August 17, 2011

Serial numbers/keys for AVG Internet Security 2011 valid upto 2018

Serial numbers/keys for AVG Internet Security 2011 valid upto 2018(fully updatable)
These keys work for sure. Please "Like" this blog when your anti virus starts updating and shows its validity upto 2018



8MEH-RFOD4-SXWR8-JRTQA-JADCJ-WEMBR-ACED


8MEH-RNXBD-GMYHF-BSLSR-ZK3FE-PEMBR-ACED


8MEH-RU7JQ-ACDRM-MQEPR-G8D79-FEMBR-ACED


8MEH-RR6GC-KLJJD-S7DBA-NU862-EEMBR-ACED


8MEH-RPDWL-THRLY-O8Z3R-47QKC-4EMBR-ACED


8MEH-RS47Y-82HT8-GONVA-BCCCZ-DEMBR-ACED


8MEH-RXYFD-JUV72-8922R-FTDO8-QEMBR-ACED


8MEH-RGM33-K474L-6FGRR-8QEFN-UEMBR-ACED


8MEH-R6BFE-HWUHF-DPNDA-VFUWX-2EMBR-ACED


8MEH-RXYFD-JUV72-8922R-FTDO8-QEMBR-ACED


8MEH-RFR8J-PTS8Q-92ATA-ORC6Q-JEMBR-ACED


8MEH-RS47Y-82HT8-GONVA-BCCCZ-DEMBR-ACED

August 16, 2011

list of all hacking trciks that we are working on our new website

list of all hacking trciks that we are working on our new website(http://www.delhimalayalees.in/techie-ethical-hacking-tips-and-tutorials.html)


How to rip Dynamic Flash Template
10 reasons why PCs crash U must Know
10 Security Enhancement
16x Dvd+-rw Dl Dvd Writer Comparison Guide
20 Great Google Secrets
23 Ways To Speed WinXP, Not only Defrag
250+ Tech books online
2600 Hertz Single Tone Generator Schematic
36 Graphics & Design Ebooks
8 People Can Use The Same Msn Dial Up Account
A Basic Guide to the Internet
A Basic UNIX Overview
A BEGINNERS GUIDE TO Hacking Unix
A Cracking Tutorial
A Guide to Internet Security- Becoming an Uebercracker
A Guide to the Easiest Hacking there is
A List of every TeleNet code that there is
A List Of Some OF The Most Useful UNIX Hacking Commands
A Novice's Guide to Hacking 2004
A Novice's Guide To Hacking
A Short HACKER SPEAK Glossary
A simple TCP spoofing attack
A UNIX Hacking Tutorial
A very small tut for RealMedia
A Web Standards Checklist, How to make a proper website
Accessing the bindery files directly
Accessing The Entire Internet On Your 3 Phone, U8110, E616 etc.
Advanced Shellcoding Techniques
All about ftp must read
All About Movie Tags (what Is A Dvdrip, Cam Etc.)
ALL About Spyware
All mIRC Commands
Almost Everything You Ever Wanted To Know About Security (but
An Architectural Overview of UNIX Network Security
An Indepth Guide in Hacking UNIX and the concept of Basic Net
An Introduction into TeleScan
An Introduction to Denial of Service
An Introduction to the Computer Underground
An Introductory Guide To TeleNet Commands
Anarchist Cookbook 2004
Anonymity complete GUIDE
Anonymity of Proxy, Anonymity Of Proxy learn it insideout
Anonymity
ANONYMOUS emails
Anonymous FTP FAQ
ANSIBombs II Tips And Techniques
anti leech hacking tutorial
Area Codes and Time Zones
attacks on networks how to stop
Auto End Tasks to Enable a Proper Shutdown, Win XP Tweak
Automatic Windows Installation, No keypress required
B.A. regedit
Backdoor
Backdoors
Backtracking EMAIL Messages
Bandwidth Explained
Basic Networking
BBS CRASHING TECHNIQUES
Becoming A Phreaker - The Quick n' Easy Way
Beep Code Manual
Beep Codes Error Codes
Best Keyboard Shortcuts
Big Brother And Ndisuio.sys, A new Internet phenomenon
Bin & Cue Simple Tut
BIOS Update Procedure
Bit Torrent Tutorials
Block Adservers
Boot Block Recovery For Free
Boot Winxp Fast
Border And Text Effects In Psp8, For use with PSP8
Breaker B0X
Broken Ie, How to fix it
BRUTE- A brute force approach to hacking Unix passwords
Bulk Editing Of .xxx to .zip or .mp3
BulletProof FTP Server Tutorial
Burn .bin file Without A .cue file
Burn a BIN without a CUE using NERO
Burning Bin & Cue Using Nero
Bust Avoidance For Dipshits
Busybox
Bypass Internet Censorship
Calculating Offsets
cannot use my password to get back into Windows XP
Cant See Secure Sites
Caught A Virus
Cellular Listening with a TV
Cellular Telephone Phreaking Phile Series VOL 1
Change Music In The Malibu And The Pole Position, GTA Vice Modders
Change Text on XP Start Button
Change The Default Location For Installing Apps
Change The Storage Location Of 'my Documents', a bit safer for when your PC crashes
Change Your Ip In Less Then 1 Minute
Changing Default Location For Installing Apps
Check For Dos, Check to see if you are infected
Choosing A Good Domain Name, yagood name is important
Choosing An Internet Merchant Account, nice info on Internet Merchant Account
Clear Unwanted Items From Add And Remove
Closing Open Holes, System Security How to close open holes
Closing the Net
CMD Prompt here, add to folder context menu windows xp
COMMON FTP ERROR CODES
Compression and Cracks for Dummies
Computer Acronyms
Computer Bulliten Boards and the Law
Computer Chrime - Current Practices, Problems and Proposed So
Computer eMail and Privacy
Computer Hackers News Articles
Computer Matinence
Computer Rights vs First and Forth Amentment Right
Computer Security
Computer Security_2
Computer Viruii
Configuring ZoneAlarm Pro Security Settings, A ZoneAlarm Pro Tutorial
connect A Psx Pad To Pc, Warning soldering is involved
Convert Stubborn Webpage To pdf
Convert To Basic And Dynamic Disks In Windows Xp
Converting Movies To Psp Format
Converting to NTFS
COPS and Robbers-Unix System Security
COPY X BOX GAMES
Copyright Guides for Photographers
Cracking Bios, use the followin' code
Cracking Zip Password Files
Crap Software Config Settings, How to set-up the firewall
Crash Course in X Windows Security
Create A Huge File
Create A Personal Screen Saver In Win Xp
Create An Ftp Server On Your Pc With Serv-u
Create Bootable Win XP SP1 CD(nero)
Create Bootable XP SP integrated CD
Create One-click Shutdown And Reboot Shortcuts
Creating a Board aka Forum on your own PC
Creating Universal Ghost Usb Boot Disk And Cd
Crime and Puzzlement
Cultural Formations in Text-Based Virtual Realties
Cyberspace and the Legal Matrix- Laws or Confusion
Dark Angel's Phunky Virus Writing Guide
Data Capacity of CDs [Tutorial]
Debug, Learn how crack windows
Defamation Liability of Computerized Bulliten Board Operators
Delete An undeletable File
Delete Files From The Recent File List In Windows
Dept of Treasury Letter
Digital Camera Guide
Digital Faq -learn Everything About Digital, Capture, Edit and Burning and more
Digital Photo Id Cards, Greate Info
Direct Link To Any Page You Want To In Hotmail
Directx Explained
Disable Compression On Xp, NTFS partition, Disk Cleanup
Disable The Send Error Report, to Microsoft
Disable Windows Logo Key
Discover New Music You'll Probably Love
Do You Want To Learn Maya 6, look, some tutorials
Doom 3 Speed Up, Guaranteed 40% better
Doom3 Simple Tweeks, how to run doom with tweeks
Dos User - No Boot Dos Disk, No Edit.com,How to create Imp Files
Download Free Music legally,, legally
Download From Ftpz, Using Ftp Search Sitez
Download Mp3's Without Using Filesharing
Download Music And Video With ,edia Player9, quick and easy
Download Timeframes
Downloading Files, Using Archives And Images
Downloading Windows Media Streams
Drake's Phreaking Tutorial
Dreamweaver Tut That Teaches U, to search a database with phpmysql
Driverguide.com
Dual Boot After The Fact
Dvd Copying-ripping Definitions
DVD Regions Information
Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies
Easily Disconnect-reconnect From Broadband
Easily Find Serial Numbers On Google, easy to do and works like a charm.
Electronic Bulliten Boards and 'Public Goods' Explainations o
Electropolos - Communication and Comunity on IRC
Eliminate Ie's Autocomplete Reminder
Email Forge, sends email from anyone
Enable Folder and Icon Refresh, Win XP Tweak
Erasing Your Presence From System Logs
Ethload User's Guide
Evolution Of Computer Viruses History Of Viruses
Excellent tricks and techniques of Google Hacks
Exploseek, a simple tool to find music on the net
Find Stuff
Finding Missing Files From A Release
Firefox Speed Tweaks
Firefox Tweaks
Firewall Protection how to
FlashFXP FAQ
Flashget Broadband Tweak
FLASHGET INTEGRATION IN OPERA,MOZILLA,NETSCAPE
FlashGet v1.4 - More Download Simultaneously
Flashing A Video Card Bios [advanced Guide], Step-by-Step Guide for Novice and Expert
Formatting An Hdd, when fdisk won't
Formulating A Company Policy on Access to and Use and Disclos
Free Access To Websites Without Registering
FREE Hosting For WAREZ
FREE Hosting List php, mysql and more
Free Speech in Cyberspace
Free X-box Live
Freebsd Install Guide
Gender Issues in Online Communications
General Keyboard Shortcuts, General Keyboard Shortcuts
Get In Windows 2000 As Administrator
Get the Most Out of Your DVD Recorder
Get The Music You Want To Hear
Get unlimited bandwidth from your host for free
Getting A 1gb Yahoo China Account
Getting Counter-strike Source To Work
Getting movies, mp3,games using google
Getting older programs to run on Windows XP
Getting started with Linux for nOObs
Go to Windows updates anonymously
Google Crack Search
Google secrets
Google Tips & Tricks, (utilizing search engine)
Government Computer Security Techniques
Graffiti On Walls 4 Adobe Photoshop Cs 8.0
Guide For Getting Free Stuff
Guide to Hacking with sub7
Guide to IIS Exploitation
Guide to Slipstreaming Service Pack 2
HACKDICT
Hacker Test
Hackers A-Z
Hackers Who Break into Computer Systems
hacking and phreaking
Hacking Faq
Hacking for Dummies Volume 2
Hacking For Newbies
Hacking GTE Telemail
hacking in telnet ftp
Hacking IRC - The Definitive Guide
hacking on Telnet explained
hacking on XP part 1
hacking on XP part 2
hacking on XP part 3
hacking on XP part 4
hacking on XP part 5
hacking password protected site
Hacking Password Protected Website's
hacking passwords
Hacking PC-Pursuit Codes
Hacking Techniques
Hacking TRW
Hacking TYMNET
Hacking Unix System V's
Hacking VoiceMail Systems
Hacking Webpages
Hard drive Gone Bad
Hardware Firewall
Have Notepad In Send To
have satallite tv for almost free IF not free
Hex, How to turn binary or decimal to hex
Hide Drives and Partitions
How 2 Find EVERYTHING uploaded on Rapidshare
How BT phone cards works
How do I overburn a CD with Nero
How do I remove an extra operating system from by
How do I Test My VirusScan Installation
How Do U See Hidden Files, Using DOS
How Download MP3s from Fanscape.com or other Streaming Audio-Video
How Linux boots
How Long Has Your XP System Been Running
How Phone Phreaks are Caught
How the Traditional Media Clasifications Fail to Protect in t
How To Access Your Folders From Your Taskbar
How To Add A Url Address Bar To The Taskbar
How To Add An Option To Print, the Contents of a Folder
How To Add Your Own Windows Tips
How to Back Up the Registry
How To Backup Ps2 Games
HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING
How To Block Websties Without Software, block websites
How To Boot Xp Faster (updated)
How to build a black box
how to burn quicker in windows xp
How to Bypass BIOS Passwords
How To Bypass Web Filters, tutorial
HOW TO CAPTURE STREAMING MEDIA
How To Change A Cmos Battery
How to change the serial number used in Windows XP, Valid for XP Corporate
How To Change Thumbnail Size And Quality
How to clear Bios info 2
How to clear Bios info
How To Convert File System, fat - fat32 to ntfs
How To Copy A Dvd Which Will Play On A X Box
How to copy songs from your iPod to your PC
How To Customise Your start Button
How To Delete Those Persistent Nasty Files
How to dial out of a UNIX System
How To Directly Go To Inbox, Write Msg, w Hotmail, no need for hotmail today - http users
How To Disable Picture And Fax Viewer
How to do a high Quality DivX rip
How To Download Bittorrent Files
How To Download Directly From Crackdb.com
How To Download Movies, From IRC
How to Download-Upload Files from email
how to edit right click menu
how to execute chm files in linux
How to Extend the life of the yousendit download links
How to find a remote IP
How To Find Ftp's The Easy Way'
How to find MP3's real quickly
How to find Security Holes
How To Find Serial Numbers On Google
How to fix corrupted files in XP
How to fix Windows Installer problem
How To Get A Free I-pod Or Flat Screen Tv, check it out
How to get a Shell in 24 hours
HOW TO GET ANY WINDOWS PASSWORD
How to Get someones ISP password, Get free internet
How To Get Top Ranking, Search Engines
How to Hack UNIX System V
How To Hack Windows Xp Admin Passwords
How to hack-change your Windows XP Boot Screen
how To Hide Yourself From Network Users, And give access to only specific users
How To Increase Download Speeds By 100-200 Kbsec
How to Install and run Windows CE on your USB Stick
How to learn to hack in easy steps
How To Make 5cds, 10cds Or 2dvds From Official Dow, These are same as Mandrake PowerPack+
How To Make A Kvcd
how to make a new web site
How To Make A Transparent Background, .fla .swf
how to make a VCD from a DivX
How To Make An Animted Logo
How to make key generators
How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style
How To Make XP Go Faster
How To make your own Radio Station 2
How To Make Your Own Radio Station
How To Make Your Own Radiostation
HOW TO MANUAL - THE END OF DELETERS
How to modify exe files
How To Move Xp Harddrive To New Motherboard
How To optimize DSL-CABLE connection speed
How To Play Movies (divx Etc) With Subs
How to Put an End to Unwanted or Harassing Phone Calls.HAR
How to recover MOST of scratched CD data discs
How to Remove DRM Protection for Video Files
How To Remove Ms Java Vm And Install Sun Java
How To Remove Signin Details Of Msn Passport
How To Remove The Default Admin$ Shares
How to remove the Links folder in IE Favorites
How to Remove WinXP Splash and See Operations
How To Rename Extensions With Ease, with a Renamer.bat file
How to Rename File Extensions
How To Rename Multiple Files In Winxp
How To Restrict Login Hours Allowed
How to safeguard your files when computer crashes
How to save Windows xp updates
how to search google for RAPIDSHARE links
How To See Hidden Files, Using Dos
How to send ICQ Bombs
How To Set search For All Files In Winxp
How to set up a http server running from you computer
How To Set Up A Proxy In Flashget, As Requested
How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin
How To Set Up Direct Connect
HOW TO SET UP FTP SERVER
How To Set Up Proxies In Your Browser
How To Set Zone Alarm Settings, Fix for ZA ports
How To Setup Your Own Dns (Domain Name Server)
How To Speed Up A Slow Computer
How To Speed Up Http Requests On Internet Explorer, as above
How To Stop Spam
How to swear in all languages
How To Unload Cached Dll Files To Free Memory
How to Use and How to Chain Multiple Proxies
How To Use File Compression In Windows Xp
How To Use Google To Download Mp3's, and applications
How To Use Newsgroups
How to use the Web to look up information on hacking
How To Use You Gmail With Msn Messenger
How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free
How to Change Windows XP Home to Windows XP Pro
Important Faqs For Sp2
Improve Doom 3's Performances, simple but efficient trick for every1
Improve your dialup modem preformance
Increase XP Folder Settings
Information of Hacking AngelFire Websites
Insert Your Serial For Office 2k, auto install office
Install A New Hard-disk
Install Xp From Dos
Installing Apache on Windows
Installing Gentoo Linux, Amazing step by step tutoria
Installing IIS On Windows Xp Pro
Installing Slackware Linux
Instructions For Removal Of Advertising In Msn Messenger
Introduction to Denail of Service
Ip Address Structure, Expilinatin OF IP Address {A short way}
IP addressing, and gaining IP's
IP Addressing
IP how to
Irc How To Downlaod From, How to downlaod from IRC
Irc Servers On nix, For people who want to start own IRC net
ISSN Numbers- An Introduction
Junk Mail- How Did They All Get My Address
Keep Files Private
Keep Folders Hidden
Keyboard Shortcuts Result in Excel 2000 - Movement
Keyboard Shortcuts, Microsoft Word
Keyboard Shortcuts, must read
Kill Microsoft Instant Messenger
Lamination Tips, Its a Fast TUT.
Leet Way To Get Your Ip In Windows Xp
LENROS~1
LENROS~2
Linking Your Xbox To Your Computer
Linux Howto's
List Of Sites Not To Go To
Little help for anonymous mailer
Lots Of Windows Xp Tips, Take A Look
Lyrics With Google
Make A Autorun File For Ur Cd
Make A Batch File To Clean UR PC, All In One
Make A Roughly 16 Hour Video Dvd
Make Acrobat Reader 6 load faster
Make Dvd Iso From Suse 9.2 5 Cds Iso, Linux mode and Windows mode ISO creation
Make Mp3 Files Smaller Without Losing Quality
Make Your Own Ringtones For Mobile Phone, also logos, wallpaper, etc
Make Your Pc Faster, Guaranteed
MakeXPgoFaster
Making a .cue file, in notepad
Making A Executable Server
Making Bootable Floppy Disk to Boot into Windows
Making Cd Version Of Doom3 Into Dvd Version
Making Web Page Fonts Consistent and Uniform
Manage Saved Ie Passwords
Mastering The Windows XP Registry
Maximize Dial-up Modem Settings
MEMETICS
Microsoft's Really Hidden Files, Reveled Hidden files
MINDVOX
mIRC Not Just Another Chat Client, Download Anything You Want Almost
mIRCcommands
Misc Linux Tips & Tricks
Missing Administrator Account
Mobile Secret Codes
Modify .exe Files And Crack A Program
More Xp Tips and tricks make your computer more faster
MORRIS~1
Moving and Removing the Start Button
Msn Messenger & Gmail
My Flash Bookmarks, long list of tutorials
Myth about WPA ( How it is done ), Windows Product Activation Technique
NEIDOR~1
Nero How To Verify The Validity Of The Sn U Use
NetBios explained
New Pc Or New Motherboard
New Way To Relive Some Zinio File
news groups the how to do
NFS Tracing
Nice list of windows shortcuts
Nightline- FBI,Privacy,and Proposed Wire-Tapping Legislation
No Text Icons
Ntfs Cluster Size, better harddrive performance
NY_2'S Guide to Obtaining An IP Address.
Official Unattended Xp Cd Guide Xp Sp2 @ Msfn.org
Open Windows Explorer To A Different Default Direc
Optimize Broadband & Dsl Connections
Optimize Emule Connection
Organizational Analysis in Computer Science
Outpost Rules, Outpost rules for system & app
Outsmarting System File Protection
Overclocking_Tutorial
Packet Attacks - Version 1.1, { Packet_Attack_Exlained}
Part 0 Dc++
Part 1 Bittorrents
Part 2 Irc (mirc)
Part 3 Ftp
Partitioning Your Harddisk With Fdisk
Pc File Extention Listing
Pc Maintenance Guide
Peer2mail Tutorial
Performance Increase Through My Computer
PGP Startup Guide
Phone Systems Tutorial by The Jolly Roger
Phreakers Handbook
Play Games On PS2 Without ModChip
Play On A Bnet Emulator, and f off cd key check =)
Port Numbers
Presumed Guilty
Problem With Internet Navigation, Clean Host File
Proxy how to
Quick Fix For Spyware, Try This Before Doing Surgery on Your OS
Quick Msc
Quick Phone Modifications
Quick Shutdown for XP, How to create a shutdown shortcut.
Quickly Start The Shared Folder Wizard
Raising Hell with Unix
Rapidshare hack Free premium acount for all
Rapidshare Hacked, unlimited upload, no countdown
Rapidshare Timelimit
Read This Av Compare
Recover A Corrupted System File
Recover a Quick erased CD RW
Reformat&Reinstall
Regedit.exe & Regedt32.exe, Whats the difference
Registry Disassembled a basic tutorial
Reinstall Internet Explorer 6
Release Codes, Read, and Learn
Remote Desktop Through Company Firewall
Remote Shutdown
Remove Linux From Your Pc Safely, and restoring your MBR
Remove Msn Messenger From Xp, several ways
Removing Banners From Free Webhosts
Removing Norton Anti-virus 2004, How to remove the Registry Enteries
Rename 'recycle Bin' To Whatever You Want
Reregister All .dll Files Within Registry
Reset your lost Bios Password
Restore JPG,JPEG,JPE Default File associations, Win XP Tweak
REVERSE CODING
RIGGSB~1
RIGGS_~1
RIGHTS~1
RIVERA
Routing Basics.pdf
Run Aol Without Using Aol Browser & Save Resources, connect permanently and use any browser
Running A Board forum From Your Own Pc
Running Vanishing Console Programs With A Click, Ever had a console program that vanis
Safely Editing the Registry
Save Your Desktop Icon Settings
Saving and loading Photoshop actions
Scheduled Tasks - Defrag, how to set up scheduled defrags
ScreenLock Professional v2.0.41
SEARCH eBOOK in FTP SEARCH ENGINE
Search For Ebook Server With Google.com
Search like a real warez d00dz, for warez of course
Searching For Something To Download, This may help
Secret Backdoor To Many Websites
Secrets Of Lock Picking
Securing WinXP Pro (with what win-xp has to offer
Securing your WINDOWS XP computer
Security holes
Seisure Warrent Documents for Ripco BBS
Set Google as your Default Search in IE
Set Win Explorer to open the folder you want, Little trick
sick of inserting winxp cd every time your pc asks, Change Default Location of i386 Folder
sidebar fix
Simple Tweaks For Peak Pc Graphics Performance
Single Click Shutdown
Single-click To Open An Item, IF the Folder Options is grayed out
Site Security Handbook
SJ-DEC~1
SJ-RESP
Slow Loggon Time, one fix for problem
Slow Opening Of File Dialogs
SMTP-Simple Mail Transfer Protocol
Some Cool Site For Tutorials
Some Google Tricks, again
Some More Tips To Improve Your Winxp
Sp2 For Xp Slipstream, Integrate SP2 into your XP CD
Sp2 Tweaks
Speed Up Internet
Speed up menu display
Speed up Mozilla FireFox
Speed Up Your Bandwidth By 20% , Windows uses 20% of your bandwidth
Speeding up menus in XP
Speeding up your internet connection under Linux and Windows.html
Spoofing emails, via telenet
Standard ASCII Character Set
Steps to Clean Install XP
Stop A Restart Process In 3steps
Stop Annoying Pop-ups Without Pop-up Blockersoutli
SUNDEVIL
SUPREM~1
System Changes To Foil Hackers And Browser Hijacke
System File Checker For Windows Xp
TCP packet fragment attacks against firewalls and filters
Tcpip A Mammoth Description, Short and easy-Everything U want to know
Telenet-The Secret Exposed
telnet trick port 25
Testing Wattage Consumption Of Your Computer, Measuring your computer's wattage
The Antivirus Defense-in-Depth Guide
The Basics of Hacking- Introduction
The Baudy World of the Byte Bandit-A Postmodernist Interpreta
ThE Beige BoX
The Constitution in Cyberspace
The Cracking Manual
The difference between DVD-R, DVD+R, DVD+RW and DVD-RW
The Electronic Communication Privacy Act of 1986 - A Laymans
The Greatest Hacker of all time.ASC
The Hacker's League
The History of British Phreaking
The Inner Circle Book's Hacking Techniques
The Lamahs-Guide to Pirating Software on the Internet
The M.M.C. Guide to Hacking, Phreaking, Carding
The Modern Phreakers Guide To Beige Boxing
The Moterola Bible
The Myth of the 2600Hz Detector
The Newbies Handbook- ' How to beging in the World of Hacking
The Newbies-User's Guide to Hacking
The Official Phreaker's Manual
The Phreakers Handbook-1
The Port Guide, Port number and info
The Pre-History of Cyberspace
The Price of Copyright Violation
The REAL way to hack RemoteAccess
The Telephone Works
The Ultimate Guide To Installing Windows Xp Sp2
The Ultimate Phreaking Guide
the UNIX operating system (Berkley 4.2)
Three Ways Of Bypass Starforce Cd Protection
Tip for shutdown windows - virus
Tips And Tricks, Windows XP
Tips on Starting Your Own BBS.1
Tired Of Reinstalling Windows
To Get And Show The Ip Via Javascript
Top 5 Myths About Safe Surfing, PC Magazine
Transferring Data
Translating Binary To Text
Translating Binary to Text2
Trojan Ports
Turn MSN Messenger Display Pix into User Pix on XP
Turn Off Unneeded Services, speed up pc
Tutorial Get the serial number you need
Tutorial How to create a bootable Windows XP SP1 CD (Nero)
Tutorials - blacksun.box.sk
Ultimate Google Way
Ultimate guide to bypass bios passwords
Understanding the Telephone System
undocumented DOS commands
Uninstall Windows Xp And Return To My Old Windows
Uninstalling Norton 2004 Products
UNIX Computer Security Checklist.0
UNIX Use and Security - By the Prophet
UNIX Use and Security From The Ground Up
UNIX- A Hacking Tutorial.SIR
Unlimited Rapidshare Downloads
Untold Window Tips
Untold Windows Secrets
Untold Windows Tips
Unused space on hard drives recovered
Use Hotkeys To Switch Programs
Useful Download Guide, Fix Down, 0daycn Ttdown, Links
User's Guide To Avoiding Virus Infections, Keeping an eye out for viruses
Using Google As A Calculator, A Tutorial
Using Google for searching ebooks
Using Rapid Share, How to use them and skip the BS
Video Avatars
Viewing Leftover Driver Entries
Virtual Memory Information
Virtual Memory Optimization Guide Rev. 4.0 - Final
Viruii FAQ
Virus-Trojan FAQ
Want To Download Torrent File By Using Google
Warez Definations
WAREZ DEFINITION
Way To Download From Brturbo, FireFox
We Don't Need No Education, Online classes made easy
Welcome to The king's meaning's of how to kick some-one's ASS
What is the Registry
What Should I Do With Image Files
What To Look For In A Code Hacking Program
What You Should Know About Computer Viruses.DNA
What You Wanted To Know About Movie Jargon, But Were Afraid To Ask
When Good Discs Go Bad
Where Is Winipcfg In Winxp
Who's Seeding The Net With Spyware
Why wait 35 Seconds at eZshare
Win 2000 Dr. Watsson
Windows 2000 Tips & Tricks
Windows 2003 System Restore, How to activate system restore in W2K3
Windows Scan Count Down Time
Windows Shortcuts
WINDOWS TRUE HIDDEN FILES
Windows Tweak, Hack Your Start Button
Windows Xp - Speed Up Your Network and Internet Access
WINDOWS XP HIDDEN APPS
Windows XP Registry Tweaks
Windows XP Startup and Performance Tweaks
Windows Xp Tips 'n' Tricks
Windows Xp Tweaks, A work in progress
Windows XP Tweaks
WinRar Tutorial - Compression profiles, passwords and more
Winsock 2 Repair
WinXP 3 Tips
Winxp Application Defrag, faster access for used programs
Winxp Applications Startup Time, Decrease your Applications startup time
WinXP Bootable CD
Winxp System Response, reboot whitout rebooting
Winxp Tips And Tricks, Winsock 2 repair
Xp Auto Install
Xp Folder View Does Not Stay To You're Setting., Grab your registry editor and join in
XP REPAIR INSTALL
XP Tweaking
Yahoo + geocities Posts
Yahoo Chat Commands how to
Yahoo Messeger, no ad's
You Want Lots Of Music, Appz, Anything, Try Dex Hunting
Your Home Page Nevr Being Changed
Your Own Home Server - Introduction
Zen and the Art of Fone Phreaking `97

March 11, 2011

COMMON FTP ERROR CODES

~~~~~~~~~COMMON FTP ERROR CODES~~~~~~~~~~

# Description

110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK yyyy = mmmm where yyyy is User-process data stream marker, and mmmm server's equivalent marker (note the spaces between markers and "=").

120 Service ready in nnn minutes.

125 Data connection already open; transfer starting.

150 File status okay; about to open data connection.

200 Command okay.

202 Command not implemented, superfluous at this site.

211 System status, or system help reply.

212 Directory status.

213 File status.

214 Help message.On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.

215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.

220 Service ready for new user.

221 Service closing control connection.

225 Data connection open; no transfer in progress.

226 Closing data connection. Requested file action successful (for example, file transfer or file abort).

227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).

230 User logged in, proceed. Logged out if appropriate.

250 Requested file action okay, completed.

257 "PATHNAME" created.

331 User name okay, need password.

332 Need account for login.

350 Requested file action pending further information

421 Service not available, closing control connection.This may be a reply to any command if the service knows it must shut down.

425 Can't open data connection.

426 Connection closed; transfer aborted.

450 Requested file action not taken.

451 Requested action aborted. Local error in processing.

452 Requested action not taken. Insufficient storage space in system.File unavailable (e.g., file busy).

500 Syntax error, command unrecognized. This may include errors such as command line too long.

501 Syntax error in parameters or arguments.

502 Command not implemented.

503 Bad sequence of commands.

504 Command not implemented for that parameter.

530 Not logged in.

532 Need account for storing files.

550 Requested action not taken. File unavailable (e.g., file not found, no access).

551 Requested action aborted. Page type unknown.

552 Requested file action aborted. Exceeded storage allocation (for current directory or dataset).

553 Requested action not taken. File name not allowed.


www.mysticinfoservices.com

Virtual Memory Information

Tutorial Objective

This tutorial talks about anything about the virtual memory and how much virtual memory you need for your system.


Tutorial Introduction & Background

Today application is getting bigger and bigger. Therefore, it requires a bigger system memory in order for the system to hold the application data, instruction, and thread and to load it. The system needs to copy the application data from the HDD into the system memory in order for it to process and execute the data. Once the memory gets filled up with data, the system will stop loading the program. In this case, users need to add more memory onto their system to support that intense application. However, adding more system memory costs the money and the normal user only needs to run the the intense application that requires the memory only for one or two days. Therefore, virtual memory is introduced to solve that type of problem.


Terminology & Explanation

There are two types of memory, which are as follows:

* System Memory is a memory that is used to store the application data and instruction in order for the system to process and execute that application data and instruction. When you install the memory sticks to increase the system RAM, you are adding more system memory. System Memory can be known as either the physical memory or the main memory.

* Virtual Memory is a memory that uses a portion of HDD space as the memory to store the application data and instruction that the system deemed it doesn't need to process for now. Virtual Memory can be known as the logical memory, and it controls by the Operating System, which is Microsoft Windows. Adding the Virtual Memory can be done in system configuration.


Tutorial Information & Facts or Implementation

Virtual Memory is a HDD space that uses some portion of it as the memory. It is used to store application data and instruction that is currently not needed to be process by the system.

During the program loading process, the system will copy the application data and its instruction from the HDD into the main memory (system memory). Therefore the system can use its resources such as CPU to process and execute it. Once the system memory gets filled up, the system will start moving some of the data and instruction that don't need to process anymore into the Virtual Memory until those data and instruction need to process again. So the system can call the next application data and instruction and copy it into the main memory in order for the system to process the rest and load the program. When the data and instruction that is in the Virtual Memory needs to process again, the system will first check the main memory for its space. If there is space, it will simply swap those into the main memory. If there are not any space left for the main memory, the system will first check the main memory and move any data and instructions that doesn't need to be process into the Virtual Memory. And then swap the data and instruction that need to be process by the system from the Virtual Memory into the main memory.

Having too low of Virtual Memory size or large Virtual Memory size (meaning the size that is above double of the system memory) is not a good idea. If you set the Virtual Memory too low, then the OS will keep issuing an error message that states either Not enough memory or Virtual too low. This is because some portion of the system memory are used to store the OS Kernel, and it requires to be remain in the main memory all the time. Therefore the system needs to have a space to store the not currently needed process data and instruction when the main memory get filled up. If you set the Virtual Memory size too large to support the intensive application, it is also not a good idea. Because it will create the performance lagging, and even it will take the HDD free space. The system needs to transfer the application data and instruction back and forth between the Virtual Memory and the System Memory. Therefore, that is not a good idea. The ideal size for the Virtual Memory is the default size of Virtual Memory, and it should not be exceed the value of the triple size of system memory.

To determine how much virtual memory you need, since the user's system contains the different amount of RAM, it is based on the system. By default, the OS will set the appropriate size for Virtual Memory. The default and appropriate size of Virtual Memory is:

CODE
* 1.5 =
.

For example, if your system contains 256 MB of RAM, you should set 384 MB for Virtual Memory.

CODE
256 MB of RAM (Main Memory) * 1.5 = 384 MB for Virtual Memory


If you would like to determine how much the Virtual Memory is for your system and/or would like to configure and add more virtual memory, follow the procedure that is shown below. The following procedure is based on windows XP Professional.

1-1) Go to right-click My Computer and choose Properties

1-2) In the System Properties dialog box, go to Advanced tab

1-3) Click Settings button that is from the Performance frame

1-4) Once the Performance Options shows up on the screen, go to Advanced tab

1-5) Under the Advanced tab, click the Change button from the Virtual Memory frame to access to the Virtual Memory setting

Then the Virtual Memory dialog box appears on the screen. In there, you are able to check how much the Virtual Memory you set. If you would like to modify the size of Virtual Memory, follow the procedure that is shown below.

2-1) In there, select the drive letter that is used to install the Operating System

2-2) Choose the option that says, "Custom Size:"

Once you choose that option, the setting for Initial Size and Maximum Size become available for you to set. Initial Size (MB) means the actual size of Virtual Memory, and Maximum Size (MB) means the maximum size of Virtual Memory that is allowed to use.

Let's say if your system contains 512 MB of RAM, then the ideal setting for the Virtual Memory is as follows:

CODE

Initial Size (MB): 768
Maximum Size (MB): 1500


Once you are happy with that Virtual Memory size, click the Set button from Paging file size for selected drive to apply the setting for the Virtual Memory size. Then click the OK button to apply the setting.

That's where you can manage and configure for the size of Virtual Memory.


Additional Information

* To maintain the good overall system performance, you should be using the default size of actual size for Virtual Memory and the triple the value of the size of the main memory for the maximum size of Virtual Memory. If you find that main memory plus virtual memory is not big enough to load the intensive application, then you will need to add more main memory onto your system.


Search Keyword

virtual memory

http://www.mysticinfoservices.com/

Who is seeding net with spy where

Who's Seeding the Net With Spyware?

Young surfers pick up paychecks for posting misleading pitches armed with invasive programs.

It's tough enough sometimes to figure out where you picked up that spyware, but have you ever wondered who planted that digital parasite?

It's likely a young man, maybe a college student, just making a few bucks spreading pop-up ads that contain a package unwelcome by many. And it's a growing cottage industry.

How It Works

Spyware follows your Internet surfing habits and serves up advertisements. You typically pick up spyware by clicking on links, which may not make it clear that you're downloading a "bonus" program when you read an ad or download a program you want.

The Federal Trade Commission defines spyware as "software that aids in gathering information about a person or organization without their knowledge and which may send such information to another entity without the consumer's consent, or asserts control over a computer without the consumer's knowledge." The federal government and several states are considering antispyware laws, and Utah recently enacted one.

FTC and industry leaders have urged Congress to resist spyware legislation, instead pushing for the industry to adopt self-regulatory practices. They fear that proposed laws define the practice too vaguely, and would prohibit other marketing practices that benefit consumers. But some lawmakers worry that the tech industry will not regulate spyware aggressively enough to protect consumers.

Meanwhile, computer users continue to face the side effects of spyware on their systems: bogged-down Internet connections, identity theft, lost documents, system problems, and potential loss of privacy.

Who's Behind It

The people distributing the links for spyware downloads are paid about 15 cents every time an unsuspecting surfer clicks on their misleading bait.

"Friends signed me up one night, after we'd been drinking," says one twenty-something man, who plants spyware for pay. "They said it was an easy way to make some money."

"All I had to do was sign up and post fake ads, saying things like 'to see my picture click here.' Then when they clicked, it told them they had to download software to see the pictures."

But the user downloaded no pictures; instead, they got the greeting, "Come back later to see my photo." The ad is bogus, but the contamination of the computer is real.

He says open forums and other unregulated sites are the best places to post ads, because large numbers of people are likely to click on the phony links.

"You have to move around," he says, noting that if users complain, he'll be kicked off a site, or a section of a site. For example, he will just move to a different part of a classified advertisement site, he says. "It's really easy, so reposting your ad is not a big deal."

At 15 cents per hit, he got checks every two weeks for a few hundred dollars each.

"I could have made a lot more," he says, adding that he really isn't doing it anymore. "All I had to do was put more ads up and I would have doubled or tripled my profits."

What's the Risk?

The foot soldiers who spread spyware may also become victims of the companies behind the software.

Many companies paying individuals to spread spyware post a disclaimer on their own Web site. It often contains a clause telling readers that if they commit fraud the company has the right to pull their paycheck.

However, the new Utah Spyware Control Act and other privacy laws sometimes invoked to combat spyware consider posting spyware to be fraud.

The spyware spreaders may not be reading the disclaimer themselves. But they do understand the company is paying them to trick people into downloading software, the young man says.

Does he feel any remorse for contaminating the computers of naive users? "Look, they're perverts if they click on my ads," he says, noting that the ads imply pornographic pictures await. "I say some nasty stuff, so, no, I don't feel bad." Anyone online should have a spyware blocker, spam blocker, and a firewall anyway, he said. "If they don't, they're just stupid."

A Challenging Battle

Placing ads online can be a tempting and easy way to make money from home, notes Ray Everette-Church, chief privacy officer for antispam product vendor Turn Tide.

"It is very successful," Everette-Church says. "Hundreds of thousands of dollars a month is generated in this tiered structural referral." He is serving as an expert witness for the plaintiffs in an ongoing adware case arguing against pop-up ads.

Millions of Americans online haven't protected their PCs, and pursuing perpetrators of spyware is more complicated than in other criminal investigations, according to Mozelle Thompson, an FTC commissioner.

"It's hard to identify how many companies are engaged in dangerous spyware, or spyware in general," Thompson says. "The definition of spyware is too broad."

The surreptitious nature of spyware makes it more difficult to track who, where, and how the spyware is disseminated, Thompson told a House subcommittee at a recent hearing.

"Consumer complaints, for instance, are less likely to lead directly to targets than in other law enforcement investigations, because consumers often do not know that spyware has caused the problems or, even if they do, they may not know the source of the spyware," he said at the April hearing.

http://www.mysticinfoservices.com/

Window registry tweeks

Hacking Windows XP Registry



Structure of Windows XP Registry :


When you will open the Windows XP Registry , you will see it's divided into two panes. On the left side there are Five main
Keys as shown below. These can be expanded to several Sub-Keys, which further has many Sub-Keys.

+HKEY_CLASSES_ROOT

+HKEY_CURRENT_USER

+HKEY_LOCAL_MACHINE

+HKEY_USERS

+HKEY_CURRENT_CONFIG







Before you try out the Tweaks, learn how to Backup and Restore Windows XP Registry.
Types of Registry Backups :
It?s very important that before you do editing you make a backup of the current registry. If you ignore this warning, it might prove deadly for you?so better listen to me J
Open your registry. Go to Start>Run , type regedit . When you invoke the Export function from File>Export, you are given a choice of different file types that can be saved :
Registration Files (*.reg)
Registry Hive Files (*.*)
Text Files (*.txt)
Win9x/NT 4 Registration Files (*.reg)
All Files

Each one of the different file types above plays an important role in how the data you export is saved. Choosing the wrong type can give you unexpected results. So let me explain you quickly these file types.

Registrations Files : The Registration Files option creates a .reg file. This is the most well known file format used for backing up the registry. The Registration File can be used in two ways. As a text file it can be read and edited using Notepad outside of Registry Editor. Once the changes have been made and saved, right clicking the file and using the [Merge] command adds the changed file back into the registry. If you make additions to the registry using regedit and then merge the previously saved Registration File, anything that you've added via regedit will not be removed, but changes you make to data using regedit that previously existed in the saved Registration File will be overwritten when it is merged

Registry Hive Files : Unlike the Registration Files option above, the Registry Hive Files option creates a binary image of the selected registry key. The image file is not editable via Notepad nor can you view its contents using a text editor. However, what the Registry Hive Files format does is create an image perfect view of the selected key and allow you to import it back into the registry to insure any problematic changes you made are eliminated.

Text Files : This option does just as the name suggests. It creates a text file containing the information in the selected key. It's most useful purpose is creating a record or snapshot of a key at a particular point in time that you can refer back to if necessary. It cannot be merged back into the registry like a Registration File.

Win9x/NT 4 Registration Files : This option creates a .reg file in the same manner used by the Registration Files option. It's used by previous Windows versions and serves no purpose in XP unless you want to merge a key from XP into a previous version of Windows.

Out of the give above choices , the safest method of backing up registry is to use Registry Hive Files option. No matter what ever you do or goes wrong in editing, importing the image of the key will eliminate all changes.

**Note-> I have included the exact name/value between [ ] brackets. [ & ] should be ignored, only the data inside them should be considered.



1. Customize Windows Media Player Title Bar

Change the title bar to read Windows Media Player provided by , so if I had entered text ?Abhishek Bhuyan? , it would read: Windows Media Player provided by Abhishek Bhuyan

[Start] [Run] [Regedit]

Go to HKEY_CURRENT_USER\Software\Policies\Microsoft
Create the Key [WindowsMediaPlayer]
Create String value named [TitleBar]

Data Type: REG_SZ // Value Name: TitleBar
Double click TitleBar and Enter the text to be displayed in the title bar.

Exit Registry / Reboot

2. Minimize Outlook 2002 to the System Tray

If you frequently access Outlook during the day it?s more convenient to have it minimized to the system tray rather than invoking it each time you need to send/receive e-mail. This tweak minimizes Outlook 2002 to the system tray:

[Start] [Run] [Regedit]

Go to HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Outlook\Preferences

Modify/Create Data Type DWORD named [MinToTray]
Setting for Value Data: [0 = Disabled / 1 = Enabled]

Exit Registry / Reboot

3. Specify Default IE Download Directory

This tweak changes the default directory where downloads initiated in Internet Explorer are stored on the system.

[Start] [Run] [Regedit]

Go to HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer

Modify/Create String Value of Data type REG_SZ Named [Download Directory]
Value Data: [Enter Path to Directory to be Assigned as Defualt for Downloads]

Exit Registry / Reboot

4. Force Use of Classic Start Menu

This tweak loads the Classic Start Menu and makes it impossible to change back to the Windows XP version

[Start] [Run] [Regedit]

Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Modify/Create the DWORD Value of Data type REG_DWORD Named [NoSimpleStartMenu]
Value Data: [0 = Default / 1 = Force Classic Start Menu]

Exit Registry / Reboot

5. Hide/Show Internet Explorer Desktop Icon

By default, Windows XP does not show the Internet Explorer icon on the Windows desktop. Using the registry tweak below allows you to control whether or not the Internet Explorer icon is displayed.

[Start] [Run] [Regedit]

Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Modify/Create DWORD Value of Data type REG_DWORD Named [NoInternetIcon]
Setting for Value Data: [0 = Disabled / 1 = Enabled]

Exit Registry / Reboot

6. Increase Menu Display Speed

When you click on the Start Menu there is some delay to display the contents , just for no reason. Effects are pretty though. The default speed can be adjusted with a quick registry entry.

The default value is 400. Set it to 0 and the delay is gone. If you are not able to adjust pick a number that suits your style and make the change.

[Start] [Run] [Regedit]

Go to HKEY_CURRENT_USER\Control Panel\Desktop

Modify/Create String value of Data type REG_SZ Named [MenuShowDelay]

Value Data: [Default = 400 / Adjust to Preference]

Exit Registry / Reboot

7. Change the Location of Special Folders

This tweak allows changing the location of special folders on the system. Any of the folders listed in the registry key may be moved.

[Start] [Run] [Regedit]

Go to : HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserShell Folders

Modify/Create String value of Data type REG_SZ Named [Various Folder Names]

Data Type: REG_SZ [String Value] // Value Name: Consult RegEdit for Folder Names

Value Data: [Move the folder to the new desired location using explorer, and then edit the matching folder in RegEdit to reflect the new folder location]

Exit Registry and Reboot

8. Faster Browsing in Windows Explorer on Network Computers

By default, a Windows XP machine connecting to a Windows 95/98/Me computer will search for scheduled tasks or enabled printers on the remote computer. Two sub-keys control this behavior. Deleting them will speed up browsing on the remote computer.

[Start] [Run] [Regedit]

Go to : HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\RemoteComputer\NameSpace

To Disable Scheduled Task Checking
Value Name: {D6277990-4C6A-11CF-8D87-00AA0060F5BF}
Delete the sub-key in the left pane of Registry Editor

To Disable Printer Checking
Value Name: {2227A280-3AEA-1069-A2DE-08002B30309D}
Delete the sub-key in the left pane of Registry Editor

Exit Registry / Reboot

9. Add Administrator Account to Log In Screen

When Windows XP is first installed it requires you to enter at least one name of a user who will access the computer. Once you create this name the default Administrator account vanishes. To access it, press Ctrl-Alt-Delete twice at the Welcome screen to retrieve the standard Windows 2000 logon dialog. Log on as Administrator from this point. To log the Administrator off, click [Start] [Log Off] and [Log Off] when the [Log Off Windows] selection box appears. The Log On screen with the available users will be displayed.

To Make the Administrator Account Always Visible on the Login Screen use this Registry Tweak.

[Start] [Run] [Regedit]

Go to: HKEY_LOCALMACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList

Modify/Create DWORD Value of Data type REG_DWORD Named [Administrator]
Setting for Value Data: [0 = Disabled / 1 = Enabled]

Exit Registry / Reboot

10. Increase Internet Download Connections

Increase Simultaneous Internet Download Connections. Increases the number of allowed simultaneous connections to ten (10).

[Start] [Run] [Regedit]

Go to: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings

Modify/Create DWORD Value of Data type REG_DWORD Named [MaxConnectionsPer1_0Server]
Setting for Value Data: [0000000a]

Modify/Create DWORD Value of Data type REG_DWORD Named [MaxConnectionsPerServer]
Setting for Value Data: [0000000a]

Exit Registry / Reboot


11. Connected Web Files and Folders

Connecting web files and folders allows a primary .htm or .html file to be moved in conjunction with files associated with the primary document. Once the primary document has been defined, create a sub-folder using the same name as the primary document but assign it a .files extension. Whenever the primary file is moved, the sub-folder will also move and remain as a sub-folder of the primary.

[Start] [Run] [Regedit]

Go to: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer

Modify/Create DWORD Value of Data type REG_DWORD Named [NoFileFolderConnection]
Setting for Value Data: [0 = Enabled (Default) / 1 = Disabled]

Exit Registry / Reboot

12. Hide/Show My Documents Folder on Desktop

By default, Windows XP does not show the My Documents folder on the Windows desktop. Using the registry tweak below allows you to control whether or not My Documents is displayed.

[Start] [Run] [Regedit]

Go to: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{450D8FBA-AD25-11D0-98A8-0800361B1103}\ShellFolder

Modify/Create DWORD Value of Data type REG_DWORD Named [Attributes]
Setting for Value Data: [Default = 0xf0400174 / Hidden = 0xf0500174]

Exit Registry / Reboot

13. Create a Hidden User Account

This tweak allows an account that is normally displayed on the Welcome screen to be hidden from view. To log on using the account it's necessary to use the Log On To Windows dialog box similar to the one in Windows 2000 i.e. press CTRL+ALT+DEL twice.

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList

Modify/Create DWORD Value of Data type REG_DWORD Named [Type Name of Account to be Hidden]
Setting for Value Data: [0 = Account is Hidden / 1 = Enabled]

Exit Registry / Reboot

While the account is hidden on the Welcome screen, note that the account profile will be visible in C:\Documents and Settings or wherever user profiles are stored as well as in Local Users and Groups.

14. Create Legal Notice Logon Dialog Box

In situations where you need users to read a legal notice before logging on, this tweak will create the caption for the notice.

Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon

Modify/Create String Value of Data type REG_SZ Named [LegalNoticeCaption]
Value Data for LegalNoticeCaption: [Type the Caption for the Dialog Box]

Modify/Create String Value of Data type REG_SZ Named [LegalNoticeText]
Value Data for LegalNoticeText: [Type the Data for the Legal Notice]

Exit Registry / Reboot

15. Manage Internet Explorer Error Reporting

This tweak removes the IE Error Reporting tool from appearing with the option to send browser debugging reports to Microsoft.

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main

Note:- Create both values listed below and set according to the bold type for the tweak to function properly.

Modify/Create DWORD Value of Data type REG_DWORD Named [IEWatsonEnabled]
Value Data: [0 - Disabled / 1 - Enabled]

Modify/Create DWORD Value of Data type REG_DWORD Named [IEWatsonDisabled]
Value Data: [0 - Disabled / 1 - Enabled]

Exit Registry / Reboot

16. Customize Logon and Security Dialog Title

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\ CurrentVersion\Winlogon

Modify/Create String Value of Data type REG_SZ Named [Welcome]
Value Data: [0 = Disabled / 1 = Enabled]

Exit Registry / Reboot

17. Customize Logon Box Message

This is the message displayed on the Classic Logon box, not the XP ?Welcome? logon screen

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\ CurrentVersion\Winlogon

Modify/Create String Value of Data type REG_SZ Named [LogonPrompt]
Value Data: [Enter the text of the message]

Exit Registry / Reboot

18. Welcome Screen Logon Vs Classic Logon

This tweak specifies whether the Welcome screen or the Classic logon will be used to access Windows XP.

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon

Modify/Create DWORD Value of Data type REG_DWORD Named [LogonType]
Value Data: [0 - Classic Mode / 1 - Welcome Screen]

Exit Registry / Reboot

19. QoS (Quality Of Service) Bandwidth Reserve Setting

By default, Windows XP reserves 20% of the connection bandwidth for QoS traffic. This tweak allows the setting to be altered to a different percentage of connection bandwidth. If the system uses more than a single adapter for network connections, each adapter may be set individually by navigating to:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Psched\Parameters\Adapters\{Adpater-ID} rather than HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Psched

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Psched

Modify/Create DWORD Value of Data type REG_DWORD Named [NonBestEffortLimit]
Setting for Value Data: [Enter as a Percentage / Default Value = 20]

Exit Registry / Reboot

20. Enable/Disable Save Password in DUN

This tweak saves user passwords for Dial Up Networking so they do not have to be re-entered each session.

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\Parameters

Modify/Create DWORD Value of Data type REG_DWORD Named [DisableSavePassword]
Setting for Value Data: [0 = Disabled (Passwords Saved) / 1 = Enabled (Passwords Not Saved)]

Exit Registry / Reboot

21. Change the Registered Organization/Owner of Windows XP

This tweak allows modification of the registered owner and organization of the Windows XP software.

Note:- This tweak has nothing to do with Windows Product Activation (WPA) and will not allow you to register illegal XP software.

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion

Modify/Create String Value of Data type REG_SZ Named [RegisteredOrganization] or [RegisteredOwner]
Setting for Value Data: [Modify the Values to Reflect Current Information]

Exit Registry / Reboot

22. Remove Links Folder in Favorites

The Links folder is part of Favorites whether it's being accessed through Internet Explorer or the Favorites menu in the Start Menu. This tweak will remove it from those locations.

[Start] [Run] [Regedit]

Go to: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar

Modify/Create String Value of Data type REG_SZ Named [LinksFolderName]
Value Data: [Set the String Value to a blank string]

Open Internet Explorer and manually delete the Links folder from Favorites Menu.
The Links folder will not be recreated.

Exit Registry / Reboot

23. Enable/Disable Active Window Tracking to Mouse Movements

When the mouse is moved over an open window it automatically sets the focus to that particular window. It does not bring the window to the foreground of the open windows.

[Start] [Run] [Regedit]

Go to: HKEY_CURRENT_USER\Control Panel\Mouse

Modify/Create DWORD Value of Data type REG_DWORD Named [ActiveWindowTracking]
Setting for Value Data: [0 = ActiveWindowTracking Disabled / 1 = ActiveWindowTracking Enabled]

Exit Registry / Reboot

24. Auto Disconnect for Internet Explorer

Use this edit to automatically disconnect from Internet Explorer after a specified length of time has elapsed. Use this trick on anyone whom you don?t like using your computer with net J

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Parameters

Modify/Create DWORD Value of Data type REG_DWORD Named [Autodisconnect]
Value Data: [Enter a new disconnect time. Use Hexadecimal if you are unfamiliar with Binary]

Exit Registry / Reboot

25. Auto Reboot on System Crash

By default, when the Windows XP operating system crashes an automatic reboot of the system occurs. While this behavior can be convenient, the downside is the error message accompanying the crash is not visible. Often times this information can be a great help in troubleshooting the source of the crash. This behavior can be modified in two ways; via the registry or using the System Properties property sheet.

[Start] [Run] [Regedit]

Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl

Modify/Create DWORD Value of Data type REG_DWORD Named [AutoReboot]
Setting for Value Data: [0 = AutoReboot Disabled / 1 = AutoReboot Enabled]

Exit Registry / Reboot

Open System Properties via Start > Control Panel > Performance and Maintenance > System

[System Properties may also be opened using the WinKey+Pause key combination]

Select the Advanced tab and then click Settings in the Startup and Recovery section

In System Failure section, clear the checkbox next to Automatically Restart

Click OK and OK to exit

26. Modify Control Panel Categories

Even if you like the new style for Control Panel, you might at times wish you could shift some items around into a different category. It's possible.

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Control Panel\Extended Properties\{305CA226-D286-468e-B848-2B2E8E697B74} 2

Modify/Create DWORD Value of Data type REG_DWORD Named [Choose one of the applets with .cpl extension]

Setting for Value Data: [Select the value from table below]

Other Control Panel Options 0
Appearance and Themes 1
Printers and Other Hardware 2
Network and Internet Connections 3
Sounds, Speed, and Audio Devices 4
Performance and Maintenance 5
Date, Time, Language, and Regional Options 6
Accessibility Options 7
Add or Remove Programs 8
User Accounts 9

Exit Registry / Reboot

To further customize the items that appear in the new Control Panel, do a search of your system for all files that end in .cpl extension. If they aren't already listed, you can add them with a new DWORD value and then assign them to a category of your choosing.

27. Enable/Disable Run Commands Specific to the Registry

This tweak controls the use of the Run command on the local machine

[Start] [Run] [Regedit]

Go to: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ Policies\Explorer

Create a DWORD value of Data Type REG_DWORD for each Run function that will be disabled.

Modify/Create the Value Name [DisableLocalMachineRun]
Modify/Create the Value Name [DisableLocalMachineRunOnce]

Modify/Create the Value Name [DisableCurrentUserRun]
Modify/Create the Value Name [DisableCurrentUserRunOnce]

Setting for Value Data: [0 = Disabled / 1 = Enabled]

Exit Registry / Reboot

28. Enable/Disable System Properties Access from My Computer

This tweak removes access to System Properties via My Computer as well as via Control Panel.

[Start] [Run] [Regedit]

Go to: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Modify/Create DWORD Value of Data type REG_DWORD Named [NoPropertiesMyComputer]
Value Data: [0 - Display Properties / 1 - Hide Properties]

Exit Registry / Reboot

29. Uninstall Programs Manually

Just because Windows XP has the Add/Remove Programs feature it doesn't mean your application will appear in the list. Furthermore, even if it does appear, it's no guarantee that the uninstall feature will work. When you run across one of these situations the items listed below will help in getting rid of the application. Be aware that these steps may not remove everything associated with the application and can impact other applications on the computer. Have a backup or restore point and use caution.

Find the directory for the application and delete all the files in the directory. Delete the directory.

Open regedit and navigate to HKEY_LOCAL_MACHINE\SOFTWARE and find the folder for the application. Delete the folder.

Open regedit and navigate to HKEY_CURRENT_USER\SOFTWARE and find the folder for the application. Delete the folder.

To remove the application entry from Add/Remove Programs (if present) open regedit and navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall and find the folder for the application. Delete the folder.

Some applications have Services attached to them. If this is the case, navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services, locate and delete the service.

In Windows Explorer, navigate to the individual user settings and delete program references. Common places to check would be:

C:\Documents and Settings\All Users\Start Menu\Programs and delete relevant entries.

C:\Documents and Settings\All Users\Start Menu\Programs\Startup and delete relevant entries.

C:\Documents and Settings\%YourUserID%\Start Menu\Programs and delete relevant entries.

[Do this for each User ID listed]

C:\Documents and Settings\%YourUserID%\Start Menu\Programs\Startup and delete relevant entries.

[Do this for each User ID listed]

If no entries were found in the previous step and the application launches automatically, navigate to

HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows

and delete the entry.

30. Create a right-click command prompt option

You can right-click a folder to get a list of actions you can apply to it. Here?s a way to create an action on that right-click menu that opens a command prompt window with that folder as the current directory. In a text editor such as Notepad, type the following exactly:

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\Folder\shell\Cmd Here]

@=?Command &Prompt Here?

[HKEY_CLASSES-ROOT\Folder\shell\Cmd Here\command]

@=?cmd.exe /k pushd %L?



Save the file with any name you want, with a .reg extension. Then double-click the saved file and choose Yes to merge the file?s information into the Registry. You can delete the file. Right-click any folder and you?ll see the CommandPrompt Here option.

31. Adjusting System Restore values

The new System Restore feature in Windows XP automatically backs up a snapshot of your system, including your Registry, every 24 hours. It also saves restore points for 90 days. Neither of these values is directly editable in the System Restore program, but you can change them in the Registry. Go to:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore

You?ll find an assortment of settings here. To change the interval between automatically created restore points, change the RPGlobalInterval setting. To change the number of days that a restore point is retained, change the RPLifeInterval setting.

System Restore time intervals are measured in seconds, not days, so you must convert the number of days you want into seconds. There are 86,400 seconds in a day, so multiply 86,400 by the number of days you want to determine the value. (There are 3,600 seconds in an hour, I hope you know)

32. Erase the swap file at shutdown

You might be concerned about someone browsing your users? swap files and gathering up little bits of their sensitive data. A remote possibility, to be sure, but it could happen. For that extra measure of security, go to:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Memory Management

Set the ClearPageFileAtShutdown DWORD to 1. This will make shutdowns take longer, because it overwrites everything in the swap file with zeroes. Don?t turn this feature on unless you have a serious security threat.

33. Delete the Files Stored on This Computer category in the My Computer window

In Windows XP, the My Computer window?s listing is broken down by categories: Hard Disk Drives, Devices with Removable Storage, and so on. One of these categories is Files Stored on This Computer, which appears at the top of the My Computer window. If a user doesn?t need it , you can get rid of it. To do so, go to:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\
NameSpace\Delegate Folders

Delete the {59031a47-3f72-44a7-89c55595fe6b30ee} subkey to remove the category.

34. Change the desktop cleanup frequency

Through Display Properties (Desktop tab, Customize Desktop button, General tab), you can turn on and off a feature that runs the Desktop Cleanup Wizard every 60 days. You don?t have an option to set a different interval there, but you can change the interval in the Registry. To do so, go to:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Desktop\CleanupWiz

Change the Days Between Clean Up Value to some other number of days (in decimal format).

35. Sort menus alphabetically

When you install a new program for a user, it doesn?t find its place in the alphabetical Start menu hierarchy right away; it hangs out at the bottom for a little while. If your users employ the Classic Start menu, they can re-alphabetize it manually by right-clicking the taskbar and choosing Properties, clicking the Customize button next to the Classic Start Menu, and clicking the Sort button. With the Windows XP style of Start menu, however, you don?t have an equivalent button. To make Windows always alphabetize the list, remove the permissions from the Registry key that controls the sort order for the Start menu. To do so, go to:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder

Choose Edit | Permissions and click the Advanced button. Deselect the Inherit From Parent The Permission Entries That Apply To Child Objects check box and then click Copy when the Security dialog box pops up. Click OK and clear the Full Control entry for your account and all security groups you are a member of. Leave only Read permission.

36. Prevent programs from loading at startup

Remember back in the good old days of Windows 3.1 when you could open up the Win.ini file in a text editor and remove an item from the RUN= line to disable it from running at startup? With Windows 9x and above, the Win.ini file became less useful because 32-bit programs were set to run at startup from within the Registry instead.

One way to selectively disable programs from loading at startup is to use MSCONFIG (from the Run command) to deselect certain items. Another way to remove them is to edit the Registry directly. Consider the following locations:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

for applications that start up for all users

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

for applications that start up when the current user logs on

Remove the entry for a program by right-clicking it and selecting Delete to prevent it from loading.

37. Change categories in the Control Panel

Windows XP?s Control Panel is broken down by category in the default Category view, but the group to which an item belongs is not always obvious. If you disagree with Microsoft?s assignments, you can switch them around. To assign a different category to an item, go to:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Control Panel\Extended Properties\
{305CA226-D286-468e-B848-2B2E8E697B74} 2

Find the item you want to change and double-click it to bring up a dialog box. Change the item?s DWORD value to your preference. Use the Table given below as a guide (shown with decimal numbers, which is the way you should enter them).

DWORD value to set

Other Control Panel Options 0

Appearance and Themes 1

Printers and Other Hardware 2

Network and Internet Connections 3

Sounds, Speed, and Audio Devices 4

Performance and Maintenance 5

Date, Time, Language, and Regional Options 6

Accessibility Options 7

Add or Remove Programs 8

User Accounts 9

38. Grouping multiple open windows

Windows XP will group multiple open windows (IE windows for example) into one group on the task bar to keep the taskbar clear. This can be annoying at times - especially when comparing different web pages because you have to go back to the task bar, click on the group and then click on the page you want and then you only get one page because you have to click on each one separately. I think the default for this is 8 windows - any combination of apps or utilities open.

You can modify this behavior by adding this registry key at:

HKEY_CURRRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\

add a Dword value of type REG_DWORD named [TaskbarGroupSize]

modify "TaskbarGroupSize" entry to be the number of windows you want open before XP starts to group them on the task bar.

A value of 2 will cause the Taskbar buttons to always group

Another tweak is to disable or enable recent documents history. This can be done at:

HKEY_CURRRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\

this key should already be present - if it isn't you'll need to add it:

Add a Binary value of type REG_BINARY named [NoRecentDocsHistory]

modify it so that value reads 01 00 00 00

39. Disable Tips

To disable Ballon tips in Windows XP do this registry tweak

Go to : HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced

Create a new DWORD value, name it EnableBalloonTips, and set it equal to 0. If EnableBalloonTips is already there and equal to 1, set it equal to 0. Quit the registry editor, log off, and log back on. Voila! Your computer will stop talking down to you.

40. Add/Remove optional features of Windows XP

To dramatically expand the list of applications you can remove from Windows XP after installation, navigate to C:\WINDOWS\inf and open the sysoc.inf file. {Opps , if you didn?t find the inf directory, you are right. It?s a hidden folder, so go to Tools>Folder Options> View , enable Show Hidden Files & Folders.}

[Version]

Signature = "$Windows NT$"

DriverVer=07/01/2001,5.1.2600.0

[Components]

NtComponents=ntoc.dll,NtOcSetupProc,,4

WBEM=ocgen.dll,OcEntry,wbemoc.inf,hide,7

Display=desk.cpl,DisplayOcSetupProc,,7

Fax=fxsocm.dll,FaxOcmSetupProc,fxsocm.inf,,7

NetOC=netoc.dll,NetOcSetupProc,netoc.inf,,7

iis=iis.dll,OcEntry,iis.inf,,7

com=comsetup.dll,OcEntry,comnt5.inf,hide,7

dtc=msdtcstp.dll,OcEntry,dtcnt5.inf,hide,7

IndexSrv_System = setupqry.dll,IndexSrv,setupqry.inf,,7

TerminalServer=TsOc.dll, HydraOc, TsOc.inf,hide,2

msmq=msmqocm.dll,MsmqOcm,msmqocm.inf,,6

ims=imsinsnt.dll,OcEntry,ims.inf,,7

fp_extensions=fp40ext.dll,FrontPage4Extensions,fp40ext.inf,,7

AutoUpdate=ocgen.dll,OcEntry,au.inf,hide,7

msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7

RootAutoUpdate=ocgen.dll,OcEntry,rootau.inf,,7

IEAccess=ocgen.dll,OcEntry,ieaccess.inf,,7



Games=ocgen.dll,OcEntry,games.inf,,7

AccessUtil=ocgen.dll,OcEntry,accessor.inf,,7

CommApps=ocgen.dll,OcEntry,communic.inf,HIDE,7

MultiM=ocgen.dll,OcEntry,multimed.inf,HIDE,7

AccessOpt=ocgen.dll,OcEntry,optional.inf,HIDE,7

Pinball=ocgen.dll,OcEntry,pinball.inf,HIDE,7

MSWordPad=ocgen.dll,OcEntry,wordpad.inf,HIDE,7

ZoneGames=zoneoc.dll,ZoneSetupProc,igames.inf,,7

[Global]

WindowTitle=%WindowTitle%

WindowTitle.StandAlone="*"

The entries that include the text hide or HIDE will not show up in Add/Remove Windows Components by default. To fix this, do a global search and replace for ,hide and change each instance of this to , (a comma). Then, save the file, re launch Add/Remove Windows Components,

41. Remove Windows Messenger

It seems that a lot of people are interested in removing Windows Messenger for some reason, though I strongly recommend against this: In Windows XP, Windows Messenger will be the hub of your connection to the .NET world, and now that this feature is part of Windows, I think we're going to see a lot of .NET Passport-enabled Web sites appearing as well. But if you can't stand the little app, there are a couple of ways to get rid of it, and ensure that it doesn't pop up every time you boot into XP. The best way simply utilizes the previous tip:

If you'd like Windows Messenger to show up in the list of programs you can add and remove from Windows, navigate to C:\WINDOWS\inf and open sysoc.inf (see the previous tip for more information about this file). You'll see a line that reads:

msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7

Change this to the following and Windows Messenger will appear in Add or Remove Programs, then Add/Remove Windows Components, then , and you can remove it for good:

msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,7

42. Rename multiple files ( it is not a Registry tweak though. I thought this to be really cool, so I have put it here)

A new, small, neat feature for Windows XP deals with renaming files. I personally have always wanted the OS to include a way to do a mass file renaming on a bunch of files. You can now rename multiple files at once .Its really simple:

Select several files in Explorer, press F2 and rename one of those files to something else. All the selected files get renamed to the new file name (plus a number added to the end). Simple J




I hope you enjoyed the above Registry tricks ! May be next time I?ll come up with more. That's all for now .
To know more tricks + topics on Hacking, Security, Programming.

January 24, 2011

Have your own websites @ cheaper rates


Mystic Information Services

We develop websites , software and projects with international standards at cheaper rates.

http://www.facebook.com/MysticInformationServices

http://www.mysticinfoservices.com/

Contact- +91-7838325132 or mysticinformationservices@gmail.com

January 19, 2011

How to Get someones ISP password.

How to Get someones ISP password.



1.) run your telnet program:
on windows , go to START -> RUN -> "TELNET".
on linux , you should open a shell , and write telnet.
2.) then connect (on windows "connect" , on linux "open") some anonymous server , if don't have any then search for one , if you are too lame then email me now! i'll give you in the minute! note: you should connect the server mail program (port "25")!
3.) now , write the following :

mail from:[**YOUR FRIEND'S ISP WEBMASTER**]
rcpt to:[**YOUR FRIEND'S EMAIL ADRESS**]
data
Hi there [YOUR FRIEND'S NAME] , this is [NAME OF YOUR FRIEND'S ISP] support team , lately , our server had some problems with the connection and the user-password files were destroyed , a backup was then released , and it was ok.
but yesterday we found out that it is not an updated version of the file , so , it will start charging you for a larger amount of money for each our you use!
- - - - - - - - - - - - - -
To correct the problem , we have made a speical program to correct the error , all YOU have to do is email :
"[**YOUR'S FRIEND'S ISP NAME**]@GalaxyCorp.Com" and in the SUBJECT write your "user name" and "password".

note: No moeny will be returned if you don't follow our instructions!

thank you,
the support team!

4.) press enter twice and then write "."(without the "") and press ENTER!

--
now , the places you saw ** say that maybe you didn't understood it all , so i'll give you a simple example .

[**YOUR FRIEND'S ISP WEBMASTER**] - example , if your friend is connected througe AOL , then type "webmaster@aol.com" , get it?

[**YOUR FRIEND'S EMAIL ADRESS**] - example , if your friend's email is john@aol.com, then type "john@aol.com".

[YOUR FRIEND'S NAME] - if your friend is called "John" then type "John".

[NAME OF YOUR FRIEND'S ISP] - if your friend is connected through AOL(American Online) , then type "American - Online"

"[**YOUR'S FRIEND'S ISP NAME**]@GalaxyCorp.Com" - this is the hard-part , but if you are reading this , then don't worry , you're one step from the end! ..

* launch your WWW browser(MICROSOFT INTERNET EXPLORER\NETSCAPE) , and type "HTTP://www.galaxycorp.com".

* Sign there for an account , now , when they ask you what username you want, then try the closest thing to your ISP name(ex - if your friend is connected thourgh American Online[AOL] then try "aol" or "a_o_l" or "american_online" !)

* and when they ask for your email , type your Real one!!!
now continue in your normal life , and remember to read your email!
if you suddenly get a message from your friend's email adress , and the subject is "john j4o87HnzG" then , guess what , you just saved 10$ a month!

WINDOWS XP HIDDEN APPS

WINDOWS XP HIDDEN APPS

To run any of these apps go to Start > Run and type the executable name (ie charmap).

WINDOWS XP HIDDEN APPS:
=========================================

1) Character Map = charmap.exe (very useful for finding unusual characters)

2) Disk Cleanup = cleanmgr.exe

3) Clipboard Viewer = clipbrd.exe (views contents of Windows clipboard)

4) Dr Watson = drwtsn32.exe (Troubleshooting tool)

5) DirectX diagnosis = dxdiag.exe (Diagnose & test DirectX, video & sound cards)

6) Private character editor = eudcedit.exe (allows creation or modification of characters)

7) IExpress Wizard = iexpress.exe (Create self-extracting / self-installing package)

8) Microsoft Synchronization Manager = mobsync.exe (appears to allow synchronization of files on the network for when working offline. Apparently undocumented).

9) Windows Media Player 5.1 = mplay32.exe (Retro version of Media Player, very basic).

10) ODBC Data Source Administrator = odbcad32.exe (something to do with databases)

11) Object Packager = packager.exe (to do with packaging objects for insertion in files, appears to have comprehensive help files).

12) System Monitor = perfmon.exe (very useful, highly configurable tool, tells you everything you ever wanted to know about any aspect of PC performance, for uber-geeks only )

13) Program Manager = progman.exe (Legacy Windows 3.x desktop shell).

14) Remote Access phone book = rasphone.exe (documentation is virtually non-existant).

15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the Windows Registry).

16) Network shared folder wizard = shrpubw.exe (creates shared folders on network).

17) File siganture verification tool = sigverif.exe

18) Volume Contro = sndvol32.exe (I've included this for those people that lose it from the System Notification area).

19) System Configuration Editor = sysedit.exe (modify System.ini & Win.ini just like in Win98! ).

20) Syskey = syskey.exe (Secures XP Account database - use with care, it's virtually undocumented but it appears to encrypt all passwords, I'm not sure of the full implications).

21) Microsoft Telnet Client = telnet.exe

22) Driver Verifier Manager = verifier.exe (seems to be a utility for monitoring the actions of drivers, might be useful for people having driver problems. Undocumented).

23) Windows for Workgroups Chat = winchat.exe (appears to be an old NT utility to allow chat sessions over a LAN, help files available).

24) System configuration = msconfig.exe (can use to control starup programs)

25) gpedit.msc used to manage group policies, and permissions

Remote Shut down ur pc

XP PRO has a lot of fun utilities. One of the most useful ones I have found to date is the ability to remotely reboot a PC. There are 2 ways of doing this. You will need to have admin access to the PC to preform these actions. That being said, here is the first way to do it:

Right click my computer, choose manage.
Highlight the Computer Management (Local) then click on Action, choose connect to another computer.
In the window that opens fill in the machine name of the PC you want to connect to and click ok.
Once connected right click on Computer Management (Remote machine name) and choose properties.
Go to the "Advanced" tab and click the Settings button under Start up and recovery.
Click on the Shutdown button.
Under action choose what you want to do (you can log off current user, shut down, restart, or power down. you can also choose if you want to force all applications to close, close hung apps, or wait for all apps to close by themselves).

The second way... Remember dos... that good old thing. Open up a command prompt and enter in the following:

%windir%\System32\shutdown.exe -r -m \\Machinename. The command prompt has more switches and options. I highly suggest using shutdown.exe /? to see all the posibilities.

HOW TO SET UP FTP SERVER

This is a full tutorial for creating you're very own FTP.

The first thing to do is to go to
Code:
www.no-ip.com

Register free at the page. (follow all the instructions you get there)
Look at the top, and you see the Host Search. Write the name you want, and press Go! Then download the program called No-IP on the site, or use this:
Code:
http://download.com.com/3000-2165-10055182.html?legacy=cnet
Download and install the software, then write you're registerd username and password in the requested fields. A smiley face should now appear in the program box. Press the box next to it, and I will change to a happy face. Press it again, and you have you're ip guided to you're registerd host name. You have to press the smiley every time you log on to the internet. If you are connected all the time, you whont have to do it again, but try to make sure. It will tell you if you are guided to you're host name or not.

That was the basics. Now it's time for getting this thing online.

Got to
Code:
www.bpftpserver.com
(it's a pay prog. you can crack it or buy it)
Download Bullet Proof FTP Server, and install it. Start the program, and you will see a big white screen, and some icons on the top.
Press the lightning, and it will say: (example)

31.07.02 10:41:22 - FTP Server On-line : IP(s) 192.168.1.10,80.212.4.10, on port 21

Then you press the human head (nr. 6 from the right)
Make an account for you're self, and press ok. Minimize the program, and go to the internet again. Go to
Code:
www.smartftp.com
and download the prog (I'm sure the most of you have an FTP prog from before. Write the host name you made at NoIP, and the login pass and port. (Default is port 21.) Press connect, and you are online. I did not get into all details, but you can learn more about the progs in the help section.

How To See Hidden Files, Using Dos

at command prompt just type
dir /ah
if the list is too long u can use
dir /ah/p/w

Disable Compression On Xp, NTFS partition, Disk Cleanup

On an NTFS partition, Disk Cleanup can compress old files
to save space. But calculating the savings and performing
the compression often take a long time, and on some systems,
Disk Cleanup hangs during the process. If that happens, or if
you don't care to wait, use this Registry tweak to disable the
compression: Delete the key
HKEY_ LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\ CurrentVersion\Explorer\VolumeCaches\Compress Old Files.