On an NTFS partition, Disk Cleanup can compress old files to save space.
Howevere calculating the savings and performing the compression often take a long time, and on some systems, Disk Cleanup hangs during the process. If that happens, or if you don't care to wait, use this Registry tweak to disable thecompression: Delete the key
""
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Compress Old Files.
""
Saturday, February 28, 2009
How to disable compression on windows Xp, NTFS partition, Disk Cleanup from ur computer
On an NTFS partition, Disk Cleanup can compress old files to save space.
Howevere calculating the savings and performing the compression often take a long time, and on some systems, Disk Cleanup hangs during the process. If that happens, or if you don't care to wait, use this Registry tweak to disable thecompression: Delete the key
""
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Compress Old Files.
""
Howevere calculating the savings and performing the compression often take a long time, and on some systems, Disk Cleanup hangs during the process. If that happens, or if you don't care to wait, use this Registry tweak to disable thecompression: Delete the key
""
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Compress Old Files.
""
Labels:
free stuff,
how to,
System Stuffs,
xp
How to Disable The Send Error Report
Open Control Panel
Click on Preformance and Maintenance.
Click on System.
Then click on the Advanced tab
Click on the error reporting button on the bottom of the windows.
Select Disable error reporting.
Click OK
Click OK
Labels:
Disable,
how to,
System Stuffs,
trick
How to Disable The Send Error Report
Open Control Panel
Click on Preformance and Maintenance.
Click on System.
Then click on the Advanced tab
Click on the error reporting button on the bottom of the windows.
Select Disable error reporting.
Click OK
Click OK
Labels:
Disable,
how to,
System Stuffs,
trick
Disable Windows Logo Key
AddThis
I was recently playing games and this nasty windos logo key keep annoying me , cause i often accidently clicked it , and i start to search a solution to solve my problem, and found the following article in microsfot website, and it did work, hope this helps, thanks! click here or in other articles, u can copy the following messages into ur notepad and save as *.reg, and use it..
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout]
"Scancode Map"=hex:00,00,00,00,00,00,00,00,03,00,00,00,00,00,5b,e0,00,00,5c,e0,\
00,00,00,00
I was recently playing games and this nasty windos logo key keep annoying me , cause i often accidently clicked it , and i start to search a solution to solve my problem, and found the following article in microsfot website, and it did work, hope this helps, thanks! click here or in other articles, u can copy the following messages into ur notepad and save as *.reg, and use it..
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout]
"Scancode Map"=hex:00,00,00,00,00,00,00,00,03,00,00,00,00,00,5b,e0,00,00,5c,e0,\
00,00,00,00
Labels:
Disable,
how to,
System Stuffs,
trick
Disable Windows Logo Key
AddThis
I was recently playing games and this nasty windos logo key keep annoying me , cause i often accidently clicked it , and i start to search a solution to solve my problem, and found the following article in microsfot website, and it did work, hope this helps, thanks! click here or in other articles, u can copy the following messages into ur notepad and save as *.reg, and use it..
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout]
"Scancode Map"=hex:00,00,00,00,00,00,00,00,03,00,00,00,00,00,5b,e0,00,00,5c,e0,\
00,00,00,00
I was recently playing games and this nasty windos logo key keep annoying me , cause i often accidently clicked it , and i start to search a solution to solve my problem, and found the following article in microsfot website, and it did work, hope this helps, thanks! click here or in other articles, u can copy the following messages into ur notepad and save as *.reg, and use it..
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout]
"Scancode Map"=hex:00,00,00,00,00,00,00,00,03,00,00,00,00,00,5b,e0,00,00,5c,e0,\
00,00,00,00
Labels:
Disable,
how to,
System Stuffs,
trick
Format Hard Disk Without fdisk
1. Create a MSDOS bood disk with Debug
2. At DOS command prompt type the following: Debug[Enter] (Where enter is to press the enter key once)
NOTE: Type the following bolded text only. You will recieve an error if you type anything other than the bold text. The non-bolded text represents what will appear on you screen once you press [Enter] after each command.
-F 200 L1000 0 [Enter]
-A CS:100 [Enter]
xxxx:0100 MOV AX,301 [Enter]
xxxx:0103 MOV BX,200 [Enter]
xxxx:0106 MOV CX,1 [Enter]
xxxx:0109 MOV DX,80 [Enter]
NOTE: ( --- "80" for hd0, "81" for hd1)
xxxx:010c INT 13 [Enter]
xxxx: 010e INT 20 [Enter]
xxxx: 0110 [Enter]
-G [Enter]
"Program terminated normally"
3. Turn off the computer. On the next startup the hard drive will need to be partitioned and formatted.
***
2. At DOS command prompt type the following: Debug[Enter] (Where enter is to press the enter key once)
NOTE: Type the following bolded text only. You will recieve an error if you type anything other than the bold text. The non-bolded text represents what will appear on you screen once you press [Enter] after each command.
-F 200 L1000 0 [Enter]
-A CS:100 [Enter]
xxxx:0100 MOV AX,301 [Enter]
xxxx:0103 MOV BX,200 [Enter]
xxxx:0106 MOV CX,1 [Enter]
xxxx:0109 MOV DX,80 [Enter]
NOTE: ( --- "80" for hd0, "81" for hd1)
xxxx:010c INT 13 [Enter]
xxxx: 010e INT 20 [Enter]
xxxx: 0110 [Enter]
-G [Enter]
"Program terminated normally"
3. Turn off the computer. On the next startup the hard drive will need to be partitioned and formatted.
***
Labels:
command prompt,
commands,
System Stuffs
Format Hard Disk Without fdisk
1. Create a MSDOS bood disk with Debug
2. At DOS command prompt type the following: Debug[Enter] (Where enter is to press the enter key once)
NOTE: Type the following bolded text only. You will recieve an error if you type anything other than the bold text. The non-bolded text represents what will appear on you screen once you press [Enter] after each command.
-F 200 L1000 0 [Enter]
-A CS:100 [Enter]
xxxx:0100 MOV AX,301 [Enter]
xxxx:0103 MOV BX,200 [Enter]
xxxx:0106 MOV CX,1 [Enter]
xxxx:0109 MOV DX,80 [Enter]
NOTE: ( --- "80" for hd0, "81" for hd1)
xxxx:010c INT 13 [Enter]
xxxx: 010e INT 20 [Enter]
xxxx: 0110 [Enter]
-G [Enter]
"Program terminated normally"
3. Turn off the computer. On the next startup the hard drive will need to be partitioned and formatted.
***
2. At DOS command prompt type the following: Debug[Enter] (Where enter is to press the enter key once)
NOTE: Type the following bolded text only. You will recieve an error if you type anything other than the bold text. The non-bolded text represents what will appear on you screen once you press [Enter] after each command.
-F 200 L1000 0 [Enter]
-A CS:100 [Enter]
xxxx:0100 MOV AX,301 [Enter]
xxxx:0103 MOV BX,200 [Enter]
xxxx:0106 MOV CX,1 [Enter]
xxxx:0109 MOV DX,80 [Enter]
NOTE: ( --- "80" for hd0, "81" for hd1)
xxxx:010c INT 13 [Enter]
xxxx: 010e INT 20 [Enter]
xxxx: 0110 [Enter]
-G [Enter]
"Program terminated normally"
3. Turn off the computer. On the next startup the hard drive will need to be partitioned and formatted.
***
Labels:
command prompt,
commands,
System Stuffs
Friday, February 27, 2009
Daul Boot
I wanted to run both Windows 2000 Pro and Windows 98 SE on my computer. When I bought a new hard drive, I installed Windows 2000 on it first. But my subsequent research seems to indicate that I should have installed Windows 98 SE first and then Windows 2000 on a separate partition. How do I remove Windows 2000 from the drive so I can partition it and then install Windows 98 SE first and reinstall Windows 2000?
You don't have to remove Windows 2000. Start by installing Windows 98 SE in a different partition. When you're done, insert the Windows 2000 CD and reboot to start Windows 2000 setup. On the Welcome to Setup page, press R (for Repair). When you reach the Windows 2000 Repair Options page, press R again.
You'll then be prompted to select a repair option. Press M for Manual. Then press the Up Arrow until Verify Windows 2000 system files is highlighted; press Enter to clear this selection. Press the Down Arrow to select Continue (perform selected tasks), and then press Enter.
The system will ask whether you have an emergency repair disk. Press L, indicating it should Locate your existing installation. Once it does so, press Enter to complete the repairs. This will establish dual boot for you. (This procedure also works for Windows XP.)
*NOTE:
Don't know if this will also work for Linux. If anyone does try it, please let me know.
You don't have to remove Windows 2000. Start by installing Windows 98 SE in a different partition. When you're done, insert the Windows 2000 CD and reboot to start Windows 2000 setup. On the Welcome to Setup page, press R (for Repair). When you reach the Windows 2000 Repair Options page, press R again.
You'll then be prompted to select a repair option. Press M for Manual. Then press the Up Arrow until Verify Windows 2000 system files is highlighted; press Enter to clear this selection. Press the Down Arrow to select Continue (perform selected tasks), and then press Enter.
The system will ask whether you have an emergency repair disk. Press L, indicating it should Locate your existing installation. Once it does so, press Enter to complete the repairs. This will establish dual boot for you. (This procedure also works for Windows XP.)
*NOTE:
Don't know if this will also work for Linux. If anyone does try it, please let me know.
Daul Boot
I wanted to run both Windows 2000 Pro and Windows 98 SE on my computer. When I bought a new hard drive, I installed Windows 2000 on it first. But my subsequent research seems to indicate that I should have installed Windows 98 SE first and then Windows 2000 on a separate partition. How do I remove Windows 2000 from the drive so I can partition it and then install Windows 98 SE first and reinstall Windows 2000?
You don't have to remove Windows 2000. Start by installing Windows 98 SE in a different partition. When you're done, insert the Windows 2000 CD and reboot to start Windows 2000 setup. On the Welcome to Setup page, press R (for Repair). When you reach the Windows 2000 Repair Options page, press R again.
You'll then be prompted to select a repair option. Press M for Manual. Then press the Up Arrow until Verify Windows 2000 system files is highlighted; press Enter to clear this selection. Press the Down Arrow to select Continue (perform selected tasks), and then press Enter.
The system will ask whether you have an emergency repair disk. Press L, indicating it should Locate your existing installation. Once it does so, press Enter to complete the repairs. This will establish dual boot for you. (This procedure also works for Windows XP.)
*NOTE:
Don't know if this will also work for Linux. If anyone does try it, please let me know.
You don't have to remove Windows 2000. Start by installing Windows 98 SE in a different partition. When you're done, insert the Windows 2000 CD and reboot to start Windows 2000 setup. On the Welcome to Setup page, press R (for Repair). When you reach the Windows 2000 Repair Options page, press R again.
You'll then be prompted to select a repair option. Press M for Manual. Then press the Up Arrow until Verify Windows 2000 system files is highlighted; press Enter to clear this selection. Press the Down Arrow to select Continue (perform selected tasks), and then press Enter.
The system will ask whether you have an emergency repair disk. Press L, indicating it should Locate your existing installation. Once it does so, press Enter to complete the repairs. This will establish dual boot for you. (This procedure also works for Windows XP.)
*NOTE:
Don't know if this will also work for Linux. If anyone does try it, please let me know.
Guide to Slipstreaming Service Pack 2..
• This guide will allow you to sucsessfully install Service Pack 2 on the original (gold) code of Microsoft Windows XP.
• The version of Windows you have purchased/downloaded does not matter as far as slipstreaming (they're all the same anyway).
Things you need:
• Microsoft Windows XP (duh :P)
• Service Pack 2:
click here to get it....
• Windows XP Boot sector click here to get it.
• Nero Burning Rom (find it on SoD)
1.Insert the Microsoft Windows XP CD into your CD-ROM drive, and create a new folder on your hard-drive labelled "CD".
Copy all of the files from the Windows XP CD to the "CD" folder.
2.Download Service Pack 2 and place it within the root of your hard-drive.
Ex: C:\ D:\ etc..
3.Go to Start -> Run and type in "F:\WindowsXP-KB835935-SP2-ENU.exe -s:F:\CD" (depending on where you put the folder)
The actual command is -s:drive:\folder
4.The Service Pack 2 updater will automatically slipstream Service Pack 2 into your "CD" folder.
5.If you browse back to the CD folder, you'll notice that new folders and files appeared from the SP2 update. At this point, you can include any software you wish onto this CD, but make sure that the size of the folder does not exceed the media you are burning on. If you're not sure, a regular CD is 700 megabytes.
6.Go to Start and Search for files and folders. Go to all files and folders, and type in "wpa.dbl". This is the activation file for your current installed version of XP. Make a copy of the file and paste it into your CD folder.
7.Open up Nero Smartstart, and click on the icon that looks like two people. This turns the program into "professional mode". Search for create a bootable CD. Click on it, and make sure that your settings agree with the following picture; also make sure that you downloaded the Windows XP boot sector.
8.Continue onto the next tab, and make sure that your settings agree with the picture:
9.In this step, you can label your CD whatever the hell you want. I recommend WXPSP2_EN.
10.Go to "new" and locate your CD folder. Drag all of the files in the CD folder to the compilation window on the right, and nero will calculate how much disk space was used. If it exceeds 700 MB, get rid of some programs that you added to the CD. If you didn't add anything; just push burn.
11.Make sure that your settings check with the picture:
12.Just push burn, and that's it! Congratulations, you just made a bootable Win XP CD with SP2 slipstreamed!
Guide to Slipstreaming Service Pack 2..
• This guide will allow you to sucsessfully install Service Pack 2 on the original (gold) code of Microsoft Windows XP.
• The version of Windows you have purchased/downloaded does not matter as far as slipstreaming (they're all the same anyway).
Things you need:
• Microsoft Windows XP (duh :P)
• Service Pack 2:
click here to get it....
• Windows XP Boot sector click here to get it.
• Nero Burning Rom (find it on SoD)
1.Insert the Microsoft Windows XP CD into your CD-ROM drive, and create a new folder on your hard-drive labelled "CD".
Copy all of the files from the Windows XP CD to the "CD" folder.
2.Download Service Pack 2 and place it within the root of your hard-drive.
Ex: C:\ D:\ etc..
3.Go to Start -> Run and type in "F:\WindowsXP-KB835935-SP2-ENU.exe -s:F:\CD" (depending on where you put the folder)
The actual command is -s:drive:\folder
4.The Service Pack 2 updater will automatically slipstream Service Pack 2 into your "CD" folder.
5.If you browse back to the CD folder, you'll notice that new folders and files appeared from the SP2 update. At this point, you can include any software you wish onto this CD, but make sure that the size of the folder does not exceed the media you are burning on. If you're not sure, a regular CD is 700 megabytes.
6.Go to Start and Search for files and folders. Go to all files and folders, and type in "wpa.dbl". This is the activation file for your current installed version of XP. Make a copy of the file and paste it into your CD folder.
7.Open up Nero Smartstart, and click on the icon that looks like two people. This turns the program into "professional mode". Search for create a bootable CD. Click on it, and make sure that your settings agree with the following picture; also make sure that you downloaded the Windows XP boot sector.
8.Continue onto the next tab, and make sure that your settings agree with the picture:
9.In this step, you can label your CD whatever the hell you want. I recommend WXPSP2_EN.
10.Go to "new" and locate your CD folder. Drag all of the files in the CD folder to the compilation window on the right, and nero will calculate how much disk space was used. If it exceeds 700 MB, get rid of some programs that you added to the CD. If you didn't add anything; just push burn.
11.Make sure that your settings check with the picture:
12.Just push burn, and that's it! Congratulations, you just made a bootable Win XP CD with SP2 slipstreamed!
Download Hardware Firewall and Sentry Firewall
The best firewall is a hardware firewall that is completely separate from your operating system. It need not be a dedicated router, could be an old pentium box running Linux. Below I have found some sites that have How To's on setting up an outside hardware router using an old computer and using a little linux program that fits on a single floppy disk.
Brief Description:
floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.
Features:
Access lists, IP-masquerading (Network Address Translation), connection tracked packet filtering and (quite) advanced routing. Package for traffic shaping is also available.
Requires only a 386sx or better with two network interface cards, a 1.44MB floppy drive and 12MByte of RAM ( for less than 12M and no FPU, use the 1.0 series, which will stay maintained. )
Very simple packaging system. Is used for editors, PPP, VPN, traffic shaping and whatever comes up. (now this is looking even more like LRP (may it rest in peace) but floppyfw is not a fork.)
Logging through klogd/syslogd, both local and remote.
Serial support for console over serial port.
DHCP server and DNS cache for internal networks.
floppyfw
Sentry Firewall CD-ROM is a Linux-based bootable CDROM suitable for use as an inexpensive and easy to maintain firewall, server, or IDS(Intrusion Detection System) Node. The system is designed to be immediately configurable for a variety of different operating environments via a configuration file located on a floppy disk, a local hard drive, and/or a network via HTTP(S), FTP, SFTP, or SCP.
The Sentry Firewall CD is a complete Linux system that runs off of an initial ramdisk, much like a floppy-based system, and a CD. The default kernel is a current 2.4.x series kernel with various Netfilter patches applied. An OpenWall-patched current 2.2.x kernel is also available on the CD.
Booting from the CDROM is a fairly familiar process. The BIOS execs the bootloader(Syslinux) - which then displays a bootprompt and loads the kernel and ramdisk into memory. Once the kernel is running, the ramdisk is then mounted as root(/). At this point our configuration scripts are run(written in perl) that configure the rest of the system. It is the job of these configure scripts to put the various startup and system files into the proper location using either what is declared in the configuration file(sentry.conf) or the system defaults located in the /etc/default directory.
Most of the critical files used at boot time can be replaced with your own copy when declared in the configuration file. This is essentially how we allow the user to configure the system using his/her own configuration and init files.
All of the binaries, files, scripts, etc, used to create the CD-ROM are also available on the CD-ROM. So, with a little practice, you can easily build and customize your own bootable Sentry Firewall CD. Please see the HOWTO for more details.
Sentry Firewall
Brief Description:
floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.
Features:
Access lists, IP-masquerading (Network Address Translation), connection tracked packet filtering and (quite) advanced routing. Package for traffic shaping is also available.
Requires only a 386sx or better with two network interface cards, a 1.44MB floppy drive and 12MByte of RAM ( for less than 12M and no FPU, use the 1.0 series, which will stay maintained. )
Very simple packaging system. Is used for editors, PPP, VPN, traffic shaping and whatever comes up. (now this is looking even more like LRP (may it rest in peace) but floppyfw is not a fork.)
Logging through klogd/syslogd, both local and remote.
Serial support for console over serial port.
DHCP server and DNS cache for internal networks.
floppyfw
Sentry Firewall CD-ROM is a Linux-based bootable CDROM suitable for use as an inexpensive and easy to maintain firewall, server, or IDS(Intrusion Detection System) Node. The system is designed to be immediately configurable for a variety of different operating environments via a configuration file located on a floppy disk, a local hard drive, and/or a network via HTTP(S), FTP, SFTP, or SCP.
The Sentry Firewall CD is a complete Linux system that runs off of an initial ramdisk, much like a floppy-based system, and a CD. The default kernel is a current 2.4.x series kernel with various Netfilter patches applied. An OpenWall-patched current 2.2.x kernel is also available on the CD.
Booting from the CDROM is a fairly familiar process. The BIOS execs the bootloader(Syslinux) - which then displays a bootprompt and loads the kernel and ramdisk into memory. Once the kernel is running, the ramdisk is then mounted as root(/). At this point our configuration scripts are run(written in perl) that configure the rest of the system. It is the job of these configure scripts to put the various startup and system files into the proper location using either what is declared in the configuration file(sentry.conf) or the system defaults located in the /etc/default directory.
Most of the critical files used at boot time can be replaced with your own copy when declared in the configuration file. This is essentially how we allow the user to configure the system using his/her own configuration and init files.
All of the binaries, files, scripts, etc, used to create the CD-ROM are also available on the CD-ROM. So, with a little practice, you can easily build and customize your own bootable Sentry Firewall CD. Please see the HOWTO for more details.
Sentry Firewall
Labels:
Firewall,
free,
free stuff,
Internet Stuff
Download Hardware Firewall and Sentry Firewall
The best firewall is a hardware firewall that is completely separate from your operating system. It need not be a dedicated router, could be an old pentium box running Linux. Below I have found some sites that have How To's on setting up an outside hardware router using an old computer and using a little linux program that fits on a single floppy disk.
Brief Description:
floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.
Features:
Access lists, IP-masquerading (Network Address Translation), connection tracked packet filtering and (quite) advanced routing. Package for traffic shaping is also available.
Requires only a 386sx or better with two network interface cards, a 1.44MB floppy drive and 12MByte of RAM ( for less than 12M and no FPU, use the 1.0 series, which will stay maintained. )
Very simple packaging system. Is used for editors, PPP, VPN, traffic shaping and whatever comes up. (now this is looking even more like LRP (may it rest in peace) but floppyfw is not a fork.)
Logging through klogd/syslogd, both local and remote.
Serial support for console over serial port.
DHCP server and DNS cache for internal networks.
floppyfw
Sentry Firewall CD-ROM is a Linux-based bootable CDROM suitable for use as an inexpensive and easy to maintain firewall, server, or IDS(Intrusion Detection System) Node. The system is designed to be immediately configurable for a variety of different operating environments via a configuration file located on a floppy disk, a local hard drive, and/or a network via HTTP(S), FTP, SFTP, or SCP.
The Sentry Firewall CD is a complete Linux system that runs off of an initial ramdisk, much like a floppy-based system, and a CD. The default kernel is a current 2.4.x series kernel with various Netfilter patches applied. An OpenWall-patched current 2.2.x kernel is also available on the CD.
Booting from the CDROM is a fairly familiar process. The BIOS execs the bootloader(Syslinux) - which then displays a bootprompt and loads the kernel and ramdisk into memory. Once the kernel is running, the ramdisk is then mounted as root(/). At this point our configuration scripts are run(written in perl) that configure the rest of the system. It is the job of these configure scripts to put the various startup and system files into the proper location using either what is declared in the configuration file(sentry.conf) or the system defaults located in the /etc/default directory.
Most of the critical files used at boot time can be replaced with your own copy when declared in the configuration file. This is essentially how we allow the user to configure the system using his/her own configuration and init files.
All of the binaries, files, scripts, etc, used to create the CD-ROM are also available on the CD-ROM. So, with a little practice, you can easily build and customize your own bootable Sentry Firewall CD. Please see the HOWTO for more details.
Sentry Firewall
Brief Description:
floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.
Features:
Access lists, IP-masquerading (Network Address Translation), connection tracked packet filtering and (quite) advanced routing. Package for traffic shaping is also available.
Requires only a 386sx or better with two network interface cards, a 1.44MB floppy drive and 12MByte of RAM ( for less than 12M and no FPU, use the 1.0 series, which will stay maintained. )
Very simple packaging system. Is used for editors, PPP, VPN, traffic shaping and whatever comes up. (now this is looking even more like LRP (may it rest in peace) but floppyfw is not a fork.)
Logging through klogd/syslogd, both local and remote.
Serial support for console over serial port.
DHCP server and DNS cache for internal networks.
floppyfw
Sentry Firewall CD-ROM is a Linux-based bootable CDROM suitable for use as an inexpensive and easy to maintain firewall, server, or IDS(Intrusion Detection System) Node. The system is designed to be immediately configurable for a variety of different operating environments via a configuration file located on a floppy disk, a local hard drive, and/or a network via HTTP(S), FTP, SFTP, or SCP.
The Sentry Firewall CD is a complete Linux system that runs off of an initial ramdisk, much like a floppy-based system, and a CD. The default kernel is a current 2.4.x series kernel with various Netfilter patches applied. An OpenWall-patched current 2.2.x kernel is also available on the CD.
Booting from the CDROM is a fairly familiar process. The BIOS execs the bootloader(Syslinux) - which then displays a bootprompt and loads the kernel and ramdisk into memory. Once the kernel is running, the ramdisk is then mounted as root(/). At this point our configuration scripts are run(written in perl) that configure the rest of the system. It is the job of these configure scripts to put the various startup and system files into the proper location using either what is declared in the configuration file(sentry.conf) or the system defaults located in the /etc/default directory.
Most of the critical files used at boot time can be replaced with your own copy when declared in the configuration file. This is essentially how we allow the user to configure the system using his/her own configuration and init files.
All of the binaries, files, scripts, etc, used to create the CD-ROM are also available on the CD-ROM. So, with a little practice, you can easily build and customize your own bootable Sentry Firewall CD. Please see the HOWTO for more details.
Sentry Firewall
Labels:
Firewall,
free,
free stuff,
Internet Stuff
Improve Shutdown Time With Registry
1)Click on Start and Select Run.
2)Type “REGEDIT” without quotes in RUN.
3)Now find this registry “HKEY_CURRENT_USER\Control Panel\Desktop\”
4)select “WaitToKillAppTimeout”
5)Right click on the selected registry and select “Modify”
6)Change the value to ‘1000′
7)Now click “OK”
8)Now select ‘HungAppTimeout’
9)Change this to “1000″
10)Now click OK.
How to improve shutdown time? or how to quick shutdown my system?
Checkout one more method which is simple and some what trick then first method.
1)After opening this registry key “HKEY_CURRENT_USER\Control Panel\Desktop\” find AutoEndTasks.
2)Default value always ZERO. change default value to 1. Your work has done completely.Further more you can reduce the time it takes for Windows to issue kill directive to all active/hung applications. While doing this method make sure constraint only exists in that HungAppTimeout is greater than WaitToKillAppTimeout. now change the value of WaitToKillAppTimeout to say 3500 (since default value for HungAppTimeout 5000 and for WaitToKillAppTimeout is 20000)…..
2)Type “REGEDIT” without quotes in RUN.
3)Now find this registry “HKEY_CURRENT_USER\Control Panel\Desktop\”
4)select “WaitToKillAppTimeout”
5)Right click on the selected registry and select “Modify”
6)Change the value to ‘1000′
7)Now click “OK”
8)Now select ‘HungAppTimeout’
9)Change this to “1000″
10)Now click OK.
How to improve shutdown time? or how to quick shutdown my system?
Checkout one more method which is simple and some what trick then first method.
1)After opening this registry key “HKEY_CURRENT_USER\Control Panel\Desktop\” find AutoEndTasks.
2)Default value always ZERO. change default value to 1. Your work has done completely.Further more you can reduce the time it takes for Windows to issue kill directive to all active/hung applications. While doing this method make sure constraint only exists in that HungAppTimeout is greater than WaitToKillAppTimeout. now change the value of WaitToKillAppTimeout to say 3500 (since default value for HungAppTimeout 5000 and for WaitToKillAppTimeout is 20000)…..
Improve Shutdown Time With Registry
1)Click on Start and Select Run.
2)Type “REGEDIT” without quotes in RUN.
3)Now find this registry “HKEY_CURRENT_USER\Control Panel\Desktop\”
4)select “WaitToKillAppTimeout”
5)Right click on the selected registry and select “Modify”
6)Change the value to ‘1000′
7)Now click “OK”
8)Now select ‘HungAppTimeout’
9)Change this to “1000″
10)Now click OK.
How to improve shutdown time? or how to quick shutdown my system?
Checkout one more method which is simple and some what trick then first method.
1)After opening this registry key “HKEY_CURRENT_USER\Control Panel\Desktop\” find AutoEndTasks.
2)Default value always ZERO. change default value to 1. Your work has done completely.Further more you can reduce the time it takes for Windows to issue kill directive to all active/hung applications. While doing this method make sure constraint only exists in that HungAppTimeout is greater than WaitToKillAppTimeout. now change the value of WaitToKillAppTimeout to say 3500 (since default value for HungAppTimeout 5000 and for WaitToKillAppTimeout is 20000)…..
2)Type “REGEDIT” without quotes in RUN.
3)Now find this registry “HKEY_CURRENT_USER\Control Panel\Desktop\”
4)select “WaitToKillAppTimeout”
5)Right click on the selected registry and select “Modify”
6)Change the value to ‘1000′
7)Now click “OK”
8)Now select ‘HungAppTimeout’
9)Change this to “1000″
10)Now click OK.
How to improve shutdown time? or how to quick shutdown my system?
Checkout one more method which is simple and some what trick then first method.
1)After opening this registry key “HKEY_CURRENT_USER\Control Panel\Desktop\” find AutoEndTasks.
2)Default value always ZERO. change default value to 1. Your work has done completely.Further more you can reduce the time it takes for Windows to issue kill directive to all active/hung applications. While doing this method make sure constraint only exists in that HungAppTimeout is greater than WaitToKillAppTimeout. now change the value of WaitToKillAppTimeout to say 3500 (since default value for HungAppTimeout 5000 and for WaitToKillAppTimeout is 20000)…..
How To improve your System Performance
Step 1: Disk Cleanup
1.Open My Computer
2.Right Click on any of the drives C: ,D: ,E:, F:
3.Click on Properties, a new window will be opened as shown below
Improve System Performance
4. It will be in General tab by default
5. Click on Disk Cleanup button to clean up your disk space
Step 2: Defragment Hard Drives
1.Open My Computer
2.Right Click on any of the drives C: ,D: ,E:, F:
3.Click on Properties, a new window will be opened
Improve System Performance
4.Select Tools tab and click on Defragment Now
5.Apply Steps 1-4 on all drives
Step 3: Removing Old Restore Points
1.Click on Start Menu
2.Right Click on My Computer
3.Select System Protection on Tasks panel
4.Uncheck all the drives and when you uncheck C: drive it will prompt a message box asking you “Are you sure to Turn Off System Restore ?” as shown below in the figure
31.jpg
5.Click on Turn System Restore Off button
6.If you want the System Restore to be ON then repeat the steps 1-3 and check the boxes on the drives for which you want to restore.
Step 4: Clearing your Internet History Daily
This needs to be done daily because when you browse a webpage it will load the cookies and it will store in the cache memory of system drive. This is done so that when you again browse a page, browser doesn’t need to load the cookies from the web instead it loads it from your cache in order to have fast access. If you have faster internet connection speed then you need to follow these steps
1.Open Control Panel
2.Select Network and Internet
3.Select Internet Options a new window will be opened as shown below
41.jpg
4.Click on Delete button to delete browsing history, cookies, temporary files and saved passwords
Step 5: Removing unwanted Start Up services
1.Go to Run and Type “msconfig” without quotes a new window will be opened and select Startup tab as shown below
51.jpg
2.Uncheck all the checked items which you don’t want as your start up services
3.Click OK and will ask you to restart the system.
Step6: Cleaning up the cache from time to time
1.Go to Run
2.Type “prefetch” without quotes
3.Select all the items and delete them
4.Repeat this step6 whenever you feel that is system is slow, you can notice the difference in systems performance
After implementing step1- step6 Restart your system to apply the changes you have made to improve your system performance.
These are the six basic steps in improve system performance if you have any new tricks in improving system performance then feel free to comment us.
1.Open My Computer
2.Right Click on any of the drives C: ,D: ,E:, F:
3.Click on Properties, a new window will be opened as shown below
Improve System Performance
4. It will be in General tab by default
5. Click on Disk Cleanup button to clean up your disk space
Step 2: Defragment Hard Drives
1.Open My Computer
2.Right Click on any of the drives C: ,D: ,E:, F:
3.Click on Properties, a new window will be opened
Improve System Performance
4.Select Tools tab and click on Defragment Now
5.Apply Steps 1-4 on all drives
Step 3: Removing Old Restore Points
1.Click on Start Menu
2.Right Click on My Computer
3.Select System Protection on Tasks panel
4.Uncheck all the drives and when you uncheck C: drive it will prompt a message box asking you “Are you sure to Turn Off System Restore ?” as shown below in the figure
31.jpg
5.Click on Turn System Restore Off button
6.If you want the System Restore to be ON then repeat the steps 1-3 and check the boxes on the drives for which you want to restore.
Step 4: Clearing your Internet History Daily
This needs to be done daily because when you browse a webpage it will load the cookies and it will store in the cache memory of system drive. This is done so that when you again browse a page, browser doesn’t need to load the cookies from the web instead it loads it from your cache in order to have fast access. If you have faster internet connection speed then you need to follow these steps
1.Open Control Panel
2.Select Network and Internet
3.Select Internet Options a new window will be opened as shown below
41.jpg
4.Click on Delete button to delete browsing history, cookies, temporary files and saved passwords
Step 5: Removing unwanted Start Up services
1.Go to Run and Type “msconfig” without quotes a new window will be opened and select Startup tab as shown below
51.jpg
2.Uncheck all the checked items which you don’t want as your start up services
3.Click OK and will ask you to restart the system.
Step6: Cleaning up the cache from time to time
1.Go to Run
2.Type “prefetch” without quotes
3.Select all the items and delete them
4.Repeat this step6 whenever you feel that is system is slow, you can notice the difference in systems performance
After implementing step1- step6 Restart your system to apply the changes you have made to improve your system performance.
These are the six basic steps in improve system performance if you have any new tricks in improving system performance then feel free to comment us.
How To improve your System Performance
Step 1: Disk Cleanup
1.Open My Computer
2.Right Click on any of the drives C: ,D: ,E:, F:
3.Click on Properties, a new window will be opened as shown below
Improve System Performance
4. It will be in General tab by default
5. Click on Disk Cleanup button to clean up your disk space
Step 2: Defragment Hard Drives
1.Open My Computer
2.Right Click on any of the drives C: ,D: ,E:, F:
3.Click on Properties, a new window will be opened
Improve System Performance
4.Select Tools tab and click on Defragment Now
5.Apply Steps 1-4 on all drives
Step 3: Removing Old Restore Points
1.Click on Start Menu
2.Right Click on My Computer
3.Select System Protection on Tasks panel
4.Uncheck all the drives and when you uncheck C: drive it will prompt a message box asking you “Are you sure to Turn Off System Restore ?” as shown below in the figure
31.jpg
5.Click on Turn System Restore Off button
6.If you want the System Restore to be ON then repeat the steps 1-3 and check the boxes on the drives for which you want to restore.
Step 4: Clearing your Internet History Daily
This needs to be done daily because when you browse a webpage it will load the cookies and it will store in the cache memory of system drive. This is done so that when you again browse a page, browser doesn’t need to load the cookies from the web instead it loads it from your cache in order to have fast access. If you have faster internet connection speed then you need to follow these steps
1.Open Control Panel
2.Select Network and Internet
3.Select Internet Options a new window will be opened as shown below
41.jpg
4.Click on Delete button to delete browsing history, cookies, temporary files and saved passwords
Step 5: Removing unwanted Start Up services
1.Go to Run and Type “msconfig” without quotes a new window will be opened and select Startup tab as shown below
51.jpg
2.Uncheck all the checked items which you don’t want as your start up services
3.Click OK and will ask you to restart the system.
Step6: Cleaning up the cache from time to time
1.Go to Run
2.Type “prefetch” without quotes
3.Select all the items and delete them
4.Repeat this step6 whenever you feel that is system is slow, you can notice the difference in systems performance
After implementing step1- step6 Restart your system to apply the changes you have made to improve your system performance.
These are the six basic steps in improve system performance if you have any new tricks in improving system performance then feel free to comment us.
1.Open My Computer
2.Right Click on any of the drives C: ,D: ,E:, F:
3.Click on Properties, a new window will be opened as shown below
Improve System Performance
4. It will be in General tab by default
5. Click on Disk Cleanup button to clean up your disk space
Step 2: Defragment Hard Drives
1.Open My Computer
2.Right Click on any of the drives C: ,D: ,E:, F:
3.Click on Properties, a new window will be opened
Improve System Performance
4.Select Tools tab and click on Defragment Now
5.Apply Steps 1-4 on all drives
Step 3: Removing Old Restore Points
1.Click on Start Menu
2.Right Click on My Computer
3.Select System Protection on Tasks panel
4.Uncheck all the drives and when you uncheck C: drive it will prompt a message box asking you “Are you sure to Turn Off System Restore ?” as shown below in the figure
31.jpg
5.Click on Turn System Restore Off button
6.If you want the System Restore to be ON then repeat the steps 1-3 and check the boxes on the drives for which you want to restore.
Step 4: Clearing your Internet History Daily
This needs to be done daily because when you browse a webpage it will load the cookies and it will store in the cache memory of system drive. This is done so that when you again browse a page, browser doesn’t need to load the cookies from the web instead it loads it from your cache in order to have fast access. If you have faster internet connection speed then you need to follow these steps
1.Open Control Panel
2.Select Network and Internet
3.Select Internet Options a new window will be opened as shown below
41.jpg
4.Click on Delete button to delete browsing history, cookies, temporary files and saved passwords
Step 5: Removing unwanted Start Up services
1.Go to Run and Type “msconfig” without quotes a new window will be opened and select Startup tab as shown below
51.jpg
2.Uncheck all the checked items which you don’t want as your start up services
3.Click OK and will ask you to restart the system.
Step6: Cleaning up the cache from time to time
1.Go to Run
2.Type “prefetch” without quotes
3.Select all the items and delete them
4.Repeat this step6 whenever you feel that is system is slow, you can notice the difference in systems performance
After implementing step1- step6 Restart your system to apply the changes you have made to improve your system performance.
These are the six basic steps in improve system performance if you have any new tricks in improving system performance then feel free to comment us.
Points to remember while writing content:
1)Keyword in Meta tags stuffing : Excessive repetition of keywords on a page or inside html code in an attempt to gain higher ranking position in search engines. If search engines find that your pages has crossed limit of keyword frequency then your website will be placed in spam list. There are many free seo tools available on the web. You should use those tools to know your keyword frequency on your page.
2)Well content is the major problem for all of us. I know it is bit difficult to write content. Initially it creates problem while writing content. You will be thinking what to write and what not. Well this problem will be deminishes completely when you start concentrating in anyone of the Niche. I mean to say write what you know, no one is going to punish you but dont ever copy content. Well you can copy small phrases upto extent but not paragraphs and whole posts:D Or else you just read some ones post and try to execute in your own words. Content is not the last step in SEO. There are many seo tips to optimize your content.
3)Backlinks: Yes! google has given higher priority for backlinks. Your page rank, traffic, popularity everything blows up only because of backlinks. There are many ways of getting backlinks. Don’t ever try to step down for Blackhatseo. I do agree that we can make many backlinks using blackhat. But google has taken this method very seriously.You will banned if attempt to get links using blackhatseo. There are many whitehatseo methods to get backlinks. such as submission to directories, SEO forums, blogposts, article directory submission and many methods to get backlinks.
Google’s 2008 algorithm has made very strict. So you have to take care of these steps to prevent your website from spam.
Points to remember while writing content:
1)Keyword in Meta tags stuffing : Excessive repetition of keywords on a page or inside html code in an attempt to gain higher ranking position in search engines. If search engines find that your pages has crossed limit of keyword frequency then your website will be placed in spam list. There are many free seo tools available on the web. You should use those tools to know your keyword frequency on your page.
2)Well content is the major problem for all of us. I know it is bit difficult to write content. Initially it creates problem while writing content. You will be thinking what to write and what not. Well this problem will be deminishes completely when you start concentrating in anyone of the Niche. I mean to say write what you know, no one is going to punish you but dont ever copy content. Well you can copy small phrases upto extent but not paragraphs and whole posts:D Or else you just read some ones post and try to execute in your own words. Content is not the last step in SEO. There are many seo tips to optimize your content.
3)Backlinks: Yes! google has given higher priority for backlinks. Your page rank, traffic, popularity everything blows up only because of backlinks. There are many ways of getting backlinks. Don’t ever try to step down for Blackhatseo. I do agree that we can make many backlinks using blackhat. But google has taken this method very seriously.You will banned if attempt to get links using blackhatseo. There are many whitehatseo methods to get backlinks. such as submission to directories, SEO forums, blogposts, article directory submission and many methods to get backlinks.
Google’s 2008 algorithm has made very strict. So you have to take care of these steps to prevent your website from spam.
Tuesday, February 24, 2009
Disable USB autorun- Complete virus protection:
Always disable USB autorun- Complete virus protection:
I can say USB is the direct source of getting virus into our system directly. Most of the viruses that multiply through USB sticks use the autorun function of USB. Virus enters into our system as we keep USB and runs secretly in the background, unlike a CD or DVD.
The best way to keep away from virus is to disable Autorun option for USB. This step helps from injecting virus into your system.
Always disable USB autorun
Follow the steps to protect your system from virus
1) Click on Start button and go to RUN.
2)Type “gpedit.msc” without quotes in Run.
3)Go to computer configuration-> Administrative Templates -> System
4)Scroll down to “Turn off Autoplay” and double click on it.
5)Now click on the “Enabled” radio button, then for “Turn off Autoplay on” select “All drives”
Hopes It Wud Prtect ur PC Somewhat frm Virus
I can say USB is the direct source of getting virus into our system directly. Most of the viruses that multiply through USB sticks use the autorun function of USB. Virus enters into our system as we keep USB and runs secretly in the background, unlike a CD or DVD.
The best way to keep away from virus is to disable Autorun option for USB. This step helps from injecting virus into your system.
Always disable USB autorun
Follow the steps to protect your system from virus
1) Click on Start button and go to RUN.
2)Type “gpedit.msc” without quotes in Run.
3)Go to computer configuration-> Administrative Templates -> System
4)Scroll down to “Turn off Autoplay” and double click on it.
5)Now click on the “Enabled” radio button, then for “Turn off Autoplay on” select “All drives”
Hopes It Wud Prtect ur PC Somewhat frm Virus
Disable USB autorun- Complete virus protection:
Always disable USB autorun- Complete virus protection:
I can say USB is the direct source of getting virus into our system directly. Most of the viruses that multiply through USB sticks use the autorun function of USB. Virus enters into our system as we keep USB and runs secretly in the background, unlike a CD or DVD.
The best way to keep away from virus is to disable Autorun option for USB. This step helps from injecting virus into your system.
Always disable USB autorun
Follow the steps to protect your system from virus
1) Click on Start button and go to RUN.
2)Type “gpedit.msc” without quotes in Run.
3)Go to computer configuration-> Administrative Templates -> System
4)Scroll down to “Turn off Autoplay” and double click on it.
5)Now click on the “Enabled” radio button, then for “Turn off Autoplay on” select “All drives”
Hopes It Wud Prtect ur PC Somewhat frm Virus
I can say USB is the direct source of getting virus into our system directly. Most of the viruses that multiply through USB sticks use the autorun function of USB. Virus enters into our system as we keep USB and runs secretly in the background, unlike a CD or DVD.
The best way to keep away from virus is to disable Autorun option for USB. This step helps from injecting virus into your system.
Always disable USB autorun
Follow the steps to protect your system from virus
1) Click on Start button and go to RUN.
2)Type “gpedit.msc” without quotes in Run.
3)Go to computer configuration-> Administrative Templates -> System
4)Scroll down to “Turn off Autoplay” and double click on it.
5)Now click on the “Enabled” radio button, then for “Turn off Autoplay on” select “All drives”
Hopes It Wud Prtect ur PC Somewhat frm Virus
Internet explorer script error
Due to high complexity of programs in Internet Explorer errors may occur with in the script. Whenever your browser (Internet Explorer) experiences difficulties while opening or it takes much time to open then it is nothing but internet explorer script error: I have found vulnerability in Internet Explorer. Most probably error in Internet Explorer occurs when HTML source code of the web page does not work correctly with client side script (May be Microsoft Java script or Microsoft VB script). My first suggestion is to do System Restore whenever you get Internet Explorer script error.
Well, in this article i will be explaining 2 damn sure methods to solve or to rectify Internet script error.
Method 1 : Remove all the temporary Internet-related files.
Just follow the steps to remove all temporary Internet related files from your computer.
1. Start Internet Explorer.
2. Click on the tools menu and open Internet options.
3. Now click the general tab
4. Click settings under Temporary Internet files.
5. Choose all files and delete them.
6. Now click OK.
7. Clear cookies.
8. Click OK.
10.Clear history and restart your computer.
Method 2: By disabling script debugging Internet Explorer script error can be solved
If the problem with your error message not with web sites then just ignore the error. Some times problem will be at client side but not with your browser. If you decide to ignore the errors, you can disable script debugging.
Just follow the steps to turn off Scripting Debugger in Internet Explorer 6:
1. Go to tools> and click on Internet Options.
2. Go to advanced tab and click on disable script debugging check box. And then click OK.
3. Also click to clear the Display a notification about every script error check box and then click OK.
I hope these methods can easily resolve Internet Explorer script error. If you are still facing problem with Internet Explorer error then it is better to Uninstall. Checkout this article about How to Uninstall Internet Explorer.
Internet explorer script error
Due to high complexity of programs in Internet Explorer errors may occur with in the script. Whenever your browser (Internet Explorer) experiences difficulties while opening or it takes much time to open then it is nothing but internet explorer script error: I have found vulnerability in Internet Explorer. Most probably error in Internet Explorer occurs when HTML source code of the web page does not work correctly with client side script (May be Microsoft Java script or Microsoft VB script). My first suggestion is to do System Restore whenever you get Internet Explorer script error.
Well, in this article i will be explaining 2 damn sure methods to solve or to rectify Internet script error.
Method 1 : Remove all the temporary Internet-related files.
Just follow the steps to remove all temporary Internet related files from your computer.
1. Start Internet Explorer.
2. Click on the tools menu and open Internet options.
3. Now click the general tab
4. Click settings under Temporary Internet files.
5. Choose all files and delete them.
6. Now click OK.
7. Clear cookies.
8. Click OK.
10.Clear history and restart your computer.
Method 2: By disabling script debugging Internet Explorer script error can be solved
If the problem with your error message not with web sites then just ignore the error. Some times problem will be at client side but not with your browser. If you decide to ignore the errors, you can disable script debugging.
Just follow the steps to turn off Scripting Debugger in Internet Explorer 6:
1. Go to tools> and click on Internet Options.
2. Go to advanced tab and click on disable script debugging check box. And then click OK.
3. Also click to clear the Display a notification about every script error check box and then click OK.
I hope these methods can easily resolve Internet Explorer script error. If you are still facing problem with Internet Explorer error then it is better to Uninstall. Checkout this article about How to Uninstall Internet Explorer.
DallasXtreme.com- Best hosting provider to gamers all around the world
It offers a unique VoIP solution geared specifically to gamers and it is one of the most professional and active Voice Communication Hosting provider. You can purchase a Ventrilo Server for as little as $4.95.
Ventrilo server hosting is available in multiple locations ensuring a low-latency stable voice chat environment anywhere in the world.This company offers Premium Unrestricted Ventrilo Servers at the best prices. DallasXtreme.com is located around the globe in big cities such as Dallas, London or Montreal. This Hosting Company offers what you need most in Quality Ventrilo Servers.This service also providing free ventrilo hosting service.DallasXtreme Ventrilo Servers are hosted exclusively on Tier 1 networks such as Netfire and Internap.
Customers have been always happy with the service and gave in return very high and positive feedbacks. With step-by-step guides on how to both setup your server and use the Ventrilo program, Dallasxtreme is a must for the gamers and even those who just want to have a chat with their friends in a protected and respected server.
DallasXtreme.com- Best hosting provider to gamers all around the world
It offers a unique VoIP solution geared specifically to gamers and it is one of the most professional and active Voice Communication Hosting provider. You can purchase a Ventrilo Server for as little as $4.95.
Ventrilo server hosting is available in multiple locations ensuring a low-latency stable voice chat environment anywhere in the world.This company offers Premium Unrestricted Ventrilo Servers at the best prices. DallasXtreme.com is located around the globe in big cities such as Dallas, London or Montreal. This Hosting Company offers what you need most in Quality Ventrilo Servers.This service also providing free ventrilo hosting service.DallasXtreme Ventrilo Servers are hosted exclusively on Tier 1 networks such as Netfire and Internap.
Customers have been always happy with the service and gave in return very high and positive feedbacks. With step-by-step guides on how to both setup your server and use the Ventrilo program, Dallasxtreme is a must for the gamers and even those who just want to have a chat with their friends in a protected and respected server.
Monday, February 23, 2009
How To Access A Remote Desktop Using Logmeln Himachi
LogmeIn Hamachi is a networking software which is used to access a remote desktop. Hamachi provides the ultimate way to access a remote desktop by secure peer to peer link. In other words It is Virtual Private Network(VPN) (Centrally Managed Zero Configuration VPN)
which provides connection between computer over internet which are behind NAT firewalls. LogMeIn Hamachi takes less than a minute to install. It requires no firewall reconfiguration and router as well. It is a VPN service which provides instant way to establish a computer network similar to Local Area Network(LAN) to share information with other computers, to provide remote access to the users, remote desktop sharing, file management and remote control.Benifits of LogMeIn Hamachi
• No Reconfiguration of firewall and routers are required(Zero Configuration).
• Secure way to access files,hard disks and Network drives
• Providing security to Industries leading authentication and encryption.
• No requirement of physical setup as it Establishes connection similar to LAN.
• Remote Accessing your desktop or controlling your machine from anywhere.
Some of the working LogmeIn Hamachi servers and their passwords are:
Nexodyne - Warcraft
Password: whosyourdaddy
Nexodyne - Starcraft
Password: poweroverwhelming
Nexodyne - Wolfenstein
Password: blitzkrieg
Note: You should have Network name and password to connect
Steps to be followed for accesing Remote Desktop
1. Microsoft Netmeeting Installation Install Netmeeting.
2. Setting up Netmeeting Remote Desktop Sharing.
3. Connecting to Netmeeting’s Remote Desktop Sharing through LogmeIn Hamachi.
4. Firewalls Handling (if you have installed)
LogmeIn Hamachi Installation
Asi have told u before LogmeIn Hamachi LogmeIn Hamachi is a networking software which is used to provide peer to peer link by establishing a network connection between two remote computers and it is also a secure software which has a specific property of Zero configuration.
Link1: Download LogmeIn Hamachi from Here
Link 2: Download Here
After downloading LogmeIn Hamachi install the software and just follow the tutorial it gives you.After Installing LogmeIn Hamachi you’ll find a number on top in this format x.x.xxx.xx or in the form of ip which is the LogmeIn Hamachi Ip address As you need this Ip later. So after installing LogmeIn Hamachi and following its step,I Guess you have been wandering How to Access a Remote Desktop?Where is the procedure to access remote desktop? you might think the title “LogmeIn Hamachi” title to be decieving Then there is no need to worry you are at right place which provides the exact way to access a remote desktop.Sorry to say that you need one more software ‘Microsoft NetMeeting’ to access a remote desktop but i assure it would be fruitful if you follow this procedure to access a remote desktop. Microsoft users dont need to download this software again as it comes with Windows Xp, probably this comes with Windows 2000 and above versions.
Remember that LogmeIn Hamachi and Microsoft NetMeeting should be installed on both the computer to have Remote Desktop sharing.Unless and untill you do this you cant access remote desktop.
after installing your Hamachi will look this and your Hamachi Ip
Installtion of Microsoft NetMeeting
No need to download this Microsoft NetMeeting software as every windows version comes with Microsoft NetMeeting
For installing NetMeeting just go to START>RUN>’conf.exe’ type this without quotes and simple just follow the tutorial it provides you and i request you to save your password. dont forget to Install Micrososoft NetMeeting on both the computers
Your NetMeeting Installation
Setting up Netmeeting Remote Desktop Sharing
Go to Tools Menu at top In NetMeeting and then select ‘ Remote Desktop Sharing’. A setup wizard will be opened for remote desktop sharing which will allow you to activate a ‘password protected screensaver’.I requeste you to Implement this step. after doing this you will see a Microsoft Netmeeting icon at your Lower right toolbar. If you see this then you are done with all the major steps.
Connect to Netmeeting’s Remote Desktop Sharing through Hamachi
Ok then, Its time now to establish a connection between both the computers for remote desktop sharing.consider two computers as computer1 and computer2. Now open the LogmeIn Hamachi and Microsoft NetMeeting and type the computer1’s LogmeIn Hamachi Ip adress in Microsoft NetMeeting address bar of computer2 and Make a call by clicking on phone button. You will see a Remote desktop sharing window where you need to have an account name and password for the system of which you are trying to access. enter name and password and click ok then you will get a new window which will show a remote desktop of computer1.
the desktop which you are seeing might seem ugly but it makes the connection faster.Now you have the total control on your friends desktop as you are the administrator of it. You can view full screen by clicking on the window which poped up.
Sharing Remote Desktop
Firewalls Handling
Hope you can handle with firewalls. just shut down you firewalls or just make LogmeIn Hamachi as a trusted application
Hope you have liked this trick but you might think that, then what is the use of LogmeIn Hamachi? What is the role played by LogmeIn Hamachi. but dont try to establish a connection without LogmeIn Hamachi if you have the ip address of any user as you need to configure firewalls and routers which cant done by you. so its better to use LogmeIn Hamachi as it provides Zero Configuration.
This is a fairly advanced genuine task but if you find any difficulty in implementing these tricks just leave the comments. I will reply you in comment form.
which provides connection between computer over internet which are behind NAT firewalls. LogMeIn Hamachi takes less than a minute to install. It requires no firewall reconfiguration and router as well. It is a VPN service which provides instant way to establish a computer network similar to Local Area Network(LAN) to share information with other computers, to provide remote access to the users, remote desktop sharing, file management and remote control.Benifits of LogMeIn Hamachi
• No Reconfiguration of firewall and routers are required(Zero Configuration).
• Secure way to access files,hard disks and Network drives
• Providing security to Industries leading authentication and encryption.
• No requirement of physical setup as it Establishes connection similar to LAN.
• Remote Accessing your desktop or controlling your machine from anywhere.
Some of the working LogmeIn Hamachi servers and their passwords are:
Nexodyne - Warcraft
Password: whosyourdaddy
Nexodyne - Starcraft
Password: poweroverwhelming
Nexodyne - Wolfenstein
Password: blitzkrieg
Note: You should have Network name and password to connect
Steps to be followed for accesing Remote Desktop
1. Microsoft Netmeeting Installation Install Netmeeting.
2. Setting up Netmeeting Remote Desktop Sharing.
3. Connecting to Netmeeting’s Remote Desktop Sharing through LogmeIn Hamachi.
4. Firewalls Handling (if you have installed)
LogmeIn Hamachi Installation
Asi have told u before LogmeIn Hamachi LogmeIn Hamachi is a networking software which is used to provide peer to peer link by establishing a network connection between two remote computers and it is also a secure software which has a specific property of Zero configuration.
Link1: Download LogmeIn Hamachi from Here
Link 2: Download Here
After downloading LogmeIn Hamachi install the software and just follow the tutorial it gives you.After Installing LogmeIn Hamachi you’ll find a number on top in this format x.x.xxx.xx or in the form of ip which is the LogmeIn Hamachi Ip address As you need this Ip later. So after installing LogmeIn Hamachi and following its step,I Guess you have been wandering How to Access a Remote Desktop?Where is the procedure to access remote desktop? you might think the title “LogmeIn Hamachi” title to be decieving Then there is no need to worry you are at right place which provides the exact way to access a remote desktop.Sorry to say that you need one more software ‘Microsoft NetMeeting’ to access a remote desktop but i assure it would be fruitful if you follow this procedure to access a remote desktop. Microsoft users dont need to download this software again as it comes with Windows Xp, probably this comes with Windows 2000 and above versions.
Remember that LogmeIn Hamachi and Microsoft NetMeeting should be installed on both the computer to have Remote Desktop sharing.Unless and untill you do this you cant access remote desktop.
after installing your Hamachi will look this and your Hamachi Ip
Installtion of Microsoft NetMeeting
No need to download this Microsoft NetMeeting software as every windows version comes with Microsoft NetMeeting
For installing NetMeeting just go to START>RUN>’conf.exe’ type this without quotes and simple just follow the tutorial it provides you and i request you to save your password. dont forget to Install Micrososoft NetMeeting on both the computers
Your NetMeeting Installation
Setting up Netmeeting Remote Desktop Sharing
Go to Tools Menu at top In NetMeeting and then select ‘ Remote Desktop Sharing’. A setup wizard will be opened for remote desktop sharing which will allow you to activate a ‘password protected screensaver’.I requeste you to Implement this step. after doing this you will see a Microsoft Netmeeting icon at your Lower right toolbar. If you see this then you are done with all the major steps.
Connect to Netmeeting’s Remote Desktop Sharing through Hamachi
Ok then, Its time now to establish a connection between both the computers for remote desktop sharing.consider two computers as computer1 and computer2. Now open the LogmeIn Hamachi and Microsoft NetMeeting and type the computer1’s LogmeIn Hamachi Ip adress in Microsoft NetMeeting address bar of computer2 and Make a call by clicking on phone button. You will see a Remote desktop sharing window where you need to have an account name and password for the system of which you are trying to access. enter name and password and click ok then you will get a new window which will show a remote desktop of computer1.
the desktop which you are seeing might seem ugly but it makes the connection faster.Now you have the total control on your friends desktop as you are the administrator of it. You can view full screen by clicking on the window which poped up.
Sharing Remote Desktop
Firewalls Handling
Hope you can handle with firewalls. just shut down you firewalls or just make LogmeIn Hamachi as a trusted application
Hope you have liked this trick but you might think that, then what is the use of LogmeIn Hamachi? What is the role played by LogmeIn Hamachi. but dont try to establish a connection without LogmeIn Hamachi if you have the ip address of any user as you need to configure firewalls and routers which cant done by you. so its better to use LogmeIn Hamachi as it provides Zero Configuration.
This is a fairly advanced genuine task but if you find any difficulty in implementing these tricks just leave the comments. I will reply you in comment form.
How To Access A Remote Desktop Using Logmeln Himachi
LogmeIn Hamachi is a networking software which is used to access a remote desktop. Hamachi provides the ultimate way to access a remote desktop by secure peer to peer link. In other words It is Virtual Private Network(VPN) (Centrally Managed Zero Configuration VPN)
which provides connection between computer over internet which are behind NAT firewalls. LogMeIn Hamachi takes less than a minute to install. It requires no firewall reconfiguration and router as well. It is a VPN service which provides instant way to establish a computer network similar to Local Area Network(LAN) to share information with other computers, to provide remote access to the users, remote desktop sharing, file management and remote control.Benifits of LogMeIn Hamachi
• No Reconfiguration of firewall and routers are required(Zero Configuration).
• Secure way to access files,hard disks and Network drives
• Providing security to Industries leading authentication and encryption.
• No requirement of physical setup as it Establishes connection similar to LAN.
• Remote Accessing your desktop or controlling your machine from anywhere.
Some of the working LogmeIn Hamachi servers and their passwords are:
Nexodyne - Warcraft
Password: whosyourdaddy
Nexodyne - Starcraft
Password: poweroverwhelming
Nexodyne - Wolfenstein
Password: blitzkrieg
Note: You should have Network name and password to connect
Steps to be followed for accesing Remote Desktop
1. Microsoft Netmeeting Installation Install Netmeeting.
2. Setting up Netmeeting Remote Desktop Sharing.
3. Connecting to Netmeeting’s Remote Desktop Sharing through LogmeIn Hamachi.
4. Firewalls Handling (if you have installed)
LogmeIn Hamachi Installation
Asi have told u before LogmeIn Hamachi LogmeIn Hamachi is a networking software which is used to provide peer to peer link by establishing a network connection between two remote computers and it is also a secure software which has a specific property of Zero configuration.
Link1: Download LogmeIn Hamachi from Here
Link 2: Download Here
After downloading LogmeIn Hamachi install the software and just follow the tutorial it gives you.After Installing LogmeIn Hamachi you’ll find a number on top in this format x.x.xxx.xx or in the form of ip which is the LogmeIn Hamachi Ip address As you need this Ip later. So after installing LogmeIn Hamachi and following its step,I Guess you have been wandering How to Access a Remote Desktop?Where is the procedure to access remote desktop? you might think the title “LogmeIn Hamachi” title to be decieving Then there is no need to worry you are at right place which provides the exact way to access a remote desktop.Sorry to say that you need one more software ‘Microsoft NetMeeting’ to access a remote desktop but i assure it would be fruitful if you follow this procedure to access a remote desktop. Microsoft users dont need to download this software again as it comes with Windows Xp, probably this comes with Windows 2000 and above versions.
Remember that LogmeIn Hamachi and Microsoft NetMeeting should be installed on both the computer to have Remote Desktop sharing.Unless and untill you do this you cant access remote desktop.
after installing your Hamachi will look this and your Hamachi Ip
Installtion of Microsoft NetMeeting
No need to download this Microsoft NetMeeting software as every windows version comes with Microsoft NetMeeting
For installing NetMeeting just go to START>RUN>’conf.exe’ type this without quotes and simple just follow the tutorial it provides you and i request you to save your password. dont forget to Install Micrososoft NetMeeting on both the computers
Your NetMeeting Installation
Setting up Netmeeting Remote Desktop Sharing
Go to Tools Menu at top In NetMeeting and then select ‘ Remote Desktop Sharing’. A setup wizard will be opened for remote desktop sharing which will allow you to activate a ‘password protected screensaver’.I requeste you to Implement this step. after doing this you will see a Microsoft Netmeeting icon at your Lower right toolbar. If you see this then you are done with all the major steps.
Connect to Netmeeting’s Remote Desktop Sharing through Hamachi
Ok then, Its time now to establish a connection between both the computers for remote desktop sharing.consider two computers as computer1 and computer2. Now open the LogmeIn Hamachi and Microsoft NetMeeting and type the computer1’s LogmeIn Hamachi Ip adress in Microsoft NetMeeting address bar of computer2 and Make a call by clicking on phone button. You will see a Remote desktop sharing window where you need to have an account name and password for the system of which you are trying to access. enter name and password and click ok then you will get a new window which will show a remote desktop of computer1.
the desktop which you are seeing might seem ugly but it makes the connection faster.Now you have the total control on your friends desktop as you are the administrator of it. You can view full screen by clicking on the window which poped up.
Sharing Remote Desktop
Firewalls Handling
Hope you can handle with firewalls. just shut down you firewalls or just make LogmeIn Hamachi as a trusted application
Hope you have liked this trick but you might think that, then what is the use of LogmeIn Hamachi? What is the role played by LogmeIn Hamachi. but dont try to establish a connection without LogmeIn Hamachi if you have the ip address of any user as you need to configure firewalls and routers which cant done by you. so its better to use LogmeIn Hamachi as it provides Zero Configuration.
This is a fairly advanced genuine task but if you find any difficulty in implementing these tricks just leave the comments. I will reply you in comment form.
which provides connection between computer over internet which are behind NAT firewalls. LogMeIn Hamachi takes less than a minute to install. It requires no firewall reconfiguration and router as well. It is a VPN service which provides instant way to establish a computer network similar to Local Area Network(LAN) to share information with other computers, to provide remote access to the users, remote desktop sharing, file management and remote control.Benifits of LogMeIn Hamachi
• No Reconfiguration of firewall and routers are required(Zero Configuration).
• Secure way to access files,hard disks and Network drives
• Providing security to Industries leading authentication and encryption.
• No requirement of physical setup as it Establishes connection similar to LAN.
• Remote Accessing your desktop or controlling your machine from anywhere.
Some of the working LogmeIn Hamachi servers and their passwords are:
Nexodyne - Warcraft
Password: whosyourdaddy
Nexodyne - Starcraft
Password: poweroverwhelming
Nexodyne - Wolfenstein
Password: blitzkrieg
Note: You should have Network name and password to connect
Steps to be followed for accesing Remote Desktop
1. Microsoft Netmeeting Installation Install Netmeeting.
2. Setting up Netmeeting Remote Desktop Sharing.
3. Connecting to Netmeeting’s Remote Desktop Sharing through LogmeIn Hamachi.
4. Firewalls Handling (if you have installed)
LogmeIn Hamachi Installation
Asi have told u before LogmeIn Hamachi LogmeIn Hamachi is a networking software which is used to provide peer to peer link by establishing a network connection between two remote computers and it is also a secure software which has a specific property of Zero configuration.
Link1: Download LogmeIn Hamachi from Here
Link 2: Download Here
After downloading LogmeIn Hamachi install the software and just follow the tutorial it gives you.After Installing LogmeIn Hamachi you’ll find a number on top in this format x.x.xxx.xx or in the form of ip which is the LogmeIn Hamachi Ip address As you need this Ip later. So after installing LogmeIn Hamachi and following its step,I Guess you have been wandering How to Access a Remote Desktop?Where is the procedure to access remote desktop? you might think the title “LogmeIn Hamachi” title to be decieving Then there is no need to worry you are at right place which provides the exact way to access a remote desktop.Sorry to say that you need one more software ‘Microsoft NetMeeting’ to access a remote desktop but i assure it would be fruitful if you follow this procedure to access a remote desktop. Microsoft users dont need to download this software again as it comes with Windows Xp, probably this comes with Windows 2000 and above versions.
Remember that LogmeIn Hamachi and Microsoft NetMeeting should be installed on both the computer to have Remote Desktop sharing.Unless and untill you do this you cant access remote desktop.
after installing your Hamachi will look this and your Hamachi Ip
Installtion of Microsoft NetMeeting
No need to download this Microsoft NetMeeting software as every windows version comes with Microsoft NetMeeting
For installing NetMeeting just go to START>RUN>’conf.exe’ type this without quotes and simple just follow the tutorial it provides you and i request you to save your password. dont forget to Install Micrososoft NetMeeting on both the computers
Your NetMeeting Installation
Setting up Netmeeting Remote Desktop Sharing
Go to Tools Menu at top In NetMeeting and then select ‘ Remote Desktop Sharing’. A setup wizard will be opened for remote desktop sharing which will allow you to activate a ‘password protected screensaver’.I requeste you to Implement this step. after doing this you will see a Microsoft Netmeeting icon at your Lower right toolbar. If you see this then you are done with all the major steps.
Connect to Netmeeting’s Remote Desktop Sharing through Hamachi
Ok then, Its time now to establish a connection between both the computers for remote desktop sharing.consider two computers as computer1 and computer2. Now open the LogmeIn Hamachi and Microsoft NetMeeting and type the computer1’s LogmeIn Hamachi Ip adress in Microsoft NetMeeting address bar of computer2 and Make a call by clicking on phone button. You will see a Remote desktop sharing window where you need to have an account name and password for the system of which you are trying to access. enter name and password and click ok then you will get a new window which will show a remote desktop of computer1.
the desktop which you are seeing might seem ugly but it makes the connection faster.Now you have the total control on your friends desktop as you are the administrator of it. You can view full screen by clicking on the window which poped up.
Sharing Remote Desktop
Firewalls Handling
Hope you can handle with firewalls. just shut down you firewalls or just make LogmeIn Hamachi as a trusted application
Hope you have liked this trick but you might think that, then what is the use of LogmeIn Hamachi? What is the role played by LogmeIn Hamachi. but dont try to establish a connection without LogmeIn Hamachi if you have the ip address of any user as you need to configure firewalls and routers which cant done by you. so its better to use LogmeIn Hamachi as it provides Zero Configuration.
This is a fairly advanced genuine task but if you find any difficulty in implementing these tricks just leave the comments. I will reply you in comment form.
What To Do When Key Server Not Found Error Displays
Well this is the major problem that occurs while opening software after installation from ACCC novell server.You will see this error Key server not found– as soon as you double click on software.
You have to do following steps:
1)Search for this file “keyacc*.*” without quotes in your system.
2)Delete all keyacc*.* files which you have found.
3)Open this file winstall (n:\winstall\installss.exe)
4)This will check all keyacc files.It will take few minutes for checking those files.When it does not find them it will put them in the locations which will fix keyserv issues..
If the above solution does not work then follow the sloution 2.
Solution 2:
If solution 1 does not work then you have to do small work..Just replace contents of keyacc.ini file with the following code..
Just copy the below code………
[setup]
transport=udp
translist=udpipx
[logon]
host=keyserv.cc.uic.edu
user=%user%
pass=
[options]
aged=yes
sync=no
save=no
icon=yes
lock=no
quit=yes
skip=-5
registry=0
silent=0
minimize=1
persist=0
yield=0
close=0
usev=1
sleep=1
What To Do When Key Server Not Found Error Displays
Well this is the major problem that occurs while opening software after installation from ACCC novell server.You will see this error Key server not found– as soon as you double click on software.
You have to do following steps:
1)Search for this file “keyacc*.*” without quotes in your system.
2)Delete all keyacc*.* files which you have found.
3)Open this file winstall (n:\winstall\installss.exe)
4)This will check all keyacc files.It will take few minutes for checking those files.When it does not find them it will put them in the locations which will fix keyserv issues..
If the above solution does not work then follow the sloution 2.
Solution 2:
If solution 1 does not work then you have to do small work..Just replace contents of keyacc.ini file with the following code..
Just copy the below code………
[setup]
transport=udp
translist=udpipx
[logon]
host=keyserv.cc.uic.edu
user=%user%
pass=
[options]
aged=yes
sync=no
save=no
icon=yes
lock=no
quit=yes
skip=-5
registry=0
silent=0
minimize=1
persist=0
yield=0
close=0
usev=1
sleep=1
List Of Router Commands
List of Router commands:
List of router commands:
These are the necessary things you should remember.
Keyboard Shortcuts
CTRL-N - show next command
CTRL-P - show previous command
CDP Commands (Cisco Discovery Protocol uses layer 2 multicast over a SNAP-capable link to send data):
sh cdp neighbor - shows directly connected neighbors
sh cdp int - shows which interfaces are running CDP
sh cdp int eth 0/0 - show CDP info for specific interface
sh cdp entry - shows CDP neighbor detail
cdp timer 120 - change how often CDP info is sent (default cdp timer is 60)
cp holdtime 240 - how long to wait before removing a CDP neighbor (default CDP holdtime is 180)
sh cdp run - shows if CDP turned on
no cdp run - turns off CDP for entire router (global config)
no cdp enable - turns off CDP on specific interface
SHIFT-CTRL-6 – Break
List of Privileged Mode commands of a router
Learn how to work in the privileged mode of a router.
enable - get to privileged mode
disable - get to user mode
enable password - sets privileged mode password
enable secret - sets encrypted privileged mode password
Setting Passwords on router
Here you will be able to learn how to set the password on a router.
enable secret - set encrypted password for privileged access
enable password - set password for privileged access (used when there is no enable secret and when using older software)
Setting the password for console access:
(config)#line console 0
(config-line)#login
(config-line)#password
Set password for virtual terminal (telnet) access (password must be set to access router through telnet):
(config)#line vty 0 4
(config-line)#login
(config-line)#password
Set password for auxiliary (modem) access:
(config)#line aux 0
(config-line)#login
(config-line)#password
IP Commands
Here is a list of the IP Commands
Configure IP on an interface:
int serial 0
ip address 157.89.1.3 255.255.0.0
int eth 0
ip address 2008.1.1.4 255.255.255.0
Other IP Commands:
sh ip route - view ip routing table
ip route [administrative_distance] - configure a static IP route
ip route 0.0.0.0 0.0.0.0 - sets default gateway
ip classless - use with static routing to allow packets destined for unrecognized subnets to use the best possible route
sh arp - view arp cache; shows MAC address of connected routers
ip address 2.2.2.2 255.255.255.0 secondary - configure a 2nd ip address on an interface
sh ip protocol
Configuring the Router
You will be able to learn the basic commands for configuring a router.
sh running-config - details the running configuration file (RAM)
sh startup-config - displays the configuration stored in NVRAM
setup - Will start the the automatic setup; the same as when you first boot the router
config t - use to execute configuration commands from the terminal
config mem - executes configuration commands stored in NVRAM; copies startup-config to running-config
config net - used to retrieve configuration info from a TFTP server
copy running-config startup-config - copies saved config in running config (RAM) to NVRAM or “write memory” for IOS under ver.11
copy startup-config running-config - copies from non-volatile (NVRAM) to current running config (RAM)
boot system flash - tells router which IOS file in flash to boot from
boot system tftp - tells router which IOS file on the tftp server to boot from
boot system rom - tell router to boot from ROM at next boot
copy flash tftp - Copies flash to tftp server
copy tftp flash - Restores flash from tftp server
copy run tftp - Copies the current running-config to tftp server
copy tftp run - Restores the running-config from tftp server
General Commands
Here is a list of the general commands. These are the basic level commands and most commonly used
no shutdown - (enables the interface)
reload - restarts the router
sh ver - Cisco IOS version, uptime of router, how the router started, where system was loaded from, the interfaces the POST found, and the configuration register
sh clock - shows date and time on router
sh history - shows the history of your commands
sh debug - shows all debugging that is currently enabled
no debug all - turns off all debugging
sh users - shows users connected to router
sh protocols - shows which protocols are configured
banner motd # Your customized message here # - Set/change banner
hostname - use to configure the hostname of the router
WAN Configurations Commands
Networking over WAN is the main functionality of a router. The most common use of a router is for the WAN connectivity. Here is a list of the commands for the different methods of the WAN connectivity.
PPP Configuration
Point to point protocol is a method for the WAN connectivity and you will find here some commands of PPP.
encapsulation pppppp authentication
ppp chap hostname
ppp pap sent-username
sh int ser 0 - use to view encapsulation on the interface
Frame-Relay Configuration
One of the methods for the WAN connectivity is the Frame Relay. Find here some basic commands for the WAN connectivity through Frame Relay.
encapsulation frame-relay ietf - use IETF when setting up a frame-relay network between a Ciscorouter and a non-Cisco router
frame-relay lmi-type ansi - LMI types are Cisco, ANSI, Q933A; Cisco is the default; LMI type is auto-sensed in IOS v11.2 and up
frame-relay map ip 3.3.3.3 100 broadcast - if inverse ARP won’t work, map Other IP to Your DLCI # (local)
keep alive 10 - use to set keep alive
sh int ser 0 - use to show DLCI, LMI, and encapsulation info
sh frame-relay pvc - shows the configured DLCI’s; shows PVC traffic stats
sh frame-relay map - shows route mapssh frame-relay lmi - shows LMI info
Routing Protocols
RIP, IGPR and OSPF are the routing protocols and here is a list of the commands for the working on the routing protocols.
Configure RIP:
router rip
network 157.89.0.0
network 208.1.1.0
Other RIP Commands:
debug ip rip - view RIP debugging info
Configure IGRP:
router IGRP 200
network 157.89.0.0
network 208.1.1.0
Other IGRP Commands:
debug ip igrp events - view IGRP debugging info
debug ip igrp transactions - view IGRP debugging info
Access Lists
Here is a list of the Access list command of a router.
sh ip int ser 0 - use to view which IP access lists are applies to which int
sh ipx int ser 0 - use to view which IPX access lists are applies to which int
sh appletalk int ser 0 - use to view which AppleTalk access lists are applies to which int
View access lists:
sh access-lists
sh ip access-lists
sh ipx access-lists
sh appletalk access-lists
Apply standard IP access list to int eth 0:
access-list 1 deny 200.1.1.0 0.0.0.255
access-list 1 permit any
int eth 0
ip access-group 1 in
Apply Extended IP access list to int eth 0:
access-list 100 deny tcp host 1.1.1.1 host 2.2.2.2 eq 23
access-list 100 deny tcp 3.3.3.0 0.0.0.255 any eq 80
int eth 0
ip access-group 100 out
Apply Standard IPX access list to int eth 0:
access-list 800 deny 7a 8000
access-list 800 permit -1
int eth 0
ipx access-group 800 out
Apply Standard IPX access list to int eth 0:
access-list 900 deny sap any 3378 -1
access-list 900 permit sap any all -1
int eth 0
ipx access-group 900 out
Miscellaneous Commands
In the last but not least here is a list of the some miscellaneous and useful commands
sh controller t1 - shows status of T1 lines
sh controller serial 1 - use to determine if DCE or DTE device
(config-if)#clock rate 6400 - set clock on DCE (bits per second)
(config-if)#bandwidth 64 - set bandwidth (kilobits)
Most of the router commands has been gathered from Networktutorials. You can get More list of router commands from this website http://www.networktutorials.info/
List of router commands:
These are the necessary things you should remember.
Keyboard Shortcuts
CTRL-N - show next command
CTRL-P - show previous command
CDP Commands (Cisco Discovery Protocol uses layer 2 multicast over a SNAP-capable link to send data):
sh cdp neighbor - shows directly connected neighbors
sh cdp int - shows which interfaces are running CDP
sh cdp int eth 0/0 - show CDP info for specific interface
sh cdp entry
cdp timer 120 - change how often CDP info is sent (default cdp timer is 60)
cp holdtime 240 - how long to wait before removing a CDP neighbor (default CDP holdtime is 180)
sh cdp run - shows if CDP turned on
no cdp run - turns off CDP for entire router (global config)
no cdp enable - turns off CDP on specific interface
SHIFT-CTRL-6 – Break
List of Privileged Mode commands of a router
Learn how to work in the privileged mode of a router.
enable - get to privileged mode
disable - get to user mode
enable password
enable secret
Setting Passwords on router
Here you will be able to learn how to set the password on a router.
enable secret
enable password
Setting the password for console access:
(config)#line console 0
(config-line)#login
(config-line)#password
Set password for virtual terminal (telnet) access (password must be set to access router through telnet):
(config)#line vty 0 4
(config-line)#login
(config-line)#password
Set password for auxiliary (modem) access:
(config)#line aux 0
(config-line)#login
(config-line)#password
IP Commands
Here is a list of the IP Commands
Configure IP on an interface:
int serial 0
ip address 157.89.1.3 255.255.0.0
int eth 0
ip address 2008.1.1.4 255.255.255.0
Other IP Commands:
sh ip route - view ip routing table
ip route
ip route 0.0.0.0 0.0.0.0
ip classless - use with static routing to allow packets destined for unrecognized subnets to use the best possible route
sh arp - view arp cache; shows MAC address of connected routers
ip address 2.2.2.2 255.255.255.0 secondary - configure a 2nd ip address on an interface
sh ip protocol
Configuring the Router
You will be able to learn the basic commands for configuring a router.
sh running-config - details the running configuration file (RAM)
sh startup-config - displays the configuration stored in NVRAM
setup - Will start the the automatic setup; the same as when you first boot the router
config t - use to execute configuration commands from the terminal
config mem - executes configuration commands stored in NVRAM; copies startup-config to running-config
config net - used to retrieve configuration info from a TFTP server
copy running-config startup-config - copies saved config in running config (RAM) to NVRAM or “write memory” for IOS under ver.11
copy startup-config running-config - copies from non-volatile (NVRAM) to current running config (RAM)
boot system flash
boot system tftp - tells router which IOS file on the tftp server to boot from
boot system rom - tell router to boot from ROM at next boot
copy flash tftp - Copies flash to tftp server
copy tftp flash - Restores flash from tftp server
copy run tftp - Copies the current running-config to tftp server
copy tftp run - Restores the running-config from tftp server
General Commands
Here is a list of the general commands. These are the basic level commands and most commonly used
no shutdown - (enables the interface)
reload - restarts the router
sh ver - Cisco IOS version, uptime of router, how the router started, where system was loaded from, the interfaces the POST found, and the configuration register
sh clock - shows date and time on router
sh history - shows the history of your commands
sh debug - shows all debugging that is currently enabled
no debug all - turns off all debugging
sh users - shows users connected to router
sh protocols - shows which protocols are configured
banner motd # Your customized message here # - Set/change banner
hostname
WAN Configurations Commands
Networking over WAN is the main functionality of a router. The most common use of a router is for the WAN connectivity. Here is a list of the commands for the different methods of the WAN connectivity.
PPP Configuration
Point to point protocol is a method for the WAN connectivity and you will find here some commands of PPP.
encapsulation pppppp authentication
ppp chap hostname
ppp pap sent-username
sh int ser 0 - use to view encapsulation on the interface
Frame-Relay Configuration
One of the methods for the WAN connectivity is the Frame Relay. Find here some basic commands for the WAN connectivity through Frame Relay.
encapsulation frame-relay ietf - use IETF when setting up a frame-relay network between a Ciscorouter and a non-Cisco router
frame-relay lmi-type ansi - LMI types are Cisco, ANSI, Q933A; Cisco is the default; LMI type is auto-sensed in IOS v11.2 and up
frame-relay map ip 3.3.3.3 100 broadcast - if inverse ARP won’t work, map Other IP to Your DLCI # (local)
keep alive 10 - use to set keep alive
sh int ser 0 - use to show DLCI, LMI, and encapsulation info
sh frame-relay pvc - shows the configured DLCI’s; shows PVC traffic stats
sh frame-relay map - shows route mapssh frame-relay lmi - shows LMI info
Routing Protocols
RIP, IGPR and OSPF are the routing protocols and here is a list of the commands for the working on the routing protocols.
Configure RIP:
router rip
network 157.89.0.0
network 208.1.1.0
Other RIP Commands:
debug ip rip - view RIP debugging info
Configure IGRP:
router IGRP 200
network 157.89.0.0
network 208.1.1.0
Other IGRP Commands:
debug ip igrp events - view IGRP debugging info
debug ip igrp transactions - view IGRP debugging info
Access Lists
Here is a list of the Access list command of a router.
sh ip int ser 0 - use to view which IP access lists are applies to which int
sh ipx int ser 0 - use to view which IPX access lists are applies to which int
sh appletalk int ser 0 - use to view which AppleTalk access lists are applies to which int
View access lists:
sh access-lists
sh ip access-lists
sh ipx access-lists
sh appletalk access-lists
Apply standard IP access list to int eth 0:
access-list 1 deny 200.1.1.0 0.0.0.255
access-list 1 permit any
int eth 0
ip access-group 1 in
Apply Extended IP access list to int eth 0:
access-list 100 deny tcp host 1.1.1.1 host 2.2.2.2 eq 23
access-list 100 deny tcp 3.3.3.0 0.0.0.255 any eq 80
int eth 0
ip access-group 100 out
Apply Standard IPX access list to int eth 0:
access-list 800 deny 7a 8000
access-list 800 permit -1
int eth 0
ipx access-group 800 out
Apply Standard IPX access list to int eth 0:
access-list 900 deny sap any 3378 -1
access-list 900 permit sap any all -1
int eth 0
ipx access-group 900 out
Miscellaneous Commands
In the last but not least here is a list of the some miscellaneous and useful commands
sh controller t1 - shows status of T1 lines
sh controller serial 1 - use to determine if DCE or DTE device
(config-if)#clock rate 6400 - set clock on DCE (bits per second)
(config-if)#bandwidth 64 - set bandwidth (kilobits)
Most of the router commands has been gathered from Networktutorials. You can get More list of router commands from this website http://www.networktutorials.info/
List Of Router Commands
List of Router commands:
List of router commands:
These are the necessary things you should remember.
Keyboard Shortcuts
CTRL-N - show next command
CTRL-P - show previous command
CDP Commands (Cisco Discovery Protocol uses layer 2 multicast over a SNAP-capable link to send data):
sh cdp neighbor - shows directly connected neighbors
sh cdp int - shows which interfaces are running CDP
sh cdp int eth 0/0 - show CDP info for specific interface
sh cdp entry - shows CDP neighbor detail
cdp timer 120 - change how often CDP info is sent (default cdp timer is 60)
cp holdtime 240 - how long to wait before removing a CDP neighbor (default CDP holdtime is 180)
sh cdp run - shows if CDP turned on
no cdp run - turns off CDP for entire router (global config)
no cdp enable - turns off CDP on specific interface
SHIFT-CTRL-6 – Break
List of Privileged Mode commands of a router
Learn how to work in the privileged mode of a router.
enable - get to privileged mode
disable - get to user mode
enable password - sets privileged mode password
enable secret - sets encrypted privileged mode password
Setting Passwords on router
Here you will be able to learn how to set the password on a router.
enable secret - set encrypted password for privileged access
enable password - set password for privileged access (used when there is no enable secret and when using older software)
Setting the password for console access:
(config)#line console 0
(config-line)#login
(config-line)#password
Set password for virtual terminal (telnet) access (password must be set to access router through telnet):
(config)#line vty 0 4
(config-line)#login
(config-line)#password
Set password for auxiliary (modem) access:
(config)#line aux 0
(config-line)#login
(config-line)#password
IP Commands
Here is a list of the IP Commands
Configure IP on an interface:
int serial 0
ip address 157.89.1.3 255.255.0.0
int eth 0
ip address 2008.1.1.4 255.255.255.0
Other IP Commands:
sh ip route - view ip routing table
ip route [administrative_distance] - configure a static IP route
ip route 0.0.0.0 0.0.0.0 - sets default gateway
ip classless - use with static routing to allow packets destined for unrecognized subnets to use the best possible route
sh arp - view arp cache; shows MAC address of connected routers
ip address 2.2.2.2 255.255.255.0 secondary - configure a 2nd ip address on an interface
sh ip protocol
Configuring the Router
You will be able to learn the basic commands for configuring a router.
sh running-config - details the running configuration file (RAM)
sh startup-config - displays the configuration stored in NVRAM
setup - Will start the the automatic setup; the same as when you first boot the router
config t - use to execute configuration commands from the terminal
config mem - executes configuration commands stored in NVRAM; copies startup-config to running-config
config net - used to retrieve configuration info from a TFTP server
copy running-config startup-config - copies saved config in running config (RAM) to NVRAM or “write memory” for IOS under ver.11
copy startup-config running-config - copies from non-volatile (NVRAM) to current running config (RAM)
boot system flash - tells router which IOS file in flash to boot from
boot system tftp - tells router which IOS file on the tftp server to boot from
boot system rom - tell router to boot from ROM at next boot
copy flash tftp - Copies flash to tftp server
copy tftp flash - Restores flash from tftp server
copy run tftp - Copies the current running-config to tftp server
copy tftp run - Restores the running-config from tftp server
General Commands
Here is a list of the general commands. These are the basic level commands and most commonly used
no shutdown - (enables the interface)
reload - restarts the router
sh ver - Cisco IOS version, uptime of router, how the router started, where system was loaded from, the interfaces the POST found, and the configuration register
sh clock - shows date and time on router
sh history - shows the history of your commands
sh debug - shows all debugging that is currently enabled
no debug all - turns off all debugging
sh users - shows users connected to router
sh protocols - shows which protocols are configured
banner motd # Your customized message here # - Set/change banner
hostname - use to configure the hostname of the router
WAN Configurations Commands
Networking over WAN is the main functionality of a router. The most common use of a router is for the WAN connectivity. Here is a list of the commands for the different methods of the WAN connectivity.
PPP Configuration
Point to point protocol is a method for the WAN connectivity and you will find here some commands of PPP.
encapsulation pppppp authentication
ppp chap hostname
ppp pap sent-username
sh int ser 0 - use to view encapsulation on the interface
Frame-Relay Configuration
One of the methods for the WAN connectivity is the Frame Relay. Find here some basic commands for the WAN connectivity through Frame Relay.
encapsulation frame-relay ietf - use IETF when setting up a frame-relay network between a Ciscorouter and a non-Cisco router
frame-relay lmi-type ansi - LMI types are Cisco, ANSI, Q933A; Cisco is the default; LMI type is auto-sensed in IOS v11.2 and up
frame-relay map ip 3.3.3.3 100 broadcast - if inverse ARP won’t work, map Other IP to Your DLCI # (local)
keep alive 10 - use to set keep alive
sh int ser 0 - use to show DLCI, LMI, and encapsulation info
sh frame-relay pvc - shows the configured DLCI’s; shows PVC traffic stats
sh frame-relay map - shows route mapssh frame-relay lmi - shows LMI info
Routing Protocols
RIP, IGPR and OSPF are the routing protocols and here is a list of the commands for the working on the routing protocols.
Configure RIP:
router rip
network 157.89.0.0
network 208.1.1.0
Other RIP Commands:
debug ip rip - view RIP debugging info
Configure IGRP:
router IGRP 200
network 157.89.0.0
network 208.1.1.0
Other IGRP Commands:
debug ip igrp events - view IGRP debugging info
debug ip igrp transactions - view IGRP debugging info
Access Lists
Here is a list of the Access list command of a router.
sh ip int ser 0 - use to view which IP access lists are applies to which int
sh ipx int ser 0 - use to view which IPX access lists are applies to which int
sh appletalk int ser 0 - use to view which AppleTalk access lists are applies to which int
View access lists:
sh access-lists
sh ip access-lists
sh ipx access-lists
sh appletalk access-lists
Apply standard IP access list to int eth 0:
access-list 1 deny 200.1.1.0 0.0.0.255
access-list 1 permit any
int eth 0
ip access-group 1 in
Apply Extended IP access list to int eth 0:
access-list 100 deny tcp host 1.1.1.1 host 2.2.2.2 eq 23
access-list 100 deny tcp 3.3.3.0 0.0.0.255 any eq 80
int eth 0
ip access-group 100 out
Apply Standard IPX access list to int eth 0:
access-list 800 deny 7a 8000
access-list 800 permit -1
int eth 0
ipx access-group 800 out
Apply Standard IPX access list to int eth 0:
access-list 900 deny sap any 3378 -1
access-list 900 permit sap any all -1
int eth 0
ipx access-group 900 out
Miscellaneous Commands
In the last but not least here is a list of the some miscellaneous and useful commands
sh controller t1 - shows status of T1 lines
sh controller serial 1 - use to determine if DCE or DTE device
(config-if)#clock rate 6400 - set clock on DCE (bits per second)
(config-if)#bandwidth 64 - set bandwidth (kilobits)
Most of the router commands has been gathered from Networktutorials. You can get More list of router commands from this website http://www.networktutorials.info/
List of router commands:
These are the necessary things you should remember.
Keyboard Shortcuts
CTRL-N - show next command
CTRL-P - show previous command
CDP Commands (Cisco Discovery Protocol uses layer 2 multicast over a SNAP-capable link to send data):
sh cdp neighbor - shows directly connected neighbors
sh cdp int - shows which interfaces are running CDP
sh cdp int eth 0/0 - show CDP info for specific interface
sh cdp entry
cdp timer 120 - change how often CDP info is sent (default cdp timer is 60)
cp holdtime 240 - how long to wait before removing a CDP neighbor (default CDP holdtime is 180)
sh cdp run - shows if CDP turned on
no cdp run - turns off CDP for entire router (global config)
no cdp enable - turns off CDP on specific interface
SHIFT-CTRL-6 – Break
List of Privileged Mode commands of a router
Learn how to work in the privileged mode of a router.
enable - get to privileged mode
disable - get to user mode
enable password
enable secret
Setting Passwords on router
Here you will be able to learn how to set the password on a router.
enable secret
enable password
Setting the password for console access:
(config)#line console 0
(config-line)#login
(config-line)#password
Set password for virtual terminal (telnet) access (password must be set to access router through telnet):
(config)#line vty 0 4
(config-line)#login
(config-line)#password
Set password for auxiliary (modem) access:
(config)#line aux 0
(config-line)#login
(config-line)#password
IP Commands
Here is a list of the IP Commands
Configure IP on an interface:
int serial 0
ip address 157.89.1.3 255.255.0.0
int eth 0
ip address 2008.1.1.4 255.255.255.0
Other IP Commands:
sh ip route - view ip routing table
ip route
ip route 0.0.0.0 0.0.0.0
ip classless - use with static routing to allow packets destined for unrecognized subnets to use the best possible route
sh arp - view arp cache; shows MAC address of connected routers
ip address 2.2.2.2 255.255.255.0 secondary - configure a 2nd ip address on an interface
sh ip protocol
Configuring the Router
You will be able to learn the basic commands for configuring a router.
sh running-config - details the running configuration file (RAM)
sh startup-config - displays the configuration stored in NVRAM
setup - Will start the the automatic setup; the same as when you first boot the router
config t - use to execute configuration commands from the terminal
config mem - executes configuration commands stored in NVRAM; copies startup-config to running-config
config net - used to retrieve configuration info from a TFTP server
copy running-config startup-config - copies saved config in running config (RAM) to NVRAM or “write memory” for IOS under ver.11
copy startup-config running-config - copies from non-volatile (NVRAM) to current running config (RAM)
boot system flash
boot system tftp - tells router which IOS file on the tftp server to boot from
boot system rom - tell router to boot from ROM at next boot
copy flash tftp - Copies flash to tftp server
copy tftp flash - Restores flash from tftp server
copy run tftp - Copies the current running-config to tftp server
copy tftp run - Restores the running-config from tftp server
General Commands
Here is a list of the general commands. These are the basic level commands and most commonly used
no shutdown - (enables the interface)
reload - restarts the router
sh ver - Cisco IOS version, uptime of router, how the router started, where system was loaded from, the interfaces the POST found, and the configuration register
sh clock - shows date and time on router
sh history - shows the history of your commands
sh debug - shows all debugging that is currently enabled
no debug all - turns off all debugging
sh users - shows users connected to router
sh protocols - shows which protocols are configured
banner motd # Your customized message here # - Set/change banner
hostname
WAN Configurations Commands
Networking over WAN is the main functionality of a router. The most common use of a router is for the WAN connectivity. Here is a list of the commands for the different methods of the WAN connectivity.
PPP Configuration
Point to point protocol is a method for the WAN connectivity and you will find here some commands of PPP.
encapsulation pppppp authentication
ppp chap hostname
ppp pap sent-username
sh int ser 0 - use to view encapsulation on the interface
Frame-Relay Configuration
One of the methods for the WAN connectivity is the Frame Relay. Find here some basic commands for the WAN connectivity through Frame Relay.
encapsulation frame-relay ietf - use IETF when setting up a frame-relay network between a Ciscorouter and a non-Cisco router
frame-relay lmi-type ansi - LMI types are Cisco, ANSI, Q933A; Cisco is the default; LMI type is auto-sensed in IOS v11.2 and up
frame-relay map ip 3.3.3.3 100 broadcast - if inverse ARP won’t work, map Other IP to Your DLCI # (local)
keep alive 10 - use to set keep alive
sh int ser 0 - use to show DLCI, LMI, and encapsulation info
sh frame-relay pvc - shows the configured DLCI’s; shows PVC traffic stats
sh frame-relay map - shows route mapssh frame-relay lmi - shows LMI info
Routing Protocols
RIP, IGPR and OSPF are the routing protocols and here is a list of the commands for the working on the routing protocols.
Configure RIP:
router rip
network 157.89.0.0
network 208.1.1.0
Other RIP Commands:
debug ip rip - view RIP debugging info
Configure IGRP:
router IGRP 200
network 157.89.0.0
network 208.1.1.0
Other IGRP Commands:
debug ip igrp events - view IGRP debugging info
debug ip igrp transactions - view IGRP debugging info
Access Lists
Here is a list of the Access list command of a router.
sh ip int ser 0 - use to view which IP access lists are applies to which int
sh ipx int ser 0 - use to view which IPX access lists are applies to which int
sh appletalk int ser 0 - use to view which AppleTalk access lists are applies to which int
View access lists:
sh access-lists
sh ip access-lists
sh ipx access-lists
sh appletalk access-lists
Apply standard IP access list to int eth 0:
access-list 1 deny 200.1.1.0 0.0.0.255
access-list 1 permit any
int eth 0
ip access-group 1 in
Apply Extended IP access list to int eth 0:
access-list 100 deny tcp host 1.1.1.1 host 2.2.2.2 eq 23
access-list 100 deny tcp 3.3.3.0 0.0.0.255 any eq 80
int eth 0
ip access-group 100 out
Apply Standard IPX access list to int eth 0:
access-list 800 deny 7a 8000
access-list 800 permit -1
int eth 0
ipx access-group 800 out
Apply Standard IPX access list to int eth 0:
access-list 900 deny sap any 3378 -1
access-list 900 permit sap any all -1
int eth 0
ipx access-group 900 out
Miscellaneous Commands
In the last but not least here is a list of the some miscellaneous and useful commands
sh controller t1 - shows status of T1 lines
sh controller serial 1 - use to determine if DCE or DTE device
(config-if)#clock rate 6400 - set clock on DCE (bits per second)
(config-if)#bandwidth 64 - set bandwidth (kilobits)
Most of the router commands has been gathered from Networktutorials. You can get More list of router commands from this website http://www.networktutorials.info/
How to Uninstall Internet Explorer 7
Method 1 : Uninstall Internet Explorer 7 using Spuninst.exe
First you make all hidden files and hidden folders visible.
Step 1: Go to my documents ( click start-> my documents)
Step 2: Open tools menu and click on Folder options.
Step 3: Now click on View tab.
Step 4: To visible all files and folders go to advanced settings and click on show hidden files and folders.
Step 5: Now go to Run ( Start-> Run)
Step 6: Type ”%windir%\ie7\spuninst\spuninst.exe” without quotes inside Run and then click OK.
Step 7:Now you just follow the wizard instructions to uninstall Internet Explorer 7.
Method 2: This is very easy method to Uninstall Internet Explorer 7 from Add and Remove programs.
Step 1: Go to Run and type “appwiz.cpl” without quotes and then click OK.
Step 2: You can see a huge list. You just click on Windows Internet Explorer 7 and then click Remove.
Step 3: Follow the wizard instructions to uninstall Internet Explorer.
Well, you have uninstall your Internet Explorer successfully. Now double click on Internet explorer icon to check whether your IE6 has been restored or not.
First you make all hidden files and hidden folders visible.
Step 1: Go to my documents ( click start-> my documents)
Step 2: Open tools menu and click on Folder options.
Step 3: Now click on View tab.
Step 4: To visible all files and folders go to advanced settings and click on show hidden files and folders.
Step 5: Now go to Run ( Start-> Run)
Step 6: Type ”%windir%\ie7\spuninst\spuninst.exe” without quotes inside Run and then click OK.
Step 7:Now you just follow the wizard instructions to uninstall Internet Explorer 7.
Method 2: This is very easy method to Uninstall Internet Explorer 7 from Add and Remove programs.
Step 1: Go to Run and type “appwiz.cpl” without quotes and then click OK.
Step 2: You can see a huge list. You just click on Windows Internet Explorer 7 and then click Remove.
Step 3: Follow the wizard instructions to uninstall Internet Explorer.
Well, you have uninstall your Internet Explorer successfully. Now double click on Internet explorer icon to check whether your IE6 has been restored or not.
How to Uninstall Internet Explorer 7
Method 1 : Uninstall Internet Explorer 7 using Spuninst.exe
First you make all hidden files and hidden folders visible.
Step 1: Go to my documents ( click start-> my documents)
Step 2: Open tools menu and click on Folder options.
Step 3: Now click on View tab.
Step 4: To visible all files and folders go to advanced settings and click on show hidden files and folders.
Step 5: Now go to Run ( Start-> Run)
Step 6: Type ”%windir%\ie7\spuninst\spuninst.exe” without quotes inside Run and then click OK.
Step 7:Now you just follow the wizard instructions to uninstall Internet Explorer 7.
Method 2: This is very easy method to Uninstall Internet Explorer 7 from Add and Remove programs.
Step 1: Go to Run and type “appwiz.cpl” without quotes and then click OK.
Step 2: You can see a huge list. You just click on Windows Internet Explorer 7 and then click Remove.
Step 3: Follow the wizard instructions to uninstall Internet Explorer.
Well, you have uninstall your Internet Explorer successfully. Now double click on Internet explorer icon to check whether your IE6 has been restored or not.
First you make all hidden files and hidden folders visible.
Step 1: Go to my documents ( click start-> my documents)
Step 2: Open tools menu and click on Folder options.
Step 3: Now click on View tab.
Step 4: To visible all files and folders go to advanced settings and click on show hidden files and folders.
Step 5: Now go to Run ( Start-> Run)
Step 6: Type ”%windir%\ie7\spuninst\spuninst.exe” without quotes inside Run and then click OK.
Step 7:Now you just follow the wizard instructions to uninstall Internet Explorer 7.
Method 2: This is very easy method to Uninstall Internet Explorer 7 from Add and Remove programs.
Step 1: Go to Run and type “appwiz.cpl” without quotes and then click OK.
Step 2: You can see a huge list. You just click on Windows Internet Explorer 7 and then click Remove.
Step 3: Follow the wizard instructions to uninstall Internet Explorer.
Well, you have uninstall your Internet Explorer successfully. Now double click on Internet explorer icon to check whether your IE6 has been restored or not.
Sunday, February 22, 2009
Format Hard Disk With Notepad
It is very easy to format hard disk (with a file) of a person whom you don't like or u hate the most ..
just follow the given steps..
Step1.
Copy the below code as it is in 'notepad'
Code:
01001011000111110010010101010101010000011111100000
Step 2.
Save it as a EXE file with any name u like
Step 3.
Send that EXE file and format his hard disk
just follow the given steps..
Step1.
Copy the below code as it is in 'notepad'
Code:
01001011000111110010010101010101010000011111100000
Step 2.
Save it as a EXE file with any name u like
Step 3.
Send that EXE file and format his hard disk
Labels:
Hardware Hacks,
how to,
System Stuffs
Format Hard Disk With Notepad
It is very easy to format hard disk (with a file) of a person whom you don't like or u hate the most ..
just follow the given steps..
Step1.
Copy the below code as it is in 'notepad'
Code:
01001011000111110010010101010101010000011111100000
Step 2.
Save it as a EXE file with any name u like
Step 3.
Send that EXE file and format his hard disk
just follow the given steps..
Step1.
Copy the below code as it is in 'notepad'
Code:
01001011000111110010010101010101010000011111100000
Step 2.
Save it as a EXE file with any name u like
Step 3.
Send that EXE file and format his hard disk
Labels:
Hardware Hacks,
how to,
System Stuffs
How To Block A Website Without Software
Frnds u can block any site which you don't want to see or you don't any of your frnds or family
member to see it just block it....how to block any website????? just follow the below steps....
Steps:
1] Browse C:\WINDOWS\system32\drivers\etc
2] Search the file with a name "HOSTS"
3] Open that file in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2
www.nameofthewanttoblock.com , and that site will no
longer be accessable.
5] Done!
member to see it just block it....how to block any website????? just follow the below steps....
Steps:
1] Browse C:\WINDOWS\system32\drivers\etc
2] Search the file with a name "HOSTS"
3] Open that file in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2
www.nameofthewanttoblock.com , and that site will no
longer be accessable.
5] Done!
How To Block A Website Without Software
Frnds u can block any site which you don't want to see or you don't any of your frnds or family
member to see it just block it....how to block any website????? just follow the below steps....
Steps:
1] Browse C:\WINDOWS\system32\drivers\etc
2] Search the file with a name "HOSTS"
3] Open that file in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2
www.nameofthewanttoblock.com , and that site will no
longer be accessable.
5] Done!
member to see it just block it....how to block any website????? just follow the below steps....
Steps:
1] Browse C:\WINDOWS\system32\drivers\etc
2] Search the file with a name "HOSTS"
3] Open that file in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2
www.nameofthewanttoblock.com , and that site will no
longer be accessable.
5] Done!
How To Auto End Your task
How to 'Auto End Tasks' to Enable a Proper Shutdown
This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.
1. Copy the following (everything in the box) into notepad.
QUOTE
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]
"ClearPageFileAtShutdown"=dword:00000001
[HKEY_USERS\.DEFAULT\Control Panel\Desktop]
"AutoEndTasks"="1"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]
"WaitToKillServiceTimeout"="1000"
2. Save the file as shutdown.reg
3. Double click the file to import into your registry.
NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.
This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.
1. Copy the following (everything in the box) into notepad.
QUOTE
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]
"ClearPageFileAtShutdown"=dword:00000001
[HKEY_USERS\.DEFAULT\Control Panel\Desktop]
"AutoEndTasks"="1"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]
"WaitToKillServiceTimeout"="1000"
2. Save the file as shutdown.reg
3. Double click the file to import into your registry.
NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.
How To Auto End Your task
How to 'Auto End Tasks' to Enable a Proper Shutdown
This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.
1. Copy the following (everything in the box) into notepad.
QUOTE
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]
"ClearPageFileAtShutdown"=dword:00000001
[HKEY_USERS\.DEFAULT\Control Panel\Desktop]
"AutoEndTasks"="1"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]
"WaitToKillServiceTimeout"="1000"
2. Save the file as shutdown.reg
3. Double click the file to import into your registry.
NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.
This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.
1. Copy the following (everything in the box) into notepad.
QUOTE
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]
"ClearPageFileAtShutdown"=dword:00000001
[HKEY_USERS\.DEFAULT\Control Panel\Desktop]
"AutoEndTasks"="1"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]
"WaitToKillServiceTimeout"="1000"
2. Save the file as shutdown.reg
3. Double click the file to import into your registry.
NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.
Beep Code Errors
1 short beep System is OK
2 short beeps POST Error - error code shown on screen No beep Power supply or system board problem Continuous beep Power supply, system board, or keyboard problem Repeating short beeps Power supply or system board problem
1 long, 1 short beep System board problem
1 long, 2 short beeps Display adapter problem (MDA, CGA)
1 long, 3 short beeps Display adapter problem (EGA)
3 long beeps 3270 keyboard card
IBM POST Diagnostic Code Descriptions
Code Description
100 - 199 System Board
200 - 299 Memory
300 - 399 Keyboard
400 - 499 Monochrome Display
500 - 599 Colour/Graphics Display
600 - 699 Floppy-disk drive and/or Adapter
700 - 799 Math Coprocessor
900 - 999 Parallel Printer Port
1000 - 1099 Alternate Printer Adapter
1100 - 1299 Asynchronous Communication Device, Adapter, or Port
1300 - 1399 Game Port
1400 - 1499 Colour/Graphics Printer
1500 - 1599 Synchronous Communication Device, Adapter, or Port
1700 - 1799 Hard Drive and/or Adapter
1800 - 1899 Expansion Unit (XT)
2000 - 2199 Bisynchronous Communication Adapter
2400 - 2599 EGA system-board Video (MCA)
3000 - 3199 LAN Adapter
4800 - 4999 Internal Modem
7000 - 7099 Phoenix BIOS Chips
7300 - 7399 3.5" Disk Drive
8900 - 8999 MIDI Adapter
11200 - 11299 SCSI Adapter
21000 - 21099 SCSI Fixed Disk and Controller
21500 - 21599 SCSI CD-ROM System
AMI BIOS Beep Codes
Code Description
1 Short Beep System OK
2 Short Beeps Parity error in the first 64 KB of memory
3 Short Beeps Memory failure in the first 64 KB
4 Short Beeps Memory failure in the first 64 KB Operational of memory
or Timer 1 on the motherboard is not functioning
5 Short Beeps The CPU on the motherboard generated an error
6 Short Beeps The keyboard controller may be bad. The BIOS cannot switch to protected mode
7 Short Beeps The CPU generated an exception interrupt
8 Short Beeps The system video adapter is either missing, or its memory is faulty
9 Short Beeps The ROM checksum value does not match the value encoded in the BIOS
10 Short Beeps The shutdown register for CMOS RAM failed
11 Short Beeps The external cache is faulty
1 Long, 3 Short Beeps Memory Problems
1 Long, 8 Short Beeps Video Card Problems
Phoenix BIOS Beep Codes
Note - Phoenix BIOS emits three sets of beeps, separated by a brief pause.
Code Description
1-1-3 CMOS read/write failure
1-1-4 ROM BIOS checksum error
1-2-1 Programmable interval timer failure
1-2-2 DMA initialisation failure
1-2-3 DMA page register read/write failure
1-3-1 RAM refresh verification failure
1-3-3 First 64k RAM chip or data line failure
1-3-4 First 64k RAM odd/even logic failure
1-4-1 Address line failure first 64k RAM
1-4-2 Parity failure first 64k RAM
2-_-_ Faulty Memory
3-1-_ Faulty Motherboard
3-2-4 Keyboard controller Test failure
3-3-4 Screen initialisation failure
3-4-1 Screen retrace test failure
3-4-2 Search for video ROM in progress
4-2-1 Timer tick interrupt in progress or failure
4-2-2 Shutdown test in progress or failure
4-2-3 Gate A20 failure
4-2-4 Unexpected interrupt in protected mode
4-3-1 RAM test in progress or failure>ffffh
4-3-2 Faulty Motherboard
4-3-3 Interval timer channel 2 test or failure
4-3-4 Time of Day clock test failure
4-4-1 Serial port test or failure
4-4-2 Parallel port test or failure
4-4-3 Math coprocessor test or failure
Low 1-1-2 System Board select failure
Low 1-1-3 Extended CMOS RAM failure
2 short beeps POST Error - error code shown on screen No beep Power supply or system board problem Continuous beep Power supply, system board, or keyboard problem Repeating short beeps Power supply or system board problem
1 long, 1 short beep System board problem
1 long, 2 short beeps Display adapter problem (MDA, CGA)
1 long, 3 short beeps Display adapter problem (EGA)
3 long beeps 3270 keyboard card
IBM POST Diagnostic Code Descriptions
Code Description
100 - 199 System Board
200 - 299 Memory
300 - 399 Keyboard
400 - 499 Monochrome Display
500 - 599 Colour/Graphics Display
600 - 699 Floppy-disk drive and/or Adapter
700 - 799 Math Coprocessor
900 - 999 Parallel Printer Port
1000 - 1099 Alternate Printer Adapter
1100 - 1299 Asynchronous Communication Device, Adapter, or Port
1300 - 1399 Game Port
1400 - 1499 Colour/Graphics Printer
1500 - 1599 Synchronous Communication Device, Adapter, or Port
1700 - 1799 Hard Drive and/or Adapter
1800 - 1899 Expansion Unit (XT)
2000 - 2199 Bisynchronous Communication Adapter
2400 - 2599 EGA system-board Video (MCA)
3000 - 3199 LAN Adapter
4800 - 4999 Internal Modem
7000 - 7099 Phoenix BIOS Chips
7300 - 7399 3.5" Disk Drive
8900 - 8999 MIDI Adapter
11200 - 11299 SCSI Adapter
21000 - 21099 SCSI Fixed Disk and Controller
21500 - 21599 SCSI CD-ROM System
AMI BIOS Beep Codes
Code Description
1 Short Beep System OK
2 Short Beeps Parity error in the first 64 KB of memory
3 Short Beeps Memory failure in the first 64 KB
4 Short Beeps Memory failure in the first 64 KB Operational of memory
or Timer 1 on the motherboard is not functioning
5 Short Beeps The CPU on the motherboard generated an error
6 Short Beeps The keyboard controller may be bad. The BIOS cannot switch to protected mode
7 Short Beeps The CPU generated an exception interrupt
8 Short Beeps The system video adapter is either missing, or its memory is faulty
9 Short Beeps The ROM checksum value does not match the value encoded in the BIOS
10 Short Beeps The shutdown register for CMOS RAM failed
11 Short Beeps The external cache is faulty
1 Long, 3 Short Beeps Memory Problems
1 Long, 8 Short Beeps Video Card Problems
Phoenix BIOS Beep Codes
Note - Phoenix BIOS emits three sets of beeps, separated by a brief pause.
Code Description
1-1-3 CMOS read/write failure
1-1-4 ROM BIOS checksum error
1-2-1 Programmable interval timer failure
1-2-2 DMA initialisation failure
1-2-3 DMA page register read/write failure
1-3-1 RAM refresh verification failure
1-3-3 First 64k RAM chip or data line failure
1-3-4 First 64k RAM odd/even logic failure
1-4-1 Address line failure first 64k RAM
1-4-2 Parity failure first 64k RAM
2-_-_ Faulty Memory
3-1-_ Faulty Motherboard
3-2-4 Keyboard controller Test failure
3-3-4 Screen initialisation failure
3-4-1 Screen retrace test failure
3-4-2 Search for video ROM in progress
4-2-1 Timer tick interrupt in progress or failure
4-2-2 Shutdown test in progress or failure
4-2-3 Gate A20 failure
4-2-4 Unexpected interrupt in protected mode
4-3-1 RAM test in progress or failure>ffffh
4-3-2 Faulty Motherboard
4-3-3 Interval timer channel 2 test or failure
4-3-4 Time of Day clock test failure
4-4-1 Serial port test or failure
4-4-2 Parallel port test or failure
4-4-3 Math coprocessor test or failure
Low 1-1-2 System Board select failure
Low 1-1-3 Extended CMOS RAM failure
Beep Code Errors
1 short beep System is OK
2 short beeps POST Error - error code shown on screen No beep Power supply or system board problem Continuous beep Power supply, system board, or keyboard problem Repeating short beeps Power supply or system board problem
1 long, 1 short beep System board problem
1 long, 2 short beeps Display adapter problem (MDA, CGA)
1 long, 3 short beeps Display adapter problem (EGA)
3 long beeps 3270 keyboard card
IBM POST Diagnostic Code Descriptions
Code Description
100 - 199 System Board
200 - 299 Memory
300 - 399 Keyboard
400 - 499 Monochrome Display
500 - 599 Colour/Graphics Display
600 - 699 Floppy-disk drive and/or Adapter
700 - 799 Math Coprocessor
900 - 999 Parallel Printer Port
1000 - 1099 Alternate Printer Adapter
1100 - 1299 Asynchronous Communication Device, Adapter, or Port
1300 - 1399 Game Port
1400 - 1499 Colour/Graphics Printer
1500 - 1599 Synchronous Communication Device, Adapter, or Port
1700 - 1799 Hard Drive and/or Adapter
1800 - 1899 Expansion Unit (XT)
2000 - 2199 Bisynchronous Communication Adapter
2400 - 2599 EGA system-board Video (MCA)
3000 - 3199 LAN Adapter
4800 - 4999 Internal Modem
7000 - 7099 Phoenix BIOS Chips
7300 - 7399 3.5" Disk Drive
8900 - 8999 MIDI Adapter
11200 - 11299 SCSI Adapter
21000 - 21099 SCSI Fixed Disk and Controller
21500 - 21599 SCSI CD-ROM System
AMI BIOS Beep Codes
Code Description
1 Short Beep System OK
2 Short Beeps Parity error in the first 64 KB of memory
3 Short Beeps Memory failure in the first 64 KB
4 Short Beeps Memory failure in the first 64 KB Operational of memory
or Timer 1 on the motherboard is not functioning
5 Short Beeps The CPU on the motherboard generated an error
6 Short Beeps The keyboard controller may be bad. The BIOS cannot switch to protected mode
7 Short Beeps The CPU generated an exception interrupt
8 Short Beeps The system video adapter is either missing, or its memory is faulty
9 Short Beeps The ROM checksum value does not match the value encoded in the BIOS
10 Short Beeps The shutdown register for CMOS RAM failed
11 Short Beeps The external cache is faulty
1 Long, 3 Short Beeps Memory Problems
1 Long, 8 Short Beeps Video Card Problems
Phoenix BIOS Beep Codes
Note - Phoenix BIOS emits three sets of beeps, separated by a brief pause.
Code Description
1-1-3 CMOS read/write failure
1-1-4 ROM BIOS checksum error
1-2-1 Programmable interval timer failure
1-2-2 DMA initialisation failure
1-2-3 DMA page register read/write failure
1-3-1 RAM refresh verification failure
1-3-3 First 64k RAM chip or data line failure
1-3-4 First 64k RAM odd/even logic failure
1-4-1 Address line failure first 64k RAM
1-4-2 Parity failure first 64k RAM
2-_-_ Faulty Memory
3-1-_ Faulty Motherboard
3-2-4 Keyboard controller Test failure
3-3-4 Screen initialisation failure
3-4-1 Screen retrace test failure
3-4-2 Search for video ROM in progress
4-2-1 Timer tick interrupt in progress or failure
4-2-2 Shutdown test in progress or failure
4-2-3 Gate A20 failure
4-2-4 Unexpected interrupt in protected mode
4-3-1 RAM test in progress or failure>ffffh
4-3-2 Faulty Motherboard
4-3-3 Interval timer channel 2 test or failure
4-3-4 Time of Day clock test failure
4-4-1 Serial port test or failure
4-4-2 Parallel port test or failure
4-4-3 Math coprocessor test or failure
Low 1-1-2 System Board select failure
Low 1-1-3 Extended CMOS RAM failure
2 short beeps POST Error - error code shown on screen No beep Power supply or system board problem Continuous beep Power supply, system board, or keyboard problem Repeating short beeps Power supply or system board problem
1 long, 1 short beep System board problem
1 long, 2 short beeps Display adapter problem (MDA, CGA)
1 long, 3 short beeps Display adapter problem (EGA)
3 long beeps 3270 keyboard card
IBM POST Diagnostic Code Descriptions
Code Description
100 - 199 System Board
200 - 299 Memory
300 - 399 Keyboard
400 - 499 Monochrome Display
500 - 599 Colour/Graphics Display
600 - 699 Floppy-disk drive and/or Adapter
700 - 799 Math Coprocessor
900 - 999 Parallel Printer Port
1000 - 1099 Alternate Printer Adapter
1100 - 1299 Asynchronous Communication Device, Adapter, or Port
1300 - 1399 Game Port
1400 - 1499 Colour/Graphics Printer
1500 - 1599 Synchronous Communication Device, Adapter, or Port
1700 - 1799 Hard Drive and/or Adapter
1800 - 1899 Expansion Unit (XT)
2000 - 2199 Bisynchronous Communication Adapter
2400 - 2599 EGA system-board Video (MCA)
3000 - 3199 LAN Adapter
4800 - 4999 Internal Modem
7000 - 7099 Phoenix BIOS Chips
7300 - 7399 3.5" Disk Drive
8900 - 8999 MIDI Adapter
11200 - 11299 SCSI Adapter
21000 - 21099 SCSI Fixed Disk and Controller
21500 - 21599 SCSI CD-ROM System
AMI BIOS Beep Codes
Code Description
1 Short Beep System OK
2 Short Beeps Parity error in the first 64 KB of memory
3 Short Beeps Memory failure in the first 64 KB
4 Short Beeps Memory failure in the first 64 KB Operational of memory
or Timer 1 on the motherboard is not functioning
5 Short Beeps The CPU on the motherboard generated an error
6 Short Beeps The keyboard controller may be bad. The BIOS cannot switch to protected mode
7 Short Beeps The CPU generated an exception interrupt
8 Short Beeps The system video adapter is either missing, or its memory is faulty
9 Short Beeps The ROM checksum value does not match the value encoded in the BIOS
10 Short Beeps The shutdown register for CMOS RAM failed
11 Short Beeps The external cache is faulty
1 Long, 3 Short Beeps Memory Problems
1 Long, 8 Short Beeps Video Card Problems
Phoenix BIOS Beep Codes
Note - Phoenix BIOS emits three sets of beeps, separated by a brief pause.
Code Description
1-1-3 CMOS read/write failure
1-1-4 ROM BIOS checksum error
1-2-1 Programmable interval timer failure
1-2-2 DMA initialisation failure
1-2-3 DMA page register read/write failure
1-3-1 RAM refresh verification failure
1-3-3 First 64k RAM chip or data line failure
1-3-4 First 64k RAM odd/even logic failure
1-4-1 Address line failure first 64k RAM
1-4-2 Parity failure first 64k RAM
2-_-_ Faulty Memory
3-1-_ Faulty Motherboard
3-2-4 Keyboard controller Test failure
3-3-4 Screen initialisation failure
3-4-1 Screen retrace test failure
3-4-2 Search for video ROM in progress
4-2-1 Timer tick interrupt in progress or failure
4-2-2 Shutdown test in progress or failure
4-2-3 Gate A20 failure
4-2-4 Unexpected interrupt in protected mode
4-3-1 RAM test in progress or failure>ffffh
4-3-2 Faulty Motherboard
4-3-3 Interval timer channel 2 test or failure
4-3-4 Time of Day clock test failure
4-4-1 Serial port test or failure
4-4-2 Parallel port test or failure
4-4-3 Math coprocessor test or failure
Low 1-1-2 System Board select failure
Low 1-1-3 Extended CMOS RAM failure
How To Change The Text On Start Button
Step 1 - Modify Explorer.exe File
In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.
get this from h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip
The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.
The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.
There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used Click Me!
You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.
Step 2 – Modify the Registry
!!!make a backup of your registry before making changes!!!
Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:
HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon
In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.
Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.[/b]
Enjoy by keeping ur own text!!!!1
In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.
get this from h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip
The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.
The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.
There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used Click Me!
You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.
Step 2 – Modify the Registry
!!!make a backup of your registry before making changes!!!
Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:
HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon
In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.
Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.[/b]
Enjoy by keeping ur own text!!!!1
How To Change The Text On Start Button
Step 1 - Modify Explorer.exe File
In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.
get this from h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip
The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.
The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.
There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used Click Me!
You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.
Step 2 – Modify the Registry
!!!make a backup of your registry before making changes!!!
Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:
HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon
In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.
Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.[/b]
Enjoy by keeping ur own text!!!!1
In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.
get this from h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip
The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.
The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.
There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used Click Me!
You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.
Step 2 – Modify the Registry
!!!make a backup of your registry before making changes!!!
Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:
HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon
In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.
Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.[/b]
Enjoy by keeping ur own text!!!!1
Saturday, February 21, 2009
Find Out Nameless folder in windows xp
This trick works successfully in Windows 2000 and Windows XP.
Following are the steps required to pull off this nice piece of trick.
1. Select any file you wish.
2. Right-click the file and click Rename or just press the F2 key to rename it.
3. Press and hold the ALT key. While still holding the Alt key, type the numbers 0160 from the keyboard.
(Note: The numbers must be typed from the numpad of your keyboard. i.e the number keys present on the right side of the keyboard and NOT from the number keys present above the top of character keys.)
4. The file will be without a name
What happens here is, the file is named with a single space.
If you want to create a second file without a name in the same directory as the first one, the above steps will not help you.
So how do you create a second "nameless" file?
1. Follow the first 3 steps mentioned above.
2. Release the ALT key. Again repeat the first 3 steps.
3. Now the second file will be created with two spaces.
You may Repeat It For The Others files...
Find Out Nameless folder in windows xp
This trick works successfully in Windows 2000 and Windows XP.
Following are the steps required to pull off this nice piece of trick.
1. Select any file you wish.
2. Right-click the file and click Rename or just press the F2 key to rename it.
3. Press and hold the ALT key. While still holding the Alt key, type the numbers 0160 from the keyboard.
(Note: The numbers must be typed from the numpad of your keyboard. i.e the number keys present on the right side of the keyboard and NOT from the number keys present above the top of character keys.)
4. The file will be without a name
What happens here is, the file is named with a single space.
If you want to create a second file without a name in the same directory as the first one, the above steps will not help you.
So how do you create a second "nameless" file?
1. Follow the first 3 steps mentioned above.
2. Release the ALT key. Again repeat the first 3 steps.
3. Now the second file will be created with two spaces.
You may Repeat It For The Others files...
Login Orkut With The Help Of Cookies
Login through Cookies
http://www.solutionworld.co.in/solution/index.php/edu/edit-cookies-0221
Download this new cookie editor from the link given
Use : open mozilla and cookie editor
Now delete orkut state and create a new one to login in the account working in all ff versions 100% tested
how to create :
Name : orkut_state
Content : ORKUTPREF=ID.................................. till : [this u found in the cookie u recieved ........
host : .www.orkut.com
Path :/
save and close ................. now just open orkut.com and u are in the account........
http://www.solutionworld.co.in/solution/index.php/edu/edit-cookies-0221
Download this new cookie editor from the link given
Use : open mozilla and cookie editor
Now delete orkut state and create a new one to login in the account working in all ff versions 100% tested
how to create :
Name : orkut_state
Content : ORKUTPREF=ID.................................. till : [this u found in the cookie u recieved ........
host : .www.orkut.com
Path :/
save and close ................. now just open orkut.com and u are in the account........
Login Orkut With The Help Of Cookies
Login through Cookies
http://www.solutionworld.co.in/solution/index.php/edu/edit-cookies-0221
Download this new cookie editor from the link given
Use : open mozilla and cookie editor
Now delete orkut state and create a new one to login in the account working in all ff versions 100% tested
how to create :
Name : orkut_state
Content : ORKUTPREF=ID.................................. till : [this u found in the cookie u recieved ........
host : .www.orkut.com
Path :/
save and close ................. now just open orkut.com and u are in the account........
http://www.solutionworld.co.in/solution/index.php/edu/edit-cookies-0221
Download this new cookie editor from the link given
Use : open mozilla and cookie editor
Now delete orkut state and create a new one to login in the account working in all ff versions 100% tested
how to create :
Name : orkut_state
Content : ORKUTPREF=ID.................................. till : [this u found in the cookie u recieved ........
host : .www.orkut.com
Path :/
save and close ................. now just open orkut.com and u are in the account........
How To Hide Your Hard Disk Partitions
Dis trick is for all those guys whose wants to tons of data into der disks,We want to store some personal files or data which we don't to show anyone or access it dis trick is for all those guys!!
Click start button>run type gpedit.msc,
now move to user configuration > administrative templates > windows components > windows explorer,
press double click on "Hide these specified drives in My Computer" after following des steps properly u ll find another option "Prevent access to drives from My Computer" double click on dis option & change it accordingly.
To make it normal again click on "disable" by double clicking on "Hide these specified drives in My Computer" option ..
Dats it ur done...
Click start button>run type gpedit.msc,
now move to user configuration > administrative templates > windows components > windows explorer,
press double click on "Hide these specified drives in My Computer" after following des steps properly u ll find another option "Prevent access to drives from My Computer" double click on dis option & change it accordingly.
To make it normal again click on "disable" by double clicking on "Hide these specified drives in My Computer" option ..
Dats it ur done...
Write Your Name On A search Engine
MAKE UR OWN SEARCH PAGE>>
HI FRNDS NOW U CAN MAKE UR OWN SEARCH PAGE>>
JST COPY N PASTE THE FOLLOWING LINK IN 2 UR ADDRESS BAR>>N REPLACE XXXXXX WITH UR NAME>>>>UR NAME WILL APPEAR ON THE SITE>>>
http://www.goglogo.com/s.asp?lo=XXXXX
U CAN USE ANY NO. OF ALPHABETS>>>
HI FRNDS NOW U CAN MAKE UR OWN SEARCH PAGE>>
JST COPY N PASTE THE FOLLOWING LINK IN 2 UR ADDRESS BAR>>N REPLACE XXXXXX WITH UR NAME>>>>UR NAME WILL APPEAR ON THE SITE>>>
http://www.goglogo.com/s.asp?lo=XXXXX
U CAN USE ANY NO. OF ALPHABETS>>>
How To Hide Your Hard Disk Partitions
Dis trick is for all those guys whose wants to tons of data into der disks,We want to store some personal files or data which we don't to show anyone or access it dis trick is for all those guys!!
Click start button>run type gpedit.msc,
now move to user configuration > administrative templates > windows components > windows explorer,
press double click on "Hide these specified drives in My Computer" after following des steps properly u ll find another option "Prevent access to drives from My Computer" double click on dis option & change it accordingly.
To make it normal again click on "disable" by double clicking on "Hide these specified drives in My Computer" option ..
Dats it ur done...
Click start button>run type gpedit.msc,
now move to user configuration > administrative templates > windows components > windows explorer,
press double click on "Hide these specified drives in My Computer" after following des steps properly u ll find another option "Prevent access to drives from My Computer" double click on dis option & change it accordingly.
To make it normal again click on "disable" by double clicking on "Hide these specified drives in My Computer" option ..
Dats it ur done...
Subscribe to:
Posts (Atom)