Sunday, June 28, 2009

Winrar: Watch movie without downloading all parts of rar file

Yes u can watch movie without downloading all of its parts.

Many movies posted here are broken into many pieces using WinRAR. usually you have to download all parts before unzipping. But here's a simple method to watch the movie without downloading all parts. First, download the few parts or just the first part is enough now right click on the rar file to extract

Click on Extract Files...

now in the General Tab u will see a check box named [keep broken files] just tick that box

and then extract ur file anywhere.

Thats it, U can now watch a part of movie on any player

Check ur IP at command prompt...

Check IP at command prompt

Did you know you can view it even faster (without opening all the way to cmd or command.com?

Just type "cmd /k ipconfig" in the run box (Start button--> run).

You can also put cmd /k ipconfig in a text file and give it a .bat extension to make a batch script so you just need to click on the file to execute it instead of going to the start menu.

or goto cmdprompt type as ipconfig

How to Hack Minesweeper...........

While the Minesweeper game is included in almost every Windows computer, few know how to play it, and others have no idea how to win when playing it. This article will explain to play, and almost never lose.

Open Minesweeper and select the window.
Type xyzzy
Hold BOTH shift keys for 3 seconds.
Release shift, and hover your mouse over the mine field.
or type xyzzy,shift.enter,enter

Look closely to find a very tiny white square on the top left of your desktop, it should be about 1 pixel in size. Not in the minesweeper screen but your computer backround. A white dot means it's safe to click, and a black dot means that there is a mine.
For MineSweeper in previous versions of Windows, i.e. before XP, search for the file winmine.ini
Open this file (using notepad, wordpad, etc.)
You will see entries for best times. Edit those entries, modifying the names and the times to reflect your times!
You are a MineSweeper champion!

You wanna know who used your PC in your absence

Who Used Your Pc In Your Absence,what Did He Do?

first you should go

"start > run >eventvwr.msc"

Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived.
For our purposes we want the System log. Click on "System" in the left-hand column for a list of events.
Look for a date and time when you weren't home and your computer should have been off.
double click on the eg: info n it will show u the detail.
You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day.

Trace any Websites

Surfing Internet .......
Type in the url and Hit Enter, that's it ?

But .......
Have you ever thought what happens after that ?

Lets Trace n see what happens !

Do the following :

# Start >> Run

# Type cmd

# This will open the Command Prompt

# Type cd\

# Type tracert www.google.com

Note :-
You can replace www.google.com with any website url.

Results :-
## First line shows the IP address of the website...
## You'll be shown steps in which the website gets load !
## More is the number of steps more is time taken to load the website !

That's all !

Animation in Batch File

Batch FIle Animation!!

1.put this code in notepad
2.save file named anyname.bat
3.Run the file and see the animation

@ echo off
cls
color 0A
echo F
ping localhost -n 2 >nul
cls
echo Fu
ping localhost -n 2 >nul
cls
echo Fun
ping localhost -n 2 >nul
cls
echo Fun-
ping localhost -n 2 >nul
cls
echo Fun-C
ping localhost -n 2 >nul
cls
echo Fun-Co
ping localhost -n 2 >nul
cls
echo Fun-Com
ping localhost -n 2 >nul
cls
echo Fun-Comp
ping localhost -n 2 >nul
cls
echo Fun-Compu
ping localhost -n 2 >nul
cls
echo Fun-Comput
ping localhost -n 2 >nul
cls
echo Fun-Compute
ping localhost -n 2 >nul
cls
echo Fun-Computer
ping localhost -n 2 >nul
cls
echo Fun-Computer
ping localhost -n 2 >nul
cls
echo Fun-Computer T
ping localhost -n 2 >nul
cls
echo Fun-Computer Tr
ping localhost -n 2 >nul
cls
echo Fun-Computer Tri
ping localhost -n 2 >nul
cls
echo Fun-Computer Tric
ping localhost -n 2 >nul
cls
echo Fun-Computer Trick
ping localhost -n 2 >nul
cls
echo Fun-Computer Tricks
ping localhost -n 2 >nul
cls

You can replace Fun-Computer Tricks with your name

Removing windows start menu display delay...

Did you know that, by default in Windows, there is a 400 ms delay between the time you

press the Start Menu button and when the display process actually starts? You can easily

remove this delay by making a simple registry entry change:

1. Open Start > Run.
2. Enter: regedit
3. Click Ok. The Registry Editor will open.
4. Browse to: HKEY_CURRENT_USER > Control Panel > Desktop
5. Double click on the entry “Menu Show Delay”.
6. Change the value to 0 to remove the delay.
7. Close the Registry Editor.

Hide Your Hard Disk Drive Partitions

Step-1.
Go to Start > run > type “ diskpart ”.

a dos window will appear with following like that.....

DISKPART>

Step-2.
Then type “ list volume ” without quote

It will look like this.....



Step-3.
If u want to hide drive F then type “ select volume 5 ″ without quote

then a message will appear in same winwods { Volume 5 is the selected volume }

Step-4.
now type " remove letter F ” without quote

now a message will come { DiskPart successfully removed the drive letter or mount point }.



sometime it requires the reboot the computer .

Diskpart will remove the letter. Windows XP is not having capabilty to identify the unkown volume.

How to come back / recover:

Don’t afraid, all of your Data still safe .

to Come back the Drive repeat the process . but in Step-4, which is shown in this post replace “ remove ” to “ assign ”

means type “ assign letter F ” without quote

The above method won’t work for the drive containing Operating System.
and it can also be done using System Manager>Storage Manager.

Simple Tricks to Cheat RapidShare

THIS IS WHAT IT SAYS !!!

Here are some hints to help you more efficently use rapidshare. Skipping waiting time and bypassing download limits are rapidshare hacks that everybody should know.

Rapidshare has been an excellent tool for sharing large files. Recently users have discovered ways of bypassing the download limits and skipping the waiting time. Here are a description of these methods.

Update: Two new methods of bypassing download limits have been posted. These are more advanced and may require additional software or hardware, but you should check them out when you are done with these easier methods:

RapidShare: NIC tricks and MAC cloning to bypass download limit

Rapidshare traces the users IP address to limit each user to a certain amount of downloading per day. To get around this, you need to show the rapidshare server a different IP address.

Here are some methods for doing this:

Hack 1- Use JavaScript to Reduce Waiting Time
1.Click the rapidshare link you want to download from.
2.Select FREE button
3.In the address bar put the following javascript:alert(c=0) or javascript:var%20c=0
4.Click OK
5.Click OK to the pop-up box
6.Enter the captcha
7.Download Your File


Or If not working go to step 2

2. Request a new IP address from your ISP server.

Here’s how to do it in windows:
1. Click Start
2. Click run
3. In the run box type cmd.exe and click OK
4. When the command prompt opens type the following. ENTER after each new line.
ipconfig /flushdns
ipconfig /release
ipconfig /renew
exit

5. Erase your cookies in whatever browser you are using.
6. Try the rapidshare download again.

Frequently you will be assigned a new IP address when this happens. Sometime you will, sometimes you will not. If you are on a fixed IP address, this method will not work. To be honest, I do not know how to do this in linux/unix/etc. If this works for you, you may want to save the above commands into a batch file, and just run it when you need it.

3. Use a proxy with SwitchProxy and Firefox:

1. Download and install Firefox if you have not already
2. Download and install SwitchProxy
3. Google for free proxies
4. When you hit your download limit, clean your cookies and change your proxy

4. Use an anonymous service:

Running your system through the tor network should in theory work; however, it is difficult to use and setup. Plus, you allow others to run their evil deeds through your system as well by using this system. Anonymizer 2005 is inexpensive, easy to use, but not free. Other pay services would likely work as well.

5. You can use a bookmarklet to stop your wait times:

1. Open IE
2. Right Click On This Link
3. Select Add to Favorites
4. Select Yes to the warning that the bookmark may be unsafe.
5. Name it “RapidShare No Wait”
6. Click on the Links folder (if you want to display it in your IE toolbar)
7. Click OK
8. You may need to close and reopen IE to see it
9. Goto rapidshare and click the bookmarklet when you are forced to wait

How do I detect Trojan?

How thorough is trojan detection by port scanning?

--------------------------------------------------------------------------------

Nearly all remote access trojans use TCP or UDP sockets, and in many cases trojans have a default port that they listen to. Some trojans have a port that is fixed and cannot easily be changed.

This is the best method to determine if your system has been compromised, but it requires that you:

A. have a basic understanding of the state of an "active connection" and

B. that you're familiar with the port numbers commonly used by the trojans.

With regards to the state of an "active connection". There are several types, but there's really only one type that you need to know about.

The "listening" state - which is when your PC listens on a port number, awaiting for another PC to make a connection to it. The "listening state" is the state that the trojan will be in after your system is rebooted.

NOTE: Some trojans may use more than one port number. This is because one port is used for "listening" and the other/s are used for the transfer of data.

In their default configurations, the following trojans use:

Back Orifice - UDP port 31337 or 31338
Deep Throat - UDP port 2140 and 3150
NetBus - TCP port 12345 and 12346
Whack-a-mole - TCP port 12361 and 12362
NetBus 2 Pro - TCP port 20034
GirlFriend - TCP port 21544
Sockets de Troie - TCP port 5000, 5001 or 50505
Masters Paradise - TCP port 3129, 40421, 40422, 40423 and 40426

Devil - port 65000
Evil FTP - port 23456
GateCrasher - port 6969
Hackers Paradise - port 456
ICKiller - port 7789
ICQTrojan - port 4590
Phineas Phucker - port 2801
Remote Grab - port 7000
Remote Windows Shutdown - port 53001

How to detect

If after following the directions outlined further down below, you've determined that your PC is "listening" on any of the above ports. It's a very strong indicator that your PC has been compromised. Click the appropriate link to learn how to remove the trojan involved.

How to determine what ports are "listening"
Perform the following steps:

Step 1. - Reboot your PC. Do NOT establish a dial-up connection.

Click Start | Shut Down
Click Restart
Click OK

Step 2. - After you reboot your PC and before doing anything else, open a DOS window.

Click Start | Programs | MS-DOS Prompt

NOTE: If you don't have a shortcut to the MS-DOS Prompt, don't worry. You can

Click Start | Run
Type command
Click OK

Step 3. - Type "netstat -an >>c:\netstat.txt" (without the quotes)

Type netstat -an >>c:\netstat.txt
Press ENTER

Step 4. - Close the DOS window.

Type exit
Press ENTER

Step 5. - Open Explorer

Click Start | Programs | Windows Explorer

Step 6. - Change to the C drive and double click on the netstat.txt file. It should open with NOTEPAD.

Click (C
Double-click netstat.txt

Step 7.
Look under the "Local Address" column and examine the port numbers for any connection found to be in a "listening" state.

For reference, the port numbers are shown as ":XXXXX" to the right of the IP address, where "XXXXX" is a 1 to 5 digit number.

Provided below are some examples of what you may might find:


The above example is typical of a home user's PC. The system (after a reboot) doesn't show any active connections. If your system looks like this, then congratulations! You have nothing to worry about.



The above example is typical of a PC on a LAN. The system (after a reboot) shows several connections in a listening state, used by NetBIOS. As mentioned above, the ports used by NETBIOS are ports 137 (nbname), 138 (nbdata) and 139 (nbsession).

Again, if your system isn't showing any active connections other than the ones related to using NetBIOS, then congratulations! You have nothing to worry about.



The above example is typical of a home user's PC that's been compromised with the Back Orifice server portion, and whereby it's been configured to use the port 31337 (the default).



The above example is typical of a PC on a LAN that's been compromised with the Back Orifice server portion, and whereby it's been configured to use port 31337 (the default).



The above example is typical of a home user's PC that's been compromised with the Back Orifice server portion that's been configured to use port 4000 instead of the default 31337.



The above example is typical of a PC on a LAN that's been compromised with the Back Orifice server portion that's been configured to use port 4000 instead of the default 31337.

If your system shows any ports in a listening state that you cannot identify or explain. It might be wise to further investigate the possiblity that your system may be compromised with one of these trojans using a different port other than the default/s.

NOTES:

Some ports that may be found in a listening state include:

FTP, which uses TCP port 21
Telnet, which uses TCP port 23
Gopher, which uses TCP port 70
HTTP (a webserver), which uses TCP port 80

If you do find your system "listening" on any of these ports. You should know whether it should or shouldn't be. If it shouldn't be, then it's wise to further investigate the possiblity that your system may be compromised with one of the trojans using a different port other than the default/s.

Finding IP address in Gmail, Hotmail, Yahoo Mail

Finding IP address in Gmail

1. Log into your Gmail account with your username and password.
2. Open the mail.
3. To display the headers,
* Click on More options corresponding to that thread. You should get a bunch of links.
* Click on Show original
4. You should get headers like this:
Gmail headers : name
Look for Received: from followed by a few hostnames and an IP address between square brackets [ ]. In this case, it is

65.119.112.245.
That is be the IP address of the sender!

Finding IP address in Yahoo! Mail

1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,

* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
* Go back to the mails and open that mail

Or, Bottom Right Corner [ Full Headers ]


5. You should see similar headers like this:
Yahoo! headers : name
Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.
That is be the IP address of the sender!

Example :-
Return-Path :
Authentication-Results : xxxxxxxxxxxxxxxxx
Received : xxxxxxxxxxxxxxxxx
Received : xxxxxxxxxxxxxxxxx
DKIM-Signature : xxxxxxxxxxxxxxxxx
DomainKey-Signature : xxxxxxxxxxxxxxxxx
Message-ID : xxxxxxxxxxxxxxxxx
Received: from [202.65.138.109] by xxxxxxxxxxx
Date : Tue, 14 Apr 2009 11:21:07-0700(PDT)
From : xxxxx
Subject : xxxxxxxxxxxx
To : xxxxxx@yahoo.com
MIME-Version : 1.0
Content-Type : text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
Content-Length : 445

Finding IP address in Hotmail

1. Log into your Hotmail account with your username and password.
2. Click on the Mail tab on the top.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,

* Click on Options on the top-right corner
* In the Mail Options page, click on Mail Display Settings
* In Message Headers, make sure Advanced option is checked
* Click on Ok button
* Go back to the mails and open that mail

5. If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP address
Hotmail headers : name ,In this case the IP address of the sender is [68.34.60.59]. Jump to step 9.
6. If you find a header with Received: from followed by a Gmail proxy like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets [ ].
In this case, the IP address of the sender is [69.140.7.58]. Jump to step 9.
7. Or else if you have headers like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets [ ].
In this case, the IP address of the sender is [61.83.145.129] (Spam mail). Jump to step 9.
8. * If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.

Restart Windows without restarting the Computer

When you click on the SHUTDOWN button, make sure to simultaneous press SHIFT Button. If you hold the Shift key down while clicking on SHUTDOWN button, you computer would restart without restarting the Computer. This is equivalent to term "HOT REBOOT".

Different Ways to Lock Windows XP

These methods apply to both Windows XP Home and Windows XP Pro.

There are several ways to lock your Windows XP computer, but all of them use the same command line. The method you choose is a matter of personal preference.

1. via the keyboard
The easiest way to lock Windows XP is by simply pressing the Windows logo key and the letter L (for Lock) on a Microsoft Natural Keyboard or any other compatible keyboard that includes the Window key. Doing so will pop up the Unlock Computer Password box.

2. via a Shortcut.
If you don't have a keyboard with a Window key or simply don't like the keyboard method, then here's how you can make a desktop shortcut to lock your computer.

Right click an empty area of your desktop, choose New/Shortcut and enter this line as the command line:

rundll32.exe user32.dll, LockWorkStation

Click Next. Name the shortcut whatever you prefer and click Finish. That's it.

If you'd like to change the icon, just right click the shortcut and go to Properties/Shortcut/Change Icon.

3. via the command line
The above command line can also be used at a DOS prompt to lock your computer. One simple way you can do it would be by clicking Start/Run, typing CMD and then entering the command and pressing Enter.

4. via a bat file
This is similar to a Windows shortcut method. But it's a DOS version. If you've never created a bat (batch) file, but would like to try this method, simply open a new text file (such as with Notepad) and type the following commands:

@echo off
rundll32.exe user32.dll, LockWorkStation
cls

Save the file with a .bat extension, such as Lock.bat, and you're done. Double click to make the file run.

Those are the basic methods to lock XP, but there are some other relating factors of which you should be aware.

Password
It should go without saying that if you don't use a password to log on to your computer, then anyone can access your computer and unlock it. If you want to use the lock feature, then set a password by going to User Accounts in the Control Panel and then click Create Password.

Fast User Switching
Fast User Switching allows multiple login sessions at the same time. Whether you have this feature enabled or disabled will make a big difference in how your locked computer can be accessed and on the behavior of your shortcuts when executed.

If enabled, executing any of the above locking methods will bring up the Welcome screen and other users will be able to log on to the computer, as is the norm for Fast User Switching. So, you really don't get much security at all this way, if your intention is to lock your machine. With Fast User Switching, only your profile is locked, not the ability for other users to log into your system. Any other user can just log on to your computer and use it.

If Fast User Switching is disabled, you will have to enter a password to unlock the computer. Double clicking your shortcut will bring up the Unlock Computer password dialog box. This is the same lock method that Windows NT and 2000 uses.

If you're not sure whether or not you have Fast User Switching enabled or disabled, go to User Accounts in the Control Panel and click the Change the way users log on or off tab. There you will see your status for Fast User Switching.

Welcome Screen
Whether the Welcome screen is enabled or disabled also has an effect on the way your computer can be locked.

If the Welcome screen is enabled, you can also lock your computer in Task Manager (Ctrl+Alt+Delete) by clicking the Lock Computer option in the Shutdown menu list. This option will only appear if the Welcome screen is enabled—without Fast User Switching being enabled.

Note! In order to use Fast User Switching, the Welcome screen must be enabled. You cannot select Fast User Switching if the Welcome screen option is unchecked.

If the Welcome screen is disabled, you can lock the computer by pressing Ctrl+Alt+Delete and then clicking the Lock Computer tab in the Windows Security dialog box that comes up.

Multiple login in firefox with orkut,gmail,yahoo

Login with multiple ids at the same time in orkut , gmail , yahoo ....

To perform this trick u need firefox mozilla browser...

Perform the following steps..

Step 1:
open system properties(by right clicking my computer), choose tab advanced, click to environment variables button. In system variables section, click new. Type this information to each textbox.

variable name: moz_no_remote (should be all small letter)

variable value: 1

press ok to close all windows.

step 2:
open firefox icon's properties(from desktop and quick launch). Right click on the icon and click in the properties. In the target section add extension -p to the link..(like "c:\program files\mozilla firefox\firefox.exe" -p). Now press ok.

After that when u start firefox u have to create two separate profiles of firefox so that u can login to two accounts of any(orkut,yahoo,rediff or anything else).......
for three logins create three profiles of firefox.........

View the Contents of Zip/Rar file before Downloading

Most of the files we download from the Internet are in Zip or Rar format. We wouldn’t like if we download an archive to find that the file we are looking for is not there. And it is also such a waste of Bandwidth and time to download a whole archive just for a single file. Archview is a Firefox addon that lets you preview the contents of an Archive before downloading. And using it you can even download a single file from the archive.


Currently it supports only RAR, ZIP and ISO format but that should be enough as they are the 2 most popular and common formats being used today. Archview adds itself to the stats bar and becomes active when the user clicks on a zip or rar link. It displays the contents almost instantly and presents the files of the archive in an XML or HTML interface. And what’s more, it even lets you download individual files for an archive, now no need to download a 10 MB archive for a file of 100 Kb that is inside.
The future version will also add support for the 7z format. It supports Firefox 2 and Firefox 3. It is definitely a great add on that can save you a lot of bandwidth.

Download Code:
https://addons.mozilla.org/en-US/firefox/addon/5028

How to know that your PC is infected with Virus

Viruses seldom reveal whose computer is actually sending them. They commonly fake the 'From' address of the e-mail, often using an address found on the infected PC's hard drive. The virus probably came from an infected machine belonging to someone who knows both of you; it sent itself to every address on the hard drive, randomly picking yours as the "sender."

On the other hand, be very suspicious if your PC uploads files over the Internet without your approval. Much malware today sends info from your PC, either to spy on you or to use your PC to send spam or a virus. Make sure your firewall is set to stop and report on all outgoing activity you haven't explicitly approved. Windows XP's firewall doesn't provide this functionality, so if you don't already own a security suite or stand-alone firewall that can handle the job, I recommend that you get Zone Labs' ZoneAlarm or Sygate Personal Firewall, either of which is free for personal use.
You might discover hints of an infection in the System Configuration Utility, also known as Msconfig. To open it, click Start, Run, type msconfig, and then press . Click the Startup tab. In the list of programs that load automatically when Windows starts, look for one whose name resembles an eye chart; many malicious programs rename their files with random character strings. Others, though, mimic the names of real system components.

If programs like Msconfig, the Windows Registry Editor, and your antivirus program don't load, your PC is almost certainly infected with VIRUS (although these programs sometimes act up for reasons other than a viral infection).

Free online virus scanners can help you find the culprit if your regular antivirus program is compromised. I recommend Norton Antivirus and Kaspersky Lab.

Make your Windows XP talk as you type..

Open a text file in notepad and write:

copy from here:-

Dim msg, sapi

msg=InputBox("Enter your text","Talk it")

Set sapi=CreateObject("sapi.spvoice")

sapi.Speak msg

Save the file with a (*.vbs) extension, it will create a VBScript File.

Then after clicking the .vbs file, it will prompt you for a text, input the text and press ok.

Enjoy..

Trick To Make Your Firefox Fast

This tricks will improve the speed & load time of firefox. And you will be able to surf faster.

Open Firefox and type about:config in the address bar, Then look for the following entries, and make the corresponding changes.

• network.http.max-connections-per-server =32

• network.http.max-persistent-connections-per-proxy =16

• network.http.max-connections = 64

• network.http.max-persistent-connections-per-server = 10

• network.http.pipelining = true

• network.http.pipelining.maxrequests = 200

• network.http.request.max-start-delay = 0

• network.http.proxy.pipelining = true

• network.http.proxy.version = 1.0


Lastly right-click anywhere and select New -> Integer. Name it nglayout.initialpaint.delay and set its value to 0. This value is the amount of time the browser waits before it acts on information it recieves.

How to Join files HJSplit Guide

1. Make sure the files which you download have exactly the same name as mentioned on the website.

For Example, the file names are as follows:
Superman.Doomsday.avi.001
Superman.Doomsday.avi.002
Superman.Doomsday.avi.003
Superman.Doomsday.avi.004
Superman.Doomsday.avi.005
Superman.Doomsday.avi.006
Superman.Doomsday.avi.007

Note: This .001 .002 .003.... are the file extension.

2. Open HJSplit and click the button JOIN

3. Browse the filename with the extension .001

4. and click the START button.

5. You will get your single file as output.

You need HJSplit to join these files.
It's a freeware and you can get your copy from
www.freebyte.net/download/hjsplit.zip

Get the serial number you need................

1- Go to Google.

2- In the search field type: "Product name" 94FBR

3- Where, "Product Name" is the name of the item you want to find the serial number for.

4- And voila - there you go - the serial number you needed.

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.

See these example searches:

"Photoshop 7" 94FBR
"Age of Mythology" 94FBR
"Nero Burning Rom 5.5" 94FBR

Cool Hidden trick in Utorrent

This is a Good trick...

open utorrent--->help-->about utorrent.

when it shows a version screen, hit the 't' button

Now u'll see a tetris game. U can play there itself.

Just Hit The "t" on Ur KeyBoard and U Shud Be Able To

Play The Hidden TETRIS Game

Lock Your Computer on Mouse Click

Instead of pressing CTRL+ALT+DEL or windows + L to lock your machine you can create an icon to lock your machine. There are very simple steps by using it you can simply lock your computer
using single mouse click.


Just Follow the simple step >>

1. Right click

an empty spot on the desktop, point to New and click Shortcut.

2. In the Create Shortcut dialog box, type the following in the 'Type the location' of the item text box:

rundll32 user32.dll,LockWorkStation


3. Click Next

4. In "Type a name for this shortcut", type "" (any name as u wish) and Click Finish

5. This will Create a shortcut in your Desktop.

6.Now each time when you want to lock the computer , Just click on this shortcut.

How to solve basic Dual Boot Issues

Case 1: You have Dual Boot Win7 and XP/Vista and you lost the XP/Vista boot option at startup, but Win7 boots fine.

Solution:
1. Start Win7.

2. If you can see your XP/Vista partition in Computer, write down the drive letter (e.g. D

3. If you can't see the XP partition and you see all others but this one, open Control Panel - Adminstrative Tools - Computer Management -> Disk Management(left pane) and right-click the partition without a drive letter, choose "Change drive letters and paths" and assign a drive letter for the partition, e.g. D: .

4. Open an elevated command prompt and type the following lines followed by Enter for each line, changing the drive letter D: (in blue) with the one on your XP/Vista partition:

FOR RESTORING XP
Code:
bcdedit /create {ntldr} /d "Windows XP"

bcdedit /set {ntldr} device partition=D:

bcdedit /set {ntldr} path \ntldr

bcdedit /displayorder {ntldr} /addlast
FOR RESTORING VISTA
Code:
bcdedit /copy {current} /d "Windows Vista"
(You will get a response saying that a new {UUID} was created successfully.
Write down or copy the new UUID.)
Code:
bcdedit /set {place_new_UUID_here} device partition=D:

bcdedit /set {place_new_UUID_here} osdevice partition=D:
5. Done

Case 2: You have Dual Boot Win7 and XP/Vista and you lost the Win7 boot option at startup, but XP/Vista boots fine.

Solution:
1. Insert the Win7 Installation DVD and boot your computer with it (as if you were making an installation).
2. At the first screen , select your language etc and press enter.
3. At the second screen, click "Repair Computer" at the bottom left.
4. Wait until startup repair is finished and reboot.
5. Done. You can now boot Win7.

Case 3: You have restored booting Win7 using the Case 2 method or other way, but now you've lost XP/VISTA .

Solution: Follow Case 1 Solution.


Case 4: You want Win7/Mac Dual Boot.

Solution: Follow these instructions: OSX and Windows 7 Dual Boot
Hope it helps

Transferring files using bluetooth disabled computer

Here you can learn how to transfer your files using a bluetooth disabled computer
all you need is to follow this
click START then

select RUN then

type fsquirt

then ENTER.

you will get a screen wizard

using this Wizard, now you can do file transfer.

Make your folders Hidden , And unsearchable w/o using any software

Hey guyz...
You already know that File/Folder can be eaisly hidden by Right clicking on that ,and Ticking hidden Check Box and again clicking on OK .....

BUT, by doing that your File/Folder can be easily find by Showing hidden files and folders in folder options or even by searching technique....

BUT here I've a cool trick

which cannot be found either by searching or by any other way....interesting then follow these steps :

First create the folder which you want to make private Ex: foo and is created in
D:\ drive..
now open CMD prompt and type D: then you can go to D drive and now type

attrib +h +s foo "foo is the folder which you have created"

and see your folder will be hidden .....

and if you want to access you folder again

just open CMD prompt again and in D drive type: attrib -h -s foo

and your folder will be visible again.....WOW that's it....

Change folders back ground with your favourite image

• I think you are very bored to see the default white screen in your’s folder
• Here is the trick to change your folder background
• To do this ,
• Open one new notepad and type below code:

• [{BE098140-A513-11D0-A3A4-00C04FD706EC}] iconarea_image=""

• Between the quotes, you just type the address of the image where that exists
• For example:

• [{BE098140-A513-11D0-A3A4-00C04FD706EC}] iconarea_image="D:\WALL'S\NEW WALLPAPERS\GREETINGS\flower.jpg"

• “D:\WALL'S\NEWWALLPAPERS\GREETINGS\flower.jpg ” is the path where the image exists.
• And save that file as “desktop.ini”
• If it asks for replace that file then click on “yes”

• And now open run by pressing winlogo+R button
• And type : attrib +s"F:\movies"
• (with quotes) then press OK
• Here “F:\movies” is the drive or folder name where you want to insert image.
• That Means in “F:\” drive, “movies” folder that image will insert.
• Now open that folder ,WOW....!! its better now.

Increase your internet speed

windows will blocks 20% of your internet speed for updates and for others

· Press (win logo+R) to open run window

· And then type ‘gpedit.msc’ press enter

· Go to below path of group policy

· Computer configiration >>adminstrative templates >> network >>Qos packet

· There you can see a panel at right named setting

· There you can find fourth option “limit reservable band width”

· If it is not configured then double click it then choose enable

· And then edit the bandwidth limit(%)and set it to “0” (default 20 erase ‘20’ and mark it as ‘0’)

· Click apply and close group

· Reboot compulsory to make it work


You can also set your modem speed at 115 mbps:


· How to connect modem at 115 kbs

· first go to control panel in it click on phone and modem options in it click on modem in modem

· click on properties after that click on advanced in advanced u will see written"exta initiation commands there write “AT&FX” and restart the computer and get conneted in 115kbs.

Create your own invisible folder with out using any software

* Here is the trick to create a folder which cannot be seen . To create that,u just follow the below steps

* Right click on desktop and create new folder

* After doing that windows will ask you for new name

* Then press back space to erase that name

* And just press ‘ALT0160’ from your kep board remember that you must press numbers from num pad only
* Then it creates the folder with out name

* u just right click on that folder and select properties

* Under the customise tab u can see “change icon”

* Then select that and you can see big list of icons

* down further you will find blank icons

* Select that and click on Ok and Apply and again OK in previous box

And thats done!!!

U just drag your mouse pointer by holdind left click then you will find that folder is selected

Make your folders private

•Double-click the drive where Windows is installed (usually drive (C, unless you have more than one drive on your computer).

•If the contents of the drive are hidden, under System Tasks, click Show the contents of this drive.

•Double-click the Documents and Settings folder.

•Double-click your user folder.

•Right-click any folder in your user profile, and then click Properties.

•On the Sharing tab, select the Make this folder private so that only I have access to it check box.


Note:


•To open My Computer, click Start, and then click My Computer.

•This option is only available for folders included in your user profile. Folders in your user profile include My Documents and its subfolders, Desktop, Start Menu, Cookies, and Favorites. If you do not make these folders private, they are available to everyone who uses your computer.

•When you make a folder private, all of its subfolders are private as well. For example, when you make My Documents private, you also make My Music and My Pictures private. When you share a folder, you also share all of its subfolders unless you make them private.

•You cannot make your folders private if your drive is not formatted as NTFS For information about converting your drive to NTFS

How to remove new folder exe or regsvr exe or autorun inf virus

I want to tell you a story, two days back i got affected by this virus very badly as it eat up all my empty hard disk space of around 700 MB .

I was surprised that my most reliable friend Avast, for the first time failed me in this war against viruses but then again avg and bitdiffender also failed against it. This virus is know popularly as regsvr.exe virus, or as new folder.exe virus and most people identify this one by seeing autorun.inf file on their pen drives, But trend micro identified it as WORM_DELF.FKZ. It is spreading mostly using pen drives as the medium.

Well, so here is the story of how i was able to kill the monster and reclaim my hard disk space.

Manual Process of removal

I prefer manual process simply because it gives me option to learn new things in the process.

So let’s start the process off reclaiming the turf that virus took over from us.

1. Cut The Supply Line

a. Search for autorun.inf file. It is a read only file so you will have to change it to normal by right clicking the file , selecting the properties and un-check the read only option
b. Open the file in notepad and delete everything and save the file.
c. Now change the file status back to read only mode so that the virus could not get access again.
d.
e. Click start->run and type msconfig and click ok
f. Go to startup tab look for regsvr and uncheck the option click OK.
g. Click on Exit without Restart, cause there are still few things we need to do before we can restart the PC.
h. Now go to control panel -> scheduled tasks, and delete the At1 task listed their.

2. Open The Gates Of Castle
a. Click on start -> run and type gpedit.msc and click Ok.
b.
c. If you are Windows XP Home Edition user you might not have gpedit.msc in that case download and install it from Windows XP Home Edition: gpedit.msc and then follow these steps.

d. Go to users configuration->Administrative templates->system
e. Find “prevent access to registry editing tools” and change the option to disable.
f.
g. Once you do this you have registry access back.
3. Launch The Attack At Heart Of Castle
a. Click on start->run and type regedit and click ok
b. Go to edit->find and start the search for regsvr.exe,
c.
d. Delete all the occurrence of regsvr.exe; remember to take a backup before deleting. KEEP IN MIND regsvr32.exe is not to be deleted. Delete regsvr.exe occurrences only.
e. At one ore two places you will find it after explorer.exe in theses cases only delete the regsvr.exe part and not the whole part. E.g. Shell = “Explorer.exe regsvr.exe” the just delete the regsvr.exe and leave the explorer.exe

4. Seek And Destroy the enemy soldiers, no one should be left behind
a. Click on start->search->for files and folders.
b. Their click all files and folders
c. Type “*.exe” as filename to search for
d. Click on ‘when was it modified ‘ option and select the specify date option
e. Type from date as 1/31/2008 and also type To date as 1/31/2008
f.
g. Now hit search and wait for all the exe’s to show up.
h. Once search is over select all the exe files and shift+delete the files, caution must be taken so that you don’t delete the legitimate exe file that you have installed on 31st January.
i. Also selecting lot of files together might make your computer unresponsive so delete them in small bunches.
j. Also find and delete regsvr.exe, svchost .exe( notice an extra space between the svchost and .exe)

5. Time For Celebrations
1. Now do a cold reboot (ie press the reboot button instead) and you are done.
I hope this information helps you win your own battle against this virus. Soon all antivirus programs will be able to automatically detect and clean this virus. Also i hope Avast finds a way to solve this issues.
As a side note i have found a little back dog( winpatrol ) that used to work perfectly on my old system. It was not their in my new PC, I have installed it again , as I want to stay ahead by forever closing the supply line of these virus. You can download it form Winpatrol website.

How to Delete Specific URLs from your Browser (Firefox , IE)

Sometimes a situation comes that we have to delete certain specific website address (url) only from the web-browser location or address bar say to preserve your identity. For example, you visited a certain website and don’t want your friends or others to know that you visited that site, then you have two methods to delete the website links either delete all the urls from the address bar or only the specific one (recommended).


## In Firefox, you just need to move your mouse over the website entry and press Shift + Delete Key combination to delete the desired address from the history.


## For Internet Explorer, follow the steps exactly as described bellow; do keep in mind this trick needs editing the registry and you need to be very careful with it:

• Close any open Internet Explorer window

• Go to Start->Run and type in regedit.exe and press enter to launch the registry editor

• Navigate to the following key:
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs

• Delete the desired URL

Add Your Photo To "MY COMPUTER" Properties

First Step :-
Create a bmp file (Your Photo) and Save As with the name OEMLOGO.BMP

## Important : The size of the image should be within 180 (wide) x 120 (high) pixels (For Best Result)

Second Step :-
open notepad and dump the following lines into it and Save As with the name OEMINFO.INI


[General]
Manufacturer=Your Name Here
Model=Your Model Here
[Support Information]
Line1=Your Name Here
Line2=Your Address Here
Line3=Your Email Address Here
Line4=Your Working Hours Here



## Save the file.

now copy to or place OEMINFO/OEMINFO.INI and OEMLOGO/OEMLOGO.BMP both files in the c:\windows\system32 directory.


## Then make a right click on My Computer, select Properties, in the General tab you w'll see your photo, and a button will be highlighted (support information) make a click on it, you will be able to see the changes.

## Now if you want to display some more information then simply increase the line in the file. (Line5=xxx , Line6=xxx )

Sunday, June 21, 2009

Check Your Anti-Virus Software Working Properly Or Not

This article is best in checking out whether your antivirus software is running at its best or not. It was not known to many that how to check the antivirus software they are using is working properly or not. Please read the article for the details.

1:-Click Start --> Open Notepad -->

2:-Copy the code exactly in the notepad :

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

3:-Now Save it with the name fakevirus.exe in any of your folder/drives.

4:-If this file got deleted immediately...then it means that your antivirus is working properly and updated !!

5:-If this doesnt happens and you see the saved file in that folder do right click the file and select scan with your installed antivirus and if the scan shows the file then it means your antivirus is working properly but not updated with a new version, as best antivirus softwares detect any virus (at the same second when you save the same in your system)without your effort of going to specified folder and scanning the folder.

6:-If it doesnt shows any kind of threats then you need to change your antivirus software immediately with some good one with the new version.

Sunday, June 14, 2009

Display Name in Task Bar

This is a simple trick to diaplay your name in your right most end of the taskbar.

To do this.
Go to:

Start -> Control Panel -> Regional and Language Options -> Customize (beside English US) ->

Go to Time tab -> Edit the AM symbol and PM symbol from AM and PM to include your name -> Apply -> OK

For example: If your name is “Bill”, set AM Symbol to “AM Bill” and PM Symbol to “PM Bill”.

Now, your name will be displayed in your Windows Taskbar, right after the time.

Enjoy!

Hidden movie in windows xp ~STARWARS~

There is a Small animation movie fully made based on text by Simon jansen.
Every one having a Internet Connection must have to watch this movie and have to appreciate their hard work since they used only the texts to do this movie.
All you need is to
Click Start->Choose
Run
Then Type This
telnet towel.blinkenlights.nl

Press Enter then Enjoy the Movie in Command Prompt Window

HACK IN TO WEB CAMS

It is so easy to hack into webcams all you need is a Internet Connection
Go to WWW.GOOGLE.COM and PUT THIS IN SEARCH BAR
inurl:/view/index.shtml
or intitle:liveapplet
or inurl:lvappl
and click on search, it show a list of searched items. go to an linksome of them don't work. but some work. u will see street/traffic and not only this.
u can also movethem right or leftor zoom in or zoom out........
its kind of fun
NOTE: u should have a high speed internet connection for this.

Create the CON file

If you have tried to create a folder name CON you cant since its been used by the Windows Assembly.
Try in a command prompt (after cd-ing to that file's directory):

type GT.txt > CON

type GT.txt > CON1


But ,its possible to create CON folder in ur windows based os(XP, VISTA)

open the command Promt
then type this
note:- Choose the specifice drive that u want to create CON folder
eg :- C: , D: etc...

now type this
iam selecting the drive E:
E:\> mkdir \\.\e:\con

' hold alt+0160 or 255 and then type con,nul,com1 etc''



to creat: mkdir \\.\c:\con
to remove: rmdir \\.\c:\con

file names in Windows are reserved because they represent devices:
con, con.* -> the console
prn, prn.* -> the default printer, as a character device
aux, aux.* -> the default serial terminal, as a character device
lpt1, lpt2, lpt3, lpt4, lpt5, lpt6, lpt7, lpt8, lpt9 -> the parallel ports, as character devices
lpt1.*, lpt2.*, lpt3.*, lpt4.*, lpt5.*, lpt6.*, lpt7.*, lpt8.*, lpt9.*
com1, com2, com3, com4, com5, com6, com7, com8, com9 -> the serial ports, as character devices
com1.*, com2.*, com3.*, com4.*, com5.*, com6.*, com7.*, com8.*, com9.*
nul, nul.* -> the NUL or "waste bit bucket" or "black hole for bits" or "/dev/null" device

Change you Drive Background

This is how you can make any drive in your computer look after attempting this tutorial.
To do this ,follow these steps
1) Create a Text File anywhere on your computer
2) Open it via NotePad
3) Select "save as" from the File menu
4) Give it the name "Desktop.ini" (without quotes) and save it in the location of your choice
5) Open Desktop.ini via NotePad/Wordpad
6) Copy-Paste the following code :

[ExtShellFolderViews]
{BE098140-A513-11D0-A3A4-00C04FD706EC}=
{BE098140-A513-11D0-A3A4-00C04FD706EC}
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
IconArea_Image=H:\Drafts\bliss.jpg

7) Replace "H:\Pictures\selfpic.jpg" with the path of the Image you want to display as the Drive background.
8) Save the File
9) Cut-Paste Desktop.ini to the Root of the Drive of which you want the background to be Changed.
10 ) Select the file and check it's properties.
11) In the properties Window check "Hidden"
12) press "ok"
13) Refresh the screen and the drive must have aquired the selected Image as background

Change Your Ip In Less Then a Minute

This is slightly lenghty process for a newbie.
But if you stick on to this article you can do it perfectly

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

Change Your Processor to Quad Core

This trick is really fun one since you can make your friends fool.It may also not recommended as this may cause windows to provide falsified information to it self and other applications, which would cause system stability issue and may slow down the system….

To Change the Processor Name shown in the System properties Dialog Box
Just Follow these Steps

Under Windows XP, Click Start, then RUN Command, “regedit“… (Without the quote symbols)… Now please navigate your self to this Registry location,

>HKEY_LOCAL_MACHINE > HARDWARE > DESCRIPTION > SYSTEM > CENTRAL PROCESSOR > GO TO 0

Now please double click, on the key PROCESSORNAMESTRING . Change the value as you like.Using this you can change your Processor info even from Pentium III to Quad Core but only for displaying in properties only

Change any User Account password

Do you want to change/remove the password of another user's User Account in XP?

For this trick you no need to know their previous password.
Just Click Start->Choose Run there type
control userpasswords2 and hit enter.
Now You'll get this window representing as something like list of users.
Select any user from the list and click Reset Password
and type in a new password that you want, you don't need to know the old password.

Enjoy this trick in your Friends Pc's to make fun around with them