yellow ! on it. Right click on the one without the yellow ! and choose uninstall. YES! you are uninstalling your network adapter, continue with the uninstall. Do not restart yet.
5. Check your connection properties to make sure that no connection exists. If you get a wizard just cancel out of it.
6. Now re-start the machine.
7. After re-start go to your connection properties again and you should have a new connection called ???Local area connection 2″. Highlight the connection then at the menu bar choose ???Advanced??? then ???Advanced Settings???. Uncheck the two boxes in the lower half for the bindings for File and Printer sharing and Client for MS networks. Click OK.
8. Choose connection properties and uncheck the ???QOS??? box
9. Re-start the machine
10. After restart enjoy the increased responsiveness of IE, faster page loading, and a connection speed boost.
Why it works, it seems that windows XP, in its zeal to make sure every base is covered installs two separate versions of the NIC card. One you do not normally see in any properties. Remember the ???netcap/???? command above showing two different adapters? The LAN one is the one you see. The invisible one loads everything down and its like your running two separate cards together, sharing a connection among two cards, this method breaks this ???bond??? and allows the NIC to run un-hindered.
How to check which version your PC has
If a system has been patched in the past few months, the nine executables in Windows\System32 will either show an earlier version number, 7.0.6000.374, or the stealth patch: 7.0.6000.381. (The version numbers can be seen by right-clicking a file and choosing Properties. In XP, click the Version tab and then select File Version. In Vista, click the Details tab.)
In addition, PCs that received the update will have new executables in subfolders named 7.0.6000.381 under the following folders:
c:\Windows\System32\SoftwareDistribution\Setup\ServiceStartup\wups.dll
c:\Windows\System32\SoftwareDistribution\Setup\ServiceStartup\wups2.dll
Users can also verify whether patching occurred by checking Windows??™ Event Log:
Step 1. In XP, click Start, Run.
Step 2. Type eventvwr.msc and press Enter.
Step 3. In the tree pane on the left, select System.
Step 4. The right pane displays events and several details about them. Event types such as ???Installation??? are labeled in the Category column. ???Windows Update Agent??? is the event typically listed in the Source column for system patches.
Microsoft Outlook Shortcuts
Alt + . (period) Open the Address Book with the To field selected
Alt + A Open the Action drop-down menu
Alt + B Open the Address Book with the BCC field selected
Alt + C Select message recipients for CC field
Alt + D Switch to Daily calendar view
Alt + E Open the Edit drop-down menu
Alt + F Open the File drop-down menu
Alt + G Open the Go drop-down menu
Alt + H Open the Help drop-down menu
Alt + I Open the Find tool bar / Open the Insert drop-down menu
Alt + J Move to the Subject field
Alt + K Check names in the To, CC, or BCC field against the Address Book (cursor must be in the corresponding message header field)
Alt + L Reply All
Alt + M Switch to Monthly calendar view
Alt + N Open the Accounts drop-down menu
Alt + O Open the Format drop-down menu / Switch to Today calendar view
Alt + P Open the Message Options dialog box
Alt + R Reply / Switch to Work Week Calendar view
Alt + S Send
Alt + T Open the Tools drop-down menu
Alt + V Open the View drop-down menu
Alt + W Forward an item / Switch to Weekly calendar view
Alt + Y Switch to Daily calendar view
Ctrl + 1 Go to Mail
Ctrl + 2 Go to Calendar
Ctrl + 3 Go to Contacts
Ctrl + 4 Go to Tasks
Ctrl + 5 Go to Notes
Ctrl + 6 Go to Folder List
Ctrl + 7 Go to Shortcuts
Ctrl + 8 Go to Journal
Ctrl + A Select all
Ctrl + B Bold when editing a rich text message
Ctrl + C Copy
Ctrl + D Delete an item (message, task, contact, etc.)
Ctrl + E Activate the Find drop-down menu / Center Align when editing a rich text message
Ctrl + F Forward
Ctrl + J Open a new Journal Entry from the selected item (message, task, contact, etc.)
Ctrl + K Check names in the To, CC, or BCC field against the Address Book (cursor must be in the corresponding message header field)
Ctrl + M Send/Receive all
Ctrl + O Open
Ctrl + P Print
Ctrl + Q Mark the selected message Read
Ctrl + R Reply
Ctrl + S Save a draft message
Ctrl + T Tab
Ctrl + U Mark the selected message Unread
Ctrl + V Paste
Ctrl + X Cut
Ctrl + Y Go to Folder
Ctrl + Z Undo
Ctrl + Backspace Delete the previous word
Ctrl + End Move to the end
Ctrl + Home Move to the beginning
Ctrl + Shift + A Open a new Appointment
Ctrl + Shift + B Open the Address Book
Ctrl + Shift + C Create a new Contact
Ctrl + Shift + E Open a new folder
Ctrl + Shift + F Open the Advanced Find window
Ctrl + Shift + G Flag message for follow up
Ctrl + Shift + J Open a new Journal Entry
Ctrl + Shift + K Open a new Task
Ctrl + Shift + L Open a new Distribution List
Ctrl + Shift + M Open a new Message
Ctrl + Shift + N Open a new Note
Ctrl + Shift + O Switch to the Outbox
Ctrl + Shift + P Open the New Search Folder window
Ctrl + Shift + Q Open a new Meeting Request
Ctrl + Shift + R Reply All
Ctrl + Shift + S Open a new Discussion
Ctrl + Shift + U Open a new Task Request
Ctrl + Shift + Y Copy a Folder
Shift + Tab Select the previous message header button or field
F1 Open Outlook Help
F3 Activate the Find toolbar
F4 Open the Find window
F7 Spellcheck
F9 Send and receive all
F10 Select File from the Outlook toolbar button
F11 Activate the "Find a contact" dialog box
F12 Save As
Alt + F4 Close the active window
Trick to know how long your system was up or on
Trick to know how long your system was up or on
System Up time:
From XP there is a feature that can tell how much time can your pc can
stay on. Just open Command Prompt from
Start --> Run
there type "cmd" & you can open Command Prompt & in Command Prompt
window type "systeminfo" & look for Systen Up Time.
Hope you find this useful
Type With Mouse When Keyboard Doesnt Work Properly
In midst of typing something you find that the keyboard is not functioning properly, there is a way out before you can replace your keyboard
here it is .. this is only for cases when you find the keys hard or keyboard giving some problems.
Just Simple go to Run Command and type OSK and start typing with Mouse...
Enjoy..
Hope this helps you..
Change Internet Explorer Title
This tip allows you to change the browser title text in Internet Explorer:
1. Click Start > Run > Type gpedit.msc
2. Click User Configuration > Windows Setting > Internet Explorer Maintenance > Browser User Interface
3. Double click on Browser Title
4. Click on Customize Title Bars
5. Change the text to what whatever you want
6. Click on Ok
Intro to Windows Server 2008 DVD
http://rapidshare.com/files/105595919/tswin2k8intro.part01.rar
http://rapidshare.com/files/105608684/tswin2k8intro.part02.rar
http://rapidshare.com/files/105616714/tswin2k8intro.part03.rar
http://rapidshare.com/files/105624062/tswin2k8intro.part04.rar
http://rapidshare.com/files/105632762/tswin2k8intro.part05.rar
http://rapidshare.com/files/105641347/tswin2k8intro.part06.rar
http://rapidshare.com/files/105649643/tswin2k8intro.part07.rar
http://rapidshare.com/files/105669446/tswin2k8intro.part08.rar
http://rapidshare.com/files/105701208/tswin2k8intro.part09.rar
ALL MICROSOFT PRESS TRAINING KITS, 70-270,290,291,293,294,298,299,284,350
Replace xx with tt
hxxp://rapidshare.com/files/119133764/70-270_Training_Kit.pdf
hxxp://rapidshare.com/files/128657215/70-290_Training_Kit.pdf
hxxp://rapidshare.com/files/128659996/70-291_Training_Kit.pdf
hxxp://rapidshare.com/files/128661785/70-293_Training_Kit.pdf
hxxp://rapidshare.com/files/128662963/70-294_Training_Kit.pdf
hxxp://rapidshare.com/files/128666654/70-350_Training_Kit_ISA.pdf
hxxp://rapidshare.com/files/128669285/70-298_Training_Kit.pdf
hxxp://rapidshare.com/files/128670023/70-299_Training_Kit.pdf
hxxp://rapidshare.com/files/119173405/70-284_Training_Kit.pdf
1st Evidence Remover 2.4
1st Evidence Remover 2.4 - 1 MB
Cleans your Windows of any evidence and temporary files
When you delete your files using the Delete command, Windows does not actually delete the files but places them to the hidden RECYCLER folder, and even if you use the Empty Recycle Bin command, some files may stay in this folder and can not be deleted by Windows.
1st Evidence Remover is a complex security system that ensures your security and privacy by destroying all hidden activity information on demand, according to a user-defined schedule or on each boot/shutdown.
The program does not damage your Windows and does not delete your documents, it only removes needless registry entries and files that may potentially contain evidence and endanger you needlessly.
1st Evidence Remover also removes temporary files left by your system making it cleaner and running faster.
Install 1st Evidence Remover on your PC before it is too late!
Compatibility:
Windows 9x/ME
Windows NT4
Windows 2000
Windows XP
Windows 2003
Windows Vista
Download: (Size: 1 MB)
http://www.adrive.com/public/9624462a0a3c7d21a78dd55ebb838c08e2b76dbb3a54abbe64601cbe482610a5.html
CHINA Mobile Phones Secret Codes
Default user code: 1122, 3344, 1234, 5678
Engineer mode: *#110*01#
Enable COM port: *#110*01# -> Device -> Set UART -> PS Config -> UART1/115200
Factory mode: *#987#
LCD contrast: *#369#
Restore factory settings: *#987*99#
Software version: *#800#
Software version: *#900#
Set default language: *#0000# Send
Set English language: *#0044# Send
Set English language (new firmware): *#001# Send
Service codes Fly:
2040(i) reset defaults: *#987*99# Send
M100 software version: ####0000#
MX200 reset defaults: *#987*99# Send
MX200 software version: *#900# Send
MP500 reset defaults: *#987*99# Send
MP500 software version: *#900# Send
SL300m reset defaults: *#987*99# Send
SL300m software version: *#900# Send
SL500m reset defaults: *#987*99# Send
SL500m software version: *#900# Send
Set language to English: *#0044#
Set language to Russian: *#0007#
CDMA Secert Codes <>
Sony CM-M1300, 3300, Z200 Nam Programming :
Nam Set: 111111+Ok(Jog Dial)+Select+Programming+Ok+Spc
<>
Hyundai hwp-110 Nam Programming :
Nam Set: #86904**89397#
DM Mode: ##2740*
(Open phone, inter code, close phone)
Hyundai hgc-120, 130, 200 Nam Programming :
Nam Set: #86904**89397#
Hyundai hgc-310, 600, 610 Nam Programming :
Nam Set: ##20022002, end, 1, Spc Code
Field Test: ##20022002, end, 1, Master Code
Hyundai Curitel h100, 150, hx510b, 520, etc Nam Programming :
Nam Set: ##20022002, end, 1, Spc Code
Field Test: ##20022002, end, 1, Master Code
A-key: 2539**
Debug Menu: ##27732726, end
Sar Test: ##27752345, end
Baud Rate: ##36**, end
DM mode enable: **1004, end
DS mode enable: **1005, end
Test Bell/Voice/Led/Dot: ##1122, end
RF Mode: ##2240, end
Ras Ram: ##2774, end
Cmux1: **0481, end
Cmux2: **0482, end
RX Mode Fax: **0492, end
RX Mode Data: **0491, end
RX Mode Reset: **0490, end
<>
SonyEricsson T608, etc Nam Programming :
Nam Set: 923885, joystick >, 111111
Nam Set shot: 987, joystick >, 111111
Nam Set long: 222652, joystick >, 111111
Vocoder: ##8626337, joystick >, 111111
Debug screen: ##33284, joystick >
Life Timer: ##786, joystick >
SW ver: 9#4#3#, joystick >
Edit Profile: ##3282, joystick >
Service menu: *#06*
Ericsson A1228c, T61, etc Nam Programming :
Short NAM: 987+Menu
Long NAM: 923885+Menu+Spc
CDMA Mode: 904093+Menu
Analog Mode: 904095+Menu
QNC: 904097+Menu
Debug Screen: 904090+Menu
DM Mode: 904050+Menu
CDMA Secert Codes <>
Lg LX,VX-series, VX4400, VX6000, etc Nam Programming :
Nam Set: ##Spc(#)
Nam Set: Menu, 0
Advanced Settings: ##2342(#)
Vocoder: ##8626337,ok(#)
CAI Change: ##7738,ok(#)
Enable TTY: ##889,ok(#)
A-key: ##2539,ok(#)
Reset (Life time, Clear Memory, etc): ##786,ok(#)
lgc-300, etc Nam Programming :
Nam Set: Menu, 9, Spc
A-key: Press "Sto" 3sec, 2539**
lgc-330w, etc Nam Programming :
Nam Set: Menu, 4, 0, Spc
A-key: 2539**
lgc-510, v111, etc Nam Programming :
Nam Set: Menu, 3, 0, Spc
A-key: 2539**
lgc-500, 800w, etc Nam Programming :
Nam Set: Menu, 9 , 0, Spc
Debug Mode: Menu, 7, 0, Fsc
Debug Mode: Menu, 8, 0, Fsc
A-key: 2539**
CDMA Secert Codes <>
Nokia 3280, 3285, 3580, 3585, 5185, 6185, 8280, etc Nam Programming :
Nam Set: *3001#12345#
Software Version: *#837#
Software Version: *#9999#
Esn Number: *#92772689#
Restart Phone: *#75681#
Restart Phone: *#75682#
Nokia 8887 Nam Programming :
Nam Set: *3001#12345#
Version: *#0000#
Evrc: *#8378#
Esn/Data/Timer: *#92772689#
SID: *#743#
Nokia 8587 Nam Programming :
Nam Set: *#626#7764726#
A-Key: #8159357022#4579# (26 digits)
A-Key: #8159357022#4547# (20 digits)
Version: *#0000#
Version: *#837#
Vocoder: *#3872#
Change language: Menu 5, 3, 1
Change DM mode: *#7678#
Debug Screen: *#8378#
Debug: *#8380#
Field Test Menu: *#83788#
SPC Unlock, Factory Reset :
Full Factory Reset: *#7370#
Resets all settings including non-user changeable items (like SPC)
NOKIA TEST MODE:
51xx, 61xx, 71xx, 3285, 63xx, etc :
1) Turn on the phone. Press *3001#12345#
2) Scroll up to where it says "Field Test" and choose SELECT
3) Highlight "Enable" and choose OK. Turn the phone off then back on.
4) If the test mode screen does not show up press MENU and scroll
down to "Field Test" choose SELECT. Press 0 1 then choose OK.
5) Lower left or upper left number is the signal strength.
6) To turn off the test mode press MENU and scroll down to where it says
"Field Test" choose SELECT. Press 0 0 and then choose OK.
3360, 6360, etc :
1) Turn on the phone. Press *3001#12345#
2) Scroll up to where it says "Field Test" and choose SELECT
3) Highlight "Enable" and choose OK. Turn the phone off then back on.
4) If the test mode screen does not show up press MENU and scroll
down to "Field Test" choose SELECT. Press 2 1 0 1 then choose OK.
5) Lower left or upper left number is the signal strength.
6) To turn off the test mode press MENU and scroll down to where it says
"Field Test" choose SELECT. Press 2 1 0 0 and then choose OK.
CDMA Secert Codes <>
Motorola 7760, 7860, 2260, 8160, etc Nam Programming :
Nam Set: Fcn,0000000000000, Rcl
Nam Set: 74663#, Fcn, Fcn
Test Mode: Fcn, 00**83786633, Sto
Motorola v60c, v120c etc Nam Programming :
Nam Set: 74663#, Menu, Menu, Spc
Nam Set: Menu, 073887, * (type quickly)
Test Mode: Menu, 073887*, Spc
Debug Mode: ##33284
Force the phone into DIGITAL ONLY mode:
1) ##33284 (Debug)
2) RIGHT Softkey (Next) Twice
3) Down arrow 10 times to "PrefMod"
4) RIGHT Softkey (Change) until you see "DigOnly"
5) LEFT softkey (Exit)
6) MENU then LEFT Softkey return to idle screen
7) ##33284 (The last 4 will not display if you have done it correctly)
Motorola Razr V3C Nam Programming:
Nam Set: 74663 # clr clr
Nam Set: #073887* , then SPC
Motorola Q Nam Programming:
Nam Set: [Send] + 074663 + [Send] + [Send], Selecct NAM#
Motorola t182, c210, etc Nam Programming :
Nam Set: ##298645665, end
Short Nam: ##073887, sto
Debug Menu: ##1111, end
Service Menu: ##2222, end
Sound NS/EC on/off switch: ##1113, end
Motorola v710, v730, v740, ms150, etc Nam Programming :
Nam Set: 8378*# + press 3 times NATE (spc - 071082)
Test Mode: Menu, 073887*, Spc
Service Menu: #758353266#646#
Motorola StarTac 2004 Nam Programming :
Nam Set: 5759789*#, press "Rec" button 3 times, (spc - 915037)
Motorola ms200, ms400, ms800, etc Nam Programming :
Nam Set: 5759789*#, press "Camera" button 3 times, (spc - 915037)
Nam Set: 246791538*#, press "Camera" button 3 times, (spc - 915037)
Motorola v6060 Nam Programming :
Nam Set:147*369#456*0#
MOTOROLA TEST MODE :
v60, c120, c331, etc:
1) Turn on the phone. Press MENU 0 7 3 8 8 7 *
2) The phone will require you to "Enter a Security Code", press 000000, OK
3) Scroll down to "Test mode" choose SELECT. Scroll down to "Enable"
choose SELECT. Your phone is now in test mode.
4) Signal strength is the 3_rd number down on the left hand side of the screen.
5) To toggle between regular mode and test mode: Press MODE then
quickly press the BUTTON DIRECTLY TO THE LEFT OF MENU.
6) To turn off the test mode the phone must be in regular mode, then follow
the above sequence and scroll down to where it says "DISABLE" instead of
"ENABLE" and choose select.
<>
Audiovox 4000, 9000, 9100, 9155, 9500, etc Nam Programming :
Power the phone ON and wait until the little light on top goes out, then press:
Nam Set: 289,Fcn, #,1
Service menu: Fcn,0,0, FSC
Power the phone ON and press:
Test Mode: Hold (2,*,Rcl) + Power
Test Mode Commands:
99 - download - flash phone
124 - inam data write
125 - version
126 - get ESN
127 - get SPC
128 - get User lock
129 - is WFTV data write
137 - get FSC code
138 - NPcode (nam program code)
139 - dscode
141 - restart
218 - Read_Addr
000 - is cdma mode
001 - is fm mode
002 - is pcs mode
008 - is reg read addr
020 - is lna_range
Audiovox (Hyundai) cdm-100, 130, 135, 8300, 8500, 8600, 8910, etc Nam Programming :
Nam Set: ##20022002, end
Read user lock: #5625*, end
Port settings: ##7678, end
DM baud rate: ##2283, end
DM mode enable: **1004, end
DS mode enable: **1005, end
Misc. Test: ##27752345, end
S/W Test1: ##27732726, end
S/W Test2: ##2240, end
Debug screen: ##2773, end
Clear MRU: ##6782, end
Rfnu_Contents: ##2250, end
?????: ##1133, end
?????: ##1144, end
P_Rev: ##7738, end
GPS Test: ##4771, end
A-Key: 2538**
SMS Eng: ##767364, end
Battery_adc: ##2768, end
Tests: ##1122, end
Audiovox 8610, 8910, etc Nam programming :
Name Set: ##847446, end, 111111
Audiovox pcx-3500xl Nam Programming :
Nam Set: ##2726+Send+1998+1+Spc+1
Audiovox-107 Nam Programming :
Nam Set: 45680*47*869#1
Audiovox CMP-3 Nam Programming :
Nam Set: 45680*47*869#1
Dm Mode: Menu, 6, 6
Audiovox 9950 Nam Programming :
Nam Set: ##3282
Audiovox Z800 (Audiovox 7900, Sharp) Nam Programming :
Nam Set: m + # + envelope key + * + 1
Audiovox Thera (Toshiba 2032) Nam Programming :
Thera Nam Programming User Manual - nam_thera.pdf
Audiovox (UTStarcom) PPC 6600, 6700, etc Nam Programming :
Nam Set: ##SPC + Send
Nam Set: #*#SPC + Send
Nam Set: ##SPC#
DM mode: ##3424 + Send
DM mode: #*#3424 + Send
DM mode: ##3424#
Programming User Manual - programming_instructions.pdf
CDMA Secert Codes <>
Sanyo 4900, 5150, 5300, 8100, etc Nam Programming :
Nam Set: ##Spc+Ok+Key Down+Ok
Advanced Setup: ##3282+Ok+Key Down+Ok+Msl
A-key: ##2539+Ok+Key Down+Ok
Version: ##**837+Ok+Key Down+Ok
Debug Menu: ##FSC+Ok+Key Down+Ok
Airtime menu: ##8463+Ok+Key Down+Ok
Change CAI: ##7738+Ok+Key Down+Ok
Vocoder: ##8626337+Ok+Key Down+Ok
Reverse Logistic: ##786+Ok+Key Down+Ok
Set IP Address: ##2769737+Ok+Key Down+Ok
TTY On/Off: ##889+Ok+Key Down+Ok
Ready Link: ##4636+Ok+Key Down+Ok
Browser Init On/Off: ##4682+Ok+Key Down+Ok
Picture Token: ##25327+Ok+Key Down+Ok
Unknown Code: ##5282277+Ok+Key Down+Ok
(SPC=000000, FSC=040793)
Sanyo scp-A011, smp-A017, etc Nam Programming :
Nam Set: F9(3 beep) + 0*72696#767
CDMA Secert Codes <>
Kyocera 2345, 3035, 5135, 6035, Se47, KX, KE - series, etc Nam Programming :
Nam Set: 111111+Jog Dial(Ok)
CAI Change: ##7738,ok
Enable TTY: ##889,ok
Life Timer: ##786,ok
A-key: ##2539,ok
Tips:
On some kyocera handsets the factory service module has not been disabled
and the phone can be programmed without the Spc by inputting:
Nam Set: ##333333 menu (service)
Qualcomm qcp-800 Nam Pogramming :
Nam Set: Menu+3+0+Spc
Field Test: Menu+7+0+Fsc
CDMA Secert Codes <>
Samsung sph-n240, n400, a460, a500, etc Nam Programming :
Nam Set: ##Spc
Test Mode: 47*869#1235
Debug Menu: ##33284,ok
Service Menu: Menu+8+0 (#889)
Reset (Life time, Clear Memory, etc): ##786,ok
A-key: ##2539,ok
Label Selection: ##3882,ok
Label(Home, Work, etc) : **523,ok
NGG Setting (Gateway, etc.): ##2769737,ok
Vocoder: ##8626337,ok
CAI Change: ##7738,ok
Enable TTY: ##889,ok
Samsung a530, a610, a620, a660, a670, etc Nam Programming :
Nam Set: Menu, 6, *
Nam Set: ##3238, ok
Nam Set: ##SPC (##000000), ok
Service Menu: Menu, 9, *
Test Mode: 47*68#13580
Test Mode: 47*869#1235
Samsung X, E, V, S-series (korean models), e250, v420, s350, etc Nam Programming :
Nam Set: 6548#0**4#6
Nam Set: 47*869#08#9 --Activate Chachu Samsung S-106
Nam Set: 74153697193
Test Mode: 5809540*45680 (88 - EFS reset)
Debug Menu: Menu(hold 2sec)+0, 6725 or 9720 or 1973 or 0415
Debug Menu: Menu+0(hold 2sec), 6725 or 9720 or 1973 or 0415
Debug Menu: Home(top of keypad)+0, 6725 or 9720 or 1973 or 0415
Samsung sch-411, 611, n105, a100, a300, a2000, etc Nam Programming :
Nam Set: 47*869#08#9
Nam Set: Menu+60
Test Mode: *759#813580
Test Mode: 5809540*45680
A-key: Menu+0, 25##
External Audio: Menu+0, ####
Debug Menu: Menu+8, 0415 or Spc
Debug Menu: Menu+9, 0415 or Spc
Brief NAM Programing: Menu+40,626 (not all version)
LCD Contrast: Menu+45 (not all version)
SIO Mode: Menu+49
SIO Mode: Menu+69
Samsung N356 (India version) Nam Programming :
Test Mode: Menu, 5, down arrow, *
Test Mode: **00## (in some flashes)
Samsung i700, etc Nam Programming :
Nam Set: Go to start and select "PHONE" from the drop down menu, dial #83587
Samsung i300, etc Nam Programming :
1. Tap on the Phone Icon with stylus
2. Press #907*9#0 ENTER LOCK should appear on screen
3. Enter OTKSL
4. SVC MENU will appear press 1
5. Enter 10 digit MIN and then press SAVE
6. Press SAVE again
7. Press 3 and then press SAVE 6 times
8. Enter the HOME SID and press SAVE once
9. Press END key twice
About "HOSTS" File
Warning: Backup the file before playing with it!
What does this file do?
The HOSTS file found on Windows (and linux too) is like a local DNS (domain name server). When you type a url on the browsers address bar, the domain name is converted to the IP of the server by a DNS lookup by the browser. Now here is the catch ... Windows first looks at the HOSTS file before doing any DNS lookup. So we can block certain sites by editing the HOSTS file.
Where is it ? I dont see the HOSTS file
HOSTS file is found typically here ...
Windows XP : C:\WINDOWS\SYSTEM32\DRIVERS\ETC
Windows 2K : C:\WINNT\SYSTEM32\DRIVERS\ETC
Windows 98/ME : C:\WINDOWS
Linux : /etc/
What is in this FILE?
HOSTS file is just a plain text file. So you can use any text editing software like notepad to edit the contents of the file.
Typical content of a HOSTS file is shown below :
# Copyright (c) 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
127.0.0.1 localhost
The Lines followed by a # are comments and explains how to use the HOSTS file. 127.0.0.1 is the IP address that is used to loopback to your computer itself. So if you are running an apache or IIS server or anyother server software, you can access it by the url http://localhost or http://127.0.0.1
What now ?
Suppose you want to block some sites for example say you want to block "www.sicksite.com". All you have to do is add another line to the HOSTS file:
127.0.0.1 www.sicksite.com
Now what happens is whenever you try to visit "www.sicksite.com" it goes to the site on your localhost. For common people those who dont run any server, localhost is nowhere!
Why would i want to block sites ?
There are many parasitic servers out there on the internet, that track your movements while browsing. So if you want to protect yourself, include those sites on the HOSTS file.
A list of sites that is parasitic or is an ad serving site is given in
http://www.mvps.org/winhelp2002/hosts.txt
It is not recommended to copy the entire list to your local HOSTS file as it slows down the system. So choose ones that you think needs to be blocked.
What is this pop up about?
When you are saving the HOSTS file, a pop up may appear that asks you to confirm the changes to the HOSTS file. This pop up may or may not appear based on the OS, and other Anti-Virus Softwares you are running.
What else can I do with "HOSTS" file?
You can also make a site point to another site. By making an entry as follows :
72.14.207.99 www.mysearchengine.com #72.14.207.99 google server ip
Now visiting "www.mysearchengine.com" takes you yo "www.google.com".
To find out IP address of sites visit:
• http://www.hcidata.co.uk/host2ip.htm
• http://cqcounter.com/whois/
If your are a webmaster, HOSTS file allows you to make subdomains within localhost (depends on server software and after configurations in it).
127.0.0.1 subdomain.localhost
Oops I screwed up ...
Restore the backup file if u have already done so
OR
Copy the sample HOSTS given above and save it.
Disable Autorun Windows XP
Do this very important!!
Most viruses uses the autorun.inf to get itself infected on your computer. Autorun.inf is a small file that instructs the windows os to do when the CD is inserted into the computer. In genuine cases , it runs a setup in case of a Software Installation Disc. In the other case it may run a virus and gets your system infected. All you got to do to get the virus is put the CD. Same is the case for Mass Storage Devices like Memory Sticks, Pen Drives, Flash Drives etc.
So Disable your Autorun now
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\Cdrom\Autorun Change from 1 to 0
To disable Autoplay of all drives
Start > Run > gpedit.msc
Enable : Computer Configuration > Administrative Templates > System > Turn Off Autoplay
Windows XP Hotfixes
KB873339 - Vulnerability in HyperTerminal could allow code execution
KB884575 - Battery power may be drained more quickly than expected on Windows XP-based laptop
KB885836 - Vulnerability in WordPad could allow code execution
KB886677 - DBCS characters appear corrupted when browsing site using Shift-JIS encoding
KB887472 - Security update to Microsoft Windows Messenger
KB887606 - Microsoft XML Parser (MSXML) uses cached credentials incorrectly
KB888111 - Universal Audio Architecture High Definition Audio Class Driver Version 1.0a
KB889016 - Cannot obtain debug information about the resource objects of Application Verifier stop errors
KB889320 - Computer Browser service stops and Event ID 7023 is logged after Windows Firewall service disabled
KB889673 - DEP-enabled computer may unexpectedly quit after resuming from standby or hibernation
KB890830 - Malicious Software Removal Tool 1.30
KB892489 - Antivirus scan may increase the number of open handles for the svchost.exe process
KB893008 - PAL format digital video cameras are incorrectly detected as NTSC format digital video cameras
KB893756 - Vulnerability in Telephony service could allow remote code execution
KB893803 - Windows Installer 3.1 (v2)
KB894395 - IME Composition or Candidate window remains visible even after losing focus when using Japanese IME
KB895961 - Terminal Server Service update (From KB900325 Package)
KB896256 - A Windows XP SP2-based computer that has multiple processors exhibits decreased performance or unexpected behavior
KB896344 - Can't transfer files and settings from computer running 32-bit Windows XP to computer running Windows XP x64
KB896358 - Vulnerability in HTML Help could allow remote code execution
KB896423 - Vulnerability in Print Spooler service could allow remote code execution
KB896428 - Vulnerability in Telnet client could allow information disclosure
KB896626 - Windows XP TV tuner program stops responding or displays corrupted video
KB897338 - New language locales for Windows XP Service Pack 2
KB897663 - Exception may not show up in the Windows Firewall GUI the exception is created by modifying the registry
KB898461 - Permanent copy of the Package Installer for Windows version 6.2.29.0
KB898543 - Cannot correctly install security fixes in Windows XP Starter Edition
KB899271 - Updated USB Video Class (UVC) driver for Windows XP
KB899409 - 20-second delay when trying to access a redirected folder by logging on to computer
KB899591 - Vulnerability in Remote Desktop Protocol could allow denial of service
KB900485 - 0x0000007E stop error in Windows XP SP2
KB901017 - Vulnerability in the Microsoft Collaboration Data Objects could allow code execution
KB901190 - Vulnerability in the Korean Input Method Editor (IME) could allow elevation of privilege
KB901214 - Vulnerability in Microsoft Color Management Module could allow remote code execution
KB902149 - FTP client may echo account information back to the screen
KB902845 - Computer stops responding during text-mode Setup when you try to install Windows XP
KB902853 - An unnecessary restore operation may be started on a RAID group when computer is put in hibernation
KB903234 - Update to optimize the way that the Volume Shadow Copy Service client accesses shadow copies
KB903250 - Song titles are copied to a recordable CD after cancelling a burn operation in Windows Media Player 10
KB904412 - SBP-2 device does not work when it is connected to a Windows XP SP2-based computer
KB905414 - Vulnerability in Network Connection Manager could allow denial of service
KB905749 - Vulnerability in Plug and Play could allow remote code execution and local elevation of privilege
KB906216 - The Dhtmled.ocx ActiveX control doesn't work as expected after a program changes the Visible property of it
KB906569 - Update to add the Tools tab to the System Configuration utility in Windows XP Service Pack 2
KB906866 - 0x00000035 NO_MORE_IRP_STACK_LOCATIONS stop error when trying to log on to a domain
KB907865 - IPSec Policy Agent update
KB908519 - Vulnerability in embedded Web fonts could allow remote code execution
KB908531 - Vulnerability in Windows Explorer Could Lead to Remote Code Execution
KB908536 - Horizontal scroll bar used in forms may not respond to mouse controls or actions when using themes
KB909441 - In Control Panel, "Sounds and Audio Devices" does not correctly display the setting in "Speaker Setup" list
KB909520 - Software update for Base Smart Card Cryptographic Service Provider
KB909608 - Access violation when using /integrate switch to integrate KB900725 into Windows XP SP2 installation source files
KB909667 - Computer stops responding during standby or hibernation operations or trying to use the Shut Down command
KB910437 - Access violation error occurs when Windows Automatic Updates tries to download updates
KB911280 - Vulnerability in Routing and Remote Access could allow remote code execution
KB911562 - Vulnerability in Microsoft Data Access Components (MDAC) function could allow code execution
KB911564 - Vulnerability in Windows Media Player plug-in with non-Microsoft Internet browsers could allow remote code
execution
KB911927 - Vulnerability in WebClient could allow remote code execution
KB911990 - Connection to the Sony Media Changer/Recorder is lost
KB912024 - Update Rollup 2 for eHome Infrared Receiver
KB912461 - Cannot obtain information about specific events when you program against the DVD Nav control in Windows XP
KB913296 - Jet 4.0 data engine update fixes issues that may occur
KB913580 - Vulnerability in Microsoft Distributed Transaction Coordinator could allow denial of service
KB913808 - The embedded resource version of the LIP MUI files is incorrect in Windows XP
KB914388 - Vulnerability in the DHCP Client Service could allow remote code execution
KB914440 - Network Diagnostics for Windows XP
KB914463 - WMI causes object access failure events when an SACL is applied to the HKEY_USERS registry subkey
KB914841 - Simplify the creation and maintenance of Internet Protocol security filters
KB914906 - "Unsupported State(2)" error message when a Windows XP Starter Edition-based computer continuously restarts
KB915378 - Update for Add New Hardware Control Panel
KB915865 - XmlLite update package for Windows XP Service Pack 2
KB916595 - 0x000000D1 DRIVER_IRQL_NOT_LESS_OR_EQUAL stop error on a Windows XP SP2 computer
KB917140 - Microsoft Application Compatibility Toolkit detailed log entries cannot be logged
KB917275 - Windows Rights Management Services for Windows XP SP2
KB917730 - You cannot create a network connection when you are starting a Windows XP SP2-based computer
KB918005 - Battery power may drain more quickly than you expect on a Windows XP SP2-based portable computer
KB918033 - Certain Windows dialog boxes may not retain the focus as expected
KB918118 - Vulnerability in Microsoft RichEdit could allow remote code execution
KB918334 - Error message when running a Win32 program that makes CreateFile function calls from a client computer to a server
KB918439 - Vulnerability in ART image rendering could allow remote code execution
KB918997 - Developers can't create wireless client programs that manage wireless profiles and connections over the Wireless
Zero Configuration service
KB919007 - Vulnerability in Pragmatic General Multicast (PGM) could result in remote code execution
KB920213 - Vulnerability in Microsoft Agent could allow remote code execution
KB920342 - Upgrade PNRP to PNRP version 2.0
KB920670 - Vulnerabilities in Microsoft Windows Hyperlink Object Library could allow remote code execution
KB920683 - Vulnerability in DNS resolution could allow remote code execution
KB920685 - Vulnerability in Indexing Service could allow cross-site scripting
KB920872 - Audio playback does not play file from correct position after pausing, and Stop error message randomly received
when trying to play audio files
KB921401 - A non-paged pool memory leak occurs when you capture specific MIDI SYSEx messages in Windows XP
KB921411 - USB devices no longer work correctly after installing the Intel Chipset Software Installation Utility
KB922120 - Network Map in Windows Vista does not display computers that are running Windows XP
KB922582 - 0x80070002 error message when trying to update a Microsoft Windows-based computer
KB922668 - Windows XP COM+ Hotfix Rollup Package 14
KB922819 - Vulnerabilities in TCP/IP IPv6 could allow denial of service
KB923154 - EAP reauthentication may not occur and the Wireless Zero Configuration service may not work correctly when using a
third-party application
KB923191 - Vulnerability in Windows Explorer could allow remote code execution
KB923232 - Computer using Intel dual-core processor stops responding when trying to resume from standby
KB923414 - Vulnerability in Server Service could allow denial of service
KB923980 - Vulnerability in Client Service could allow remote code execution
KB924191 - Vulnerabilities in Microsoft XML Core Services could allow remote code execution
KB924270 - Vulnerability in Workstation Service could allow remote code execution
KB924667 - Vulnerability in Microsoft Foundation Classes could allow for remote code execution
KB924941 - Update to resolve timing issues resulting in race conditions when using Bluetooth devices connected via USB
KB925398 - Vulnerability in Windows Media Player 6.4 could allow remote code execution
KB925623 - The Wmiprvse.exe process may experience a memory leak when WMI services and RPC services are extensively used
KB925720 - Windows CardSpace hotfix rollup package
KB925876 - Remote Desktop Connection 6.0 Client
KB925902 - Vulnerability in GDI could allow remote code execution
KB925922 - Computer restarts unexpectedly or 0x000000D1 stop error message received
KB926239 - Windows Media Player 10 may close unexpectedly
KB926255 - Vulnerability in Windows could allow elevation of privilege
KB926436 - Vulnerability in Microsoft OLE Dialog could allow remote code execution
KB926646 - Can't increase the limit concurrent SMB command in the Windows XP Professional Server service
KB927544 - Can't create an AVI larger than 512GB and can't play an AVI larger than 800 GB using DirectX
KB927779 - Vulnerability in Microsoft Data Access Components could allow remote code execution
KB927802 - Vulnerability in Windows Image Acquisition Service could allow elevation of privilege
KB927880 - Can't log on to a device that has both a blank user name and password using Internet Explorer 7
KB927891 - Access violation received when trying to install an update from Windows Update
KB928255 - Vulnerability in Windows Shell could allow elevation of privilege
KB929123 - Cumulative security update for Outlook Express (June, 2006)
KB929280 - Microsoft Management Console 3.0 does not correctly display 32-bit color snap-in icons
KB929969 - Vulnerability in Vector Markup Language could allow remote code execution
KB930178 - Vulnerability in Windows CSRSS could allow remote code execution
KB931125 - Microsoft Root Certificate Update (February 2007)
KB931192 - Users in a trusted external Kerberos realm cannot access resources from a Windows Server 2003-based forest
KB931261 - Vulnerability in UPnP could allow remote code execution
KB931784 - Vulnerability in the Windows kernel could allow elevation of privilege
KB931836 - February 2007 cumulative time zone update
KB932168 - Vulnerability in Microsoft Agent could allow remote code execution
KB932590 - Windows-based applications that use the TZ environment variable may not work as expected because of changes to DST
KB932597 - "Windows cannot find the network path" error message when trying to connect to a network resource
KB932662 - An access violation occurs in a program that uses the DirectShow DV Mux filter
KB933566 - Cumulative Security Update for Internet Explorer (June, 2007)
KB933876 - USN journal record contains an incorrect file name when moving a file
KB934161 - "Windows cannot calculate the effective permissions for User_Name" error when trying to view permissions for
domain-migrated user account
KB934428 - Hotfix that adds support for SDHC cards that have a capacity of more than 4 GB
KB935192 - 0x00000044 stop error when resuming computer from hibernation after applying KB918005 hotfix
KB935214 - Access violation occurs when a program is automatically stopped
KB935448 - Certain third-party applications may not start, and "Illegal System DLL Relocation" error message received
KB935839 - Vulnerability in the Win32 API could allow remote code execution
KB935840 - Vulnerability in Schannel could allow remote code execution
KB935843 - 0x0000007F stop error when trying to print from computers that have KB925902 security update installed
KB936357 - Microcode update to improve the reliability of systems with Intel processors
Other Updates
Adobe Flash Player 9.0.45.0 ActiveX Control
Macrovision SafeDisc Driver Fix 4.00.060
Microsoft European Union Expansion Font Update 1.2
Microsoft Qfecheck 6.1.0.0
Microsoft Update 7.0.6000.374
Microsoft Web Folders 9.60.6715.0 (KB892211)
Microsoft Windows Script 5.6.8831 (Includes KB917344 Hotfix)
MSXML 4.0 SP2 (Includes KB927978 Hotfix)
MSXML 6.0 SP1
Registry Tweaks
DSO Exploit registry fix that Spybot Search & Destroy complains about
Hotfixes added. After ryans
KB939683 -› FIX: Update for Windows Media Player 11 for Windows XP
Download -› 549 KB (August 27, 2007)
Switches: KB939683.exe /q /n /z
KB939373 -› Vulnerability in Microsoft Internet Information Services Could Allow Remote Code Execution
Download -› 621 KB (July 9, 2007)
Switches: KB939373.exe /q /n /z
KB938829 -› Vulnerability in GDI Could Allow Remote Code Execution
Download -› 605 KB (August 14, 2007)
Switches: KB938829.exe /q /n /z
KB938828 -› Error message when the Explorer.exe process crashes on a Windows XP SP2-based computer: "STOP 0xc0000005"
Download -› 830 KB (July 24, 2007)
Switches: KB938828.exe /q /n /z
KB938127 -› Vulnerability in Vector Markup Language could allow remote code execution
Download -› 781 KB (August 13, 2007)
Switches: KB938127.exe /q /n /z
KB937143 -› Cumulative security update for Internet Explorer
Download -› 8.06 MB (August 14, 2007)
Switches: KB937143.exe /q /n /z
KB936782 -› Vulnerability in Windows Media Player Could Allow Remote Code Execution
Download -› 5.53 MB (August 14, 2006)
Switches: KB936782.exe /q /n /z
KB936021 -› Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution
Download -› 890 KB (August 14, 2006)
Switches: KB936021.exe /q /n /z
Administering Windows Systems/Networks
Here's the start of my "Best Practices" list for the
sucessful administration of Windows NT and 2000 based
networks. At some point, I may categorize them.
NT4
• No network is too small for a BDC
• Update your ERDs on a regular basis
WINDOWS 2000/XP/2003
• Always install the Recovery Console
• Backup the System State on a regular basis
• Use a normal account for day-to day work, and use
RUNAS for administrative work.
• The cost of a 2nd domain controller is far less than
the cost of downtime
SECURITY
• Use Strong Passwords
• Enable Auditing
• Change Passwords Regularly
• Firewalls and AntiVirus are well advised for any network
• Always create a password for the Administrator Account
INSTALLATIONS
• Create Slipstreamed CDs
• Use tracking sofware whenever installing software
on your desktop or server
• Test Patches, Fixes, and new software/drivers in
a test environment before going live.
GENERAL
• Defrag your drives
• EIDE for standard desktops; SCSI for Servers and
High-End Workstations
• ATA RAID before Software RAID
• NT/2000/XP makes a much better client OS than Win9x
• NTFS at all times
• Script your changes, so you'll have a record, and
you'll be able to duplicate them easily.
• Switches, YES; Hubs, NO
• Develop a good Backup strategy and test your backups
• Develop a good Naming Convention
• Develop a good Disaster Recovery stratey
• The command line is your friend
• Use strong passwords and a robust password policy
• Use good, reliable, robust hardware
• Use proper power supplies and clean power
• Document your changes
• Redundancy is a good thing!
• Group Policy is a powerful tool
• Document all concerns - CYA at all times
TOOLS (Originally Compiled By Jay Woody)
The following list represents tools and utilites that
can be of great use to a Windows Admin. This should
be helpful checklist for what to get at a new job:
• TOOLS/UTILS
Anti-Virus
Anti-SPAM
Defragger
Documentation Tools
NTFS Boot Utility
Password Cracker
Remote Control
Resource Kit and Support Tools
Scripting Tools
Text Editor
Zip Utility
• SYSTEM MANAGEMENT
Active Directory Management
Cloning/Imaging Software
Deployment Software
Disaster Recovery System
Event Log Monitor
High Availability Software
Inventory Software
Network Analyzer
Network Management & Diagramming
Performance Management
Policy Management
Printer Management
Service Password Management
Storage Management
SysLog Server
User/Domain Management
WebLog Analyzers
• PROTECTION/SECURITY
Encryption Tools
Firewall
Intrusion Detection Systems
Vulnerability Scanners
• MAGAZINES
Windows 2000 Magazine
ComputerWorld
InfoWorld
ENT Magazine
eWeek
Network World
• BOOKS
Inside Windows NT
Inside Windows 2000
Inside Windows 2003 (coming soon)
Mastering Windows 2000
Mastering Windows Server 2003
*any other books by Mark Minasi*
Windows 2000 Sys Admin
Tim Hill's Scripting Books (both WSH & NT Shell Scripting)
*any other books on scritping in Perl or WSH*
Building Linux/OpenBSD Firewalls
CISCO TCP/IP
Internet Security
Computer Networking Essentials
Hack Proofing Your Network: Internet Tradecraft
Securing Windows NT/2000 Servers for the Internet: A Checklist for System Administrators
Hacking Exposed: Network Security Secrets and Solutions
Telnet For Beginners
First of all what is telnet? Telnet is a protocol which is part of the TCP/IP suite. It is quite similar to the UNIX rlogin program. Telnet allows you to control a remote computer from your own one. It is terminal emulation software. In the old days harddrives were humonguous and expensive (i am talking waY back here) and there were no personal computers. To make use of existing computers you had to lease hardrive space and use terminals to operate the system. For developers this was great because computing became lots cheaper. You needed a server and many connections could be made. With telnet u can emulate this type of distributed computing and for example operate a supercomputer from a distance.
TCP/IP works with ports and telnet has one also. It's nr 23. It's has several rfc's. Nr 854 dates back to 1983 and is named telnet protocol specification.
With telnet you can do various things like send mail, log in to irc or proxy and even (though hardly anymore) view and modify websites. There are telnet services available allowing you to search through large databases using telnet. With this you use the remote computer's power so it won't presure your precious resources. Usually help or remotehelp are the commands to use to find out what you can and cannot do. If you can't see what you type in then set echo. Once you made a connection you can use the computer as if it was your own. You use command lines for this.
Telnet knows different emulation types. VT-100 is most used. This emulation was used on the video terminals of DEC. There are still VT-100 servers running out there. Scientists use these.
To use telnet you need a client. Windows has telnet built in by default (as does UNIX but that's a different story), but there are third party clients available on the net. You start a telnet session by typing in the command 'telnet server.net 23' where the port number is optional. Since Telnet was based on UNIX (as it is part of TCP/IP which also was based on UNIX) it uses UNIX commands. Basic knowledge would help you here. The port number specifies what services you will use. 23 is the default one. You can log into various services. 80 is the HTTP server for that.
So say you wanted to modify your site from a distance on a leased line. You don't have your fav progs and hardly any time.
/* telnet server.net 80 (leave the /*)
/* GET http://www.server.net/YOURSITE.HTM HTTP/1.1
You can use this method to get the output of a cgi-script as well. The simple request doesn't use the HTTP/1.1 (this is the HTTP version running on the server). If you perform a bad request you usually get some info on the server. Use this to find a the correct versions of services running.
To put files to the server u use the PUT command. Telnet is pretty simillar to FTP which is also part of TCP/IP. There are other commands available like POST, which is used to put larger data files to the server, HEAD to get the sites header and DELETE. This one is obvious isn't it.
You can also use telnet to send raw imails. The port to login to is 25.
First you have to identify your self. This geos like this:
/* telnet mail.server.net 25
/* HELO www.you.net
When you typed this command you'll get some feedback telling you who and what you logged on to. When you login u may get also some feedback telling you things. :`;
After this you tell the server where the mail is from like this:
/* MAIL FROM:you@youradress.net
The server will give you feedback again telling you
/* ...Sender OK
You are accepted. Now for the receipant
/* RCPT TO:yourroommate@hisadress.net
again feedback
/* ...Receptient OK
The server stil does it's duty.....
/* DATA
After typing this command you'll get the instructions on the proper way to send the mail. Type your mail using the instructions. After you're done sending your mail close the connection using
/* QUIT (or END, EXIT, LOGOFF LOGOUT)
You can use this to receive your mail as well (if your provider allows you). The POP port is 110. Telnet to the server on this port. Once there use the following commands.
/* USER you@THE_SERVER_GOES_HERE.net
/* PASS ;type in your password (simple huh.).
Once you are accepted as a valid user use the following to list your mail.
/* LIST
Ports can be configured so they may be different on some systems. Many admins use the default ones though.
Two things come in handy when completly understanding telnet and how it works. They are a basic understanding of TCP/IP and a basic understanding of UNIX commands.
You could use telnet to connect to a proxy and from there on continue your quest. Find a good proxy (use a search engine to locate one) and create an account. Now telnet to the server on the port specified on the website and hang loose. Using a proxy to use the web keeps your identity better hidden. Proxies often use port 8080 or 3128. If you use IE or Netscape you configure them to use a proxy. If you have computer friends maybe they could help you locate one nearby. To learn more about proxies read a tutorial about them. Telnet is part of TCP/IP and with this comes specific built in connection security. This basicly comes down to the three-way-handshake which i will not furtherly discuss in this tut. Terminal emulation was embraced by developers because it is a quick and secure way for remote computing.
Bcause telnet is developed to be quick and reliable you could use it to connect yourself to an irc-server and chat with your buddies without a resource consuming GUI. You may even want to use a proxy to keep the (f)lamers from finding out your ip. To do this you have to know that the irc protocol has it's ports dedicated to 6666:6669. Ports can be configured so you have to know to what port you should connect. The identd runs on port 113. Better use a shell account to connect to IRC servers or a GUI client. Once you are there u can use the usual irc commands. If you have got a good shell (command.com) you can use scripts to automate procedures. To learn more about irc: Request for Comments: 1459 Internet Relay Chat Protocol. mIrc is a pretty good irc-client for nowadays high resource conputers if you want to learn this to. Since linux was built on UNIX and linux is free, you should have by now installed this operating system. OK
U can also post to newsgroups if the server allows this. Newsgroups use nntp (rfc 977) over port 119. Use your skills. If you want to get information on a particular system you can use a technique known as port scanning. There are pretty fancy port scanners on the net but to become a guru you will have to know how hits take place. So use port surfing instead. Telnet to the server on various ports to get info on services. This is much more rewarding then using someone else's portscanner. If you want to become a good hacker learn a programming language and write your own. Because TCP/IP is not designed for a specific platform it works much the same on any. TCP/IP uses ports that have certain services.
There are severel interresting ports for trying telnet like 7:echo. This one replies whatever you type in.
13 daytime
15 netstat
37 time time
39 rlp
53 domain
119 nntp
443 https
Use your commands to get the requested info. By connecting to different services you get a clear look at the system in use. If you want to exploit a system use the info and go to exploiters.net. If you come across a system you don't know read the ALT.2600.FAQ.
There are also a lot of trojans circulating (like back orifice or netbus). If you know how to use these you can do some rad things but mostly the use if trojans is considered lame. Learn the commands and setup your private backdoor. When you want to attack a system prepare yourself for this. There has been some discussion on the legality of port-scanning/surfing. Many servers log every attempt to connect to it. Be warned.
The expansion of free software towards the windows market gives great tools to set up your own hackerlab. For this you use your computer and one other. Set up a simple network with a server.
Configure the server and start hacking.
If you have a root account on a telnet server you can use this to remotely administer the server. There are many wats to get a root account. Remember that if an administrator finds a new root account on his system he will know it has been tampered with. Covering your tracks is fatal if you want to stay uncaught. Telnetting from a PDA is a pretty fancy way to read your mail or post to newsgroups from a distance. Because GSM phones can only transmit upto 9600 bps you might not want to load up the web.
BLOCK AND UNBLOCK WEBSITES
Many times in schools, colleges & offices surfing some sites like orkut,etc are banned !
To overcome this you can unblock these or block some other websites and play pranks !
Do The Following :
For eg you want to block www.xyz.com !
* Open the folder C:\WINDOWS\system32\drivers\etc
* There you will find a file named HOSTS
* Click on the file and press SHIFT and now right click on it .
* From the right click menu select Open with .
* Now, select Notepad to open the file from the list !
* Now, in the file under the line 127.0.0.1 localhost add another line as 127.0.0.2 www.xyz.com.
* Now, File>>Save !
Now, open your web browser and try openning www.xyz.com , it will not load !
To unblock sites just do the opposite !
Ports Number And Names
List of frequently seen TCP and UDP ports and what they mean. The goal of this port table is to point to further resources for more information.
--------------------------------------------------------------------------------
0
1 tcpmux
3
4
5 rje
7 echo
9 discard
11 systat
13 daytime
15 netstat
17 qotd
18 send/rwp
19 chargen
20 ftp-data
21 ftp
22 ssh, pcAnywhere
23 Telnet
25 SMTP
27 ETRN
29 msg-icp
31 msg-auth
33 dsp
37 time
38 RAP
39 rlp
40
41
42 nameserv, WINS
43 whois, nickname
49 TACACS, Login Host Protocol
50 RMCP, re-mail-ck
53 DNS
57 MTP
59 NFILE
63 whois++
66 sql*net
67 bootps
68 bootpd/dhcp
69 Trivial File Transfer Protocol (tftp)
70 Gopher
79 finger
80 www-http
87
88 Kerberos, WWW
95 supdup
96 DIXIE
98 linuxconf
101 HOSTNAME
102 ISO, X.400, ITOT
105 cso
106 poppassd
109 POP2
110 POP3
111 Sun RPC Portmapper
113 identd/auth
115 sftp
116
117 uucp
118
119 NNTP
120 CFDP
123 NTP
124 SecureID
129 PWDGEN
133 statsrv
135 loc-srv/epmap
137 netbios-ns
138 netbios-dgm (UDP)
139 NetBIOS
143 IMAP
144 NewS
150
152 BFTP
153 SGMP
156
161 SNMP
175 vmnet
177 XDMCP
178 NextStep Window Server
179 BGP
180 SLmail admin
199 smux
210 Z39.50
213
218 MPP
220 IMAP3
256
257
258
259 ESRO
264 FW1_topo
311 Apple WebAdmin
350 MATIP type A
351 MATIP type B
360
363 RSVP tunnel
366 ODMR (On-Demand Mail Relay)
371
387 AURP (AppleTalk Update-Based Routing Protocol)
389 LDAP
407 Timbuktu
427
434 Mobile IP
443 ssl
444 snpp, Simple Network Paging Protocol
445 SMB
458 QuickTime TV/Conferencing
468 Photuris
475
500 ISAKMP, pluto
511
512 biff, rexec
513 who, rlogin
514 syslog, rsh
515 lp, lpr, line printer
517 talk
520 RIP (Routing Information Protocol)
521 RIPng
522 ULS
531 IRC
543 KLogin, AppleShare over IP
545 QuickTime
548 AFP
554 Real Time Streaming Protocol
555 phAse Zero
563 NNTP over SSL
575 VEMMI
581 Bundle Discovery Protocol
593 MS-RPC
608 SIFT/UFT
626 Apple ASIA
631 IPP (Internet Printing Protocol)
635 mountd
636 sldap
642 EMSD
648 RRP (NSI Registry Registrar Protocol)
655 tinc
660 Apple MacOS Server Admin
666 Doom
674 ACAP
687 AppleShare IP Registry
700 buddyphone
705 AgentX for SNMP
901 swat, realsecure
993 s-imap
995 s-pop
999
1024
1025
1050
1062 Veracity
1080 SOCKS
1085 WebObjects
1100
1105
1114
1227 DNS2Go
1234
1243 SubSeven
1338 Millennium Worm
1352 Lotus Notes
1381 Apple Network License Manager
1417 Timbuktu
1418 Timbuktu
1419 Timbuktu
1420
1433 Microsoft SQL Server
1434 Microsoft SQL Monitor
1477
1478
1490
1494 Citrix ICA Protocol
1498
1500
1503 T.120
1521 Oracle SQL
1522
1524
1525 prospero
1526 prospero
1527 tlisrv
1529
1547
1604 Citrix ICA, MS Terminal Server
1645 RADIUS Authentication
1646 RADIUS Accounting
1680 Carbon Copy
1701 L2TP/LSF
1717 Convoy
1720 H.323/Q.931
1723 PPTP control port
1731
1755 Windows Media .asf
1758 TFTP multicast
1761
1762
1808
1812 RADIUS server
1813 RADIUS accounting
1818 ETFTP
1968
1973 DLSw DCAP/DRAP
1975
1978
1979
1985 HSRP
1999 Cisco AUTH
2000
2001 glimpse
2005
2010
2023
2048
2049 NFS
2064 distributed.net
2065 DLSw
2066 DLSw
2080
2106 MZAP
2140 DeepThroat
2301 Compaq Insight Management Web Agents
2327 Netscape Conference
2336 Apple UG Control
2345
2427 MGCP gateway
2504 WLBS
2535 MADCAP
2543 sip
2565
2592 netrek
2727 MGCP call agent
2766
2628 DICT
2998 ISS Real Secure Console Service Port
3000 Firstclass
3001
3031 Apple AgentVU
3052
3128 squid
3130 ICP
3150 DeepThroat
3264 ccmail
3283 Apple NetAssitant
3288 COPS
3305 ODETTE
3306 mySQL
3352
3389 RDP Protocol (Terminal Server)
3520
3521 netrek
3879
4000 icq, command-n-conquer
4045
4144
4242
4321 rwhois
4333 mSQL
4444
47017
4827 HTCP
5000
5001
5002
5004 RTP
5005 RTP
5010 Yahoo! Messenger
5050
5060 SIP
5135
5150
5190 AIM
5222
5353
5400
5500 securid
5501 securidprop
5300
5423 Apple VirtualUser
5555
5556
5631 PCAnywhere data
5632 PCAnywhere
5678
5800 VNC
5801 VNC
5900 VNC
5901 VNC
5843
6000 X Windows
6112 BattleNet
6050
6499
6500
6502 Netscape Conference
6547
6548
6549
6666
6667 IRC
6670 VocalTec Internet Phone, DeepThroat
6699 napster
6776 Sub7
6968
6969
6970 RTP
6971
7000
7007 MSBD, Windows Media encoder
7070 RealServer/QuickTime
7161
7323
7777
7778 Unreal
7640
7648 CU-SeeMe
7649 CU-SeeMe
7654
8000
8002
8010 WinGate 2.1
8080 HTTP
8100
8181 HTTP
8383 IMail WWW
8765
8875 napster
8888 napster
8890
9000
9090
9200
9704
9669
9876
9989
10008 cheese worm
10752
12345
11371 PGP 5 Keyserver
12346
13000
13223 PowWow
13224 PowWow
14000
14237 Palm
14238 Palm
14690
16969
18888 LiquidAudio
21157 Activision
22555
22703
22793
23213 PowWow
23214 PowWow
23456 EvilFTP
26000 Quake
27000
27001 QuakeWorld
27010 Half-Life
27015 Half-Life
27374
27444
27665
27910
27960 QuakeIII
28000
28001
28002
28003
28004
28005
28006
28007
28008
30029 AOL Admin
30100
30101
30102
30103
30303
30464
31335
31337 Back Orifice
32000
32771
32777 rpc.walld
34555
40193 Novell
41524 arcserve discovery
45000 Cisco NetRanger postofficed
50505
52901
54321
61000
65301
Multicast hidden
ICMP Type hidden
9998
32773 rpc.ttdbserverd
32776 rpc.spray
32779 rpc.cmsd
38036 timestep
http://www.iss.net/security_center/advice/...rts/default.htm
WE USE LINKS TO SITES AND NOT DIRECT DOWNLOAD LINKS. THERE NO FILES HOSTED ON OUR SERVER,THEY ARE ONLY INDEXED MUCH LIKE GOOGLEWORKS.
The hosting server or the administrator cannot be held responsible for the contents of any linked sites or any link contained in a linked site, or changes / updates to such sites.
BY ENTERING THIS SITE YOU AGREE TO BE BOUND BY THESE CONDITIONS
If you don't like the software posted here, please don't hesitate to let us know and we will unpost it.