Cleanmgr.exe is designed to clear unnecessary files from your computer's hard disk. You can use command-line options to specify that Cleanmgr.exe cleans up certain files. You can then schedule the task to run at a specific time by using the Scheduled Tasks tool.
To start the Disk Cleanup tool, either run the Cleanmgr.exe command, or click Start, point to Programs, point to Accessories, point to System Tools, and then click Disk Cleanup.
Disk Cleanup supports the following command-line options:
* /d driveletter: - This option specifies the drive that you want Disk Cleanup to clean.
* /sageset: n - This option displays the Disk Cleanup Settings dialog box and also creates a registry key to store the settings that you select. The n value, which is stored in the registry, allows you to specify tasks for Disk Cleanup to run. The n value can be any integer value from 0 to 65535. To have all of the options available when you use the /sageset option, you might need to specify the drive where Windows is installed.
* /sagerun: n - This option runs the specified tasks that are assigned to the n value if you use the \sageset option.
For example, in Scheduled Tasks, you could run the following command after you run the cleanmgr /sageset:11 command:
cleanmgr /sagerun:11
This command runs Disk Cleanup and includes the options that you specified with the cleanmgr /sageset:11 command.
lørdag 27. september 2008
Adjust Graphics for Speed
Windows XP has a lot of new cool looking visual elements, however, those new elements take up more RAM and cause your computer to be less responsive. By tweaking your graphics settings, you can increase the performance of your computer.
To get started, Let's reduce the color quality. This setting determines how many colors are displayed on your screen.
1. Right click on your desktop and select properties.
2. Click on the settings tab and adjust the color quality drop down box to Medium (16 Bit).
3. Click OK.
Next, let's use the windows performance settings to optimize your computer for performance. This will revert back to the old Windows 2000 look as well as take away a lot of the fancy graphics effects. However, if you are really into performance, this is the price you have to pay.
1. Right click on the My Computer icon on your desktop or in your start panel and select properties.
2. Next, Click on the Advanced tab and hit the setting button under performance.
3. On the visual effects tab, select Adjust for Best Performance and hit OK.
4. Hit OK once more to exit system properties.
Now your computer will run slightly faster!
To get started, Let's reduce the color quality. This setting determines how many colors are displayed on your screen.
1. Right click on your desktop and select properties.
2. Click on the settings tab and adjust the color quality drop down box to Medium (16 Bit).
3. Click OK.
Next, let's use the windows performance settings to optimize your computer for performance. This will revert back to the old Windows 2000 look as well as take away a lot of the fancy graphics effects. However, if you are really into performance, this is the price you have to pay.
1. Right click on the My Computer icon on your desktop or in your start panel and select properties.
2. Next, Click on the Advanced tab and hit the setting button under performance.
3. On the visual effects tab, select Adjust for Best Performance and hit OK.
4. Hit OK once more to exit system properties.
Now your computer will run slightly faster!
Fast Shutdown and/or Restart From Quick Launch Buttons
This tip will enable you to create buttons in your quick launch toolbar to quickly and easily shut down and/or restart your computer.
1. Right click on your desktop, scroll to new..... shortcut
2. In the location line, for shutdown type; shutdown -s -t 0 ie: shutdown(space)-s(space)-t(space)number zero
3. Name the shortcut "Shut Down PC" or whatever u want
4. The new shortcut is now sitting on your desktop, right click on it and go to properties, then click on "change icon". Click OK, then pick a suitable icon, there is a red "off button" icon available, then click apply and ok.
5. Now drag the icon from your desktop into the quick launch toolbar, resize the toolbar so all the buttons are visible, then delete the shortcut from your desktop.
To create a restart button the location line should read shutdown -r -t 0 name it restart pc and give it a suitable icon for restart.
Now you can shut down or restart your pc in 1 mouse click without having to go through the startup menu.
1. Right click on your desktop, scroll to new..... shortcut
2. In the location line, for shutdown type; shutdown -s -t 0 ie: shutdown(space)-s(space)-t(space)number zero
3. Name the shortcut "Shut Down PC" or whatever u want
4. The new shortcut is now sitting on your desktop, right click on it and go to properties, then click on "change icon". Click OK, then pick a suitable icon, there is a red "off button" icon available, then click apply and ok.
5. Now drag the icon from your desktop into the quick launch toolbar, resize the toolbar so all the buttons are visible, then delete the shortcut from your desktop.
To create a restart button the location line should read shutdown -r -t 0 name it restart pc and give it a suitable icon for restart.
Now you can shut down or restart your pc in 1 mouse click without having to go through the startup menu.
Easy way to empty Recycle Bin
NOTE: This option might work on all versions of XP. You will have to try on your version if it is different than XP Pro. There is a similar tweak as this for Windows 98 and possibly ME. DO NOT USE THE TWEAK FOR WINDOWS 98!! It will screw up the Open With option when right-clicking files.
How would you like the option to be able to empty the Recycle Bin with just a right-click on a drive or folder in My Computer(Windows Explorer)? Here's how.
Copy this info into Notepad and save as a .reg file
For the option to appear when right-clicking a drive
;--------------------------------------------------------
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\Drive\shellex\ContextMenuHandlers\{645FF040-5081-101B-9F08-00AA002F954E}]
;--------------------------------------------------------
For the option to appear when right-clicking a folder
;--------------------------------------------------------
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\directory\shellex\ContextMenuHandlers\{645FF040-5081-101B-9F08-00AA002F954E}]
;--------------------------------------------------------
For the option to appear for a drive and a folder
;--------------------------------------------------------
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\directory\shellex\ContextMenuHandlers\{645FF040-5081-101B-9F08-00AA002F954E}]
[HKEY_CLASSES_ROOT\Drive\shellex\ContextMenuHandlers\{645FF040-5081-101B-9F08-00AA002F954E}]
;--------------------------------------------------------
Right-click the .reg file and select merge.
Note: The option will only be highlighted if there are files in the Recycle Bin. This can also be used as a quick check whether you have files in your Recycle Bin.
How would you like the option to be able to empty the Recycle Bin with just a right-click on a drive or folder in My Computer(Windows Explorer)? Here's how.
Copy this info into Notepad and save as a .reg file
For the option to appear when right-clicking a drive
;--------------------------------------------------------
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\Drive\shellex\ContextMenuHandlers\{645FF040-5081-101B-9F08-00AA002F954E}]
;--------------------------------------------------------
For the option to appear when right-clicking a folder
;--------------------------------------------------------
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\directory\shellex\ContextMenuHandlers\{645FF040-5081-101B-9F08-00AA002F954E}]
;--------------------------------------------------------
For the option to appear for a drive and a folder
;--------------------------------------------------------
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\directory\shellex\ContextMenuHandlers\{645FF040-5081-101B-9F08-00AA002F954E}]
[HKEY_CLASSES_ROOT\Drive\shellex\ContextMenuHandlers\{645FF040-5081-101B-9F08-00AA002F954E}]
;--------------------------------------------------------
Right-click the .reg file and select merge.
Note: The option will only be highlighted if there are files in the Recycle Bin. This can also be used as a quick check whether you have files in your Recycle Bin.
Change Hard and CD-ROM Drive Letter in XP
If you want to change your hard drive letter or your cd-rom drive letter, this is the tip you want.
1. Click the start button
2. Go into Administrative tools (either in the start button or in "All Programs"
3. From Administrative Tools, go into "Computer Management"
4. In "Computer Management", click on "Disk Management" under "Storage" from the left menu
5. You should see a window from the lower right hand corner open (it shows all the hard disk drives and cd-rom drives)
6. To change...
...hard drive, click on the hard disk with a blue horizonal bar, the box should be shaded; next right click that box that you desire to change the letter then click on "Change Letter Drive and Path"
...cd-rom drive, click on the box that you desire the drive letter; next right click that box that you desire to change the letter then click on "Change Letter Drive and Path"
7. click the "change..." button
8. from the "assign the following drive letter", select the letter you want to assign to the hard drive or the cd-rom drive
9. click ok
10. click ok
11. (optional) redo the whole step to reassign other hard drives or cd-rom drives
There! You have succeeded in changing the hard drive or cd-rom drive letter. Enjoy!
Notes: You can not change the drive letter of your boot or system drive this way. You can not assign drive letters that are already in use. Assign temporary letters as a workaround.
1. Click the start button
2. Go into Administrative tools (either in the start button or in "All Programs"
3. From Administrative Tools, go into "Computer Management"
4. In "Computer Management", click on "Disk Management" under "Storage" from the left menu
5. You should see a window from the lower right hand corner open (it shows all the hard disk drives and cd-rom drives)
6. To change...
...hard drive, click on the hard disk with a blue horizonal bar, the box should be shaded; next right click that box that you desire to change the letter then click on "Change Letter Drive and Path"
...cd-rom drive, click on the box that you desire the drive letter; next right click that box that you desire to change the letter then click on "Change Letter Drive and Path"
7. click the "change..." button
8. from the "assign the following drive letter", select the letter you want to assign to the hard drive or the cd-rom drive
9. click ok
10. click ok
11. (optional) redo the whole step to reassign other hard drives or cd-rom drives
There! You have succeeded in changing the hard drive or cd-rom drive letter. Enjoy!
Notes: You can not change the drive letter of your boot or system drive this way. You can not assign drive letters that are already in use. Assign temporary letters as a workaround.
A Better Disk Cleanup
This tip will show you how to create an unattended disk cleanup which will also empty your prefetch folder. This tip assumes you have Windows XP installed in c:\windows.
Step 1.
Create a new text file and place the following contents inside:
c:\windows\system32\cleanmgr.exe /dc /sageset: 1
c:
cd \
cd c:\windows\prefetch
del *.* /q
Step 2.
Save the file, changing the extension from .txt to .bat
For this tip's purpose, we will call it clean.bat
Step 3.
Execute the file. This will run the Disk Cleanup program in a special mode which asks what items you will want cleaned when Disk Cleanup performs an unattended cleanup. Check the items you wish to have cleaned up, then click OK.
Step 4.
Right-click on the clean.bat file and click edit. Change the first line to read:
c:\windows\system32\cleanmgr.exe /dc /sagerun: 1
Step 5.
Save the file. You can execute this file in place of running Disk Cleanup, or, to have this program run unattended, run the Add Scheduled Task Wizard in the Control Panel and create a scheduled task using the clean.bat file you just created.
Note: This cleanup script will also clear windows prefetch directory. Often this directory can become cluttered with old appication and a cleaning would free up disk space but it will result in a one time performance decrease and windows has to rebuild the cache with active software afterwards.
Step 1.
Create a new text file and place the following contents inside:
c:\windows\system32\cleanmgr.exe /dc /sageset: 1
c:
cd \
cd c:\windows\prefetch
del *.* /q
Step 2.
Save the file, changing the extension from .txt to .bat
For this tip's purpose, we will call it clean.bat
Step 3.
Execute the file. This will run the Disk Cleanup program in a special mode which asks what items you will want cleaned when Disk Cleanup performs an unattended cleanup. Check the items you wish to have cleaned up, then click OK.
Step 4.
Right-click on the clean.bat file and click edit. Change the first line to read:
c:\windows\system32\cleanmgr.exe /dc /sagerun: 1
Step 5.
Save the file. You can execute this file in place of running Disk Cleanup, or, to have this program run unattended, run the Add Scheduled Task Wizard in the Control Panel and create a scheduled task using the clean.bat file you just created.
Note: This cleanup script will also clear windows prefetch directory. Often this directory can become cluttered with old appication and a cleaning would free up disk space but it will result in a one time performance decrease and windows has to rebuild the cache with active software afterwards.
onsdag 24. september 2008
Stay anonymous on the web
[----Stay anonymous on the web------]
..By MAx member of :MPD: (c) 1998 MAx [4d5044]
Note..This tutorial will teach a average day user how to keep all his
Esentual info limited so attacks from Hackers cant be made
SHouth outs: Myth leader of MPD u rule dude,All members of MPD, and
everyone else who i should shout out too u know who u are.
The topics..
1.What are packets.
2.Getting a http proxy.
3.How http proxy work.
4.How to secrure http packets.
5.How to edit what o's and mozilla info send.
6.Getting a socket proxy.
7.How socket proxy work.
8.Cookies.
9.Final note.
-----------------------------------------------------------------------
1.What are packets.
Packets are very simple on the net There are millions of user's now for
secrurity and other reasons there must be ways of establishing difference
between user's Thus is done by packets, Packets are used when ever u connect
to a remote server/system Its identify's who is connecting.
An example of a http packet.( [Connect from MAx.mpd.com]
[206.14.13.32] (Mozilla/4.05 [en] (X11;I;Linux 2.0.34 i586) on December
2, 1998 at 14:34:45 )
Now ill tell u what it is saying if u dont know.
*Note*(Http packets is the way u are sending info through the web
browser whenever u connect to a server/mechine/site )
[connected from MAx.mpd.com]-This is my host
[206.14.13.32]- is my ip
(Mozilla/4.05)- is the version of mozilla im using
(X11;I;Linux 2.0.32 i586)- Is The O's(operating system) And version of
the o's im running
[On december 2, 1998 at 14:34:45] - is day/year/time
Now u know how it works this is one way Hackers get all the info they
need on your computer to hack it.
Now we dont want this anymore THus anonymous proxies where invented to
give keep user's on the net secrure.Using anonymous proxies isnt
100% secrure as the hacker can still do means on getting your real
ip/host/os ill talk about that later but it makes it very hard for a hacker
to get your ip/host once behind a proxy.
Now http isnt the only means of packets there are also socket packets which
ill talk about later.
2.How http proxy work.
A http proxy works like server it is actuelly and what it does is when
setup in your browser when ever u want to go to sites.It will connect
to there proxy server first then the proxy server conncts to the site
u want to go to THus leaving no evendence of u on the site just the
proxy server.(Dont worry once u setup a proxy dont think u always have
to type in the proxy in first then go to there and type the site u want
too go to. :)It dont work like that once u have entered the proxy settings
in ya browser it will auto do the proxy for u all u have to do is surf the
net.(Setting up a http proxy descussed later)
3. Getting a http proxy
Http proxies are very easyly found on the net as there are many
commited Http proxy server's around that are free.
Ill give a list of some http proxies for your all sorry if your
country proxy isn't here just search on the net for (Http proxy)
and ull find one.
***Austria*** Port
cache02.netway.at :80
mail.ppl.co.at :8080
speth08.wu-wien.ac.at :8080
pong.ping.at :8080
***Australia***
proxy.gwbbs.net.au :80
chrome.one.net.au :8080
proxy.newave.net.au :8080
ws.edi.com.au :80
mimas.scu.edu.au :80
proxy.omcs.com.au :8080
jethro.meriden.pas.com.au:8080
albany.jrc.net.au :80
basil.acr.net.au :8080
***Belgium***
cache-mar.belbone.be :80
***Bulgaria***
conan.gocis.bg :8080
***Brazil***
200.250.14.5)ct-nt-02.cybertelecom.com.br :8080
sanan.com.br :8080
***Canada***
proxy.collegemv.qc.ca :8080
srvprx.cspaysbleuets.qc.ca :80
valliere.csvalliere.qc.ca :80
keeper.albertc.on.ca :8080
cproxy1.justice.gc.ca :80
proxy.cslouis-hemon.qc.ca :8080
gateway.kwantlen.bc.ca :80
***Switzerland***
cache1.worldcom.ch :8080
cache2.worldcom.ch :8080
cache3.worldcom.ch :8080
web-cache-2.cern.ch :80
proxy.span.ch :8080
gip-lausanne-nc.globalip.ch :80
gip-lausanne-cf2.globalip.ch :8080
gip-lausanne-cf1.globalip.ch :8080
proxy2.iso.ch :8080
proxy.iprolink.ch :80
***China***
proxy.szptt.net.cn :8080
***United States***
hpux.mesd.k12.or.us :8080
gatekeeper.ci.slc.ut.us :8080
episd.elpaso.k12.tx.us :8080
svc.logan.k12.ut.us :8001
proxy.eup.k12.mi.us :8080
svc.nues.k12.ut.us :8001
proxy.eup.k12.mi.us :8080
(207.78.252.100)oakweb.oak-web.washington-ch.oh.us :80
homnibus.nvc.cc.ca.us :80
et.mohave.cc.az.us :80
(ok id say i gave out enough if ya local country not there go search
the net and if cant find use another country one that is close to u)
4.How to secrure Http packets
Like i said before this is a normal http packet
( [Connect from MAx.mpd.com]
[206.14.13.32] (Mozilla/4.05 [en] (X11;I;Linux 2.0.34 i586) on December
2, 1998 at 14:34:45 )
Now to Make your ip and host anonymous to web browsing we are going to
use http proxy with ya browser.THis is done by going to ya options
and finding the info on proxy settings in thus put in all
avalable places in proxy setting etc.ftp,http,secruity,
Except leave sockets part blank THis isnt a socket proxy its a http
Now after setting up a proxy in the proxy settings and putting in the
port too.Our new packets will look like this.
( [Connect from The_proxies_host]
[The_proxies_ip] (Mozilla/4.05 [en] (X11;I;Linux 2.0.34 i586) on December
2, 1998 at 14:34:45 )
Now u might be thinking cool :) No longer have everdence of me on there
server but dam they know my o's and version of mozilla later on ill
descuse how to change that.U might also be thinking WOW now i can surf
100% secure on the net.U are not totally right.IF a hacker had a real
grunge on u.He has now the proxy u are using there ip/host
now if he wants to get your info that badly he would have to hack
the proxy server comapare the log time of the time u loged to the hacker's
site too the logs of your connection to the proxy server.THus is a real
big job and if pick a good proxy server they will be very secure from
attack's So your pritty much safe.
5.How to edit the o's and mozilla info send.
Ok if your using Ie this is how u would do it.
To see Original Settings
GOTO HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
User Agent = Mozilla/4.0 (compatible; MSIE 4.01; Windows 95; (Your Orginial Settings))
(Skip this Part here)
GOTO HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
ProductName = Microsoft Windows 95
Version = Windows 95
GOTO HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform
(Your Orignial Settings Here) = IEAK(Your Orignial Settings Here)
Example
GOTO HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform
Myth [Unix-Base] = IEAKMyth [Unix-Base]
*Note (this info on how to change the mozilla and version shown was
given to me from Myth i didn't make it.)
6.Getting a socket proxy.
Ok now socket proxies work like Http proxies the only diff is
socket proxies are used with programs like (icq,mirc) And the packets
are send through sockets not http.Getting a socket proxy is alot harder
because Socket proxy server's have to be dedicated to a sertain program
so its very limiting to the amount of user's he will get.
Http is always used its using the web everyone uses it so http proxies
are always going to be in need.
TO find a socket proxy u can search the net typing in (Socket proxy)
or try for sertain program's names like (Icq proxy).
Hopefully u will get one
socket proxies are useful as alot of attacks on user's are done
by kids with nukes,spring,ping,smurf,etc etc And thus will anoy a user
in mirc or from icq both these programs give any user possability to
get a user's ip/host.
thats why if u use these u will want a socket proxy.
Alot of people go why dont u just use ident or jizz or something
for mirc and icq.Well the reason u don't as there are expolits out
there to crash spoofed hosts/ip for programs like jizz and ident
a proxy is more stable way and more prevention then a spoofer program.
With these programs its explains once u get a socket proxy how to set
them up in them so i dont have to go and explain for u.Because its
different for all programs Socket is also used in web downloading/surfing
but not to worry u can find alot of socket proxies for web downloading/surfing
around.
7.How a socket proxy works.
I just explained it breifly in last topic.
Ill go into a bit more detail
see when ever u send or recive a file for a server/user
it has to send through a socket.Now when they do this it has to establish
a connection to your computer.Example if a connection
( established a connection on MAx.mpd.com port 1030 )
And thats not all it will log on the computer what day/year/time
u established a connection.This is another way hackers get info on u
Thats why u need a socket proxy.
8.Cookies.
Ok cookies are also apart of way info is send from your server/isp
to your computer cokies transmits info on webpages visited by u
info on what u have downloaded and so forth with a ip/host and day/
year/time .Now hackers can use this hack for 2 reasons
1.Get info they need to attack u
2.Be able to see all places u have been/done on web/send files through
to your computer without u even knowing it.
Now With all browsers now u can stop even limit cookies from the oriene
of your server.Go to your options u will find something on cookies
there in ya browser.
Now this is very limiting so if ya a linux/unix user there is a nice
little program i know that will go that few steps furture.
Visit. (http://www.lne.com/ericm/cookie_jar/)
THis program called "Cookie jar" alows u to limit sites from your computer
limit if u get cookies from that site/server its goes the extra steps
u need.
9.Final note.
Rember dont use this secruity for hacking almost all proxy server's
will give the cops/server's your info if they find u tryed to hack with
there anonymous proxy settings.Only use this to stops attacks against u
and your server.
Rember.Have fun
(c) 1998 MAx [4d5044]
..By MAx member of :MPD: (c) 1998 MAx [4d5044]
Note..This tutorial will teach a average day user how to keep all his
Esentual info limited so attacks from Hackers cant be made
SHouth outs: Myth leader of MPD u rule dude,All members of MPD, and
everyone else who i should shout out too u know who u are.
The topics..
1.What are packets.
2.Getting a http proxy.
3.How http proxy work.
4.How to secrure http packets.
5.How to edit what o's and mozilla info send.
6.Getting a socket proxy.
7.How socket proxy work.
8.Cookies.
9.Final note.
-----------------------------------------------------------------------
1.What are packets.
Packets are very simple on the net There are millions of user's now for
secrurity and other reasons there must be ways of establishing difference
between user's Thus is done by packets, Packets are used when ever u connect
to a remote server/system Its identify's who is connecting.
An example of a http packet.( [Connect from MAx.mpd.com]
[206.14.13.32] (Mozilla/4.05 [en] (X11;I;Linux 2.0.34 i586) on December
2, 1998 at 14:34:45 )
Now ill tell u what it is saying if u dont know.
*Note*(Http packets is the way u are sending info through the web
browser whenever u connect to a server/mechine/site )
[connected from MAx.mpd.com]-This is my host
[206.14.13.32]- is my ip
(Mozilla/4.05)- is the version of mozilla im using
(X11;I;Linux 2.0.32 i586)- Is The O's(operating system) And version of
the o's im running
[On december 2, 1998 at 14:34:45] - is day/year/time
Now u know how it works this is one way Hackers get all the info they
need on your computer to hack it.
Now we dont want this anymore THus anonymous proxies where invented to
give keep user's on the net secrure.Using anonymous proxies isnt
100% secrure as the hacker can still do means on getting your real
ip/host/os ill talk about that later but it makes it very hard for a hacker
to get your ip/host once behind a proxy.
Now http isnt the only means of packets there are also socket packets which
ill talk about later.
2.How http proxy work.
A http proxy works like server it is actuelly and what it does is when
setup in your browser when ever u want to go to sites.It will connect
to there proxy server first then the proxy server conncts to the site
u want to go to THus leaving no evendence of u on the site just the
proxy server.(Dont worry once u setup a proxy dont think u always have
to type in the proxy in first then go to there and type the site u want
too go to. :)It dont work like that once u have entered the proxy settings
in ya browser it will auto do the proxy for u all u have to do is surf the
net.(Setting up a http proxy descussed later)
3. Getting a http proxy
Http proxies are very easyly found on the net as there are many
commited Http proxy server's around that are free.
Ill give a list of some http proxies for your all sorry if your
country proxy isn't here just search on the net for (Http proxy)
and ull find one.
***Austria*** Port
cache02.netway.at :80
mail.ppl.co.at :8080
speth08.wu-wien.ac.at :8080
pong.ping.at :8080
***Australia***
proxy.gwbbs.net.au :80
chrome.one.net.au :8080
proxy.newave.net.au :8080
ws.edi.com.au :80
mimas.scu.edu.au :80
proxy.omcs.com.au :8080
jethro.meriden.pas.com.au:8080
albany.jrc.net.au :80
basil.acr.net.au :8080
***Belgium***
cache-mar.belbone.be :80
***Bulgaria***
conan.gocis.bg :8080
***Brazil***
200.250.14.5)ct-nt-02.cybertelecom.com.br :8080
sanan.com.br :8080
***Canada***
proxy.collegemv.qc.ca :8080
srvprx.cspaysbleuets.qc.ca :80
valliere.csvalliere.qc.ca :80
keeper.albertc.on.ca :8080
cproxy1.justice.gc.ca :80
proxy.cslouis-hemon.qc.ca :8080
gateway.kwantlen.bc.ca :80
***Switzerland***
cache1.worldcom.ch :8080
cache2.worldcom.ch :8080
cache3.worldcom.ch :8080
web-cache-2.cern.ch :80
proxy.span.ch :8080
gip-lausanne-nc.globalip.ch :80
gip-lausanne-cf2.globalip.ch :8080
gip-lausanne-cf1.globalip.ch :8080
proxy2.iso.ch :8080
proxy.iprolink.ch :80
***China***
proxy.szptt.net.cn :8080
***United States***
hpux.mesd.k12.or.us :8080
gatekeeper.ci.slc.ut.us :8080
episd.elpaso.k12.tx.us :8080
svc.logan.k12.ut.us :8001
proxy.eup.k12.mi.us :8080
svc.nues.k12.ut.us :8001
proxy.eup.k12.mi.us :8080
(207.78.252.100)oakweb.oak-web.washington-ch.oh.us :80
homnibus.nvc.cc.ca.us :80
et.mohave.cc.az.us :80
(ok id say i gave out enough if ya local country not there go search
the net and if cant find use another country one that is close to u)
4.How to secrure Http packets
Like i said before this is a normal http packet
( [Connect from MAx.mpd.com]
[206.14.13.32] (Mozilla/4.05 [en] (X11;I;Linux 2.0.34 i586) on December
2, 1998 at 14:34:45 )
Now to Make your ip and host anonymous to web browsing we are going to
use http proxy with ya browser.THis is done by going to ya options
and finding the info on proxy settings in thus put in all
avalable places in proxy setting etc.ftp,http,secruity,
Except leave sockets part blank THis isnt a socket proxy its a http
Now after setting up a proxy in the proxy settings and putting in the
port too.Our new packets will look like this.
( [Connect from The_proxies_host]
[The_proxies_ip] (Mozilla/4.05 [en] (X11;I;Linux 2.0.34 i586) on December
2, 1998 at 14:34:45 )
Now u might be thinking cool :) No longer have everdence of me on there
server but dam they know my o's and version of mozilla later on ill
descuse how to change that.U might also be thinking WOW now i can surf
100% secure on the net.U are not totally right.IF a hacker had a real
grunge on u.He has now the proxy u are using there ip/host
now if he wants to get your info that badly he would have to hack
the proxy server comapare the log time of the time u loged to the hacker's
site too the logs of your connection to the proxy server.THus is a real
big job and if pick a good proxy server they will be very secure from
attack's So your pritty much safe.
5.How to edit the o's and mozilla info send.
Ok if your using Ie this is how u would do it.
To see Original Settings
GOTO HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
User Agent = Mozilla/4.0 (compatible; MSIE 4.01; Windows 95; (Your Orginial Settings))
(Skip this Part here)
GOTO HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
ProductName = Microsoft Windows 95
Version = Windows 95
GOTO HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform
(Your Orignial Settings Here) = IEAK(Your Orignial Settings Here)
Example
GOTO HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform
Myth [Unix-Base] = IEAKMyth [Unix-Base]
*Note (this info on how to change the mozilla and version shown was
given to me from Myth i didn't make it.)
6.Getting a socket proxy.
Ok now socket proxies work like Http proxies the only diff is
socket proxies are used with programs like (icq,mirc) And the packets
are send through sockets not http.Getting a socket proxy is alot harder
because Socket proxy server's have to be dedicated to a sertain program
so its very limiting to the amount of user's he will get.
Http is always used its using the web everyone uses it so http proxies
are always going to be in need.
TO find a socket proxy u can search the net typing in (Socket proxy)
or try for sertain program's names like (Icq proxy).
Hopefully u will get one
socket proxies are useful as alot of attacks on user's are done
by kids with nukes,spring,ping,smurf,etc etc And thus will anoy a user
in mirc or from icq both these programs give any user possability to
get a user's ip/host.
thats why if u use these u will want a socket proxy.
Alot of people go why dont u just use ident or jizz or something
for mirc and icq.Well the reason u don't as there are expolits out
there to crash spoofed hosts/ip for programs like jizz and ident
a proxy is more stable way and more prevention then a spoofer program.
With these programs its explains once u get a socket proxy how to set
them up in them so i dont have to go and explain for u.Because its
different for all programs Socket is also used in web downloading/surfing
but not to worry u can find alot of socket proxies for web downloading/surfing
around.
7.How a socket proxy works.
I just explained it breifly in last topic.
Ill go into a bit more detail
see when ever u send or recive a file for a server/user
it has to send through a socket.Now when they do this it has to establish
a connection to your computer.Example if a connection
( established a connection on MAx.mpd.com port 1030 )
And thats not all it will log on the computer what day/year/time
u established a connection.This is another way hackers get info on u
Thats why u need a socket proxy.
8.Cookies.
Ok cookies are also apart of way info is send from your server/isp
to your computer cokies transmits info on webpages visited by u
info on what u have downloaded and so forth with a ip/host and day/
year/time .Now hackers can use this hack for 2 reasons
1.Get info they need to attack u
2.Be able to see all places u have been/done on web/send files through
to your computer without u even knowing it.
Now With all browsers now u can stop even limit cookies from the oriene
of your server.Go to your options u will find something on cookies
there in ya browser.
Now this is very limiting so if ya a linux/unix user there is a nice
little program i know that will go that few steps furture.
Visit. (http://www.lne.com/ericm/cookie_jar/)
THis program called "Cookie jar" alows u to limit sites from your computer
limit if u get cookies from that site/server its goes the extra steps
u need.
9.Final note.
Rember dont use this secruity for hacking almost all proxy server's
will give the cops/server's your info if they find u tryed to hack with
there anonymous proxy settings.Only use this to stops attacks against u
and your server.
Rember.Have fun
(c) 1998 MAx [4d5044]
Running Azureus as a service
Let's say you have a Windows 2000 box, or something along those lines, and you want to run Azureus as a service. You're usually not seated at the machine, nor logged on, but you'd like to take advantage of it.
There are several problems:
* The user interface which will close whenever you log off. Check out ConsoleUI and you'll find how to run Azureus from the commandline.
* Then, there's the problem of running it as a service. Check out the Microsoft knowledge base for a description on how to run anything as a service.
* You'll then find that whenever someone logs out of the computer, Azureus will stop. That's because the Java VM is trapping some signals like WM_ENDSESSION, and exits gracefully. You can tell Java to ignore it, with the switch -Xrs, as documented by Sun.
So to solve all problems you can create an azureus.bat file that will invoke the ConsoleUI version, with the -Xrs parameter. You have your Azureus running constantly.
There are several problems:
* The user interface which will close whenever you log off. Check out ConsoleUI and you'll find how to run Azureus from the commandline.
* Then, there's the problem of running it as a service. Check out the Microsoft knowledge base for a description on how to run anything as a service.
* You'll then find that whenever someone logs out of the computer, Azureus will stop. That's because the Java VM is trapping some signals like WM_ENDSESSION, and exits gracefully. You can tell Java to ignore it, with the switch -Xrs, as documented by Sun.
So to solve all problems you can create an azureus.bat file that will invoke the ConsoleUI version, with the -Xrs parameter. You have your Azureus running constantly.
søndag 21. september 2008
Torrents Open Registrations Checker
Some Torrent/Torrent Tracker Websites opens and closes the registrations within a short period.
This application will check the Torrent/Tracker Sites for Open/Closed Registrations.
Screenshots
* Fast checking.
* Customizable Timing.
* Hotkey Support. - Use Ctrl+A to Select All.
- Use Ctrl+Z to Deselct All.
- Use Delete Button to delete the selected entry.
- Double Click on Entry in List to Open the Websites Registration Page.
- Press Enter to directly start searching.
- Press F1 to open this readme file.
- Press F5 to Refresh the list.
* Comprehensive Toolbar and Menubar.
* Press on Start Search button for manual searching or Select The Timer Button for automatic searching.
* Simple Text File Operations so fast in process.
* List Sorting.
* Automatic Update Notification at Start.
Current Version: 1.26
This application will check the Torrent/Tracker Sites for Open/Closed Registrations.
Screenshots
* Fast checking.
* Customizable Timing.
* Hotkey Support. - Use Ctrl+A to Select All.
- Use Ctrl+Z to Deselct All.
- Use Delete Button to delete the selected entry.
- Double Click on Entry in List to Open the Websites Registration Page.
- Press Enter to directly start searching.
- Press F1 to open this readme file.
- Press F5 to Refresh the list.
* Comprehensive Toolbar and Menubar.
* Press on Start Search button for manual searching or Select The Timer Button for automatic searching.
* Simple Text File Operations so fast in process.
* List Sorting.
* Automatic Update Notification at Start.
Current Version: 1.26
Speed Up Your Torrent Downloads, Get a Seedbox
A seedbox is BitTorrent jargon for a dedicated high-speed server, used exclusively for torrent transfers. With a seedbox you’ll be able to download and upload faster than you ever imagined. Additionally, you can manage your torrents through a browser from anywhere, anytime.
Seedboxes are not something every BitTorrent user wants or needs. They are mostly for people who share a lot of files, and those who want to keep a good ratio on one of the elite private BitTorrent trackers.
The downside to having a seedbox is of course that they are not free. To some this isn’t a problem, “I pay for my Internet connection, so why not pay a few extra bucks to get the best out of it,” is an argument we often hear. Others, however, are satisfied with the speeds they get, and don’t want to pay extra for BitTorrent traffic.
So why should people use these seedboxes? What are the benefits? Here are some of the advantages.
1. Competition.
Whether you’re aware of it or not, users on private trackers are extremely competitive. No matter how many torrents you have seeding, or how you’ve managed to tweak the BitTorrent client settings, there’s just no competing with the uploading power of a seedbox. With many elite private trackers, a seedbox is not just recommended, they’re almost essential for account longevity.
2. Speed.
Most seedboxes are on 100Mbit lines, which makes them really fast. Unquestionably faster than your home Internet access - unless you live in Japan or Sweden, that is. You can sit back, relax and watch in amazement at how fast the torrents finish. Gigabyte files will be downloaded in minutes, practically without limitations. Of course, you’ll still be limited to the speed of your home connection when you want to transfer these files from the server to your computer.
3. Uploading.
Some users of private trackers are less concerned about the downloading, and more about seeding. Good ratios are crucial to a healthy membership - without them, the account will wither away and die. With a seedbox, your ratio will be 1:1 within minutes, not days. 10:1 ratios are not uncommon within the first hour for popular torrents. No more do you have to seed the torrent for weeks just to stay in the good graces with your private tracker. You’ll be free to delete seeding torrents, and replace them with other ones.
4. No more throttling and bandwidth limiting ISPs
ISPs like Comcast are known to throttle your BitTorrent traffic, and they will soon introduce a monthly bandwidth limit of 100GB. With a seedbox you can bypass these limitations. Your seedbox traffic is not counted towards your ISP account stats and won’t be throttled. The only time it becomes ‘your’ traffic is when you choose to download the files from a finished torrent to your home PC, and uploading torrent traffic will not eat into your cap.
5. They’re Secure & Safe
With a seedbox, you don’t even need to use a BitTorrent client on your home computer - your worries about the RIAA or MPAA spying on you are over. No more DMCA notices or warning letters from your ISP - and more importantly, no lawsuit letters will be coming either.
Where to get a Seedbox…
Seedboxes aren’t cheap, but they don’t have to break the bank. Many services now offer a ‘torrent-specific’ seedbox packages that are great for entry-level users, and include the ‘TorrentFlux‘ interface for easy setup and torrent management. Here are some affordable TorrentFlux hosting solutions:
# www.seedboxhosting.com
# http://wewillhostit.com
# www.w00tsite.com
# www.leasetorrent.com
Seedboxes are not something every BitTorrent user wants or needs. They are mostly for people who share a lot of files, and those who want to keep a good ratio on one of the elite private BitTorrent trackers.
The downside to having a seedbox is of course that they are not free. To some this isn’t a problem, “I pay for my Internet connection, so why not pay a few extra bucks to get the best out of it,” is an argument we often hear. Others, however, are satisfied with the speeds they get, and don’t want to pay extra for BitTorrent traffic.
So why should people use these seedboxes? What are the benefits? Here are some of the advantages.
1. Competition.
Whether you’re aware of it or not, users on private trackers are extremely competitive. No matter how many torrents you have seeding, or how you’ve managed to tweak the BitTorrent client settings, there’s just no competing with the uploading power of a seedbox. With many elite private trackers, a seedbox is not just recommended, they’re almost essential for account longevity.
2. Speed.
Most seedboxes are on 100Mbit lines, which makes them really fast. Unquestionably faster than your home Internet access - unless you live in Japan or Sweden, that is. You can sit back, relax and watch in amazement at how fast the torrents finish. Gigabyte files will be downloaded in minutes, practically without limitations. Of course, you’ll still be limited to the speed of your home connection when you want to transfer these files from the server to your computer.
3. Uploading.
Some users of private trackers are less concerned about the downloading, and more about seeding. Good ratios are crucial to a healthy membership - without them, the account will wither away and die. With a seedbox, your ratio will be 1:1 within minutes, not days. 10:1 ratios are not uncommon within the first hour for popular torrents. No more do you have to seed the torrent for weeks just to stay in the good graces with your private tracker. You’ll be free to delete seeding torrents, and replace them with other ones.
4. No more throttling and bandwidth limiting ISPs
ISPs like Comcast are known to throttle your BitTorrent traffic, and they will soon introduce a monthly bandwidth limit of 100GB. With a seedbox you can bypass these limitations. Your seedbox traffic is not counted towards your ISP account stats and won’t be throttled. The only time it becomes ‘your’ traffic is when you choose to download the files from a finished torrent to your home PC, and uploading torrent traffic will not eat into your cap.
5. They’re Secure & Safe
With a seedbox, you don’t even need to use a BitTorrent client on your home computer - your worries about the RIAA or MPAA spying on you are over. No more DMCA notices or warning letters from your ISP - and more importantly, no lawsuit letters will be coming either.
Where to get a Seedbox…
Seedboxes aren’t cheap, but they don’t have to break the bank. Many services now offer a ‘torrent-specific’ seedbox packages that are great for entry-level users, and include the ‘TorrentFlux‘ interface for easy setup and torrent management. Here are some affordable TorrentFlux hosting solutions:
# www.seedboxhosting.com
# http://wewillhostit.com
# www.w00tsite.com
# www.leasetorrent.com
Speed Up Your Torrents
BitTorrent is without a doubt the best way to share large files, as long as you follow some basic rules, that is. We asked one of the leading BitTorrent client developers for some tips and tricks so you can speed up your BitTorrent downloads.
There are several ways to optimize your BitTorrent download speeds. One of the easiest ways is to join a private torrent tracker, but there are others.
Since there’s always a lot of debate about what works and what doesn’t, we decided to ask an expert to share his thoughts with us. Olivier Chalouhi, developer and CTO of Vuze (formerly known as Azureus) was kind enough to give us some of his own tips and tricks. Since Olivier was the person who initiated the Azureus Open Source project in 2003, which went on to create one of the most popular BitTorrent clients ever, if anyone knows how to get the best out of your torrent client, he does.
Here are some of Olivier’s tips for optimizing your torrent download speeds. There tips work with every BitTorrent client, except for the last one.
1. Seed.
Downloading speeds will be sub-optimal for everyone unless everyone plays their part and seeds. Private tracker sites are a great example of how the overall speed of the swarm increases when everyone is seeding and downloading in equal measure. So, play your part in seeding and tell others to as well.
2. Be connectable.
Make sure you’re not “firewalled” by opening up your incoming ports or by enabling UPnP in your router, otherwise you’ll be leaving bandwidth on the table.
3. Manage your upload speed.
It is all about striking a balance. You don’t want the upload speed to be too high, nor do you want it to be too low. Ideally you want to set your upload speed to be 80% of the maximum possible line speed.
TF note: Want an easy life? Try this handy settings calculator, works for all clients
4. Select the right torrents.
Your download will be faster if you choose to download a torrent where there is a good balance of seeds and peers. For instance, Vuze ranks its search results according to the number of seeds and peers to make this easier.
5. Be realistic.
Check the swarm average and if you’re already above average, then you just need to be patient. If you’re below average, go back and check some of these other things I’ve mentioned.
6. Get a Friend Boost.
I wouldn’t be a Vuze developer if I didn’t give a plug for the Friend Boost feature we recently developed :). When you create a network of Friends on Vuze, you agree to seed content to each other on a preferential basis. That is, if one of your friends has a torrent that you want, you will be able to directly use a portion of their bandwidth to get it. In most cases this will increase your download speed.
Obviously, ways in which to actually implement some of these tips will differ from client to client.
Written by Ernesto
There are several ways to optimize your BitTorrent download speeds. One of the easiest ways is to join a private torrent tracker, but there are others.
Since there’s always a lot of debate about what works and what doesn’t, we decided to ask an expert to share his thoughts with us. Olivier Chalouhi, developer and CTO of Vuze (formerly known as Azureus) was kind enough to give us some of his own tips and tricks. Since Olivier was the person who initiated the Azureus Open Source project in 2003, which went on to create one of the most popular BitTorrent clients ever, if anyone knows how to get the best out of your torrent client, he does.
Here are some of Olivier’s tips for optimizing your torrent download speeds. There tips work with every BitTorrent client, except for the last one.
1. Seed.
Downloading speeds will be sub-optimal for everyone unless everyone plays their part and seeds. Private tracker sites are a great example of how the overall speed of the swarm increases when everyone is seeding and downloading in equal measure. So, play your part in seeding and tell others to as well.
2. Be connectable.
Make sure you’re not “firewalled” by opening up your incoming ports or by enabling UPnP in your router, otherwise you’ll be leaving bandwidth on the table.
3. Manage your upload speed.
It is all about striking a balance. You don’t want the upload speed to be too high, nor do you want it to be too low. Ideally you want to set your upload speed to be 80% of the maximum possible line speed.
TF note: Want an easy life? Try this handy settings calculator, works for all clients
4. Select the right torrents.
Your download will be faster if you choose to download a torrent where there is a good balance of seeds and peers. For instance, Vuze ranks its search results according to the number of seeds and peers to make this easier.
5. Be realistic.
Check the swarm average and if you’re already above average, then you just need to be patient. If you’re below average, go back and check some of these other things I’ve mentioned.
6. Get a Friend Boost.
I wouldn’t be a Vuze developer if I didn’t give a plug for the Friend Boost feature we recently developed :). When you create a network of Friends on Vuze, you agree to seed content to each other on a preferential basis. That is, if one of your friends has a torrent that you want, you will be able to directly use a portion of their bandwidth to get it. In most cases this will increase your download speed.
Obviously, ways in which to actually implement some of these tips will differ from client to client.
Written by Ernesto
Abonner på:
Innlegg (Atom)