When there is less physical memory than needed, then some virtual memory (Virtual RAM) is created on the disk. When there is a limit set to the size of Virtual Memory usage and there is not enough of it present there is a warning that frequently comes “Virtual Memory too low”.
Solution 1 :-
This problem occurs when physical RAM + Virtual RAM (usually created on hard disk) together are not sufficient to take care of the currently needed RAM size, or this situation is about to arise. This usually happens when some fixed upper limit for Virtual Memory has been set. To solve this problem, you can either upgrade you physical RAM on your computer (recommended), or you can set the Virtual Memory to system managed size or you can do both. Setting Virtual Memory to system managed size means windows will set it to higher size whenever needed automatically, for this,
Right click on My Computer --> goto Properties, goto Advanced tab, click on Performance Settings, now click on Advanced, now click on Change button for Virtual memory.
On this screen select the System Managed Size, press OK. After this re-start your computer. This will solve the virtual memory too low problem.
Solution 2 :-
Recommended solution is to upgrade your physical memory (RAM) according to requirements of the kind of applications that you run on your computer. If you upgrade RAM or not, the following procedure will help prevent this warning by increasing the virtual memory limit.
Right click on My Computer icon and click Properties.
This will show system properties window. Click on a Advanced tab and click on the Settings button under heading Performance.
This will open Performance options window. Click on Advanced tab and click on Change button under heading Virtual Memory.
Check if the space available is set to some custom value or double the RAM size ? If it is not double the RAM memory size , then select the size option set the virtual memory size double the RAM Size and press set button and press OK button.
Restart the computer.
Thursday, July 2, 2009
Virtual Memory too low Warning Trouble in Win XP and Vista
Posted by
F u N n Y G u Y
at
9:55 PM
Labels:
Virtual Memory too low Warning Trouble in Win XP and Vista


No0bz guide to Internet slang phrases (woot,bump)
Recently i had seen many people asking whats da meaning of dis and that.i.e woot,lmao,etc,etc...So i decided to post dis topic...Hope dis helps..Plz post
u comments
Quote:
Warning!:Some words may be offensive
0-9
1337 (written in ASCII) - From the word Leet, derived from the word elite
2 - too, or to
4 - For
A
AFAICR/S/T - As far as I can recall / remember / see / tel
AFAIK - As far as I know
AFK - Away from keyboard
ANFSCD - And Now For Something Completely Different. Used to change the subject of conversation.
ASAP - As soon as possible
ASL - Age / sex / location
ATEOTD - At The End of the Day
ATM - At the moment
AWOL - Absent Without (Official) Leave
AYBABTU (also abbreviated as AYB) - All your base are belong to us (from the video game Zero Wing)
B
B2B - Business to Business
B& and/or B7- Banned
BBIAB - Be back in a bit
BBL/S - Be back later / shortly / soon
BCNU - Be seein' you
Blog - Also known as web log or an online journal
BOFH - ~censored~ operator from hell
Bot - Any type of automated software in chatrooms and web-cataloging software
BRB - Be right back
BSOD - Blue Screen of Death
BTDT - Been there done that
BTW - By the way
Bump - Increment (For example, C's ++ operator.)or a backronym for "Bring Up My Post"
C
Crawl - To retrieve a web page along with the hyperlinks that reference it
Crapplet - A poorly written computer application
CU - See you (later)
CYA - See ya OR Cover Your Ass
Cyber (prefix) - A term used to connect the subsequent word loosely to the world of computers or the Internet or sex over a computer
Cyberspace - Virtual reality, the Internet, the World Wide Web, and other kinds of computer systems. Science fiction author William Gibson popularized the term in his novel Neuromancer. Gibson used the word to describe a virtual world of computer networks that his cyberpunk heroes 'jacked into'
D
DFTT - Don't feed the trolls
DGAF - Don't Give A ~censored~
DIAF - Die in a fire
DILLIGAF/D/S - Does it look like I give a flip / ~censored~ / damn / shit
DND - Do not disturb
DOA - Dead on arrival. Refers to hardware that is broken on delivery.
E
EOF - End Of File
EOM - End of Message
EOL - End of Life. Device or hardware that is at the end of its product life cycle.
EQ - EverQuest
ETA - Estimated time of arrival
F
FAQ - Frequently Asked Question(s)
FFS - For ~censored~'s sake
Flamer - Someone who makes inflammatory, abusive or directly offensive comments. Similar to, but not quite the same as an Internet troll[3]
FMCDH - From My Cold Dead Hands
FOAD - ~censored~ off and die
FOAF - Friend of a friend
FTL - For the loss
FTW - For the win
FU - ~censored~ you
FUBAR - ~censored~ up beyond all recognition / repair (from military slang; pronounced "foo-bar")
FUD - Fear, Uncertainty and Doubt (the purposeful spread of misinformation)
FWIW - For what it's worth
FYI - For your information
G
GBTW - Get back to work
GF - Great/good fight/girlfriend
GFU - Good for you
GFY - Go ~censored~ yourself
GG - Good game, used at or near the conclusion of a gaming match
GJ - Good job, often used in online gaming when a teammate performs an act benefitting his team, such as killing an opponent or enabling that kill
GMTA - Great minds think alike
Godwin's Law - Dictates that the longer a thread, the more likely someone will post a comparison involving Nazis or Hitler
Gratz - Congratulations
GTFO - Get the ~censored~ out
GTG or G2G - 'Got to go' or 'Good to go'
GR -Good Race
GR8 - Great
H
HAND - Have A Nice Day
Handle - Name used in online chat, (AKA nick(name), alias, screen/user name)
HF - Have fun
Haxor or H4x0r (1337) - Hacker
Hit - A request made to the web server, (noun) the results of an internet search, (verb) loading a Web page. Hits are not equivalent to visitors of a webpage.
Home page - The website's introduction page, starting point, and guide. The technical term is "index"
Hot list - A collection of publicly available URLs (World Wide Web site addresses), sometimes available as text files.
HTH - Hope this / that helps
H8 - Hate
I
IANAL - I am not a lawyer
IBTL - In before the lock
IDC - I don't care
IDK - I don't know
IIRC - If I recall / remember correctly
IIUC - If I understand correctly
IMO/IMHO/IMNSHO/IMAO - In my (humble / honest / not so humble / arrogant) opinion
Information superhighway - The Internet (AKA: I-way, infobahn)
IONO - I don't know
IOW - In other words
IRC - Internet Relay Chat
IRL - In real life
ITYM - I Think You Mean
IWSN - I want sex now
IYKWIM - If you know what I mean
J
Jaggy - Aliased computer graphics
JK or j/k - Just kidding, or joke
JFGI - Just ~censored~/Freaking Google It
K
k or kk - OK
KISS - Keep it simple stupid.
KS(ing) - Kill-Steal(ing)
KOS - Kill on sight
KTHX - OK, thanks
KTHXBAI or KTHXBYE - OK, thanks, goodbye, used either to cut short a conversation or to express displeasure with being cut short
L
L2P - Learn to play; an admonishment to MMORPG players who are incompetent and/or whine
L8R - Later, L8R also sometimes abbreviated as L8ER is commonly used in chat rooms and other text based communications as a way of saying good bye.
Lag - Slang term for slow Internet speeds or high Internet latency; Lag is sometimes due to a server problem, but more frequently due to the connection between client and server. A slow or intermittent connection may often be referred to as laggy
Lamer - A know-nothing, one who is lame.
Leet - Often spelled as l33t or 1337 in ASCII form. It originally meant elite
LFG - Looking for group
LFM - Looking for more
LM(F)AO - Laughing my (frigging) ass off
LMIRL - Let's meet in real life.
LMK - Let me know
LOL - Laughing out loud, laugh out loud
LTNS - Long time no see
Lurker - Someone who frequents a Usenet group without participating in discussions
M
MMORPG, MMO - Massive Multi-player Online Role Playing Game
MMOFPS - Massive Multi-player Online First Person Shooter
MOTD - Message of the day
MS - MapleStory, an MMORPG
MTFBWY - May The Force be with you
MUD - Multi-User Dungeon
MUSH - Multi-User Shared Hallucination
MYOB - Mind your own business
M8 - Mate
N
NE1 - "Anyone"
NFI - "No ~censored~ Idea"
Newbie, noob, or n00b - An inexperienced user of a system or game,or an annoying person.
NIFOC - Naked In Front Of Computer
NM - (Sometimes written N/M) Not much, Never mind or no message, used on message boards or in e-mails to indicate that everything is already said in the subject line.
NP - No problem
NSFW - Not safe for work. Warning about content that may get the viewer in trouble with his employer or co-workers.
NVM, NVMD, or nm - Nevermind, not much
O
O RLY - Oh really?
OIC - Oh, I see
OFN - Old ~censored~ news
OMG - Oh my god
OMFG - Oh my ~censored~ god
OMW - On my way or Oh my word
OP - Original poster / Operator / Outpost
OS - Operating system
OT - Off topic
OTOH - On the other hand
OTP - On the phone or One true pairing
P
P2P - Peer to peer, or pay to play
PAW - Parents are watching
PEBKAC/PEBCAK - Problem exists between keyboard and chair
Ping - From the popular network monitoring tool, used as a greeting similar to "Are you there?".
PITA - Pain in the arse / ass
PLMK - Please let me know
PMSL - Pissing myself laughing
POS - Piece of shit, or parent over shoulder.
POTS - Plain old telephone service
POV - Point of view
PPL - People
PTKFGS - Punch the Keys For God's Sake
pr0n - Intentional misspelling of porn
PW - Persistent World (gaming)
pwned - Intentional misspelling of owned
Q
QFT - Quoted for truth. Used on internet message boards to show agreement from a previous message
R
Rehi (or merely re) - Hello again
RL - Real Life[3]
RO(T)FL - Rolling on (the) floor laughing
RO(T)FLMAO - Rolling on (the) floor laughing my ass off
RO(T)FLOL - Rolling on (the) floor laughing out loud
RSN - Real soon now (used sarcastically)
RTFB - Read the ~censored~ binary (or book)
RTFS - Read the ~censored~ source
RTFM/RTM - Read the (~censored~) manual
S
SCNR - Sorry, could not resist
sk8/sk8r - skate/skater
Smiley - Another name for emoticons
SMH - Shaking my head
SNAFU - Situation normal: all (~censored~/[3]fouled) up
Snail mail - Normal paper mail service
SOHF - Sense of humor failure
Spider - The program behind a search engine
STFU - Shut the ~censored~ up
STFW - Search the ~censored~ web
T
TANSTAAFL - There ain't no such thing as a free lunch
TBF - Time between failures
TBH - To be honest
TG - That's great
TGIF - Thank god it's Friday
TH(N)X, TNX or TX - Thanks
TIA - Thanks in advance
TINC - There Is No Cabal, a term discouraging conspiracy theories
TMI - Too much information
TOS - Terms of service
TTBOMK - To the best of my knowledge
TTFN - Ta ta for now
TTT - To the top, used in forums to bump a thread
TTYL - Talk to you later (also spelled TTUL, T2UL or T2YL)
TTYTT - To Tell You The Truth
Tweedler - One who has deep love for all computer related technology and gadgets
TWIMC - To Whom It May Concern
TY - Thank you
TYT - Take your time
TYVM - Thank you very much
U
U - You
UTFSE - Use the ~censored~ search engine
V
W
w00t, w00T or WOOT - First two express exuberance, the latter is a backronym for the term "We Own the Other Team".
W/ or W/O - With or without
WB - Welcome back
W/E - Whatever
WRT - With respect / regard to
WTB - Want to buy
WTF - What the ~censored~
WTG - Way to go
WTH - What the hell
WTS - Want to sell
WTT - Want to trade
WUG - What you got?
WoW - World of Warcraft (game)
WUBU2 - What (have) you been up to?
WUU2 - What (are) you up to?
WYSIWYG - What you see is what you get
W8 - Wait
Y
YARLY - Yeah Really
YHBT - You have been trolled
YKW - You know what?
YMMV - Your mileage may vary.
YTMND - You're The Man Now, Dog
YW - You're welcome.
YOYO- You're On Your Own.
Z
ZOMG - An intentional misspelling of the acronym shorthand for "Oh My God/Gawd" and pronounced "Zoh My God/Gawd" This version is mainly used in jest or to ridicule people who use abbreviations like OMG and OMFG
u comments
Quote:
Warning!:Some words may be offensive
0-9
1337 (written in ASCII) - From the word Leet, derived from the word elite
2 - too, or to
4 - For
A
AFAICR/S/T - As far as I can recall / remember / see / tel
AFAIK - As far as I know
AFK - Away from keyboard
ANFSCD - And Now For Something Completely Different. Used to change the subject of conversation.
ASAP - As soon as possible
ASL - Age / sex / location
ATEOTD - At The End of the Day
ATM - At the moment
AWOL - Absent Without (Official) Leave
AYBABTU (also abbreviated as AYB) - All your base are belong to us (from the video game Zero Wing)
B
B2B - Business to Business
B& and/or B7- Banned
BBIAB - Be back in a bit
BBL/S - Be back later / shortly / soon
BCNU - Be seein' you
Blog - Also known as web log or an online journal
BOFH - ~censored~ operator from hell
Bot - Any type of automated software in chatrooms and web-cataloging software
BRB - Be right back
BSOD - Blue Screen of Death
BTDT - Been there done that
BTW - By the way
Bump - Increment (For example, C's ++ operator.)or a backronym for "Bring Up My Post"
C
Crawl - To retrieve a web page along with the hyperlinks that reference it
Crapplet - A poorly written computer application
CU - See you (later)
CYA - See ya OR Cover Your Ass
Cyber (prefix) - A term used to connect the subsequent word loosely to the world of computers or the Internet or sex over a computer
Cyberspace - Virtual reality, the Internet, the World Wide Web, and other kinds of computer systems. Science fiction author William Gibson popularized the term in his novel Neuromancer. Gibson used the word to describe a virtual world of computer networks that his cyberpunk heroes 'jacked into'
D
DFTT - Don't feed the trolls
DGAF - Don't Give A ~censored~
DIAF - Die in a fire
DILLIGAF/D/S - Does it look like I give a flip / ~censored~ / damn / shit
DND - Do not disturb
DOA - Dead on arrival. Refers to hardware that is broken on delivery.
E
EOF - End Of File
EOM - End of Message
EOL - End of Life. Device or hardware that is at the end of its product life cycle.
EQ - EverQuest
ETA - Estimated time of arrival
F
FAQ - Frequently Asked Question(s)
FFS - For ~censored~'s sake
Flamer - Someone who makes inflammatory, abusive or directly offensive comments. Similar to, but not quite the same as an Internet troll[3]
FMCDH - From My Cold Dead Hands
FOAD - ~censored~ off and die
FOAF - Friend of a friend
FTL - For the loss
FTW - For the win
FU - ~censored~ you
FUBAR - ~censored~ up beyond all recognition / repair (from military slang; pronounced "foo-bar")
FUD - Fear, Uncertainty and Doubt (the purposeful spread of misinformation)
FWIW - For what it's worth
FYI - For your information
G
GBTW - Get back to work
GF - Great/good fight/girlfriend
GFU - Good for you
GFY - Go ~censored~ yourself
GG - Good game, used at or near the conclusion of a gaming match
GJ - Good job, often used in online gaming when a teammate performs an act benefitting his team, such as killing an opponent or enabling that kill
GMTA - Great minds think alike
Godwin's Law - Dictates that the longer a thread, the more likely someone will post a comparison involving Nazis or Hitler
Gratz - Congratulations
GTFO - Get the ~censored~ out
GTG or G2G - 'Got to go' or 'Good to go'
GR -Good Race
GR8 - Great
H
HAND - Have A Nice Day
Handle - Name used in online chat, (AKA nick(name), alias, screen/user name)
HF - Have fun
Haxor or H4x0r (1337) - Hacker
Hit - A request made to the web server, (noun) the results of an internet search, (verb) loading a Web page. Hits are not equivalent to visitors of a webpage.
Home page - The website's introduction page, starting point, and guide. The technical term is "index"
Hot list - A collection of publicly available URLs (World Wide Web site addresses), sometimes available as text files.
HTH - Hope this / that helps
H8 - Hate
I
IANAL - I am not a lawyer
IBTL - In before the lock
IDC - I don't care
IDK - I don't know
IIRC - If I recall / remember correctly
IIUC - If I understand correctly
IMO/IMHO/IMNSHO/IMAO - In my (humble / honest / not so humble / arrogant) opinion
Information superhighway - The Internet (AKA: I-way, infobahn)
IONO - I don't know
IOW - In other words
IRC - Internet Relay Chat
IRL - In real life
ITYM - I Think You Mean
IWSN - I want sex now
IYKWIM - If you know what I mean
J
Jaggy - Aliased computer graphics
JK or j/k - Just kidding, or joke
JFGI - Just ~censored~/Freaking Google It
K
k or kk - OK
KISS - Keep it simple stupid.
KS(ing) - Kill-Steal(ing)
KOS - Kill on sight
KTHX - OK, thanks
KTHXBAI or KTHXBYE - OK, thanks, goodbye, used either to cut short a conversation or to express displeasure with being cut short
L
L2P - Learn to play; an admonishment to MMORPG players who are incompetent and/or whine
L8R - Later, L8R also sometimes abbreviated as L8ER is commonly used in chat rooms and other text based communications as a way of saying good bye.
Lag - Slang term for slow Internet speeds or high Internet latency; Lag is sometimes due to a server problem, but more frequently due to the connection between client and server. A slow or intermittent connection may often be referred to as laggy
Lamer - A know-nothing, one who is lame.
Leet - Often spelled as l33t or 1337 in ASCII form. It originally meant elite
LFG - Looking for group
LFM - Looking for more
LM(F)AO - Laughing my (frigging) ass off
LMIRL - Let's meet in real life.
LMK - Let me know
LOL - Laughing out loud, laugh out loud
LTNS - Long time no see
Lurker - Someone who frequents a Usenet group without participating in discussions
M
MMORPG, MMO - Massive Multi-player Online Role Playing Game
MMOFPS - Massive Multi-player Online First Person Shooter
MOTD - Message of the day
MS - MapleStory, an MMORPG
MTFBWY - May The Force be with you
MUD - Multi-User Dungeon
MUSH - Multi-User Shared Hallucination
MYOB - Mind your own business
M8 - Mate
N
NE1 - "Anyone"
NFI - "No ~censored~ Idea"
Newbie, noob, or n00b - An inexperienced user of a system or game,or an annoying person.
NIFOC - Naked In Front Of Computer
NM - (Sometimes written N/M) Not much, Never mind or no message, used on message boards or in e-mails to indicate that everything is already said in the subject line.
NP - No problem
NSFW - Not safe for work. Warning about content that may get the viewer in trouble with his employer or co-workers.
NVM, NVMD, or nm - Nevermind, not much
O
O RLY - Oh really?
OIC - Oh, I see
OFN - Old ~censored~ news
OMG - Oh my god
OMFG - Oh my ~censored~ god
OMW - On my way or Oh my word
OP - Original poster / Operator / Outpost
OS - Operating system
OT - Off topic
OTOH - On the other hand
OTP - On the phone or One true pairing
P
P2P - Peer to peer, or pay to play
PAW - Parents are watching
PEBKAC/PEBCAK - Problem exists between keyboard and chair
Ping - From the popular network monitoring tool, used as a greeting similar to "Are you there?".
PITA - Pain in the arse / ass
PLMK - Please let me know
PMSL - Pissing myself laughing
POS - Piece of shit, or parent over shoulder.
POTS - Plain old telephone service
POV - Point of view
PPL - People
PTKFGS - Punch the Keys For God's Sake
pr0n - Intentional misspelling of porn
PW - Persistent World (gaming)
pwned - Intentional misspelling of owned
Q
QFT - Quoted for truth. Used on internet message boards to show agreement from a previous message
R
Rehi (or merely re) - Hello again
RL - Real Life[3]
RO(T)FL - Rolling on (the) floor laughing
RO(T)FLMAO - Rolling on (the) floor laughing my ass off
RO(T)FLOL - Rolling on (the) floor laughing out loud
RSN - Real soon now (used sarcastically)
RTFB - Read the ~censored~ binary (or book)
RTFS - Read the ~censored~ source
RTFM/RTM - Read the (~censored~) manual
S
SCNR - Sorry, could not resist
sk8/sk8r - skate/skater
Smiley - Another name for emoticons
SMH - Shaking my head
SNAFU - Situation normal: all (~censored~/[3]fouled) up
Snail mail - Normal paper mail service
SOHF - Sense of humor failure
Spider - The program behind a search engine
STFU - Shut the ~censored~ up
STFW - Search the ~censored~ web
T
TANSTAAFL - There ain't no such thing as a free lunch
TBF - Time between failures
TBH - To be honest
TG - That's great
TGIF - Thank god it's Friday
TH(N)X, TNX or TX - Thanks
TIA - Thanks in advance
TINC - There Is No Cabal, a term discouraging conspiracy theories
TMI - Too much information
TOS - Terms of service
TTBOMK - To the best of my knowledge
TTFN - Ta ta for now
TTT - To the top, used in forums to bump a thread
TTYL - Talk to you later (also spelled TTUL, T2UL or T2YL)
TTYTT - To Tell You The Truth
Tweedler - One who has deep love for all computer related technology and gadgets
TWIMC - To Whom It May Concern
TY - Thank you
TYT - Take your time
TYVM - Thank you very much
U
U - You
UTFSE - Use the ~censored~ search engine
V
W
w00t, w00T or WOOT - First two express exuberance, the latter is a backronym for the term "We Own the Other Team".
W/ or W/O - With or without
WB - Welcome back
W/E - Whatever
WRT - With respect / regard to
WTB - Want to buy
WTF - What the ~censored~
WTG - Way to go
WTH - What the hell
WTS - Want to sell
WTT - Want to trade
WUG - What you got?
WoW - World of Warcraft (game)
WUBU2 - What (have) you been up to?
WUU2 - What (are) you up to?
WYSIWYG - What you see is what you get
W8 - Wait
Y
YARLY - Yeah Really
YHBT - You have been trolled
YKW - You know what?
YMMV - Your mileage may vary.
YTMND - You're The Man Now, Dog
YW - You're welcome.
YOYO- You're On Your Own.
Z
ZOMG - An intentional misspelling of the acronym shorthand for "Oh My God/Gawd" and pronounced "Zoh My God/Gawd" This version is mainly used in jest or to ridicule people who use abbreviations like OMG and OMFG
How to Backup the registry
Click Start, then click Run. The Run dialog box appears.
In the Open box, type regedit, then press ENTER. The Registry Editor appears.
Do one of the following:
To backup the entire registry, click My Computer.
To backup a specific group of keys or a specific key, click the folder or key.
On the main menu, click File, then click Export. The Export Registry File dialog box appears.
Specify a name and location for the file, then click Save. The export process begins.
If you are exporting the entire registry, it can take a few minutes, and the file size can be up to 100 MB or more. If you are exporting just one key, the file size is approximately 1 KB.
After you edit the registry, if you are experiencing problems caused by editing the registry, you can import the backed up file:
On the main menu, click File, then click Import. The Import Registry File dialog box appears.
Click the .reg file to import, then click Open. The import process begins. If you are importing the entire registry, it can take a few minutes.
In the Open box, type regedit, then press ENTER. The Registry Editor appears.
Do one of the following:
To backup the entire registry, click My Computer.
To backup a specific group of keys or a specific key, click the folder or key.
On the main menu, click File, then click Export. The Export Registry File dialog box appears.
Specify a name and location for the file, then click Save. The export process begins.
If you are exporting the entire registry, it can take a few minutes, and the file size can be up to 100 MB or more. If you are exporting just one key, the file size is approximately 1 KB.
After you edit the registry, if you are experiencing problems caused by editing the registry, you can import the backed up file:
On the main menu, click File, then click Import. The Import Registry File dialog box appears.
Click the .reg file to import, then click Open. The import process begins. If you are importing the entire registry, it can take a few minutes.
Tips and tricks For mobile
Call Diverting
All
To Activate: * * 21 * NUMBER # [SEND]
To Cancel: # # 21 # [SEND]
To Check: * # 21 # [SEND]
No Answer
To Activate: * * 61 * NUMBER # [SEND]
To Cancel: # # 61 # [SEND]
To Check: * # 61 # [SEND]
Unreachable
To Activate: * * 62 * NUMBER # [SEND]
To Cancel: # # 62 # [SEND]
To Check: * # 62 # [SEND]
Busy
To Activate: * * 67 * NUMBER # [SEND]
To Cancel: # # 67 # [SEND]
To Check: * # 67 # [SEND]
To Cancel All Call Forwarding # # 002 # [SEND]
Diverting Data Calls
All
To Activate: * * 21 * NUMBER * 25 # [SEND]
To Cancel: # # 21 # * 25 [SEND]
To Check Status: * # 21 # * 25 # [SEND]
No Answer
To Activate: * * 61 * NUMBER * 25 # [SEND]
To Cancel: # # 61 * 25 # [SEND]
To Check Status: * # 61 # * 25 # [SEND]
Unreachable
To Activate: * * 62 * NUMBER * 25 # [SEND]
To Cancel: # # 62 # * 25 # [SEND]
To Check Status: * # 62 # * 25 # [SEND]
Busy
To Activate: * * 67 * NUMBER * 25 # [SEND]
To Cancel: # # 67 # * 25 # [SEND]
To Check Status: * # 67 # * 24 # [SEND]
Diverting Fax Calls
All
To Activate: * * 21 * NUMBER * 13 #[SEND]
To Cancel: # # 21 # * 13 # [SEND]
To Check Status: * # 21 # * 13 # [SEND]
No Answer
To Activate: * * 61 * NUMBER * 13 # [SEND]
To Cancel: # # 61 * 13 # [SEND]
To Check Status: * # 61 # * 13 # [SEND]
Unreachable
To Activate: * * 62 * NUMBER * 13 # [SEND]
To Cancel: # # 62 # * 13 # [SEND]
To Check Status: * # 62 # * 13 # [SEND]
Busy
To Activate: * * 67 * NUMBER * 13 # [SEND]
To Cancel: # # 67 # * 13 # [SEND]
To Check Status: * # 67 # * 13 #[SEND]
Call Barring
Before you can activate these barring services you will need a barring code from your service provider. Call Barring can not be activated if Call Forwarding diverts are already in use.
All Calls
To Activate: * 330 * BARRING CODE # [SEND]
To Cancel: # 330 * BARRING CODE # [SEND]
To Check: * # 330 # [SEND]
All Outgoing Calls
To Activate: * 333 * BARRING CODE # [SEND]
To Cancel: # 333 * BARRING CODE # [SEND]
To Check: * # 333 # [SEND]
All Incoming Calls
To Activate: * 353 * BARRING CODE # [SEND]
To Cancel: # 353 * BARRING CODE # [SEND]
To Check: * # 353 # [SEND]
All Outgoing Calls
To Activate: * 33 * BARRING CODE# [SEND]
To Cancel: # 33 * BARRING CODE # [SEND]
To Check: * # 33 # [SEND]
All Outgoing International Calls
To Activate: * 331 * BARRING CODE# [SEND]
To Cancel: # 331 * BARRING CODE # [SEND]
To Check: * # 331 # [SEND]
All Outgoing International Calls Except To Home Country
To Activate: * 332 * BARRING CODE# [SEND]
To Cancel: # 332 * BARRING CODE # [SEND]
To Check: * # 332 # [SEND]
All Incoming Calls
To Activate: * 35 * BARRING CODE # [SEND]
To Cancel: # 35 * BARRING CODE # [SEND]
To Check: * # 35 # [SEND]
All Incoming Calls When Outside Home Country
To Activate: * 351 * BARRING CODE # [SEND]
To Cancel: # 351 * BARRING CODE # [SEND]
To Check: * # 351 # [SEND]
Canceling All Call Barring # 330 * BARRING CODE # [SEND]
Call Waiting
To Activate: * 43 # [SEND]
To Deactivate: # 43 # [SEND]
To Check: * # 43 # [SEND]
Calling Line Identity
Outgoing
To Activate: * 31 # [SEND]
To Deactivate: # 31 # [SEND]
To Check: * # 31 # [SEND]
Incoming
To Activate: * 30 # [SEND]
To Deactivate: # 30 # [SEND]
Tips'n'Tricks of Nokia
I accept no responsibility of any kind for damage done to your phone whilst trying these tricks. I have included this information for educational purposes only.
Below are various TIPSnTRICKS based on the Nokia mobile phones. Different ones will work for different models, but most of them will work for all models.
To check the IMEI (International Mobile Equipment Identity) Type-
*#06#
Information you get from the IMEI-
XXXXXX XX XXXXXX X
TAC FAC SNR SP
TAC = Type approval code
FAC = Final assembly code
SNR = Serial number
SP = Spare
To check the phones Software revision type-
*#0000#
Information you get from the Software revision-
V 05.31
18-02-99
NSE-3
1ST Line = Software revision
2ND Line = The date of the software release
3RD Line = Phone type
To enter the service menu type-
*#92702689# (*#WAR0ANTY#)
Serial number (IMEI)
Production date (MM/YY)
Purchase date (MM/YY) You can only enter the date once.
Date of last repair (0000=No repair)
Transfer user data to another Nokia phone via Infra-Red
Clock Stopping
To check weather your SIM Card supports clock stopping type-
Please not this is not for free calls. This feature is to check weather your sim card supports "Clock Stopping". If your sim does support it, your phone will consume less battery power than if it didn't support it.
*#746025625# (*#SIM0CLOCK#)
Revealing the Headphone and Car-Kit menus
Please note that if you do these next tricks, the new menus can't be erased without restoring the factory default settings. To do these tricks you need to short-circuit the pins on the bottom of the phone next to where you plug in you charger.
1. To activate the "Headset" menu, you need to short-circuit pins "3" and "4". After a short time the word "Headset" will be shown in the display. Menu 3-6 is now enabled.
2. To activate the "Car" menu, you need to short-circuit pins "4" and "5". After a short time the word "Car" will be shown in the display. Menu 3-7 is now enabled.
THE REBOOT TRICK
This should work on all software versions of the 6110.
1. Go to the Calendar (Menu-8)
2. Make a note or reminder.
3. Enter some text into the edit box.
4. Hold "Clear" until the whole text is cleared, then press "Back".
5. Press "0". The main screen will now be showing but a space appears on the screen. (you can't see it)
6. Enter 4 digits (e.g. 1234).
7. Use the down arrow to move the cursor to the left side of the numbers and the space (Down arrow twice).
8. Now enter 6 digits and press the call button.
Wait for a few seconds, the screen should start to flash and reboots. It should alsowork on other menus like the "Profiles" menu.
EFR CALL QUALITY
To activate EFR (Enhanced Full Rate) Enter the code-
*3370#
This improves call quality but decreases batterylife by about 5%
To deactivate it, Enter the code-
#3370#
THE JAMES BOND TRICK
If you short-circuit theleft middle and right pins on the bottom of the phone with all connections touching each other, the Nokia software hangs! The profile "Headset" will be activated. Before you do this just activate the "Automatic Answer" in the headset profile and set the ringing volume to "Mute". Now you can use your phone for checking out what people are talking about in a room. Just place it under a table in a room and call it. The phone receives the call without ringing and you can listen to what people are saying.
NETWORK MONITOR
There is a hidden menu inside your Nokia phone. If you want to activate it, you'll have to re-program some chips inside of your phone.
Check your software version. You can only continue if you have v4.33, v4.73 or v5.24.
Take apart the phone.
De-solder the EEPROM (ATMEL AT 24C64).
Read out the data with an EEPROM programmer and save it to a file (Backup).
If you have v.33 or v4.73, change the address "03B8" from "00" to "FF".
If you have v5.24 then change the address "0378" from "00" to "FF".
Write the new data to the EEPROM and solder it back to the phone,
Power on your phone and you should have "Netmonitor" enabled.
The Network Monitor gives you the following information.
Carrier number
MS RX Level in DBM
Received signal quality
MS TX power level
C1 (Path loss criterion, used for cell selection and reselection). The range is -99 to 99.
RTL (Radio link timeout).
Timeslot
Indication of the transmitter status
Information on the Network parameters.
TMSI (Temporary Mobile Subscriber Identity).
Cell identification (Cell ID, Number of cells being used).
MCC (Mobile country code)
MCN (Mobile network code)
LAC (Location area code)
Ciphering (On/Off)
Hopping (On/Off)
DTX (On/Off)
Discard cell barred information.
CHECK SIM-LOCK
Note - If you bought your Nokia on UK Vodafone or UK Cellnet you do not need to check this because they both transmit on GSM900, and they don't lock the phones. However if you bought your phone on UK Orange or UK One2one your phone may be blocked. The reason is that they both transmitt on GSM1800. To make a call on GSM1800 you need what is known as a "Dual band" phone. A dual band phone is able to transmit on both GSM900 and GSM1800, so they lock the phones so you can't use it with any other network simcard. If you find that your phone is locked you can try different software to unlock it. (I havn't found one that works yet), or you can ask your service provider who will gladly exchange the 10 digit code for about £35.
This is how to check the status of the 4 different locks. Also don't try entering the wrong number, because after 3 times it will block the phone for good.
There are 4 different locks on your Nokia phone.
COUNTRY-LOCK
NETWORK-LOCK
PROVIDER-LOCK
SIMCARD-LOCK
The code to read out the sim-lock status of your phone is
#PW+(MASTERCODE)+(Y)#
# = DOUBLE-CROSS
W = PRESS "*" THREE TIMES
P = PRESS "*" FOUR TIMES
+ = PRESS "*" TWO TIMES
MASTERCODE = 1234567890
Y = NUMBER 1 TO 4
The master code is a secret code. The code has 10 digits, To read out the sim-lock status you can enter every combination you want!
"Y" Shows the status of the network-lock. Here you can enter a number from "1" to "4". The "4" is for the sim-card lock.
SIM-LOCK CHECKS
#PW+1234567890+1# = GIVES PROVIDER-LOCK STATUS
#PW+1234567890+2# = GIVES NETWORK-LOCK STATUS
#PW+1234567890+3# = GIVES COUNTRY-LOCK STATUS
#PW+1234567890+4# = GIVES SIM-CARD-LOCK STATUS.
VODAFONE "PAY AS U TALK"
If you are on the Vodafone pay as you talk service within the UK, you can check the balance of your friends "Pay as you talk" phone without them even knowing.
What you need to do is very simple indeed, just dial "1345" from your phone. You will then be asked to enter your telephone number. Enter the number of your friends phone, and it tells you how much credit they have left and how many days are remaining.
Remember that both phones need to be on the Vodafone "Pay as you talk" service.
WILDFIRE (NEW ORANGE VOICE MAIL)
Say "Do me a favor" in the main menu (when Wildfire first answers) and she will reply "What kind of favour?". You then appear to have two options:
I'm depressed!
Saying this phrase will make Wildfire issue one of several witty repartees designed to cheer you up. My favorite so far is the one where she plays you an excerpt from a William Shatner album (who played T J Hooker in the high adventure series of the same name!)
What does a cow say?
When you ask this, you hear a cow say MOOOOO. This is very short but funny. Once in a while, when you say this command you will get a VERY FUNNY reply. You know you have it when Wildfire says "Here's what a mad cow says"
The best thing about this Do me a favor menu in my opinion, is that you can get Wildfire on the line whilst you are speaking to a friend, and both you and your friend hear Wildfire talking Of course there is no real use for this menu, but it is a lot of fun and will amaze your friends!
Thanks to SMI-GROUP for this one.
These codes has been tested with version FLD_2C6 G60SB03X of Samsung SGH-600
firmware by David Lopez - (david@jet.es)
SAMSUNG SGH-600 SECRET CODES
============================
*#06# -> Show IMEI
*#9999# -> Show Software Version
*#0001# -> Show Serial Parameters
*2767*3855# -> Full EEPROM Reset ( THIS CODE REMOVES SP-LOCK!!!! but also
change IMEI to 447967-89-400044-0, you must use CHGIMEI to
restore it)
*2767*2878# -> Custom EEEPROM Reset
*#9998*228# -> Battery status (capacity, voltage, temperature)
*#9998*246# -> Program status
*#9998*289# -> Change Alarm Buzzer Frequency
*#9998*324# -> Debug screens
*#9998*364# -> Watchdog
*#9998*377# -> EEPROM Error Stack
*#9998*427# -> Trace Watchdog
*#9998*523# -> Change LCD contrast
*#9998*544# -> Jig detect
*#9998*636# -> Memory status
*#9998*746# -> SIM File Size
*#9998*778# -> SIM Service Table
*#9998*785# -> RTK (Run Time Kernel) errors
*#9998*786# -> Run, Last UP, Last DOWN
*#9998*837# -> Software Version
*#9998*842# -> Test Vibrator
*#9998*862# -> Vocoder Reg
*#9998*872# -> Diag
*#9998*947# -> Reset On Fatal Error
*#9998*999# -> Last/Chk
*#9998*9266# -> Yann debug screen (=Debug Screens?)
*#9998*9999# -> Software version
*0001*s*f*t# -> Changes serial parameters (s=?, f=0,1, t=0,1) (incomplete)
*0002*?# -> unknown
*0003*?# -> unknown
All
To Activate: * * 21 * NUMBER # [SEND]
To Cancel: # # 21 # [SEND]
To Check: * # 21 # [SEND]
No Answer
To Activate: * * 61 * NUMBER # [SEND]
To Cancel: # # 61 # [SEND]
To Check: * # 61 # [SEND]
Unreachable
To Activate: * * 62 * NUMBER # [SEND]
To Cancel: # # 62 # [SEND]
To Check: * # 62 # [SEND]
Busy
To Activate: * * 67 * NUMBER # [SEND]
To Cancel: # # 67 # [SEND]
To Check: * # 67 # [SEND]
To Cancel All Call Forwarding # # 002 # [SEND]
Diverting Data Calls
All
To Activate: * * 21 * NUMBER * 25 # [SEND]
To Cancel: # # 21 # * 25 [SEND]
To Check Status: * # 21 # * 25 # [SEND]
No Answer
To Activate: * * 61 * NUMBER * 25 # [SEND]
To Cancel: # # 61 * 25 # [SEND]
To Check Status: * # 61 # * 25 # [SEND]
Unreachable
To Activate: * * 62 * NUMBER * 25 # [SEND]
To Cancel: # # 62 # * 25 # [SEND]
To Check Status: * # 62 # * 25 # [SEND]
Busy
To Activate: * * 67 * NUMBER * 25 # [SEND]
To Cancel: # # 67 # * 25 # [SEND]
To Check Status: * # 67 # * 24 # [SEND]
Diverting Fax Calls
All
To Activate: * * 21 * NUMBER * 13 #[SEND]
To Cancel: # # 21 # * 13 # [SEND]
To Check Status: * # 21 # * 13 # [SEND]
No Answer
To Activate: * * 61 * NUMBER * 13 # [SEND]
To Cancel: # # 61 * 13 # [SEND]
To Check Status: * # 61 # * 13 # [SEND]
Unreachable
To Activate: * * 62 * NUMBER * 13 # [SEND]
To Cancel: # # 62 # * 13 # [SEND]
To Check Status: * # 62 # * 13 # [SEND]
Busy
To Activate: * * 67 * NUMBER * 13 # [SEND]
To Cancel: # # 67 # * 13 # [SEND]
To Check Status: * # 67 # * 13 #[SEND]
Call Barring
Before you can activate these barring services you will need a barring code from your service provider. Call Barring can not be activated if Call Forwarding diverts are already in use.
All Calls
To Activate: * 330 * BARRING CODE # [SEND]
To Cancel: # 330 * BARRING CODE # [SEND]
To Check: * # 330 # [SEND]
All Outgoing Calls
To Activate: * 333 * BARRING CODE # [SEND]
To Cancel: # 333 * BARRING CODE # [SEND]
To Check: * # 333 # [SEND]
All Incoming Calls
To Activate: * 353 * BARRING CODE # [SEND]
To Cancel: # 353 * BARRING CODE # [SEND]
To Check: * # 353 # [SEND]
All Outgoing Calls
To Activate: * 33 * BARRING CODE# [SEND]
To Cancel: # 33 * BARRING CODE # [SEND]
To Check: * # 33 # [SEND]
All Outgoing International Calls
To Activate: * 331 * BARRING CODE# [SEND]
To Cancel: # 331 * BARRING CODE # [SEND]
To Check: * # 331 # [SEND]
All Outgoing International Calls Except To Home Country
To Activate: * 332 * BARRING CODE# [SEND]
To Cancel: # 332 * BARRING CODE # [SEND]
To Check: * # 332 # [SEND]
All Incoming Calls
To Activate: * 35 * BARRING CODE # [SEND]
To Cancel: # 35 * BARRING CODE # [SEND]
To Check: * # 35 # [SEND]
All Incoming Calls When Outside Home Country
To Activate: * 351 * BARRING CODE # [SEND]
To Cancel: # 351 * BARRING CODE # [SEND]
To Check: * # 351 # [SEND]
Canceling All Call Barring # 330 * BARRING CODE # [SEND]
Call Waiting
To Activate: * 43 # [SEND]
To Deactivate: # 43 # [SEND]
To Check: * # 43 # [SEND]
Calling Line Identity
Outgoing
To Activate: * 31 # [SEND]
To Deactivate: # 31 # [SEND]
To Check: * # 31 # [SEND]
Incoming
To Activate: * 30 # [SEND]
To Deactivate: # 30 # [SEND]
Tips'n'Tricks of Nokia
I accept no responsibility of any kind for damage done to your phone whilst trying these tricks. I have included this information for educational purposes only.
Below are various TIPSnTRICKS based on the Nokia mobile phones. Different ones will work for different models, but most of them will work for all models.
To check the IMEI (International Mobile Equipment Identity) Type-
*#06#
Information you get from the IMEI-
XXXXXX XX XXXXXX X
TAC FAC SNR SP
TAC = Type approval code
FAC = Final assembly code
SNR = Serial number
SP = Spare
To check the phones Software revision type-
*#0000#
Information you get from the Software revision-
V 05.31
18-02-99
NSE-3
1ST Line = Software revision
2ND Line = The date of the software release
3RD Line = Phone type
To enter the service menu type-
*#92702689# (*#WAR0ANTY#)
Serial number (IMEI)
Production date (MM/YY)
Purchase date (MM/YY) You can only enter the date once.
Date of last repair (0000=No repair)
Transfer user data to another Nokia phone via Infra-Red
Clock Stopping
To check weather your SIM Card supports clock stopping type-
Please not this is not for free calls. This feature is to check weather your sim card supports "Clock Stopping". If your sim does support it, your phone will consume less battery power than if it didn't support it.
*#746025625# (*#SIM0CLOCK#)
Revealing the Headphone and Car-Kit menus
Please note that if you do these next tricks, the new menus can't be erased without restoring the factory default settings. To do these tricks you need to short-circuit the pins on the bottom of the phone next to where you plug in you charger.
1. To activate the "Headset" menu, you need to short-circuit pins "3" and "4". After a short time the word "Headset" will be shown in the display. Menu 3-6 is now enabled.
2. To activate the "Car" menu, you need to short-circuit pins "4" and "5". After a short time the word "Car" will be shown in the display. Menu 3-7 is now enabled.
THE REBOOT TRICK
This should work on all software versions of the 6110.
1. Go to the Calendar (Menu-8)
2. Make a note or reminder.
3. Enter some text into the edit box.
4. Hold "Clear" until the whole text is cleared, then press "Back".
5. Press "0". The main screen will now be showing but a space appears on the screen. (you can't see it)
6. Enter 4 digits (e.g. 1234).
7. Use the down arrow to move the cursor to the left side of the numbers and the space (Down arrow twice).
8. Now enter 6 digits and press the call button.
Wait for a few seconds, the screen should start to flash and reboots. It should alsowork on other menus like the "Profiles" menu.
EFR CALL QUALITY
To activate EFR (Enhanced Full Rate) Enter the code-
*3370#
This improves call quality but decreases batterylife by about 5%
To deactivate it, Enter the code-
#3370#
THE JAMES BOND TRICK
If you short-circuit theleft middle and right pins on the bottom of the phone with all connections touching each other, the Nokia software hangs! The profile "Headset" will be activated. Before you do this just activate the "Automatic Answer" in the headset profile and set the ringing volume to "Mute". Now you can use your phone for checking out what people are talking about in a room. Just place it under a table in a room and call it. The phone receives the call without ringing and you can listen to what people are saying.
NETWORK MONITOR
There is a hidden menu inside your Nokia phone. If you want to activate it, you'll have to re-program some chips inside of your phone.
Check your software version. You can only continue if you have v4.33, v4.73 or v5.24.
Take apart the phone.
De-solder the EEPROM (ATMEL AT 24C64).
Read out the data with an EEPROM programmer and save it to a file (Backup).
If you have v.33 or v4.73, change the address "03B8" from "00" to "FF".
If you have v5.24 then change the address "0378" from "00" to "FF".
Write the new data to the EEPROM and solder it back to the phone,
Power on your phone and you should have "Netmonitor" enabled.
The Network Monitor gives you the following information.
Carrier number
MS RX Level in DBM
Received signal quality
MS TX power level
C1 (Path loss criterion, used for cell selection and reselection). The range is -99 to 99.
RTL (Radio link timeout).
Timeslot
Indication of the transmitter status
Information on the Network parameters.
TMSI (Temporary Mobile Subscriber Identity).
Cell identification (Cell ID, Number of cells being used).
MCC (Mobile country code)
MCN (Mobile network code)
LAC (Location area code)
Ciphering (On/Off)
Hopping (On/Off)
DTX (On/Off)
Discard cell barred information.
CHECK SIM-LOCK
Note - If you bought your Nokia on UK Vodafone or UK Cellnet you do not need to check this because they both transmit on GSM900, and they don't lock the phones. However if you bought your phone on UK Orange or UK One2one your phone may be blocked. The reason is that they both transmitt on GSM1800. To make a call on GSM1800 you need what is known as a "Dual band" phone. A dual band phone is able to transmit on both GSM900 and GSM1800, so they lock the phones so you can't use it with any other network simcard. If you find that your phone is locked you can try different software to unlock it. (I havn't found one that works yet), or you can ask your service provider who will gladly exchange the 10 digit code for about £35.
This is how to check the status of the 4 different locks. Also don't try entering the wrong number, because after 3 times it will block the phone for good.
There are 4 different locks on your Nokia phone.
COUNTRY-LOCK
NETWORK-LOCK
PROVIDER-LOCK
SIMCARD-LOCK
The code to read out the sim-lock status of your phone is
#PW+(MASTERCODE)+(Y)#
# = DOUBLE-CROSS
W = PRESS "*" THREE TIMES
P = PRESS "*" FOUR TIMES
+ = PRESS "*" TWO TIMES
MASTERCODE = 1234567890
Y = NUMBER 1 TO 4
The master code is a secret code. The code has 10 digits, To read out the sim-lock status you can enter every combination you want!
"Y" Shows the status of the network-lock. Here you can enter a number from "1" to "4". The "4" is for the sim-card lock.
SIM-LOCK CHECKS
#PW+1234567890+1# = GIVES PROVIDER-LOCK STATUS
#PW+1234567890+2# = GIVES NETWORK-LOCK STATUS
#PW+1234567890+3# = GIVES COUNTRY-LOCK STATUS
#PW+1234567890+4# = GIVES SIM-CARD-LOCK STATUS.
VODAFONE "PAY AS U TALK"
If you are on the Vodafone pay as you talk service within the UK, you can check the balance of your friends "Pay as you talk" phone without them even knowing.
What you need to do is very simple indeed, just dial "1345" from your phone. You will then be asked to enter your telephone number. Enter the number of your friends phone, and it tells you how much credit they have left and how many days are remaining.
Remember that both phones need to be on the Vodafone "Pay as you talk" service.
WILDFIRE (NEW ORANGE VOICE MAIL)
Say "Do me a favor" in the main menu (when Wildfire first answers) and she will reply "What kind of favour?". You then appear to have two options:
I'm depressed!
Saying this phrase will make Wildfire issue one of several witty repartees designed to cheer you up. My favorite so far is the one where she plays you an excerpt from a William Shatner album (who played T J Hooker in the high adventure series of the same name!)
What does a cow say?
When you ask this, you hear a cow say MOOOOO. This is very short but funny. Once in a while, when you say this command you will get a VERY FUNNY reply. You know you have it when Wildfire says "Here's what a mad cow says"
The best thing about this Do me a favor menu in my opinion, is that you can get Wildfire on the line whilst you are speaking to a friend, and both you and your friend hear Wildfire talking Of course there is no real use for this menu, but it is a lot of fun and will amaze your friends!
Thanks to SMI-GROUP for this one.
These codes has been tested with version FLD_2C6 G60SB03X of Samsung SGH-600
firmware by David Lopez - (david@jet.es)
SAMSUNG SGH-600 SECRET CODES
============================
*#06# -> Show IMEI
*#9999# -> Show Software Version
*#0001# -> Show Serial Parameters
*2767*3855# -> Full EEPROM Reset ( THIS CODE REMOVES SP-LOCK!!!! but also
change IMEI to 447967-89-400044-0, you must use CHGIMEI to
restore it)
*2767*2878# -> Custom EEEPROM Reset
*#9998*228# -> Battery status (capacity, voltage, temperature)
*#9998*246# -> Program status
*#9998*289# -> Change Alarm Buzzer Frequency
*#9998*324# -> Debug screens
*#9998*364# -> Watchdog
*#9998*377# -> EEPROM Error Stack
*#9998*427# -> Trace Watchdog
*#9998*523# -> Change LCD contrast
*#9998*544# -> Jig detect
*#9998*636# -> Memory status
*#9998*746# -> SIM File Size
*#9998*778# -> SIM Service Table
*#9998*785# -> RTK (Run Time Kernel) errors
*#9998*786# -> Run, Last UP, Last DOWN
*#9998*837# -> Software Version
*#9998*842# -> Test Vibrator
*#9998*862# -> Vocoder Reg
*#9998*872# -> Diag
*#9998*947# -> Reset On Fatal Error
*#9998*999# -> Last/Chk
*#9998*9266# -> Yann debug screen (=Debug Screens?)
*#9998*9999# -> Software version
*0001*s*f*t# -> Changes serial parameters (s=?, f=0,1, t=0,1) (incomplete)
*0002*?# -> unknown
*0003*?# -> unknown
Sunday, June 28, 2009
Winrar: Watch movie without downloading all parts of rar file
Yes u can watch movie without downloading all of its parts.
Many movies posted here are broken into many pieces using WinRAR. usually you have to download all parts before unzipping. But here's a simple method to watch the movie without downloading all parts. First, download the few parts or just the first part is enough now right click on the rar file to extract
Click on Extract Files...
now in the General Tab u will see a check box named [keep broken files] just tick that box
and then extract ur file anywhere.
Thats it, U can now watch a part of movie on any player
Many movies posted here are broken into many pieces using WinRAR. usually you have to download all parts before unzipping. But here's a simple method to watch the movie without downloading all parts. First, download the few parts or just the first part is enough now right click on the rar file to extract
Click on Extract Files...
now in the General Tab u will see a check box named [keep broken files] just tick that box
and then extract ur file anywhere.
Thats it, U can now watch a part of movie on any player
Posted by
F u N n Y G u Y
at
10:10 PM
Labels:
Winrar: Watch movie without downloading all parts of rar file


Check ur IP at command prompt...
Check IP at command prompt
Did you know you can view it even faster (without opening all the way to cmd or command.com?
Just type "cmd /k ipconfig" in the run box (Start button--> run).
You can also put cmd /k ipconfig in a text file and give it a .bat extension to make a batch script so you just need to click on the file to execute it instead of going to the start menu.
or goto cmdprompt type as ipconfig
Did you know you can view it even faster (without opening all the way to cmd or command.com?
Just type "cmd /k ipconfig" in the run box (Start button--> run).
You can also put cmd /k ipconfig in a text file and give it a .bat extension to make a batch script so you just need to click on the file to execute it instead of going to the start menu.
or goto cmdprompt type as ipconfig
How to Hack Minesweeper...........
While the Minesweeper game is included in almost every Windows computer, few know how to play it, and others have no idea how to win when playing it. This article will explain to play, and almost never lose.
Open Minesweeper and select the window.
Type xyzzy
Hold BOTH shift keys for 3 seconds.
Release shift, and hover your mouse over the mine field.
or type xyzzy,shift.enter,enter
Look closely to find a very tiny white square on the top left of your desktop, it should be about 1 pixel in size. Not in the minesweeper screen but your computer backround. A white dot means it's safe to click, and a black dot means that there is a mine.
For MineSweeper in previous versions of Windows, i.e. before XP, search for the file winmine.ini
Open this file (using notepad, wordpad, etc.)
You will see entries for best times. Edit those entries, modifying the names and the times to reflect your times!
You are a MineSweeper champion!
Open Minesweeper and select the window.
Type xyzzy
Hold BOTH shift keys for 3 seconds.
Release shift, and hover your mouse over the mine field.
or type xyzzy,shift.enter,enter
Look closely to find a very tiny white square on the top left of your desktop, it should be about 1 pixel in size. Not in the minesweeper screen but your computer backround. A white dot means it's safe to click, and a black dot means that there is a mine.
For MineSweeper in previous versions of Windows, i.e. before XP, search for the file winmine.ini
Open this file (using notepad, wordpad, etc.)
You will see entries for best times. Edit those entries, modifying the names and the times to reflect your times!
You are a MineSweeper champion!
You wanna know who used your PC in your absence
Who Used Your Pc In Your Absence,what Did He Do?
first you should go
"start > run >eventvwr.msc"
Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived.
For our purposes we want the System log. Click on "System" in the left-hand column for a list of events.
Look for a date and time when you weren't home and your computer should have been off.
double click on the eg: info n it will show u the detail.
You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day.
first you should go
"start > run >eventvwr.msc"
Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived.
For our purposes we want the System log. Click on "System" in the left-hand column for a list of events.
Look for a date and time when you weren't home and your computer should have been off.
double click on the eg: info n it will show u the detail.
You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day.
Trace any Websites
Surfing Internet .......
Type in the url and Hit Enter, that's it ?
But .......
Have you ever thought what happens after that ?
Lets Trace n see what happens !
Do the following :
# Start >> Run
# Type cmd
# This will open the Command Prompt
# Type cd\
# Type tracert www.google.com
Note :-
You can replace www.google.com with any website url.
Results :-
## First line shows the IP address of the website...
## You'll be shown steps in which the website gets load !
## More is the number of steps more is time taken to load the website !
That's all !
Type in the url and Hit Enter, that's it ?
But .......
Have you ever thought what happens after that ?
Lets Trace n see what happens !
Do the following :
# Start >> Run
# Type cmd
# This will open the Command Prompt
# Type cd\
# Type tracert www.google.com
Note :-
You can replace www.google.com with any website url.
Results :-
## First line shows the IP address of the website...
## You'll be shown steps in which the website gets load !
## More is the number of steps more is time taken to load the website !
That's all !
Animation in Batch File
Batch FIle Animation!!
1.put this code in notepad
2.save file named anyname.bat
3.Run the file and see the animation
@ echo off
cls
color 0A
echo F
ping localhost -n 2 >nul
cls
echo Fu
ping localhost -n 2 >nul
cls
echo Fun
ping localhost -n 2 >nul
cls
echo Fun-
ping localhost -n 2 >nul
cls
echo Fun-C
ping localhost -n 2 >nul
cls
echo Fun-Co
ping localhost -n 2 >nul
cls
echo Fun-Com
ping localhost -n 2 >nul
cls
echo Fun-Comp
ping localhost -n 2 >nul
cls
echo Fun-Compu
ping localhost -n 2 >nul
cls
echo Fun-Comput
ping localhost -n 2 >nul
cls
echo Fun-Compute
ping localhost -n 2 >nul
cls
echo Fun-Computer
ping localhost -n 2 >nul
cls
echo Fun-Computer
ping localhost -n 2 >nul
cls
echo Fun-Computer T
ping localhost -n 2 >nul
cls
echo Fun-Computer Tr
ping localhost -n 2 >nul
cls
echo Fun-Computer Tri
ping localhost -n 2 >nul
cls
echo Fun-Computer Tric
ping localhost -n 2 >nul
cls
echo Fun-Computer Trick
ping localhost -n 2 >nul
cls
echo Fun-Computer Tricks
ping localhost -n 2 >nul
cls
You can replace Fun-Computer Tricks with your name
1.put this code in notepad
2.save file named anyname.bat
3.Run the file and see the animation
@ echo off
cls
color 0A
echo F
ping localhost -n 2 >nul
cls
echo Fu
ping localhost -n 2 >nul
cls
echo Fun
ping localhost -n 2 >nul
cls
echo Fun-
ping localhost -n 2 >nul
cls
echo Fun-C
ping localhost -n 2 >nul
cls
echo Fun-Co
ping localhost -n 2 >nul
cls
echo Fun-Com
ping localhost -n 2 >nul
cls
echo Fun-Comp
ping localhost -n 2 >nul
cls
echo Fun-Compu
ping localhost -n 2 >nul
cls
echo Fun-Comput
ping localhost -n 2 >nul
cls
echo Fun-Compute
ping localhost -n 2 >nul
cls
echo Fun-Computer
ping localhost -n 2 >nul
cls
echo Fun-Computer
ping localhost -n 2 >nul
cls
echo Fun-Computer T
ping localhost -n 2 >nul
cls
echo Fun-Computer Tr
ping localhost -n 2 >nul
cls
echo Fun-Computer Tri
ping localhost -n 2 >nul
cls
echo Fun-Computer Tric
ping localhost -n 2 >nul
cls
echo Fun-Computer Trick
ping localhost -n 2 >nul
cls
echo Fun-Computer Tricks
ping localhost -n 2 >nul
cls
You can replace Fun-Computer Tricks with your name
Removing windows start menu display delay...
Did you know that, by default in Windows, there is a 400 ms delay between the time you
press the Start Menu button and when the display process actually starts? You can easily
remove this delay by making a simple registry entry change:
1. Open Start > Run.
2. Enter: regedit
3. Click Ok. The Registry Editor will open.
4. Browse to: HKEY_CURRENT_USER > Control Panel > Desktop
5. Double click on the entry “Menu Show Delay”.
6. Change the value to 0 to remove the delay.
7. Close the Registry Editor.
press the Start Menu button and when the display process actually starts? You can easily
remove this delay by making a simple registry entry change:
1. Open Start > Run.
2. Enter: regedit
3. Click Ok. The Registry Editor will open.
4. Browse to: HKEY_CURRENT_USER > Control Panel > Desktop
5. Double click on the entry “Menu Show Delay”.
6. Change the value to 0 to remove the delay.
7. Close the Registry Editor.
Hide Your Hard Disk Drive Partitions
Step-1.
Go to Start > run > type “ diskpart ”.
a dos window will appear with following like that.....
DISKPART>
Step-2.
Then type “ list volume ” without quote
It will look like this.....
Step-3.
If u want to hide drive F then type “ select volume 5 ″ without quote
then a message will appear in same winwods { Volume 5 is the selected volume }
Step-4.
now type " remove letter F ” without quote
now a message will come { DiskPart successfully removed the drive letter or mount point }.
sometime it requires the reboot the computer .
Diskpart will remove the letter. Windows XP is not having capabilty to identify the unkown volume.
How to come back / recover:
Don’t afraid, all of your Data still safe .
to Come back the Drive repeat the process . but in Step-4, which is shown in this post replace “ remove ” to “ assign ”
means type “ assign letter F ” without quote
The above method won’t work for the drive containing Operating System.
and it can also be done using System Manager>Storage Manager.
Go to Start > run > type “ diskpart ”.
a dos window will appear with following like that.....
DISKPART>
Step-2.
Then type “ list volume ” without quote
It will look like this.....
Step-3.
If u want to hide drive F then type “ select volume 5 ″ without quote
then a message will appear in same winwods { Volume 5 is the selected volume }
Step-4.
now type " remove letter F ” without quote
now a message will come { DiskPart successfully removed the drive letter or mount point }.
sometime it requires the reboot the computer .
Diskpart will remove the letter. Windows XP is not having capabilty to identify the unkown volume.
How to come back / recover:
Don’t afraid, all of your Data still safe .
to Come back the Drive repeat the process . but in Step-4, which is shown in this post replace “ remove ” to “ assign ”
means type “ assign letter F ” without quote
The above method won’t work for the drive containing Operating System.
and it can also be done using System Manager>Storage Manager.
Simple Tricks to Cheat RapidShare
THIS IS WHAT IT SAYS !!!
Here are some hints to help you more efficently use rapidshare. Skipping waiting time and bypassing download limits are rapidshare hacks that everybody should know.
Rapidshare has been an excellent tool for sharing large files. Recently users have discovered ways of bypassing the download limits and skipping the waiting time. Here are a description of these methods.
Update: Two new methods of bypassing download limits have been posted. These are more advanced and may require additional software or hardware, but you should check them out when you are done with these easier methods:
RapidShare: NIC tricks and MAC cloning to bypass download limit
Rapidshare traces the users IP address to limit each user to a certain amount of downloading per day. To get around this, you need to show the rapidshare server a different IP address.
Here are some methods for doing this:
Hack 1- Use JavaScript to Reduce Waiting Time
1.Click the rapidshare link you want to download from.
2.Select FREE button
3.In the address bar put the following javascript:alert(c=0) or javascript:var%20c=0
4.Click OK
5.Click OK to the pop-up box
6.Enter the captcha
7.Download Your File
Or If not working go to step 2
2. Request a new IP address from your ISP server.
Here’s how to do it in windows:
1. Click Start
2. Click run
3. In the run box type cmd.exe and click OK
4. When the command prompt opens type the following. ENTER after each new line.
ipconfig /flushdns
ipconfig /release
ipconfig /renew
exit
5. Erase your cookies in whatever browser you are using.
6. Try the rapidshare download again.
Frequently you will be assigned a new IP address when this happens. Sometime you will, sometimes you will not. If you are on a fixed IP address, this method will not work. To be honest, I do not know how to do this in linux/unix/etc. If this works for you, you may want to save the above commands into a batch file, and just run it when you need it.
3. Use a proxy with SwitchProxy and Firefox:
1. Download and install Firefox if you have not already
2. Download and install SwitchProxy
3. Google for free proxies
4. When you hit your download limit, clean your cookies and change your proxy
4. Use an anonymous service:
Running your system through the tor network should in theory work; however, it is difficult to use and setup. Plus, you allow others to run their evil deeds through your system as well by using this system. Anonymizer 2005 is inexpensive, easy to use, but not free. Other pay services would likely work as well.
5. You can use a bookmarklet to stop your wait times:
1. Open IE
2. Right Click On This Link
3. Select Add to Favorites
4. Select Yes to the warning that the bookmark may be unsafe.
5. Name it “RapidShare No Wait”
6. Click on the Links folder (if you want to display it in your IE toolbar)
7. Click OK
8. You may need to close and reopen IE to see it
9. Goto rapidshare and click the bookmarklet when you are forced to wait
Here are some hints to help you more efficently use rapidshare. Skipping waiting time and bypassing download limits are rapidshare hacks that everybody should know.
Rapidshare has been an excellent tool for sharing large files. Recently users have discovered ways of bypassing the download limits and skipping the waiting time. Here are a description of these methods.
Update: Two new methods of bypassing download limits have been posted. These are more advanced and may require additional software or hardware, but you should check them out when you are done with these easier methods:
RapidShare: NIC tricks and MAC cloning to bypass download limit
Rapidshare traces the users IP address to limit each user to a certain amount of downloading per day. To get around this, you need to show the rapidshare server a different IP address.
Here are some methods for doing this:
Hack 1- Use JavaScript to Reduce Waiting Time
1.Click the rapidshare link you want to download from.
2.Select FREE button
3.In the address bar put the following javascript:alert(c=0) or javascript:var%20c=0
4.Click OK
5.Click OK to the pop-up box
6.Enter the captcha
7.Download Your File
Or If not working go to step 2
2. Request a new IP address from your ISP server.
Here’s how to do it in windows:
1. Click Start
2. Click run
3. In the run box type cmd.exe and click OK
4. When the command prompt opens type the following. ENTER after each new line.
ipconfig /flushdns
ipconfig /release
ipconfig /renew
exit
5. Erase your cookies in whatever browser you are using.
6. Try the rapidshare download again.
Frequently you will be assigned a new IP address when this happens. Sometime you will, sometimes you will not. If you are on a fixed IP address, this method will not work. To be honest, I do not know how to do this in linux/unix/etc. If this works for you, you may want to save the above commands into a batch file, and just run it when you need it.
3. Use a proxy with SwitchProxy and Firefox:
1. Download and install Firefox if you have not already
2. Download and install SwitchProxy
3. Google for free proxies
4. When you hit your download limit, clean your cookies and change your proxy
4. Use an anonymous service:
Running your system through the tor network should in theory work; however, it is difficult to use and setup. Plus, you allow others to run their evil deeds through your system as well by using this system. Anonymizer 2005 is inexpensive, easy to use, but not free. Other pay services would likely work as well.
5. You can use a bookmarklet to stop your wait times:
1. Open IE
2. Right Click On This Link
3. Select Add to Favorites
4. Select Yes to the warning that the bookmark may be unsafe.
5. Name it “RapidShare No Wait”
6. Click on the Links folder (if you want to display it in your IE toolbar)
7. Click OK
8. You may need to close and reopen IE to see it
9. Goto rapidshare and click the bookmarklet when you are forced to wait
How do I detect Trojan?
How thorough is trojan detection by port scanning?
--------------------------------------------------------------------------------
Nearly all remote access trojans use TCP or UDP sockets, and in many cases trojans have a default port that they listen to. Some trojans have a port that is fixed and cannot easily be changed.
This is the best method to determine if your system has been compromised, but it requires that you:
A. have a basic understanding of the state of an "active connection" and
B. that you're familiar with the port numbers commonly used by the trojans.
With regards to the state of an "active connection". There are several types, but there's really only one type that you need to know about.
The "listening" state - which is when your PC listens on a port number, awaiting for another PC to make a connection to it. The "listening state" is the state that the trojan will be in after your system is rebooted.
NOTE: Some trojans may use more than one port number. This is because one port is used for "listening" and the other/s are used for the transfer of data.
In their default configurations, the following trojans use:
Back Orifice - UDP port 31337 or 31338
Deep Throat - UDP port 2140 and 3150
NetBus - TCP port 12345 and 12346
Whack-a-mole - TCP port 12361 and 12362
NetBus 2 Pro - TCP port 20034
GirlFriend - TCP port 21544
Sockets de Troie - TCP port 5000, 5001 or 50505
Masters Paradise - TCP port 3129, 40421, 40422, 40423 and 40426
Devil - port 65000
Evil FTP - port 23456
GateCrasher - port 6969
Hackers Paradise - port 456
ICKiller - port 7789
ICQTrojan - port 4590
Phineas Phucker - port 2801
Remote Grab - port 7000
Remote Windows Shutdown - port 53001
How to detect
If after following the directions outlined further down below, you've determined that your PC is "listening" on any of the above ports. It's a very strong indicator that your PC has been compromised. Click the appropriate link to learn how to remove the trojan involved.
How to determine what ports are "listening"
Perform the following steps:
Step 1. - Reboot your PC. Do NOT establish a dial-up connection.
Click Start | Shut Down
Click Restart
Click OK
Step 2. - After you reboot your PC and before doing anything else, open a DOS window.
Click Start | Programs | MS-DOS Prompt
NOTE: If you don't have a shortcut to the MS-DOS Prompt, don't worry. You can
Click Start | Run
Type command
Click OK
Step 3. - Type "netstat -an >>c:\netstat.txt" (without the quotes)
Type netstat -an >>c:\netstat.txt
Press ENTER
Step 4. - Close the DOS window.
Type exit
Press ENTER
Step 5. - Open Explorer
Click Start | Programs | Windows Explorer
Step 6. - Change to the C drive and double click on the netstat.txt file. It should open with NOTEPAD.
Click (C
Double-click netstat.txt
Step 7.
Look under the "Local Address" column and examine the port numbers for any connection found to be in a "listening" state.
For reference, the port numbers are shown as ":XXXXX" to the right of the IP address, where "XXXXX" is a 1 to 5 digit number.
Provided below are some examples of what you may might find:
The above example is typical of a home user's PC. The system (after a reboot) doesn't show any active connections. If your system looks like this, then congratulations! You have nothing to worry about.
The above example is typical of a PC on a LAN. The system (after a reboot) shows several connections in a listening state, used by NetBIOS. As mentioned above, the ports used by NETBIOS are ports 137 (nbname), 138 (nbdata) and 139 (nbsession).
Again, if your system isn't showing any active connections other than the ones related to using NetBIOS, then congratulations! You have nothing to worry about.
The above example is typical of a home user's PC that's been compromised with the Back Orifice server portion, and whereby it's been configured to use the port 31337 (the default).
The above example is typical of a PC on a LAN that's been compromised with the Back Orifice server portion, and whereby it's been configured to use port 31337 (the default).
The above example is typical of a home user's PC that's been compromised with the Back Orifice server portion that's been configured to use port 4000 instead of the default 31337.
The above example is typical of a PC on a LAN that's been compromised with the Back Orifice server portion that's been configured to use port 4000 instead of the default 31337.
If your system shows any ports in a listening state that you cannot identify or explain. It might be wise to further investigate the possiblity that your system may be compromised with one of these trojans using a different port other than the default/s.
NOTES:
Some ports that may be found in a listening state include:
FTP, which uses TCP port 21
Telnet, which uses TCP port 23
Gopher, which uses TCP port 70
HTTP (a webserver), which uses TCP port 80
If you do find your system "listening" on any of these ports. You should know whether it should or shouldn't be. If it shouldn't be, then it's wise to further investigate the possiblity that your system may be compromised with one of the trojans using a different port other than the default/s.
--------------------------------------------------------------------------------
Nearly all remote access trojans use TCP or UDP sockets, and in many cases trojans have a default port that they listen to. Some trojans have a port that is fixed and cannot easily be changed.
This is the best method to determine if your system has been compromised, but it requires that you:
A. have a basic understanding of the state of an "active connection" and
B. that you're familiar with the port numbers commonly used by the trojans.
With regards to the state of an "active connection". There are several types, but there's really only one type that you need to know about.
The "listening" state - which is when your PC listens on a port number, awaiting for another PC to make a connection to it. The "listening state" is the state that the trojan will be in after your system is rebooted.
NOTE: Some trojans may use more than one port number. This is because one port is used for "listening" and the other/s are used for the transfer of data.
In their default configurations, the following trojans use:
Back Orifice - UDP port 31337 or 31338
Deep Throat - UDP port 2140 and 3150
NetBus - TCP port 12345 and 12346
Whack-a-mole - TCP port 12361 and 12362
NetBus 2 Pro - TCP port 20034
GirlFriend - TCP port 21544
Sockets de Troie - TCP port 5000, 5001 or 50505
Masters Paradise - TCP port 3129, 40421, 40422, 40423 and 40426
Devil - port 65000
Evil FTP - port 23456
GateCrasher - port 6969
Hackers Paradise - port 456
ICKiller - port 7789
ICQTrojan - port 4590
Phineas Phucker - port 2801
Remote Grab - port 7000
Remote Windows Shutdown - port 53001
How to detect
If after following the directions outlined further down below, you've determined that your PC is "listening" on any of the above ports. It's a very strong indicator that your PC has been compromised. Click the appropriate link to learn how to remove the trojan involved.
How to determine what ports are "listening"
Perform the following steps:
Step 1. - Reboot your PC. Do NOT establish a dial-up connection.
Click Start | Shut Down
Click Restart
Click OK
Step 2. - After you reboot your PC and before doing anything else, open a DOS window.
Click Start | Programs | MS-DOS Prompt
NOTE: If you don't have a shortcut to the MS-DOS Prompt, don't worry. You can
Click Start | Run
Type command
Click OK
Step 3. - Type "netstat -an >>c:\netstat.txt" (without the quotes)
Type netstat -an >>c:\netstat.txt
Press ENTER
Step 4. - Close the DOS window.
Type exit
Press ENTER
Step 5. - Open Explorer
Click Start | Programs | Windows Explorer
Step 6. - Change to the C drive and double click on the netstat.txt file. It should open with NOTEPAD.
Click (C
Double-click netstat.txt
Step 7.
Look under the "Local Address" column and examine the port numbers for any connection found to be in a "listening" state.
For reference, the port numbers are shown as ":XXXXX" to the right of the IP address, where "XXXXX" is a 1 to 5 digit number.
Provided below are some examples of what you may might find:
The above example is typical of a home user's PC. The system (after a reboot) doesn't show any active connections. If your system looks like this, then congratulations! You have nothing to worry about.
The above example is typical of a PC on a LAN. The system (after a reboot) shows several connections in a listening state, used by NetBIOS. As mentioned above, the ports used by NETBIOS are ports 137 (nbname), 138 (nbdata) and 139 (nbsession).
Again, if your system isn't showing any active connections other than the ones related to using NetBIOS, then congratulations! You have nothing to worry about.
The above example is typical of a home user's PC that's been compromised with the Back Orifice server portion, and whereby it's been configured to use the port 31337 (the default).
The above example is typical of a PC on a LAN that's been compromised with the Back Orifice server portion, and whereby it's been configured to use port 31337 (the default).
The above example is typical of a home user's PC that's been compromised with the Back Orifice server portion that's been configured to use port 4000 instead of the default 31337.
The above example is typical of a PC on a LAN that's been compromised with the Back Orifice server portion that's been configured to use port 4000 instead of the default 31337.
If your system shows any ports in a listening state that you cannot identify or explain. It might be wise to further investigate the possiblity that your system may be compromised with one of these trojans using a different port other than the default/s.
NOTES:
Some ports that may be found in a listening state include:
FTP, which uses TCP port 21
Telnet, which uses TCP port 23
Gopher, which uses TCP port 70
HTTP (a webserver), which uses TCP port 80
If you do find your system "listening" on any of these ports. You should know whether it should or shouldn't be. If it shouldn't be, then it's wise to further investigate the possiblity that your system may be compromised with one of the trojans using a different port other than the default/s.
Finding IP address in Gmail, Hotmail, Yahoo Mail
Finding IP address in Gmail
1. Log into your Gmail account with your username and password.
2. Open the mail.
3. To display the headers,
* Click on More options corresponding to that thread. You should get a bunch of links.
* Click on Show original
4. You should get headers like this:
Gmail headers : name
Look for Received: from followed by a few hostnames and an IP address between square brackets [ ]. In this case, it is
65.119.112.245.
That is be the IP address of the sender!
Finding IP address in Yahoo! Mail
1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
* Go back to the mails and open that mail
Or, Bottom Right Corner [ Full Headers ]
5. You should see similar headers like this:
Yahoo! headers : name
Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.
That is be the IP address of the sender!
Example :-
Return-Path :
Authentication-Results : xxxxxxxxxxxxxxxxx
Received : xxxxxxxxxxxxxxxxx
Received : xxxxxxxxxxxxxxxxx
DKIM-Signature : xxxxxxxxxxxxxxxxx
DomainKey-Signature : xxxxxxxxxxxxxxxxx
Message-ID : xxxxxxxxxxxxxxxxx
Received: from [202.65.138.109] by xxxxxxxxxxx
Date : Tue, 14 Apr 2009 11:21:07-0700(PDT)
From : xxxxx
Subject : xxxxxxxxxxxx
To : xxxxxx@yahoo.com
MIME-Version : 1.0
Content-Type : text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
Content-Length : 445
Finding IP address in Hotmail
1. Log into your Hotmail account with your username and password.
2. Click on the Mail tab on the top.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on Mail Display Settings
* In Message Headers, make sure Advanced option is checked
* Click on Ok button
* Go back to the mails and open that mail
5. If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP address
Hotmail headers : name ,In this case the IP address of the sender is [68.34.60.59]. Jump to step 9.
6. If you find a header with Received: from followed by a Gmail proxy like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets [ ].
In this case, the IP address of the sender is [69.140.7.58]. Jump to step 9.
7. Or else if you have headers like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets [ ].
In this case, the IP address of the sender is [61.83.145.129] (Spam mail). Jump to step 9.
8. * If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.
1. Log into your Gmail account with your username and password.
2. Open the mail.
3. To display the headers,
* Click on More options corresponding to that thread. You should get a bunch of links.
* Click on Show original
4. You should get headers like this:
Gmail headers : name
Look for Received: from followed by a few hostnames and an IP address between square brackets [ ]. In this case, it is
65.119.112.245.
That is be the IP address of the sender!
Finding IP address in Yahoo! Mail
1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
* Go back to the mails and open that mail
Or, Bottom Right Corner [ Full Headers ]
5. You should see similar headers like this:
Yahoo! headers : name
Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.
That is be the IP address of the sender!
Example :-
Return-Path :
Authentication-Results : xxxxxxxxxxxxxxxxx
Received : xxxxxxxxxxxxxxxxx
Received : xxxxxxxxxxxxxxxxx
DKIM-Signature : xxxxxxxxxxxxxxxxx
DomainKey-Signature : xxxxxxxxxxxxxxxxx
Message-ID : xxxxxxxxxxxxxxxxx
Received: from [202.65.138.109] by xxxxxxxxxxx
Date : Tue, 14 Apr 2009 11:21:07-0700(PDT)
From : xxxxx
Subject : xxxxxxxxxxxx
To : xxxxxx@yahoo.com
MIME-Version : 1.0
Content-Type : text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
Content-Length : 445
Finding IP address in Hotmail
1. Log into your Hotmail account with your username and password.
2. Click on the Mail tab on the top.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on Mail Display Settings
* In Message Headers, make sure Advanced option is checked
* Click on Ok button
* Go back to the mails and open that mail
5. If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP address
Hotmail headers : name ,In this case the IP address of the sender is [68.34.60.59]. Jump to step 9.
6. If you find a header with Received: from followed by a Gmail proxy like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets [ ].
In this case, the IP address of the sender is [69.140.7.58]. Jump to step 9.
7. Or else if you have headers like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets [ ].
In this case, the IP address of the sender is [61.83.145.129] (Spam mail). Jump to step 9.
8. * If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.
Restart Windows without restarting the Computer
When you click on the SHUTDOWN button, make sure to simultaneous press SHIFT Button. If you hold the Shift key down while clicking on SHUTDOWN button, you computer would restart without restarting the Computer. This is equivalent to term "HOT REBOOT".
Different Ways to Lock Windows XP
These methods apply to both Windows XP Home and Windows XP Pro.
There are several ways to lock your Windows XP computer, but all of them use the same command line. The method you choose is a matter of personal preference.
1. via the keyboard
The easiest way to lock Windows XP is by simply pressing the Windows logo key and the letter L (for Lock) on a Microsoft Natural Keyboard or any other compatible keyboard that includes the Window key. Doing so will pop up the Unlock Computer Password box.
2. via a Shortcut.
If you don't have a keyboard with a Window key or simply don't like the keyboard method, then here's how you can make a desktop shortcut to lock your computer.
Right click an empty area of your desktop, choose New/Shortcut and enter this line as the command line:
rundll32.exe user32.dll, LockWorkStation
Click Next. Name the shortcut whatever you prefer and click Finish. That's it.
If you'd like to change the icon, just right click the shortcut and go to Properties/Shortcut/Change Icon.
3. via the command line
The above command line can also be used at a DOS prompt to lock your computer. One simple way you can do it would be by clicking Start/Run, typing CMD and then entering the command and pressing Enter.
4. via a bat file
This is similar to a Windows shortcut method. But it's a DOS version. If you've never created a bat (batch) file, but would like to try this method, simply open a new text file (such as with Notepad) and type the following commands:
@echo off
rundll32.exe user32.dll, LockWorkStation
cls
Save the file with a .bat extension, such as Lock.bat, and you're done. Double click to make the file run.
Those are the basic methods to lock XP, but there are some other relating factors of which you should be aware.
Password
It should go without saying that if you don't use a password to log on to your computer, then anyone can access your computer and unlock it. If you want to use the lock feature, then set a password by going to User Accounts in the Control Panel and then click Create Password.
Fast User Switching
Fast User Switching allows multiple login sessions at the same time. Whether you have this feature enabled or disabled will make a big difference in how your locked computer can be accessed and on the behavior of your shortcuts when executed.
If enabled, executing any of the above locking methods will bring up the Welcome screen and other users will be able to log on to the computer, as is the norm for Fast User Switching. So, you really don't get much security at all this way, if your intention is to lock your machine. With Fast User Switching, only your profile is locked, not the ability for other users to log into your system. Any other user can just log on to your computer and use it.
If Fast User Switching is disabled, you will have to enter a password to unlock the computer. Double clicking your shortcut will bring up the Unlock Computer password dialog box. This is the same lock method that Windows NT and 2000 uses.
If you're not sure whether or not you have Fast User Switching enabled or disabled, go to User Accounts in the Control Panel and click the Change the way users log on or off tab. There you will see your status for Fast User Switching.
Welcome Screen
Whether the Welcome screen is enabled or disabled also has an effect on the way your computer can be locked.
If the Welcome screen is enabled, you can also lock your computer in Task Manager (Ctrl+Alt+Delete) by clicking the Lock Computer option in the Shutdown menu list. This option will only appear if the Welcome screen is enabled—without Fast User Switching being enabled.
Note! In order to use Fast User Switching, the Welcome screen must be enabled. You cannot select Fast User Switching if the Welcome screen option is unchecked.
If the Welcome screen is disabled, you can lock the computer by pressing Ctrl+Alt+Delete and then clicking the Lock Computer tab in the Windows Security dialog box that comes up.
There are several ways to lock your Windows XP computer, but all of them use the same command line. The method you choose is a matter of personal preference.
1. via the keyboard
The easiest way to lock Windows XP is by simply pressing the Windows logo key and the letter L (for Lock) on a Microsoft Natural Keyboard or any other compatible keyboard that includes the Window key. Doing so will pop up the Unlock Computer Password box.
2. via a Shortcut.
If you don't have a keyboard with a Window key or simply don't like the keyboard method, then here's how you can make a desktop shortcut to lock your computer.
Right click an empty area of your desktop, choose New/Shortcut and enter this line as the command line:
rundll32.exe user32.dll, LockWorkStation
Click Next. Name the shortcut whatever you prefer and click Finish. That's it.
If you'd like to change the icon, just right click the shortcut and go to Properties/Shortcut/Change Icon.
3. via the command line
The above command line can also be used at a DOS prompt to lock your computer. One simple way you can do it would be by clicking Start/Run, typing CMD and then entering the command and pressing Enter.
4. via a bat file
This is similar to a Windows shortcut method. But it's a DOS version. If you've never created a bat (batch) file, but would like to try this method, simply open a new text file (such as with Notepad) and type the following commands:
@echo off
rundll32.exe user32.dll, LockWorkStation
cls
Save the file with a .bat extension, such as Lock.bat, and you're done. Double click to make the file run.
Those are the basic methods to lock XP, but there are some other relating factors of which you should be aware.
Password
It should go without saying that if you don't use a password to log on to your computer, then anyone can access your computer and unlock it. If you want to use the lock feature, then set a password by going to User Accounts in the Control Panel and then click Create Password.
Fast User Switching
Fast User Switching allows multiple login sessions at the same time. Whether you have this feature enabled or disabled will make a big difference in how your locked computer can be accessed and on the behavior of your shortcuts when executed.
If enabled, executing any of the above locking methods will bring up the Welcome screen and other users will be able to log on to the computer, as is the norm for Fast User Switching. So, you really don't get much security at all this way, if your intention is to lock your machine. With Fast User Switching, only your profile is locked, not the ability for other users to log into your system. Any other user can just log on to your computer and use it.
If Fast User Switching is disabled, you will have to enter a password to unlock the computer. Double clicking your shortcut will bring up the Unlock Computer password dialog box. This is the same lock method that Windows NT and 2000 uses.
If you're not sure whether or not you have Fast User Switching enabled or disabled, go to User Accounts in the Control Panel and click the Change the way users log on or off tab. There you will see your status for Fast User Switching.
Welcome Screen
Whether the Welcome screen is enabled or disabled also has an effect on the way your computer can be locked.
If the Welcome screen is enabled, you can also lock your computer in Task Manager (Ctrl+Alt+Delete) by clicking the Lock Computer option in the Shutdown menu list. This option will only appear if the Welcome screen is enabled—without Fast User Switching being enabled.
Note! In order to use Fast User Switching, the Welcome screen must be enabled. You cannot select Fast User Switching if the Welcome screen option is unchecked.
If the Welcome screen is disabled, you can lock the computer by pressing Ctrl+Alt+Delete and then clicking the Lock Computer tab in the Windows Security dialog box that comes up.
Multiple login in firefox with orkut,gmail,yahoo
Login with multiple ids at the same time in orkut , gmail , yahoo ....
To perform this trick u need firefox mozilla browser...
Perform the following steps..
Step 1:
open system properties(by right clicking my computer), choose tab advanced, click to environment variables button. In system variables section, click new. Type this information to each textbox.
variable name: moz_no_remote (should be all small letter)
variable value: 1
press ok to close all windows.
step 2:
open firefox icon's properties(from desktop and quick launch). Right click on the icon and click in the properties. In the target section add extension -p to the link..(like "c:\program files\mozilla firefox\firefox.exe" -p). Now press ok.
After that when u start firefox u have to create two separate profiles of firefox so that u can login to two accounts of any(orkut,yahoo,rediff or anything else).......
for three logins create three profiles of firefox.........
To perform this trick u need firefox mozilla browser...
Perform the following steps..
Step 1:
open system properties(by right clicking my computer), choose tab advanced, click to environment variables button. In system variables section, click new. Type this information to each textbox.
variable name: moz_no_remote (should be all small letter)
variable value: 1
press ok to close all windows.
step 2:
open firefox icon's properties(from desktop and quick launch). Right click on the icon and click in the properties. In the target section add extension -p to the link..(like "c:\program files\mozilla firefox\firefox.exe" -p). Now press ok.
After that when u start firefox u have to create two separate profiles of firefox so that u can login to two accounts of any(orkut,yahoo,rediff or anything else).......
for three logins create three profiles of firefox.........
View the Contents of Zip/Rar file before Downloading
Most of the files we download from the Internet are in Zip or Rar format. We wouldn’t like if we download an archive to find that the file we are looking for is not there. And it is also such a waste of Bandwidth and time to download a whole archive just for a single file. Archview is a Firefox addon that lets you preview the contents of an Archive before downloading. And using it you can even download a single file from the archive.
Currently it supports only RAR, ZIP and ISO format but that should be enough as they are the 2 most popular and common formats being used today. Archview adds itself to the stats bar and becomes active when the user clicks on a zip or rar link. It displays the contents almost instantly and presents the files of the archive in an XML or HTML interface. And what’s more, it even lets you download individual files for an archive, now no need to download a 10 MB archive for a file of 100 Kb that is inside.
The future version will also add support for the 7z format. It supports Firefox 2 and Firefox 3. It is definitely a great add on that can save you a lot of bandwidth.

Download Code:
https://addons.mozilla.org/en-US/firefox/addon/5028
Currently it supports only RAR, ZIP and ISO format but that should be enough as they are the 2 most popular and common formats being used today. Archview adds itself to the stats bar and becomes active when the user clicks on a zip or rar link. It displays the contents almost instantly and presents the files of the archive in an XML or HTML interface. And what’s more, it even lets you download individual files for an archive, now no need to download a 10 MB archive for a file of 100 Kb that is inside.
The future version will also add support for the 7z format. It supports Firefox 2 and Firefox 3. It is definitely a great add on that can save you a lot of bandwidth.

Download Code:
https://addons.mozilla.org/en-US/firefox/addon/5028
How to know that your PC is infected with Virus
Viruses seldom reveal whose computer is actually sending them. They commonly fake the 'From' address of the e-mail, often using an address found on the infected PC's hard drive. The virus probably came from an infected machine belonging to someone who knows both of you; it sent itself to every address on the hard drive, randomly picking yours as the "sender."
On the other hand, be very suspicious if your PC uploads files over the Internet without your approval. Much malware today sends info from your PC, either to spy on you or to use your PC to send spam or a virus. Make sure your firewall is set to stop and report on all outgoing activity you haven't explicitly approved. Windows XP's firewall doesn't provide this functionality, so if you don't already own a security suite or stand-alone firewall that can handle the job, I recommend that you get Zone Labs' ZoneAlarm or Sygate Personal Firewall, either of which is free for personal use.
You might discover hints of an infection in the System Configuration Utility, also known as Msconfig. To open it, click Start, Run, type msconfig, and then press. Click the Startup tab. In the list of programs that load automatically when Windows starts, look for one whose name resembles an eye chart; many malicious programs rename their files with random character strings. Others, though, mimic the names of real system components.
If programs like Msconfig, the Windows Registry Editor, and your antivirus program don't load, your PC is almost certainly infected with VIRUS (although these programs sometimes act up for reasons other than a viral infection).
Free online virus scanners can help you find the culprit if your regular antivirus program is compromised. I recommend Norton Antivirus and Kaspersky Lab.
On the other hand, be very suspicious if your PC uploads files over the Internet without your approval. Much malware today sends info from your PC, either to spy on you or to use your PC to send spam or a virus. Make sure your firewall is set to stop and report on all outgoing activity you haven't explicitly approved. Windows XP's firewall doesn't provide this functionality, so if you don't already own a security suite or stand-alone firewall that can handle the job, I recommend that you get Zone Labs' ZoneAlarm or Sygate Personal Firewall, either of which is free for personal use.
You might discover hints of an infection in the System Configuration Utility, also known as Msconfig. To open it, click Start, Run, type msconfig, and then press
If programs like Msconfig, the Windows Registry Editor, and your antivirus program don't load, your PC is almost certainly infected with VIRUS (although these programs sometimes act up for reasons other than a viral infection).
Free online virus scanners can help you find the culprit if your regular antivirus program is compromised. I recommend Norton Antivirus and Kaspersky Lab.
Make your Windows XP talk as you type..
Open a text file in notepad and write:
copy from here:-
Dim msg, sapi
msg=InputBox("Enter your text","Talk it")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg
Save the file with a (*.vbs) extension, it will create a VBScript File.
Then after clicking the .vbs file, it will prompt you for a text, input the text and press ok.
Enjoy..
copy from here:-
Dim msg, sapi
msg=InputBox("Enter your text","Talk it")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg
Save the file with a (*.vbs) extension, it will create a VBScript File.
Then after clicking the .vbs file, it will prompt you for a text, input the text and press ok.
Enjoy..
Trick To Make Your Firefox Fast
This tricks will improve the speed & load time of firefox. And you will be able to surf faster.
Open Firefox and type about:config in the address bar, Then look for the following entries, and make the corresponding changes.
• network.http.max-connections-per-server =32
• network.http.max-persistent-connections-per-proxy =16
• network.http.max-connections = 64
• network.http.max-persistent-connections-per-server = 10
• network.http.pipelining = true
• network.http.pipelining.maxrequests = 200
• network.http.request.max-start-delay = 0
• network.http.proxy.pipelining = true
• network.http.proxy.version = 1.0
Lastly right-click anywhere and select New -> Integer. Name it nglayout.initialpaint.delay and set its value to 0. This value is the amount of time the browser waits before it acts on information it recieves.
Open Firefox and type about:config in the address bar, Then look for the following entries, and make the corresponding changes.
• network.http.max-connections-per-server =32
• network.http.max-persistent-connections-per-proxy =16
• network.http.max-connections = 64
• network.http.max-persistent-connections-per-server = 10
• network.http.pipelining = true
• network.http.pipelining.maxrequests = 200
• network.http.request.max-start-delay = 0
• network.http.proxy.pipelining = true
• network.http.proxy.version = 1.0
Lastly right-click anywhere and select New -> Integer. Name it nglayout.initialpaint.delay and set its value to 0. This value is the amount of time the browser waits before it acts on information it recieves.
How to Join files HJSplit Guide
1. Make sure the files which you download have exactly the same name as mentioned on the website.
For Example, the file names are as follows:
Superman.Doomsday.avi.001
Superman.Doomsday.avi.002
Superman.Doomsday.avi.003
Superman.Doomsday.avi.004
Superman.Doomsday.avi.005
Superman.Doomsday.avi.006
Superman.Doomsday.avi.007
Note: This .001 .002 .003.... are the file extension.
2. Open HJSplit and click the button JOIN
3. Browse the filename with the extension .001
4. and click the START button.
5. You will get your single file as output.
You need HJSplit to join these files.
It's a freeware and you can get your copy from
www.freebyte.net/download/hjsplit.zip
For Example, the file names are as follows:
Superman.Doomsday.avi.001
Superman.Doomsday.avi.002
Superman.Doomsday.avi.003
Superman.Doomsday.avi.004
Superman.Doomsday.avi.005
Superman.Doomsday.avi.006
Superman.Doomsday.avi.007
Note: This .001 .002 .003.... are the file extension.
2. Open HJSplit and click the button JOIN
3. Browse the filename with the extension .001
4. and click the START button.
5. You will get your single file as output.
You need HJSplit to join these files.
It's a freeware and you can get your copy from
www.freebyte.net/download/hjsplit.zip
Get the serial number you need................
1- Go to Google.
2- In the search field type: "Product name" 94FBR
3- Where, "Product Name" is the name of the item you want to find the serial number for.
4- And voila - there you go - the serial number you needed.
HOW DOES THIS WORK?
Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.
See these example searches:
"Photoshop 7" 94FBR
"Age of Mythology" 94FBR
"Nero Burning Rom 5.5" 94FBR
2- In the search field type: "Product name" 94FBR
3- Where, "Product Name" is the name of the item you want to find the serial number for.
4- And voila - there you go - the serial number you needed.
HOW DOES THIS WORK?
Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.
See these example searches:
"Photoshop 7" 94FBR
"Age of Mythology" 94FBR
"Nero Burning Rom 5.5" 94FBR
Cool Hidden trick in Utorrent
This is a Good trick...
open utorrent--->help-->about utorrent.
when it shows a version screen, hit the 't' button
Now u'll see a tetris game. U can play there itself.
Just Hit The "t" on Ur KeyBoard and U Shud Be Able To
Play The Hidden TETRIS Game
open utorrent--->help-->about utorrent.
when it shows a version screen, hit the 't' button
Now u'll see a tetris game. U can play there itself.
Just Hit The "t" on Ur KeyBoard and U Shud Be Able To
Play The Hidden TETRIS Game
Lock Your Computer on Mouse Click
Instead of pressing CTRL+ALT+DEL or windows + L to lock your machine you can create an icon to lock your machine. There are very simple steps by using it you can simply lock your computer
using single mouse click.
Just Follow the simple step >>
1. Right click
an empty spot on the desktop, point to New and click Shortcut.
2. In the Create Shortcut dialog box, type the following in the 'Type the location' of the item text box:
rundll32 user32.dll,LockWorkStation
3. Click Next
4. In "Type a name for this shortcut", type "" (any name as u wish) and Click Finish
5. This will Create a shortcut in your Desktop.
6.Now each time when you want to lock the computer , Just click on this shortcut.
using single mouse click.
Just Follow the simple step >>
1. Right click
an empty spot on the desktop, point to New and click Shortcut.
2. In the Create Shortcut dialog box, type the following in the 'Type the location' of the item text box:
rundll32 user32.dll,LockWorkStation
3. Click Next
4. In "Type a name for this shortcut", type "" (any name as u wish) and Click Finish
5. This will Create a shortcut in your Desktop.
6.Now each time when you want to lock the computer , Just click on this shortcut.
How to solve basic Dual Boot Issues
Case 1: You have Dual Boot Win7 and XP/Vista and you lost the XP/Vista boot option at startup, but Win7 boots fine.
Solution:
1. Start Win7.
2. If you can see your XP/Vista partition in Computer, write down the drive letter (e.g. D
3. If you can't see the XP partition and you see all others but this one, open Control Panel - Adminstrative Tools - Computer Management -> Disk Management(left pane) and right-click the partition without a drive letter, choose "Change drive letters and paths" and assign a drive letter for the partition, e.g. D: .
4. Open an elevated command prompt and type the following lines followed by Enter for each line, changing the drive letter D: (in blue) with the one on your XP/Vista partition:
FOR RESTORING XP
Code:
bcdedit /create {ntldr} /d "Windows XP"
bcdedit /set {ntldr} device partition=D:
bcdedit /set {ntldr} path \ntldr
bcdedit /displayorder {ntldr} /addlast
FOR RESTORING VISTA
Code:
bcdedit /copy {current} /d "Windows Vista"
(You will get a response saying that a new {UUID} was created successfully.
Write down or copy the new UUID.)
Code:
bcdedit /set {place_new_UUID_here} device partition=D:
bcdedit /set {place_new_UUID_here} osdevice partition=D:
5. Done
Case 2: You have Dual Boot Win7 and XP/Vista and you lost the Win7 boot option at startup, but XP/Vista boots fine.
Solution:
1. Insert the Win7 Installation DVD and boot your computer with it (as if you were making an installation).
2. At the first screen , select your language etc and press enter.
3. At the second screen, click "Repair Computer" at the bottom left.
4. Wait until startup repair is finished and reboot.
5. Done. You can now boot Win7.
Case 3: You have restored booting Win7 using the Case 2 method or other way, but now you've lost XP/VISTA .
Solution: Follow Case 1 Solution.
Case 4: You want Win7/Mac Dual Boot.
Solution: Follow these instructions: OSX and Windows 7 Dual Boot
Hope it helps
Solution:
1. Start Win7.
2. If you can see your XP/Vista partition in Computer, write down the drive letter (e.g. D
3. If you can't see the XP partition and you see all others but this one, open Control Panel - Adminstrative Tools - Computer Management -> Disk Management(left pane) and right-click the partition without a drive letter, choose "Change drive letters and paths" and assign a drive letter for the partition, e.g. D: .
4. Open an elevated command prompt and type the following lines followed by Enter for each line, changing the drive letter D: (in blue) with the one on your XP/Vista partition:
FOR RESTORING XP
Code:
bcdedit /create {ntldr} /d "Windows XP"
bcdedit /set {ntldr} device partition=D:
bcdedit /set {ntldr} path \ntldr
bcdedit /displayorder {ntldr} /addlast
FOR RESTORING VISTA
Code:
bcdedit /copy {current} /d "Windows Vista"
(You will get a response saying that a new {UUID} was created successfully.
Write down or copy the new UUID.)
Code:
bcdedit /set {place_new_UUID_here} device partition=D:
bcdedit /set {place_new_UUID_here} osdevice partition=D:
5. Done
Case 2: You have Dual Boot Win7 and XP/Vista and you lost the Win7 boot option at startup, but XP/Vista boots fine.
Solution:
1. Insert the Win7 Installation DVD and boot your computer with it (as if you were making an installation).
2. At the first screen , select your language etc and press enter.
3. At the second screen, click "Repair Computer" at the bottom left.
4. Wait until startup repair is finished and reboot.
5. Done. You can now boot Win7.
Case 3: You have restored booting Win7 using the Case 2 method or other way, but now you've lost XP/VISTA .
Solution: Follow Case 1 Solution.
Case 4: You want Win7/Mac Dual Boot.
Solution: Follow these instructions: OSX and Windows 7 Dual Boot
Hope it helps
Transferring files using bluetooth disabled computer
Here you can learn how to transfer your files using a bluetooth disabled computer
all you need is to follow this
click START then
select RUN then
type fsquirt
then ENTER.
you will get a screen wizard
using this Wizard, now you can do file transfer.
all you need is to follow this
click START then
select RUN then
type fsquirt
then ENTER.
you will get a screen wizard
using this Wizard, now you can do file transfer.
Make your folders Hidden , And unsearchable w/o using any software
Hey guyz...
You already know that File/Folder can be eaisly hidden by Right clicking on that ,and Ticking hidden Check Box and again clicking on OK .....
BUT, by doing that your File/Folder can be easily find by Showing hidden files and folders in folder options or even by searching technique....
BUT here I've a cool trick
which cannot be found either by searching or by any other way....interesting then follow these steps :
First create the folder which you want to make private Ex: foo and is created in
D:\ drive..
now open CMD prompt and type D: then you can go to D drive and now type
attrib +h +s foo "foo is the folder which you have created"
and see your folder will be hidden .....
and if you want to access you folder again
just open CMD prompt again and in D drive type: attrib -h -s foo
and your folder will be visible again.....WOW that's it....
You already know that File/Folder can be eaisly hidden by Right clicking on that ,and Ticking hidden Check Box and again clicking on OK .....
BUT, by doing that your File/Folder can be easily find by Showing hidden files and folders in folder options or even by searching technique....
BUT here I've a cool trick
which cannot be found either by searching or by any other way....interesting then follow these steps :
First create the folder which you want to make private Ex: foo and is created in
D:\ drive..
now open CMD prompt and type D: then you can go to D drive and now type
attrib +h +s foo "foo is the folder which you have created"
and see your folder will be hidden .....
and if you want to access you folder again
just open CMD prompt again and in D drive type: attrib -h -s foo
and your folder will be visible again.....WOW that's it....
Posted by
F u N n Y G u Y
at
9:14 PM
Labels:
And unsearchable w/o using any software,
Make your folders Hidden


Change folders back ground with your favourite image
• I think you are very bored to see the default white screen in your’s folder
• Here is the trick to change your folder background
• To do this ,
• Open one new notepad and type below code:
• [{BE098140-A513-11D0-A3A4-00C04FD706EC}] iconarea_image=""
• Between the quotes, you just type the address of the image where that exists
• For example:
• [{BE098140-A513-11D0-A3A4-00C04FD706EC}] iconarea_image="D:\WALL'S\NEW WALLPAPERS\GREETINGS\flower.jpg"
• “D:\WALL'S\NEWWALLPAPERS\GREETINGS\flower.jpg ” is the path where the image exists.
• And save that file as “desktop.ini”
• If it asks for replace that file then click on “yes”
• And now open run by pressing winlogo+R button
• And type : attrib +s"F:\movies"
• (with quotes) then press OK
• Here “F:\movies” is the drive or folder name where you want to insert image.
• That Means in “F:\” drive, “movies” folder that image will insert.
• Now open that folder ,WOW....!! its better now.
• Here is the trick to change your folder background
• To do this ,
• Open one new notepad and type below code:
• [{BE098140-A513-11D0-A3A4-00C04FD706EC}] iconarea_image=""
• Between the quotes, you just type the address of the image where that exists
• For example:
• [{BE098140-A513-11D0-A3A4-00C04FD706EC}] iconarea_image="D:\WALL'S\NEW WALLPAPERS\GREETINGS\flower.jpg"
• “D:\WALL'S\NEWWALLPAPERS\GREETINGS\flower.jpg ” is the path where the image exists.
• And save that file as “desktop.ini”
• If it asks for replace that file then click on “yes”
• And now open run by pressing winlogo+R button
• And type : attrib +s"F:\movies"
• (with quotes) then press OK
• Here “F:\movies” is the drive or folder name where you want to insert image.
• That Means in “F:\” drive, “movies” folder that image will insert.
• Now open that folder ,WOW....!! its better now.
Increase your internet speed
windows will blocks 20% of your internet speed for updates and for others
· Press (win logo+R) to open run window
· And then type ‘gpedit.msc’ press enter
· Go to below path of group policy
· Computer configiration >>adminstrative templates >> network >>Qos packet
· There you can see a panel at right named setting
· There you can find fourth option “limit reservable band width”
· If it is not configured then double click it then choose enable
· And then edit the bandwidth limit(%)and set it to “0” (default 20 erase ‘20’ and mark it as ‘0’)
· Click apply and close group
· Reboot compulsory to make it work
You can also set your modem speed at 115 mbps:
· How to connect modem at 115 kbs
· first go to control panel in it click on phone and modem options in it click on modem in modem
· click on properties after that click on advanced in advanced u will see written"exta initiation commands there write “AT&FX” and restart the computer and get conneted in 115kbs.
· Press (win logo+R) to open run window
· And then type ‘gpedit.msc’ press enter
· Go to below path of group policy
· Computer configiration >>adminstrative templates >> network >>Qos packet
· There you can see a panel at right named setting
· There you can find fourth option “limit reservable band width”
· If it is not configured then double click it then choose enable
· And then edit the bandwidth limit(%)and set it to “0” (default 20 erase ‘20’ and mark it as ‘0’)
· Click apply and close group
· Reboot compulsory to make it work
You can also set your modem speed at 115 mbps:
· How to connect modem at 115 kbs
· first go to control panel in it click on phone and modem options in it click on modem in modem
· click on properties after that click on advanced in advanced u will see written"exta initiation commands there write “AT&FX” and restart the computer and get conneted in 115kbs.
Create your own invisible folder with out using any software
* Here is the trick to create a folder which cannot be seen . To create that,u just follow the below steps
* Right click on desktop and create new folder
* After doing that windows will ask you for new name
* Then press back space to erase that name
* And just press ‘ALT0160’ from your kep board remember that you must press numbers from num pad only
* Then it creates the folder with out name
* u just right click on that folder and select properties
* Under the customise tab u can see “change icon”
* Then select that and you can see big list of icons
* down further you will find blank icons
* Select that and click on Ok and Apply and again OK in previous box
And thats done!!!
U just drag your mouse pointer by holdind left click then you will find that folder is selected
* Right click on desktop and create new folder
* After doing that windows will ask you for new name
* Then press back space to erase that name
* And just press ‘ALT0160’ from your kep board remember that you must press numbers from num pad only
* Then it creates the folder with out name
* u just right click on that folder and select properties
* Under the customise tab u can see “change icon”
* Then select that and you can see big list of icons
* down further you will find blank icons
* Select that and click on Ok and Apply and again OK in previous box
And thats done!!!
U just drag your mouse pointer by holdind left click then you will find that folder is selected
Posted by
F u N n Y G u Y
at
9:12 PM
Labels:
Create your own invisible folder with out using any software


Make your folders private
•Double-click the drive where Windows is installed (usually drive (C, unless you have more than one drive on your computer).
•If the contents of the drive are hidden, under System Tasks, click Show the contents of this drive.
•Double-click the Documents and Settings folder.
•Double-click your user folder.
•Right-click any folder in your user profile, and then click Properties.
•On the Sharing tab, select the Make this folder private so that only I have access to it check box.
Note:
•To open My Computer, click Start, and then click My Computer.
•This option is only available for folders included in your user profile. Folders in your user profile include My Documents and its subfolders, Desktop, Start Menu, Cookies, and Favorites. If you do not make these folders private, they are available to everyone who uses your computer.
•When you make a folder private, all of its subfolders are private as well. For example, when you make My Documents private, you also make My Music and My Pictures private. When you share a folder, you also share all of its subfolders unless you make them private.
•You cannot make your folders private if your drive is not formatted as NTFS For information about converting your drive to NTFS
•If the contents of the drive are hidden, under System Tasks, click Show the contents of this drive.
•Double-click the Documents and Settings folder.
•Double-click your user folder.
•Right-click any folder in your user profile, and then click Properties.
•On the Sharing tab, select the Make this folder private so that only I have access to it check box.
Note:
•To open My Computer, click Start, and then click My Computer.
•This option is only available for folders included in your user profile. Folders in your user profile include My Documents and its subfolders, Desktop, Start Menu, Cookies, and Favorites. If you do not make these folders private, they are available to everyone who uses your computer.
•When you make a folder private, all of its subfolders are private as well. For example, when you make My Documents private, you also make My Music and My Pictures private. When you share a folder, you also share all of its subfolders unless you make them private.
•You cannot make your folders private if your drive is not formatted as NTFS For information about converting your drive to NTFS
How to remove new folder exe or regsvr exe or autorun inf virus
I want to tell you a story, two days back i got affected by this virus very badly as it eat up all my empty hard disk space of around 700 MB .
I was surprised that my most reliable friend Avast, for the first time failed me in this war against viruses but then again avg and bitdiffender also failed against it. This virus is know popularly as regsvr.exe virus, or as new folder.exe virus and most people identify this one by seeing autorun.inf file on their pen drives, But trend micro identified it as WORM_DELF.FKZ. It is spreading mostly using pen drives as the medium.
Well, so here is the story of how i was able to kill the monster and reclaim my hard disk space.
Manual Process of removal
I prefer manual process simply because it gives me option to learn new things in the process.
So let’s start the process off reclaiming the turf that virus took over from us.
1. Cut The Supply Line
a. Search for autorun.inf file. It is a read only file so you will have to change it to normal by right clicking the file , selecting the properties and un-check the read only option
b. Open the file in notepad and delete everything and save the file.
c. Now change the file status back to read only mode so that the virus could not get access again.
d.
e. Click start->run and type msconfig and click ok
f. Go to startup tab look for regsvr and uncheck the option click OK.
g. Click on Exit without Restart, cause there are still few things we need to do before we can restart the PC.
h. Now go to control panel -> scheduled tasks, and delete the At1 task listed their.
2. Open The Gates Of Castle
a. Click on start -> run and type gpedit.msc and click Ok.
b.
c. If you are Windows XP Home Edition user you might not have gpedit.msc in that case download and install it from Windows XP Home Edition: gpedit.msc and then follow these steps.
d. Go to users configuration->Administrative templates->system
e. Find “prevent access to registry editing tools” and change the option to disable.
f.
g. Once you do this you have registry access back.
3. Launch The Attack At Heart Of Castle
a. Click on start->run and type regedit and click ok
b. Go to edit->find and start the search for regsvr.exe,
c.
d. Delete all the occurrence of regsvr.exe; remember to take a backup before deleting. KEEP IN MIND regsvr32.exe is not to be deleted. Delete regsvr.exe occurrences only.
e. At one ore two places you will find it after explorer.exe in theses cases only delete the regsvr.exe part and not the whole part. E.g. Shell = “Explorer.exe regsvr.exe” the just delete the regsvr.exe and leave the explorer.exe
4. Seek And Destroy the enemy soldiers, no one should be left behind
a. Click on start->search->for files and folders.
b. Their click all files and folders
c. Type “*.exe” as filename to search for
d. Click on ‘when was it modified ‘ option and select the specify date option
e. Type from date as 1/31/2008 and also type To date as 1/31/2008
f.
g. Now hit search and wait for all the exe’s to show up.
h. Once search is over select all the exe files and shift+delete the files, caution must be taken so that you don’t delete the legitimate exe file that you have installed on 31st January.
i. Also selecting lot of files together might make your computer unresponsive so delete them in small bunches.
j. Also find and delete regsvr.exe, svchost .exe( notice an extra space between the svchost and .exe)
5. Time For Celebrations
1. Now do a cold reboot (ie press the reboot button instead) and you are done.
I hope this information helps you win your own battle against this virus. Soon all antivirus programs will be able to automatically detect and clean this virus. Also i hope Avast finds a way to solve this issues.
As a side note i have found a little back dog( winpatrol ) that used to work perfectly on my old system. It was not their in my new PC, I have installed it again , as I want to stay ahead by forever closing the supply line of these virus. You can download it form Winpatrol website.
I was surprised that my most reliable friend Avast, for the first time failed me in this war against viruses but then again avg and bitdiffender also failed against it. This virus is know popularly as regsvr.exe virus, or as new folder.exe virus and most people identify this one by seeing autorun.inf file on their pen drives, But trend micro identified it as WORM_DELF.FKZ. It is spreading mostly using pen drives as the medium.
Well, so here is the story of how i was able to kill the monster and reclaim my hard disk space.
Manual Process of removal
I prefer manual process simply because it gives me option to learn new things in the process.
So let’s start the process off reclaiming the turf that virus took over from us.
1. Cut The Supply Line
a. Search for autorun.inf file. It is a read only file so you will have to change it to normal by right clicking the file , selecting the properties and un-check the read only option
b. Open the file in notepad and delete everything and save the file.
c. Now change the file status back to read only mode so that the virus could not get access again.
d.
e. Click start->run and type msconfig and click ok
f. Go to startup tab look for regsvr and uncheck the option click OK.
g. Click on Exit without Restart, cause there are still few things we need to do before we can restart the PC.
h. Now go to control panel -> scheduled tasks, and delete the At1 task listed their.
2. Open The Gates Of Castle
a. Click on start -> run and type gpedit.msc and click Ok.
b.
c. If you are Windows XP Home Edition user you might not have gpedit.msc in that case download and install it from Windows XP Home Edition: gpedit.msc and then follow these steps.
d. Go to users configuration->Administrative templates->system
e. Find “prevent access to registry editing tools” and change the option to disable.
f.
g. Once you do this you have registry access back.
3. Launch The Attack At Heart Of Castle
a. Click on start->run and type regedit and click ok
b. Go to edit->find and start the search for regsvr.exe,
c.
d. Delete all the occurrence of regsvr.exe; remember to take a backup before deleting. KEEP IN MIND regsvr32.exe is not to be deleted. Delete regsvr.exe occurrences only.
e. At one ore two places you will find it after explorer.exe in theses cases only delete the regsvr.exe part and not the whole part. E.g. Shell = “Explorer.exe regsvr.exe” the just delete the regsvr.exe and leave the explorer.exe
4. Seek And Destroy the enemy soldiers, no one should be left behind
a. Click on start->search->for files and folders.
b. Their click all files and folders
c. Type “*.exe” as filename to search for
d. Click on ‘when was it modified ‘ option and select the specify date option
e. Type from date as 1/31/2008 and also type To date as 1/31/2008
f.
g. Now hit search and wait for all the exe’s to show up.
h. Once search is over select all the exe files and shift+delete the files, caution must be taken so that you don’t delete the legitimate exe file that you have installed on 31st January.
i. Also selecting lot of files together might make your computer unresponsive so delete them in small bunches.
j. Also find and delete regsvr.exe, svchost .exe( notice an extra space between the svchost and .exe)
5. Time For Celebrations
1. Now do a cold reboot (ie press the reboot button instead) and you are done.
I hope this information helps you win your own battle against this virus. Soon all antivirus programs will be able to automatically detect and clean this virus. Also i hope Avast finds a way to solve this issues.
As a side note i have found a little back dog( winpatrol ) that used to work perfectly on my old system. It was not their in my new PC, I have installed it again , as I want to stay ahead by forever closing the supply line of these virus. You can download it form Winpatrol website.
Posted by
F u N n Y G u Y
at
9:09 PM
Labels:
How to remove new folder exe or regsvr exe or autorun inf virus


How to Delete Specific URLs from your Browser (Firefox , IE)
Sometimes a situation comes that we have to delete certain specific website address (url) only from the web-browser location or address bar say to preserve your identity. For example, you visited a certain website and don’t want your friends or others to know that you visited that site, then you have two methods to delete the website links either delete all the urls from the address bar or only the specific one (recommended).
## In Firefox, you just need to move your mouse over the website entry and press Shift + Delete Key combination to delete the desired address from the history.
## For Internet Explorer, follow the steps exactly as described bellow; do keep in mind this trick needs editing the registry and you need to be very careful with it:
• Close any open Internet Explorer window
• Go to Start->Run and type in regedit.exe and press enter to launch the registry editor
• Navigate to the following key:
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
• Delete the desired URL
## In Firefox, you just need to move your mouse over the website entry and press Shift + Delete Key combination to delete the desired address from the history.
## For Internet Explorer, follow the steps exactly as described bellow; do keep in mind this trick needs editing the registry and you need to be very careful with it:
• Close any open Internet Explorer window
• Go to Start->Run and type in regedit.exe and press enter to launch the registry editor
• Navigate to the following key:
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
• Delete the desired URL
Posted by
F u N n Y G u Y
at
9:08 PM
Labels:
How to Delete Specific URLs from your Browser (Firefox,
IE)


Add Your Photo To "MY COMPUTER" Properties
First Step :-
Create a bmp file (Your Photo) and Save As with the name OEMLOGO.BMP
## Important : The size of the image should be within 180 (wide) x 120 (high) pixels (For Best Result)
Second Step :-
open notepad and dump the following lines into it and Save As with the name OEMINFO.INI
[General]
Manufacturer=Your Name Here
Model=Your Model Here
[Support Information]
Line1=Your Name Here
Line2=Your Address Here
Line3=Your Email Address Here
Line4=Your Working Hours Here
## Save the file.
now copy to or place OEMINFO/OEMINFO.INI and OEMLOGO/OEMLOGO.BMP both files in the c:\windows\system32 directory.
## Then make a right click on My Computer, select Properties, in the General tab you w'll see your photo, and a button will be highlighted (support information) make a click on it, you will be able to see the changes.
## Now if you want to display some more information then simply increase the line in the file. (Line5=xxx , Line6=xxx )
Create a bmp file (Your Photo) and Save As with the name OEMLOGO.BMP
## Important : The size of the image should be within 180 (wide) x 120 (high) pixels (For Best Result)
Second Step :-
open notepad and dump the following lines into it and Save As with the name OEMINFO.INI
[General]
Manufacturer=Your Name Here
Model=Your Model Here
[Support Information]
Line1=Your Name Here
Line2=Your Address Here
Line3=Your Email Address Here
Line4=Your Working Hours Here
## Save the file.
now copy to or place OEMINFO/OEMINFO.INI and OEMLOGO/OEMLOGO.BMP both files in the c:\windows\system32 directory.
## Then make a right click on My Computer, select Properties, in the General tab you w'll see your photo, and a button will be highlighted (support information) make a click on it, you will be able to see the changes.
## Now if you want to display some more information then simply increase the line in the file. (Line5=xxx , Line6=xxx )
Sunday, June 21, 2009
Check Your Anti-Virus Software Working Properly Or Not
This article is best in checking out whether your antivirus software is running at its best or not. It was not known to many that how to check the antivirus software they are using is working properly or not. Please read the article for the details.
1:-Click Start --> Open Notepad -->
2:-Copy the code exactly in the notepad :
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
3:-Now Save it with the name fakevirus.exe in any of your folder/drives.
4:-If this file got deleted immediately...then it means that your antivirus is working properly and updated !!
5:-If this doesnt happens and you see the saved file in that folder do right click the file and select scan with your installed antivirus and if the scan shows the file then it means your antivirus is working properly but not updated with a new version, as best antivirus softwares detect any virus (at the same second when you save the same in your system)without your effort of going to specified folder and scanning the folder.
6:-If it doesnt shows any kind of threats then you need to change your antivirus software immediately with some good one with the new version.
1:-Click Start --> Open Notepad -->
2:-Copy the code exactly in the notepad :
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
3:-Now Save it with the name fakevirus.exe in any of your folder/drives.
4:-If this file got deleted immediately...then it means that your antivirus is working properly and updated !!
5:-If this doesnt happens and you see the saved file in that folder do right click the file and select scan with your installed antivirus and if the scan shows the file then it means your antivirus is working properly but not updated with a new version, as best antivirus softwares detect any virus (at the same second when you save the same in your system)without your effort of going to specified folder and scanning the folder.
6:-If it doesnt shows any kind of threats then you need to change your antivirus software immediately with some good one with the new version.
Sunday, June 14, 2009
Display Name in Task Bar
This is a simple trick to diaplay your name in your right most end of the taskbar.
To do this.
Go to:
Start -> Control Panel -> Regional and Language Options -> Customize (beside English US) ->
Go to Time tab -> Edit the AM symbol and PM symbol from AM and PM to include your name -> Apply -> OK
For example: If your name is “Bill”, set AM Symbol to “AM Bill” and PM Symbol to “PM Bill”.
Now, your name will be displayed in your Windows Taskbar, right after the time.
Enjoy!
To do this.
Go to:
Start -> Control Panel -> Regional and Language Options -> Customize (beside English US) ->
Go to Time tab -> Edit the AM symbol and PM symbol from AM and PM to include your name -> Apply -> OK
For example: If your name is “Bill”, set AM Symbol to “AM Bill” and PM Symbol to “PM Bill”.
Now, your name will be displayed in your Windows Taskbar, right after the time.
Enjoy!
Hidden movie in windows xp ~STARWARS~
There is a Small animation movie fully made based on text by Simon jansen.
Every one having a Internet Connection must have to watch this movie and have to appreciate their hard work since they used only the texts to do this movie.
All you need is to
Click Start->Choose
Run
Then Type This
telnet towel.blinkenlights.nl
Press Enter then Enjoy the Movie in Command Prompt Window
Every one having a Internet Connection must have to watch this movie and have to appreciate their hard work since they used only the texts to do this movie.
All you need is to
Click Start->Choose
Run
Then Type This
telnet towel.blinkenlights.nl
Press Enter then Enjoy the Movie in Command Prompt Window
HACK IN TO WEB CAMS
It is so easy to hack into webcams all you need is a Internet Connection
Go to WWW.GOOGLE.COM and PUT THIS IN SEARCH BAR
inurl:/view/index.shtml
or intitle:liveapplet
or inurl:lvappl
and click on search, it show a list of searched items. go to an linksome of them don't work. but some work. u will see street/traffic and not only this.
u can also movethem right or leftor zoom in or zoom out........
its kind of fun
NOTE: u should have a high speed internet connection for this.
Go to WWW.GOOGLE.COM and PUT THIS IN SEARCH BAR
inurl:/view/index.shtml
or intitle:liveapplet
or inurl:lvappl
and click on search, it show a list of searched items. go to an linksome of them don't work. but some work. u will see street/traffic and not only this.
u can also movethem right or leftor zoom in or zoom out........
its kind of fun
NOTE: u should have a high speed internet connection for this.
Create the CON file
If you have tried to create a folder name CON you cant since its been used by the Windows Assembly.
Try in a command prompt (after cd-ing to that file's directory):
type GT.txt > CON
type GT.txt > CON1
But ,its possible to create CON folder in ur windows based os(XP, VISTA)
open the command Promt
then type this
note:- Choose the specifice drive that u want to create CON folder
eg :- C: , D: etc...
now type this
iam selecting the drive E:
E:\> mkdir \\.\e:\con
' hold alt+0160 or 255 and then type con,nul,com1 etc''
to creat: mkdir \\.\c:\con
to remove: rmdir \\.\c:\con
file names in Windows are reserved because they represent devices:
con, con.* -> the console
prn, prn.* -> the default printer, as a character device
aux, aux.* -> the default serial terminal, as a character device
lpt1, lpt2, lpt3, lpt4, lpt5, lpt6, lpt7, lpt8, lpt9 -> the parallel ports, as character devices
lpt1.*, lpt2.*, lpt3.*, lpt4.*, lpt5.*, lpt6.*, lpt7.*, lpt8.*, lpt9.*
com1, com2, com3, com4, com5, com6, com7, com8, com9 -> the serial ports, as character devices
com1.*, com2.*, com3.*, com4.*, com5.*, com6.*, com7.*, com8.*, com9.*
nul, nul.* -> the NUL or "waste bit bucket" or "black hole for bits" or "/dev/null" device
Try in a command prompt (after cd-ing to that file's directory):
type GT.txt > CON
type GT.txt > CON1
But ,its possible to create CON folder in ur windows based os(XP, VISTA)
open the command Promt
then type this
note:- Choose the specifice drive that u want to create CON folder
eg :- C: , D: etc...
now type this
iam selecting the drive E:
E:\> mkdir \\.\e:\con
' hold alt+0160 or 255 and then type con,nul,com1 etc''
to creat: mkdir \\.\c:\con
to remove: rmdir \\.\c:\con
file names in Windows are reserved because they represent devices:
con, con.* -> the console
prn, prn.* -> the default printer, as a character device
aux, aux.* -> the default serial terminal, as a character device
lpt1, lpt2, lpt3, lpt4, lpt5, lpt6, lpt7, lpt8, lpt9 -> the parallel ports, as character devices
lpt1.*, lpt2.*, lpt3.*, lpt4.*, lpt5.*, lpt6.*, lpt7.*, lpt8.*, lpt9.*
com1, com2, com3, com4, com5, com6, com7, com8, com9 -> the serial ports, as character devices
com1.*, com2.*, com3.*, com4.*, com5.*, com6.*, com7.*, com8.*, com9.*
nul, nul.* -> the NUL or "waste bit bucket" or "black hole for bits" or "/dev/null" device
Change you Drive Background
This is how you can make any drive in your computer look after attempting this tutorial.
To do this ,follow these steps
1) Create a Text File anywhere on your computer
2) Open it via NotePad
3) Select "save as" from the File menu
4) Give it the name "Desktop.ini" (without quotes) and save it in the location of your choice
5) Open Desktop.ini via NotePad/Wordpad
6) Copy-Paste the following code :
[ExtShellFolderViews]
{BE098140-A513-11D0-A3A4-00C04FD706EC}=
{BE098140-A513-11D0-A3A4-00C04FD706EC}
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
IconArea_Image=H:\Drafts\bliss.jpg
7) Replace "H:\Pictures\selfpic.jpg" with the path of the Image you want to display as the Drive background.
8) Save the File
9) Cut-Paste Desktop.ini to the Root of the Drive of which you want the background to be Changed.
10 ) Select the file and check it's properties.
11) In the properties Window check "Hidden"
12) press "ok"
13) Refresh the screen and the drive must have aquired the selected Image as background
To do this ,follow these steps
1) Create a Text File anywhere on your computer
2) Open it via NotePad
3) Select "save as" from the File menu
4) Give it the name "Desktop.ini" (without quotes) and save it in the location of your choice
5) Open Desktop.ini via NotePad/Wordpad
6) Copy-Paste the following code :
[ExtShellFolderViews]
{BE098140-A513-11D0-A3A4-00C04FD706EC}=
{BE098140-A513-11D0-A3A4-00C04FD706EC}
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
IconArea_Image=H:\Drafts\bliss.jpg
7) Replace "H:\Pictures\selfpic.jpg" with the path of the Image you want to display as the Drive background.
8) Save the File
9) Cut-Paste Desktop.ini to the Root of the Drive of which you want the background to be Changed.
10 ) Select the file and check it's properties.
11) In the properties Window check "Hidden"
12) press "ok"
13) Refresh the screen and the drive must have aquired the selected Image as background
Change Your Ip In Less Then a Minute
This is slightly lenghty process for a newbie.
But if you stick on to this article you can do it perfectly
1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok
You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"
You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again
You should now be back to the "Local Area Connection" screen.
15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address
With a little practice, you can easily get this process down to 15 seconds.
But if you stick on to this article you can do it perfectly
1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok
You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"
You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again
You should now be back to the "Local Area Connection" screen.
15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address
With a little practice, you can easily get this process down to 15 seconds.
Change Your Processor to Quad Core
This trick is really fun one since you can make your friends fool.It may also not recommended as this may cause windows to provide falsified information to it self and other applications, which would cause system stability issue and may slow down the system….
To Change the Processor Name shown in the System properties Dialog Box
Just Follow these Steps
Under Windows XP, Click Start, then RUN Command, “regedit“… (Without the quote symbols)… Now please navigate your self to this Registry location,
>HKEY_LOCAL_MACHINE > HARDWARE > DESCRIPTION > SYSTEM > CENTRAL PROCESSOR > GO TO 0
Now please double click, on the key PROCESSORNAMESTRING . Change the value as you like.Using this you can change your Processor info even from Pentium III to Quad Core but only for displaying in properties only
To Change the Processor Name shown in the System properties Dialog Box
Just Follow these Steps
Under Windows XP, Click Start, then RUN Command, “regedit“… (Without the quote symbols)… Now please navigate your self to this Registry location,
>HKEY_LOCAL_MACHINE > HARDWARE > DESCRIPTION > SYSTEM > CENTRAL PROCESSOR > GO TO 0
Now please double click, on the key PROCESSORNAMESTRING . Change the value as you like.Using this you can change your Processor info even from Pentium III to Quad Core but only for displaying in properties only
Change any User Account password
Do you want to change/remove the password of another user's User Account in XP?
For this trick you no need to know their previous password.
Just Click Start->Choose Run there type
control userpasswords2 and hit enter.
Now You'll get this window representing as something like list of users.
Select any user from the list and click Reset Password
and type in a new password that you want, you don't need to know the old password.
Enjoy this trick in your Friends Pc's to make fun around with them
For this trick you no need to know their previous password.
Just Click Start->Choose Run there type
control userpasswords2 and hit enter.
Now You'll get this window representing as something like list of users.
Select any user from the list and click Reset Password
and type in a new password that you want, you don't need to know the old password.
Enjoy this trick in your Friends Pc's to make fun around with them
Sunday, May 31, 2009
Watch You Tube Videos in High Definition Format
Have you ever tried to watch your favourite videos in High Definition format in the Youtube site.If not means try here after by using this simple trick
When ever you start to watch a video just add &fmt=18 to the URL of the Video inorder to make it a High Definition Video.Those characters "&fmt=18" make You tube recognize that you are requesting to play the video in a High Definition format.
Thats all you can Enjoy watchin any videos in High Definition format in Youtube.
for Ex: this is the URL of the video you are going to watch meand
http://www.youtube.com/watch?v=YsjyB_hcN7Y
just add &fmt=18 at the last in the addressbar of the URL like this
http://www.youtube.com/watch?v=YsjyB_hcN7Y&fmt=18
When ever you start to watch a video just add &fmt=18 to the URL of the Video inorder to make it a High Definition Video.Those characters "&fmt=18" make You tube recognize that you are requesting to play the video in a High Definition format.
Thats all you can Enjoy watchin any videos in High Definition format in Youtube.
for Ex: this is the URL of the video you are going to watch meand
http://www.youtube.com/watch?v=YsjyB_hcN7Y
just add &fmt=18 at the last in the addressbar of the URL like this
http://www.youtube.com/watch?v=YsjyB_hcN7Y&fmt=18
Resume Your Download using Utorrent or Bittorrent Even After Formatting OS
On many occasions we might have been frustrated because of formatting our OS due to some problem or a sudden crash in our system and at the same time we might be downloading tons of important files in that case we cant resume from where we left.In some other cases our system files might be corrupt so that we cant proceed further of our downloadings in Bittorrent or Utorrent.
Now for all that problems here is a solutin that will help every one.
Solution:
Before formatting your Os just copy the files in the Following folder and take a Backup or do this when ever you close a session in your Pc so that it can be highly usefull.
C:\Documents and Settings\USERNAME\Application Data\BitTorrent
C:\Documents and Settings\USERNAME\Application Data\utorrent
Incase if you had installed you Os in 'C' drive.
After Installing the Os, copy down the Backup files that you have made before formatting the Pc and put these files in the Original section or the Application path that i have mentioned.Now check your Downloading it will start from where it left it will be good to see that your files started to download from where it left.
Now for all that problems here is a solutin that will help every one.
Solution:
Before formatting your Os just copy the files in the Following folder and take a Backup or do this when ever you close a session in your Pc so that it can be highly usefull.
C:\Documents and Settings\USERNAME\Application Data\BitTorrent
C:\Documents and Settings\USERNAME\Application Data\utorrent
Incase if you had installed you Os in 'C' drive.
After Installing the Os, copy down the Backup files that you have made before formatting the Pc and put these files in the Original section or the Application path that i have mentioned.Now check your Downloading it will start from where it left it will be good to see that your files started to download from where it left.
Posted by
F u N n Y G u Y
at
4:34 PM
Labels:
Resume Your Download using Utorrent or Bittorrent Even After Formatting OS


Display Your Name in Task Bar
If you want your TaskBar to display your name ,then just follow this trick
Go to:
Clcik on Start -> Choose Control Panel -> Choose Regional and Language Options -> Choose Customize (beside English US) ->
Now
Go to Time tab -> Choose Edit the AM symbol and PM symbol from AM and PM to include your name -> Choose Apply -> Choose OK
For example: If your name is “Mark”, set AM Symbol to “AM Mark” and PM Symbol to “PM Mark”.
Now, your name will be displayed in your Windows Taskbar, right after the time at the right side of the Task Bar.Its a cool trick to play with your Friends
Go to:
Clcik on Start -> Choose Control Panel -> Choose Regional and Language Options -> Choose Customize (beside English US) ->
Now
Go to Time tab -> Choose Edit the AM symbol and PM symbol from AM and PM to include your name -> Choose Apply -> Choose OK
For example: If your name is “Mark”, set AM Symbol to “AM Mark” and PM Symbol to “PM Mark”.
Now, your name will be displayed in your Windows Taskbar, right after the time at the right side of the Task Bar.Its a cool trick to play with your Friends
Track My Pc
You can always track your Pc and can know what are the things that have be done on your absence,
This is a small trick which shows who operated your pc at what time and what did he did & how much long he has been using ur pc.
You can find all those information here.
First you should goto :
Click on
start-- >Then choose run-- >Now Type eventvwr.msc
Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived here only all the information of your PC in stored.
For our purposes we want the System log to be analysed. Click on "System" in the left-hand column for a list of events that is displaying.
Look for a date and time when you were not in home and your computer should have been off there you can check for the details of what has been going on in the PC.
Double click on the eg: info and it will show u the detail.
You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day.
This is a small trick which shows who operated your pc at what time and what did he did & how much long he has been using ur pc.
You can find all those information here.
First you should goto :
Click on
start-- >Then choose run-- >Now Type eventvwr.msc
Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived here only all the information of your PC in stored.
For our purposes we want the System log to be analysed. Click on "System" in the left-hand column for a list of events that is displaying.
Look for a date and time when you were not in home and your computer should have been off there you can check for the details of what has been going on in the PC.
Double click on the eg: info and it will show u the detail.
You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day.
How to Lock Your Drives without using any Software
Have you ever thinked of hiding a particular drive of imporant datas from others or eant to make it as a private one in thar case you can use this simple trick. If you want to hide any of your drives or all the drives in your PC from others or want to change your friends System's setting to make him think that his system is seriously damaged
then just just follow this mechanism. First Go to Start then click on it ,then type Run hit enter,then type gpedit.msc then hit Enter
The group policy editor will open.
Go to the following node: Navigate to the following Node
User Configuration,Administrative Templates,Windows Components,Windows Explorer
Now go to the right side of that explored window and double click the value mentioned
“Hide these specified drives in My Computer”
select Enable and
select the drives from the drop down menu.
Thats all ,your Friends PC's the selected drive is Locked or you can do it to your PC to hide Pesonal Data.
This Trick will make your friends think that their Hard Disk has been damaged if you made it to your Friends PC.You can play pranks with your friends Pc and make them beg at you to repair this problem
then just just follow this mechanism. First Go to Start then click on it ,then type Run hit enter,then type gpedit.msc then hit Enter
The group policy editor will open.
Go to the following node: Navigate to the following Node
User Configuration,Administrative Templates,Windows Components,Windows Explorer
Now go to the right side of that explored window and double click the value mentioned
“Hide these specified drives in My Computer”
select Enable and
select the drives from the drop down menu.
Thats all ,your Friends PC's the selected drive is Locked or you can do it to your PC to hide Pesonal Data.
This Trick will make your friends think that their Hard Disk has been damaged if you made it to your Friends PC.You can play pranks with your friends Pc and make them beg at you to repair this problem
A Hidden Movie in windows XP "STARWARS"
Its a hard work done by Simon and Mike its a 20th Century Text its a nice Video must watch.The major point is the whole movie is created based on tje text in the Keyboard characters.All the basic keys are used to create the movie.Its a must watch one i am sure that you wont regret it.It will also make you think in a new dimension of 2D Animation.To do this you must have the Internet Connection thats all
Now click Start button click on it
->Go to Start- choose Run
->Then type this following words exactly to see the movie created in CMD propmt.
telnet towel.blinkenlights.nl thats all you are ready to watch 20th Century Text
Now click Start button click on it
->Go to Start- choose Run
->Then type this following words exactly to see the movie created in CMD propmt.
telnet towel.blinkenlights.nl thats all you are ready to watch 20th Century Text
Subscribe to:
Posts (Atom)