Friday, December 31, 2010

Hide files in an image file

This post shows you how to hide files inside an image file.

1. Open C: Drive and make a folder in it e.g. “geeks”. Put both the files i.e. the file that you want to hide and the image inside which you want to hide the file into this folder

2. Select both the files and make a compressed RAR archive e.g. “secret.rar” out of them

3. Open Run and type in “cmd” to open the Command Prompt. Now type “cd/” and press enter. Now, type “cd geeks” to open the folder (where “geeks” is the folder that I am using in this tutorial)

4. Type the command “
Quote:
copy /b maria.jpg + secret.rar safe.jpg
” and press enter

5.The new picture safe.jpg is now the nested Picture file which has the hidden file saved inside it. Change its extension from .jpg to .rar anytime to access or extract the hidden file.

Tuesday, December 28, 2010

Access Your Folders From Your Taskbar

This is an easy way to get to the folders on your system without having to open a Windows Explorer Window every time you want to access files. I find it very useful to have this feature as it allows me to access my Folders and Drives immediately and saves me a lot of time.

This works in Windows XP:

1. Right Click an empty spot on your Taskbar (Between your Start Button and your System Tray).
2. Click Toolbars.
3. Click New Toolbar.
4. A Small Window will Open that allows you to pick the folder you wish to make a Toolbar. If you want to access your Desktop Without having to minimize all your windows. Just Pick Desktop. If you want to access ONLY your My Documents Folder, Select that. Any folder will work for this.
5. Click OK.
The New Tool bar will appear at the bottom of your screen next to your System Tray.

If you find this to be not useful, Repeat Steps 1 and 2 and then check click the Toolbar you created that has a check mark next to it. And it will disappear.

Change your IP in less than 1 second

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

P.S:
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back

Monday, December 27, 2010

Earthquake in your browser

  Check out these funny trick.
1) Copy and paste the java script code to the address bar of your browser


javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j >
0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-
i,0); } } }} Shw(6) 
 
2) Press enter and watch your window's "shaking it". You can change the value of
i if you wish

Sunday, December 26, 2010

How to back up registry

Before you edit the registry, export the keys in the registry that you plan to edit, or back up the whole registry. If a problem occurs, you can then follow the steps how-to restore the registry to its previous state.

How to Export Registry Keys

Click Start, and then click Run.

In the Open box, type regedit, and then click OK.

On the File menu, click Export.

In the Save in box, select the boxs at the bottom the bottom according to weather you want to export all or only selected branches of the registry.

Next select a location in which to save the backup .reg file. In the File name box, type a file name, and then click Save.

How to Restore the Registry

To restore registry keys that you exported, double-click the .reg file that you saved.

Tracking Email Messages to it's source

Tracking email back to its source: Twisted Evil
because I hate spammers... Evil or Very Mad

Ask most people how they determine who sent them an email message and the response is almost universally, "By the From line." Unfortunately this symptomatic of the current confusion among internet users as to where particular messages come from and who is spreading spam and viruses. The "From" header is little more than a courtesy to the person receiving the message. People spreading spam and viruses are rarely courteous. In short, if there is any question about where a particular email message came from the safe bet is to assume the "From" header is forged.

So how do you determine where a message actually came from? You have to understand how email messages are put together in order to backtrack an email message. SMTP is a text based protocol for transferring messages across the internet. A series of headers are placed in front of the data portion of the message. By examining the headers you can usually backtrack a message to the source network, sometimes the source host. A more detailed essay on reading email headers can be found .

If you are using Outlook or Outlook Express you can view the headers by right clicking on the message and selecting properties or options.

Below are listed the headers of an actual spam message I received. I've changed my email address and the name of my server for obvious reasons. I've also double spaced the headers to make them more readable.


Return-Path: <s359dyxtt@yahoo.com>

X-Original-To: davar@example.com

Delivered-To: davar@example.com

Received: from 12-218-172-108.client.mchsi.com (12-218-172-108.client.mchsi.com [12.218.172.108])
by mailhost.example.com (Postfix) with SMTP id 1F9B8511C7
for <davar@example.com>; Sun, 16 Nov 2003 09:50:37 -0800 (PST)

Received: from (HELO 0udjou) [193.12.169.0] by 12-218-172-108.client.mchsi.com with ESMTP id <536806-74276>; Sun, 16 Nov 2003 19:42:31 +0200

Message-ID: <n5-l067n7z$46-z$-n@eo2.32574>

From: "Maricela Paulson" <s359dyxtt@yahoo.com>

Reply-To: "Maricela Paulson" <s359dyxtt@yahoo.com>

To: davar@example.com

Subject: STOP-PAYING For Your PAY-PER-VIEW, Movie Channels, Mature Channels...isha

Date: Sun, 16 Nov 2003 19:42:31 +0200

X-Mailer: Internet Mail Service (5.5.2650.21)

X-Priority: 3

MIME-Version: 1.0

Content-Type: multipart/alternative; boundary="MIMEStream=_0+211404_90873633350646_4032088448"


According to the From header this message is from Maricela Paulson at s359dyxxt@yahoo.com. I could just fire off a message to abuse@yahoo.com, but that would be waste of time. This message didn't come from yahoo's email service.

The header most likely to be useful in determining the actual source of an email message is the Received header. According to the top-most Received header this message was received from the host 12-218-172-108.client.mchsi.com with the ip address of 21.218.172.108 by my server mailhost.example.com. An important item to consider is at what point in the chain does the email system become untrusted? I consider anything beyond my own email server to be an unreliable source of information. Because this header was generated by my email server it is reasonable for me to accept it at face value.

The next Received header (which is chronologically the first) shows the remote email server accepting the message from the host 0udjou with the ip 193.12.169.0. Those of you who know anything about IP will realize that that is not a valid host IP address. In addition, any hostname that ends in client.mchsi.com is unlikely to be an authorized email server. This has every sign of being a cracked client system.


Here's is where we start digging. By default Windows is somewhat lacking in network diagnostic tools; however, you can use the tools at to do your own checking.

davar@nqh9k:[/home/davar] $whois 12.218.172.108

AT&T WorldNet Services ATT (NET-12-0-0-0-1)
12.0.0.0 - 12.255.255.255
Mediacom Communications Corp MEDIACOMCC-12-218-168-0-FLANDREAU-MN (NET-12-218-168-0-1)
12.218.168.0 - 12.218.175.255

# ARIN WHOIS database, last updated 2003-12-31 19:15
# Enter ? for additional hints on searching ARIN's WHOIS database.

I can also verify the hostname of the remote server by using nslookup, although in this particular instance, my email server has already provided both the IP address and the hostname.

davar@nqh9k:[/home/davar] $nslookup 12.218.172.108

Server: localhost
Address: 127.0.0.1

Name: 12-218-172-108.client.mchsi.com
Address: 12.218.172.108

Ok, whois shows that Mediacom Communications owns that netblock and nslookup confirms the address to hostname mapping of the remote server,12-218-172-108.client.mchsi.com. If I preface a www in front of the domain name portion and plug that into my web browser, http://www.mchsi.com, I get Mediacom's web site.

There are few things more embarrassing to me than firing off an angry message to someone who is supposedly responsible for a problem, and being wrong. By double checking who owns the remote host's IP address using two different tools (whois and nslookup) I minimize the chance of making myself look like an idiot.

A quick glance at the web site and it appears they are an ISP. Now if I copy the entire message including the headers into a new email message and send it to abuse@mchsi.com with a short message explaining the situation, they may do something about it.

But what about Maricela Paulson? There really is no way to determine who sent a message, the best you can hope for is to find out what host sent it. Even in the case of a PGP signed messages there is no guarantee that one particular person actually pressed the send button. Obviously determining who the actual sender of an email message is much more involved than reading the From header. Hopefully this example may be of some use to other forum regulars.

Customize the Navigation pane in windows 7

You can use the navigation pane (the left pane) to find files and folders and display links to frequently used folders and other items. You can also move or copy items to a destination in the navigation pane.
If you don't see the navigation pane on the left side of an open folder window, click Organize, point to Layout, and then click Navigation pane to display it.

To customize the navigation pane in Windows 7

  1. In an open folder or library window, click Organize, and then click Folder and search options.
  2. In the Folder Options dialog box, click the General tab, and then do one or both of the following:
    • To show all the folders on your computer in the navigation pane, including your personal folder, select the Show all folders check box, click Apply to see the change, and then click OK.
    • To automatically expand the navigation pane to the folder that's selected in the folder window, select the Automatically expand to current folder check box, and then click OK.

More ways to customize your favorites in Windows 7

  • To add a folder, a saved search, a library, or even a drive as a favorite, drag it to the Favorites section in the navigation pane. Note: You can’t add individual file to Favorites, but you can add them to any folder in Favorites.
  • To change the order of favorites, drag a favorite to a new position in the list.
  • To restore the default favorites in the navigation pane, right-click Favorites, and then click Restore Favorite Links.
  • To view the folder where your favorites are stored, click Favorites in the navigation pane. Favorites are stored as shortcuts.
  • To remove a favorite, right-click the favorite, and then click Remove. This removes the favorite from the navigation pane—it doesn't delete the files or folders that the shortcut points to.

Saturday, December 25, 2010

Create One-Click Shutdown and Reboot Shortcuts

First, create a shortcut on your desktop by right-clicking on the desktop, choosing New, and then choosing Shortcut. The Create Shortcut Wizard appears. In the box asking for the location of the shortcut, type shutdown. After you create the shortcut, double-clicking on it will shut down your PC.

But you can do much more with a shutdown shortcut than merely shut down your PC. You can add any combination of several switches to do extra duty, like this:

shutdown -r -t 01 -c "Rebooting your PC"
Double-clicking on that shortcut will reboot your PC after a one-second delay and display the message "Rebooting your PC." The shutdown command includes a variety of switches you can use to customize it. Table 1-3 lists all of them and describes their use.

I use this technique to create two shutdown shortcuts on my desktop—one for turning off my PC, and one for rebooting. Here are the ones I use:

shutdown -s -t 03 -c "Bye Bye m8!"
shutdown -r -t 03 -c "Ill be back m8 ;)!"

Switch
What it does

-s
Shuts down the PC.

-l
Logs off the current user.

-t nn
Indicates the duration of delay, in seconds, before performing the action.

-c "messagetext"
Displays a message in the System Shutdown window. A maximum of 127 characters can be used. The message must be enclosed in quotation marks.

-f
Forces any running applications to shut down.

-r
Reboots the PC.

Thursday, December 23, 2010

Deleting System Options from the Start menu

You can actually remove the Find and Run options from the start menu by performing a simple registry hack. Again like always Launch the registry editor and scroll down to the below key:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Right-click on the right pane and select New, DWORD Value. Name it NoFind.(To remove the RUN option name it NoRun). Double-click the newly create DWORD to edit it's value and enter 1 as its value. This will disable the FIND option of the Start Menu and will also disable the default Shortcut key(F3 for Find.)

To restore the Run or find command modify the value of the DWORD to 0 or simply Delete the DWORD value.

Friday, December 17, 2010

Changing Drive Icons

You can easily change the boring yellow folder icons to your own personalized icons. Simply create a text file and copy the following lines into it:

[.ShellClassInfo]

ICONFILE=Drive:PathIcon_name.extension

Save this text file by the name, desktop.ini in the folder, whose icon you want to change. Now to prevent this file from getting deleted change it's attributes to Hidden and Read Only by using the ATTRIB command.

To change the icon of a drive, create a text file containing the following lines:

[Autorun]

ICON=Drive:PathIcon_name.extension

Save this file in the root of the drive whose icon you want to change and name it autorun.inf For Example, if you want to change the icon of a floppy, SAVE THE icon in a:icon_name.ico One can also create a kewl icon for the Hard Disk and create a text file [autorun.inf] and store it in "c:".

Sunday, December 12, 2010

Create a Autorun file for your CD/DVD

If you wanna make a autorun file for that CD you are ready to burn just read this...

1) You open notepad

2) now you writ: [autorun]
OPEN=INSTALL\Setup_filename.EXE
ICON=INSTALL\Setup_filename.EXE

Now save it but not as a .txt file but as a .inf file.

But remember! The "Setup_filename.EXE" MUST be replaced with the name of the setup file. And you also need to rember that it is not all of the setup files there are called '.exe but some are called '.msi

3) Now burn your CD with the autorun .inf file included.

4) Now set the CD in you CD drive and wait for the autorun to begin or if nothing happens just double-click on the CD drive in "This Computer"

Change Windows Startup/Shutdown Music

Bored of hearing the same startup and shutdown music. Let's change it.

Follow The Steps:
1) First you need  a music that you will replace with the default startup music. Remember the music file format must me *.wav  If your music file is different, you need to convert the file to .wav format.

2) Go to C:\WINDOWS\Media\

3) Replace the Windows XP Startup.wav with your wav file. This will change the startup music.

4) To change the shutdown music just replace the Windows XP shutdown.wav with your file.
You can also change the Logon sound and login sound. Just play with those music files.

Friday, December 10, 2010

Remove Windows Messenger

It seems that a lot of people are interested in removing Windows Messenger for some reason, though I strongly recommend against this: In Windows XP, Windows Messenger will be the hub of your connection to the .NET world, and now that this feature is part of Windows, I think we're going to see a lot of .NET Passport-enabled Web sites appearing as well. But if you can't stand the little app, there are a couple of ways to get rid of it, and ensure that it doesn't pop up every time you boot into XP. The best way simply utilizes the previous tip:

If you'd like Windows Messenger to show up in the list of programs you can add and remove from Windows, navigate to C:\WINDOWS\inf (substituting the correct drive letter for your version of Windows) and open sysoc.inf (see the previous tip for more information about this file). You'll see a line that reads:

msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7

Change this to the following and Windows Messenger will appear in Add or Remove Programs, then Add/Remove Windows Components, then , and you can remove it for good:

msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,7

Remove the Shared Documents folders from My Computer

One of the most annoying things about the new Windows XP user interface is that Microsoft saw fit to provide links to all of the Shared Documents folders on your system, right at the top of the My Computer window. I can't imagine why this would be the default, even in a shared PC environment at home, but what's even more annoying is that you cannot change this behavior through the sh*ll
 Those icons are stuck there and you have to live with it.
Until now, that is.

Simply fire up the Registry Editor and navigate to the following key:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ My Computer \ NameSpace \ DelegateFolders

You'll see a sub-key named {59031a47-3f72-44a7-89c5-5595fe6b30ee}. If you delete this, all of the Shared Documents folders (which are normally under the group called "Other Files Stored on This Computer" will be gone.

You do not need to reboot your system to see the change.

Before: A cluttered mess with icons no one will ever use (especially that orpaned one). After: Simplicity itself, and the way it should be by default.

Thursday, December 9, 2010

Change the Boot screen in Win XP

If you would like to change your boot up screen follow the directions below. These instructions assume that you have a place to download the boot screen from the net. If you would like to download a boot screen, visit http://www.themexp.org

1. Backup (copy) the file %windir%\system32\ntoskrnl.exe (most likely C:\windows\system32\ntoskrnl.exe - the boot screen)
2. Download the .zip to your computer (important: make sure to get the right version, XP or XP SP1)
3. Extract ntoskrnl.exe to a directory other than %windir%\system32 (most likely C:\windows\system32)
4. Reboot your computer into Safe Mode (hit F8 before the boot screen) or into true DOS (from a boot disk)
5. Overwrite the file %windir%\system32\ntoskrnl.exe (which should have been backed up) with the extracted exe
6. Reboot your computer as you normally would

Wednesday, December 8, 2010

Create a Password Reset Disk

If you’re running Windows XP Professional as a local user in a workgroup environment, you can create a password reset disk to log onto your computer when you forget your password. To create the disk:

Click Start, click Control Panel, and then click User Accounts.
Click your account name.
Under Related Tasks, click Prevent a forgotten password.

Follow the directions in the Forgotten Password Wizard to create a password reset disk.

Store the disk in a secure location, because anyone using it can access your local user account

Customizing The Shortcut Arrow

All shortcuts have a tiny black arrow attached to it's icon to distinguish from normal files. This arrow can sometimes be pretty annoying and as a Hacker should know how to change each and everything, here goes another trick. Launch the Registry Editor and go to:

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionexplorerShell Icons.

Now, on the right pane is a list of icons ( we found out that on some systems, Windows 98 especially, the right pane is blank. Don't worry, just add the value as required ). Find the value 29. If it isn't there, just add it. The value of this string should be C:Windowssystemshell32.dll, 29 ( which means the 30th icon in shell32.dll - the first one begins with 0 ). Now, we need blank icon to do this. Just create one with white as the whole icon. Go here to learn how to create an icon. Once done just change the value to C:xxx.ico, 0 where "xxx" is the full path of the icon file and "0" is the icon in it.

Now for some fun. If the blank icon is a bit boring, change it again. You will find that under shell32.dll there is a gear icon, a shared folder ( the hand ) and much more. Experiment for yourself!

Tuesday, December 7, 2010

Change Windows XP Home to Windows XP Pro

It sounds pretty simple to do (just some registry changes), but you can’t install Service Pack 2, so you might try to slipstream in the changes to your modified install disc (if that’s even possible).

Alternately, buy XP Pro, or get a Mac.

Code:
    yes indeed, you can’t change an installed Windows but only your Installation CD (or even a recovery CD in case the manufacturer had not left out important parts)

    Here’s the detailed breakdown you asked for.

    1. Copy the root directory and the i386 directory of the WindowsXP CD
    to your harddisk
    2. Extract the Bootsector of your WindowsXP CD
    3. Change 2 Bytes in i386\Setupreg.hiv :
    a) Open Regedit
    b) Highlight HKEY_LOCAL_MACHINE
    c) Menu: File -> Load Structure -> i386\Setupreg.hiv
    d) Assign an arbitrary name to the imported structure e.g. “Homekey”
    e) Goto HKEY_LOCAL_MACHINE\Homekey\ControlSet001\Services\setupdd
    f) edit the binary key “default” and change “01” to “00” and “02” to
    “00”
    g) Highlight “Homekey” and select menu: File -> unload structure
    4. Burn your new XP Pro CD
    5. Install WindowsXP as usual. Your XP Home Key will work.

    Note: You cannot apply SP2 to such a WindowsXP Pro, so step 1.b)
    might be to integrate SP2 in your Installation CD

    Please check the menu-entries as I don’t owe an English copy of
    XP and have to guess them.

Recover most of the scratched CD/DVD

I learn an old thecnique to how to recover damaged or scratched disks with some lost of data. In this case i have one borrowed game - MAX PAYNE 2 with a chunck of 4 mb lost with a scratch in CD1 Install. Here we cover some special thecniques of how to create a full working CD from the scratched one.

First some tools will be needed:
1. Alcohol 120%
2. UltraISO
3. Windows XP/2000 (not tested on 95/98/me)
3. Small piece of cotton
4. Dry cleaner paper
5. Finally, oil for cooking.

First step - preparing the CD


Get the cotton and drop some water, start cleaning vertically the surface of CD. Do it 3 times and dry the water with a piece of dry cleaner paper. With a new piece of cotton, drop some oil for cooking and start to wet the surface like you are washing the CD with the oil. Dry carefully now. Some particles of oil will stay on the microsurface of the scrath. It's okay. Seems the oil helps the laser of the CD/DVD driver to read the surface again. Sure this will work with small unreadable scratchs - some hard scratchs loose parts of the surface of the CD where we have data and it's lost forever. But if it is loosed try anyway. Whith this tip 80% of the small scratched CD's coud be recovered.

Second Step - testing the CD

With Alcohol 120% make an ISO - image making wizard - and lets see if the app can read the loosed surface. In my case Alcohol 120% had recovered 60% of the data. This is not enough. Have tryed other appz, they do not recover all the data. But the CD/DVD driver laser CAN recover all data in this case. the data is still there, what we do?

Third step - making the new CD

With the main copy system of windows explorer you can do it. Just create one folder with the same name of the CD label for future burn reference, and copy the CD content to the folder. When the CD copy process find the scratch, in majority of the cases, it's slow down the reading and will recover ALL loosed data.If not, it just tell you there's an unreadable sector. In this case your CD is lost. But it's not my case, finally windows explorer got all the data from the scratch and made a copy in the folder. with the ultraISO, wrote the original CD label, drop the content of the folder and save as Iso. You can Test the new CD just mounting the iso in the Alcohol 120%. In my case i did ISO of the two discs from MAX PAYNE 2 and tested installing from the mounted ISO. Works like a charm. I got the 4 mb lost again. So, I have burned the CD and now i have a working copy from the scratched one.

Sounds too bizzarre, but works. Course you can jump the cleaning process and try to copy the content with Windows explorer. But in my case did not work without oil...

Monday, December 6, 2010

Overburn a CD with Nero

Start Nero

From the action-bar select File and select Preferences.

In the Preferences window, select Expert Features(1) and check the Enable overburn disc-at-once(2).

Choose a Maximum CD Length(3) and click OK(4) (*82:59:59 is the maximum value I suggest, but as you can see from the screen capture above I have set mine significantly higher. The reason is because I frequently use 99min 850 MB CD media).

For a more accurate test you can use a nero tool called nero speed test to see how much a specific CD is capable of being overburned . get it here

From the action-bar select File and select Write CD.

A window will appear when you have exceeded expected length, click OK to start the overburn copy.

Remember to set disk to burn Disc at Once, you cannot overburn in Track at Once Mode.

Sunday, December 5, 2010

Disabling Display of Drives in My Computer

This is yet another trick you can play on your geek friend. To disable the display of local or networked drives when you click My Computer go to :

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Now in the right pane create a new DWORD item and name it NoDrives. Now modify it's value and set it to 3FFFFFF (Hexadecimal) Now press F5 to refresh. When you click on My Computer, no drives will be shown. To enable display of drives in My Computer, simply delete this DWORD item. It's .reg file is as follows:

REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]

"NoDrives"=dword:03ffffff

Saturday, December 4, 2010

Exiting Windows the Cool and Quick Way

Normally it takes a hell lot of time just Shutting down Windows, you have to move your mouse to the Start Button, click on it, move it again over Shut Down, click, then move it over the necessary option and click, then move the cursor over the OK button and once again (you guessed it) click.This whole process can be shortened by creating shortcuts on the Desktop which will shut down Windows at the click of a button. Start by creating a new shortcut( right click and select New> Shortcut). Then in the command line box, type (without the quotes.)

'C:\windows\rundll.exe user.exe,exitwindowsexec'

This Shortcut on clicking will restart Windows immediately without any Warning. To create a Shortcut to Restarting Windows, type the following in the Command Line box:

'c:\windows\rundll.exe user.exe,exitwindows'

This Shortcut on clicking will shut down Windows immediately without any Warning.

Friday, December 3, 2010

Unblock the blocked task manager

  • Click Start, Run and type Regedit.exe
  • Navigate to the following branch:
HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies\ System
  • In the right-pane, delete the value named DisableTaskMgr
  • Close Regedit.exe

 Using Group Policy Editor - for Windows XP Professional

  • Click Start, Run, type gpedit.msc and click OK.
  • Navigate to this branch:
User Configuration / Administrative Templates / System / Ctrl+Alt+Delete Options / Remove Task Manager
  • Double-click the Remove Task Manager option.
  • Set the policy to Not Configured.

Getting Older Programs to run in Windows XP

A Most programs run properly on Windows XP. The exceptions are some older games and other programs that were written specifically for an earlier version of Windows. To run your program on Windows XP, you can try the following, Run the Program Compatibility Wizard. As an alternative, you can set the compatibility properties manually. Update your program, drivers, or hardware. These options are covered in detail below.

The Program Compatibility Wizard

This wizard prompts you to test your program in different modes (environments) and with various settings. For example, if the program was originally designed to run on Windows 95, set the compatibility mode to Windows 95 and try running your program again. If successful, the program will start in that mode each time. The wizard also allows you to try different settings, such as switching the display to 256 colors and the screen resolution to 640 x 480 pixels. If compatibility problems prevent you from installing a program on Windows XP, run the Program Compatibility Wizard on the setup file for the program. The file may be called Setup.exe or something similar, and is probably located on the Installation disc for the program. To run the Program Compatibility Wizard click Start, click Help and Support, click Find compatible hardware and software for Windows XP, and then, under See Also in the navigation pane, click "Program Compatibility Wizard."

Set the compatibility properties manually
As an alternative to running the Program Compatibility Wizard, you can set the compatibility properties for a program manually. The settings are the same as the options in the Program Compatibility Wizard. To set the compatibility properties for a program manually Right-click the program icon on your desktop or the shortcut on the Start menu for the program you want to run, and then click Properties. Click the Compatibility tab, and change the compatibility settings for your program.

The Compatibility tab is only available for programs installed on your hard drive. Although you can run the Program Compatibility Wizard on programs or setup files on a CD-ROM or floppy disk, your changes will not remain in effect after you close the program. For more information about an option on the Compatibility tab, right-click the option and then click "What's This."

Update your program or drivers
If your program does not run correctly after testing it with the Program Compatibility Wizard, check the Web for updates or other fixes, as follows:

Check the Web site of the program's manufacturer to see if an update or patch is available.
Check Windows Update to see if a fix is available for the program.
Click Home on the menu bar of Help and Support Center, then click Windows Update in the right pane.

If the program is a game that uses DirectX, ensure that you are using the latest version of DirectX. In addition, check the Web site of the manufacturer of your video card or sound card to see if newer drivers are available for either of them.

Evolution of Virus - History of virus - Part 1

Like any other field in computer science, viruses have evolved -a great deal indeed- over the years. In the series of press releases which start today, we will look at the origins and evolution of malicious code since it first appeared up to the present.

Going back to the origin of viruses, it was in 1949 that Mathematician John Von Neumann described self-replicating programs which could resemble computer viruses as they are known today. However, it was not until the 60s that we find the predecessor of current viruses. In that decade, a group of programmers developed a game called Core Wars, which could reproduce every time it was run, and even saturate the memory of other players’ computers. The creators of this peculiar game also created the first antivirus, an application named Reeper, which could destroy copies created by Core Wars.

However, it was only in 1983 that one of these programmers announced the existence of Core Wars, which was described the following year in a prestigious scientific magazine: this was actually the starting point of what we call computer viruses today.

At that time, a still young MS-DOS was starting to become the preeminent operating system worldwide. This was a system with great prospects, but still many deficiencies as well, which arose from software developments and the lack of many hardware elements known today. Even like this, this new operating system became the target of a virus in 1986: Brain, a malicious code created in Pakistan which infected boot sectors of disks so that their contents could not be accessed. That year also saw the birth of the first Trojan: an application called PC-Write.

Shortly after, virus writers realized that infecting files could be even more harmful to systems. In 1987, a virus called Suriv-02 appeared, which infected COM files and opened the door to the infamous viruses Jerusalem or Viernes 13. However, the worst was still to come: 1988 set the date when the “Morris worm” appeared, infecting 6,000 computers.

From that date up to 1995 the types of malicious codes that are known today started being developed: the first macro viruses appeared, polymorphic viruses … Some of these even triggered epidemics, such as MichaelAngelo. However, there was an event that changed the virus scenario worldwide: the massive use of the Internet and e-mail. Little by little, viruses started adapting to this new situation until the appearance, in 1999, of Melissa, the first malicious code to cause a worldwide epidemic, opening a new era for computer viruses.

Wednesday, December 1, 2010

Speed up Mozilla Firefox

Steps:
1. Type "about :config" in the adress field.
2. Set the value of network.http.pipelining to "true".
3. Set the value of network.http.pipelining.maxrequests to "100".
4. Set the value of network.http.proxy.pipelining to "true"
5. Set the value of nglayout.initialpaint.delay to "0" (not availible in newer versions)