mandag 22. desember 2008

Locate free online books fast

JustFreeBooks search the content of more than 550 web sites, including gutenberg.org, wikibooks.org and archive.org. With JustFreeBooks you can find public domain texts, open books, free audio books, ad-supported books and more. Just type in the search box the book, author or theme you want to find.
http://www.justfreebooks.info/

fredag 19. desember 2008

FilePhile Transfers Any Size File Between Any Two Systems


Windows/Mac/Linux (All platforms): FilePhile is a peer-to-peer, multi-platform app for getting files of unlimited size between yourself and anyone else willing to give it a try.

After registering at FilePhile's site with an email address and password, you grab and install a copy of the Java-based app, launch it, and add email addresses to your buddy list. Sending a file is a simple right-click on someone's name, but you can limit the bandwidth eaten up by FilePhile in its preferences. The transfers themselves are encrypted, and, as the site boasts, can be any size. That's about it, but that's probably all you need.

FilePhile is a free download for Windows, Mac, and Linux systems. It requires a Java platform version 1.5 or later to run.

tirsdag 9. desember 2008

Firefox 3.1 Beta 2 Now Available


All platforms: Hot off the press, the second beta of Firefox 3.1 is now available for download. In addition to Private Browsing Mode, tab tearing, and the speedy TraceMonkey Javascript engine turned on by default, the release notes list what else you get:
  • This beta is now available in 54 languages.
  • Added functions to make it easy to clear recent history by time as well as remove all traces of a website.
  • New support for web worker threads.
  • Improvements to the Gecko layout engine, including speculative parsing for faster content rendering.
  • Removed the new tab-switching behavior based on feedback from users
  • Support for new web technologies such as the

Firefox 3.1 Beta 2

mandag 8. desember 2008

RetroShare: F2F- secure communications with friends


RetroShare is a Open Source cross-platform, private and secure decentralised commmunication platform. It lets you share securely your friends, using a web-of-trust to authenticate peers and OpenSSL to encrypt all communication. RetroShare provides filesharing, chat, messages and channels

Why use RetroShare:

    - You want to chat and share files securely with your friends
  • Only your friends will be able to see and download files that you share.
  • RetroShare is serverless, which means - unlike other messengers, you don't* need to register, complete annoying registration forms and receive tons of ads. Sending a key to your friend by e-mail is enough to set up your own IM network. This also means no IM spam, because people you didn't invite absolutely cannot connect.
  • You can also use your favorite nick name either: no need to use cryptic names like "john.smith148@something.com" just because someone (whom you don't even know) snapped your favorite nick before you.
  • RetroShare is encrypted, meaning high privacy: nobody, including your
    ISP, can see what files you're sharing.

    - You need secure instant messaging and files exchange for a small workgroup. You need to chat securely and exchange files with other colleagues at work, but do not trust your data to a public chat network like Live or Google Chat ? Don't want a hassle of installing and maintaining your own chat server either ? Use RetroShare instead:
  • RetroShare is serverless , which means that no server, ever, gets to see your data. Any IM server, no matter how secure, poses a risk of data leak because of hacker's attack. Retroshare completely eliminates this security risk associated with the IM server, without any added costs.
  • RetroShare encrypts all connections, which means every bit of data is encrypted end-to-end. Unlike other products using self-made weak encryption, RetroShare uses a special version of industry standard Openssl library, trusted by banks and other organizations.
  • Absolutely no vendor lock-in: you own your RetroShare network. There is no 3rd party vendor whom you have to pay, or who may go out of business and force you to migrate to another product.

Features

  • Serverless, encrypted Chat & Filetransfer
  • Multiple simultaneous downloads / uploads
  • Search Friends
  • Instant Chat Messaging

In-depth details:

  • Graphical User Interface written with Qt4 toolkit
  • UPnP / NAT-PMP port forwarding support
  • OpenSSL Encryption
  • DHT support
  • Styles support
  • stylesheet support
  • System tray integration
Download Latest RetroShare

fredag 5. desember 2008

Facebook infected with Koobface virus

Attention new viewers: those 5000 “friends” you have on Facebook? They might not actually be your friends. In fact, some of them might be scammers trying to infect your computer with a new virus dubbed “Koobface”. Koobface, which already made the rounds on MySpace, is now worming its way through Facebook. The Koobface virus uses Facebook’s private messaging system to infect computers via a shared video. Unsuspecting users will see a video link (shared by an infected friend) with the message, “You look just awesome in this new movie.” Click the link will lead you to an outside site where you’re told that you need to download a Flash update, which is actually a virus file. Once the virus is installed, it will try to grab sensitive data off your PC, like credit card numbers.

In a way this a very old virus; it operates much like mass-mailing worms that used to infest Usenet and e-mail lists. But it’s proving an effective tactic on social networks where private messages from friends seem more trustworthy than traditional e-mail, which even the most neophyte web users have come to distrust. With its some 120 million users, Facebook is not only a potentially lucrative target, but it’s well into the mainstream, which means more gullible, less internet-savvy users for virus creators to prey on. The virus watchdog blog for McAfee labs reports that Facebook is aware of the Koobface attack and is already working to remove the spammed links from its system. But with dozens of Koobface variants known to exist, McAfee warns that “the situation is likely to get worse before it gets better.” Should your PC be infected the Koobface worm, the Facebook security blog suggests resetting your password and running updated anti-virus software to purge the worm from your system.

Opera 10 Alpha 1 now available


Opera has long been the pioneer of the browser world; many of the features that we take for granted in Firefox, IE and Safari actually began life in Opera. The browser also tends to have the best web standards support around, and the latest alpha preview of Opera 10 is no exception. Although the new Opera 10 is an alpha preview, and not recommended for anything more than testing, its noteworthy for being the first release to grab a perfect score on the ACID 3 browser stress test. The ACID tests are designed to push a browser’s limits when it comes to rendering web pages. The idea is that if browsers can render the ACID test pages, then they should be able to handle just about anything on the web.

Although the ACID 3 test has been around for some time, Opera 10 is the first release to pass it. Apple’s Safari browser, which was the first to pass the ACID 2 test, also passes ACID 3, but only using the developer nightly builds. Of course cutting edge web standards support isn’t the only thing coming in Opera 10. The first alpha also packs in revamped and much faster rendering engine, on-the-fly spell checking for text fields, support for HTML messages in Opera Mail, and an auto-update feature to force browser updates. We don’t recommend rushing out and downloading Opera 10 in its current alpha state, but the preview release is good news for Opera fans. So far Opera has not announced a time line for the final release of Opera 10.

tirsdag 2. desember 2008

Gmail Google Desktop Gadget Now Available


Windows only (running Google Desktop): If you want access to your Gmail on your desktop (literally) without running a full-blown email client, now you can download the Gmail Google Desktop gadget. You'll need the free Google Desktop software installed first, and then you can dock your Gmail gadget to the desktop to read, search, send, and star messages. The Gmail gadget offers the same keyboard shortcuts that web-based Gmail offers, too. You can even open multiple instances of the gadget and log each into a different Gmail account. The only complaint about the gadget? It doesn't play a sound when new mail arrives. (Though you may thank Google for that one.) The Gmail gadget is a free download and works in conjunction with Google Desktop 5 for Windows only.

NexusFile Helps You Speed Through File Management Tasks


Windows only: NexusFile is a feature-rich portable Windows Explorer alternative. Weighing in at just under 3MB, NexusFile easily replaces a host of other applications. There is a basic file renamer, an ftp client, and a file splitter/joiner. You can export saved file lists in a variety of formats, assign favorite folders, browser folders in tabs and in a dual pane view, and compare folders. NexusFile has keyboard shortcuts for every imaginable need from jumping to the root folder to executing command line instructions and everything in between. If you have a disdain for your mouse, you won't be reminded of it while working in NexusFile. If you're on friendly terms with your mouse you aren't forgotten, the GUI of NexusFile is very well laid out. Have a set of working folders your access frequently? Assign them while you work to the vertical bar of numbers in between the dual panes. They'll be right at your fingertips from then on. The rest of the interface follows with a similar degree of thoughtfulness. If you need Unicode support for your daily file management, you're covered with NexusFile. If the extremely high contrast color scheme is too much for you, there is a detailed color scheme designer under Tools -> Options -> Color.

Kill off unnecessary shortcuts and re-organize your Start Menu

lørdag 22. november 2008

UPNP Port Mapper


About the Program
Most, if not all, Home Routers theses days have UPNP, and most have it enabled by default.
This simple yet effective tool gives you the ability to control the UPNP functions of your router.
Some Routers only support port forwarding if using static IP's... So, if you want to use DHCP, and still forward ports,
this program would be your solution!.

Note: The old linksys routers are completely worthless when it comes to UPNP,
such as the BEFSR41, BEFW11S4, and others that had their last firmware update about 4 years ago.
though their firmware update log shows they fixed UPNP issues,
I know my BEFSR41 v2 and BEFW11S4 v4 do not respond to valid UPNP requests.
There may be other routers out there which also have broken UPNP support.

If you find a bug, or incompatible router, please email me with details!

- Does NOT rely on Windows XP UPNP services.
- Program directly implements the UPNP protocol with direct sockets.
- Complies with UPNP documented protocol specifications.
- Excellent tool for viewing forwarded ports on your router, that would otherwise be invisible to you.
- A Single EXE file, nothing to install, and simple to use.
- A fast, easy, and universal way to forward ports in your home router.

[DOWNLOAD]

Transporter P2P 6.0

This is a complete program re-write, all code has been re-written with careful attention to detail, and optimization. Even the socket protocol is being overhauled...
The interface will remain the same (aside from a few menus and options differing) Some new features are;
Offline messages queue, Offline file queue (yep! you can send files, folders, and messages to offline contacts, and they will queue-up for when the contact comes back online!) Adjustable file/folder send queue (which limits the maximum number of files/folders which will be allowed to transfer simultaneously) Automatic transfer retries (retries failed transfers automatically, and picks transfers back up automatically when a peer comes back online)

About the Program
-Transporter P2P is a Non-Server Based file sharing, and messenger program, designed for use over local area networks, and the internet.
-Messages can be sent to one or more contacts at the same time, with full font support.
-Folders and Files can be transferred, with Automatic Acceptance options, as well as Automatic Folder and File Resuming, to resume a previously incomplete transfer.
-Extremely large file support; supports file and folder sizes up to 16 exabytes
-Sharing Folders and Drives with contacts is easy, and each contact can have their own list of shared folders; Global shares can also be created, which all contacts can access.
-You can view who is browsing your shared folders, and even kick users while they are browsing your files.
-Viewing a contacts shared files is easy; there is full browsing and search support, with wildcards, and subfolder searching.
-All socket data is encrypted with a proprietary stream cipher encryption, a key for the encryption is definable in the options menu,
(details about the encryption is still pending release, once the whitepaper is completed, it will be publicly released.)
-Folder transfers start sending folder data immediately, and counts the size of the folder while its transferring the contents of the folder, this tremendously increases the speed of large folder transfers;
(Unlike windows native file sharing, which must count each file in the folder before beginning the send process.)


[DOWNLOAD]

German Secret Intelligence Service

The secret IP addresses from the German Secret Intelligence Service are leaked, This organization is allowed to hack any computer, without any permission of others. So maybe interesting for your firewall :-p

DNS INFORMATION (as responding):

Host www2-1.bvoe.de (195.243.248.226)
Host www2-2.bvoe.de (195.243.248.228)
Host www1-1.bvoe.de (62.156.187.234)
Host www1-2.bvoe.de (62.156.187.236)
Host mail.prosozial.de (62.159.60.150)

GTA Setting Manager

Version 0.1.4.0
Date 11/16/2008
Status Work In Progress
Install Type MSI Installer
Language Visual Basic .NET
Requirements .NET Framework 2.0

Features

Supports GTA III, Vice City, and San Andreas.
Save unlimited number of handling settings for each vehicle.

Edit settings for multiple vehicles.

Launch GTA directly from the editor.

Startup Manager to launch other apps before launching GTA.

The main list of vehicles can be sorted on all setting values.



DOWNLOAD

GTA Setting Manager can edit the vehicle handling settings for the Grand Theft Auto PC series (III, Vice City, & San Andreas). Users can save unlimited setting configurations for individual vehicles, modify multiple vehicles at once with batch editing, and start the game from the editor. There is also a startup manager which allows other programs (such as other GTA tools) to be started automatically when launching the game directly from the editor. All data is manipulated in memory so changes are not real-time. A backup of 'handling.cfg' is automatically created if it doesn't already exist, and all default vehicle settings are saved initially for convenient future referencing.

Apple releases iPhone firmware update 2.2

Apple launched a preemptive strike of sorts in the battle of the smart phones releasing the iPhone 2.2 softwaree-mail from POP and Exchange accounts; faster installation of third party applications; and a fix for bugs that caused hangs and crashes with a number of third party applications. upgrade at midnight, just hours ahead of the highly anticipated release of the Blackberry Storm. The move caught Apple fans by surprise, as the update appeared set for Friday. Users can access features using iTunes 8 and connecting the iPhone to a computer for download. The iPhone improvements include a decrease in call set-up failures and dropped calls; significantly better battery life for most users; reduced time to backup to iTunes; better e-mail reliability, especially in accessing

Safari has also been upgraded on the iPhone and now has a new search-friendly user interface, better performance and more stability. The iPhone update also means that users now have access to millions of free podcasts on the iTunes Store via Wi-Fi or a cell network. The Maps feature has also been revamped, with Google Street View, which lets users take a virtual walking tour by navigating through street level-pictures of areas that have been located through Maps.

lørdag 15. november 2008

How to Remove Windows XP's Messenger

Theoretically, you can get rid of it (as well as a few other things). Windows 2000 power users should already be familiar with this tweak.

Fire up the Windows Explorer and navigate your way to the %SYSTEMROOT% \ INF folder. What the heck is that thingy with the percentage signs? It's a variable. For most people, %SYSTEMROOT% is C:\Windows. For others, it may be E:\WinXP. Get it? Okay, on with the hack! In the INF folder, open sysoc.inf (but not before making a BACKUP copy first). Before your eyes glaze over, look for the line containing "msmsgs" in it. Near the end of that particular line, you'll notice that the word "hide" is not so hidden. Go ahead and delete "hide" (so that the flanking commas are left sitting next to one another). Save the file and close it. Now, open the Add and Remove Programs applet in the Control Panel. Click the Add / Remove Windows Components icon. You should see "Windows Messenger" in that list. Remove the checkmark from its box, and you should be set. NOTE: there are other hidden system components in that sysoc.inf file, too. Remove "hide" and the subsequent programs at your own risk.

Top 10 Tweaks, Tips, and Tricks for Windows Vista

  1. If you’re annoyed by Internet Explorer’s incessant barking that you’ve lowered your security settings (like, if you’re a non-paranoid expert), launch “gpedit.msc” from either the Run command or Start Search field, navigate through Local Computer Policy / Computer Configuration / Administrative Templates / Windows Components / Internet Explorer. In the rightmost pane, double-click “Turn off the Security Settings Check feature” and set it to Enabled.
  2. If Internet Explorer’s Information Bar also annoys you, you can turn it off (again) in the Group Policy Object Editor (gpedit.msc) through Local Computer Policy / Computer Configuration / Administrative Templates / Windows Components / Internet Explorer / Security Features. In the rightmost pane, double-click “Internet Explorer Processes” and set it to Disabled. Hallelujah!
  3. I’ve just mentioned two tweaks that are buried inside the Group Policy Editor. Jim Allchin pointed out that there’s a Group Policy Settings Reference spreadsheet available. Makes for great weekend reading.
  4. Read the Background on Backgrounds if you’re a performance junkie. Don’t set your wallpaper through Internet Explorer ever again! Now that Windows supports JPG wallpapers, there’s absolutely no need (or excuse) for using BMPs anymore.
  5. If you insist on keeping UAC (User Account Control) turned on for yourself, you might care to make the elevation prompts a bit less visually jarring. Brandon told me about this one, even though I have UAC turned off. Launch the Local Security Policy manager (secpol.msc), and navigate through Security Settings / Local Policies / Security Options. In the rightmost pane, scroll to the bottom and double-click “User Account Control: Switch to the secure desktop when prompting for elevation.” Disable it, and you can keep UAC turned on without getting turned off by the embarrassingly craptacular Aero Basic theme.
  6. Vista can send you emails! The Computer Management tool can still be accessed by right-clicking “Computer” and selecting “Manage” from the menu. However, now you can attach a task to any event. Try navigating through System Tools / Event Viewer / Windows Logs / Application. Now, go ahead and select an event - then look to the rightmost pane and click “Attach Task to This Event.” Name it whatever, describe it however, click through the next step, then in the Action step, you’ll see the “Send an e-mail” option.
  7. The Windows Task Manager gives you a lot more troubleshooting information in Vista. Flip to the Processes tab, and in the View menu, click “Select Columns” and add Description, Command Line, and Image Path Name. Moreover, when you right-click a process, you can select either “Go to Service(s)” or “Open File Location.” These are all long overdue options.
  8. This one’s interesting. Open up the Date and Time Control Panel applet. Flip to the “Additional Clocks” tab. There, you can configure two more clocks from different time zones. They’ll appear in the tooltip when you hover over the Taskbar clock. No additional software (or silly sidebar widgets) necessary.
  9. Applicable in other versions of Windows, I’m going to throw it in here for good measure. Create a shortcut to RegSvr32.exe in your SendTo folder. To get there quickly, enter “shell:sendto” in the Run command dialog or Start Search field. Now, when you wanna register a DLL or OCX file with the system, you can select it/them and “Send To” the RegSvr32 shortcut.
  10. I figured I’d round out my first set of Windows Vista tips and tricks with a tiny bit of eye candy. It doesn’t beat Picasa, but the Windows Photo Gallery is better than nothing. Once it’s indexed all your photos, click the icon next to the Search field and turn on the “Table of Contents.” That’s kinda nifty.

How To Zip And Encrypt Your Documents For Free

Do you remember how long ago you have heard about Zip for the first time? I think it was even before Windows was invented. Internet was an unknown word yet at that time. Computers were DOS operated and the instructions for compressing and decompressing documents seemed like magic words to me. What I didn’t know by then, but I’ve just found out tonight is that the .zip standard was invented by PKWARE. This explains why those commands were starting with pkzip and pkunzip. For those of you who are interested, PKWARE is giving away a non-commercial use license of a much more modern version of zip, the SecureZIP Express. Not only it is free of charge, but you have the chance to win cool prizes in the new “Decrypt and Drive” contest.
SecureZIP Express has several useful features. The basic ones are compressing/decompressing and encryption of files that you store or send. Compressing files is a great way to save storage space, especially on memory sticks and CDs; besides, there are situations in which we want our files to be secured, as they are not meant to be seen by anybody. The software also includes a digital certificate so you can exchange files securely with others without using passwords. Only the person the file was encrypted for can open it when you use a digital certificate. SecureZIP Express has no toolbars or spyware. For years, PKWARE has given free .zip software away. Now, together with the software, they are giving away a lot of prizes including a Honda scooter, bicycles, Wii games, gas cards, and more.

For entering the contest, you need to visit www.DecryptandDrive.com, download the free software, then come back to play the game. You need to have SecureZIP, and the digital certificate it installs, on the computer you play the game from. SecureZIP Express is also available for download at www.securezip.com. Good luck and let me know if you win something.

Simonne

tirsdag 4. november 2008

How to remove file protection from iTunes songs

How to remove file protection from iTunes songs
by Dman
Okay there are lots of ways to remove file protection using programs and what not, but what if you do not feel like downloading anything, or just don't have the priveldges on the computer to do so? What are you to do with all of those files that you can't play on any other computer that you paid for. What in the world are you supposed to do?

Basically it is the same meathodas using your iPod as a storage device, here is a quick tutorial on that.
1. Have your iPod disconnected.
2. Make a file with whatever program file you want to put on your iPod.
3. Now it is time for speed because approximately 10 seconds after you conenct your iPod it dissapears from the "my computer" section if it is innactive (if you are placing songs onto it, you can see it once again). So have my computer opened and the directory of whatever file you want to place on it. Connect your iPod and instantly place whatever file you want to be placed on it straight onto it (it will be a drive f:\).
4. And voila, you have now placed a file onto you iPod, now go to your other computer, and use the same technique, open up My computer, connect your iPod, and now drag the file outa there onto your new computer.

Ok, now that we understand how to use the iPod as a storage device we will get into how to use this feature to our andvantage to get rid of the file protection. I still do not understand how or why the shit works, but it does. Basically the main reason I even found out about this was because those sons-of-a-bitches at Macantosh made it so that if you place songs on your iPod through the iTunes software that you cannot transferr them to your other computers, this feature is useful for protecting songs from bieng brought to another computer illegally but as a saying goes "locks are for honest people because they will try the door and leave. But for unhonest people who we made the locks to keep them out, they can get past them". But the occasion comes where this is not the case and that is the reason for which I wrote this tutorial. Also because of what was written above, it is basically about 3 steps to take the file protection off.
1. Make a new folder on your desktop with whatever songs you want to take the file protection off of.
2. Open up my computer.
3. Connect your iPod and place the folder with all of your songs onto your iPod (make sure you will have enough space on your iPod to do so).
4. Disconnect your iPod and bring it to your other computer.
5. Open up My computer on your other computer.
6. Connect your iPod to the other computer and place the file onto the computer.
7. Voila for some odd fucking reason the file is unprotected!

Now, I have only done this once, and only with a computer that did not have iTunes installed on it. I have not tried this to place the files on and then back onto your computer to take the protection off because it might not work, but I do now that you can just place the files onto another computer, delete the file off of your iPod, and then place the unprotected one back onto your desktop and vuala. I do not guarantee any results if the other computer has iTunes. And I would also appreciate if people could post their success and unsuccessful attempts at this and to post what version of the iPod they used, what version of iTunes, and if the other computer had iTunes installed or did not or had it installed in the past but then deleted.

søndag 2. november 2008

Investigating IP's

http://centralops.net/co/
http://www.all-nettools.com/toolbox
http://www.completewhois.com/
http://www.samspade.org/
http://www.dnsstuff.com/
http://www.demon.net/external/

Domain name investigation:

Whois.sc is now:

www.domaintools.com
http://whois.domaintools.com/
http://whois.webhosting.info/

RWHOIS:

http://www.rwhois.net/rwhois/prwhois.html

Spam database / cross reference lookup :

http://openrbl.org/
http://ipindex.homelinux.net/index.p...check_on_dnsbl

IP/AS/ASN search:

http://www.fixedorbit.com/search.htm

AS trace:

http://www.fixedorbit.com/trace.htm

The general RIR lookups :

http://ws.arin.net/cgi-bin/whois.pl
http://www.ripe.net/whois
http://www.ripe.net/db/whois-free.html
http://www.apnic.net/apnic-bin/whois.pl
http://whois.samoanic.ws/whois.dhtml

Traceroute site listings:

http://www.traceroute.org/
http://www.geektools.com/traceroute.php

IP Index sites:

http://ipindex.homelinux.net/
http://www.flumps.org/ip/index.html

Site Host monitoring:

http://searchdns.netcraft.com/?host
http://uptime.netcraft.com/up/graph
http://www.hostcount.com/

IP/netstat monitor:

http://www.sysinternals.com/Utilities/TcpView.html

Freeware Packet Sniffers to help identify the source of any suspect packets/connections leaving your computer:

Smartsniff [ no install required ] :

http://www.nirsoft.net/utils/smsniff.html

What is transferring:

http://www.wfshome.com/wit.htm

Packetmon:

http://www.analogx.com/contents/down...twork/pmon.htm


How to remove MSN's "My Sharing Folder"

To remove the My Sharing Folder the command needed is :

regsvr32 -u "C:\Program Files\Windows Live\Messenger\fsshext.8.5.1302.1018.dll"

lørdag 1. november 2008

Phishing Warning!

Please try to refrain from using download links that are protected or using any kind of link shortening service such as:

http://link-protector.com/857667/
http://tinyurl.com/dhfews and etc

I saw many of these links and they were phishing sites. Basicially when you add your details it will automatically be sent to the person who made it.

When downloading or using your user name make sure it’s on the correct site, for example Rapidshare.com could be easily mistaken for Rapidshare.fr.com (which could be a phishing site). When ever you are typing any important details please make sure you type it in the correct site.

When you type in a password for important sites such as Rapidshare, PayPal, Ebay, Internet Banking and etc you will see a lock symbol near where the loading bar is.

This means that the site is encrypted, so it makes sure unauthorized people won’t see any details. Make sure when you type in passwords in places like Rapidshare or PayPal you see that lock, if not then don’t sign in.

Change your password very often. Make them long and not guessable, click Here for a password generator!

If you have any doubts that you have typed in your passwords in sites like these you should change your password immediately.

Please note that i am not saying all these links are phishing sites. To be on the safe side i recommend you not use them as there should be links without these protectors.

Solutions

  • Change password regualy
  • If you know you used the “Save Password” option on the browser, don’t retype you password on download pages, instead go to the official homepage and type it there.
  • Use download managers that grab the links and download them automatically, for example IDM, type in your username and password once in the options and it will download links without you typing passwords again.
  • Adding more soon…

fredag 31. oktober 2008

Screamer Radio


There is little reason to listen to commercial FM radio anymore, it is an old medium that provides little choice of music and is saturated with ads. For the last couple of years there has been an alternative, streaming internet radio. An alternative that has been somewhat complicated to use.

Screamer Radio attempts to remedy this problem by bringing most of the required steps into a single, easy to use, freeware program.

Download

Windows XP run commands

1. Accessibility Controls - access.cpl
2. Accessibility Wizard - accwiz
3. Add Hardware Wizard - hdwwiz.cpl
4. Add/Remove Programs - appwiz.cpl
5. Administrative Tools - control admintools
6. Automatic Updates - wuaucpl.cpl
7. Bluetooth Transfer Wizard - fsquirt
8. Calculator - calc
9. Certificate Manager - certmgr.msc
10. Character Map - charmap
11. Check Disk Utility - chkdsk
12. Clipboard Viewer - clipbrd
13. Command Prompt - cmd
14. Component Services - dcomcnfg
15. Computer Management - compmgmt.msc
16. Control Panel - control
17. Date and Time Properties - timedate.cpl
18. DDE Shares - ddeshare
19. Device Manager - devmgmt.msc
20. Direct X Troubleshooter - dxdiag
21. Disk Cleanup Utility - cleanmgr
22. Disk Defragment - dfrg.msc
23. Disk Management - diskmgmt.msc
24. Disk Partition Manager - diskpart
25. Display Properties - control desktop
26. Display Properties - desk.cpl
27. Dr. Watson System Troubleshooting Utility - drwtsn32
28. Driver Verifier Utility - verifier
29. Event Viewer - eventvwr.msc
30. Files and Settings Transfer Tool - migwiz
31. File Signature Verification Tool - sigverif
32. Findfast - findfast.cpl
33. Firefox - firefox
34. Folders Properties - control folders
35. Fonts - control fonts
36. Fonts Folder - fonts
37. Free Cell Card Game - freecell
38. Game Controllers - joy.cpl
39. Group Policy Editor (for xp professional) - gpedit.msc
40. Hearts Card Game - mshearts
41. Help and Support - helpctr
42. HyperTerminal - hypertrm
43. Iexpress Wizard - iexpress
44. Indexing Service - ciadv.msc
45. Internet Connection Wizard - icwconn1
46. Internet Explorer - iexplore
47. Internet Properties - inetcpl.cpl
48. Keyboard Properties - control keyboard
49. Local Security Settings - secpol.msc
50. Local Users and Groups - lusrmgr.msc
51. Logs You Out Of Windows - logoff
52. Malicious Software Removal Tool - mrt
53. Microsoft Chat - winchat
54. Microsoft Movie Maker - moviemk
55. Microsoft Paint - mspaint
56. Microsoft Syncronization Tool - mobsync
57. Minesweeper Game - winmine
58. Mouse Properties - control mouse
59. Mouse Properties - main.cpl
60. Netmeeting - conf
61. Network Connections - control netconnections
62. Network Connections - ncpa.cpl
63. Network Setup Wizard - netsetup.cpl
64. Notepad notepad
65. Object Packager - packager
66. ODBC Data Source Administrator - odbccp32.cpl
67. On Screen Keyboard - osk
68. Outlook Express - msimn
69. Paint - pbrush
70. Password Properties - password.cpl
71. Performance Monitor - perfmon.msc
72. Performance Monitor - perfmon
73. Phone and Modem Options - telephon.cpl
74. Phone Dialer - dialer
75. Pinball Game - pinball
76. Power Configuration - powercfg.cpl
77. Printers and Faxes - control printers
78. Printers Folder - printers
79. Regional Settings - intl.cpl
80. Registry Editor - regedit
81. Registry Editor - regedit32
82. Remote Access Phonebook - rasphone
83. Remote Desktop - mstsc
84. Removable Storage - ntmsmgr.msc
85. Removable Storage Operator Requests - ntmsoprq.msc
86. Resultant Set of Policy (for xp professional) - rsop.msc
87. Scanners and Cameras - sticpl.cpl
88. Scheduled Tasks - control schedtasks
89. Security Center - wscui.cpl
90. Services - services.msc
91. Shared Folders - fsmgmt.msc
92. Shuts Down Windows - shutdown
93. Sounds and Audio - mmsys.cpl
94. Spider Solitare Card Game - spider
95. SQL Client Configuration - cliconfg
96. System Configuration Editor - sysedit
97. System Configuration Utility - msconfig
98. System Information - msinfo32
99. System Properties - sysdm.cpl
100. Task Manager - taskmgr
101. TCP Tester - tcptest
102. Telnet Client - telnet
103. User Account Management - nusrmgr.cpl
104. Utility Manager - utilman
105. Windows Address Book - wab
106. Windows Address Book Import Utility - wabmig
107. Windows Explorer - explorer
108. Windows Firewall - firewall.cpl
109. Windows Magnifier - magnify
110. Windows Management Infrastructure - wmimgmt.msc
111. Windows Media Player - wmplayer
112. Windows Messenger - msmsgs
113. Windows System Security Tool - syskey
114. Windows Update Launches - wupdmgr
115. Windows Version - winver
116. Windows XP Tour Wizard - tourstart
117. Wordpad - write

mandag 27. oktober 2008

Control pc via bluetooth mobile

Control pc via bluetooth mobile + Bluetooth Remote Control 4.0

Control pc via bluetooth mobile:
Bluetooth Remote Control 4.0 is the upgraded version of Bluetooth remove control 3.0 which allows you to control your pc via bluetooth mobile .This is the only best software which we can use to control our pc via bluetooth mobile. Transform your phone with Bluetooth in a universal remote control for the PC. Now a days blutooth remote control is mostly used in business and pleasure! We can easily operate Powerpoint Presentation and we can see slides in the mobile phone. No need for extra settings. we can easily control pc via bluetooth mobile by just installing bluetooth remote control 4.0 software. That is we can romote or control pc with our mobile phone via bluetooth. We can change songs, play video songs, movies, media player, we can browse for artists, albums and we can change volume and much more…. Bluetooth Remote Control is a true universal remote control.You can add support by writing Java or VB scripts, defining key maps and file actions. It completely allows the user to modify the current behavior as well as add support for many applications.From this we can say Bluetooth Remote Control is a true universal remote control.control pc via bluetooth mobile
features :
ITunes

* Shows song name, artist & track time and UI objects
* Browse playlists, songs, artist, album and composers
* Search for songs
* Rank tracks
* Toggle shuffle
* Repeat track or library
* Play/pause, rewind, fast forward, change volume, previous/next track
* Mute

PowerPoint

* Shows next slide and slide notes
* Shows actual slides
* Play/stop presentation, previous/next slide
* Load recently used file
* Browse/Goto all/any slide
* Presentation time
* Scroll slide notes
* Vibrate when time expires

WinAMP

* Shows song name, artist & track time and UI objects
* Search for song and artists
* Play/pause, rewind, fast forward, change volume, previous/next track
* Toggle shuffle mode
* Change volume
* UI objects
* Toggle repeat mode

Windows Media Player

* Shows song name, artist & track time and UI objects
* Browse playlists and artists
* Rank tracks
* Toggle shuffle

Repeat track or library

* Play/pause, rewind, fast forward, change volume, previous/next track
* Mute

Mouse mode

* Full support for controlling the PC mouse
* See the computer desktop on the phone
* Zoom in and out of the desktop
* B&W colors for faster response time
* Enter text

File Browser

* Allows launching of files

System

* Change system volume
* Start screensaver
* Lock workstation
* Shutdown Windows
* Start screensaver

You can download trail version Bluetooth remote control 4.0 from softpedia.

Enabling Right click .

Lots of web sites have disabled the right click function of the mouse button... it's really, really annoying. This is done so that you don't steal (via right-click->save picture) their photos or images or any other goodies. Unfortunately, it disables ALL right-click functionality: copy, paste, open in new window.

It's easy to change, assuming your using IE 6:
Click "Tools"->"Internet Options"
Click the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "Ok" a couple of times.

Rapidshare Search Engines

1. RapidShare1 - Rapidshare Search Engine
2. RapidShare Searcher - Search in rapidshare.com
3. FileZ - Rapidshare Search - File Search
4. LoadingVault - RapidShare Search
5. RapidOSearch - RapidShare Search Engine
6. Rapidoogle - The RapidShare Search Engine
7. HellaFiles - Rapidshare and Megaupload Search Engine
8. RapidShare-Search-Engine - Find files on rapidshare
9. FileCrop - Find Rapidshare & Megaupload files
10. ThuVienPHP - RapidShare Search Engine from Vietnam
11. RapidZilla - Your rapidshare.com search engine
12. OplaHol - We find any file for you
13. FileSearch - Advanced Search Engine for Rapidshare Files
14. FileScoop - Makes File Searching a Snap
15. FilesBot - File Storages Search Engine
16. SearchFiles.de - The Premium File Search Engine
17. OneClickFiles - Search for files on rapidshare, megaupload, etc
18. SearchShared - Search Shared File Servers
19. FilesTube - Every search is a direct hit
20. Rapidfox - RapidShare Search Engine
21. ShareMiner - Search Files on Rapidshare, Megaupload, SendSpace, ZShare
22. ShareDigger - File Search Engine
23. Share4VN - Download Everything You Need!
24. JuSearch - File Hosting Search
25. Avun - File Hosting Search
26. FilesHunt - Rapidshare Search Engine
27. MEGAPID - Official RapidShare Search Engine
28. TotMe! - Rapidshare Search Engine
29. FileSearch - Rapidshare and megaupload file search engine
30. MegaDownload - Megaupload and Rapidshare search engine
31. RapidLibrary - RapidShare Search Engine
32. RapidAll - Rapidshare and others Web Host download Search!
33. RapidSearch.CA - RapidShare Search Engine
34. Gappon - Your Rapidshare, megaupload, mediafire search engines
35. Search4File - Free file search on RapidShare, Youtube and more
36. NewRapidHunter - The easy way to find rapidshare files
37. LoadEvery - More than Search!
38. FileField - Search for files download
39. Leecha - Get it while it’s hot
40. RapidShareIndex - Rapidshare Search Engine
41. RapidRat - RapidShare Search Engine
42. RSDown - Rapidshare links search engine
43. Search.jrfreelancer.com - File Search Engine

44. Sharech - Search for files on the best servers download
45. RapidBurner - RapidShare Search Engine
46. RapidshareDATA - RapidShare Search Engine
47. Search Rapidshare and Megaupload
48. SharingEngines - Search rapidshare megaupload torrents emule mp3 movies
49. QuickSearch - Find needed files from RapidShare Links
50. Funfail - File Search
51. InfoBind RapidSearch
52. 4Chan - RapidShares
53. MegaTao - RapidShare RssSearch
54. RapidExplorer - RapidShare Megaupload Search Engine
55. Busca-RapidShare - Buscador de Rapidshare
56. DownloadList - Download RapidShare Search Engine File
57. rsSearch - Rapidshare Search Engine
58. Rapidor - RapidShare Search Engine
59. RapidSearch.in - Rapidshare links search
60. UVRX - Internet Search
61. BioScience - Search Shared Files
62. ShowIP - RapidShare Search Engine
63. Rapidshare Meta search engine
64. Rapidwolf - RapidShare Search Engine
65. FindAnyLinks - RapidSearch and Other Hosts Download Links Finder
66. RSFilez
67. Jwagal - Rapidshare search
68. Search Rapid Share . net - RapidShare Search Engine
69. RapidSearchLinks - The easiest way to share your file around
70. Megaxo - Search RapidShare, Search MegaUpload
71. DDL Search - Rapidshare search engine
72. RapidSurfing - RapidShare Search Engine
73. Rapidsharelink - Rapidshare Search Engine
74. JamesWatt - RapidShare and Megaupload Search
75. RapidLinks - Locate Your Links Rapidly
76. FreeXFile - Your RapidShare Search Engine
77. 890m rapidshare download search
78. RapidZero - Rapidshare Search Engine
79. DiggRapidShare - Search Your RapidShare Files
80. EliteSearch - Direct Download Search Engine
81. SharingRapid - Search rapidshare megaupload and more
82. 5iles - The Best Search Engine
83. INetList.com - Your RapidShare Search Engine
84. Search-File
85. PakAdTrader - Rapid Search
86. Shared File Searcher
87. LiveThunder Files
88. ShareMinerScript - My Query Builder
89. Medianet - RapidShare Search Engine
90. RapidShareFinder
91. FNETS - Search Rapidshare Files
92. ShareYard Search
93. HuHiHo - Universal File Search
94. goinFiles
95. Yourfile.US
96. GoFileZ File Search Engine
97. RSFind - RapidShare Files Search
98. RapidSeek - Search Shared Files
99. Rapid2Share - RapidShare Search Engine
100. RapidMe - RapidShare Search Engine Software
101. RapidSeek .NET Pro 2007 - Seek links to files on RapidShare network software

onsdag 22. oktober 2008

Making Free Calls With Nokia

Making Free Calls With Nokia
by Murder Mouse

Section 1: The Introduction
Tired of wondering if you have gone over your minute limit? Tired of trying to guess how many minutes you are going to use? Tired of even paying for the shit? Then this is the tutorial for you. This is a short and simple tutorial that will teach you, the reader, how to make free calls on your Nokia cell phone. So let's proceed...

Section 2: So How Do We Do It?
This technique works on most of the nokia models out today. Meaning this will work for you as long as you don't have an old fossil sort of model. So what you will first do is turn on your phone. Then punch in the code *3001#12345#. This will bring up the NAM programming menu. From here go down and select the option NAM 1. Once you are in the NAM 1 menu, go down until you see "Emergency Numbers", and enter. You then go down until you see an empty slot and enter the empty slot. Then simply punch in the number that you want to call and exit the NAM programming menu. Now when you dial up the number, the number will be treated as an emergency call number, which will therefore put the phone into emergency call mode (which you can exit out of once you are finished with your call). No number in the emergency call number list is ever billed to you. There are a couple of other things you can do from within the NAM programming menu, but that can be saved for another time, and another tutorial.

Section 3: The Conclusion
Once again I hoped you enjoyed reading this as much as I enjoyed writing this. This trick for the most part only works on the Nokia 60 series, though I believe may also work for a couple of other models. Be sure to also note that this trick also doesn't work on all networks. Therefore, if you indeed do have a compatible model, first try it with just one or two calls before you start going wild. Then just wait for the bill, and if nothing shows up about the calls you made with this trick, then feel free to call away. Anyways, until next time...

Note: If you have a question or comment and feel the need to reach me then you can do so at protonigg3r@yahoo.com and I will try to get back with you as soon as possible.

mandag 20. oktober 2008

25 Web Proxies To Surf Web Anonymously

25 Web Proxies To Surf Web Anonymously

Trick To Rename Internet Explorer Titlebar

Want to learn how to change the default title of Internet Explorer? It’s not so difficult. Just a little registry tweak, and your IE title bar will be changed in no time.

Remember: Back up your registry before making any changes to it.

Now, follow the simple instructions below:

Now, open your Registry Editor (Run > type regedit) and navigate to:

HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main

In the left-pane, right-click and select New > String Value.

Rename the new value to “Window Title” (without quotes). Double-click the new string value you just made, and enter the “new title” in the Data Value: box. This “new title” is your own title you want instead of the default one: Microsoft Internet Explorer.

This trick has been tested and works well with Internet Explorer 6.

tirsdag 7. oktober 2008

Thawing Out DeepFreeze

Thawing Out DeepFreeze
by Murder Mouse

Section 1: The Introduction
----------------------------

If your school is like many then they might use a program on all accessable
computers called DeepFreeze. DeepFreeze is a program released by Faronics that's
task is to preserve the original configuration of the workstation. Therefore,
if you install a game or something on one of the computers protected by
DeepFreeze, then the next time that computer is rebooted the game is gone.
However, it's been known for a while that there are ways to bypass DeepFreeze.
How is Faronics responding to this threat? The same way any great conspiracy
theorist would expect a business like them to, by trying to cover everything
up. In 2003 Faronics tried and failed in filing a suit to Google in order to
limit the access it's users have to information related to exploiting DeepFreeze.
Meanwhile they still triumph DeepFreeze on their site as the best thing since
sliced bread when it comes to computer security. Therefore instead of taking
the appropriate measures towards these problems they are trying their
damnest to maintain a state of security through obscurity. Sorry Faronics, but
as any IT tech will gladly tell you, it just simply doesn't work. So without
further delays lets get on with ways of getting past DeepFreeze...


Section 2: DeepUnfreezer
-------------------------

This really isn't even a section as much as it is just to let you know in case
you don't that this tool is included with this kit. It's a program created by
Emiliano Scavuzzo that does a pretty damn good job of thawing out DeepFreeze.
Included in the deepunfreezer.zip is a manual, including screenshots, on how
to use this tool. Be sure to read this manual before using the tool, though it's
use should be pretty self-explanatory. If you try to use this tool and it
doesn't work then that means that your school is using the latest build of
DeepFreeze (which as of the date I'm writing this, 4-10-06, is 1426). If this
is the case then read on to figure out other ways to bypass DeepFreeze.


Section 3: Persi0.sys
-----------------------

This next technique involves creating a persi0.sys file to replace the one
on the workstation. This is the primary configuration file used by DeepFreeze,
and can usually be found in C:\. To do this go to Faronic's web site
(www.faronics.com) and download an evaluation copy of DeepFreeze. Then install it
on your computer and set it to have a null password, and to have all drives
thawed. Then pop a knoppix-std cd or some live cd and find your persi0.sys, and
copy this file to a USB stick. Then take this to school with your knoppix cd.
Then reboot the workstation with the live cd distro and usb stick already set
and ready. Boot into the distro, save a backup copy of the original configuration
file onto your USB stick, and replace the original on the workstation with yours.
Then just reboot the computer, take out your cd and USB stick, and enjoy.


Section 4: Persifrz.vxd
------------------------

I can't guarantee that this works on newer builds of DeepFreeze, but it's worth
a shot. This file can usually be found in the iosubsys folder in system/system32.
This is the virtual driver for DeepFreeze, and if you wipe this off then
DeepFreeze is done for. To do this grab a floppy disk with dos, reboot the
computer with your floppy in the A: drive, find the file from there, and del
it.


Section 5: Worst Case Scenerio
-------------------------------

The worst case scenerio here is that your school is using the latest build of
DeepFreeze, has password protected the BIOS, and only allows booting to C:\.
If this is the case, well, I'm sorry to say it, but you are shit out of luck.
You could always remove the CMOS battery to bypass the BIOS measure, but this
would require you to open up the casing, which isn't something you can exactly
do unless you either have permission or a very long opportune moment (which
is pretty fucking doubtful). You can ask around to see if maybe there is some
advice that anyone can give you on possibly getting around this, but I wouldn't
expect much. Luckily most schools (at least as far as I know) aren't smart
enough to implement all three, and there is always a workaround. Good luck.

søndag 5. oktober 2008

How to bypass restrictions to get to the command prompt

Ok, you're at a console at the library, school or other public
termimal. Access to C: is blocked. The command prompt is blocked.
You're trying to do something, and you can't because of these
restrictions. What a load of shit.

First things first... Get to the command prompt. Once you've got
access to DOS, you're in good shape. If it's blocked, try the easy
way first.
*****************************************
Method 1:
1. Open any folder or browser.
2. Type the location of cmd.exe or the prompt depending on the OS.
Example: "C:\windows\system32\cmd.exe" or "C:\winnt\system32
\cmd.exe" (for NT)
*****************************************
Method 2:
1. Save the cmd.exe prog to a floppy and do a "A:/cmd.exe".
2. If you dont want to run it off the A:, then save it to the
computer and launch it from somewhere you have access to.

(note: ctrl-c / ctrl-v if cut and copy is blocked.)
****************************************
Method 3:
1. Download QuickBASIC. http://www.geocities.com/aliphax/files/qb.zip
2. Make a program that works similar to cmd.exe, but isn't blocked.

SHELL "cd>~cd.tmp"
OPEN "~cd.tmp" FOR INPUT AS #1
LINE INPUT #1, f$
CLOSE #1
KILL "~cd.tmp"
f$ = f$ + "\~cd.tmp"
DO
SHELL "cd>" + f$
OPEN f$ FOR INPUT AS #1
LINE INPUT #1, cd$
CLOSE #1
KILL f$
PRINT cd$ + ">";
LINE INPUT cmd$
SHELL cmd$
LOOP UNTIL LCASE$(cmd$) = "exit"

3. Save as "something.bas"
4. Click Run
5. Make EXE File
6. Stand-Alone EXE File
7. Make EXE
8. Exit
9. Execute "something.exe"
***************************************
Method 4:

1. If you have access to office, start word
2. Run the vb-runtime option
3. Add an command button and do an on-click sub which says:
Shell "cmd"
4. Run it
***************************************************
Method 5:

Simply open up the browser, go to view source, select New,
type "command", and save it as dos.bat. Then just simply open up
dos.bat to open up command prompt.

-HÅ££Å / Murder Mouse

Thanks to z1p and Alipha for the copy of QBasic for the tutorial.
Also thanks to phantiC for suggesting the VB runtime option in office.

søndag 28. september 2008

MFT Fragmentation

MFT Fragmentation
After installing your XP/2000 PC with all software and data. Run at Cmd line like FOR /L %f in (1,1,10000) do md %f
And then (not on root dir. C:\) FOR /L %f in (1,1,50000) do echo Hey > %f
This will create 10000 dir and 50000 files that you can delete. This increases the MFT size. Download Diskkeeper demo. Run MFT defrag once and you will probaby never need it again :).

HDD slowdown when booting

If, like I had , you have a 3min+ or slower boot time where Windows XP seems to sit for 2+ or so minutes with the XP logo doing nothing before everything comes to life, then do the following. Download Bootvis from www.microsoft.com and run it the next time you boot. Do a 'Trace' If it shows a very long 'HDD init' time of minutes rather than seconds then this is how to fix it.This example assumes you have 1 Hard drive on your primary IDE channel and a DVD-ROM(or CD) and CD-R on your two secondary IDE channels.Go to start > right click on my computer > click properties. Click Hardware > Device Manager.Go to IDE/ATAPI Controllers. Select primary channel. Right click properties. Click the Advance settings tab. Then on the device (0 or 1)that does not have 'device type' greyed out select 'disable' instead of 'autodetect'. This should stop windows trying to find a drive that isn't there.If you have your IDE channels set up differently simply repat the above for the secondary IDE channel settings. When I did this my boot time went from 3mins 20 to 35 seconds.

Easily Disable Messenger

Open Task Manager (Start - Run - taskmgr.exe)
Go to processes tab and verify "msmsgs.exe" is not running. If it is click on the process and choose "End Process"
Go into your Program Files folder.
Rename the Messenger folder to "MessengerOFF"
If you are unable to rename the folder in this manner then boot to safe mode and make the change.

Disable Recent Documents History

Normally when you open or access a document or file it is added to the list of recent documents on the Start Menu. This tweak will stop files from being added to the list.

Open your registry and find the key below.

Create a new DWORD value, or modify the existing value called 'NoRecentDocsHistory' set the value to equal '1' to enable the restriction.

Exit your registry, you may need to restart for the changes to take effect.

Registry Settings
User Key: [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\
Explorer]
System Key: [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\
Explorer]
Value Name: NoRecentDocsHistory
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = disable restriction, 1 = enable restriction)

WinSock Fix

Fix for a common Winsock network problem”

WinSockFix offers a last resort if your Internet connectivity has been corrupted due to invalid or removed registry entries.
It can often cure the problem of lost connections after the removal of

Adware components or improper uninstall of firewall applications or other tools that modify the XP network and Winsock settings.
If you encounter connection problems after removing network related software, Adware or after registry clean-up; and all other ways fail, then give WinSock Fix a try.

It can create a registry backup of your current settings, so it is fairly safe to use. We actually tested it on a test machine that was having a Winsock problem due to some Adware removal, and after running the utility and rebooting, the connectivity was restored.

The Winsockfix Utility will:

* Detect your current Operating System
* Release the IP address, taking you "Offline"
* Reset the TCP stack using Netsh.exe (Windows XP only)
* Delete the current Registry TCP and Winsock Values
* Import new "Working" Registry Values
* Backup any Current "Hosts" file
* Replace the "Hosts" file with a default one
* Reboot the Computer


OS requirements for WinSockFix:
Win95/98/Me/2000/XP
More Info:
"http://winsockfix.en.softonic.com/"

Delete Prefetch Automatically

Here's an easy way to delete your prefetch -- Automatically!!


1. Go into My Computer and go into your hard drive.

2. Right-click anywhere that a file is not and select the 'New' submenu and click 'Text Document'

3. Name it "deleteprefetch"

4. Double-click on the text file you just created.

5. Type "del C:\Windows\Prefetch\*.* /Q" (without the quotes).

6. Go to File > Save As... and choose "All Files" from the "Save as Type" box and save it as "deleteprefetch.bat"

7. You just created a batch file that will automatically delete all the files in your Prefetch folder. Congrats.

lørdag 27. september 2008

Automate Disk Cleanup

Cleanmgr.exe is designed to clear unnecessary files from your computer's hard disk. You can use command-line options to specify that Cleanmgr.exe cleans up certain files. You can then schedule the task to run at a specific time by using the Scheduled Tasks tool.

To start the Disk Cleanup tool, either run the Cleanmgr.exe command, or click Start, point to Programs, point to Accessories, point to System Tools, and then click Disk Cleanup.

Disk Cleanup supports the following command-line options:

* /d driveletter: - This option specifies the drive that you want Disk Cleanup to clean.
* /sageset: n - This option displays the Disk Cleanup Settings dialog box and also creates a registry key to store the settings that you select. The n value, which is stored in the registry, allows you to specify tasks for Disk Cleanup to run. The n value can be any integer value from 0 to 65535. To have all of the options available when you use the /sageset option, you might need to specify the drive where Windows is installed.
* /sagerun: n - This option runs the specified tasks that are assigned to the n value if you use the \sageset option.

For example, in Scheduled Tasks, you could run the following command after you run the cleanmgr /sageset:11 command:

cleanmgr /sagerun:11
This command runs Disk Cleanup and includes the options that you specified with the cleanmgr /sageset:11 command.

Adjust Graphics for Speed

Windows XP has a lot of new cool looking visual elements, however, those new elements take up more RAM and cause your computer to be less responsive. By tweaking your graphics settings, you can increase the performance of your computer.

To get started, Let's reduce the color quality. This setting determines how many colors are displayed on your screen.

1. Right click on your desktop and select properties.
2. Click on the settings tab and adjust the color quality drop down box to Medium (16 Bit).
3. Click OK.

Next, let's use the windows performance settings to optimize your computer for performance. This will revert back to the old Windows 2000 look as well as take away a lot of the fancy graphics effects. However, if you are really into performance, this is the price you have to pay.

1. Right click on the My Computer icon on your desktop or in your start panel and select properties.
2. Next, Click on the Advanced tab and hit the setting button under performance.
3. On the visual effects tab, select Adjust for Best Performance and hit OK.
4. Hit OK once more to exit system properties.

Now your computer will run slightly faster!

Fast Shutdown and/or Restart From Quick Launch Buttons

This tip will enable you to create buttons in your quick launch toolbar to quickly and easily shut down and/or restart your computer.

1. Right click on your desktop, scroll to new..... shortcut
2. In the location line, for shutdown type; shutdown -s -t 0 ie: shutdown(space)-s(space)-t(space)number zero
3. Name the shortcut "Shut Down PC" or whatever u want
4. The new shortcut is now sitting on your desktop, right click on it and go to properties, then click on "change icon". Click OK, then pick a suitable icon, there is a red "off button" icon available, then click apply and ok.
5. Now drag the icon from your desktop into the quick launch toolbar, resize the toolbar so all the buttons are visible, then delete the shortcut from your desktop.

To create a restart button the location line should read shutdown -r -t 0 name it restart pc and give it a suitable icon for restart.

Now you can shut down or restart your pc in 1 mouse click without having to go through the startup menu.

Easy way to empty Recycle Bin

NOTE: This option might work on all versions of XP. You will have to try on your version if it is different than XP Pro. There is a similar tweak as this for Windows 98 and possibly ME. DO NOT USE THE TWEAK FOR WINDOWS 98!! It will screw up the Open With option when right-clicking files.



How would you like the option to be able to empty the Recycle Bin with just a right-click on a drive or folder in My Computer(Windows Explorer)? Here's how.

Copy this info into Notepad and save as a .reg file

For the option to appear when right-clicking a drive



;--------------------------------------------------------

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\Drive\shellex\ContextMenuHandlers\{645FF040-5081-101B-9F08-00AA002F954E}]

;--------------------------------------------------------

For the option to appear when right-clicking a folder

;--------------------------------------------------------

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\directory\shellex\ContextMenuHandlers\{645FF040-5081-101B-9F08-00AA002F954E}]

;--------------------------------------------------------

For the option to appear for a drive and a folder

;--------------------------------------------------------

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\directory\shellex\ContextMenuHandlers\{645FF040-5081-101B-9F08-00AA002F954E}]

[HKEY_CLASSES_ROOT\Drive\shellex\ContextMenuHandlers\{645FF040-5081-101B-9F08-00AA002F954E}]

;--------------------------------------------------------

Right-click the .reg file and select merge.

Note: The option will only be highlighted if there are files in the Recycle Bin. This can also be used as a quick check whether you have files in your Recycle Bin.

Change Hard and CD-ROM Drive Letter in XP

If you want to change your hard drive letter or your cd-rom drive letter, this is the tip you want.


1. Click the start button

2. Go into Administrative tools (either in the start button or in "All Programs"

3. From Administrative Tools, go into "Computer Management"

4. In "Computer Management", click on "Disk Management" under "Storage" from the left menu

5. You should see a window from the lower right hand corner open (it shows all the hard disk drives and cd-rom drives)

6. To change...

...hard drive, click on the hard disk with a blue horizonal bar, the box should be shaded; next right click that box that you desire to change the letter then click on "Change Letter Drive and Path"

...cd-rom drive, click on the box that you desire the drive letter; next right click that box that you desire to change the letter then click on "Change Letter Drive and Path"

7. click the "change..." button

8. from the "assign the following drive letter", select the letter you want to assign to the hard drive or the cd-rom drive

9. click ok

10. click ok

11. (optional) redo the whole step to reassign other hard drives or cd-rom drives


There! You have succeeded in changing the hard drive or cd-rom drive letter. Enjoy!



Notes: You can not change the drive letter of your boot or system drive this way. You can not assign drive letters that are already in use. Assign temporary letters as a workaround.

A Better Disk Cleanup

This tip will show you how to create an unattended disk cleanup which will also empty your prefetch folder. This tip assumes you have Windows XP installed in c:\windows.

Step 1.
Create a new text file and place the following contents inside:

c:\windows\system32\cleanmgr.exe /dc /sageset: 1
c:
cd \
cd c:\windows\prefetch
del *.* /q

Step 2.
Save the file, changing the extension from .txt to .bat
For this tip's purpose, we will call it clean.bat

Step 3.
Execute the file. This will run the Disk Cleanup program in a special mode which asks what items you will want cleaned when Disk Cleanup performs an unattended cleanup. Check the items you wish to have cleaned up, then click OK.

Step 4.
Right-click on the clean.bat file and click edit. Change the first line to read:

c:\windows\system32\cleanmgr.exe /dc /sagerun: 1

Step 5.
Save the file. You can execute this file in place of running Disk Cleanup, or, to have this program run unattended, run the Add Scheduled Task Wizard in the Control Panel and create a scheduled task using the clean.bat file you just created.

Note: This cleanup script will also clear windows prefetch directory. Often this directory can become cluttered with old appication and a cleaning would free up disk space but it will result in a one time performance decrease and windows has to rebuild the cache with active software afterwards.

onsdag 24. september 2008

Stay anonymous on the web

[----Stay anonymous on the web------]

..By MAx member of :MPD: (c) 1998 MAx [4d5044]

Note..This tutorial will teach a average day user how to keep all his
Esentual info limited so attacks from Hackers cant be made

SHouth outs: Myth leader of MPD u rule dude,All members of MPD, and
everyone else who i should shout out too u know who u are.

The topics..
1.What are packets.
2.Getting a http proxy.
3.How http proxy work.
4.How to secrure http packets.
5.How to edit what o's and mozilla info send.
6.Getting a socket proxy.
7.How socket proxy work.
8.Cookies.
9.Final note.
-----------------------------------------------------------------------

1.What are packets.

Packets are very simple on the net There are millions of user's now for
secrurity and other reasons there must be ways of establishing difference
between user's Thus is done by packets, Packets are used when ever u connect
to a remote server/system Its identify's who is connecting.
An example of a http packet.( [Connect from MAx.mpd.com]
[206.14.13.32] (Mozilla/4.05 [en] (X11;I;Linux 2.0.34 i586) on December
2, 1998 at 14:34:45 )
Now ill tell u what it is saying if u dont know.
*Note*(Http packets is the way u are sending info through the web
browser whenever u connect to a server/mechine/site )
[connected from MAx.mpd.com]-This is my host
[206.14.13.32]- is my ip
(Mozilla/4.05)- is the version of mozilla im using
(X11;I;Linux 2.0.32 i586)- Is The O's(operating system) And version of
the o's im running
[On december 2, 1998 at 14:34:45] - is day/year/time
Now u know how it works this is one way Hackers get all the info they
need on your computer to hack it.
Now we dont want this anymore THus anonymous proxies where invented to
give keep user's on the net secrure.Using anonymous proxies isnt
100% secrure as the hacker can still do means on getting your real
ip/host/os ill talk about that later but it makes it very hard for a hacker
to get your ip/host once behind a proxy.
Now http isnt the only means of packets there are also socket packets which
ill talk about later.

2.How http proxy work.
A http proxy works like server it is actuelly and what it does is when
setup in your browser when ever u want to go to sites.It will connect
to there proxy server first then the proxy server conncts to the site
u want to go to THus leaving no evendence of u on the site just the
proxy server.(Dont worry once u setup a proxy dont think u always have
to type in the proxy in first then go to there and type the site u want
too go to. :)It dont work like that once u have entered the proxy settings
in ya browser it will auto do the proxy for u all u have to do is surf the
net.(Setting up a http proxy descussed later)

3. Getting a http proxy
Http proxies are very easyly found on the net as there are many
commited Http proxy server's around that are free.
Ill give a list of some http proxies for your all sorry if your
country proxy isn't here just search on the net for (Http proxy)
and ull find one.
***Austria*** Port

cache02.netway.at :80
mail.ppl.co.at :8080
speth08.wu-wien.ac.at :8080
pong.ping.at :8080

***Australia***
proxy.gwbbs.net.au :80
chrome.one.net.au :8080
proxy.newave.net.au :8080
ws.edi.com.au :80
mimas.scu.edu.au :80
proxy.omcs.com.au :8080
jethro.meriden.pas.com.au:8080
albany.jrc.net.au :80
basil.acr.net.au :8080

***Belgium***

cache-mar.belbone.be :80

***Bulgaria***

conan.gocis.bg :8080

***Brazil***

200.250.14.5)ct-nt-02.cybertelecom.com.br :8080
sanan.com.br :8080

***Canada***
proxy.collegemv.qc.ca :8080
srvprx.cspaysbleuets.qc.ca :80
valliere.csvalliere.qc.ca :80
keeper.albertc.on.ca :8080
cproxy1.justice.gc.ca :80
proxy.cslouis-hemon.qc.ca :8080
gateway.kwantlen.bc.ca :80

***Switzerland***

cache1.worldcom.ch :8080
cache2.worldcom.ch :8080
cache3.worldcom.ch :8080
web-cache-2.cern.ch :80
proxy.span.ch :8080
gip-lausanne-nc.globalip.ch :80
gip-lausanne-cf2.globalip.ch :8080
gip-lausanne-cf1.globalip.ch :8080
proxy2.iso.ch :8080
proxy.iprolink.ch :80

***China***

proxy.szptt.net.cn :8080

***United States***

hpux.mesd.k12.or.us :8080
gatekeeper.ci.slc.ut.us :8080
episd.elpaso.k12.tx.us :8080
svc.logan.k12.ut.us :8001
proxy.eup.k12.mi.us :8080
svc.nues.k12.ut.us :8001
proxy.eup.k12.mi.us :8080
(207.78.252.100)oakweb.oak-web.washington-ch.oh.us :80
homnibus.nvc.cc.ca.us :80
et.mohave.cc.az.us :80

(ok id say i gave out enough if ya local country not there go search
the net and if cant find use another country one that is close to u)

4.How to secrure Http packets
Like i said before this is a normal http packet
( [Connect from MAx.mpd.com]
[206.14.13.32] (Mozilla/4.05 [en] (X11;I;Linux 2.0.34 i586) on December
2, 1998 at 14:34:45 )
Now to Make your ip and host anonymous to web browsing we are going to
use http proxy with ya browser.THis is done by going to ya options
and finding the info on proxy settings in thus put in all
avalable places in proxy setting etc.ftp,http,secruity,
Except leave sockets part blank THis isnt a socket proxy its a http
Now after setting up a proxy in the proxy settings and putting in the
port too.Our new packets will look like this.
( [Connect from The_proxies_host]
[The_proxies_ip] (Mozilla/4.05 [en] (X11;I;Linux 2.0.34 i586) on December
2, 1998 at 14:34:45 )
Now u might be thinking cool :) No longer have everdence of me on there
server but dam they know my o's and version of mozilla later on ill
descuse how to change that.U might also be thinking WOW now i can surf
100% secure on the net.U are not totally right.IF a hacker had a real
grunge on u.He has now the proxy u are using there ip/host
now if he wants to get your info that badly he would have to hack
the proxy server comapare the log time of the time u loged to the hacker's
site too the logs of your connection to the proxy server.THus is a real
big job and if pick a good proxy server they will be very secure from
attack's So your pritty much safe.

5.How to edit the o's and mozilla info send.

Ok if your using Ie this is how u would do it.
To see Original Settings
GOTO HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
User Agent = Mozilla/4.0 (compatible; MSIE 4.01; Windows 95; (Your Orginial Settings))

(Skip this Part here)
GOTO HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
ProductName = Microsoft Windows 95
Version = Windows 95


GOTO HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform
(Your Orignial Settings Here) = IEAK(Your Orignial Settings Here)

Example

GOTO HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform
Myth [Unix-Base] = IEAKMyth [Unix-Base]


*Note (this info on how to change the mozilla and version shown was
given to me from Myth i didn't make it.)

6.Getting a socket proxy.

Ok now socket proxies work like Http proxies the only diff is
socket proxies are used with programs like (icq,mirc) And the packets
are send through sockets not http.Getting a socket proxy is alot harder
because Socket proxy server's have to be dedicated to a sertain program
so its very limiting to the amount of user's he will get.
Http is always used its using the web everyone uses it so http proxies
are always going to be in need.
TO find a socket proxy u can search the net typing in (Socket proxy)
or try for sertain program's names like (Icq proxy).
Hopefully u will get one
socket proxies are useful as alot of attacks on user's are done
by kids with nukes,spring,ping,smurf,etc etc And thus will anoy a user
in mirc or from icq both these programs give any user possability to
get a user's ip/host.
thats why if u use these u will want a socket proxy.
Alot of people go why dont u just use ident or jizz or something
for mirc and icq.Well the reason u don't as there are expolits out
there to crash spoofed hosts/ip for programs like jizz and ident
a proxy is more stable way and more prevention then a spoofer program.
With these programs its explains once u get a socket proxy how to set
them up in them so i dont have to go and explain for u.Because its
different for all programs Socket is also used in web downloading/surfing
but not to worry u can find alot of socket proxies for web downloading/surfing
around.

7.How a socket proxy works.

I just explained it breifly in last topic.
Ill go into a bit more detail
see when ever u send or recive a file for a server/user
it has to send through a socket.Now when they do this it has to establish
a connection to your computer.Example if a connection
( established a connection on MAx.mpd.com port 1030 )
And thats not all it will log on the computer what day/year/time
u established a connection.This is another way hackers get info on u
Thats why u need a socket proxy.

8.Cookies.
Ok cookies are also apart of way info is send from your server/isp
to your computer cokies transmits info on webpages visited by u
info on what u have downloaded and so forth with a ip/host and day/
year/time .Now hackers can use this hack for 2 reasons
1.Get info they need to attack u
2.Be able to see all places u have been/done on web/send files through
to your computer without u even knowing it.
Now With all browsers now u can stop even limit cookies from the oriene
of your server.Go to your options u will find something on cookies
there in ya browser.
Now this is very limiting so if ya a linux/unix user there is a nice
little program i know that will go that few steps furture.
Visit. (http://www.lne.com/ericm/cookie_jar/)
THis program called "Cookie jar" alows u to limit sites from your computer
limit if u get cookies from that site/server its goes the extra steps
u need.

9.Final note.

Rember dont use this secruity for hacking almost all proxy server's
will give the cops/server's your info if they find u tryed to hack with
there anonymous proxy settings.Only use this to stops attacks against u
and your server.

Rember.Have fun
(c) 1998 MAx [4d5044]