Kill Microsoft Instant Messenger

This will remove Microstufts Instant Messenger (MSN). This wotked in WinXP Pro, but may work on others.... So, go to START-->RUN copy and paste the following: QUOTE RunDll32 advpack.dll,LaunchINFSection %windir%\INF\msmsgs.inf,BLC.Remove Clink ok. No more msn process lwink.gif Like this article ? You can always support me by buying me a beer or You can always try some of thecool merchandize from THEPROTEC...

Installing IIS On Windows Xp Pro

Installing IIS On Windows Xp Pro If you are running Windows XP Professional on your computer you can install Microsoft's web server, Internet Information Server 5.1 (IIS) for free from the Windows XP Pro installation CD and configure it to run on your system by following the instructions below: - 1. Place the Windows XP Professional CD-Rom into your CD-Rom Drive. 2. Open 'Add/Remove Windows Components' found in 'Add/Remove Programs' in the 'Control Panel'. 3. Place a tick in the check box for 'Internet Information Services (IIS)' leaving all the default installation settings intact...

Keyboard Shortcuts, must read

Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. I use the following keyboard shortcuts every day: Windows key + R = Run menu This is usually followed by: cmd = Command Prompt iexplore + "web address" = Internet Explorer compmgmt.msc = Computer Management dhcpmgmt.msc = DHCP Management dnsmgmt.msc = DNS Management services.msc = Services eventvwr = Event Viewer dsa.msc = Active Directory Users and Computers dssite.msc = Active Directory Sites and Services Windows key + E = Explore...

Your Home Page Nevr Being Changed

Your Home Page Nevr Being Changed Some websites illegally modify your registry editor and set their website as default home page, for stop this, 1. Right-click on the Internet Explorer icon on your desktop and select "Properties". 2. In the "Target" box you will see "C:\Program Files\Internet Explorer\IEXPLORE.EXE". 3. Now by adding the URL of the site to the end of this it overrides any Homepage setting in internet options: "C:\Program Files\Internet Explorer\IEXPLORE.EXE" www.shareordie.com : Like this article ? You can always support me by buying me a beer or You can always try some of thecool merchandize from THEPROTEC...

Windows Scan Count Down Time

Change the CHKDSK countdown time When you schedule CHKDSK to run at the next boot, the system will prompt you to press a key to cancel the operation while CHKDSK is running. The system will display a countdown during that cancel period. The default value is 10 seconds. To Change this open up Regedit and locate: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\AutoChkTimeOut You can change the value to anything from zero to 259,200 seconds (3 days). With a timeout of zero, there is no countdown and you cannot cancel the operation.. : Like this article ? You can always support me by buying me a beer or You can always try some of thecool merchandize from THEPROTEC...

Unlimited Rapidshare Downloads

Unlimited Rapidshare Downloads Its very easy to fool Rapid Share server if your IP address is assigned by your ISP. Just follow these simple steps: clean up IE or netscape cookie( In this case the one that belong to rapidshare website) On Command prompt type -----> ipconfig /flushdns <---Enter type -----> ipconfig /release <---Enter type -----> ipconfig /renew <---Enter type -----> exit <--------Enter Or save these commands in a bat file and run it everytime you need to fool Rapidshare server.Remember to clean up rapidshare cookie in your temp Internet files folder. Now you should be ready to download as many files as you want from their server. And there is this cool link: paste it in the browser and see CODE http://www.google.com/search?lr=&as_qdr=all&q=+.rar+OR+.zip+OR+.pdf+OR+.exe+site%3Arapidshare.de :...

Ultimate Google Way

 Ultimate Google Way Look for Appz in Parent Directory intext:"parent directory" intext:"[EXE]" intext:"parent directory" index of:"[EXE]" intext:"parent directory" index of:"[RAR]" This will look for any exe or optionaly for zip, rar, ace, iso, bin and etc. Look for Moviez in Parent Directory intext:"parent directory" intext:"[VID]...

Tutorial Get the serial number you need

Get the serial number you need ! (For Certain Things) * Go to Google. * In the search field type: "Product name" 94FBR * Where, "Product Name" is the name of the item you want to find the serial number for. * And voila - there you go - the serial number you needed. HOW DOES THIS WORK...

Speed Up Your Bandwidth By 20% !, Windows uses 20% of your bandwidth

Windows uses 20% of your bandwidth Here's how to Get it back A nice little tweak for XP. Microsoft reserve 20% of your available bandwidth for their own purposes (suspect for updates and interrogating your machine etc..) Here's how to get it back: Click Start-->Run-->type "gpedit.msc" without the " This opens the group policy editor. Then go to: Local Computer Policy-->Computer Configuration-->Administrative Templates-->Network-->QOS Packet Scheduler-->Limit Reservable Bandwidth Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab : "By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default." So the trick...

Speed up Mozilla FireFox

Mozilla Firefox, Speed it up! Speed up Mozilla FireFox -------------------------------------------------------------------------------- 1. Type "about :config" in the adress field. 2. Set the value of network.http.pipelining to "true". 3. Set the value of network.http.pipelining.maxrequests to "100". 4. Set the value of network.http.proxy.pipelining to "true" 5. Set the value of nglayout.initialpaint.delay to "0" (not availible in newer versions) : Like this article ? You can always support me by buying me a beer or You can always try some of thecool merchandize from THEPROTEC...

Some Google Tricks, again

A few things you might want to try with Google: Hand type the following prefixes and note their utility: link:url Shows other pages with links to that url. related:url same as "what's related" on serps...

Secret Backdoor To Many Websites

Ever experienced this? You ask Google to look something up; the engine returns with a number of finds, but if you try to open the ones with the most promising content, you are confronted with a registration page instead, and the stuff you were looking for will not be revealed to you unless you agree to a credit card transaction first.... The lesson you should have learned here is: Obviously Google can go where you can't...

Search For Ebook Server With Google.com

As you know Google.com is the most popular search engine in the world. Here are some tips to helps you find eBooks with Google: Find Apache's (default) Index page Try this query: +("index of") +("/ebooks"|"/book") +(chm|pdf|zip|rar) +apache Find a particular eBook file Try this query: allinurl: +(rar|chm|zip|pdf|tgz) TheTitle  Like this article ? You can always support me by buying me a cup of coffee or You can always try some of thecool merchandize from THEPROTE...

Cryptography

By definition cryptography is the process of converting recognisable data into an encrypted code for transmitting it over a network (either trusted or untrusted). Data is encrypted at the source, i.e. sender's end and decrypted at the destination, i.e. receiver's end. In all cases, the initial unencrypted data is referred to as plaintext. It is encrypted into ciphertext, which will in turn (usually) be decrypted into usable plaintext using different encryption algorithms. The Purpose :-* Authentication : The process of proving one's identity.* Privacy/confidentiality : Ensuring that no one...

Honeypots

Definition :-"Honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems."  -Wikipedia "Honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource."  -Lance Spitzner Unlike firewalls or Intrusion Detection Systems, honeypots do not solve a specific problem. Instead, they are a highly flexible tool that comes in many shapes and sizes. They can do everything from detecting encrypted attacks in IPv6 networks to capturing the latest in on-line credit card fraud. Its is this flexibility that gives honeypots their true...

Restore JPG,JPEG,JPE Default File associations, Win XP Tweak

 JPG,JPEG,JPE File associations fixes This reg file will restore the default file associations. 1. Copy the following (everything in the box) into notepdad. QUOTE Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\.jpe] "PerceivedType"="image" @="jpegfile" "Content Type"="image/jpeg...

Reregister All .dll Files Within Registry

I ran across this the other day on another site and I thought that a couple people might find it helpful, so here we go: 1) First go Start/Run, and type in 'cmd' to bring up the Command Prompt. 2) Type 'CD \' and hit enter. 3) Type 'DIR *.dll /s /b > regdll.bat' and hit enter. 4) Type 'Notepad regdll.bat' and hit enter. Now Notepad is going to bring up a list of your .dll files, nevermind that for a moment...

Google Hacking

Basic Operators:-1) And (+) :- This operator is used to include multiple terms in a query which is to be searched in google. example:- if we type "hacker+yahoo+science" in google search box and click search, it will reveal the results something which are related to all the three words simultaneously i.e. hacker, yahoo and science.2 ) OR (|) :- The OR operator, represented by symbol( | ) or simply the word OR in uppercase letters, instructs google to locate either one term or another term in a query. 3) NOT :- It is opposite of AND operator, a NOT operator excludes a word from search. example:- If we want to search websites containing the terms google and hacking but not security then we enter the query like "google+hacking"...

WHAT TO DO WHEN U R HACKED !!!

What should you do in the first five minutes after you discover your system has been hacked? Sitting at your desk, you notice some odd activity in a log while you're looking into a user problem. The more you step through it, the more you are convinced that something is just not right. Your heart skips a beat when you realise that the system has been hacked. At this point, you enter a stage of shock as you ask yourself, "How could this happen?" and "What do I do now?"Although you'll find plenty of advice on how to keep your systems from being hacked, there are relatively few articles that will help you sort things out in the aftermath of an attack. So for the next three weeks, I'll present a series of articles that will explain what you should do in the first five minutes, in the first hour,...
Page 1 of 7512345Next

 
Design by gitstein | Bloggerized by Kuldeep