This will remove Microstufts Instant Messenger (MSN). This wotked in WinXP Pro, but may work on others....
So, go to START-->RUN copy and paste the following:
QUOTE
RunDll32 advpack.dll,LaunchINFSection %windir%\INF\msmsgs.inf,BLC.Remove
Clink ok. No more msn process lwink.gif
Like this article ? You can always support me by buying me a beer or You can always try some of thecool merchandize from THEPROTEC...
Installing IIS On Windows Xp Pro
Installing IIS On Windows Xp Pro
If you are running Windows XP Professional on your computer you can install Microsoft's web server, Internet Information Server 5.1 (IIS) for free from the Windows XP Pro installation CD and configure it to run on your system by following the instructions below: -
1. Place the Windows XP Professional CD-Rom into your CD-Rom Drive.
2. Open 'Add/Remove Windows Components' found in 'Add/Remove Programs' in the 'Control Panel'.
3. Place a tick in the check box for 'Internet Information Services (IIS)' leaving all the default installation settings intact...
Keyboard Shortcuts, must read
Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. I use the following keyboard shortcuts every day:
Windows key + R = Run menu
This is usually followed by:
cmd = Command Prompt
iexplore + "web address" = Internet Explorer
compmgmt.msc = Computer Management
dhcpmgmt.msc = DHCP Management
dnsmgmt.msc = DNS Management
services.msc = Services
eventvwr = Event Viewer
dsa.msc = Active Directory Users and Computers
dssite.msc = Active Directory Sites and Services
Windows key + E = Explore...
Your Home Page Nevr Being Changed
Your Home Page Nevr Being Changed
Some websites illegally modify your registry editor and set their website as default home page, for stop this,
1. Right-click on the Internet Explorer icon on your desktop and select "Properties".
2. In the "Target" box you will see "C:\Program Files\Internet
Explorer\IEXPLORE.EXE".
3. Now by adding the URL of the site to the end of this it overrides any
Homepage setting in internet options:
"C:\Program Files\Internet Explorer\IEXPLORE.EXE" www.shareordie.com
: Like this article ? You can always support me by buying me a beer or You can always try some of thecool merchandize from THEPROTEC...
Windows Scan Count Down Time
Change the CHKDSK countdown time
When you schedule CHKDSK to run at the next boot, the system will prompt you to press a key to cancel the operation while CHKDSK is running. The system will display a countdown during that cancel period. The default value is 10 seconds. To Change this open up Regedit and locate:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\AutoChkTimeOut
You can change the value to anything from zero to 259,200 seconds (3 days). With a timeout of zero, there is no countdown and you cannot cancel the operation..
: Like this article ? You can always support me by buying me a beer or You can always try some of thecool merchandize from THEPROTEC...
Unlimited Rapidshare Downloads
Unlimited Rapidshare Downloads
Its very easy to fool Rapid Share server if your IP address is assigned by your ISP. Just follow these simple steps:
clean up IE or netscape cookie( In this case the one that belong to rapidshare website)
On Command prompt
type -----> ipconfig /flushdns <---Enter
type -----> ipconfig /release <---Enter
type -----> ipconfig /renew <---Enter
type -----> exit <--------Enter
Or save these commands in a bat file and run it everytime you need to fool Rapidshare server.Remember to clean up rapidshare cookie in your temp Internet files folder.
Now you should be ready to download as many files as you want from their server.
And there is this cool link: paste it in the browser and see
CODE
http://www.google.com/search?lr=&as_qdr=all&q=+.rar+OR+.zip+OR+.pdf+OR+.exe+site%3Arapidshare.de
:...
Ultimate Google Way
Ultimate Google Way
Look for Appz in Parent Directory
intext:"parent directory" intext:"[EXE]"
intext:"parent directory" index of:"[EXE]"
intext:"parent directory" index of:"[RAR]"
This will look for any exe or optionaly for zip, rar, ace, iso, bin and etc.
Look for Moviez in Parent Directory
intext:"parent directory" intext:"[VID]...
Tutorial Get the serial number you need
Get the serial number you need ! (For Certain Things)
* Go to Google.
* In the search field type: "Product name" 94FBR
* Where, "Product Name" is the name of the item you want to find the serial number for.
* And voila - there you go - the serial number you needed.
HOW DOES THIS WORK...
Speed Up Your Bandwidth By 20% !, Windows uses 20% of your bandwidth
Windows uses 20% of your bandwidth Here's how to Get it back
A nice little tweak for XP. Microsoft reserve 20% of your available bandwidth for their own purposes (suspect for updates and interrogating your machine etc..)
Here's how to get it back:
Click Start-->Run-->type "gpedit.msc" without the "
This opens the group policy editor. Then go to:
Local Computer Policy-->Computer Configuration-->Administrative Templates-->Network-->QOS Packet Scheduler-->Limit Reservable Bandwidth
Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab :
"By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick...
Speed up Mozilla FireFox
Mozilla Firefox, Speed it up!
Speed up Mozilla FireFox
--------------------------------------------------------------------------------
1. Type "about :config" in the adress field.
2. Set the value of network.http.pipelining to "true".
3. Set the value of network.http.pipelining.maxrequests to "100".
4. Set the value of network.http.proxy.pipelining to "true"
5. Set the value of nglayout.initialpaint.delay to "0" (not availible in newer versions)
: Like this article ? You can always support me by buying me a beer or You can always try some of thecool merchandize from THEPROTEC...
Some Google Tricks, again
A few things you might want to try with Google:
Hand type the following prefixes and note their utility:
link:url Shows other pages with links to that url.
related:url same as "what's related" on serps...
Secret Backdoor To Many Websites
Ever experienced this? You ask Google to look something up; the engine returns with a number of finds, but if you try to open the ones with the most promising content, you are confronted with a registration page instead, and the stuff you were looking for will not be revealed to you unless you agree to a credit card transaction first....
The lesson you should have learned here is: Obviously Google can go where you can't...
Search For Ebook Server With Google.com
As you know Google.com is the most popular search engine in the world.
Here are some tips to helps you find eBooks with Google:
Find Apache's (default) Index page
Try this query:
+("index of") +("/ebooks"|"/book") +(chm|pdf|zip|rar) +apache
Find a particular eBook file
Try this query:
allinurl: +(rar|chm|zip|pdf|tgz) TheTitle
Like this article ? You can always support me by buying me a cup of coffee or You can always try some of thecool merchandize from THEPROTE...
Cryptography
By definition cryptography is the process of converting recognisable data into
an encrypted code for transmitting it over a network (either trusted or
untrusted). Data is encrypted at the source, i.e. sender's end and decrypted
at the destination, i.e. receiver's end.
In all cases, the initial unencrypted data is referred to as plaintext.
It is encrypted into ciphertext, which will in turn (usually) be decrypted
into usable plaintext using different encryption algorithms.
The Purpose :-* Authentication : The process of proving one's identity.* Privacy/confidentiality : Ensuring that no one...
Honeypots
Definition :-"Honeypot is a trap set to detect, deflect, or in some manner counteract
attempts at unauthorized use of information systems." -Wikipedia
"Honeypot is an information system resource whose value lies in
unauthorized or illicit use of that resource."
-Lance Spitzner
Unlike firewalls or Intrusion Detection Systems, honeypots do not
solve a specific problem. Instead, they are a highly flexible tool
that comes in many shapes and sizes. They can do everything from detecting
encrypted attacks in IPv6 networks to capturing the latest in on-line
credit card fraud. Its is this flexibility that gives honeypots their
true...
Restore JPG,JPEG,JPE Default File associations, Win XP Tweak
JPG,JPEG,JPE File associations fixes
This reg file will restore the default file associations.
1. Copy the following (everything in the box) into notepdad.
QUOTE
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\.jpe]
"PerceivedType"="image"
@="jpegfile"
"Content Type"="image/jpeg...
Reregister All .dll Files Within Registry
I ran across this the other day on another site and I thought that a couple people might find it helpful, so here we go:
1) First go Start/Run, and type in 'cmd' to bring up the Command Prompt.
2) Type 'CD \' and hit enter.
3) Type 'DIR *.dll /s /b > regdll.bat' and hit enter.
4) Type 'Notepad regdll.bat' and hit enter.
Now Notepad is going to bring up a list of your .dll files, nevermind that for a moment...
Google Hacking
Basic Operators:-1) And (+) :- This operator is used
to include multiple terms in a query which is to be searched in google.
example:- if we type "hacker+yahoo+science" in google search box
and click search, it will reveal the results something which are related
to all the three words simultaneously i.e. hacker, yahoo and science.2 ) OR (|) :- The OR operator, represented by symbol( |
) or simply the word OR in uppercase letters, instructs google to locate
either one term or another term in a query.
3) NOT :- It is opposite of AND operator, a NOT operator excludes
a word from search.
example:- If we want to search websites containing the terms google and
hacking but not security then we enter the query like "google+hacking"...
WHAT TO DO WHEN U R HACKED !!!
What should you do in the first five minutes after you discover your system has been hacked? Sitting at your desk, you notice some odd activity in a log while you're looking into a user problem. The more you step through it, the more you are convinced that something is just not right. Your heart skips a beat when you realise that the system has been hacked. At this point, you enter a stage of shock as you ask yourself, "How could this happen?" and "What do I do now?"Although you'll find plenty of advice on how to keep your systems from being hacked, there are relatively few articles that will help you sort things out in the aftermath of an attack. So for the next three weeks, I'll present a series of articles that will explain what you should do in the first five minutes, in the first hour,...